854 resultados para non-problem gamblers
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.
Resumo:
The exchange of physical forces in both cell-cell and cell-matrix interactions play a significant role in a variety of physiological and pathological processes, such as cell migration, cancer metastasis, inflammation and wound healing. Therefore, great interest exists in accurately quantifying the forces that cells exert on their substrate during migration. Traction Force Microscopy (TFM) is the most widely used method for measuring cell traction forces. Several mathematical techniques have been developed to estimate forces from TFM experiments. However, certain simplifications are commonly assumed, such as linear elasticity of the materials and/or free geometries, which in some cases may lead to inaccurate results. Here, cellular forces are numerically estimated by solving a minimization problem that combines multiple non-linear FEM solutions. Our simulations, free from constraints on the geometrical and the mechanical conditions, show that forces are predicted with higher accuracy than when using the standard approaches.
Resumo:
A robust visual tracking system requires an object appearance model that is able to handle occlusion, pose, and illumination variations in the video stream. This can be difficult to accomplish when the model is trained using only a single image. In this paper, we first propose a tracking approach based on affine subspaces (constructed from several images) which are able to accommodate the abovementioned variations. We use affine subspaces not only to represent the object, but also the candidate areas that the object may occupy. We furthermore propose a novel approach to measure affine subspace-to-subspace distance via the use of non-Euclidean geometry of Grassmann manifolds. The tracking problem is then considered as an inference task in a Markov Chain Monte Carlo framework via particle filtering. Quantitative evaluation on challenging video sequences indicates that the proposed approach obtains considerably better performance than several recent state-of-the-art methods such as Tracking-Learning-Detection and MILtrack.
Resumo:
Random blinking is a major problem on the way to successful applications of semiconducting nanocrystals in optoelectronics and photonics, which until recently had neither a practical solution nor a theoretical interpretation. An experimental breakthrough has recently been made by fabricating non-blinking Cd1-xZnxSe/ZnSe graded nanocrystals [Wang et al., Nature, 2009, 459, 686]. Here, we (1) report an unequivocal and detailed theoretical investigation to understand the properties (e.g., profile) of the potential-well and the distribution of Zn content with respect to the nanocrystal radius and (2) develop a strategy to find the relationship between the photoluminescence (PL) energy peaks and the potential-well due to Zn distribution in nanocrystals. It is demonstrated that the non-square-well potential can be varied in such a way that one can indeed control the PL intensity and the energy-level difference (PL energy peaks) accurately. This implies that one can either suppress the blinking altogether, or alternatively, manipulate the PL energy peaks and intensities systematically to achieve a controlled non-random intermittent luminescence. The approach developed here is based on the ionization energy approximation and as such is generic and can be applied to any non-free-electron nanocrystals.
Resumo:
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003. We propose the first protocol for key exchange among n ≥2k+1 parties which simultaneously achieves all of the following properties: 1. Key Privacy (including forward security) against active attacks by group outsiders, 2. Non-malleability — meaning in particular that no subset of up to k corrupted group insiders can ‘fix’ the agreed key to a desired value, and 3. Robustness against denial of service attacks by up to k corrupted group insiders. Our insider security properties above are achieved assuming the availability of a reliable broadcast channel.
Resumo:
Understanding the natural variability of the Earth's climate system and accurately identifying potential anthropogenic influences requires long term, geographically distributed records of key climate indicators, such as temperature and precipitation that extend prior to the last 400. years of the Holocene. Reef corals provide an excellent source of high resolution climate records, and importantly represent the tropical marine environment where palaeoclimate data are urgently required. Recent decades have seen significant improvement in our understanding of coral biomineralisation, the associated uptake of geochemical proxies and methods of identifying and understanding the effects of both early and late, post depositional diagenetic alteration. These processes all have significant implications for interpreting geochemical proxies relevant to palaeoclimatic reconstructions. This paper reviews the current 'state of the art' in terms of coral based palaeoclimate reconstructions and highlights a key remaining problem. The majority of coral based palaeoclimate research has been derived from massive colonies of Porites. However, massive Porites are not globally abundant and may not provide material of a particular age of interest in those regions where they are present. Therefore, there is great potential for alternate coral genera to act as complimentary climate archives. While it remains critical to consider five key factors - vital effects, differential growth morphologies, geochemical heterogeneity in the skeletal ultrastructure, transfer equation selection and diagenetic screening of skeletal material - in order to allow the highest level of accuracy in coral palaeoclimate reconstructions, it is also important to develop alternate taxa for palaeoclimate studies in regions where Porites colonies are absent or rare. Currently as many as nine genera other than Porites have proven at least limited utility in palaeothermometry, most of which are found in the Atlantic/Caribbean region where massive Porites do not exist. Even branching taxa such as Acropora have significant potential to preserve environmental archives. Increasing this capability will greatly expand the number of potential geochemical archives available for longer term temporal records of palaeoclimate.
Resumo:
This study explored the mediating effect of emotional intelligence (EI) and coping strategies on problem behaviours in Australian adolescents. One hundred and forty-five adolescents (60 boys and 85 girls with a mean age of 12.02 years) completed self-report instruments of EI, stress coping strategies, and problem behaviours. The relationships between Emotional Management and Control and engagement in internalising and externalising behaviours were found to be mediated by the use of non-productive coping strategies. Mediation models of the relationship between problem behaviours and the Understanding Emotions and Emotional Recognition and Expression dimensions were found to be only partially mediated by the engagement in problem-focused and non-productive coping strategies. The results are discussed in regards to how coping strategies utilised in adolescence may produce more or less adaptive patterns of coping during adulthood. The development of emotional abilities may be required to improve coping outcomes for adolescents, which in turn may produce better psychological outcomes for adolescents in the long term.
Resumo:
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.
Resumo:
Messenger RNAs (mRNAs) can be repressed and degraded by small non-coding RNA molecules. In this paper, we formulate a coarsegrained Markov-chain description of the post-transcriptional regulation of mRNAs by either small interfering RNAs (siRNAs) or microRNAs (miRNAs). We calculate the probability of an mRNA escaping from its domain before it is repressed by siRNAs/miRNAs via cal- culation of the mean time to threshold: when the number of bound siRNAs/miRNAs exceeds a certain threshold value, the mRNA is irreversibly repressed. In some cases,the analysis can be reduced to counting certain paths in a reduced Markov model. We obtain explicit expressions when the small RNA bind irreversibly to the mRNA and we also discuss the reversible binding case. We apply our models to the study of RNA interference in the nucleus, examining the probability of mRNAs escaping via small nuclear pores before being degraded by siRNAs. Using the same modelling framework, we further investigate the effect of small, decoy RNAs (decoys) on the process of post-transcriptional regulation, by studying regulation of the tumor suppressor gene, PTEN : decoys are able to block binding sites on PTEN mRNAs, thereby educing the number of sites available to siRNAs/miRNAs and helping to protect it from repression. We calculate the probability of a cytoplasmic PTEN mRNA translocating to the endoplasmic reticulum before being repressed by miRNAs. We support our results with stochastic simulations
Resumo:
The problem of mixed convection from vertical surfaces in a porous medium saturated with a power-law type non-Newtonian fluid is investigated. The transformed conservation laws are solved numerically for the case of variable wall temperature conditions. Results for the details of the velocity and temperature fields as well as the Nusselt number have been presented. The viscosity index ranged from 0.5-2.0.
Resumo:
We consider some non-autonomous second order Cauchy problems of the form u + B(t)(u) over dot + A(t)u = f (t is an element of [0, T]), u(0) = (u) over dot(0) = 0. We assume that the first order problem (u) over dot + B(t)u = f (t is an element of [0, T]), u(0) = 0, has L-p-maximal regularity. Then we establish L-p-maximal regularity of the second order problem in situations when the domains of B(t(1)) and A(t(2)) always coincide, or when A(t) = kappa B(t).
Resumo:
Recovering the motion of a non-rigid body from a set of monocular images permits the analysis of dynamic scenes in uncontrolled environments. However, the extension of factorisation algorithms for rigid structure from motion to the low-rank non-rigid case has proved challenging. This stems from the comparatively hard problem of finding a linear “corrective transform” which recovers the projection and structure matrices from an ambiguous factorisation. We elucidate that this greater difficulty is due to the need to find multiple solutions to a non-trivial problem, casting a number of previous approaches as alleviating this issue by either a) introducing constraints on the basis, making the problems nonidentical, or b) incorporating heuristics to encourage a diverse set of solutions, making the problems inter-dependent. While it has previously been recognised that finding a single solution to this problem is sufficient to estimate cameras, we show that it is possible to bootstrap this partial solution to find the complete transform in closed-form. However, we acknowledge that our method minimises an algebraic error and is thus inherently sensitive to deviation from the low-rank model. We compare our closed-form solution for non-rigid structure with known cameras to the closed-form solution of Dai et al. [1], which we find to produce only coplanar reconstructions. We therefore make the recommendation that 3D reconstruction error always be measured relative to a trivial reconstruction such as a planar one.
Resumo:
We compared perception of family functioning in a sample (N = 1,496) of Aymara and non-Aymara parents and children living in Arica, Chile. The children were aged from 9 to 15 years and were recruited from the 5th to 8th grades of 9 elementary schools (4 public, 5 government-subsidized private schools) serving lower socioeconomic areas. Participants completed the Family Functioning Test (FF-SIL), which consists of 14 events or characteristics that may occur in a family. The results showed that parents and children from the Aymara group recorded lower scores for their perception of family functioning than did the non-Aymara group. Addressing this issue may be important in the prevention of psychological problems in these families.
Resumo:
Premature or abnormal softening of persimmon fruit within 3-7 days after harvest is a major physiological problem of non-astringent persimmon cultivars grown in subtropical regions of Australia. Up to 30% of consignments may soften rapidly frequently overnight, often resulting in the flesh becoming very soft, completely translucent, and impossible to handle. Incidence of premature soft fruit can vary with season and production location. To study the incidence of this problem, we conducted surveys of fruit harvested from five environmentally-diverse regions of Australia over a two-year period. We found wide variation in the rate of both premature softening and normal softening with differences of up 37 days between orchards in percentage of fruit reaching 50% soft. We found that the rate of fruit softening was exacerbated by lower calcium concentrations at fruit set, shorter fruit development periods and heavier rainfall during the fruit development period. The implications of our findings, in terms of orchard management, export and domestic marketing strategies are discussed.