268 research outputs found
Mesospheric Response to Impacting Relativistic Electrons
Daily maps of the spatial distributions of precipitating energetic electrons were produced for the period 10-20 May 1992. These data will serve as the input for potential changes in upper atmosphere composition
The Mimas Ghost Revisited: An Analysis of the Electron Flux and Electron Microsignatures Observed in the Vicinity of Mimas at Saturn
An analysis of the electron absorption signature observed by the Cosmic Ray System on Voyager 2 near the orbit of Mimas is presented. We find that these observations cannot be explained as the absorption signature of Mimas. Combining Pioneer 11 and Voyager 2 measurements of the electron flux at Mimas's orbit (L = 3.1), we find an electron spectrum where most of the flux above ∼100 keV is concentrated near 1 to 3 MeV. This spectral form is qualitatively consistent with the band-pass filter model of Van Allen et al. (1980b). The expected Mimas absorption signature is calculated from this spectrum neglecting radial diffusion. Since no Mimas absorption signature was observed in the inbound Voyager 2 data, a lower limit on the diffusion coefficient for MeV electrons at L = 3.1 of D > 10^(−8) R_s^² s^(−1) is obtained. With a diffusion coefficient this large, both the Voyager 2 and the Pioneer 11 small-scale electron absorption signature observations in Mimas's orbit are enigmatic. Thus we refer to the mechanism for producing these signatures as the Mimas ghost. A cloud of material in orbit with Mimas may account for the observed electron signature if the cloud is at least 1% opaque to electrons across a region extending over a few hundred kilometers
Whose Rights Are They, Anyway?
The authors discuss sovereignty and the history behind a nation’s prerogative to intercede in the affairs of other nations to protect human rights
Facebook marketing for a direct selling company
The purpose of the thesis was to provide recommendations for how the studied company could improve their Facebook marketing activities. The company was the Danish subsidiary of an multinational direct selling company of health and beauty products. The following research questions were devised:
1) What are the constraints and challenges for LR Denmark’s facebook marketing as a subsidiary of a Multinational Corporation and as a Direct Selling Company?
2) How can LR Denmark improve their facebook marketing to gain more visits, page likes and social engagement on their Facebook brand page?
3) How can the LR resellers and their sales and recruitment efforts be supported with LR Denmark's facebook activities?
LR Denmark must conduct their facebook marketing in a way that reflects the brand identity, but communication should be adapted slightly due to cultural differences. It was also found that there are challenges in maintaining a clear brand expression in Facebook, due to the large number of facebook brand pages run by the companys customers, also termed resellers, and it was recommended to communicate directions and guidelines for resellers on how they should use Facebook for their LR business. Resellers that do use facebook for their business are particularly interested in sharing what LR Denmark publishes on their facebook page, if they find it visually appealing or if it provides usefull information about products, so LR Denmark should publish more high quality visual content for the resellers to share, and should focus on communicating product benefits. It was found that many of the customers did not know the Facebook page existed. As this unawareness limits the number of potential visits and also the amount of potential engagement on the page, it was recommended that the company uses the paid marketing options in facebook and channels outside Facebook in order to promote awareness of the page
Preserving Both Privacy and Utility in Network Trace Anonymization
As network security monitoring grows more sophisticated, there is an
increasing need for outsourcing such tasks to third-party analysts. However,
organizations are usually reluctant to share their network traces due to
privacy concerns over sensitive information, e.g., network and system
configuration, which may potentially be exploited for attacks. In cases where
data owners are convinced to share their network traces, the data are typically
subjected to certain anonymization techniques, e.g., CryptoPAn, which replaces
real IP addresses with prefix-preserving pseudonyms. However, most such
techniques either are vulnerable to adversaries with prior knowledge about some
network flows in the traces, or require heavy data sanitization or
perturbation, both of which may result in a significant loss of data utility.
In this paper, we aim to preserve both privacy and utility through shifting the
trade-off from between privacy and utility to between privacy and computational
cost. The key idea is for the analysts to generate and analyze multiple
anonymized views of the original network traces; those views are designed to be
sufficiently indistinguishable even to adversaries armed with prior knowledge,
which preserves the privacy, whereas one of the views will yield true analysis
results privately retrieved by the data owner, which preserves the utility. We
present the general approach and instantiate it based on CryptoPAn. We formally
analyze the privacy of our solution and experimentally evaluate it using real
network traces provided by a major ISP. The results show that our approach can
significantly reduce the level of information leakage (e.g., less than 1\% of
the information leaked by CryptoPAn) with comparable utility
Direct and Correlated Responses to Selection for Increased Weaning and Yearling Weights in Hereford Cattle
Animal Breedin
Five-coloring graphs on the Klein bottle
We exhibit an explicit list of nine graphs such that a graph drawn in the
Klein bottle is 5-colorable if and only if it has no subgraph isomorphic to a
member of the list.Comment: 40 pages, 7 figure
Efficient Fuzzy Search on Encrypted Data
We study the problem of efficient (sub-linear) fuzzy search on encrypted outsourced data, in the symmetric-key setting. In particular, a user who stores encrypted data on a remote untrusted server forms queries that enable the server to efficiently locate the records containing the requested keywords, even though the user may misspell keywords or provide noisy data in the query. We define an appropriate primitive for a general \emph{closeness} function on the message space that we call \emph{efficiently fuzzy-searchable encryption} (\emph{EFSE}).
Next we identify an optimal security notion for EFSE. We demonstrate that existing schemes do not meet our security definition and propose a new scheme that we prove secure under basic assumptions. Unfortunately, the scheme requires large ciphertext length, but we show that, in a sense, this space-inefficiency is unavoidable for a general, optimally-secure scheme.
Seeking the right balance between efficiency and security, we then show how to construct schemes that are more efficient and satisfy a weaker security notion that we propose. To illustrate, we present and analyze a more space-efficient scheme for supporting fuzzy search on biometric data that achieves the weaker notion
- …