65,581 research outputs found

    LDPC Code Design for the BPSK-constrained Gaussian Wiretap Channel

    Full text link
    A coding scheme based on irregular low-density parity-check (LDPC) codes is proposed to send secret messages from a source over the Gaussian wiretap channel to a destination in the presence of a wiretapper, with the restriction that the source can send only binary phase-shift keyed (BPSK) symbols. The secrecy performance of the proposed coding scheme is measured by the secret message rate through the wiretap channel as well as the equivocation rate about the message at the wiretapper. A code search procedure is suggested to obtain irregular LDPC codes that achieve good secrecy performance in such context.Comment: submitted to IEEE GLOBECOM 2011 - Communication Theory Symposiu

    Mechanisms of sensorineural cell damage, death and survival in the cochlea.

    Get PDF
    The majority of acquired hearing loss, including presbycusis, is caused by irreversible damage to the sensorineural tissues of the cochlea. This article reviews the intracellular mechanisms that contribute to sensorineural damage in the cochlea, as well as the survival signaling pathways that can provide endogenous protection and tissue rescue. These data have primarily been generated in hearing loss not directly related to age. However, there is evidence that similar mechanisms operate in presbycusis. Moreover, accumulation of damage from other causes can contribute to age-related hearing loss (ARHL). Potential therapeutic interventions to balance opposing but interconnected cell damage and survival pathways, such as antioxidants, anti-apoptotics, and pro-inflammatory cytokine inhibitors, are also discussed

    Nutrients in waters on the inner shelf between Cape Charles and Cape Hatteras

    Get PDF
    The distribution of nutrients in the shelf waters of the southern tip of the Middle Atlantic Bight was investigated. It is concluded that the outflow of freshwater from the Chesapeake Bay is a potential source of nutrients to the adjacent shelf waters. However, a quantitative estimation of its importance cannot yet be made because (1) there are other sources of nutrients to the study area and these sources cannot yet be quantified and (2) the concentrations of nutrients in the outflow from Chesapeake Bay exhibit significant short-term and long-term temporal variabilities

    Assessment of ultraviolet radiation exposures in photobiological experiments

    Get PDF
    The interfering effect of ultraviolet (UV) radiation on the natural function of biological processes is wavelength specific and the UV spectrum must be weighted with the action spectrum for the process. The UV spectral irradiance may be measured with calibrated spectroradiometers. Alternatively, the biologically effective UV may be measured with broadband devices. This paper reviews the techniques for assessing biologically effective exposures in photobiological experiments. UV meters, such as the Robertson-Berger (RB) meter, or passive dosimeters, such as polysulphone, that possess a spectral response approximating the human erythemal response can be used to estimate erythemally effective exposure or actinic exposure due to solar UV. The sensitivity of the RB meter is about 0.56 uW cm-2 and polysulphone can record an exposure of about 2mJ cm-2. For photobiological processes other than erythema these devices are not suitable to determine the exposure. In terms of these applications, a spectrum evaluator consisting of four different types of dosimeter material can be employed to evaluate the UV spectrum of the source. This method can be useful both for solar UV studies and research with UV lamps that possess radiation wavelengths shorter than 295nm. The device can be used to measure exposures where the actinic and erythemal action spectra differ significantly. It can also be used to assess exposure due to low levels of UV (about 0.01uW cm-2) caused by radiation filtered through glasses or plastic

    Password Cracking and Countermeasures in Computer Security: A Survey

    Full text link
    With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we find that the survey work on the password cracking research has not been done very much. This paper is mainly to give a brief review of the password cracking methods, import technologies of password cracking, and the countermeasures against password cracking that are usually designed at two stages including the password design stage (e.g. user education, dynamic password, use of tokens, computer generations) and after the design (e.g. reactive password checking, proactive password checking, password encryption, access control). The main objective of this work is offering the abecedarian IT security professionals and the common audiences with some knowledge about the computer security and password cracking, and promoting the development of this area.Comment: add copyright to the tables to the original authors, add acknowledgement to helpe
    • …
    corecore