36,147 research outputs found

    Quiescence: a mechanism for escaping the effects of drug on cell populations

    Get PDF
    We point out that a simple and generic strategy to lower the risk for extinction consists in the developing a dormant stage in which the organism is unable to multiply but may die. The dormant organism is protected against the poisonous environment. The result is to increase the survival probability of the entire population by introducing a type of zero reproductive fitness. This is possible, because the reservoir of dormant individuals act as a buffer that can cushion fatal fluctuations in the number of births and deaths which without the dormant population would have driven the entire population to extinction.Comment: 18 pages and 9 figure

    Quarantine region scheme to mitigate spam attacks in wireless sensor networks

    Get PDF
    The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a tradeoff between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processe

    Chip and Skim: cloning EMV cards with the pre-play attack

    Full text link
    EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. We have discovered that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this number. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically (in the sense of extracting the key material and loading it into another card). Card cloning is the very type of fraud that EMV was supposed to prevent. We describe how we detected the vulnerability, a survey methodology we developed to chart the scope of the weakness, evidence from ATM and terminal experiments in the field, and our implementation of proof-of-concept attacks. We found flaws in widely-used ATMs from the largest manufacturers. We can now explain at least some of the increasing number of frauds in which victims are refused refunds by banks which claim that EMV cards cannot be cloned and that a customer involved in a dispute must therefore be mistaken or complicit. Pre-play attacks may also be carried out by malware in an ATM or POS terminal, or by a man-in-the-middle between the terminal and the acquirer. We explore the design and implementation mistakes that enabled the flaw to evade detection until now: shortcomings of the EMV specification, of the EMV kernel certification process, of implementation testing, formal analysis, or monitoring customer complaints. Finally we discuss countermeasures

    Quantifying metastatic inefficiency:rare genotypes versus rare dynamics

    Get PDF
    abstract: We introduce and solve a ‘null model’ of stochastic metastatic colonization. The model is described by a single parameter θ: the ratio of the rate of cell division to the rate of cell death for a disseminated tumour cell in a given secondary tissue environment. We are primarily interested in the case in which colonizing cells are poorly adapted for proliferation in the local tissue environment, so that cell death is more likely than cell division, i.e. θ 1), i.e. the statistics show a duality mapping (1 − θ) → (θ − 1). We conclude our analysis with a study of heterogeneity in the fitness of colonising cells, and describe a phase diagram delineating parameter regions in which metastatic colonization is dominated either by low or high fitness cells, showing that both are plausible given our current knowledge of physiological conditions in human cancer

    Surveys of facilities for the potential effects from the fallout of airborne graphite fibers

    Get PDF
    The impact of the entry of graphite fibers into workplaces in the United States is discussed. Areas where an electrical failure could cause major problems include process and production systems, hospitals, and police/fire emergency communication systems

    Facing up to Facebook: politicians, publics and the social media(ted) turn in New Zealand

    Get PDF
    Social media have an increasingly important place in the lives of citizens, and their potential to expand the reach of communication messages beyond individual networks is attractive to those looking to maximise message efficiency. The influence of Facebook in Obama’s 2008 campaign success galvanised many politicians into taking it seriously as a campaign tool. Our study explored the Facebook wall posts (1148 in total) of New Zealand Members of Parliament (MPs) leading up to the 2011 general election to determine posting behaviours and differences. Among other things, we found that women posted more frequently than men and that Labour MPs posted more than their National counterparts. Additionally, most politicians do not invite dialogue with readers of their posts, rarely get involved in comment threads and mostly take a monologic approach, using Facebook as a way of broadcasting information rather than as a medium enabling two-way flow. In other words, same old, same old

    Racial Harassment, Ethnic Concentration and Economic Conditions

    Get PDF
    We analyze the association between concentration of minorities and local economic conditions on the one side, and racial harassment and hostile majority attitudes on the other. We distinguish the formation of hostile attitudes and the realization of acts of racially motivated violence as distinct processes and find strong evidence for this. We develop a framework that subsumes and structures many existing theories on attitude formation and acts of harassment. Our measures of harassment include both direct reports and precautionary behaviour. Our data sources are the fourth National Survey of Ethnic Minorities for the UK and the 1981 and 1991 UK Census.Attitudes, Economics of Minorities

    Collab-SAR:A Collaborative Avalanche Search-and-Rescue Missions Exploiting Hostile Alpine Networks

    Get PDF
    Every year, Alpine experiences a considerable number of avalanches causing danger to visitor and saviors, where most of the existing techniques to mitigate the number of fatalities in such hostile environments are based on a non-collaborative approach and is time- and effort-inefficient. A recently completed European project on Smart collaboration between Humans and ground-aErial Robots for imProving rescuing activities in Alpine environments (SHERPA) has proposed a novel collaborative approach to improve the rescuing activities. To be an integral part of the SHERPA framework, this paper considers deployment of an air-ground collaborative wireless network (AGCWN) to support search and rescue (SAR) missions in hostile alpine environments. We propose a network infrastructure for such challenging environments by considering the available network components, hostility of the environments, scenarios, and requirements. The proposed infrastructure also considers two degrees of quality of service, in terms of high throughput and long coverage range, to enable timely delivery of videos and images of the long patrolled area, which is the key in any searching and rescuing mission. We also incorporate a probabilistic search technique, which is suitable for collaborative search assuming AGCWN infrastructure for sharing information. The effectiveness of the proposed infrastructure and collaborative search technique, referred to as Collab-SAR, is demonstrated via a series of computer simulations. The results confirm the effectiveness of the proposal
    • …
    corecore