4,980 research outputs found
The Bradford & Airedale Health of Men initiative: a study of its effectiveness in engaging with men
The Health of Men (HoM) network received funding from the Big Lottery Fund in 2003 to establish a five year programme of dedicated work with men and boys. This enabled a team of practitioners to be creative and to build upon their existing skills to generate models of working with those men in the community that are usually seen as hard to reach. The research which has accompanied of the work of team has explored why men use these new services and has demonstrated the following: • Men do care about their health • Men are willing and able to engage with their health when services are tailored to their needs • Men from different culture groups and socio-economic backgrounds who are normally seen as hard to reach were accessed. • A model encompassing a dedicated team working with men is worthy of further development Much has been learnt from this project that has great relevance to the local Primary Care Trust (PCT), but has also proved a great source of information for the development of services to men on a Regional, National and International level
Cotreatment with a novel phosphoinositide analogue inhibitor and carmustine enhances chemotherapeutic efficacy by attenuating AKT activity in gliomas
Keyword-Based Delegable Proofs of Storage
Cloud users (clients) with limited storage capacity at their end can
outsource bulk data to the cloud storage server. A client can later access her
data by downloading the required data files. However, a large fraction of the
data files the client outsources to the server is often archival in nature that
the client uses for backup purposes and accesses less frequently. An untrusted
server can thus delete some of these archival data files in order to save some
space (and allocate the same to other clients) without being detected by the
client (data owner). Proofs of storage enable the client to audit her data
files uploaded to the server in order to ensure the integrity of those files.
In this work, we introduce one type of (selective) proofs of storage that we
call keyword-based delegable proofs of storage, where the client wants to audit
all her data files containing a specific keyword (e.g., "important"). Moreover,
it satisfies the notion of public verifiability where the client can delegate
the auditing task to a third-party auditor who audits the set of files
corresponding to the keyword on behalf of the client. We formally define the
security of a keyword-based delegable proof-of-storage protocol. We construct
such a protocol based on an existing proof-of-storage scheme and analyze the
security of our protocol. We argue that the techniques we use can be applied
atop any existing publicly verifiable proof-of-storage scheme for static data.
Finally, we discuss the efficiency of our construction.Comment: A preliminary version of this work has been published in
International Conference on Information Security Practice and Experience
(ISPEC 2018
Avalanche analysis from multi-electrode ensemble recordings in cat, monkey and human cerebral cortex during wakefulness and sleep
Self-organized critical states are found in many natural systems, from
earthquakes to forest fires, they have also been observed in neural systems,
particularly, in neuronal cultures. However, the presence of critical states in
the awake brain remains controversial. Here, we compared avalanche analyses
performed on different in vivo preparations during wakefulness, slow-wave sleep
and REM sleep, using high-density electrode arrays in cat motor cortex (96
electrodes), monkey motor cortex and premotor cortex and human temporal cortex
(96 electrodes) in epileptic patients. In neuronal avalanches defined from
units (up to 160 single units), the size of avalanches never clearly scaled as
power-law, but rather scaled exponentially or displayed intermediate scaling.
We also analyzed the dynamics of local field potentials (LFPs) and in
particular LFP negative peaks (nLFPs) among the different electrodes (up to 96
sites in temporal cortex or up to 128 sites in adjacent motor and pre-motor
cortices). In this case, the avalanches defined from nLFPs displayed power-law
scaling in double log representations, as reported previously in monkey.
However, avalanche defined as positive LFP (pLFP) peaks, which are less
directly related to neuronal firing, also displayed apparent power-law scaling.
Closer examination of this scaling using more reliable cumulative distribution
functions (CDF) and other rigorous statistical measures, did not confirm
power-law scaling. The same pattern was seen for cats, monkey and human, as
well as for different brain states of wakefulness and sleep. We also tested
other alternative distributions. Multiple exponential fitting yielded optimal
fits of the avalanche dynamics with bi-exponential distributions. Collectively,
these results show no clear evidence for power-law scaling or self-organized
critical states in the awake and sleeping brain of mammals, from cat to man.Comment: In press in: Frontiers in Physiology, 2012, special issue "Critical
Brain Dynamics" (Edited by He BY, Daffertshofer A, Boonstra TW); 33 pages, 13
figures. 3 table
HardIDX: Practical and Secure Index with SGX
Software-based approaches for search over encrypted data are still either
challenged by lack of proper, low-leakage encryption or slow performance.
Existing hardware-based approaches do not scale well due to hardware
limitations and software designs that are not specifically tailored to the
hardware architecture, and are rarely well analyzed for their security (e.g.,
the impact of side channels). Additionally, existing hardware-based solutions
often have a large code footprint in the trusted environment susceptible to
software compromises. In this paper we present HardIDX: a hardware-based
approach, leveraging Intel's SGX, for search over encrypted data. It implements
only the security critical core, i.e., the search functionality, in the trusted
environment and resorts to untrusted software for the remainder. HardIDX is
deployable as a highly performant encrypted database index: it is logarithmic
in the size of the index and searches are performed within a few milliseconds
rather than seconds. We formally model and prove the security of our scheme
showing that its leakage is equivalent to the best known searchable encryption
schemes. Our implementation has a very small code and memory footprint yet
still scales to virtually unlimited search index sizes, i.e., size is limited
only by the general - non-secure - hardware resources
The Discovery of Argon in Comet C/1995 O1 (Hale-Bopp)
On 30.14 March 1997 we observed the EUV spectrum of the bright comet C/1995
O1 (Hale-Bopp) at the time of its perihelion, using our EUVS sounding rocket
telescope/spectrometer. The spectra reveal the presence H Ly beta, O+, and,
most notably, Argon. Modelling of the retrieved Ar production rates indicates
that comet Hale-Bopp is enriched in Ar relative to cosmogonic expectations.
This in turn indicates that Hale-Bopp's deep interior has never been exposed to
the 35-40 K temperatures necessary to deplete the comet's primordial argon
supply.Comment: 9 pages, 2 figures. ApJ, 545, in press (2000
Linking Development Interventions to Conservation: Perspectives From Partners in the International Gorilla Conservation Programme
A Suborbital Payload for Soft X-ray Spectroscopy of Extended Sources
We present a suborbital rocket payload capable of performing soft X-ray
spectroscopy on extended sources. The payload can reach resolutions of
~100(lambda/dlambda) over sources as large as 3.25 degrees in diameter in the
17-107 angstrom bandpass. This permits analysis of the overall energy balance
of nearby supernova remnants and the detailed nature of the diffuse soft X-ray
background. The main components of the instrument are: wire grid collimators,
off-plane grating arrays and gaseous electron multiplier detectors. This
payload is adaptable to longer duration orbital rockets given its comparatively
simple pointing and telemetry requirements and an abundance of potential
science targets.Comment: Accepted to Experimental Astronomy, 12 pages plus 1 table and 17
figure
- …
