313 research outputs found

    Security Proof Against Collective Attacks for an Experimentally Feasible Semi-Quantum Key Distribution Protocol

    Full text link
    Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key, even if one of these parties (say, Alice) is classical. However, most SQKD protocols suffer from severe practical security problems when implemented using photons. The recently developed "Mirror protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an experimentally feasible SQKD protocol overcoming those drawbacks. The Mirror protocol was proven robust (namely, it was proven secure against a limited class of attacks including all noiseless attacks), but its security in case some noise is allowed (natural or due to eavesdropping) has not been proved yet. Here we prove security of the Mirror protocol against a wide class of quantum attacks (the "collective attacks"), and we evaluate the allowed noise threshold and the resulting key rate.Comment: 17 pages; 3 figure

    Efficient Processing of Spatial Joins Using R-Trees

    Get PDF
    Abstract: In this paper, we show that spatial joins are very suitable to be processed on a parallel hardware platform. The parallel system is equipped with a so-called shared virtual memory which is well-suited for the design and implementation of parallel spatial join algorithms. We start with an algorithm that consists of three phases: task creation, task assignment and parallel task execu-tion. In order to reduce CPU- and I/O-cost, the three phases are processed in a fashion that pre-serves spatial locality. Dynamic load balancing is achieved by splitting tasks into smaller ones and reassigning some of the smaller tasks to idle processors. In an experimental performance compar-ison, we identify the advantages and disadvantages of several variants of our algorithm. The most efficient one shows an almost optimal speed-up under the assumption that the number of disks is sufficiently large. Topics: spatial database systems, parallel database systems

    Network analysis of PTSD and depressive symptoms in 158,139 treatment-seeking veterans with PTSD

    Get PDF
    Background In recent years, a new framework for analyzing and understanding posttraumatic stress disorder (PTSD) was introduced; the network approach. Up until now, network analysis studies of PTSD were largely conducted on small to medium sample sizes (N < 1,000), which might be a possible cause of variability in main findings. Moreover, only a limited number of network studies investigated comorbidity.Methods In this study, we utilized a large sample to conduct a network analysis of 17 symptoms of PTSD (DSM-IV), and compared it to the result of a second network consisting of symptoms of PTSD and depression (based on Patient Health Questionnaire-9 [PHQ-9]). Our sample consisted of 502,036 treatment-seeking veterans, out of which 158,139 had fully completed the assessment of symptoms of PTSD and a subsample of 32,841 with valid PCL and PHQ-9 that was administered within 14 days or less.Results Analyses found that in the PTSD network, the most central symptoms were feeling distant or cut off from others, followed by feeling very upset when reminded of the event, and repeated disturbing memories or thoughts of the event. In the combined network, we found that concentration difficulties and anhedonia are two of the five most central symptoms.Conclusion Our findings replicate the centrality of intrusion symptoms in PTSD symptoms' network. Taking into account the large sample and high stability of the network structure, we believe our study can answer some of the criticism regarding stability of cross-sectional network structures.Stress and Psychopatholog

    Protein cross-linking by chlorinated polyamines and transglutamylation stabilizes neutrophil extracellular traps.

    Get PDF
    Neutrophil extracellular trap (NET) ejected from activated dying neutrophils is a highly ordered structure of DNA and selected proteins capable to eliminate pathogenic microorganisms. Biochemical determinants of the non-randomly formed stable NETs have not been revealed so far. Studying the formation of human NETs we have observed that polyamines were incorporated into the NET. Inhibition of myeloperoxidase, which is essential for NET formation and can generate reactive chlorinated polyamines through hypochlorous acid, decreased polyamine incorporation. Addition of exogenous primary amines that similarly to polyamines inhibit reactions catalyzed by the protein cross-linker transglutaminases (TGases) has similar effect. Proteomic analysis of the highly reproducible pattern of NET components revealed cross-linking of NET proteins through chlorinated polyamines and varepsilon(gamma-glutamyl)lysine as well as bis-gamma-glutamyl polyamine bonds catalyzed by the TGases detected in neutrophils. Competitive inhibition of protein cross-linking by monoamines disturbed the cross-linking pattern of NET proteins, which resulted in the loss of the ordered structure of the NET and significantly reduced capacity to trap bacteria. Our findings provide explanation of how NETs are formed in a reproducible and ordered manner to efficiently neutralize microorganisms at the first defense line of the innate immune system

    The influence of the cultural climate of the training environment on physicians' self-perception of competence and preparedness for practice

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>In current supervisory practice, the learning environment in which the training of specialist registrars (SpRs) takes place is important. Examples of such learning environments are the hospital settings and/or geographical locations where training occurs. Our objective was to investigate whether the cultural climate of different learning environments influences physicians' perceived level of competence and preparedness for practice.</p> <p>Methods</p> <p>An electronic questionnaire was sent to an equal group of paediatricians who had trained in clinical settings located in Europe and the Caribbean. 30 items (Likert scale 1–4 = totally disagree-totally agree) were used to measure the level of preparedness of the respondents in 7 physician competencies.</p> <p>Results</p> <p>42 participants were included for analysis. The distribution of participants in both groups was comparable. The overall perception of preparedness in the Caribbean group was 2.93 (SD = 0.47) and 2.86 (SD = 0.72) in the European group. The European group felt less prepared in the competency as manager 1.81 (SD = 1.06) compared to their Caribbean counterparts 2.72 (SD = 0.66). The difference was significant (p = 0.006).</p> <p>Conclusion</p> <p>The training in the different environments was perceived as adequate and comparable in effect. The learning environment's cultural climate appeared to influence the physician's perception of their competencies and preparedness for clinical practice.</p

    Towards energy aware cloud computing application construction

    Get PDF
    The energy consumption of cloud computing continues to be an area of significant concern as data center growth continues to increase. This paper reports on an energy efficient interoperable cloud architecture realised as a cloud toolbox that focuses on reducing the energy consumption of cloud applications holistically across all deployment models. The architecture supports energy efficiency at service construction, deployment and operation. We discuss our practical experience during implementation of an architectural component, the Virtual Machine Image Constructor (VMIC), required to facilitate construction of energy aware cloud applications. We carry out a performance evaluation of the component on a cloud testbed. The results show the performance of Virtual Machine construction, primarily limited by available I/O, to be adequate for agile, energy aware software development. We conclude that the implementation of the VMIC is feasible, incurs minimal performance overhead comparatively to the time taken by other aspects of the cloud application construction life-cycle, and make recommendations on enhancing its performance

    Clusters versus Affinity-Based Approaches in F. tularensis Whole Genome Search of CTL Epitopes

    Get PDF
    Deciphering the cellular immunome of a bacterial pathogen is challenging due to the enormous number of putative peptidic determinants. State-of-the-art prediction methods developed in recent years enable to significantly reduce the number of peptides to be screened, yet the number of remaining candidates for experimental evaluation is still in the range of ten-thousands, even for a limited coverage of MHC alleles. We have recently established a resource-efficient approach for down selection of candidates and enrichment of true positives, based on selection of predicted MHC binders located in high density “hotspots" of putative epitopes. This cluster-based approach was applied to an unbiased, whole genome search of Francisella tularensis CTL epitopes and was shown to yield a 17–25 fold higher level of responders as compared to randomly selected predicted epitopes tested in Kb/Db C57BL/6 mice. In the present study, we further evaluate the cluster-based approach (down to a lower density range) and compare this approach to the classical affinity-based approach by testing putative CTL epitopes with predicted IC50 values of <10 nM. We demonstrate that while the percent of responders achieved by both approaches is similar, the profile of responders is different, and the predicted binding affinity of most responders in the cluster-based approach is relatively low (geometric mean of 170 nM), rendering the two approaches complimentary. The cluster-based approach is further validated in BALB/c F. tularensis immunized mice belonging to another allelic restriction (Kd/Dd) group. To date, the cluster-based approach yielded over 200 novel F. tularensis peptides eliciting a cellular response, all were verified as MHC class I binders, thereby substantially increasing the F. tularensis dataset of known CTL epitopes. The generality and power of the high density cluster-based approach suggest that it can be a valuable tool for identification of novel CTLs in proteomes of other bacterial pathogens

    Interrupting peptidoglycan deacetylation during Bdellovibrio predator-prey interaction prevents ultimate destruction of prey wall, liberating bacterial-ghosts

    Get PDF
    The peptidoglycan wall, located in the periplasm between the inner and outer membranes of the cell envelope in Gram-negative bacteria, maintains cell shape and endows osmotic robustness. Predatory Bdellovibrio bacteria invade the periplasm of other bacterial prey cells, usually crossing the peptidoglycan layer, forming transient structures called bdelloplasts within which the predators replicate. Prey peptidoglycan remains intact for several hours, but is modified and then degraded by predators escaping. Here we show predation is altered by deleting two Bdellovibrio N-acetylglucosamine (GlcNAc) deacetylases, one of which we show to have a unique two domain structure with a novel regulatory-”plug”. Deleting the deacetylases limits peptidoglycan degradation and rounded prey cell “ghosts” persist after mutant-predator exit. Mutant predators can replicate unusually in the periplasmic region between the peptidoglycan wall and the outer membrane rather than between wall and inner-membrane, yet still obtain nutrients from the prey cytoplasm. Deleting two further genes encoding DacB/PBP4 family proteins, known to decrosslink and round prey peptidoglycan, results in a quadruple mutant Bdellovibrio which leaves prey-shaped ghosts upon predation. The resultant bacterial ghosts contain cytoplasmic membrane within bacteria-shaped peptidoglycan surrounded by outer membrane material which could have promise as “bacterial skeletons” for housing artificial chromosomes
    corecore