97 research outputs found

    A Sex Difference in Seasonal Timing of Birth in a Livebearing Fish

    Full text link

    Security properties of two authenticated conference key agreement protocols

    Get PDF
    In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed by Burmester and Desmedt, and uses a separate authentication scheme to achieve authentication among the participants. We show that this scheme su#ers from a number of security vulnerabilities. The other scheme was generated using the general protocol compiler of Katz and Yung. We show that in some circumstances, even if key confirmation is implemented, this scheme still su#ers from insider attacks (which are not covered by the security model used by Katz and Yung)

    Constant-Round Group Key Exchange from the Ring-LWE Assumption

    Get PDF
    Group key-exchange protocols allow a set of N parties to agree on a shared, secret key by communicating over a public network. A number of solutions to this problem have been proposed over the years, mostly based on variants of Diffie-Hellman (two-party) key exchange. There has been relatively little work, however, looking at candidate post-quantum group key-exchange protocols. Here, we propose a constant-round protocol for unauthenticated group key exchange (i.e., with security against a passive eavesdropper) based on the hardness of the Ring-LWE problem. By applying the Katz-Yung compiler using any post-quantum signature scheme, we obtain a (scalable) protocol for authenticated group key exchange with post-quantum security. Our protocol is constructed by generalizing the Burmester-Desmedt protocol to the Ring-LWE setting, which requires addressing several technical challenges

    Classification of Foetal Distress and Hypoxia Using Machine Learning Approaches

    Get PDF
    © 2018, Springer International Publishing AG, part of Springer Nature. Foetal distress and hypoxia (oxygen deprivation) is considered as a serious condition and one of the main factors for caesarean section in the obstetrics and Gynecology department. It is the third most common cause of death in new-born babies. Many foetuses that experienced some sort of hypoxic effects can develop series risks including damage to the cells of the central nervous system that may lead to life-long disability (cerebral palsy) or even death. Continuous labour monitoring is essential to observe the foetal well being. Foetal surveillance by monitoring the foetal heart rate with a cardiotocography is widely used. Despite the indication of normal results, these results are not reassuring, and a small proportion of these foetuses are actually hypoxic. In this paper, machine-learning algorithms are utilized to classify foetuses which are experiencing oxygen deprivation using PH value (a measure of hydrogen ion concentration of blood used to specify the acidity or alkalinity) and Base Deficit of extra cellular fluid level (a measure of the total concentration of blood buffer base that indicates the metabolic acidosis or compensated respiratory alkalosis) as indicators of respiratory and metabolic acidosis, respectively, using open source partum clinical data obtained from Physionet. Six well know machine learning classifier models are utilised in our experiments for the evaluation; each model was presented with a set of selected features derived from the clinical data. Classifier’s evaluation is performed using the receiver operating characteristic curve analysis, area under the curve plots, as well as the confusion matrix. Our simulation results indicate that machine-learning algorithms provide viable methods that could delivery improvements over conventional analysis

    Spallation reactions. A successful interplay between modeling and applications

    Get PDF
    The spallation reactions are a type of nuclear reaction which occur in space by interaction of the cosmic rays with interstellar bodies. The first spallation reactions induced with an accelerator took place in 1947 at the Berkeley cyclotron (University of California) with 200 MeV deuterons and 400 MeV alpha beams. They highlighted the multiple emission of neutrons and charged particles and the production of a large number of residual nuclei far different from the target nuclei. The same year R. Serber describes the reaction in two steps: a first and fast one with high-energy particle emission leading to an excited remnant nucleus, and a second one, much slower, the de-excitation of the remnant. In 2010 IAEA organized a worskhop to present the results of the most widely used spallation codes within a benchmark of spallation models. If one of the goals was to understand the deficiencies, if any, in each code, one remarkable outcome points out the overall high-quality level of some models and so the great improvements achieved since Serber. Particle transport codes can then rely on such spallation models to treat the reactions between a light particle and an atomic nucleus with energies spanning from few tens of MeV up to some GeV. An overview of the spallation reactions modeling is presented in order to point out the incomparable contribution of models based on basic physics to numerous applications where such reactions occur. Validations or benchmarks, which are necessary steps in the improvement process, are also addressed, as well as the potential future domains of development. Spallation reactions modeling is a representative case of continuous studies aiming at understanding a reaction mechanism and which end up in a powerful tool.Comment: 59 pages, 54 figures, Revie

    Behavior Problems in Relation to Sustained Selective Attention Skills of Moderately Preterm Children

    Get PDF
    Attention skills may form an important developmental mechanism. A mediation model was examined in which behavioral problems of moderately preterm and term children at school age are explained by attention performance. Parents and teachers completed behavioral assessments of 348 moderately preterm children and 182 term children at 8 years of age. Children were administered a test of sustained selective attention. Preterm birth was associated with more behavioral and attention difficulties. Gestational age, prenatal maternal smoking, and gender were associated with mothers’, fathers’, and teachers’ reports of children’s problem behavior. Sustained selective attention partially mediated the relationship between birth status and problem behavior. Development of attention skills should be an important focus for future research in moderately preterm children

    Perinatal outcomes associated with low birth weight in a historical cohort

    Get PDF
    <p>Abstract</p> <p>Objective</p> <p>To identify perinatal outcomes associated with low birth weight (LBW).</p> <p>Methods</p> <p>A retrospective cohort study in a tertiary maternity hospital. Analysis of the database on 43,499 liveborn infants delivered between 1986 and 2004 with low (n = 6,477) and normal (n = 37,467) birth weight. Outcomes associated with LBW were identified through crude and adjusted risk ratio (RR) and 95%CI with bivariate and multivariate analysis. The main outcomes were: onset of labor, mode of delivery, indication for cesarean section; amniotic fluid, fetal heart rate pattern, Apgar score, somatic gestational age, gender and congenital malformation.</p> <p>Results</p> <p>LBW infants showed more frequently signs of perinatal compromise such as abnormal amniotic fluid volume (especially olygohydramnios), nonreassuring patterns of fetal heart rate, malformation, lower Apgar scores and lower gestational age at birth. They were associated with a greater risk of labor induction and cesarean delivery, but lower risk of forceps.</p> <p>Conclusion</p> <p>There was a clear association between LBW and unfavorable perinatal outcomes.</p

    Elevated risk of stillbirth in males: systematic review and meta-analysis of more than 30 million births

    Get PDF
    Background Stillbirth rates have changed little over the last decade, and a high proportion of cases are unexplained. This meta-analysis examined whether there are inequalities in stillbirth risks according to sex. Methods A systematic review of the literature was conducted, and data were obtained on more than 30 million birth outcomes reported in observational studies. The pooled relative risk of stillbirth was estimated using random-effects models. Results The crude mean rate (stillbirths/1,000 total births) was 6.23 for males and 5.74 for females. The pooled relative risk was 1.10 (95% confidence interval (CI): 1.07-1.13). The attributable fraction in the whole population was 4.2% (95% CI: 3.70-4.63), and the attributable fraction among male fetuses was 7.8% (95% CI: 7.0-8.66). Study populations from countries with known sex-biased sex selection issues had anomalous stillbirth sex ratios and higher overall stillbirth risks than other countries, reflecting increased mortality among females. Conclusions Risk of stillbirth in males is elevated by about 10%. The population-attributable risk is comparable to smoking and equates to approximately 100,000 stillbirths per year globally. The pattern is consistent across countries of varying incomes. Given current difficulties in reducing stillbirth rates, work to understand the causes of excess male risk is warranted. We recommend that stillbirths are routinely recorded by sex. This will also assist in exposing prenatal sex selection as elevated or equal risks of stillbirth in females would be readily apparent and could therefore be used to trigger investigation

    Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys

    Get PDF
    Abstract. We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and without any subsequent communication; this, in addition to the classical group key shared amongst all the users. We show that GKE protocols enriched in this way impose new security challenges concerning the secrecy and independence of both key types. The special attention should be paid to possible collusion attacks aiming to break the secrecy of p2p keys possibly established between any two non-colluding users. In our constructions we utilize the well-known parallel Diffie-Hellman key exchange (PDHKE) technique in which each party uses the same exponent for the computation of p2p keys with its peers. First, we consider PDHKE in GKE protocols where parties securely transport their secrets for the establishment of the group key. For this we use an efficient multi-recipient ElGamal encryption scheme. Further, based on PDHKE we design a generic compiler for GKE protocols that extend the classical Diffie-Hellman method. Finally, we investigate possible optimizations of these protocols allowing parties to re-use their exponents to compute both group and p2p keys, and show that not all such GKE protocols can be optimized. Key words: group key exchange, peer-to-peer keys, on-demand derivation
    corecore