308 resultados para Simpson, Ron


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the era of Web 2.0, huge volumes of consumer reviews are posted to the Internet every day. Manual approaches to detecting and analyzing fake reviews (i.e., spam) are not practical due to the problem of information overload. However, the design and development of automated methods of detecting fake reviews is a challenging research problem. The main reason is that fake reviews are specifically composed to mislead readers, so they may appear the same as legitimate reviews (i.e., ham). As a result, discriminatory features that would enable individual reviews to be classified as spam or ham may not be available. Guided by the design science research methodology, the main contribution of this study is the design and instantiation of novel computational models for detecting fake reviews. In particular, a novel text mining model is developed and integrated into a semantic language model for the detection of untruthful reviews. The models are then evaluated based on a real-world dataset collected from amazon.com. The results of our experiments confirm that the proposed models outperform other well-known baseline models in detecting fake reviews. To the best of our knowledge, the work discussed in this article represents the first successful attempt to apply text mining methods and semantic language models to the detection of fake consumer reviews. A managerial implication of our research is that firms can apply our design artifacts to monitor online consumer reviews to develop effective marketing or product design strategies based on genuine consumer feedback posted to the Internet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

At St Thomas' Hospital, we have developed a computer program on a Titan graphics supercomputer to plan the stereotactic implantation of iodine-125 seeds for the palliative treatment of recurrent malignant gliomas. Use of the Gill-Thomas-Cosman relocatable frame allows planning and surgery to be carried out at different hospitals on different days. Stereotactic computed tomography (CT) and positron emission tomography (PET) scans are performed and the images transferred to the planning computer. The head, tumour and frame fiducials are outlined on the relevant images, and a three-dimensional model generated. Structures which could interfere with the surgery or radiotherapy, such as major vessels, shunt tubing etc., can also be outlined and included in the display. Catheter target and entry points are set using a three-dimensional cursor controlled by a set of dials attached to the computer. The program calculates and displays the radiation dose distribution within the target volume for various catheter and seed arrangements. The CT co-ordinates of the fiducial rods are used to convert catheter co-ordinates from CT space to frame space and to calculate the catheter insertion angles and depths. The surgically implanted catheters are after-loaded the next day and the seeds left in place for between 4 and 6 days, giving a nominal dose of 50 Gy to the edge of the target volume. 25 patients have been treated so far.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The concept of local accumulation time (LAT) was introduced by Berezhkovskii and coworkers in 2010–2011 to give a finite measure of the time required for the transient solution of a reaction–diffusion equation to approach the steady–state solution (Biophys J. 99, L59 (2010); Phys Rev E. 83, 051906 (2011)). Such a measure is referred to as a critical time. Here, we show that LAT is, in fact, identical to the concept of mean action time (MAT) that was first introduced by McNabb in 1991 (IMA J Appl Math. 47, 193 (1991)). Although McNabb’s initial argument was motivated by considering the mean particle lifetime (MPLT) for a linear death process, he applied the ideas to study diffusion. We extend the work of these authors by deriving expressions for the MAT for a general one–dimensional linear advection–diffusion–reaction problem. Using a combination of continuum and discrete approaches, we show that MAT and MPLT are equivalent for certain uniform–to-uniform transitions; these results provide a practical interpretation for MAT, by directly linking the stochastic microscopic processes to a meaningful macroscopic timescale. We find that for more general transitions, the equivalence between MAT and MPLT does not hold. Unlike other critical time definitions, we show that it is possible to evaluate the MAT without solving the underlying partial differential equation (pde). This makes MAT a simple and attractive quantity for practical situations. Finally, our work explores the accuracy of certain approximations derived using the MAT, showing that useful approximations for nonlinear kinetic processes can be obtained, again without treating the governing pde directly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Individual-based models describing the migration and proliferation of a population of cells frequently restrict the cells to a predefined lattice. An implicit assumption of this type of lattice based model is that a proliferative population will always eventually fill the lattice. Here we develop a new lattice-free individual-based model that incorporates cell-to-cell crowding effects. We also derive approximate mean-field descriptions for the lattice-free model in two special cases motivated by commonly used experimental setups. Lattice-free simulation results are compared to these mean-field descriptions and to a corresponding lattice-based model. Data from a proliferation experiment is used to estimate the parameters for the new model, including the cell proliferation rate, showing that the model fits the data well. An important aspect of the lattice-free model is that the confluent cell density is not predefined, as with lattice-based models, but an emergent model property. As a consequence of the more realistic, irregular configuration of cells in the lattice-free model, the population growth rate is much slower at high cell densities and the population cannot reach the same confluent density as an equivalent lattice-based model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Random walk models based on an exclusion process with contact effects are often used to represent collective migration where individual agents are affected by agent-to-agent adhesion. Traditional mean field representations of these processes take the form of a nonlinear diffusion equation which, for strong adhesion, does not predict the averaged discrete behavior. We propose an alternative suite of mean-field representations, showing that collective migration with strong adhesion can be accurately represented using a moment closure approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural components similar to the well-known Grain cipher and the LILI family of keystream generators. Mixer uses a 128-bit key and 64-bit IV to initialise a 217-bit internal state. The analysis is focused on the initialisation function of Mixer and shows that there exist multiple key-IV pairs which, after initialisation, produce the same initial state, and consequently will generate the same keystream. Furthermore, if the number of iterations of the state update function performed during initialisation is increased, then the number of distinct initial states that can be obtained decreases. It is also shown that there exist some distinct initial states which produce the same keystream, resulting in a further reduction of the effective key space

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2010 Berezhkovskii and coworkers introduced the concept of local accumulation time (LAT) as a finite measure of the time required for the transient solution of a reaction diffusion equation to effectively reach steady state(Biophys J. 99, L59 (2010); Phys Rev E. 83, 051906 (2011)). Berezhkovskii’s approach is a particular application of the concept of mean action time (MAT) that was introduced previously by McNabb (IMA J Appl Math. 47, 193 (1991)). Here, we generalize these previous results by presenting a framework to calculate the MAT, as well as the higher moments, which we call the moments of action. The second moment is the variance of action time; the third moment is related to the skew of action time, and so on. We consider a general transition from some initial condition to an associated steady state for a one–dimensional linear advection–diffusion–reaction partial differential equation(PDE). Our results indicate that it is possible to solve for the moments of action exactly without requiring the transient solution of the PDE. We present specific examples that highlight potential weaknesses of previous studies that have considered the MAT alone without considering higher moments. Finally, we also provide a meaningful interpretation of the moments of action by presenting simulation results from a discrete random walk model together with some analysis of the particle lifetime distribution. This work shows that the moments of action are identical to the moments of the particle lifetime distribution for certain transitions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider a hybrid model, created by coupling a continuum and an agent-based model of infectious disease. The framework of the hybrid model provides a mechanism to study the spread of infection at both the individual and population levels. This approach captures the stochastic spatial heterogeneity at the individual level, which is directly related to deterministic population level properties. This facilitates the study of spatial aspects of the epidemic process. A spatial analysis, involving counting the number of infectious agents in equally sized bins, reveals when the spatial domain is nonhomogeneous.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Models of cell invasion incorporating directed cell movement up a gradient of an external substance and carrying capacity-limited proliferation give rise to travelling wave solutions. Travelling wave profiles with various shapes, including smooth monotonically decreasing, shock-fronted monotonically decreasing and shock-fronted nonmonotone shapes, have been reported previously in the literature. The existence of tacticallydriven shock-fronted nonmonotone travelling wave solutions is analysed for the first time. We develop a necessary condition for nonmonotone shock-fronted solutions. This condition shows that some of the previously reported shock-fronted nonmonotone solutions are genuine while others are a consequence of numerical error. Our results demonstrate that, for certain conditions, travelling wave solutions can be either smooth and monotone, smooth and nonmonotone or discontinuous and nonmonotone. These different shapes correspond to different invasion speeds. A necessary and sufficient condition for the travelling wave with minimum wave speed to be nonmonotone is presented. Several common forms of the tactic sensitivity function have the potential to satisfy the newly developed condition for nonmonotone shock-fronted solutions developed in this work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Context: Postprandial dysmetabolism is emerging as an important cardiovascular risk factor. Augmentation index (AIx) is a measure of systemic arterial stiffness and independently predicts cardiovascular outcome. Objective: The objective of this study was to assess the effect of a standardized high-fat meal on metabolic parameters and AIx in 1) lean, 2) obese nondiabetic, and 3) subjects with type 2 diabetes mellitus (T2DM). Design and Setting: Male subjects (lean, n = 8; obese, n = 10; and T2DM, n = 10) were studied for 6 h after a high-fat meal and water control. Glucose, insulin, triglycerides, and AIx (radial applanation tonometry) were measured serially to determine the incremental area under the curve (iAUC). Results: AIx decreased in all three groups after a high-fat meal. A greater overall postprandial reduction in AIx was seen in lean and T2DM compared with obese subjects (iAUC, 2251 +/- 1204, 2764 +/- 1102, and 1187 +/- 429% . min, respectively; P < 0.05). The time to return to baseline AIx was significantly delayed in subjects with T2DM (297 +/- 68 min) compared with lean subjects (161 +/- 88 min; P < 0.05). There was a significant correlation between iAUC AIx and iAUC triglycerides (r = 0.50; P < 0.05). Conclusions: Obesity is associated with an attenuated overall postprandial decrease in AIx. Subjects with T2DM have a preserved, but significantly prolonged, reduction in AIx after a high-fat meal. The correlation between AIx and triglycerides suggests that postprandial dysmetabolism may impact on vascular dynamics. The markedly different response observed in the obese subjects compared with those with T2DM was unexpected and warrants additional evaluation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a keystream generator for a binary additive synchronous stream cipher. It was selected in the final portfolio for the Profile 2 category of the eSTREAM project. The keystream generator is constructed using bit- based shift registers. In this paper we present an alternate representation of Trivium using word-based shift registers, with a word size of three bits. This representation is useful for determining cycles of internal state values. Under this representation it is clear that the state space can be partitioned into subspaces and that over some of these subspaces the state update function is effectively linear. The role of the initialization process is critical in ensuring the states used for generating keystream are updated nonlinearly at some point, as the state update function alone does not provide this.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cell invasion involves a population of cells that migrate along a substrate and proliferate to a carrying capacity density. These two processes, combined, lead to invasion fronts that move into unoccupied tissues. Traditional modelling approaches based on reaction–diffusion equations cannot incorporate individual–level observations of cell velocity, as information propagates with infinite velocity according to these parabolic models. In contrast, velocity jump processes allow us to explicitly incorporate individual–level observations of cell velocity, thus providing an alternative framework for modelling cell invasion. Here, we introduce proliferation into a standard velocity–jump process and show that the standard model does not support invasion fronts. Instead, we find that crowding effects must be explicitly incorporated into a proliferative velocity–jump process before invasion fronts can be observed. Our observations are supported by numerical and analytical solutions of a novel coupled system of partial differential equations, including travelling wave solutions, and associated random walk simulations.