103 research outputs found

    Gluino-mediated electroweak penguin with flavor-violating trilinear couplings

    Full text link
    In light of a discrepancy of the direct CPCP violation in KππK\to\pi\pi decays, ε/εK\varepsilon'/\varepsilon_K, we investigate gluino contributions to the electroweak penguin, where flavor violations are induced by squark trilinear couplings. Top-Yukawa contributions to ΔS=2\Delta S = 2 observables are taken into account, and vacuum stability conditions are evaluated in detail. It is found that this scenario can explain the discrepancy of ε/εK\varepsilon'/\varepsilon_K for the squark mass smaller than 5.6 TeV. We also show that the gluino contributions can amplify B(Kπνν)\mathcal{B}(K \to \pi \nu \overline{\nu}), B(KSμ+μ)eff\mathcal{B}(K_S \to \mu^+ \mu^-)_{\rm eff} and ΔACP(bsγ)\Delta A_{\rm CP}(b\to s\gamma). Such large effects could be measured in future experiments.Comment: 30 pages, 8 figures; references added, version published in JHE

    Detecting Android Malware by Analyzing Manifest Files

    Get PDF
    The threat of Android malware has increased owing to the increasingpopularity of smartphones. Once an Android smartphone is infected with malware, theuser suffers from various damages, such as the theft of personal information stored in thesmartphones, the unintentional sending of short messages to premium-rate numberswithout the user’s knowledge, and the ability for the infected smartphones to be remotelyoperated and used for other malicious attacks. However, there are currently insufficientdefense mechanisms against Android malware. This study proposes a new method todetect Android malware. The new method analyzes only manifest files that are required inAndroid applications. It realizes a lightweight approach for detection, and its effectivenessis experimentally confirmed by employing real samples of Android malware. The resultshows that the new method can effectively detect Android malware, even when thesample is unknown

    Discriminating DRDoS Packets using Time Interval Analysis

    Get PDF
    Distributed Reflection Denial of Service (DRDoS) attack is one of the critical security threats. As the attack generates unidirectional traffic, it is not easy for the targets of the attack to protect themselves. To mitigate the attack, we need a defense mechanism installed at backbone networks, i.e., detecting and blocking the attack traffic before they reach to the destinations. A conventional approach is to monitor the traffic volume of the attack, i.e., an attack is detected if the observed traffic volume exceeds a certain threshold. However, such a simple approach may not work when an attacker adjusts the traffic volume to evade the detection. This paper proposes a novel method that can detect the DRDoS attacks accurately. The key idea is to leverage the characteristics of time intervals between the packets. We make use of the K-means clustering algorithm to find the best threshold values used to distinguish packets associated with DRDoS attacks. We implement the proposed algorithm into an equipment at a data center and demonstrate that our approach attains high accuracy

    Intravenous infusion of cardiac progenitor cells in animal models of single ventricular physiology

    Get PDF
    OBJECTIVES: The goal of this study was to identify the practical applications of intravenous cell therapy for single-ventricle physiology (SVP) by establishing experimental SVP models. METHODS: An SVP with a three-stage palliation was constructed in an acute swine model without cardiopulmonary bypass. A modified Blalock–Taussig (MBT) shunt was created using an aortopulmonary shunt with the superior and inferior venae cavae (SVC and IVC, respectively) connected to the left atrium (n = 10). A bidirectional cavopulmonary shunt (BCPS) was constructed using a graft between the IVC and the left atrium with an SVC cavopulmonary connection (n = 10). The SVC and the IVC were connected to the pulmonary artery to establish a total cavopulmonary connection (TCPC, n = 10). The survival times of half of the animal models were studied. The other half and the biventricular sham control (n = 5) were injected intravenously with cardiosphere-derived cells (CDCs), and the cardiac retention of CDCs was assessed after 2 h. RESULTS: All SVP models died within 20 h. Perioperative mortality was higher in the BCPS group because of lower oxygen saturation (P  CONCLUSIONS: Without the total right heart exclusion, stage-specific SVP models can be functionally constructed in pigs with stable outcomes. Intravenous CDC injections may be applicable in patients with SVP before TCPC completion, given that the initial lung trafficking is efficiently bypassed and sufficient systemic blood flow is supplied from the single ventricle

    Transmission Control Method for Data Retention Taking into Account the Low Vehicle Density Environments

    Get PDF
    With the development and spread of Internet of Things (IoT) technology, various kinds of data are now being generated from IoT devices. Some data generated from IoT devices depend on geographical location and time, and we refer to them as spatio-temporal data (STD). Since the “locally produced and consumed” paradigm of STD use is effective for location-dependent applications, the authors have previously proposed a vehicle-based STD retention system. However, in low vehicle density environments, the data retention becomes difficult due to the decrease in the number of data transmissions in this method. In this paper, we propose a new data transmission control method for data retention in the low vehicle density environments

    Transmission Control Method to Realize Efficient Data Retention in Low Vehicle Density Environments

    Get PDF
    With the development and spread of Internet of Things (IoT) technology, various kinds of data are now being generated from IoT devices, and the number of such data is expected to increase significantly in the future. Data that depends on geographical location and time is commonly referred to as spatio-temporal data (STD). Since the “locally produced and consumed” paradigm of STD use is effective for location-dependent applications, the authors have previously proposed using a STD retention system for high mobility vehicles equipped with high-capacity storage modules, high-performance computing resources, and short-range wireless communication equipment. In this system, each vehicle controls its data transmission probability based on the neighboring vehicle density in order to achieve not only high coverage but also reduction of the number of data transmissions. In this paper, we propose a data transmission control method for STD retention in low vehicle density environments. The results of simulations conducted in this study show that our proposed scheme can improve data retention performance while limiting the number of data transmissions to the lowest level possible.11th International Conference on Intelligent Networking and Collaborative Systems(INCoS 2019), September 5-7, 2019, Oita, Japa

    Beacon-less Autonomous Transmission Control Method for Spatio-Temporal Data Retention

    Get PDF
    With the development and spread of Internet of Things (IoT) technology, the number of devices connected to the Internet is increasing, and various kinds of data are now being generated from IoT devices. Some data generated from IoT devices depends on geographical location and time. We refer to such data as spatio-temporal data (STD). Since the “local production and consumption” of STD is effective for location-dependent applications, we have proposed a STD retention system using vehicles equipped with storage modules, computing resources, and short-range wireless communication equipment. In this previous system, each vehicle controls the data transmission probability based on the neighboring vehicle density in order to achieve effective data retention. However, since the overhead of beacon messages required for estimation of the neighboring vehicle density becomes a critical problem with the increase in the number of vehicles, thereby preventing the effective data retention. In this paper, we propose a new data transmission control method to realize effective and reliable STD retention without beacon. Simulation results showed that our proposed scheme can achieve effective data retention.12th International Workshop on Information Network Design (WIND-2020), in conjunction with 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), August 31st - September 2nd, 2020, University of Victoria, Canada(新型コロナ感染拡大に伴い、現地開催中止

    Cnm of Streptococcus mutans is important for cell surface structure and membrane permeability

    Get PDF
    Streptococcus mutans, a Gram-positive facultative anaerobic bacterium, is a major pathogen of dental caries. The protein Cnm of S. mutans is involved in collagen binding, but its other biological functions are unknown. In this study, a Cnm-deficient isogenic mutant and a complementation strain were generated from a Cnm-positive S. mutans strain to help determine the properties of Cnm. Initially, comparison of the cell surface structure was performed by electron microscopy, which demonstrated that Cnm appears to be localized on the cell surface and associated with a protruding cell surface structure. Deep RNA sequencing of the strains revealed that the defect in Cnm caused upregulated expression of many genes related to ABC transporters and cell-surface proteins, while a few genes were downregulated. The amount of biofilm formed by the Cnm-defective strain increased compared with the parental and complemented strains, but the biofilm structure was thinner because of elevated expression of genes encoding glucan synthesis enzymes, leading to increased production of extracellular polysaccharides. Particular antibiotics, including bacitracin and chloramphenicol, had a lower minimum inhibitory concentration for the Cnm-defective strain than particular antibiotics, including bacitracin and chloramphenicol, compared with the parental and complemented strains. Our results suggest that S. mutans Cnm is located on the cell surface, gives rise to the observed protruding cell surface, and is associated with several biological properties related to membrane permeability
    corecore