339 research outputs found
Senior Programmers: Characteristics of Elderly Users from Stack Overflow
In this paper we presents results of research about elderly users of Stack
Overflow (Question and Answer portal for programmers). They have different
roles, different main activities and different habits. They are an important
part of the community, as they tend to have higher reputation and they like to
share their knowledge. This is a great example of possible way of keeping
elderly people active and helpful for society
The absolute position of a resonance peak
It is common practice in scattering theory to correlate between the position
of a resonance peak in the cross section and the real part of a complex energy
of a pole of the scattering amplitude. In this work we show that the resonance
peak position appears at the absolute value of the pole's complex energy rather
than its real part. We further demonstrate that a local theory of resonances
can still be used even in cases previously thought impossible
Pro and Con, A Complete Investigation of the Sunday School Question Viewed from a Bible Standpoint
In the first third of the twentieth century a significant debate was held among Churches of Christ concerning the propriety of employing Sunday Schools to teach the Bible in congregational settings. Trott and Clark\u27s tract is an early summary of the arguments.https://digitalcommons.acu.edu/crs_books/1012/thumbnail.jp
Calculations of time-dependent observables in non-Hermitian quantum mechanics: The problem and a possible solution
The solutions of the time independent Schrodinger equation for non-Hermitian
(NH) Hamiltonians have been extensively studied and calculated in many
different fields of physics by using L^2 methods that originally have been
developed for the calculations of bound states. The existing non-Hermitian
formalism breaks down when dealing with wavepackets(WP). An open question is
how time dependent expectation values can be calculated when the Hamiltonian is
NH ? Using the F-product formalism, which was recently proposed, [J. Phys.
Chem., 107, 7181 (2003)] we calculate the time dependent expectation values of
different observable quantities for a simple well known study test case model
Hamiltonian. We carry out a comparison between these results with those
obtained from conventional(i.e., Hermitian) quantum mechanics (QM)
calculations. The remarkable agreement between these results emphasizes the
fact that in the NH-QM, unlike standard QM, there is no need to split the
entire space into two regions; i.e., the interaction region and its
surrounding. Our results open a door for a type of WP propagation calculations
within the NH-QM formalism that until now were impossible.Comment: 20 pages, 5 Postscript figures. To be Published in Physical Review
Comparing bladder neck contracture rate between robotic intracorporeal and extracorporeal neobladder construction
Robot-assisted radical cystectomy (RARC) has become more accessible to surgeons worldwide, and descriptions of intracorporeal urinary diversion techniques, such as orthotopic neobladder construction, have increased. In this study, we aim to compare the rate of bladder neck contracture (BNC) formation between RARC and two different urinary diversion techniques. We retrospectively reviewed our institutional database for patients with bladder cancer who underwent RARC with intracorporeal neobladder (ICNB) construction (n = 11) or extracorporeal neobladder (ECNB) construction (n = 11) between 2012 and 2020. BNC was defined by the need for an additional surgical procedure (e.g., dilatation, urethrotomy). Patients who underwent RARC with ICNB (n = 11) were compared to patients who underwent RARC with ECNB (n = 11) across patient characteristics and postoperative BNC formation rates. Kaplan-Meier curves were generated for freedom from BNC based on the neobladder approach and compared with the log-rank test. For patients who received an ECNB, 73% (8/11) developed a BNC; in comparison, none of the patients in the ICNB group experienced a BNC. Kaplan-Meier survival analysis demonstrates the ECNB group\u27s median probability of freedom from BNC as 1.3 years, while the ICNB group was free of BNC over the study period (p \u3c 0.001). RARC with ICNB creation demonstrated a significantly reduced BNC rate in contrast to RARC with ECNB construction. Longer-term follow-up is needed to assess the durability of this difference in BNC rates
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS
The task of combining cryptographic keys, some of which may be maliciously formed, into one key, which is (pseudo)random is a central task in cryptographic systems. For example, it is a crucial component in the widely used TLS and Signal protocols. From an analytical standpoint, current security proofs model such key combiners as dual-PRFs -- a function which is a PRF when keyed by either of its two inputs -- guaranteeing pseudo-randomness if one of the keys is compromised or even maliciously chosen by an adversary.
However, in practice, protocols mostly use HKDF as a key combiner, despite the fact that HKDF was never proven to be a dual-PRF. Security proofs for these protocols usually work around this issue either by simply assuming HKDF to be a dual-PRF anyway, or by assuming ideal models (e.g. modelling underlying hash functions as random oracles). We identify several deployed protocols and upcoming standards where this is the case. Unfortunately, such heuristic approaches to security tend not to withstand the test of time, often leading to deployed systems that eventually become completely insecure.
In this work, we narrow the gap between theory and practice for key combiners. In particular, we give a construction of a dual-PRF that can be used as a drop-in replacement for current heuristic key combiners in a range of protocols. Our construction follows a theoretical construction by Bellare and Lysyanskaya, and is based on concrete hardness assumptions, phrased in the spirit of one-wayness. Therefore, our construction provides security unless extremely strong attacks against the underlying cryptographic hash function are discovered. Moreover, since these assumptions are considered post-quantum secure, our construction can safely be used in new hybrid protocols. From a practical perspective, our dual-PRF construction is highly efficient, adding only a few microseconds in computation time compared to currently used (heuristic) approaches. We believe that our approach exemplifies a perfect middle-ground for practically efficient constructions that are supported by realistic hardness assumptions
Analysis of Software Patches Using Numerical Abstract Interpretation
International audienceWe present a static analysis for software patches. Given two syntactically close versions of a program, our analysis can infer a semantic difference, and prove that both programs compute the same outputs when run on the same inputs. Our method is based on abstract interpretation, and parametric in the choice of an abstract domain. We focus on numeric properties only. Our method is able to deal with unbounded executions of infinite-state programs, reading from infinite input streams. Yet, it is limited to comparing terminating executions, ignoring non terminating ones.We first present a novel concrete collecting semantics, expressing the behaviors of both programs at the same time. Then, we propose an abstraction of infinite input streams able to prove that programs that read from the same stream compute equal output values. We then show how to leverage classic numeric abstract domains, such as polyhedra or octagons, to build an effective static analysis. We also introduce a novel numeric domain to bound differences between the values of the variables in the two programs, which has linear cost, and the right amount of relationality to express useful properties of software patches.We implemented a prototype and experimented on a few small examples from the literature. Our prototype operates on a toy language, and assumes a joint syntactic representation of two versions of a program given, which distinguishes between common and distinctive parts
Whole Genome Sequencing Shows a Low Proportion of Tuberculosis Disease Is Attributable to Known Close Contacts in Rural Malawi.
BACKGROUND: The proportion of tuberculosis attributable to transmission from close contacts is not well known. Comparison of the genome of strains from index patients and prior contacts allows transmission to be confirmed or excluded. METHODS: In Karonga District, Malawi, all tuberculosis patients are asked about prior contact with others with tuberculosis. All available strains from culture-positive patients were sequenced. Up to 10 single nucleotide polymorphisms between index patients and their prior contacts were allowed for confirmation, and ≥ 100 for exclusion. The population attributable fraction was estimated from the proportion of confirmed transmissions and the proportion of patients with contacts. RESULTS: From 1997-2010 there were 1907 new culture-confirmed tuberculosis patients, of whom 32% reported at least one family contact and an additional 11% had at least one other contact; 60% of contacts had smear-positive disease. Among case-contact pairs with sequences available, transmission was confirmed from 38% (62/163) smear-positive prior contacts and 0/17 smear-negative prior contacts. Confirmed transmission was more common in those related to the prior contact (42.4%, 56/132) than in non-relatives (19.4%, 6/31, p = 0.02), and in those with more intense contact, to younger index cases, and in more recent years. The proportion of tuberculosis attributable to known contacts was estimated to be 9.4% overall. CONCLUSIONS: In this population known contacts only explained a small proportion of tuberculosis cases. Even those with a prior family contact with smear positive tuberculosis were more likely to have acquired their infection elsewhere
Online and social networking interventions for the treatment of depression in young people: a systematic review
BACKGROUND: Major depression accounts for the greatest burden of all diseases globally. The peak onset of depression occurs between adolescence and young adulthood, and for many individuals, depression displays a relapse-remitting and increasingly severe course. Given this, the development of cost-effective, acceptable, and population-focused interventions for depression is critical. A number of online interventions (both prevention and acute phase) have been tested in young people with promising results. As these interventions differ in content, clinician input, and modality, it is important to identify key features (or unhelpful functions) associated with treatment outcomes. OBJECTIVE: A systematic review of the research literature was undertaken. The review was designed to focus on two aspects of online intervention: (1) standard approaches evaluating online intervention content in randomized controlled designs (Section 1), and (2) second-generation online interventions and services using social networking (eg, social networking sites and online support groups) in any type of research design (Section 2). METHODS: Two specific literature searches were undertaken. There was no date range specified. The Section 1 search, which focused on randomized controlled trials, included only young people (12-25 years) and yielded 101 study abstracts, of which 15 met the review inclusion criteria. The Section 2 search, which included all study design types and was not restricted in terms of age, yielded 358 abstracts, of which 22 studies met the inclusion criteria. Information about the studies and their findings were extracted and tabulated for review. RESULTS: The 15 studies identified in Section 1 described 10 trials testing eight different online interventions, all of which were based on a cognitive behavioral framework. All but one of the eight identified studies reported positive results; however, only five of the 15 studies used blinded interviewer administered outcomes with most trials using self-report data. Studies varied significantly in presentation of intervention content, treatment dose, and dropout. Only two studies included moderator or clinician input. Results for Section 2 were less consistent. None of the Section 2 studies reported controlled or randomized designs. With the exception of four studies, all included participants were younger than 25 years of age. Eight of the 16 social networking studies reported positive results for depression-related outcomes. The remaining studies were either mixed or negative. Findings for online support groups tended to be more positive; however, noteworthy risks were identified. CONCLUSIONS: Online interventions with a broad cognitive behavioral focus appear to be promising in reducing depression symptomology in young people. Further research is required into the effectiveness of online interventions delivering cognitive behavioral subcomponents, such as problem-solving therapy. Evidence for the use of social networking is less compelling, although limited by a lack of well-designed studies and social networking interventions. A range of future social networking therapeutic opportunities are highlighted
- …