923 resultados para algebraic attacks
Resumo:
It is proved the algebraic equality between Jennrich's (1970) asymptotic$X^2$ test for equality of correlation matrices, and a Wald test statisticderived from Neudecker and Wesselman's (1990) expression of theasymptoticvariance matrix of the sample correlation matrix.
Resumo:
Economists have recently turned their attention to the effects of terrorism. One much debated effect of terrorist attacks is its impact on the results of democratic elections. We use the electoral consequences of the terrorist attacks of the 11-M in Madrid to analyze this issue. We consider this particular experiment since the attack took place only three days before the 2004 Congressional Election, which allows the use of credible identification criteria. In particular, we use the advance voting by Spanish residents abroad, who cast their vote before the terrorist attack, to identify the effect of the bombing. We exploit this macabre natural experiment to run a difference-in-differences estimation using data on three consecutive Congressional elections. Our empirical results indicate that a terrorist attack can have a large impact on the outcome of democratic elections.
Resumo:
Hereditary angioedema is a disease which develops as a result of a deficiency or dysfonction of C1-inhibitor, a key regulator of the complement, coagulation and contact cascades, resulting among others in excessive release of bradykinin. This disease mortality rate is high in absence of immediate and effective treatment, in particular in presence of acute attacks of the upper respiratory tract (laryngeal edema). Until now only administration of a purified C1-inhibitor extract was effective against these symptoms. This paper aims to synthesise essentials knowledge concerning news drugs, in particular icatibant, a selective bradykinin B2- receptor antagonist whose use should be widened to the treatment of angioedema with ACE-inhibitors intolerance.
Resumo:
This paper focuses on the connection between the Brauer group and the 0-cycles of an algebraic variety. We give an alternative construction of the second l-adic Abel-Jacobi map for such cycles, linked to the algebraic geometry of Severi-Brauer varieties on X. This allows us then to relate this Abel-Jacobi map to the standard pairing between 0-cycles and Brauer groups (see [M], [L]), completing results from [M] in this direction. Second, for surfaces, it allows us to present this map according to the more geometrical approach devised by M. Green in the framework of (arithmetic) mixed Hodge structures (see [G]). Needless to say, this paper owes much to the work of U. Jannsen and, especially, to his recently published older letter [J4] to B. Gross.
Resumo:
In this note we describe the intersection of all quadric hypersur- faces containing a given linearly normal smooth projective curve of genus n and degree 2n + 1
Resumo:
The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint sensor when confronted with fake fingerprints. The study has not been focused on the decision outcome of the biometric device, but essentially on the scores obtained following the comparison between a query (genuine or fake) and a template using an AFIS system. To do this, fake fingerprints of 12 subjects have been produced with and without their cooperation. These fake fingerprints have been used alongside with real fingers. The study led to three major observations: First, genuine fingerprints produced scores higher than fake fingers (translating a closer proximity) and this tendency is observed considering each subject separately. Second, scores are however not sufficient as a single measure to differentiate these samples (fake from genuine) given the variation due to the donors themselves. That explains why fingerprint readers without vitality detection can be fooled. Third, production methods and subjects greatly influence the scores obtained for fake fingerprints.
Resumo:
Computer simulations of a colloidal particle suspended in a fluid confined by rigid walls show that, at long times, the velocity correlation function decays with a negative algebraic tail. The exponent depends on the confining geometry, rather than the spatial dimensionality. We can account for the tail by using a simple mode-coupling theory which exploits the fact that the sound wave generated by a moving particle becomes diffusive.
Resumo:
Background: Familial Hemiplegic Migraine (FHM), characterized by a prolonged unilateral hemiparesis, mainly results from mutations in the alpha-1a subunit of the calcium channel gene CACNA1A that can also cause two other dominantly inherited neurological disorders, Episodic Ataxia type 2 (EA2, with sometimes migrainous headaches) and Spinocerebellar Ataxia type 6 (SCA6, late-onset and progressive). A same mutation can have different clinical expression in a family (hemiplegic migraine, migraine-coma, cerebellar ataxia). CACNA1A mutations in FHM are usually missense, leading to gain-of-function, while truncating mutations leading to loss-of-function are usually associated with EA2. Case report: This 9-year-old girl was seen as a baby for hypotonia and transient vertical nystagmus. Her first brain MRI was normal. She evolved as a congenital ataxia, but since the age of two, she had attacks of coma, hemiparesis (either side), partial seizures, dystonic movements and fever. Attacks were initially triggered by minor head bumps, subsequently spontaneous. Brain MRIs in the acute stage always showed transient unilateral hemisphere swelling. Follow-up images revealed atrophic lesions in the temporo-occipital regions and cerebellar atrophy. A prophylactic trial with flunarizine was ineffective. Acetazolamide was recently introduced. Methods: Since our patient shared features of both FHM and EA2, we studied the CACNA1A gene by direct sequencing in the patient's and parents' DNA. Results: We identified an unreported de novo heterozygous deletion of three base pairs (c.4503_4505delCTT) predicting the deletion of one amino acid (p.Phe1502del). The CACNA1A protein contains 4 domains, each formed by six transmembrane segments. The deletion is located in a highly conserved region in segment 6 (S6) of the third domain. Mutations in S6 segments of calcium channels change single-channel conductance and channel selectivity, most resulting in loss-of-function. Outlook: In vitro expression studies of the identified mutation are underway, aiming at understanding its functional consequences and finding an efficient treatment.
Resumo:
The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint sensor when confronted with fake fingerprints. The study has not been focused on the decision outcome of the biometric device, but essentially on the scores obtained following the comparison between a query (genuine or fake) and a template using an AFIS system. To do this, fake fingerprints of 12 subjects have been produced with and without their cooperation. These fake fingerprints have been used alongside with real fingers. The study led to three major observations: First, genuine fingerprints produced scores higher than fake fingers (translating a closer proximity) and this tendency is observed considering each subject separately. Second, scores are however not sufficient as a single measure to differentiate these samples (fake from genuine) given the variation due to the donors themselves. That explains why fingerprint readers without vitality detection can be fooled. Third, production methods and subjects greatly influence the scores obtained for fake fingerprints.
Resumo:
Contingut del Pòster presentat al congrés New Trends in Dynamical Systems
Resumo:
Computer simulations of the dynamics of a colloidal particle suspended in a fluid confined by an interface show that the asymptotic decay of the velocity correlation functions is algebraic. The exponents of the long-time tails depend on the direction of motion of the particle relative to the surface, as well as on the specific nature of the boundary conditions. In particular, we find that for the angular velocity correlation function, the decay in the presence of a slip surface is faster than the one corresponding to a stick one. An intuitive picture is introduced to explain the various long-time tails, and the simulations are compared with theoretical expressions where available.
A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications
Resumo:
Peer-reviewed