160 research outputs found

    Blood group typing in five Afghan populations in the North Hindu-Kush region: implications for blood transfusion practice.

    No full text
    International audienceBACKGROUND AND OBJECTIVES: Blood incompatibility arises from individual and ethnic differences in red blood cell (RBC) antigen profiles. This underlines the importance of documenting RBC antigen variability in various ethnic groups. Central Asia is an area with a long and complex migratory history. The purpose of this article is to describe key antigen frequencies of Afghan ethnic groups in the Hindu-Kush region of Afghanistan as a basis for improving blood transfusion practices in that area. MATERIALS AND METHODS: The key ABO, Rh and Kell antigens were investigated in five Afghan populations. In order to depict accurately the blood group gene diversity in the area, DNA from eight additional Pakistani populations were included, and the entire sample set screened using two multiplex polymerase chain reactions sensitive for 17 alleles in 10 blood group genetic systems (MNS, Kell, Duffy, Kidd, Cartwright, Dombrock, Indian, Colton, Diego and Landsteiner-Wiener). RESULTS: Phenotype and allele frequencies fell within the ranges observed in Western European and East Asian populations. Occurrence of DI*01, IN*01, LW*07 and FY*02N.01 and prevalence of ABO*B were consistent with migratory history as well as with putative environmental adaptation in the subtropical environment Hindu-Kush region. CONCLUSION: These findings expand the current knowledge about key antigen frequencies. Regarding occurrence of viral markers, further blood transfusion in the region requires rigorous typing

    Characterizing web pornography consumption from passive measurements

    Get PDF
    Web pornography represents a large fraction of the Internet traffic, with thousands of websites and millions of users. Studying web pornography consumption allows understanding human behaviors and it is crucial for medical and psychological research. However, given the lack of public data, these works typically build on surveys, limited by different factors, e.g. unreliable answers that volunteers may (involuntarily) provide. In this work, we collect anonymized accesses to pornography websites using HTTP-level passive traces. Our dataset includes about 15 00015\,000 broadband subscribers over a period of 3 years. We use it to provide quantitative information about the interactions of users with pornographic websites, focusing on time and frequency of use, habits, and trends. We distribute our anonymized dataset to the community to ease reproducibility and allow further studies.Comment: Passive and Active Measurements Conference 2019 (PAM 2019). 14 pages, 7 figure

    The Case for Ubiquitous Transport-Level Encryption

    Get PDF
    Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic. Moreover, the cost of doing so will only drop over time. Tcpcrypt is a TCP extension designed to make end-to-end encryption of TCP traffic the default, not the exception. To facilitate adoption tcpcrypt provides backwards compatibility with legacy TCP stacks and middle-boxes. Because it is implemented in the transport layer, it protects legacy applications. However, it also provides a hook for integration with application-layer authentication, largely obviating the need for applications to encrypt their own network traffic and minimizing the need for duplication of functionality. Finally, tcpcrypt minimizes the cost of key negotiation on servers; a server using tcpcrypt can accept connections at 36 times the rate achieved using SSL

    Y-chromosome phylogeographic analysis of the Greek-Cypriot population reveals elements consistent with Neolithic and Bronze Age settlements

    Get PDF
    International audienceBackground: The archeological record indicates that the permanent settlement of Cyprus began with pioneering agriculturalists circa 11,000 years before present, (ca. 11,000 y BP). Subsequent colonization events followed, some recognized regionally. Here, we assess the Y-chromosome structure of Cyprus in context to regional populations and correlate it to phases of prehistoric colonization. Results: Analysis of haplotypes from 574 samples showed that island-wide substructure was barely significant in a spatial analysis of molecular variance (SAMOVA). However, analyses of molecular variance (AMOVA) of haplogroups using 92 binary markers genotyped in 629 Cypriots revealed that the proportion of variance among the districts was irregularly distributed. Principal component analysis (PCA) revealed potential genetic associations of Greek-Cypriots with neighbor populations. Contrasting haplogroups in the PCA were used as surrogates of parental populations. Admixture analyses suggested that the majority of G2a-P15 and R1b-M269 components were contributed by Anatolia and Levant sources, respectively, while Greece Balkans supplied the majority of E-V13 and J2a-M67. Haplotype-based expansion times were at historical levels suggestive of recent demography. Conclusions: Analyses of Cypriot haplogroup data are consistent with two stages of prehistoric settlement. E-V13 and E-M34 are widespread, and PCA suggests sourcing them to the Balkans and Levant/Anatolia, respectively. The persistent pre-Greek component is represented by elements of G2-U5(xL30) haplogroups: U5*, PF3147, and L293. J2b-M205 may contribute also to the pre-Greek strata. The majority of R1b-Z2105 lineages occur in both the westernmost and easternmost districts. Distinctively, sub-haplogroup R1b-M589 occurs only in the east. The absence of R1b-M589 lineages in Crete and the Balkans and the presence in Asia Minor are compatible with Late Bronze Age influences from Anatolia rather than from Mycenaean Greeks

    Characterizing Web Pornography Consumption from Passive Measurements

    Get PDF
    Web pornography represents a large fraction of the Internet traffic, with thousands of websites and millions of users. Studying web pornography consumption allows understanding human behaviors and it is crucial for medical and psychological research. However, given the lack of public data, these works typically build on surveys, limited by different factors, \eg unreliable answers that volunteers may (involuntarily) provide. In this work, we collect anonymized accesses to pornography websites using HTTP-level passive traces. Our dataset includes about 15,000 broadband subscribers over a period of 3 years. We use it to provide quantitative information about the interactions of users with pornographic websites, focusing on time and frequency of use, habits, and trends. We distribute our anonymized dataset to the community to ease reproducibility and allow further studies

    Plasma generation using time reversal of microwaves

    Get PDF
    We report the experimental demonstration of plasma generation by time-reversal focusing. After a learning phase, the amplified time reversed signal built at a central frequency of 2.45 GHz injected in a low loss metallic cavity allows to ignite and maintain a localized centimer-sized plasma in argon at 133 Pa. The plasma spatial position is totally controlled by the signal waveform

    DDoS defense by offense

    Get PDF
    This article presents the design, implementation, analysis, and experimental evaluation of speak-up, a defense against application-level distributed denial-of-service (DDoS), in which attackers cripple a server by sending legitimate-looking requests that consume computational resources (e.g., CPU cycles, disk). With speak-up, a victimized server encourages all clients, resources permitting, to automatically send higher volumes of traffic. We suppose that attackers are already using most of their upload bandwidth so cannot react to the encouragement. Good clients, however, have spare upload bandwidth so can react to the encouragement with drastically higher volumes of traffic. The intended outcome of this traffic inflation is that the good clients crowd out the bad ones, thereby capturing a much larger fraction of the server's resources than before. We experiment under various conditions and find that speak-up causes the server to spend resources on a group of clients in rough proportion to their aggregate upload bandwidths, which is the intended result.National Science Foundation (U.S.) (NSF grant CNS-0225660)National Science Foundation (U.S.) (NSF grant CNS-0520241)United States. Dept. of Defense (National Security Science and Engineering Faculty Fellowship
    • …
    corecore