427 research outputs found

    On Finding Quantum Multi-collisions

    Get PDF
    A kk-collision for a compressing hash function HH is a set of kk distinct inputs that all map to the same output. In this work, we show that for any constant kk, Ī˜(N12(1āˆ’12kāˆ’1))\Theta\left(N^{\frac{1}{2}(1-\frac{1}{2^k-1})}\right) quantum queries are both necessary and sufficient to achieve a kk-collision with constant probability. This improves on both the best prior upper bound (Hosoyamada et al., ASIACRYPT 2017) and provides the first non-trivial lower bound, completely resolving the problem

    Facilitators and barriers to hypertension self-management in urban African Americans: perspectives of patients and family members.

    Get PDF
    INTRODUCTION: We aimed to inform the design of behavioral interventions by identifying patients' and their family members' perceived facilitators and barriers to hypertension self-management. MATERIALS AND METHODS: We conducted focus groups of African American patients with hypertension and their family members to elicit their views about factors influencing patients' hypertension self-management. We recruited African American patients with hypertension (n = 18) and their family members (n = 12) from an urban, community-based clinical practice in Baltimore, Maryland. We conducted four separate 90-minute focus groups among patients with controlled (one group) and uncontrolled (one group) hypertension, as well as their family members (two groups). Trained moderators used open-ended questions to assess participants' perceptions regarding patient, family, clinic, and community-level factors influencing patients' effective hypertension self-management. RESULTS: Patient participants identified several facilitators (including family members' support and positive relationships with doctors) and barriers (including competing health priorities, lack of knowledge about hypertension, and poor access to community resources) that influence their hypertension self-management. Family members also identified several facilitators (including their participation in patients' doctor's visits and discussions with patients' doctors outside of visits) and barriers (including their own limited health knowledge and patients' lack of motivation to sustain hypertension self-management behaviors) that affect their efforts to support patients' hypertension self-management. CONCLUSION: African American patients with hypertension and their family members reported numerous patient, family, clinic, and community-level facilitators and barriers to patients' hypertension self-management. Patients' and their family members' views may help guide efforts to tailor behavioral interventions designed to improve hypertension self-management behaviors and hypertension control in minority populations

    Transport of Explosive Residue Surrogates in Saturated Porous Media

    Get PDF
    Department of Defense operational ranges may become contaminated by particles of explosives residues (ER) as a result of low-order detonations of munitions. The goal of this study was to determine the extent to which particles of ER could migrate through columns of sandy sediment, representing model aquifer materials. Transport experiments were conducted in saturated columns (2ā€‰Ć—ā€‰20Ā cm) packed with different grain sizes of clean sand or glass beads. Fine particles (approximately 2 to 50Ā Ī¼m) of 2,6-dinitrotoluene (DNT) were used as a surrogate for ER. DNT particles were applied to the top 1Ā cm of sand or beads in the columns, and the columns were subsequently leached with artificial groundwater solutions. DNT migration occurred as both dissolved and particulate phases. Concentration differences between unfiltered and filtered samples indicate that particulate DNT accounted for up to 41% of the mass recovered in effluent samples. Proportionally, more particulate than dissolved DNT was recovered in effluent solutions from columns with larger grain sizes, while total concentrations of DNT in effluent were inversely related to grain size. Of the total DNT mass applied to the uppermost layer of the column, <3% was recovered in the effluent with the bulk remaining in the top 2Ā cm of the column. Our results suggest there is some potential for subsurface migration of ER particles and that most of the particles will be retained over relatively short transport distances

    Inclusion of diverse populations in genomic research and health services: Genomix workshop report

    Get PDF
    Clinical genetic services and genomic research are rapidly developing but, historically, those with the greatest need are the least to benefit from these advances. This encompasses low-income communities, including those from ethnic minority and indigenous backgrounds. The ā€œGenomixā€ workshop at the European Society of Human Genetics (ESHG) 2016 conference offered the opportunity to consider possible solutions for these disparities from the experiences of researchers and genetic healthcare practitioners working with underserved communities in the USA, UK and Australia. Evident from the workshop and corresponding literature is that a multi-faceted approach to engaging communities is essential. This needs to be complemented by redesigning healthcare systems that improves access and raises awareness of the needs of these communities. At a more strategic level, institutions involved in funding research, commissioning and redesigning genetic health services also need to be adequately represented by underserved populations with intrinsic mechanisms to disseminate good practice and monitor participation. Further, as genomic medicine is mainstreamed, educational programmes developed for clinicians should incorporate approaches to alleviate disparities in accessing genetic services and improving study participation

    Needs-oriented discharge planning and monitoring for high utilisers of psychiatric services (NODPAM): Design and methods

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Attempts to reduce high utilisation of psychiatric inpatient care by targeting the critical time of hospital discharge have been rare.</p> <p>Methods</p> <p>This paper presents design and methods of the study "Effectiveness and Cost-Effectiveness of Needs-Oriented Discharge Planning and Monitoring for High Utilisers of Psychiatric Services" (NODPAM), a multicentre RCT conducted in five psychiatric hospitals in Germany. Inclusion criteria are receipt of inpatient psychiatric care, adult age, diagnosis of schizophrenia or affective disorder, defined high utilisation of psychiatric care during two years prior to the current admission, and given informed consent. Consecutive recruitment started in April 2006. Since then, during a period of 18 months, comprehensive outcome data of 490 participants is being collected at baseline and during three follow-up measurement points.</p> <p>The manualised intervention applies principles of needs-led care and focuses on the inpatient-outpatient transition. A trained intervention worker provides two intervention sessions: (a) Discharge planning: Just before discharge with the patient and responsible clinician at the inpatient service; (b) Monitoring: Three months after discharge with the patient and outpatient clinician. A written treatment plan is signed by all participants after each session.</p> <p>Primary endpoints are whether participants in the intervention group will show fewer hospital days and readmissions to hospital. Secondary endpoints are better compliance with aftercare, better clinical outcome and quality of life, as well as cost-effectiveness and cost-utility.</p> <p>Discussion</p> <p>If a needs-oriented discharge planning and monitoring proves to be successful in this RCT, a tool will be at hand to improve patient outcome and reduce costs via harmonising fragmented mental health service provision.</p> <p>Trial Registration</p> <p>ISRCTN59603527</p

    Downregulation of the anaphase-promoting complex (APC)7 in invasive ductal carcinomas of the breast and its clinicopathologic relationships

    Get PDF
    INTRODUCTION: The anaphase-promoting complex (APC) is a multiprotein complex with E3 ubiquitin ligase activity, which is required for the ubiquitination of securin and cyclin-B. Moreover, the mitotic spindle checkpoint is activated if APC activation is prevented. In addition, several APC-targeting molecules such as securin, polo-like kinase, aurora kinase, and SnoN have been reported to be oncogenes. Therefore, dysregulation of APC may be associated with tumorigenesis. However, the clinical significance and the involvement of APC in tumorigenesis have not been investigated. METHODS: The expression of APC7 was immunohistochemically investigated in 108 invasive ductal carcinomas of the breast and its relationship with clinicopathologic parameters was examined. The expression of APC7 was defined as positive when the summed scores of staining intensities (0 to 3+) and stained proportions (0 to 3+) exceeded 3+. RESULTS: Positive APC7 expression was less frequent than its negative expression when histologic (P = 0.009) or nuclear grade (P = 0.009), or mitotic number (P = 0.0016) was elevated. The frequency of APC7 negative expression was higher in high Ki-67 or aneuploid groups than in low Ki-67 or diploid groups. CONCLUSION: These data show that loss of APC7 expression is more common in breast carcinoma cases with poor prognostic parameters or malignant characteristics. They therefore suggest that dysregulation of APC activity, possibly through downregulation of APC7, may be associated with tumorigenesis in breast cancer

    Quantum Multicollision-Finding Algorithm

    Get PDF
    The current paper presents a new quantum algorithm for finding multicollisions, often denoted by ll-collisions, where an ll-collision for a function is a set of ll distinct inputs having the same output value. Although it is fundamental in cryptography, the problem of finding multicollisions has not received much attention \emph{in a quantum setting}. The tight bound of quantum query complexity for finding 22-collisions of random functions has been revealed to be Ī˜(N1/3)\Theta(N^{1/3}), where NN is the size of a codomain. However, neither the lower nor upper bound is known for ll-collisions. The paper first integrates the results from existing research to derive several new observations, e.g.~ll-collisions can be generated only with O(N1/2)O(N^{1/2}) quantum queries for a small constant ll. Then a new quantum algorithm is proposed, which finds an ll-collision of any function that has a domain size ll times larger than the codomain size. A rigorous proof is given to guarantee that the expected number of quantum queries is O(N(3lāˆ’1āˆ’1)/(2ā‹…3lāˆ’1))O\left( N^{(3^{l-1}-1)/(2 \cdot 3^{l-1})} \right) for a small constant ll, which matches the tight bound of Ī˜(N1/3)\Theta(N^{1/3}) for l=2l=2 and improves the known bounds, say, the above simple bound of O(N1/2)O(N^{1/2})

    Quantum Demiric-SelƧuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions

    Get PDF
    This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and SelƧuk (DS-MITM attacks), which is currently one of the most powerful cryptanalytic approaches in the classical setting against symmetric-key schemes. The quantum DS-MITM attacks are demonstrated against 6 rounds of the generic Feistel construction supporting an nn-bit key and an nn-bit block, which was attacked by Guo et al. in the classical setting with data, time, and memory complexities of O(23n/4)O(2^{3n/4}). The complexities of our quantum attacks depend on the adversary\u27s model and the number of qubits available. When the adversary has an access to quantum computers for offline computations but online queries are made in a classical manner (so called Q1 model), the attack complexities are O(2n/2)O(2^{n/2}) classical queries, O(2n/q)O(2^n/q) quantum computations by using about qq qubits. Those are balanced at O~(2n/2)\tilde{O}(2^{n/2}), which significantly improves the classical attack. Technically, we convert the quantum claw finding algorithm to be suitable in the Q1 model. The attack is then extended to the case that the adversary can make superposition queries (so called Q2 model). The attack approach is drastically changed from the one in the Q1 model; the attack is based on 3-round distinguishers with Simon\u27s algorithm and then appends 3 rounds for key recovery. This can be solved by applying the combination of Simon\u27s and Grover\u27s algorithms recently proposed by Leander and May

    Assessing Causality in the Relationship Between Adolescentsā€™ Risky Sexual Online Behavior and Their Perceptions of this Behavior

    Get PDF
    The main aim of this study was to investigate the causal nature of the relationship between adolescentsā€™ risky sexual behavior on the internet and their perceptions of this behavior. Engagement in the following online behaviors was assessed: searching online for someone to talk about sex, searching online for someone to have sex, sending intimate photos or videos to someone online, and sending oneā€™s telephone number and address to someone exclusively known online. The relationship between these behaviors and adolescentsā€™ perceptions of peer involvement, personal invulnerability, and risks and benefits was investigated. A two-wave longitudinal study among a representative sample of 1,445 Dutch adolescents aged 12ā€“17 was conducted (49% females). Autoregressive cross-lagged structural equation models revealed that perceived peer involvement, perceived vulnerability, and perceived risks were all significant predictors of risky sexual online behavior 6Ā months later. No reverse causal paths were found. When the relationships between perceptions and risky sexual online behavior were modeled simultaneously, only perceived peer involvement was a determinant of risky sexual online behavior. Findings highlight the importance of addressing peer involvement in future interventions to reduce adolescentsā€™ risky sexual online behavior
    • ā€¦
    corecore