1,169 research outputs found

    Usable Authentication for Mobile Banking

    Get PDF
    Mobile banking is attractive because it allows people to do banking anytime, anywhere. One of the requirements of performing a mobile banking transaction is that users are required to login before use. The current mobile banking login method is PIN authentication; however, results from other research studies have found that there are usability concerns of using PINs. To overcome some of the concerns, researchers have suggested the use graphical passwords. In this research, we argue that another alternative input technique can be utilized. We explore a novel password input approach, called gesture passwords, of using 3-dimensional discrete gesture motions as password elements. As a result, three systems (PINs, graphical passwords and gesture passwords) were compared. This dissertation describes the design of two mobile authentication techniques: combinational graphical passwords and gesture passwords. These systems were implemented as prototypes. The prototypes along with a PIN authenticator were evaluated with users. User experience and password retention were evaluated to determine the usability and users’ acceptance of each system. Experiments were conducted to evaluate the above. Results from the experiments show that users were able to use all of the testing systems; however, the results reveal that users are more proficient and preferred to use PINs for mobile banking authentication than the other two systems

    Security of Mobile Banking

    Get PDF
    Mobile banking is attractive because it is a convenient approach to perform remote banking, but there are security shortfalls in the present mobile banking implementations. This paper discusses some of these security shortfalls, such as security problems with GSM network, SMS/GPRS protocols and security problems with current banks’ mobile banking solutions. This paper discusses the SMS and GPRS proposed solutions for these problems. The results from these proposed solutions have proven to provide secure and economic communications between the mobile application and the bank servers.The proposed solutions allow the users to bank using secure SMS and GPRS

    Structural basis of dimerization and nucleic acid binding of human DBHS proteins NONO and PSPC1.

    Full text link
    The Drosophila behaviour/human splicing (DBHS) proteins are a family of RNA/DNA binding cofactors liable for a range of cellular processes. DBHS proteins include the non-POU domain-containing octamer-binding protein (NONO) and paraspeckle protein component 1 (PSPC1), proteins capable of forming combinatorial dimers. Here, we describe the crystal structures of the human NONO and PSPC1 homodimers, representing uncharacterized DBHS dimerization states. The structures reveal a set of conserved contacts and structural plasticity within the dimerization interface that provide a rationale for dimer selectivity between DBHS paralogues. In addition, solution X-ray scattering and accompanying biochemical experiments describe a mechanism of cooperative RNA recognition by the NONO homodimer. Nucleic acid binding is reliant on RRM1, and appears to be affected by the orientation of RRM1, influenced by a newly identified 'β-clasp' structure. Our structures shed light on the molecular determinants for DBHS homo- and heterodimerization and provide a basis for understanding how DBHS proteins cooperatively recognize a broad spectrum of RNA targets

    Code-level model checking in the software development workflow at Amazon Web Services

    Get PDF
    This article describes a style of applying symbolic model checking developed over the course of four years at Amazon Web Services (AWS). Lessons learned are drawn from proving properties of numerous C‐based systems, for example, custom hypervisors, encryption code, boot loaders, and an IoT operating system. Using our methodology, we find that we can prove the correctness of industrial low‐level C‐based systems with reasonable effort and predictability. Furthermore, AWS developers are increasingly writing their own formal specifications. As part of this effort, we have developed a CI system that allows integration of the proofs into standard development workflows and extended the proof tools to provide better feedback to users. All proofs discussed in this article are publicly available on GitHub

    TGF-beta(2)- and H2O2-Induced Biological Changes in Optic Nerve Head Astrocytes Are Reduced by the Antioxidant Alpha-Lipoic Acid

    Get PDF
    Background/Aims: The goal of the present study was to determine whether transforming growth factor-beta(2) (TGF-beta(2))- and oxidative stress-induced cellular changes in cultured human optic nerve head (ONH) astrocytes could be reduced by pretreatment with the antioxidant alpha-lipoic acid (LA). Methods: Cultured ONH astrocytes were treated with 1.0 ng/ml TGF-beta(2) for 24 h or 200 mu M hydrogen peroxide (H2O2) for 1 h. Lipid peroxidation was measured by a decrease in cis-pari-naric acid fluorescence. Additionally, cells were pretreated with different concentrations of LA before TGF-beta 2 or H2O2 exposure. Expressions of the heat shock protein (Hsp) alpha B-crystallin and Hsp27, the extracellular matrix (ECM) component fibronectin and the ECM-modulating protein connective tissue growth factor (CTGF) were examined with immunohistochemistry and real-time PCR analysis. Results: Both TGF-beta(2) and H2O2 increased lipid peroxidation. Treatment of astrocytes with TGF-beta(2) and H2O2 upregulated the expression of alpha B-crystallin, Hsp27, fibronectin and CTGF. Pretreatment with different concentrations of LA reduced the TGF-beta(2)- and H2O2-stimulated gene expressions. Conclusion: We showed that TGF-beta(2)- and H2O2-stimulated gene expressions could be prevented by pretreatment with the antioxidant LA in cultured human ONH astrocytes. Therefore, it is tempting to speculate that the use of antioxidants could have protective effects in glaucomatous optic neuropathy. Copyright (C) 2012 S. Karger AG, Base

    A possible method for non-Hermitian and non-PTPT-symmetric Hamiltonian systems

    Full text link
    A possible method to investigate non-Hermitian Hamiltonians is suggested through finding a Hermitian operator Ρ+\eta_+ and defining the annihilation and creation operators to be Ρ+\eta_+-pseudo-Hermitian adjoint to each other. The operator Ρ+\eta_+ represents the Ρ+\eta_+-pseudo-Hermiticity of Hamiltonians. As an example, a non-Hermitian and non-PTPT-symmetric Hamiltonian with imaginary linear coordinate and linear momentum terms is constructed and analyzed in detail. The operator Ρ+\eta_+ is found, based on which, a real spectrum and a positive-definite inner product, together with the probability explanation of wave functions, the orthogonality of eigenstates, and the unitarity of time evolution, are obtained for the non-Hermitian and non-PTPT-symmetric Hamiltonian. Moreover, this Hamiltonian turns out to be coupled when it is extended to the canonical noncommutative space with noncommutative spatial coordinate operators and noncommutative momentum operators as well. Our method is applicable to the coupled Hamiltonian. Then the first and second order noncommutative corrections of energy levels are calculated, and in particular the reality of energy spectra, the positive-definiteness of inner products, and the related properties (the probability explanation of wave functions, the orthogonality of eigenstates, and the unitarity of time evolution) are found not to be altered by the noncommutativity.Comment: 15 pages, no figures; v2: clarifications added; v3: 16 pages, 1 figure, clarifications made clearer; v4: 19 pages, the main context is completely rewritten; v5: 25 pages, title slightly changed, clarifications added, the final version to appear in PLOS ON

    ISRM-Suggested Method for Determining the Mode I Static Fracture Toughness Using Semi-Circular Bend Specimen

    Get PDF
    The International Society for Rock Mechanics has so far developed two standard methods for the determination of static fracture toughness of rock. They used three different core based specimens and tests were to be performed on a typical laboratory compression or tension load frame. Another method to determine the mode I fracture toughness of rock using semicircular bend specimen is herein presented. The specimen is semicircular in shape and made from typical cores taken from the rock with any relative material directions noted. The specimens are tested in three-point bending using a laboratory compression test instrument. The failure load along with its dimensions is used to determine the fracture toughness. Most sedimentary rocks which are layered in structure may exhibit fracture properties that depend on the orientation and therefore measurements in more than one material direction may be necessary. The fracture toughness measurements are expected to yield a size-independent material property if certain minimum specimen size requirements are satisfied

    Human hippocampal CA3 damage disrupts both recent and remote episodic memories

    Get PDF
    Neocortical-hippocampal interactions support new episodic (event) memories, but there is conflicting evidence about the dependence of remote episodic memories on the hippocampus. In line with systems consolidation and computational theories of episodic memory, evidence from model organisms suggests that the cornu ammonis 3 (CA3) hippocampal subfield supports recent, but not remote, episodic retrieval. In this study, we demonstrated that recent and remote memories were susceptible to a loss of episodic detail in human participants with focal bilateral damage to CA3. Graph theoretic analyses of 7.0-Tesla resting-state fMRI data revealed that CA3 damage disrupted functional integration across the medial temporal lobe (MTL) subsystem of the default network. The loss of functional integration in MTL subsystem regions was predictive of autobiographical episodic retrieval performance. We conclude that human CA3 is necessary for the retrieval of episodic memories long after their initial acquisition and functional integration of the default network is important for autobiographical episodic memory performance

    Health-state utilities in a prisoner population : a cross-sectional survey

    Get PDF
    Background: Health-state utilities for prisoners have not been described. Methods: We used data from a 1996 cross-sectional survey of Australian prisoners (n = 734). Respondent-level SF-36 data was transformed into utility scores by both the SF-6D and Nichol's method. Socio-demographic and clinical predictors of SF-6D utility were assessed in univariate analyses and a multivariate general linear model. Results: The overall mean SF-6D utility was 0.725 (SD 0.119). When subdivided by various medical conditions, prisoner SF-6D utilities ranged from 0.620 for angina to 0.764 for those with none/mild depressive symptoms. Utilities derived by the Nichol's method were higher than SF-6D scores, often by more than 0.1. In multivariate analysis, significant independent predictors of worse utility included female gender, increasing age, increasing number of comorbidities and more severe depressive symptoms. Conclusion: The utilities presented may prove useful for future economic and decision models evaluating prison-based health programs
    • …
    corecore