369 research outputs found
DNA transfer: The role of temperature and drying time
It has previously been shown, and reconfirmed here, that biological material on a substrate will transfer readily upon contact with another substrate when wet but hardly when dry. There is however a paucity of data regarding the speed at which body fluids dry and how this may affect its transfer upon contact. Here we conduct transfer experiments at 4 ïżœC, 22 ïżœC and 40 ïżœC at multiple time points during the drying process. The speed at which blood dries is dependent on the temperature, with the drying process complete within 15â60 min. The percentage of deposited DNA transferred upon contact follows an exponential pattern of decline from soon after deposition, decreasing until the sample is dry. There are no differences in transfer rates upon contact among the different temperature conditions within the first 5 min or after 60 min since deposit, but significant variation occurs between these time points. When considering the likelihood of a proposed scenario that incorporates one or more contact situations it is important to consider the timing of the potential transfer event(s) relative to when the biological sample in question was initially deposited. The results of this study will assist the interpretation and evaluation of alternative scenarios involving transfer of biological substances
MRI-based screening for metabolic insufficiency of leg muscle during aerobic exercise in Cystic Fibrosis
There is evidence for mitochondrial dysfunction in various tissues in Cystic Fibrosis (CF) including muscle. Among others, a slow rate of high-energy phosphate resynthesis following exercise involving single limb muscle activity was found in human CF using in vivo 31P magnetic resonance spectroscopy (MRS). This raises the question whether this outcome would be ameliorated versus exacerbated if instead an exercise regime is used that puts a significant cardiopulmonary load on the body as in running or bicycling. This is of interest because exercise therapy is commonly prescribed in CF. To investigate this matter, ten pediatric CF patients (age 12â16 years) and healthy peers performed two ramp exercise tests to volitional exhaustion using a bicycle ergometer fit for use inside a MR scanner. Endurance, VO2max and heart rate were determined in the exercise laboratory. Quadriceps muscle energy-and acid/base balance during exercise and recovery were measured on a separate day using MR imaging-based 31P MRS. This study brings together for the first time this powerful biomedical imaging platform and whole body exercise testing in the clinical setting of human CF
Correlation of carotid artery reactivity with cardiovascular risk factors and coronary artery vasodilator responses in asymptomatic, healthy volunteers.
OBJECTIVES: Carotid artery reactivity (CAR%), involving carotid artery diameter responses to a cold pressor test (CPT), is a noninvasive measure of conduit artery function in humans. This study examined the impact of age and cardiovascular risk factors on the CAR% and the relationship between CAR% and coronary artery vasodilator responses to the CPT. METHODS: Ultrasound was used to measure resting and peak carotid artery diameters during the CPT, with CAR% being calculated as the relative change from baseline (%). We compared CAR% between young (nâ=â50, 24â±â3 years) and older participants (nâ=â44, 61â±â8 years), and subsequently assessed relationships between CAR% and traditional cardiovascular risk factors in 50 participants (44â±â21 years). Subsequently, we compared left anterior descending (LAD) artery velocity (using transthoracic Doppler) with carotid artery diameter (i.e. CAR%) during the CPT (nâ=â33, 37â±â17 years). RESULTS: A significantly larger CAR% was found in young versus older healthy participants (4.1â±â3.7 versus 1.8â±â2.6, Pâ<â0.001). Participants without cardiovascular risk factors demonstrated a higher CAR% than those with at least two risk factors (2.9â±â2.9 versus 0.5â±â2.9, Pâ=â0.019). Carotid artery diameter and LAD velocity increased during CPT (Pâ<â0.001). Carotid diameter and change in velocity correlated with LAD velocity (râ=â0.486 and 0.402, Pâ<â0.004 and 0.02, respectively). CONCLUSION: Older age and cardiovascular risk factors are related to lower CAR%, while CAR% shows good correlation with coronary artery responses to the CPT. Therefore, CAR% may represent a valuable technique to assess cardiovascular risk, while CAR% seems to reflect coronary artery vasodilator function
Scenariostudie materiaal-voorraad, vraag en secundair aanbod in gebouwen: Onderdeel van het werkprogramma Monitoring & Sturing Circulaire Economie
Industrial Ecolog
Quantum resource estimates for computing elliptic curve discrete logarithms
We give precise quantum resource estimates for Shor's algorithm to compute
discrete logarithms on elliptic curves over prime fields. The estimates are
derived from a simulation of a Toffoli gate network for controlled elliptic
curve point addition, implemented within the framework of the quantum computing
software tool suite LIQ. We determine circuit implementations for
reversible modular arithmetic, including modular addition, multiplication and
inversion, as well as reversible elliptic curve point addition. We conclude
that elliptic curve discrete logarithms on an elliptic curve defined over an
-bit prime field can be computed on a quantum computer with at most qubits using a quantum circuit of at most Toffoli gates. We are able to classically simulate the
Toffoli networks corresponding to the controlled elliptic curve point addition
as the core piece of Shor's algorithm for the NIST standard curves P-192,
P-224, P-256, P-384 and P-521. Our approach allows gate-level comparisons to
recent resource estimates for Shor's factoring algorithm. The results also
support estimates given earlier by Proos and Zalka and indicate that, for
current parameters at comparable classical security levels, the number of
qubits required to tackle elliptic curves is less than for attacking RSA,
suggesting that indeed ECC is an easier target than RSA.Comment: 24 pages, 2 tables, 11 figures. v2: typos fixed and reference added.
ASIACRYPT 201
Improved Classical Cryptanalysis of SIKE in Practice
Item does not contain fulltextPKC 202
CROO: A universal infrastructure and protocol to detect identity fraud
Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) infrastructure and protocol to either prevent IDF (by detecting attempts thereof), or limit its consequences (by identifying cases of previously undetected IDF). CROO is a capture resilient one-time password scheme, whereby each user must carry a personal trusted device used to generate one-time passwords (OTPs) verified by online trusted parties. Multiple trusted parties may be used for increased scalability. OTPs can be used regardless of a transactionâs purpose (e.g. user authentication or financial payment), associated credentials, and online or on-site nature; this makes CROO a universal scheme. OTPs are not sent in cleartext; they are used as keys to compute MACs of hashed transaction information, in a manner allowing OTP-verifying parties to confirm that given user credentials (i.e. OTP-keyed MACs) correspond to claimed hashed transaction details. Hashing transaction details increases user privacy. Each OTP is generated from a PIN-encrypted non-verifiable key; this makes usersâ devices resilient to off-line PIN-guessing attacks. CROOâs credentials can be formatted as existing user credentials (e.g. credit cards or driverâs licenses)
Counting points on hyperelliptic curves over finite fields
International audienceWe describe some algorithms for computing the cardinality of hyperelliptic curves and their Jacobians over finite fields. They include several methods for obtaining the result modulo small primes and prime powers, in particular an algorithm Ă la Schoof for genus 2 using Cantor's division polynomials. These are combined with a birthday paradox algorithm to calculate the cardinality. Our methods are practical and we give actual results computed using our current implementation. The Jacobian groups we handle are larger than those previously reported in the literature
- âŠ