24 resultados para Pitt, William, Earl of Chatham, 1708-1778
Resumo:
Objective: To assess the role of plasma total homocysteine (tHcy) concentrations and homozygosity for the thermolabile variant of the methylenetetrahydrofolate reductase (MTHFR) C677T gene as risk factors for retinal vascular occlusive disease.
Design: Retinal vein occlusion (RVO) is an important cause of vision loss. Early meta-analyses showed that tHcy was associated with an increased risk of RVO, but a significant number of new studies have been published. Participants and/or Controls: RVO patients and controls.
Methods: Data sources included MEDLINE, Web of Science, and PubMed searches and searching reference lists of relevant articles and reviews. Reviewers searched the databases, selected the studies, and then extracted data. Results were pooled quantitatively using meta-analytic methods.
Main Outcome Measures: tHcy concentrations and MTHFR genotype.
Results: There were 25 case-control studies for tHcy (1533 cases and 1708 controls) and 18 case-control studies for MTHFR (1082 cases and 4706 controls). The mean tHcy was on average 2.8 mol/L (95% confidence
interval [CI], 1.8 –3.7) greater in the RVO cases compared with controls, but there was evidence of between-study heterogeneity (P0.001, I2 93%). There was funnel plot asymmetry suggesting publication bias. There was no evidence of association between homozygosity for the MTHFR C677T genotype and RVO (odds ratio [OR] 1.20; 95% CI, 0.84–1.71), but again marked heterogeneity (P 0.004, I2 53%) was observed.
Conclusions: There was some evidence that elevated tHcy was associated with RVO, but not homozygosity for the MTHFR C677T genotype. Both analyses should be interpreted cautiously because of marked heterogeneity between the study estimates and possible effect of publication bias on the tHcy findings.
Financial Disclosure(s): The author(s) have no proprietary or commercial interest in any materials discussed in this article.
Resumo:
Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks, or more specifically as used here template attacks, have been shown to be extremely efficient at extracting secret keys. Template attacks assume a strong adversarial model, in that an attacker has an identical device with which to profile the power consumption of various operations. This can then be used to efficiently attack the target device. Inherent in this assumption is that the power consumption across the devices under test is somewhat similar. This central tenet of the attack is largely unexplored in the literature with the research community generally performing the profiling stage on the same device as being attacked. This is beneficial for evaluation or penetration testing as it is essentially the best case scenario for an attacker where the model built during the profiling stage matches exactly that of the target device, however it is not necessarily a reflection on how the attack will work in reality. In this work, a large scale evaluation of this assumption is performed, comparing the key recovery performance across 20 identical smart-cards when performing a profiling attack.
Resumo:
Law's Ethical, Global and Theoretical Contexts examines William Twining's principal contributions to law and jurisprudence in the context of three issues which will receive significant scholarly attention over the coming decades. Part I explores human rights, including torture, the role of evidence in human rights cases, the emerging discourse on 'traditional values', the relevance of 'Southern voices' to human rights debates, and the relationship between human rights and peace agreements. Part II assesses the impact of globalization through the lenses of sociology and comparative constitutionalism, and features an analysis of the development of pluralistic ideas of law in the context of privatization. Finally, Part III addresses issues of legal theory, including whether global legal pluralism needs a concept of law, the importance of context in legal interpretation, the effect of increasing digitalization on legal theory, and the utility of feminist and postmodern approaches to globalization and legal theory.