2,969 research outputs found

    I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis

    Full text link
    Revelations of large scale electronic surveillance and data mining by governments and corporations have fueled increased adoption of HTTPS. We present a traffic analysis attack against over 6000 webpages spanning the HTTPS deployments of 10 widely used, industry-leading websites in areas such as healthcare, finance, legal services and streaming video. Our attack identifies individual pages in the same website with 89% accuracy, exposing personal details including medical conditions, financial and legal affairs and sexual orientation. We examine evaluation methodology and reveal accuracy variations as large as 18% caused by assumptions affecting caching and cookies. We present a novel defense reducing attack accuracy to 27% with a 9% traffic increase, and demonstrate significantly increased effectiveness of prior defenses in our evaluation context, inclusive of enabled caching, user-specific cookies and pages within the same website

    Nitric Oxide Signaling Triggered by the Rheumatoid Arthritis–Shared Epitope

    Full text link
    Many immune-mediated diseases are associated with particular MHC class I or class II alleles. In rheumatoid arthritis (RA-shared), the vast majority of patients possess HLA-DRB1 alleles encoding a shared epitope, which is a five–amino acid sequence motif in positions 70–74 of the HLA-DRΒ chain. The mechanistic basis for this association is unknown. Here we discuss recent evidence suggesting that the shared epitope may act as an allele-specific ligand that triggers increased nitric oxide (NO) production in opposite cells with resultant immune dysregulation. We propose that by doing that, the RA-shared shared epitope may form an unintended bridge between the innate and adaptive immune systems, thereby allowing aberrant signaling events that could trigger disease.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/72272/1/annals.1423.009.pd

    LEARNING STYLE VARIATION OF DIGITAL NATIVES

    Get PDF
    Everyone learns, but not all learn in the same way. Understanding of an individual's natural or habitual pattern of processing information, acquiring knowledge and solving problems is considered to be beneficial in developing pedagogical process and enhancing effective learning.This study reviews the impacts of gender, cultural differences, and variations in disciplines to learning styles. With the aim to investigating the learning style variability, 955 students from the "digital native" generation studying at various institutions of higher learning in Malaysia, China, and Indonesia responded to the Felder-Silverman Index of Learning Styles (ILS) and a demographics questionnaire. It is found that gender does not affect the learning style of the students. All students of three nationalities appear to be visual learners. However, Malaysian and Chinese students prefer sensing and sequential learning while the Indonesian students prefer otherwise. Both engineering and business students appear to be similar type of learners except that engineering students are more sequential than the business students. Cultural and disciplinary variation do affect the way students in the digital era prefer to learn

    TREND OF INTERNET USAGE AND LEARNING STYLE OF DIGITAL NATIVES

    Get PDF
    The use of internet has become a way of living since its inception in the 80s. With the advancement of informatics technologies, it has also created an unprecedented pressure to the education sector in keeping up with the pace of change in societal needs and technological innovations. It is with the aim of facilitating better learning outcomes attainment at tertiary education level among the digital natives, this study is set to find out how frequently technology savvy students use the internet and what the key internet activities are. The findings are subsequently analyzed to establish a correlation between the frequencies of internet usage and preferred learning style. It is observed that the primary internet usage of 784 respondents is in entertainment and communication in their daily internet routine. However, the association of the internet with the preferred learning style is inconclusive

    New insights into the functional role of the rheumatoid arthritis shared epitope

    Get PDF
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/116315/1/feb2s0014579311001980.pd

    Not-so-adiabatic quantum computation for the shortest vector problem

    Full text link
    Since quantum computers are known to break the vast majority of currently-used cryptographic protocols, a variety of new protocols are being developed that are conjectured, but not proven to be safe against quantum attacks. Among the most promising is lattice-based cryptography, where security relies upon problems like the shortest vector problem. We analyse the potential of adiabatic quantum computation for attacks on lattice-based cryptography, and give numerical evidence that even outside the adiabatic regime such methods can facilitate the solution of the shortest vector and similar problems.Comment: 15 pages total, 9 figures, journal submission to Phys Rev Research v2, corrected two typos (save --> safe, relies --> relies on

    Myb proteins inhibit fibroblast transformation by v-Rel

    Get PDF
    Genes that cause cancer have been divided into two general classes – oncogenes that act in a dominant fashion to transform normal cells into a malignant state, and tumor suppressor genes that act in a dominant fashion to prevent such transformation. In this report, we demonstrate that both the v-myb retroviral oncogene, which causes leukemic transformation of hematopoietic cells, and the c-myb proto-oncogene can also function as inhibitors of fibroblast transformation by the v-rel oncogene. These results imply that the myb genes can function either as oncogenes or as tumor suppressors in different cellular contexts

    Development of nutraceutical product

    Get PDF
    The aim of this study was to discuss the development of nutraceutical product which includes the current market trends, challenges, and exploitation of natural resources through various processing. Wet granulation and dry granulation techniques were adopted for such processes. Wet granulation covers high shear mixing granulation, fluidized bed granulation, and twin screw granulation. Dry granulation covers roll compaction and uniaxial die compaction. These techniques were compared and reviewed in terms of physical, chemical and toxicity studies. The physical study considered the particle size, density, morphology, flowability and dissolution. The chemical study discussed on the active ingredients in the nutraceutical products and the toxicity study was presented by investigation carried out on rats. There is a high potential for development of nutraceutical product. By understanding the various techniques of processing and characterisations, more nutraceutical products can be marketed

    Proton-Scattering on (29)Si in Range Ep = 2.5-3.4 MeV*

    Get PDF
    Elastic and inelastic proton scattering measurements on Elastic and inelastic proton scattering measurements on 29Si have been obtained in the energy range Ep = 2.5-3.4 MeV. 30 elastic and 32 inelastic resonances were observed. 14 prominent resonances from elastic scattering were analyzed. Results of the analysis for proton orbital momenta, spin and parity assignments, and proton partial widths are given. The inelastic resonance strengths measured relative to the known strength of the 1302-keV resonance in 29Si(p,y)30P are also reported
    corecore