1,274 research outputs found

    The role of membrane curvature for the wrapping of nanoparticles

    No full text

    Major Thought Restructuring: The Roles of Different Prefrontal Cortical Regions

    Get PDF
    An important question for understanding the neural basis of problem solving is whether the regions of human prefrontal cortices play qualitatively different roles in the major cognitive restructuring required to solve difficult problems. However, investigating this question using neuroimaging faces a major dilemma: either the problems do not require major cognitive restructuring, or if they do, the restructuring typically happens once, rendering repeated measurements of the critical mental process impossible. To circumvent these problems, young adult participants were challenged with a one-dimensional Subtraction (or Nim) problem [Bouton, C. L. Nim, a game with a complete mathematical theory. The Annals of Mathematics, 3, 35-39, 1901] that can be tackled using two possible strategies. One, often used initially, is effortful, slow, and error-prone, whereas the abstract solution, once achieved, is easier, quicker, and more accurate. Behaviorally, success was strongly correlated with sex. Using voxel-based morphometry analysis controlling for sex, we found that participants who found the more abstract strategy (i.e., Solvers) had more gray matter volume in the anterior medial, ventrolateral prefrontal, and parietal cortices compared with those who never switched from the initial effortful strategy (i.e., Explorers). Removing the sex covariate showed higher gray matter volume in Solvers (vs. Explorers) in the right ventrolateral prefrontal and left parietal cortex

    A hierarchical key pre-distribution scheme for fog networks

    Get PDF
    Security in fog computing is multi-faceted, and one particular challenge is establishing a secure communication channel between fog nodes and end devices. This emphasizes the importance of designing efficient and secret key distribution scheme to facilitate fog nodes and end devices to establish secure communication channels. Existing secure key distribution schemes designed for hierarchical networks may be deployable in fog computing, but they incur high computational and communication overheads and thus consume significant memory. In this paper, we propose a novel hierarchical key pre-distribution scheme based on “Residual Design” for fog networks. The proposed key distribution scheme is designed to minimize storage overhead and memory consumption, while increasing network scalability. The scheme is also designed to be secure against node capture attacks. We demonstrate that in an equal-size network, our scheme achieves around 84% improvement in terms of node storage overhead, and around 96% improvement in terms of network scalability. Our research paves the way for building an efficient key management framework for secure communication within the hierarchical network of fog nodes and end devices. KEYWORDS: Fog Computing, Key distribution, Hierarchical Networks

    System level design of a full-duplex wireless transceiver for brain-machine interfaces

    Get PDF
    We propose a new wireless communication architecture for implanted systems that simultaneously stimulates neurons and record neural responses. This architecture can support large numbers of electrodes (>500), providing 100 Mb/s for the downlink of stimulation signals, and gigabits per second for the uplink of neural recordings. We propose a full-duplex transceiver architecture that shares one antenna for both the ultrawideband (UWB) and the 2.45-GHz industrial, scientific, and medical band. A new pulse shaper is used for the gigabits per second uplink to simplify the transceiver design, while supporting several modulation formats with high data rates. To validate our system-level design for brain-machine interfaces, we present an ex-vivo experimental demonstration of the architecture. While the system design is for an integrated solution, the proof-of-concept demonstration uses discrete components. Good bit error rate performance over a biological channel at 0.5-, 1-, and 2-Gb/s data rates for uplink telemetry (UWB) and 100 Mb/s for downlink telemetry (2.45-GHz band) are achieved

    A cyber-kill-chain based taxonomy of crypto-ransomware features

    Get PDF
    In spite of being just a few years old, ransomware is quickly becoming a serious threat to our digital infrastructures, data and services. Majority of ransomware families are requesting for a ransom payment to restore a custodian access or decrypt data which were encrypted by the ransomware earlier. Although the ransomware attack strategy seems to be simple, security specialists ranked ransomware as a sophisticated attack vector with many variations and families. Wide range of features which are available in different families and versions of ransomware further complicates their detection and analysis. Though the existing body of research provides significant discussions about ransomware details and capabilities, the all research body is fragmented. Therefore, a ransomware feature taxonomy would advance cyber defenders’ understanding of associated risks of ransomware. In this paper we provide, to the best of our knowledge, the first scientific taxonomy of ransomware features, aligned with Lockheed Martin Cyber Kill Chain (CKC) model. CKC is a well-established model in industry that describes stages of cyber intrusion attempts. To ease the challenge of applying our taxonomy in real world, we also provide the corresponding ransomware defence taxonomy aligned with Courses of Action matrix (an intelligence-driven defence model). We believe that this research study is of high value for the cyber security research community, as it provides the researchers with a means of assessing the vulnerabilities and attack vectors towards the intended victims

    Upper Bounds on Spontaneous Wave-Function Collapse Models Using Millikelvin-Cooled Nanocantilevers

    Get PDF
    6siCollapse models predict a tiny violation of energy conservation, as a consequence of the spontaneous collapse of the wave function. This property allows us to set experimental bounds on their parameters. We consider an ultrasoft magnetically tipped nanocantilever cooled to millikelvin temperature. The thermal noise of the cantilever fundamental mode has been accurately estimated in the range 0.03 – 1 K, and any other excess noise is found to be negligible within the experimental uncertainty. From the measured data and the cantilever geometry, we estimate the upper bound on the continuous spontaneous localization collapse rate in a wide range of the correlation length rC. Our upper bound improves significantly previous constraints for r_C > 10^−6  m, and partially excludes the enhanced collapse rate suggested by Adler. We discuss future improvements.openopenVinante, A.; Bahrami, M.; Bassi, A.; Usenko, O.; Wijts, G.; Oosterkamp, T.H.Vinante, A.; Bahrami, Mohammad; Bassi, Angelo; Usenko, O.; Wijts, G.; Oosterkamp, T. H

    A novel variant of SLC26A4 and first report of the c.716T>A variant in Iranian pedigrees with non-syndromic sensorineural hearing loss

    Get PDF
    The autosomal recessive non-syndromic hearing loss (ARNSHL) can be associated with variants in solute carrier family 26, member 4 (SLC26A4) gene and is the second most common cause of ARNSHL worldwide. Therefore, this study aims to determine the contribution of the SLC26A4 genotype in the hearing loss (HL) of 40 ARNSHL pedigrees in Iran. A cohort of the 40 Iranian pedigrees with ARNSHL, having no mutation in the GJB2 gene, was selected. The linkage analysis with five short tandem repeat (STR) markers linked to SLC26A4 was performed for the 40 ARNSHL pedigrees. Then, two out of the 40 pedigrees with ARNSHL that linked to DFNB4 locus were further screened to determine the variants in all exons of SLC26A4 gene by direct DNA sequencing. The 21 exons of SCL26A4 were analyzed for the two pedigrees. A known variant (c.716T>A homozygote), it is the first reported incidence in Iran, a novel variant (c.493A>C homozygote) were detected in the two pedigrees and pathogenesis of c.493A>C confirmed in this study with review 100 hearing ethnically matched controls by PCR-RFLP analysis. The present study suggests that the SLC26A4 gene plays a crucial role in the HL occurring in Iranian pedigrees. Also, the results probably support the specificity and unique spectrum of SLC26A4 variants among Iranian HL patients. Molecular study of SLC26A4 gene may lead to elucidation of the profile of the population-specific variants which has importance in diagnostics of HL
    corecore