2,917 research outputs found
Your WiFi is leaking: what do your mobile apps gossip about you?
This paper describes how mobile device apps can inadvertently broadcast personal information through their use of wireless networks despite the correct use of encryption. Using a selection of personas we illustrate how app usage can be tied to personal information. Users would likely assume the confidentiality of personal information (including age, religion, sexuality and gender) when using an encrypted network. However, we demonstrate how encrypted traffic pattern analysis can allow a remote observer to infer potentially sensitive data passively and undetectably without any network credentials. Without the ability to read encrypted WiFi traffic directly, we process the limited side-channel data available (timings and frame sizes) to enable remote app detection. These side-channel data measurements are represented as histograms and used to construct a Random Forest classifier capable of accurately identifying mobile apps from the encrypted traffic they cause. The Random Forest algorithm was able to correctly identify apps with a mean accuracy of ∼99% within the training set. The classifier was then adapted to form the core of a detection program that could monitor multiple devices in real-time. Tests in a closed-world scenario showed 84% accuracy and demonstrated the ability to overcome the data limitations imposed by WiFi encryption. Although accuracy suffers greatly (67%) when moving to an open-world scenario, a high recall rate of 86% demonstrates that apps can unwittingly broadcast personal information openly despite using encrypted WiFi. The open-world false positive rate (38% overall, or 72% for unseen activity alone) leaves much room for improvement but the experiment demonstrates a plausible threat nevertheless. Finally, avenues for improvement and the limitations of this approach are identified. We discuss potential applications, strategies to prevent these leaks, and consider the effort required for an observer to present a practical privacy threat to the everyday WiFi user. This paper presents and demonstrates a nuanced and difficult to solve privacy vulnerability that cannot not be mitigated without considerable changes to current- and next-generation wireless communication protocols
Effect of scatter correction when comparing attenuation maps: Application to brain PET/MR
Email
Print
Request Permissions
In PET imaging, attenuation and scatter corrections are an essential requirement to accurately quantify the radionuclide uptake. In the context of PET/MR scanners, obtaining the attenuation information can be challenging. Various authors have quantified the effect of an imprecise attenuation map on the reconstructed PET image but its influence on scatter correction has usually been ignored. In this paper, we investigate the effects of imperfect attenuation maps (μmaps) on the scatter correction in a simulation setting. We focused our study on three μmaps: the reference μmap derived from a CT image, and two MR-based methods. Two scatter estimation strategies were implemented: a μmap-specific scatter estimation and an ideal scatter estimation relying only on the reference CT μmap. The scatter estimation used the Single Scatter Simulation algorithm with tail-fitting. The results show that, for FDG brain PET, regardless of the μmap used in the reconstruction, the difference on PET images between μmap-specific and ideal scatter estimations is small (less than 1%). More importantly, the relative error between attenuation correction methods does not change depending on the scatter estimation method included in the simulation and reconstruction process. This means that the effect of errors in the μmap on the PET image is dominated by the attenuation correction, while the scatter estimate is relatively unaffected. Therefore, while scatter correction improves reconstruction accuracy, it is unnecessary to include scatter in the simulation when comparing different attenuation correction methods for brain PET/MR
The formation of professional identity in medical students: considerations for educators
<b>Context</b> Medical education is about more than acquiring an appropriate level of knowledge and developing relevant skills. To practice medicine students need to develop a professional identity – ways of being and relating in professional contexts.<p></p>
<b>Objectives</b> This article conceptualises the processes underlying the formation and maintenance of medical students’ professional identity drawing on concepts from social psychology.<p></p>
<b>Implications</b> A multi-dimensional model of identity and identity formation, along with the concepts of identity capital and multiple identities, are presented. The implications for educators are discussed.<p></p>
<b>Conclusions</b> Identity formation is mainly social and relational in nature. Educators, and the wider medical society, need to utilise and maximise the opportunities that exist in the various relational settings students experience. Education in its broadest sense is about the transformation of the self into new ways of thinking and relating. Helping students form, and successfully integrate their professional selves into their multiple identities, is a fundamental of medical education
Universality, limits and predictability of gold-medal performances at the Olympic Games
Inspired by the Games held in ancient Greece, modern Olympics represent the
world's largest pageant of athletic skill and competitive spirit. Performances
of athletes at the Olympic Games mirror, since 1896, human potentialities in
sports, and thus provide an optimal source of information for studying the
evolution of sport achievements and predicting the limits that athletes can
reach. Unfortunately, the models introduced so far for the description of
athlete performances at the Olympics are either sophisticated or unrealistic,
and more importantly, do not provide a unified theory for sport performances.
Here, we address this issue by showing that relative performance improvements
of medal winners at the Olympics are normally distributed, implying that the
evolution of performance values can be described in good approximation as an
exponential approach to an a priori unknown limiting performance value. This
law holds for all specialties in athletics-including running, jumping, and
throwing-and swimming. We present a self-consistent method, based on normality
hypothesis testing, able to predict limiting performance values in all
specialties. We further quantify the most likely years in which athletes will
breach challenging performance walls in running, jumping, throwing, and
swimming events, as well as the probability that new world records will be
established at the next edition of the Olympic Games.Comment: 8 pages, 3 figures, 1 table. Supporting information files and data
are available at filrad.homelinux.or
Your WiFi Is Leaking: Inferring Private User Information Despite Encryption
This thesis describes how wireless networks can inadvertently leak and broadcast users' personal information despite the correct use of encryption. Users would likely assume that their activities (for example, the program or app they are using) and personal information (including age, religion, sexuality and gender) would remain confidential when using an encrypted network. However, we demonstrate how the analysis of encrypted traffic patterns can allow an observer to infer potentially sensitive data remotely, passively, undetectably, and without any network credentials. Without the ability to read encrypted WiFi traffic directly, the limited side-channel data available is processed. Following an investigation to determine what information is available and how it can be represented, it was determined that the comparison of various permutations of timing and frame size information is sufficient to distinguish specific user activities. The construction of classifiers via machine learning (Random Forests) utilising this side-channel information represented as histograms allows for the detection of user activity despite WiFi encryption. Studies showed that Skype voice traffic could be identified despite being interleaved with other activities. A subsequent study then demonstrated that mobile apps could be individually detected and, concerningly, used to infer potentially sensitive information about users due to their personalised nature. Furthermore, a full prototype system is developed and used to demonstrate that this analysis can be performed in real-time using low-cost commodity hardware in real-world scenarios. Avenues for improvement and the limitations of this approach are identified, and potential applications for this work are considered. Strategies to prevent these leaks are discussed and the effort required for an observer to present a practical privacy threat to the everyday WiFi user is examined
The conserved C-terminus of the PcrA/UvrD helicase interacts directly with RNA polymerase
Copyright: © 2013 Gwynn et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Funding: This work was supported by a Wellcome Trust project grant to MD (Reference: 077368), an ERC starting grant to MD (Acronym: SM-DNA-REPAIR) and a BBSRC project grant to PM, NS and MD (Reference: BB/I003142/1). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.Peer reviewedPublisher PD
Serotonin and corticosterone rhythms in mice exposed to cigarette smoke and in patients with COPD:implication for COPD-associated neuropathogenesis
The circadian timing system controls daily rhythms of physiology and behavior, and disruption of clock function can trigger stressful life events. Daily exposure to cigarette smoke (CS) can lead to alteration in diverse biological and physiological processes. Smoking is associated with mood disorders, including depression and anxiety. Patients with chronic obstructive pulmonary disease (COPD) have abnormal circadian rhythms, reflected by daily changes in respiratory symptoms and lung function. Corticosterone (CORT) is an adrenal steroid that plays a considerable role in stress and anti-inflammatory responses. Serotonin (5-hydroxytryptamine; 5HT) is a neurohormone, which plays a role in sleep/wake regulation and affective disorders. Secretion of stress hormones (CORT and 5HT) is under the control of the circadian clock in the suprachiasmatic nucleus. Since smoking is a contributing factor in the development of COPD, we hypothesize that CS can affect circadian rhythms of CORT and 5HT secretion leading to sleep and mood disorders in smokers and patients with COPD. We measured the daily rhythms of plasma CORT and 5HT in mice following acute (3 d), sub-chronic (10 d) or chronic (6 mo) CS exposure and in plasma from non-smokers, smokers and patients with COPD. Acute and chronic CS exposure affected both the timing (peak phase) and amplitude of the daily rhythm of plasma CORT and 5HT in mice. Acute CS appeared to have subtle time-dependent effects on CORT levels but more pronounced effects on 5HT. As compared with CORT, plasma 5HT was slightly elevated in smokers but was reduced in patients with COPD. Thus, the effects of CS on plasma 5HT were consistent between mice and patients with COPD. Together, these data reveal a significant impact of CS exposure on rhythms of stress hormone secretion and subsequent detrimental effects on cognitive function, depression-like behavior, mood/anxiety and sleep quality in smokers and patients with COPD
Managerial Work in a Practice-Embodying Institution - The role of calling, the virtue of constancy
What can be learned from a small scale study of managerial work in a highly marginal and under-researched working community? This paper uses the ‘goods-virtues-practices-institutions’ framework to examine the managerial work of owner-directors of traditional circuses. Inspired by MacIntyre’s arguments for the necessity of a narrative understanding of the virtues, interviews explored how British and Irish circus directors accounted for their working lives. A purposive sample was used to select subjects who had owned and managed traditional touring circuses for at least 15 years, a period in which the economic and reputational fortunes of traditional circuses have suffered badly. This sample enabled the research to examine the self-understanding of people who had, at least on the face of it, exhibited the virtue of constancy. The research contributes to our understanding of the role of the virtues in organizations by presenting evidence of an intimate relationship between the virtue of constancy and a ‘calling’ work orientation. This enhances our understanding of the virtues that are required if management is exercised as a domain-related practice
Discrete population balance models of random agglomeration and cleavage in polymer pyrolysis
The processes of random agglomeration and cleavage (both of which are important for the development of new models of polymer combustion, but are also applicable in a wide range of fields including atmospheric physics, radiation modelling and astrophysics) are analysed using population balance methods. The evolution of a discrete distribution of particles is considered within this framework, resulting in a set of ordinary differential equations for the individual particle concentrations. Exact solutions for these equations are derived, together with moment generating functions. Application of the discrete Laplace transform (analogous to the Z-transform) is found to be effective in these problems, providing both exact solutions for particle concentrations and moment generating functions. The combined agglomeration-cleavage problem is also considered. Unfortunately, it has been impossible to find an exact solution for the full problem, but a stable steady state has been identified and computed
Search for direct pair production of the top squark in all-hadronic final states in proton-proton collisions at s√=8 TeV with the ATLAS detector
The results of a search for direct pair production of the scalar partner to the top quark using an integrated luminosity of 20.1fb−1 of proton–proton collision data at √s = 8 TeV recorded with the ATLAS detector at the LHC are reported. The top squark is assumed to decay via t˜→tχ˜01 or t˜→ bχ˜±1 →bW(∗)χ˜01 , where χ˜01 (χ˜±1 ) denotes the lightest neutralino (chargino) in supersymmetric models. The search targets a fully-hadronic final state in events with four or more jets and large missing transverse momentum. No significant excess over the Standard Model background prediction is observed, and exclusion limits are reported in terms of the top squark and neutralino masses and as a function of the branching fraction of t˜ → tχ˜01 . For a branching fraction of 100%, top squark masses in the range 270–645 GeV are excluded for χ˜01 masses below 30 GeV. For a branching fraction of 50% to either t˜ → tχ˜01 or t˜ → bχ˜±1 , and assuming the χ˜±1 mass to be twice the χ˜01 mass, top squark masses in the range 250–550 GeV are excluded for χ˜01 masses below 60 GeV
- …
