988 resultados para Prove a fatica


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work of Gilles Deleuze has influenced an increasing number of music scholars and practicing musicians, particularly those interested in experimental, electronic and popular music. This is despite the notoriously complex nature of his writings, and the specialised theoretical vocabulary that he employs. This thesis both demystifies some of the key terms and concepts of this vocabulary, before demonstrating how Deleuze’s ideas may be put to work in new and fruitful ways; this is achieved with specific reference to the relationships that music has with thought, time and machines. In Chapter 1, Deleuze’s understanding of the power of thought is examined, in particular his approach to communication, transcendence and immanence, and the “powers of thought.” Each of these concepts helps us to understand Deleuze’s work within broad problem of how to think about music immanently: that is, how to maintain that thought and music are both immanent aspects of life and experience. Chapter 2 examines time within a Deleuzian framework, linking his work on cinema with the concept of the “refrain”; both of these areas prove crucial to his understanding of music, as seen in Deleuze’s approach to the work of Varese, Messiaen, and Boulez. In addition, Deleuze’s understanding of time proves fruitful in examining various aspects of music production, as seen in contemporary electronic dance music. Finally, Chapter 3 looks at the concept of the machine, as developed by Deleuze and Guattari, with reference to the sorts of “machinic” connections that a Deleuzian approach encourages us to seek out in music. Once again, examples from contemporary electronic music are presented, in relation to the notions of becoming and subjectivity. Throughout these chapters, Deleuze’s broad understanding of philosophy as the “creation of concepts” is deployed. This means introducing new ideas and specific types of music that encourage creative and novel engagements with the study of music.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the impact of differential trails for block ciphers on collision attacks for various hash function constructions based on block ciphers. Further, we prove the lower bound for finding a pair that follows some truncated differential in case of a random permutation. Then we present open-key differential distinguishers for some well known round-reduced block ciphers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In coastal areas, extreme weather events, such as floods and cyclones, can have debilitating effects on the social and economic viability of marine-based industries. In March 2011, the Great Barrier Reef Marine Park Authority implemented an Extreme Weather Response Program, following a period of intense flooding and cyclonic activity between December 2010 and February 2011. In this paper, we discuss the results of a project within the Program, which aimed to: (1) assess the impacts of extreme weather events on regional tourism and commercial fishing industries; and (2) develop and road-test an impact assessment matrix to improve government and industry responses to extreme weather events. Results revealed that extreme weather events both directly and indirectly affected all five of the measured categories, i.e. ecological, personal, social, infrastructure and economic components. The severity of these impacts, combined with their location and the nature of their business, influenced how tourism operators and fishers assessed the impact of the events (low, medium, high or extreme). The impact assessment tool was revised following feedback obtained during stakeholder workshops and may prove useful for managers in responding to potential direct and indirect impacts of future extreme weather events on affected marine industries. © 2013 Planning Institute Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A dynamic accumulator is an algorithm, which gathers together a large set of elements into a constant-size value such that for a given element accumulated, there is a witness confirming that the element was indeed included into the value, with a property that accumulated elements can be dynamically added and deleted into/from the original set such that the cost of an addition or deletion operation is independent of the number of accumulated elements. Although the first accumulator was presented ten years ago, there is still no standard formal definition of accumulators. In this paper, we generalize formal definitions for accumulators, formulate a security game for dynamic accumulators so-called Chosen Element Attack (CEA), and propose a new dynamic accumulator for batch updates based on the Paillier cryptosystem. Our construction makes a batch of update operations at unit cost. We prove its security under the extended strong RSA (es-RSA) assumption

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Guanxi has become a common term in the wider business environment and has attracted the increasing attention of researchers. Despite this, a consistent understanding of the concept continues to prove elusive. We review the extant business literature to highlight the major inconsistencies in the way guanxi is currently conceptualized: the breadth, linguistic-cultural depth, temporality, and level of analysis. We conclude with a clearer conceptualization of guanxi which separates the core elements from antecedents and consequences of guanxi. Furthermore, we compare and contrast guanxi with western correlates such as social networks and social capitals to further consolidate our understanding of guanxi.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Transcription factors (TFs) co-ordinately regulate target genes that are dispersed throughout the genome. This co-ordinate regulation is achieved, in part, through the interaction of transcription factors with conserved cis-regulatory motifs that are in close proximity to the target genes. While much is known about the families of transcription factors that regulate gene expression in plants, there are few well characterised cis-regulatory motifs. In Arabidopsis, over-expression of the MYB transcription factor PAP1 (PRODUCTION OF ANTHOCYANIN PIGMENT 1) leads to transgenic plants with elevated anthocyanin levels due to the co-ordinated up-regulation of genes in the anthocyanin biosynthetic pathway. In addition to the anthocyanin biosynthetic genes, there are a number of un-associated genes that also change in expression level. This may be a direct or indirect consequence of the over-expression of PAP1. Results Oligo array analysis of PAP1 over-expression Arabidopsis plants identified genes co-ordinately up-regulated in response to the elevated expression of this transcription factor. Transient assays on the promoter regions of 33 of these up-regulated genes identified eight promoter fragments that were transactivated by PAP1. Bioinformatic analysis on these promoters revealed a common cis-regulatory motif that we showed is required for PAP1 dependent transactivation. Conclusion Co-ordinated gene regulation by individual transcription factors is a complex collection of both direct and indirect effects. Transient transactivation assays provide a rapid method to identify direct target genes from indirect target genes. Bioinformatic analysis of the promoters of these direct target genes is able to locate motifs that are common to this sub-set of promoters, which is impossible to identify with the larger set of direct and indirect target genes. While this type of analysis does not prove a direct interaction between protein and DNA, it does provide a tool to characterise cis-regulatory sequences that are necessary for transcription activation in a complex list of co-ordinately regulated genes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Radiographer abnormality detection systems that highlight abnormalities on trauma radiographs (‘red dot’ system) have been operating for more than 30 years. Recently, a number of pitfalls have been identified. These limitations initiated the evolution of a radiographer commenting system, whereby a radiographer provides a brief description of abnormalities identified in emergency healthcare settings. This study investigated radiographers' participation in abnormality detection systems, their perceptions of benefits, barriers and enablers to radiographer commenting, and perceptions of potential radiographer image interpretation services for emergency settings. Methods A cross-sectional survey was implemented. Participants included radiographers from four metropolitan hospitals in Queensland, Australia. Conventional descriptive statistics, histograms and thematic analysis were undertaken. Results Seventy-three surveys were completed and included in the analysis (68% response rate); 30 (41%) of respondents reported participating in abnormality detection in 20% or less of examinations, and 26(36%) reported participating in 80% or more of examinations. Five overarching perceived benefits of radiographer commenting were identified: assisting multidisciplinary teams, patient care, radiographer ability, professional benefits and quality of imaging. Frequently reported perceived barriers included ‘difficulty accessing image interpretation education’, ‘lack of time’ and ‘low confidence in interpreting radiographs’. Perceived enablers included ‘access to image interpretation education’ and ‘support from radiologist colleagues’. Conclusions A range of factors are likely to contribute to the successful implementation of radiographer commenting in addition to abnormality detection in emergency settings. Effective image interpretation education amenable to completion by radiographers would likely prove valuable in preparing radiographers for participation in abnormality detection and commenting systems in emergency settings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Kaposi's sarcoma (KS) in general, and acquired immunodeficiency syndrome-related KS (AIDS-KS) in particular, is a highly invasive and intensely angiogenic neoplasm of unknown cellular origin. We have recently established AIDS-KS cells in long term culture and reported the development of KS-like lesions in nude mice inoculated with these cells. Here, we have examined the in vitro invasiveness of basement membrane by AIDS-KS cells, as well as the effect(s) of their supernatants on the migration and invasiveness of human vascular endothelial cells. AIDS-KS cells were highly invasive in the Boyden chamber invasion assay and formed invasive, branching colonies in a 3-dimensional gel (Matrigel). Normal endothelial cells form tube-like structures on Matrigel. AIDS-KS cell-conditioned media induced endothelial cells to form invasive clusters in addition to tubes. KS-cell-conditioned media, when placed in the lower compartment of the Boyden chamber, stimulated the migration of human and bovine vascular endothelial cells across filters coated with either small amounts of collagen IV (chemotaxis) or a Matrigel barrier (invasion). Basic fibroblast growth factor could also induce endothelial cell chemotaxis and invasion in these assays. However, when antibodies to basic fibroblast growth factor were used the invasive activity induced by the AIDS-KS-cell-conditioned media was only marginally inhibited, suggesting that the large quantities of basic fibroblast growth factor-like material released by the AIDS-KS cells are not the main mediators of this effect. Specific inhibitors of laminin and collagenase IV action, which represent critical determinants of basement membrane invasion, blocked the invasiveness of the AIDS-KS cell-activated endothelial cells in these assays. These data indicate that KS cells appear to be of smooth muscle origin but secrete a potent inducer of endothelial cell chemotaxis and invasiveness which could be responsible for angiogenesis and the resulting highly vascularized lesions. These assays appear to be a model to study the invasive spread and angiogenic capacity of human AIDS-related KS and should prove useful in the identification of molecular mediators and potential inhibitors of neoplastic neovascularization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We have investigated the gelatinase profiles and invasiveness of clonal tumour sublines derived from a spontaneously arising mammary tumour in a Balb/cfC3H mouse. The 67NR, 66c14 and 4T1.2 sublines have low, intermediate and high metastatic potential respectively. In Boyden chamber studies, Matrigel invasion was seen to be progressively higher in the more metastatic lines 4T1.2>66c14>67NR, consistent with MMP-2 activation potential, MMP-9 secretion, and migration over either type I or IV collagen, which were low in both 67NR and 66c14 cells compared to 4T1.2 cells. These attributes are consistent with those seen in human breast cancer cell lines which appear to have undergone an epithelial-mesenchymal transition (EMT) as indicated by vimentin expression. We were, however, surprised to find vimentin expression, MT1-MMP expression and stellate Matrigel outgrowth in the non-invasive, non-metastatic 67NR cells, indicating that they had undergone an EMT despite not being invasive. We conclude that the EMT is manifested to differing degrees in these three clonal cell lines, and that the 67NR cells have either undergone a partial EMT or have since lost certain important attributes of the EMT-derived phenotype. This model should prove useful in further characterizing the regulation of MT1-MMP mediated MMP-2 activation and delineating the EMT in breast cancer progression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current stocks of the LCC15-MB cell line, which we originally isolated from a human breast-bone metastasis, were found to be genetically matched to the MDA-MB-435 cell line from the Lombardi Cancer Center (MDA-MB-435-LCC) using comparative genomic hybridisation, DNA microsatellite analysis and chromosomal number. LCC15-MB stocks used for our previously published studies as well as the earliest available LCC15-MB cells also showed identity to MDA-MB-435-LCC cells. The original karyotype reported for LCC15-MB cells was considerably different to that of MDA-MB-435 cells, indicating that the original LCC15-MB cells were lost to contamination by MDA-MB-435-LCC cells. Chromosome number is the simplest test to distinguish original LCC 15-MB cells (n ∼ 75) from MDA-MB-435 (n ∼ 52). Collectively, our results prove that LCC15-MB cells currently available are MDA-MB-435 cells and we suggest their re-designation as MDA-MB-435-LCC15 cells. We also review the known misclassification of breast and prostate cancer cell lines to date and have initiated a register maintained at http://www.svi.edu.au/cell_lines_registry.doc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We report on the use of the hydrogen bond acceptor properties of some phosphorus-containing functional groups for the assembly of a series of [2]rotaxanes. Phosphinamides, and the homologous thio– and selenophosphinamides, act as hydrogen bond acceptors that, in conjunction with an appropriately positioned amide group on the thread, direct the assembly of amide-based macrocycles around the axle to form rotaxanes in up to 60% yields. Employing solely phosphorus-based functional groups as the hydrogen bond accepting groups on the thread, a bis(phosphinamide) template and a phosphine oxide-phosphinamide template afforded the corresponding rotaxanes in 18 and 15 % yields, respectively. X-Ray crystallography of the rotaxanes shows the presence of up to four intercomponent hydrogen bonds between the amide groups of the macrocycle and various hydrogen bond accepting groups on the thread, including rare examples of amide-to-phosphonamide, -thiophosphinamide and -selenophosphinamide groups. With a phosphine oxide-phosphinamide thread, the solid state structure of the rotaxane is remarkable, featuring no direct intercomponent hydrogen bonds but rather a hydrogen bond network involving water molecules that bridge the H-bonding groups of the macrocycle and thread through bifurcated hydrogen bonds. The incorporation of phosphorus-based functional groups into rotaxanes may prove useful for the development of molecular shuttles in which the macrocycle can be used to hinder or expose binding ligating sites for metal-based catalysts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The life history strategies of massive Porites corals make them a valuable resource not only as key providers of reef structure, but also as recorders of past environmental change. Yet recent documented evidence of an unprecedented increase in the frequency of mortality in Porites warrants investigation into the history of mortality and associated drivers. To achieve this, both an accurate chronology and an understanding of the life history strategies of Porites are necessary. Sixty-two individual Uranium–Thorium (U–Th) dates from 50 dead massive Porites colonies from the central inshore region of the Great Barrier Reef (GBR) revealed the timing of mortality to have occurred predominantly over two main periods from 1989.2 ± 4.1 to 2001.4 ± 4.1, and from 2006.4 ± 1.8 to 2008.4 ± 2.2 A.D., with a small number of colonies dating earlier. Overall, the peak ages of mortality are significantly correlated with maximum sea-surface temperature anomalies. Despite potential sampling bias, the frequency of mortality increased dramatically post-1980. These observations are similar to the results reported for the Southern South China Sea. High resolution measurements of Sr/Ca and Mg/Ca obtained from a well preserved sample that died in 1994.6 ± 2.3 revealed that the time of death occurred at the peak of sea surface temperatures (SST) during the austral summer. In contrast, Sr/Ca and Mg/Ca analysis in two colonies dated to 2006.9 ± 3.0 and 2008.3 ± 2.0, suggest that both died after the austral winter. An increase in Sr/Ca ratios and the presence of low Mg-calcite cements (as determined by SEM and elemental ratio analysis) in one of the colonies was attributed to stressful conditions that may have persisted for some time prior to mortality. For both colonies, however, the timing of mortality coincides with the 4th and 6th largest flood events reported for the Burdekin River in the past 60 years, implying that factors associated with terrestrial runoff may have been responsible for mortality. Our results show that a combination of U–Th and elemental ratio geochemistry can potentially be used to precisely and accurately determine the timing and season of mortality in modern massive Porites corals. For reefs where long-term monitoring data are absent, the ability to reconstruct historical events in coral communities may prove useful to reef managers by providing some baseline knowledge on disturbance history and associated drivers.