56 resultados para Univalent Functions with Negative Coefficients
Resumo:
Schizophrenia patients have been shown to be compromised in their ability to recognize facial emotion. This deficit has been shown to be related to negative symptoms severity. However, to date, most studies have used static rather than dynamic depictions of faces. Nineteen patients with schizophrenia were compared with seventeen controls on 2 tasks; the first involving the discrimination of facial identity, emotion, and butterfly wings; the second testing emotion recognition using both static and dynamic stimuli. In the first task, the patients performed more poorly than controls for emotion discrimination only, confirming a specific deficit in facial emotion recognition. In the second task, patients performed more poorly in both static and dynamic facial emotion processing. An interesting pattern of associations suggestive of a possible double dissociation emerged in relation to correlations with symptom ratings: high negative symptom ratings were associated with poorer recognition of static displays of emotion, whereas high positive symptom ratings were associated with poorer recognition of dynamic displays of emotion. However, while the strength of associations between negative symptom ratings and accuracy during static and dynamic facial emotion processing was significantly different, those between positive symptom ratings and task performance were not. The results confirm a facial emotion-processing deficit in schizophrenia using more ecologically valid dynamic expressions of emotion. The pattern of findings may reflect differential patterns of cortical dysfunction associated with negative and positive symptoms of schizophrenia in the context of differential neural mechanisms for the processing of static and dynamic displays of facial emotion.
Resumo:
Smaller firms are often viewed as resistant to regulation due to cost burdens. However, evidence indicates that for some compliance is beneficial under certain conditions. Drawing on data on attitudes and responses of smaller firm owner-managers to changes in Australia’s harmonising work health and safety context we report on smaller firms’ responses to these changes. Despite uncertainty due to incomplete harmonisation, many owner-managers viewed safety compliance as important and necessary to do business. Those with negative views still linked positive safety performance to business outcomes. We categorise smaller firms’ responses and in this sample most are Positive Responders. We suggest ways forward for policy-makers to support smaller firms in complying with occupational health and safety regulation.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
Resumo:
Protection of passwords used to authenticate computer systems and networks is one of the most important application of cryptographic hash functions. Due to the application of precomputed memory look up attacks such as birthday and dictionary attacks on the hash values of passwords to find passwords, it is usually recommended to apply hash function to the combination of both the salt and password, denoted salt||password, to prevent these attacks. In this paper, we present the first security analysis of salt||password hashing application. We show that when hash functions based on the compression functions with easily found fixed points are used to compute the salt||password hashes, these hashes are susceptible to precomputed offline birthday attacks. For example, this attack is applicable to the salt||password hashes computed using the standard hash functions such as MD5, SHA-1, SHA-256 and SHA-512 that are based on the popular Davies-Meyer compression function. This attack exposes a subtle property of this application that although the provision of salt prevents an attacker from finding passwords, salts prefixed to the passwords do not prevent an attacker from doing a precomputed birthday attack to forge an unknown password. In this forgery attack, we demonstrate the possibility of building multiple passwords for an unknown password for the same hash value and salt. Interestingly, password||salt (i.e. salts suffixed to the passwords) hashes computed using Davies-Meyer hash functions are not susceptible to this attack, showing the first security gap between the prefix-salt and suffix-salt methods of hashing passwords.
Resumo:
Biphasic vasodilatory responses to adenosine and 5'-N-ethylcarboxamidoadenosine (NECA) were observed in the coronary vasculature of K(+)-arrested perfused rat hearts. Dose-response data for both agonists were best represented by two-site models. For adenosine, two sites with negative log ED50 (pED50) values of 8.1 +/- 0.1 (mean +/- S.E.M) and 5.2 +/- 0.1 were obtained, mediating 31 +/- 2% and 69 +/- 2% of the total response. In the presence of 8-phenyltheophylline, the vasodilatory response to adenosine remained best fitted to a two-site model with pED50 values of 7.0 +/- 0.2 and 5.4 +/- 0.2. The relative contribution of each site to the total response remained unchanged. For NECA, pED50 values of 9.6 +/- 0.1 and 6.8 +/- 0.2 were obtained, representing 48 +/- 3% and 52 +/- 3% of the sites, respectively. In contrast, ATP produced a monophasic response with a pED50 value of 8.8 +/- 0.1. These results provide evidence of adenosine receptor and response heterogeneity in the in situ coronary vasculature.
Resumo:
Exogenous adenosine causes a monophasic dilation of the coronary vessels in paced, perfused rat heart preparations. Because levels of endogenous adenosine in paced hearts may mask the presence of high potency adenosine receptors, we have developed a method to measure coronary vascular responses in a potassium-arrested heart. Hearts from adult male, Wistar rats were perfused at a constant flow rate of 10 mL/min in the nonrecirculating, Langendorff mode, using Krebs-Henseleit buffer. After 30 min, coronary perfusion pressure was 44 +/- 1 mmHg (mean +/- SEM). Hearts were then perfused with a modified Krebs-Henseleit buffer containing 35 mM potassium. Coronary perfusion pressure increased by 84 +/- 3 mmHg. Adenosine-induced reductions in coronary perfusion pressure were expressed as a percentage of the maximal increase in pressure produced by modified Krebs-Henseleit buffer from the equilibration level. A concentration-response curve for adenosine (n = 6) was biphasic and best described by the presence of two adenosine receptors, with negative log EC50 values of 8.8 +/- 0.3 and 4.3 +/- 0.1, representing 29 +/- 3 and 71 +/- 3%, respectively, of the observed response. Interstitial adenosine sampled by microdialysis during potassium arrest was 25% of the concentration found in paced hearts. Endogenous adenosine in nonarrested hearts may obscure the biphasic response of the coronary vessels to adenosine.
Resumo:
The hemodynamic response function (HRF) describes the local response of brain vasculature to functional activation. Accurate HRF modeling enables the investigation of cerebral blood flow regulation and improves our ability to interpret fMRI results. Block designs have been used extensively as fMRI paradigms because detection power is maximized; however, block designs are not optimal for HRF parameter estimation. Here we assessed the utility of block design fMRI data for HRF modeling. The trueness (relative deviation), precision (relative uncertainty), and identifiability (goodness-of-fit) of different HRF models were examined and test-retest reproducibility of HRF parameter estimates was assessed using computer simulations and fMRI data from 82 healthy young adult twins acquired on two occasions 3 to 4 months apart. The effects of systematically varying attributes of the block design paradigm were also examined. In our comparison of five HRF models, the model comprising the sum of two gamma functions with six free parameters had greatest parameter accuracy and identifiability. Hemodynamic response function height and time to peak were highly reproducible between studies and width was moderately reproducible but the reproducibility of onset time was low. This study established the feasibility and test-retest reliability of estimating HRF parameters using data from block design fMRI studies.
Resumo:
Blasting is an integral part of large-scale open cut mining that often occurs in close proximity to population centers and often results in the emission of particulate material and gases potentially hazardous to health. Current air quality monitoring methods rely on limited numbers of fixed sampling locations to validate a complex fluid environment and collect sufficient data to confirm model effectiveness. This paper describes the development of a methodology to address the need of a more precise approach that is capable of characterizing blasting plumes in near-real time. The integration of the system required the modification and integration of an opto-electrical dust sensor, SHARP GP2Y10, into a small fixed-wing and multi-rotor copter, resulting in the collection of data streamed during flight. The paper also describes the calibration of the optical sensor with an industry grade dust-monitoring device, Dusttrak 8520, demonstrating a high correlation between them, with correlation coefficients (R2) greater than 0.9. The laboratory and field tests demonstrate the feasibility of coupling the sensor with the UAVs. However, further work must be done in the areas of sensor selection and calibration as well as flight planning.
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving—a form of self-enforcement—and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer; we show an additional application of these new extractable trapdoor functions to standard digital signatures.
Resumo:
Context: Identifying susceptibility genes for schizophrenia may be complicated by phenotypic heterogeneity, with some evidence suggesting that phenotypic heterogeneity reflects genetic heterogeneity. Objective: To evaluate the heritability and conduct genetic linkage analyses of empirically derived, clinically homogeneous schizophrenia subtypes. Design: Latent class and linkage analysis. Setting: Taiwanese field research centers. Participants: The latent class analysis included 1236 Han Chinese individuals with DSM-IV schizophrenia. These individuals were members of a large affected-sibling-pair sample of schizophrenia (606 ascertained families), original linkage analyses of which detected a maximum logarithm of odds (LOD) of 1.8 (z = 2.88) on chromosome 10q22.3. Main Outcome Measures: Multipoint exponential LOD scores by latent class assignment and parametric heterogeneity LOD scores. Results: Latent class analyses identified 4 classes, with 2 demonstrating familial aggregation. The first (LC2) described a group with severe negative symptoms, disorganization, and pronounced functional impairment, resembling “deficit schizophrenia.” The second (LC3) described a group with minimal functional impairment, mild or absent negative symptoms, and low disorganization. Using the negative/deficit subtype, we detected genome-wide significant linkage to 1q23-25 (LOD = 3.78, empiric genome-wide P = .01). This region was not detected using the DSM-IV schizophrenia diagnosis, but has been strongly implicated in schizophrenia pathogenesis by previous linkage and association studies.Variants in the 1q region may specifically increase risk for a negative/deficit schizophrenia subtype. Alternatively, these results may reflect increased familiality/heritability of the negative class, the presence of multiple 1q schizophrenia risk genes, or a pleiotropic 1q risk locus or loci, with stronger genotype-phenotype correlation with negative/deficit symptoms. Using the second familial latent class, we identified nominally significant linkage to the original 10q peak region. Conclusion: Genetic analyses of heritable, homogeneous phenotypes may improve the power of linkage and association studies of schizophrenia and thus have relevance to the design and analysis of genome-wide association studies.
Resumo:
This study explored pre-service secondary science teachers’ perceptions of classroom emotional climate in the context of the Bhutanese macro-social policy of Gross National Happiness. Drawing upon sociological perspectives of human emotions and using Interaction Ritual Theory this study investigated how pre-service science teachers may be supported in their professional development. It was a multi-method study involving video and audio recordings of teaching episodes supported by interviews and the researcher’s diary. Students also registered their perceptions of the emotional climate of their classroom at 3-minute intervals using audience response technology. In this way, emotional events were identified for video analysis. The findings of this study highlighted that the activities pre-service teachers engaged in matter to them. Positive emotional climate was identified in activities involving students’ presentations using video clips and models, coteaching, and interactive whole class discussions. Decreases in emotional climate were identified during formal lectures and when unprepared presenters led presentations. Emotions such as frustration and disappointment characterized classes with negative emotional climate. The enabling conditions to sustain a positive emotional climate are identified. Implications for sustaining macro-social policy about Gross National Happiness are considered in light of the climate that develops in science teacher education classes.