954 resultados para multi-factor authentication
Resumo:
Background There are few data regarding the effectiveness of remote monitoring for older people with heart failure. We conducted a post-hoc sub-analysis of a previously published large Cochrane systematic review and meta-analysis of relevant randomized controlled trials to determine whether structured telephone support and telemonitoring were effective in this population. Methods A post hoc sub-analysis of a systematic review and meta-analysis that applied the Cochrane methodology was conducted. Meta-analyses of all-cause mortality, all-cause hospitalizations and heart failure-related hospitalizations were performed for studies where the mean or median age of participants was 70 or more years. Results The mean or median age of participants was 70 or more years in eight of the 16 (n=2,659/5,613; 47%) structured telephone support studies and four of the 11 (n=894/2,710; 33%) telemonitoring studies. Structured telephone support (RR 0.80; 95% CI=0.63-1.00) and telemonitoring (RR 0.56; 95% CI=0.41-0.76) interventions reduced mortality. Structured telephone support interventions reduced heart failure-related hospitalizations (RR 0.81; 95% CI=0.67-0.99). Conclusion Despite a systematic bias towards recruitment of individuals younger than the epidemiological average into the randomized controlled trials, older people with heart failure did benefit from structured telephone support and telemonitoring. These post-hoc sub-analysis results were similar to overall effects observed in the main meta-analysis. While further research is required to confirm these observational findings, the evidence at hand indicates that discrimination by age alone may be not be appropriate when inviting participation in a remote monitoring service for heart failure.
Resumo:
Rail steel bridges are vulnerable to high impact forces due to the passage of trains; unfortunately the determination of these transient impact forces is not straightforward as these are affected by a large number of parameters, including the wagon design, the wheel-rail contact and the design parameters of the bridge deck and track, as well as the operational parameters – wheel load and speed. To determine these impact forces, a detailed rail train-track/bridge dynamic interaction model has been developed, which includes a comprehensive train model using multi-body dynamics approach and a flexible track/bridge model using Euler– Bernoulli beam theory. Single and multi-span bridges have been modelled to examine their dynamic characteristics. From the single span bridge, the train critical speed is determined; the minimum distance of two peak loadings is found to affect the train critical speed. The impact factor and the dynamic characteristics are discussed.
Resumo:
The purpose of this paper is to introduce the concept of hydraulic damage and its numerical integration. Unlike the common phenomenological continuum damage mechanics approaches, the procedure introduced in this paper relies on mature concepts of homogenization, linear fracture mechanics, and thermodynamics. The model is applied to the problem of fault reactivation within resource reservoirs. The results show that propagation of weaknesses is highly driven by the contrasts of properties in porous media. In particular, it is affected by the fracture toughness of host rocks. Hydraulic damage is diffused when it takes place within extended geological units and localized at interfaces and faults.
Resumo:
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.
Resumo:
We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.
Resumo:
A number of observations have suggested that brain derived neurotrophic factor (BDNF) plays a role in migraine pathophysiology. This study investigates whether variants in the BDNF gene are associated with migraine in an Australian case-control population. Background. Brain derived neurotrophic factor (BDNF) has an important role in neural growth, development and survival in the central nervous system and is an important modulator of central and peripheral pain responses. Variants in BDNF, in particular the functional Val66Met polymorphism (rs6265), have been found to be associated with a number of psychiatric disorders, cognitive function and obesity. As BDNF has been found to be differentially expressed in a number of aspects related to migraine, we tested for association between single nucleotide polymorphisms (SNPs) in BDNF and migraine. Methods. Five SNPs in the BDNF locus (rs1519480, rs6265, rs712507, rs2049046 and rs12273363) were genotyped initially in a cohort of 277 migraine cases, including 172 diagnosed with migraine with aura (MA) and 105 with migraine without aura (MO), and 277 age- and sex-matched controls. Three of these SNPs (rs6265, rs2049046 and rs12273363) were subsequently genotyped in a second cohort of 580 migraineurs, including 473 diagnosed with MA and 105 with O, and 580 matched controls. Results. – BDNF SNPs rs1519480, rs6265, rs712507 and rs12273363 were not significantly associated with migraine. However, rs2049046 showed a significant association with migraine, and in particular, MA in the first cohort. In the second cohort, although an increase in the rs2049046 T-allele frequency was observed in migraine cases, and in both MA and MO subgroups, it was not significantly different from controls. Analysis of data combined from both cohorts for rs2049046 showed significant differences in the genotypic and allelic distributions for this marker in both migraine and the MA sub-group. Conclusion. This study confirmed previous studies that the functional BDNF SNP rs6265 (Val66Met) is not associated with migraine. However, we found that rs2049046, which resides at the 5’ end of 3 one the BDNF transcripts, may be associated with migraine, suggesting that further investigations of this SNP may be warranted.
Resumo:
We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
Heparan sulfate proteoglycans cooperate with basic fibroblast growth factor (bFGF/FGF2) signaling to control osteoblast growth and differentiation, as well as metabolic functions of osteoblasts. FGF2 signaling modulates the expression and activity of Runt-related transcription factor 2 (Runx2/Cbfa1), a key regulator of osteoblast proliferation and maturation. Here, we have characterized novel Runx2 target genes in osteoprogenitors under conditions that promote growth arrest while not yet permitting sustained phenotypic maturation. Runx2 enhances expression of genes related to proteoglycan-mediated signaling, including FGF receptors (e.g., FGFR2 and FGFR3) and proteoglycans (e.g., syndecans [Sdc1, Sdc2, Sdc3], glypicans [Gpc1], versican [Vcan]). Runx2 increases expression of the glycosyltransferase Exostosin-1 (Ext1) and heparanase, as well as alters the relative expression of N-linked sulfotransferases (Ndst1 = Ndst2 > Ndst3) and enzymes mediating O-linked sulfation of heparan sulfate (Hs2st > Hs6st) or chondroitin sulfate (Cs4st > Cs6st). Runx2 cooperates with FGF2 to induce expression of Sdc4 and the sulfatase Galns, but Runx2 and FGF2 suppress Gpc6, thus suggesting intricate Runx2 and FGF2 dependent changes in proteoglycan utilization. One functional consequence of Runx2 mediated modulations in proteoglycan-related gene expression is a change in the responsiveness of bone markers to FGF2 stimulation. Runx2 and FGF2 synergistically enhance osteopontin expression (>100 fold), while FGF2 blocks Runx2 induction of alkaline phosphatase. Our data suggest that Runx2 and the FGF/proteoglycan axis may form an extracellular matrix (ECM)-related regulatory feed-back loop that controls osteoblast proliferation and execution of the osteogenic program.
Resumo:
The mechanisms involved in the control of embryonic stem (ES) cell differentiation are yet to be fully elucidated. However, it has become clear that the family of fibroblast growth factors (FGFs) are centrally involved. In this study we examined the role of the FGF receptors (FGFRs 1-4) during osteogenesis in murine ES cells. Single cells were obtained after the formation of embryoid bodies, cultured on gelatin-coated plates, and coaxed to differentiate along the osteogenic lineage. Upregulation of genes was analyzed at both the transcript and protein levels using gene array, relative-quantitative PCR (RQ-PCR), and Western blotting. Deposition of a mineralized matrix was evaluated with Alizarin Red staining. An FGFR1-specific antibody was generated and used to block FGFR1 activity in mES cells during osteogenic differentiation. Upon induction of osteogenic differentiation in mES cells, all four FGFRs were clearly upregulated at both the transcript and protein levels with a number of genes known to be involved in osteogenic differentiation including bone morphogenetic proteins (BMPs), collagen I, and Runx2. Cells were also capable of depositing a mineralized matrix, confirming the commitment of these cells to the osteogenic lineage. When FGFR1 activity was blocked, a reduction in cell proliferation and a coincident upregulation of Runx2 with enhanced mineralization of cultures was observed. These results indicate that FGFRs play critical roles in cell recruitment and differentiation during the process of osteogenesis in mES cells. In particular, the data indicate that FGFR1 plays a pivotal role in osteoblast lineage determination.
Resumo:
Upon overexpression of integrin αvβ3 and its engagement by vitronectin, we previously showed enhanced adhesion, proliferation, and motility of human ovarian cancer cells. By studying differential expression of genes possibly related to these tumor biological events, we identified the epidermal growth-factor receptor (EGF-R) to be under control of αvβ3 expression levels. Thus in the present study we characterized αvβ3-dependent changes of EGF-R and found significant upregulation of its expression and activity which was reflected by prominent changes of EGF-R promoter activity. Upon disruption of DNA-binding motifs for the transcription factors p53, ETF, the repressor ETR, p50, and c-rel, respectively, we sought to identify DNA elements contributing to αvβ3-mediated EGF-R promoter induction. Both, the p53- and ETF-mutant, while exhibiting considerably lower EGF-R promoter activity than the wild type promoter, retained inducibility by αvβ3. Mutation of the repressor motif ETR, as expected, enhanced EGF-R promoter activity with a further moderate increase upon αvβ3 elevation. The p50-mutant displayed EGF-R promoter activity almost comparable to that of the wild type promoter with no impairment of induction by αvβ3. However, the activity of an EGF-R promoter mutant displaying a disrupted c-rel-binding motif did not only prominently decline, but, moreover, was not longer responsive to enhanced αvβ3, involving this DNA element in αvβ3-dependent EGF-R upregulation. Moreover, αvβ3 did not only increase the EGF-R but, moreover, also led to obvious co-clustering on the cancer cell surface. By studying αvβ3/EGF-R-effects on the focal adhesion kinase (FAK) and the mitogen activated protein kinases (MAPK) p44/42 (erk−1/erk−2), having important functions in synergistic crosstalk between integrins and growth-factor receptors, we found for both significant enhancement of expression and activity upon αvβ3/VN interaction and cell stimulation by EGF. Upregulation of the EGF-R by integrin αvβ3, both receptor molecules with a well-defined role as targets for cancer treatment, might represent an additional mechanism to adapt synergistic receptor signaling and crosstalk in response to an altered tumor cell microenvironment during ovarian cancer progression.
Resumo:
This paper discusses the idea and demonstrates an early prototype of a novel method of interacting with security surveillance footage using natural user interfaces in place of traditional mouse and keyboard interaction. Current surveillance monitoring stations and systems provide the user with a vast array of video feeds from multiple locations on a video wall, relying on the user’s ability to distinguish locations of the live feeds from experience or list based key-value pair of location and camera IDs. During an incident, this current method of interaction may cause the user to spend increased amounts time obtaining situational and location awareness, which is counter-productive. The system proposed in this paper demonstrates how a multi-touch screen and natural interaction can enable the surveillance monitoring station users to quickly identify the location of a security camera and efficiently respond to an incident.
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
The ability to understand and predict how thermal, hydrological,mechanical and chemical (THMC) processes interact is fundamental to many research initiatives and industrial applications. We present (1) a new Thermal– Hydrological–Mechanical–Chemical (THMC) coupling formulation, based on non-equilibrium thermodynamics; (2) show how THMC feedback is incorporated in the thermodynamic approach; (3) suggest a unifying thermodynamic framework for multi-scaling; and (4) formulate a new rationale for assessing upper and lower bounds of dissipation for THMC processes. The technique is based on deducing time and length scales suitable for separating processes using a macroscopic finite time thermodynamic approach. We show that if the time and length scales are suitably chosen, the calculation of entropic bounds can be used to describe three different types of material and process uncertainties: geometric uncertainties,stemming from the microstructure; process uncertainty, stemming from the correct derivation of the constitutive behavior; and uncertainties in time evolution, stemming from the path dependence of the time integration of the irreversible entropy production. Although the approach is specifically formulated here for THMC coupling we suggest that it has a much broader applicability. In a general sense it consists of finding the entropic bounds of the dissipation defined by the product of thermodynamic force times thermodynamic flux which in material sciences corresponds to generalized stress and generalized strain rates, respectively.
Resumo:
This paper presents a method for the continuous segmentation of dynamic objects using only a vehicle mounted monocular camera without any prior knowledge of the object’s appearance. Prior work in online static/dynamic segmentation is extended to identify multiple instances of dynamic objects by introducing an unsupervised motion clustering step. These clusters are then used to update a multi-class classifier within a self-supervised framework. In contrast to many tracking-by-detection based methods, our system is able to detect dynamic objects without any prior knowledge of their visual appearance shape or location. Furthermore, the classifier is used to propagate labels of the same object in previous frames, which facilitates the continuous tracking of individual objects based on motion. The proposed system is evaluated using recall and false alarm metrics in addition to a new multi-instance labelled dataset to evaluate the performance of segmenting multiple instances of objects.