605 research outputs found

    Cruise Report 69-S-3: Pelagic fish and trawling survey of Santa Barbara oil spill

    Get PDF
    (PDF contains 5 pages

    Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries

    Full text link
    We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and other tasks, where the computing nodes is expected to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we try to bridge the gap between theoretical algorithms in the security domain, and a practical Peer-to-Peer deployment. We consider two security models. The first is the semi-honest model where peers correctly follow the protocol, but try to reveal private information. We provide three possible schemes for secure multi-party numerical computation for this model and identify a single light-weight scheme which outperforms the others. Using extensive simulation results over real Internet topologies, we demonstrate that our scheme is scalable to very large networks, with up to millions of nodes. The second model we consider is the malicious peers model, where peers can behave arbitrarily, deliberately trying to affect the results of the computation as well as compromising the privacy of other peers. For this model we provide a fourth scheme to defend the execution of the computation against the malicious peers. The proposed scheme has a higher complexity relative to the semi-honest model. Overall, we provide the Peer-to-Peer network designer a set of tools to choose from, based on the desired level of security.Comment: Submitted to Peer-to-Peer Networking and Applications Journal (PPNA) 200

    Parasites of the Deep-Sea Smelt Bathylagus euryops (Argentiniformes: Microstomatidae) from the Charlie-Gibbs Fracture Zone (CGFZ)

    Get PDF
    The deep-sea smelt Bathylagus euryops, caught in July 2004 at the Charlie-Gibbs Fracture Zone (CGFZ) of the Mid-Atlantic Ridge (North Atlantic), was studied for metazoan parasites and diet composition. A total of 86 specimens with standard lengths between 6.4 and 22.1 cm (mean 13.6 cm) were examined. The parasite fauna consisted of five species: three Digenea, one Cestoda and one Nematoda. The predominant parasites were Lecithaster sp. (Digenea) and an unidentified bothriocephalidean cestode. The only nematode, Anisakis sp., occurred with a low prevalence. Bathylagus euryops at CGFZ serves as final host for the three digeneans, and as intermediate host for the cestodes and Anisakis sp. Stomach content analysis revealed a mesozooplankton crustacean diet, while 95.3% of the stomachs contained unidentified tissue

    A novel accessory muscle in the flexor compartment of anterior forearm inserting into the tenosynovium of the flexor pollicis longus

    Get PDF
    A common variant of accessory muscles in the anterior forearm is the Gantzer’s muscle (GM). GM arises as a muscle belly from flexor digitorum superficialis (FDS) or ulnar coronoid process to merge distally with the flexor pollicis longus (FPL) muscle. In the present case report, we describe a novel accessory muscle in the flexor compartment of the forearm. The proximal attachment was tendinous and came from three sources: FDS muscle, ulnar coronoid process, and the medial aspect of the proximal radius. The distal tendon of the novel accessory muscle ran parallel to FPL, passed through the carpal tunnel, and entered the palmar aspect of the hand. In the hand, the tendon thinned out and blended with the tenosynovium of the FPL, contributing to the sheath around the FPL tendon. This accessory muscle of the FPL is comparable to the frequently documented Gantzer muscle (GM); however, the present case exhibited fundamental nuances that distinguish it from the previously described iterations of the GM in the following ways: 1) The novel accessory muscle is tendinous from its proximal origin and throughout the upper one-third of the forearm, and one component of its origin arose from the medial aspect of the radius. Gantzer muscles with an origin on the radius have not been previously reported. 2) In the middle one-third, the tendinous proximal attachment transitioned to a muscle belly that passed through the carpal tunnel and entered the hand. 3) In the hand, the novel tendon widened, thinned, and merged with the tenosynovium of the FPL. Accessory muscles are a common finding in the anterior forearm during cadaveric dissection. In patients, they can be the cause of neuropathies due to compression of the anterior interosseous nerve. Awareness of variations is also important for clinicians who examine the forearm and hand, as well as hand and surgeons

    Sub-logarithmic Distributed Oblivious RAM with Small Block Size

    Get PDF
    Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to securely execute RAM programs over data that is stored in an untrusted server. Distributed Oblivious RAM is a variant of ORAM, where the data is stored in m>1m>1 servers. Extensive research over the last few decades have succeeded to reduce the bandwidth overhead of ORAM schemes, both in the single-server and the multi-server setting, from O(N)O(\sqrt{N}) to O(1)O(1). However, all known protocols that achieve a sub-logarithmic overhead either require heavy server-side computation (e.g. homomorphic encryption), or a large block size of at least Ω(log⁥3N)\Omega(\log^3 N). In this paper, we present a family of distributed ORAM constructions that follow the hierarchical approach of Goldreich and Ostrovsky [GO96]. We enhance known techniques, and develop new ones, to take better advantage of the existence of multiple servers. By plugging efficient known hashing schemes in our constructions, we get the following results: 1. For any m≄2m\geq 2, we show an mm-server ORAM scheme with O(log⁥N/log⁥log⁥N)O(\log N/\log\log N) overhead, and block size Ω(log⁥2N)\Omega(\log^2 N). This scheme is private even against an (m−1)(m-1)-server collusion. 2. A 3-server ORAM construction with O(ω(1)log⁥N/log⁥log⁥N)O(\omega(1)\log N/\log\log N) overhead and a block size almost logarithmic, i.e. Ω(log⁥1+Ï”N)\Omega(\log^{1+\epsilon}N). We also investigate a model where the servers are allowed to perform a linear amount of light local computations, and show that constant overhead is achievable in this model, through a simple four-server ORAM protocol

    Assessing the trophic ecology of three sympatric squid in the marine ecosystem off the Patagonian Shelf by combining stomach content and stable isotopic analyses

    Get PDF
    Squid species are important components of the Southern Atlantic Ocean ecosystems, as they prey on a wide range of crustaceans, fish and cephalopods. As a result of this trophic interaction and their high abundance, they are considered reliable indicators of energy transfer and biomass in the food web. We identified Illex argentinus, Doryteuthis gahi and Onykia ingens as the most important squid species interacting on the Patagonian shelf, and used isotope analysis and stomach content identification to assess the feeding ecology and interaction of these squids in the ecosystem. Our results describe trophic interactions by direct predation of O. ingens and I. argentinus on D. gahi, and a trophic overlap of the three squid, and indicate a higher trophic level and differences in the foraging areas for mature and maturing D. gahi inferred through ÎŽ15N and ÎŽ13C concentrations. These differences were related to the segregation and different habitat of large mature D. gahi and suggest a food enrichment of C and N based on feeding sources other than those used by small maturing D. gahi and I. argentinus and O. ingens.VersiĂłn del editor1,484

    The reductive activation of CO2 across a Ti═Ti double bond: synthetic, structural, and mechanistic studies

    Get PDF
    [Image: see text] The reactivity of the bis(pentalene)dititanium double-sandwich compound Ti(2)Pn(†)(2) (1) (Pn(†) = 1,4-{Si(i)Pr(3)}(2)C(8)H(4)) with CO(2) is investigated in detail using spectroscopic, X-ray crystallographic, and computational studies. When the CO(2) reaction is performed at −78 °C, the 1:1 adduct 4 is formed, and low-temperature spectroscopic measurements are consistent with a CO(2) molecule bound symmetrically to the two Ti centers in a ÎŒ:η(2),η(2) binding mode, a structure also indicated by theory. Upon warming to room temperature the coordinated CO(2) is quantitatively reduced over a period of minutes to give the bis(oxo)-bridged dimer 2 and the dicarbonyl complex 3. In situ NMR studies indicated that this decomposition proceeds in a stepwise process via monooxo (5) and monocarbonyl (7) double-sandwich complexes, which have been independently synthesized and structurally characterized. 5 is thermally unstable with respect to a ÎŒ-O dimer in which the Ti–Ti bond has been cleaved and one pentalene ligand binds in an η(8) fashion to each of the formally Ti(III) centers. The molecular structure of 7 shows a “side-on” bound carbonyl ligand. Bonding of the double-sandwich species Ti(2)Pn(2) (Pn = C(8)H(6)) to other fragments has been investigated by density functional theory calculations and fragment analysis, providing insight into the CO(2) reaction pathway consistent with the experimentally observed intermediates. A key step in the proposed mechanism is disproportionation of a mono(oxo) di-Ti(III) species to yield di-Ti(II) and di-Ti(IV) products. 1 forms a structurally characterized, thermally stable CS(2) adduct 8 that shows symmetrical binding to the Ti(2) unit and supports the formulation of 4. The reaction of 1 with COS forms a thermally unstable complex 9 that undergoes scission to give mono(ÎŒ-S) mono(CO) species 10. Ph(3)PS is an effective sulfur transfer agent for 1, enabling the synthesis of mono(ÎŒ-S) complex 11 with a double-sandwich structure and bis(ÎŒ-S) dimer 12 in which the Ti–Ti bond has been cleaved

    Feeding spectra and activity of the freshwater crab Trichodactylus kensleyi (Decapoda: Brachyura: Trichodactylidae) at La Plata basin

    Get PDF
    Background: In inland water systems, it is important to characterize the trophic links in order to identify the ‘trophic species’ and, from the studies of functional diversity, understand the dynamics of matter and energy in these environments. The aim of this study is to analyze the natural diet of Trichodactylus kensleyi of subtropical rainforest streams and corroborate the temporal variation in the trophic activity during day hours. Results: A total of 15 major taxonomic groups were recognized in gut contents. The index of relative importance identified the following main prey items in decreasing order of importance: vegetal remains, oligochaetes, chironomid larvae, and algae. A significant difference was found in the amount of full stomachs during day hours showing a less trophic activity at midday and afternoon. The index of relative importance values evidenced the consumption of different prey according to day moments. Results of the gut content indicate that T. kensleyi is an omnivorous crab like other trichodactylid species. Opportunistic behavior is revealed by the ingestion of organisms abundant in streams such as oligochaetes and chironomid larvae. The consumption of allochthonous plant debris shows the importance of this crab as shredder in subtropical streams. However, the effective assimilation of plant matter is yet unknown in trichodactylid crabs. Conclusions: This research provides knowledge that complements previous studies about trophic relationships of trichodactylid crabs and supported the importance of T. kensleyi in the transference of energy and matter from benthic community and riparian sources to superior trophic levels using both macro- and microfauna.Fil: Williner, VerĂłnica. Consejo Nacional de Investigaciones CientĂ­ficas y TĂ©cnicas. Centro CientĂ­fico TecnolĂłgico Conicet - Santa Fe. Instituto Nacional de LimnologĂ­a. Universidad Nacional del Litoral. Instituto Nacional de LimnologĂ­a; Argentina. Universidad Nacional del Litoral. Facultad de Humanidades y Ciencias; ArgentinaFil: de Azevedo Carvalho, Debora. Consejo Nacional de Investigaciones CientĂ­ficas y TĂ©cnicas. Centro CientĂ­fico TecnolĂłgico Conicet - Santa Fe. Instituto Nacional de LimnologĂ­a. Universidad Nacional del Litoral. Instituto Nacional de LimnologĂ­a; ArgentinaFil: Collins, Pablo Agustin. Consejo Nacional de Investigaciones CientĂ­ficas y TĂ©cnicas. Centro CientĂ­fico TecnolĂłgico Conicet - Santa Fe. Instituto Nacional de LimnologĂ­a. Universidad Nacional del Litoral. Instituto Nacional de LimnologĂ­a; Argentina. Universidad Nacional del Litoral. Facultad de BioquĂ­mica y Ciencias BiolĂłgicas; Argentin

    Two-Sided Malicious Security for Private Intersection-Sum with Cardinality

    Get PDF
    Private intersection-sum with cardinality allows two parties, where each party holds a private set and one of the parties additionally holds a private integer value associated with each element in her set, to jointly compute the cardinality of the intersection of the two sets as well as the sum of the associated integer values for all the elements in the intersection, and nothing beyond that. We present a new construction for private intersection sum with cardinality that provides malicious security with abort and guarantees that both parties receive the output upon successful completion of the protocol. A central building block for our constructions is a primitive called shuffled distributed oblivious PRF (DOPRF), which is a PRF that offers oblivious evaluation using a secret key shared between two parties, and in addition to this allows obliviously permuting the PRF outputs of several parallel oblivious evaluations. We present the first construction for shuffled DOPRF with malicious security. We further present several new sigma proof protocols for relations across Pedersen commitments, ElGamal encryptions, and Camenisch-Shoup encryptions that we use in our main construction, for which we develop new batching techniques to reduce communication. We implement and evaluate the efficiency of our protocol and show that we can achieve communication cost that is only 4-5 times greater than the most efficient semi-honest protocol. When measuring monetary cost of executing the protocol in the cloud, our protocol is 25 times more expensive than the semi-honest protocol. Our construction also allows for different parameter regimes that enable trade-offs between communication and computation

    Activation and Inhibition of Transglutaminase 2 in Mice

    Get PDF
    Transglutaminase 2 (TG2) is an allosterically regulated enzyme with transamidating, deamidating and cell signaling activities. It is thought to catalyze sequence-specific deamidation of dietary gluten peptides in the small intestines of celiac disease patients. Because this modification has profound consequences for disease pathogenesis, there is considerable interest in the design of small molecule TG2 inhibitors. Although many classes of TG2 inhibitors have been reported, thus far an animal model for screening them to identify promising celiac drug candidates has remained elusive. Using intraperitoneal administration of the toll-like receptor 3 (TLR3) ligand, polyinosinic-polycytidylic acid (poly(I∶C)), we induced rapid TG2 activation in the mouse small intestine. Dose dependence was observed in the activation of TG2 as well as the associated villous atrophy, gross clinical response, and rise in serum concentration of the IL-15/IL-15R complex. TG2 activity was most pronounced in the upper small intestine. No evidence of TG2 activation was observed in the lung mucosa, nor were TLR7/8 ligands able to elicit an analogous response. Introduction of ERW1041E, a small molecule TG2 inhibitor, in this mouse model resulted in TG2 inhibition in the small intestine. TG2 inhibition had no effect on villous atrophy, suggesting that activation of this enzyme is a consequence, rather than a cause, of poly(I∶C) induced enteropathy. Consistent with this finding, administration of poly(I∶C) to TG2 knockout mice also induced villous atrophy. Our findings pave the way for pharmacological evaluation of small molecule TG2 inhibitors as drug candidates for celiac disease
    • 

    corecore