558 research outputs found

    Long Memory in Earthquake Time Series: The Case Study of the Geysers Geothermal Field.

    Get PDF
    The present study aims at proving the existence of long memory (or long-range dependence) in the earthquake process through the analysis of time series of induced seismicity. Specifically, we apply alternative statistical techniques borrowed from econometrics to the seismic catalog of The Geysers geothermal field (California), the world’s largest geothermal field. The choice of the study area is essentially guided by the completeness of the seismic catalog at smaller magnitudes (a drawback of conventional catalogs of natural seismicity). Contrary to previous studies, where the long-memory property was examined by using non-parametric approaches (e.g., rescaled range analysis), we assume a fractional integration model for which the degree of memory is defined by a real parameter d, which is related to the best known Hurst exponent. In particular, long-memory behavior is observed for d > 0. We estimate and test the value of d (i.e., the hypothesis of long memory) by applying parametric, semi-parametric, and non-parametric approaches to time series describing the daily number of earthquakes and the logarithm of the (total) seismic moment released per day. Attention is also paid to examining the sensitivity of the results to the uncertainty in the completeness magnitude of the catalog, and to investigating to what extent temporal fluctuations in seismic activity induced by injection operations affect the value of d. Temporal variations in the values of d are analyzed together with those of the b-value of the Gutenberg and Richter law. Our results indicate strong evidence of long memory, with d mostly constrained between 0 and 0.5. We observe that the value of d tends to decrease with increasing the magnitude completeness threshold, and therefore appears to be influenced by the number of information in the chain of intervening related events. Moreover, we find a moderate but significant negative correlation between d and the b-value. A negative, albeit weaker correlation is found between d and the fluid injection, as well as between d and the annual number of earthquakes.post-print4396 K

    Journey through crohn’s disease complication: From fistula formation to future therapies

    Get PDF
    Crohn’s Disease (CD) is a chronic inflammatory disorder in which up to 50% of patients develop fistula within 20 years after the initial diagnosis, and half of these patients suffer perianal fistulizing disease. The etiopathogenesis of CD-related perianal fistula is still unclear, and its phe-notypical and molecular characteristics are even more indefinite. A better understanding would be crucial to develop targeted and more effective therapeutic strategies. At present, the most accredited theory for the formation of CD-related fistula identifies the epithelial-to-mesenchymal transition (EMT) as the driving force. It has been well recognized that CD carries an increased risk of malig-nancy, particularly mucinous adenocarcinoma is often associated with long-standing fistula in CD patients. Despite the availability of multiple treatment options, perianal fistulizing CD represents a therapeutic challenge and is associated with an important impact on patients’ quality of life. To date, the most effective management is multidisciplinary with the cooperation of gastroenterologists, surgeons, radiologists, and nutritionists and the best recommended treatment is a combination of medical and surgical approaches

    MaMaDroid: Detecting Android malware by building markov chains of behavioral models (extended version)

    Get PDF
    As Android has become increasingly popular, so has malware targeting it, thus motivating the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard to design robust tools that can operate for long periods of time without the need for modifications or costly re-training. Aiming to address this issue, we set to detect malware from a behavioral point of view, modeled as the sequence of abstracted API calls. We introduce MaMaDroid, a static-analysis based system that abstracts app’s API calls to their class, package, or family, and builds a model from their sequences obtained from the call graph of an app as Markov chains. This ensures that the model is more resilient to API changes and the features set is of manageable size. We evaluate MaMaDroid using a dataset of 8.5K benign and 35.5K malicious apps collected over a period of six years, showing that it effectively detects malware (with up to 0.99 F-measure) and keeps its detection capabilities for long periods of time (up to 0.87 F-measure two years after training). We also show that MaMaDroid remarkably overperforms DroidAPIMiner, a state-of-the-art detection system that relies on the frequency of (raw) API calls. Aiming to assess whether MaMaDroid’s effectiveness mainly stems from the API abstraction or from the sequencing modeling, we also evaluate a variant of it that uses frequency (instead of sequences), of abstracted API calls. We find that it is not as accurate, failing to capture maliciousness when trained on malware samples that include API calls that are equally or more frequently used by benign apps

    Behavior or culture? Investigating the use of cryptocurrencies for electronic commerce across the USA and China

    Get PDF
    Purpose This paper claims to identify the behavioral and cultural features that push to use, or not, cryptocurrencies for electronic commerce. Indeed, despite the use of cryptocurrencies for electronic commerce spreading worldwide at a fast and growing pace, there are supporters and detractors among their users. The analysis of what distinguish these two groups of users is fundamental for understanding their different intention to use cryptocurrencies for electronic commerce. Design/methodology/approach A survey has been administered to 2,532 cryptocurrencies’ users across the USA and China, collecting data on their behavioral predispositions and cultural features. Results were then analyzed through structured equation modeling. Findings Results showed that while attitude, subjective norms, perceived behavioral control and herding behavior have a positive impact on the intention to use cryptocurrencies for electronic commerce, financial literacy has no influence. Cultural dimensions amplified or reduced the discovered relationships and caused different effects: positive for the USA and negative for China when considering illegal attitude and perceived risk. Originality/value Theory of planned behavior, financial behavior and cultural factors can, all together, represent a useful framework for envisioning the behavior of users in adopting cryptocurrencies for electronic commerce purposes through a test of all its elements. To the best of the authors’ knowledge, this is the first study considering behavior and cultural variables on the intention to use cryptocurrencies for electronic commerce as well as being the largest carried out, in terms of sample, on the cryptocurrency topic

    The influence of neighborhood characteristics on police officers\u27 encounters with persons suspected to have a serious mental illness

    Get PDF
    Objective: Police officers\u27 decisions and behaviors are impacted by the neighborhood context in which police encounters occur. For example, officers may use greater force and be more likely to make arrests in disadvantaged neighborhoods. We examined whether neighborhood characteristics influence police encounters with individuals suspected to have a serious mental illness, addictive disorder, or developmental disability. Method: We obtained data on 916 encounters from 166 officers in six jurisdictions in Georgia, USA and abstracted geographical data pertaining to the location of these encounters from United States Decennial Census data. Encounters were nested within 163 census tracts. Officer-reported data covered general encounter characteristics, the officer\u27s perception of the subject\u27s condition, subject demographics, use of force, and disposition of the encounter (e.g., arrest v. referral or transport to treatment services). Geographical data included 17 variables representing population and housing characteristics of the census tracts, from which three indices pertaining to neighborhood income, stability, and immigration status were derived using factor-analytic techniques. We then examined associations of these indices with various encounter-related variables using multi-level analysis. Results: Encounters taking place in higher-income and higher-stability census tracts were more likely to be dispatch-initiated and take place in a private home compared to those in lower-income and lower-stability neighborhoods. In higher-income neighborhoods, encounters were more likely to involve a subject suspected to have a mental illness (as opposed to an addictive disorder or developmental disability) and less likely to involve a subject suspected to have alcohol problems. The officer\u27s level of force used was not associated with neighborhood factors. Regarding disposition, although the likelihood of arrest was unrelated to neighborhood characteristics, encounters taking place in higher-immigrant neighborhoods were more likely to result in referral or transport to services than those in lower-immigrant neighborhoods. Conclusion: Neighborhood characteristics are important to consider in research on police interactions with individuals with serious mental illnesses, addictive disorders, or developmental disabilities. Such research could inform departmental training policies and procedures based on the needs of the jurisdictions served. (C) 2014 Elsevier Ltd. All rights reserved

    Flexible and Robust Privacy-Preserving Implicit Authentication

    Full text link
    Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.). While implicit authentication makes identity theft by third parties more difficult, it requires the server to learn and store the user's usage profile. Recently, the first privacy-preserving implicit authentication system was presented, in which the server does not learn the user's profile. It uses an ad hoc two-party computation protocol to compare the user's fresh sampled features against an encrypted stored user's profile. The protocol requires storing the usage profile and comparing against it using two different cryptosystems, one of them order-preserving; furthermore, features must be numerical. We present here a simpler protocol based on set intersection that has the advantages of: i) requiring only one cryptosystem; ii) not leaking the relative order of fresh feature samples; iii) being able to deal with any type of features (numerical or non-numerical). Keywords: Privacy-preserving implicit authentication, privacy-preserving set intersection, implicit authentication, active authentication, transparent authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May 26-28, 2015, IFIP AICT, Springer, to appea

    Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information

    Get PDF
    The need for privacy-preserving sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. A typical setting involves two parties: one seeks information from the other without revealing the interest while the latter is either willing, or compelled, to share only the requested information. This poses two challenges: (1) how to enable sharing such that parties learn no information beyond what they are entitled to, and (2) how to do so efficiently, in real-world practical terms. This paper explores the notion of Privacy-Preserving Sharing of Sensitive Information (PPSSI), and provides a concrete and efficient instantiation, modeled in the context of simple database querying. Proposed approach functions as a privacy shield to protect parties from disclosing more than the required minimum of their respective sensitive information. PPSSI deployment prompts several challenges, which are addressed in this paper. Extensive experimental results attest to the practicality of attained privacy features and show that our approach incurs quite low overhead (e.g., 10% slower than standard MySQL). © 2011 Springer-Verlag

    Eriophyid mites in classical biological control of weeds: Progress and challenges

    Get PDF
    A classical biological control agent is an exotic host-specific natural enemy, which is intentionally introduced to obtain long-term control of an alien invasive species. Among the arthropods considered for this role, eriophyid mites are likely to possess the main attributes required: Host specificity, efficacy, and long-lasting effects. However, so far, only a few species have been approved for release. Due to their microscopic size and the general lack of knowledge regarding their biology and behavior, working with eriophyids is particularly challenging. Furthermore, mites disperse in wind, and little is known about biotic and abiotic constraints to their population growth. All these aspects pose challenges that, if not properly dealt with, can make it particularly difficult to evaluate eriophyids as prospective biological control agents and jeopardize the general success of control programs. We identified some of the critical aspects of working with eriophyids in classical biological control of weeds and focused on how they have been or may be addressed. In particular, we analyzed the importance of accurate mite identification, the difficulties faced in the evaluation of their host specificity, risk assessment of nontarget species, their impact on the weed, and the final steps of mite release and post-release monitoring

    Genome-wide analysis of Corsican population reveals a close affinity with Northern and Central Italy

    Get PDF
    Despite being the fourth largest island in the Mediterranean basin, the genetic variation of Corsica has not been explored as exhaustively as Sardinia, which is situated only 11 km South. However, it is likely that the populations of the two islands shared, at least in part, similar demographic histories. Moreover, the relative small size of the Corsica may have caused genetic isolation, which, in turn, might be relevant under medical and translational perspectives. Here we analysed genome wide data of 16 Corsicans, and integrated with newly (33 individuals) and previously generated samples from West Eurasia and North Africa. Allele frequency, haplotype-based, and ancient genome analyses suggest that although Sardinia and Corsica may have witnessed similar isolation and migration events, the latter is genetically closer to populations from continental Europe, such as Northern and Central Italians

    Creative and Stylistic Devices Employed by Children During a Storybook Narrative Task: A Cross-Cultural Study

    Get PDF
    Purpose: The purpose of this study was to analyze the effects of culture on the creative and stylistic features children employ when producing narratives based on wordless picture books. Method: Participants included 60 first- and second-grade African American, Latino American, and Caucasian children. A subset of narratives based on wordless picture books collected as part of a larger study was coded and analyzed for the following creative and stylistic conventions: organizational style (topic centered, linear, cyclical), dialogue (direct, indirect), reference to character relationships (nature, naming, conduct), embellishment (fantasy, suspense, conflict), and paralinguistic devices (expressive sounds, exclamatory utterances). Results: Many similarities and differences between ethnic groups were found. No significant differences were found between ethnic groups in organizational style or use of paralinguistic devices. African American children included more fantasy in their stories, Latino children named their characters more often, and Caucasian children made more references to the nature of character relationships. Conclusion: Even within the context of a highly structured narrative task based on wordless picture books, culture influences children’s production of narratives. Enhanced understanding of narrative structure, creativity, and style is necessary to provide ecologically valid narrative assessment and intervention for children from diverse cultural backgrounds
    • 

    corecore