54 research outputs found

    Adam Smith: a relationship between metaphysics and science

    Get PDF
    This thesis is basically in line with a common standpoint according to which Adam Smith's methodology deserves to be given the main priority in order to understand best his system of moral philosophy or `social science' in a modern sense. In this connection Smith's `metaphysics' is treated as an extremely important element to which our attention has to be drawn when we are concerned with his system of social science. This point of view differs primarily from an interpretative framework which seems to be still influential; a perspective from which a linkage between metaphysics and science is ignored. Instead, this work is based on the argument that metaphysics which may be defined as confirmable yet irrefutable (thus extra-scientific) doctrines is at work in the background of scientific activities in such as way that the former proposes an outline of scientific research in terms of providing a general outlook whereby a coherent type of data may be sorted out, arranged and organized. The `predominant' aim of this work on the basis of the view just mentioned is to seek a linkage between Smith's study of natural theology, which is responsible for providing an influential metaphysical doctrine, and other disciplines such as ethics and economics in his scheme of moral philosophy. I begin by identifying Smith's three metaphysical doctrines, the doctrine of mechanistic determinism, organismic philosophy, and the belief in a benevolent God (Chapter 2). Chapter 3 is designed to identify Smith's metatheoretical principles which, in conjunction with his metaphysics which is rooted in his theological outlook, serve to regulate or shape his `theoretical' analysis of man and society

    A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption

    Get PDF
    Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that provides the efficient key revocation function by broadcasting an update key per each time period. Many RHIBE schemes have been proposed by combining an HIBE scheme and the tree-based revocation method, but a generic method for constructing an RHIBE scheme has not been proposed. In this paper, we show for the first time that it is possible to construct RHIBE schemes by generically combining underlying cryptographic primitives and tree-based revocation methods. We first generically construct an RHIBE-CS scheme by combining HIBE schemes and the complete subtree (CS) method, and prove the adaptive security by using the adaptive security of the HIBE schemes. Thus, we obtain RHIBE schemes under the quadratic residuosity assumption, CDH assumption, and factoring assumption. Next, we generically construct an RHIBE-SD scheme with shorter update keys by combining HIBE and hierarchical single revocation encryption (HSRE) schemes, and the subset difference (SD) method to reduce the size of update keys. Finally, we generically construct an RHIBE-CS scheme with shorter ciphertexts by combining HIBE schemes with constant-size ciphertext and the CS method. Through different kind of generic combinations, we obtain various RHIBE schemes that provide a trade-off between shorter ciphertexts and shorter update keys

    Two-Round Multi-Signatures from Okamoto Signatures

    Get PDF
    Multi-signatures (MS) are a special type of public key signature (PKS) in which multiple signers participate cooperatively to generate a signature for a single message. Recently, applications that use an MS scheme to strengthen the security of blockchain wallets or to strengthen the security of blockchain consensus protocols are attracting a lot of attention. In this paper, we propose an efficient two-round MS scheme based on Okamoto signatures rather than Schnorr signatures. To this end, we first propose a new PKS scheme by modifying the Okamoto signature scheme, and prove the unforgeability of our PKS scheme under the discrete logarithm assumption in the algebraic group model (AGM) and the non-programmable random oracle model (ROM). Next, we propose a two-round MS scheme based on the new PKS scheme and prove the unforgeability of our MS scheme under the discrete logarithm assumption in the AGM and the non-programmable ROM. Our MS scheme is the first one to prove security among two-round MS based on Okamoto signature

    Odor habituation can modulate very early olfactory event-related potential

    Get PDF
    Odor habituation is a phenomenon that after repeated exposure to an odor, is characterized by decreased responses to it. The central nervous system is involved in odor habituation. To study odor habituation in humans, measurement of event-related potentials (ERPs) has been widely used in the olfactory system and other sensory systems, because of their high temporal resolution. Most previous odor habituation studies have measured the olfactory ERPs of (200–800) ms. However, several studies have shown that the odor signal is processed in the central nervous system earlier than at 200 ms. For these reasons, we studied whether when odors were habituated, olfactory ERP within 200 ms of odors could change. To this end, we performed an odor habituation behavior test and electroencephalogram experiments. In the behavior test, under habituation conditions, odor intensity was significantly decreased. We found significant differences in the negative and positive potentials within 200 ms across the conditions, which correlated significantly with the results of the behavior test. We also observed that ERP latency depended on the conditions. Our study suggests that odor habituation can involve the olfactory ERP of odors within 200 ms in the brain. © 2020, The Author(s).1

    Visual Honey Encryption: Application to Steganography

    Get PDF
    Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only for binary bit streams or integer sequences because it uses a fixed distribution-transforming encoder (DTE). In this paper, we propose a variant of honey encryption called visual honey encryption which employs an adaptive DTE in a Bayesian framework so that the proposed approach can be applied to more complex domains including images and videos. We applied this method to create a new steganography scheme which significantly improves the security level of traditional steganography

    Refined prefrontal working memory network as a neuromarker for Alzheimer’s disease

    Get PDF
    Detecting Alzheimer’s disease (AD) is an important step in preventing pathological brain damage. Working memory (WM)-related network modulation can be a pathological feature of AD, but is usually modulated by untargeted cognitive processes and individual variance, resulting in the concealment of this key information. Therefore, in this study, we comprehensively investigated a new neuromarker, named “refined network,” in a prefrontal cortex (PFC) that revealed the pathological features of AD. A refined network was acquired by removing unnecessary variance from the WM-related network. By using a functional near-infrared spectroscopy (fNIRS) device, we evaluated the reliability of the refined network, which was identified from the three groups classified by AD progression: healthy people (N=31), mild cognitive impairment (N=11), and patients with AD (N=18). As a result, we identified edges with significant correlations between cognitive functions and groups in the dorsolateral PFC. Moreover, the refined network achieved a significantly correlating metric with neuropsychological test scores, and a remarkable three-class classification accuracy (95.0%). These results implicate the refined PFC WM-related network as a powerful neuromarker for AD screening. © 2021 Optical Society of America1

    A Simple and Effective Method for Construction of Escherichia coli Strains Proficient for Genome Engineering

    Get PDF
    Multiplex genome engineering is a standalone recombineering tool for large-scale programming and accelerated evolution of cells. However, this advanced genome engineering technique has been limited to use in selected bacterial strains. We developed a simple and effective strain-independent method for effective genome engineering in Escherichia coli. The method involves introducing a suicide plasmid carrying the l Red recombination system into the mutS gene. The suicide plasmid can be excised from the chromosome via selection in the absence of antibiotics, thus allowing transient inactivation of the mismatch repair system during genome engineering. In addition, we developed another suicide plasmid that enables integration of large DNA fragments into the lacZ genomic locus. These features enable this system to be applied in the exploitation of the benefits of genome engineering in synthetic biology, as well as the metabolic engineering of different strains of E. coli.open7

    Recent Engagements with Adam Smith and the Scottish Enlightenment

    Full text link
    corecore