6,197 research outputs found
Molecular characterization of commensal Escherichia coli adapted to different compartments of the porcine gastrointestinal tract
The role of Escherichia coli as a pathogen has been the focus of considerable study, while much less is known about it as a commensal and how it adapts to and colonizes different environmental niches within the mammalian gut. In this study, we characterize Escherichia coli organisms (n=146) isolated from different regions of the intestinal tracts of eight pigs (dueodenum, ileum, colon, and feces). The isolates were typed using the method of random amplified polymorphic DNA (RAPD) and screened for the presence of bacteriocin genes and plasmid replicon types. Molecular analysis of variance using the RAPD data showed that E. coli isolates are nonrandomly distributed among different gut regions, and that gut region accounted for 25% (
Detecting shapes in noise: tuning characteristics of global shape mechanisms.
The proportion of signal elements embedded in noise needed to detect a signal is a standard tool for investigating motion perception. This paradigm was applied to the shape domain to determine how local information is pooled into a global percept. Stimulus arrays consisted of oriented Gabor elements that sampled the circumference of concentric radial frequency (RF) patterns. Individual Gabors were oriented tangentially to the shape (signal) or randomly (noise). In different conditions, signal elements were located randomly within the entire array or constrained to fall along one of the concentric contours. Coherence thresholds were measured for RF patterns with various frequencies (number of corners) and amplitudes ("sharpness" of corners). Coherence thresholds (about 10% = 15 elements) were lowest for circular shapes. Manipulating shape frequency or amplitude showed a range where thresholds remain unaffected (frequency ≤ RF4; amplitude ≤ 0.05). Increasing either parameter caused thresholds to rise. Compared to circles, thresholds increased by approximately four times for RF13 and five times for amplitudes of 0.3. Confining the signals to individual contours significantly reduced the number of elements needed to reach threshold (between 4 and 6), independent of the total number of elements on the contour or contour shape. Finally, adding external noise to the orientation of the elements had a greater effect on detection thresholds than adding noise to their position. These results provide evidence for a series of highly sensitive, shape-specific analysers which sum information globally but only from within specific annuli. These global mechanisms are tuned to position and orientation of local elements from which they pool information. The overall performance for arrays of elements can be explained by the sensitivity of multiple, independent concentric shape detectors rather than a single detector integrating information widely across space (e.g. Glass pattern detector)
A kilobit hidden SNFS discrete logarithm computation
We perform a special number field sieve discrete logarithm computation in a
1024-bit prime field. To our knowledge, this is the first kilobit-sized
discrete logarithm computation ever reported for prime fields. This computation
took a little over two months of calendar time on an academic cluster using the
open-source CADO-NFS software. Our chosen prime looks random, and
has a 160-bit prime factor, in line with recommended parameters for the Digital
Signature Algorithm. However, our p has been trapdoored in such a way that the
special number field sieve can be used to compute discrete logarithms in
, yet detecting that p has this trapdoor seems out of reach.
Twenty-five years ago, there was considerable controversy around the
possibility of back-doored parameters for DSA. Our computations show that
trapdoored primes are entirely feasible with current computing technology. We
also describe special number field sieve discrete log computations carried out
for multiple weak primes found in use in the wild. As can be expected from a
trapdoor mechanism which we say is hard to detect, our research did not reveal
any trapdoored prime in wide use. The only way for a user to defend against a
hypothetical trapdoor of this kind is to require verifiably random primes
Anonymous Single-Sign-On for n designated services with traceability
Anonymous Single-Sign-On authentication schemes have been proposed to allow
users to access a service protected by a verifier without revealing their
identity which has become more important due to the introduction of strong
privacy regulations. In this paper we describe a new approach whereby anonymous
authentication to different verifiers is achieved via authorisation tags and
pseudonyms. The particular innovation of our scheme is authentication can only
occur between a user and its designated verifier for a service, and the
verification cannot be performed by any other verifier. The benefit of this
authentication approach is that it prevents information leakage of a user's
service access information, even if the verifiers for these services collude
which each other. Our scheme also supports a trusted third party who is
authorised to de-anonymise the user and reveal her whole services access
information if required. Furthermore, our scheme is lightweight because it does
not rely on attribute or policy-based signature schemes to enable access to
multiple services. The scheme's security model is given together with a
security proof, an implementation and a performance evaluation.Comment: 3
The TMEM106B risk allele is associated with lower cortical volumes in a clinically diagnosed frontotemporal dementia cohort
Quantum resource estimates for computing elliptic curve discrete logarithms
We give precise quantum resource estimates for Shor's algorithm to compute
discrete logarithms on elliptic curves over prime fields. The estimates are
derived from a simulation of a Toffoli gate network for controlled elliptic
curve point addition, implemented within the framework of the quantum computing
software tool suite LIQ. We determine circuit implementations for
reversible modular arithmetic, including modular addition, multiplication and
inversion, as well as reversible elliptic curve point addition. We conclude
that elliptic curve discrete logarithms on an elliptic curve defined over an
-bit prime field can be computed on a quantum computer with at most qubits using a quantum circuit of at most Toffoli gates. We are able to classically simulate the
Toffoli networks corresponding to the controlled elliptic curve point addition
as the core piece of Shor's algorithm for the NIST standard curves P-192,
P-224, P-256, P-384 and P-521. Our approach allows gate-level comparisons to
recent resource estimates for Shor's factoring algorithm. The results also
support estimates given earlier by Proos and Zalka and indicate that, for
current parameters at comparable classical security levels, the number of
qubits required to tackle elliptic curves is less than for attacking RSA,
suggesting that indeed ECC is an easier target than RSA.Comment: 24 pages, 2 tables, 11 figures. v2: typos fixed and reference added.
ASIACRYPT 201
Detailed volumetric analysis of the hypothalamus in behavioral variant frontotemporal dementia
Abnormal eating behaviors are frequently reported in behavioral variant frontotemporal dementia (bvFTD). The hypothalamus is the regulatory center for feeding and satiety but its involvement in bvFTD has not been fully clarified, partly due to its difficult identification on MR images. We measured hypothalamic volume in 18 patients with bvFTD (including 9 MAPT and 6 C9orf72 mutation carriers) and 18 cognitively normal controls using a novel optimized multimodal segmentation protocol, combining 3D T1 and T2-weighted 3T MRIs (intrarater intraclass correlation coefficients ≥0.93). The whole hypothalamus was subsequently segmented into five subunits: the anterior (superior and inferior), tuberal (superior and inferior), and posterior regions. The presence of abnormal eating behavior was assessed with the revised version of the Cambridge Behavioural Inventory (CBI-R). The bvFTD group showed a 17 % lower hypothalamic volume compared with controls (p < 0.001): mean 783 (standard deviation 113) versus 944 (73) mm(3) (corrected for total intracranial volume). In the hypothalamic subunit analysis, the superior parts of the anterior and tuberal regions and the posterior region were significantly smaller in the bvFTD group compared with controls. There was a trend for a smaller hypothalamic volume, particularly in the superior tuberal region, in those with severe eating disturbance scores on the CBI-R. Differences were seen between the two genetic subgroups with significantly smaller volumes in the MAPT but not the C9orf72 group compared with controls. In summary, bvFTD patients had lower hypothalamic volumes compared with controls. Different genetic mutations may have a differential impact on the hypothalamus
Visual, Motor and Attentional Influences on Proprioceptive Contributions to Perception of Hand Path Rectilinearity during Reaching
We examined how proprioceptive contributions to perception of hand path straightness are influenced by visual, motor and attentional sources of performance variability during horizontal planar reaching. Subjects held the handle of a robot that constrained goal-directed movements of the hand to the paths of controlled curvature. Subjects attempted to detect the presence of hand path curvature during both active (subject driven) and passive (robot driven) movements that either required active muscle force production or not. Subjects were less able to discriminate curved from straight paths when actively reaching for a target versus when the robot moved their hand through the same curved paths. This effect was especially evident during robot-driven movements requiring concurrent activation of lengthening but not shortening muscles. Subjects were less likely to report curvature and were more variable in reporting when movements appeared straight in a novel “visual channel” condition previously shown to block adaptive updating of motor commands in response to deviations from a straight-line hand path. Similarly, compromised performance was obtained when subjects simultaneously performed a distracting secondary task (key pressing with the contralateral hand). The effects compounded when these last two treatments were combined. It is concluded that environmental, intrinsic and attentional factors all impact the ability to detect deviations from a rectilinear hand path during goal-directed movement by decreasing proprioceptive contributions to limb state estimation. In contrast, response variability increased only in experimental conditions thought to impose additional attentional demands on the observer. Implications of these results for perception and other sensorimotor behaviors are discussed
Resource use data by patient report or hospital records: Do they agree?
Background: Economic evaluations alongside clinical trials are becoming increasingly common.
Cost data are often collected through the use of postal questionnaires; however, the accuracy of
this method is uncertain. We compared postal questionnaires with hospital records for collecting
data on physiotherapy service use.
Methods: As part of a randomised trial of orthopaedic medicine compared with orthopaedic
surgery we collected physiotherapy use data on a group of patients from retrospective postal
questionnaires and from hospital records.
Results: 315 patients were referred for physiotherapy. Hospital data on attendances was available
for 30% (n = 96), compared with 48% (n = 150) of patients completing questionnaire data (95% Cl
for difference = 10% to 24%); 19% (n = 59) had data available from both sources. The two methods
produced an intraclass correlation coefficient of 0.54 (95% Cl 0.31 to 0.70). However, the two
methods produced significantly different estimates of resource use with patient self report recalling
a mean of 1.3 extra visits (95% Cl 0.4 to 2.2) compared with hospital records.
Conclusions: Using questionnaires in this study produced data on a greater number of patients
compared with examination of hospital records. However, the two data sources did differ in the
quantity of physiotherapy used and this should be taken into account in any analysi
- …
