369 research outputs found

    DNA transfer: The role of temperature and drying time

    Get PDF
    It has previously been shown, and reconfirmed here, that biological material on a substrate will transfer readily upon contact with another substrate when wet but hardly when dry. There is however a paucity of data regarding the speed at which body fluids dry and how this may affect its transfer upon contact. Here we conduct transfer experiments at 4 ïżœC, 22 ïżœC and 40 ïżœC at multiple time points during the drying process. The speed at which blood dries is dependent on the temperature, with the drying process complete within 15–60 min. The percentage of deposited DNA transferred upon contact follows an exponential pattern of decline from soon after deposition, decreasing until the sample is dry. There are no differences in transfer rates upon contact among the different temperature conditions within the first 5 min or after 60 min since deposit, but significant variation occurs between these time points. When considering the likelihood of a proposed scenario that incorporates one or more contact situations it is important to consider the timing of the potential transfer event(s) relative to when the biological sample in question was initially deposited. The results of this study will assist the interpretation and evaluation of alternative scenarios involving transfer of biological substances

    MRI-based screening for metabolic insufficiency of leg muscle during aerobic exercise in Cystic Fibrosis

    Get PDF
    There is evidence for mitochondrial dysfunction in various tissues in Cystic Fibrosis (CF) including muscle. Among others, a slow rate of high-energy phosphate resynthesis following exercise involving single limb muscle activity was found in human CF using in vivo 31P magnetic resonance spectroscopy (MRS). This raises the question whether this outcome would be ameliorated versus exacerbated if instead an exercise regime is used that puts a significant cardiopulmonary load on the body as in running or bicycling. This is of interest because exercise therapy is commonly prescribed in CF. To investigate this matter, ten pediatric CF patients (age 12–16 years) and healthy peers performed two ramp exercise tests to volitional exhaustion using a bicycle ergometer fit for use inside a MR scanner. Endurance, VO2max and heart rate were determined in the exercise laboratory. Quadriceps muscle energy-and acid/base balance during exercise and recovery were measured on a separate day using MR imaging-based 31P MRS. This study brings together for the first time this powerful biomedical imaging platform and whole body exercise testing in the clinical setting of human CF

    Correlation of carotid artery reactivity with cardiovascular risk factors and coronary artery vasodilator responses in asymptomatic, healthy volunteers.

    Get PDF
    OBJECTIVES: Carotid artery reactivity (CAR%), involving carotid artery diameter responses to a cold pressor test (CPT), is a noninvasive measure of conduit artery function in humans. This study examined the impact of age and cardiovascular risk factors on the CAR% and the relationship between CAR% and coronary artery vasodilator responses to the CPT. METHODS: Ultrasound was used to measure resting and peak carotid artery diameters during the CPT, with CAR% being calculated as the relative change from baseline (%). We compared CAR% between young (n = 50, 24 ± 3 years) and older participants (n = 44, 61 ± 8 years), and subsequently assessed relationships between CAR% and traditional cardiovascular risk factors in 50 participants (44 ± 21 years). Subsequently, we compared left anterior descending (LAD) artery velocity (using transthoracic Doppler) with carotid artery diameter (i.e. CAR%) during the CPT (n = 33, 37 ± 17 years). RESULTS: A significantly larger CAR% was found in young versus older healthy participants (4.1 ± 3.7 versus 1.8 ± 2.6, P < 0.001). Participants without cardiovascular risk factors demonstrated a higher CAR% than those with at least two risk factors (2.9 ± 2.9 versus 0.5 ± 2.9, P = 0.019). Carotid artery diameter and LAD velocity increased during CPT (P < 0.001). Carotid diameter and change in velocity correlated with LAD velocity (r = 0.486 and 0.402, P < 0.004 and 0.02, respectively). CONCLUSION: Older age and cardiovascular risk factors are related to lower CAR%, while CAR% shows good correlation with coronary artery responses to the CPT. Therefore, CAR% may represent a valuable technique to assess cardiovascular risk, while CAR% seems to reflect coronary artery vasodilator function

    Quantum resource estimates for computing elliptic curve discrete logarithms

    Get PDF
    We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition, implemented within the framework of the quantum computing software tool suite LIQUiâˆŁâŸ©Ui|\rangle. We determine circuit implementations for reversible modular arithmetic, including modular addition, multiplication and inversion, as well as reversible elliptic curve point addition. We conclude that elliptic curve discrete logarithms on an elliptic curve defined over an nn-bit prime field can be computed on a quantum computer with at most 9n+2⌈log⁥2(n)⌉+109n + 2\lceil\log_2(n)\rceil+10 qubits using a quantum circuit of at most 448n3log⁥2(n)+4090n3448 n^3 \log_2(n) + 4090 n^3 Toffoli gates. We are able to classically simulate the Toffoli networks corresponding to the controlled elliptic curve point addition as the core piece of Shor's algorithm for the NIST standard curves P-192, P-224, P-256, P-384 and P-521. Our approach allows gate-level comparisons to recent resource estimates for Shor's factoring algorithm. The results also support estimates given earlier by Proos and Zalka and indicate that, for current parameters at comparable classical security levels, the number of qubits required to tackle elliptic curves is less than for attacking RSA, suggesting that indeed ECC is an easier target than RSA.Comment: 24 pages, 2 tables, 11 figures. v2: typos fixed and reference added. ASIACRYPT 201

    CROO: A universal infrastructure and protocol to detect identity fraud

    Get PDF
    Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) infrastructure and protocol to either prevent IDF (by detecting attempts thereof), or limit its consequences (by identifying cases of previously undetected IDF). CROO is a capture resilient one-time password scheme, whereby each user must carry a personal trusted device used to generate one-time passwords (OTPs) verified by online trusted parties. Multiple trusted parties may be used for increased scalability. OTPs can be used regardless of a transaction’s purpose (e.g. user authentication or financial payment), associated credentials, and online or on-site nature; this makes CROO a universal scheme. OTPs are not sent in cleartext; they are used as keys to compute MACs of hashed transaction information, in a manner allowing OTP-verifying parties to confirm that given user credentials (i.e. OTP-keyed MACs) correspond to claimed hashed transaction details. Hashing transaction details increases user privacy. Each OTP is generated from a PIN-encrypted non-verifiable key; this makes users’ devices resilient to off-line PIN-guessing attacks. CROO’s credentials can be formatted as existing user credentials (e.g. credit cards or driver’s licenses)

    Counting points on hyperelliptic curves over finite fields

    Get PDF
    International audienceWe describe some algorithms for computing the cardinality of hyperelliptic curves and their Jacobians over finite fields. They include several methods for obtaining the result modulo small primes and prime powers, in particular an algorithm Ă  la Schoof for genus 2 using Cantor's division polynomials. These are combined with a birthday paradox algorithm to calculate the cardinality. Our methods are practical and we give actual results computed using our current implementation. The Jacobian groups we handle are larger than those previously reported in the literature
    • 

    corecore