268 research outputs found

    Mesospheric Response to Impacting Relativistic Electrons

    Get PDF
    Daily maps of the spatial distributions of precipitating energetic electrons were produced for the period 10-20 May 1992. These data will serve as the input for potential changes in upper atmosphere composition

    The Mimas Ghost Revisited: An Analysis of the Electron Flux and Electron Microsignatures Observed in the Vicinity of Mimas at Saturn

    Get PDF
    An analysis of the electron absorption signature observed by the Cosmic Ray System on Voyager 2 near the orbit of Mimas is presented. We find that these observations cannot be explained as the absorption signature of Mimas. Combining Pioneer 11 and Voyager 2 measurements of the electron flux at Mimas's orbit (L = 3.1), we find an electron spectrum where most of the flux above ∼100 keV is concentrated near 1 to 3 MeV. This spectral form is qualitatively consistent with the band-pass filter model of Van Allen et al. (1980b). The expected Mimas absorption signature is calculated from this spectrum neglecting radial diffusion. Since no Mimas absorption signature was observed in the inbound Voyager 2 data, a lower limit on the diffusion coefficient for MeV electrons at L = 3.1 of D > 10^(−8) R_s^² s^(−1) is obtained. With a diffusion coefficient this large, both the Voyager 2 and the Pioneer 11 small-scale electron absorption signature observations in Mimas's orbit are enigmatic. Thus we refer to the mechanism for producing these signatures as the Mimas ghost. A cloud of material in orbit with Mimas may account for the observed electron signature if the cloud is at least 1% opaque to electrons across a region extending over a few hundred kilometers

    Whose Rights Are They, Anyway?

    Get PDF
    The authors discuss sovereignty and the history behind a nation’s prerogative to intercede in the affairs of other nations to protect human rights

    Facebook marketing for a direct selling company

    Get PDF
    The purpose of the thesis was to provide recommendations for how the studied company could improve their Facebook marketing activities. The company was the Danish subsidiary of an multinational direct selling company of health and beauty products. The following research questions were devised: 1) What are the constraints and challenges for LR Denmark’s facebook marketing as a subsidiary of a Multinational Corporation and as a Direct Selling Company? 2) How can LR Denmark improve their facebook marketing to gain more visits, page likes and social engagement on their Facebook brand page? 3) How can the LR resellers and their sales and recruitment efforts be supported with LR Denmark's facebook activities? LR Denmark must conduct their facebook marketing in a way that reflects the brand identity, but communication should be adapted slightly due to cultural differences. It was also found that there are challenges in maintaining a clear brand expression in Facebook, due to the large number of facebook brand pages run by the companys customers, also termed resellers, and it was recommended to communicate directions and guidelines for resellers on how they should use Facebook for their LR business. Resellers that do use facebook for their business are particularly interested in sharing what LR Denmark publishes on their facebook page, if they find it visually appealing or if it provides usefull information about products, so LR Denmark should publish more high quality visual content for the resellers to share, and should focus on communicating product benefits. It was found that many of the customers did not know the Facebook page existed. As this unawareness limits the number of potential visits and also the amount of potential engagement on the page, it was recommended that the company uses the paid marketing options in facebook and channels outside Facebook in order to promote awareness of the page

    Preserving Both Privacy and Utility in Network Trace Anonymization

    Full text link
    As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive information, e.g., network and system configuration, which may potentially be exploited for attacks. In cases where data owners are convinced to share their network traces, the data are typically subjected to certain anonymization techniques, e.g., CryptoPAn, which replaces real IP addresses with prefix-preserving pseudonyms. However, most such techniques either are vulnerable to adversaries with prior knowledge about some network flows in the traces, or require heavy data sanitization or perturbation, both of which may result in a significant loss of data utility. In this paper, we aim to preserve both privacy and utility through shifting the trade-off from between privacy and utility to between privacy and computational cost. The key idea is for the analysts to generate and analyze multiple anonymized views of the original network traces; those views are designed to be sufficiently indistinguishable even to adversaries armed with prior knowledge, which preserves the privacy, whereas one of the views will yield true analysis results privately retrieved by the data owner, which preserves the utility. We present the general approach and instantiate it based on CryptoPAn. We formally analyze the privacy of our solution and experimentally evaluate it using real network traces provided by a major ISP. The results show that our approach can significantly reduce the level of information leakage (e.g., less than 1\% of the information leaked by CryptoPAn) with comparable utility

    Direct and Correlated Responses to Selection for Increased Weaning and Yearling Weights in Hereford Cattle

    Get PDF
    Animal Breedin

    Productivity of Two-year-old Crossbred Cows Producing Three-breed Cross Calves

    Get PDF
    Animal Scienc

    Five-coloring graphs on the Klein bottle

    Get PDF
    We exhibit an explicit list of nine graphs such that a graph drawn in the Klein bottle is 5-colorable if and only if it has no subgraph isomorphic to a member of the list.Comment: 40 pages, 7 figure

    Efficient Fuzzy Search on Encrypted Data

    Get PDF
    We study the problem of efficient (sub-linear) fuzzy search on encrypted outsourced data, in the symmetric-key setting. In particular, a user who stores encrypted data on a remote untrusted server forms queries that enable the server to efficiently locate the records containing the requested keywords, even though the user may misspell keywords or provide noisy data in the query. We define an appropriate primitive for a general \emph{closeness} function on the message space that we call \emph{efficiently fuzzy-searchable encryption} (\emph{EFSE}). Next we identify an optimal security notion for EFSE. We demonstrate that existing schemes do not meet our security definition and propose a new scheme that we prove secure under basic assumptions. Unfortunately, the scheme requires large ciphertext length, but we show that, in a sense, this space-inefficiency is unavoidable for a general, optimally-secure scheme. Seeking the right balance between efficiency and security, we then show how to construct schemes that are more efficient and satisfy a weaker security notion that we propose. To illustrate, we present and analyze a more space-efficient scheme for supporting fuzzy search on biometric data that achieves the weaker notion
    • …
    corecore