7,443 research outputs found

    Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy

    Full text link
    Cloud storage services have become accessible and used by everyone. Nevertheless, stored data are dependable on the behavior of the cloud servers, and losses and damages often occur. One solution is to regularly audit the cloud servers in order to check the integrity of the stored data. The Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy presented in ACISP'15 is a straightforward design of such solution. However, this scheme is threatened by several attacks. In this paper, we carefully recall the definition of this scheme as well as explain how its security is dramatically menaced. Moreover, we proposed two new constructions for Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy based on the scheme presented in ACISP'15, one using Index Hash Tables and one based on Merkle Hash Trees. We show that the two schemes are secure and privacy-preserving in the random oracle model.Comment: ISPEC 201

    Density distributions for trapped one-dimensional spinor gases

    Full text link
    We numerically evaluate the density distribution of a spin-1 bosonic condensate in its ground state within a modifed Gross-Pitaevskii theory, which is obtained by the combination of the exact solution of the corresponding integrable model with the local density approximation. Our study reveals that atoms in the m_F = 0 state are almost completely suppressed for the anti-ferromagnetic interactions in both weakly and strongly interacting regimes, whereas all three components remain non-vanishing for ferromagnetic interactions. Specially, when the system is in the Tonks-Girardeau (TG) regime, obvious Fermi-like distribution emerges for each component. We also discuss the possible deviation of the spatial distribution from the Fermi-like distribution when the spin-spin interaction is strong enough.Comment: 6 pages, 3 figures, version to be published in Phys. Rev.

    Modeling of Nitrous Oxide Production from Nitritation Reactors Treating Real Anaerobic Digestion Liquor.

    Full text link
    In this work, a mathematical model including both ammonium oxidizing bacteria (AOB) and heterotrophic bacteria (HB) is constructed to predict N2O production from the nitritation systems receiving the real anaerobic digestion liquor. This is for the first time that N2O production from such systems was modeled considering both AOB and HB. The model was calibrated and validated using experimental data from both lab- and pilot-scale nitritation reactors. The model predictions matched the dynamic N2O, ammonium, nitrite and chemical oxygen demand data well, supporting the capability of the model. Modeling results indicated that HB are the dominant contributor to N2O production in the above systems with the dissolved oxygen (DO) concentration of 0.5-1.0 mg O2/L, accounting for approximately 75% of N2O production. The modeling results also suggested that the contribution of HB to N2O production decreased with the increasing DO concentrations, from 75% at DO = 0.5 mg O2/L to 25% at DO = 7.0 mg O2/L, with a corresponding increase of the AOB contribution (from 25% to 75%). Similar to HB, the total N2O production rate also decreased dramatically from 0.65 to 0.25 mg N/L/h when DO concentration increased from 0.5 to 7.0 mg O2/L

    PMU Placement in Electric Transmission Networks for Reliable State Estimation against False Data Injection Attacks

    Get PDF
    Currently the false data injection (FDI) attack bring direct challenges in synchronized phase measurement unit (PMU) based network state estimation in wide-area measurement system (WAMS), resulting in degraded system reliability and power supply security. This paper assesses the performance of state estimation in electric cyber-physical system (ECPS) paradigm considering the presence of FDI attacks. The adverse impact on network state estimation is evaluated through simulations for a range of FDI attack scenarios using IEEE 14-bus network model. In addition, an algorithmic solution is proposed to address the issue of additional PMU installation and placement with cyber security consideration and evaluated for a set of standard electric transmission networks (IEEE 14-bus, 30-bus and 57-bus network). The numerical result confirms that the FDI attack can significantly degrade the state estimation and the cyber security can be improved by an appropriate placement of a limited number of additional PMUs

    The cusp: a window for particle exchange between the radiation belt and the solar wind

    Get PDF
    International audienceThe study focuses on a single particle dynamics in the cusp region. The topology of the cusp region in terms of magnetic field iso-B contours has been studied using the Tsyganenko 96 model (T96) as an example, to show the importance of an off-equatorial minimum on particle trapping. We carry out test particle simulations to demonstrate the bounce and drift motion. The "cusp trapping limit" concept is introduced to reflect the particle motion in the high latitude magnetospheric region. The spatial distribution of the "cusp trapping limit" shows that only those particles with near 90° pitch-angles can be trapped and drift around the cusp. Those with smaller pitch angles may be partly trapped in the iso-B contours, however, they will eventually escape along one of the magnetic field lines. There exist both open field lines and closed ones within the same drift orbit, indicating two possible destinations of these particles: those particles being lost along open field lines will be connected to the surface of the magnetopause and the solar wind, while those along closed ones will enter the equatorial radiation belt. Thus, it is believed that the cusp region can provide a window for particle exchange between these two regions. Some of the factors, such as dipole tilt angle, magnetospheric convection, IMF and the Birkeland current system, may influence the cusp's trapping capability and therefore affect the particle exchanging mechanism. Their roles are examined by both the analysis of cusp magnetic topology and test particle simulations

    Hepatic cell mobilization for protection against ischemic myocardial injury

    Get PDF
    The heart is capable of activating protective mechanisms in response to ischemic injury to support myocardial survival and performance. These mechanisms have been recognized primarily in the ischemic heart, involving paracrine signaling processes. Here, we report a distant cardioprotective mechanism involving hepatic cell mobilization to the ischemic myocardium in response to experimental myocardial ischemia–reperfusion (MI-R) injury. A parabiotic mouse model was generated by surgical skin-union of two mice and used to induce bilateral MI-R injury with unilateral hepatectomy, establishing concurrent gain- and loss-of-hepatic cell mobilization conditions. Hepatic cells, identified based on the cell-specific expression of enhanced YFP, were found in the ischemic myocardium of parabiotic mice with intact liver (0.2 ± 0.1%, 1.1 ± 0.3%, 2.7 ± 0.6, and 0.7 ± 0.4% at 1, 3, 5, and 10 days, respectively, in reference to the total cell nuclei), but not significantly in the ischemic myocardium of parabiotic mice with hepatectomy (0 ± 0%, 0.1 ± 0.1%, 0.3 ± 0.2%, and 0.08 ± 0.08% at the same time points). The mobilized hepatic cells were able to express and release trefoil factor 3 (TFF3), a protein mitigating MI-R injury as demonstrated in TFF3−/− mice (myocardium infarcts 17.6 ± 2.3%, 20.7 ± 2.6%, and 15.3 ± 3.8% at 1, 5, and 10 days, respectively) in reference to wildtype mice (11.7 ± 1.9%, 13.8 ± 2.3%, and 11.0 ± 1.8% at the same time points). These observations suggest that MI-R injury can induce hepatic cell mobilization to support myocardial survival by releasing TFF3
    corecore