443 research outputs found
Diffusion basis spectrum imaging for identifying pathologies in MS subtypes
Diffusion basis spectrum imaging (DBSI) combines discrete anisotropic diffusion tensors and the spectrum of isotropic diffusion tensors to model the underlying multiple sclerosis (MS) pathologies. We used clinical MS subtypes as a surrogate of underlying pathologies to assess DBSI as a biomarker of pathology in 55 individuals with MS. Restricted isotropic fraction (reflecting cellularity) and fiber fraction (representing apparent axonal density) were the most important DBSI metrics to classify MS using brain white matter lesions. These DBSI metrics outperformed lesion volume. When analyzing the normal-appearing corpus callosum, the most significant DBSI metrics were fiber fraction, radial diffusivity (reflecting myelination), and nonrestricted isotropic fraction (representing edema). This study provides preliminary evidence supporting the ability of DBSI as a potential noninvasive biomarker of MS neuropathology
Recommended from our members
Maternal Syphilis: Variations in Prenatal Screening, Treatment, and Diagnosis of Congenital Syphilis
Syphilis is a sexually transmitted infection that, if left untreated, can impact fetal development. In this systematic review of syphilis in pregnancy, we attempt to better understand worldwide discrepancies regarding its diagnosis and management. OVID MEDLINE and PubMed databases were searched for keywords and 74 relevant articles were identified. Twenty-nine articles were ultimately included in our review. In the literature spanning from 1944—2014, we identified several variations in maternal syphilis screening and treatment, as well as a spectrum of gestational outcomes. Even following the publication of universal guidelines by the World Health Organization, the Centers for Disease Control and Prevention, and scientific investigators, practice patterns have continued to vary. Greater adherence to these guidelines could improve the quality of research in this area and promote earlier detection and thus prevention of maternal and congenital syphilis
Fredholm Indices and the Phase Diagram of Quantum Hall Systems
The quantized Hall conductance in a plateau is related to the index of a
Fredholm operator. In this paper we describe the generic ``phase diagram'' of
Fredholm indices associated with bounded and Toeplitz operators. We discuss the
possible relevance of our results to the phase diagram of disordered integer
quantum Hall systems.Comment: 25 pages, including 7 embedded figures. The mathematical content of
this paper is similar to our previous paper math-ph/0003003, but the physical
analysis is ne
Visibility diagrams and experimental stripe structure in the quantum Hall effect
We analyze various properties of the visibility diagrams that can be used in
the context of modular symmetries and confront them to some recent experimental
developments in the Quantum Hall Effect. We show that a suitable physical
interpretation of the visibility diagrams which permits one to describe
successfully the observed architecture of the Quantum Hall states gives rise
naturally to a stripe structure reproducing some of the experimental features
that have been observed in the study of the quantum fluctuations of the Hall
conductance. Furthermore, we exhibit new properties of the visibility diagrams
stemming from the structure of subgroups of the full modular group.Comment: 8 pages in plain TeX, 7 figures in a single postscript fil
Locally Decodable and Updatable Non-Malleable Codes and Their Applications
Non-malleable codes, introduced as a relaxation of error-correcting codes by Dziembowski, Pietrzak and Wichs (ICS \u2710), provide the security guarantee that the message contained in a tampered codeword is either the same as the original message or is set to an unrelated value. Various applications of non-malleable codes have been discovered, and one of the most significant applications among these is the connection with tamper-resilient cryptography. There is a large body of work considering security against various classes of tampering functions, as well as non-malleable codes with enhanced features such as leakage resilience.
In this work, we propose combining the concepts of non-malleability, leakage resilience, and locality in a coding scheme. The contribution of this work is three-fold:
1. As a conceptual contribution, we define a new notion of locally decodable and updatable non-malleable code that combines the above properties.
2. We present two simple and efficient constructions achieving our new notion with different levels of security.
3. We present an important application of our new tool--securing RAM computation against memory tampering and leakage attacks. This is analogous to the usage of traditional non-malleable codes to secure implementations in the circuit model against memory tampering and leakage attacks
Herschel observations of EXtraordinary Sources: Analysis of the full Herschel/HIFI molecular line survey of Sagittarius B2(N)
A sensitive broadband molecular line survey of the Sagittarius B2(N)
star-forming region has been obtained with the HIFI instrument on the Herschel
Space Observatory, offering the first high-spectral resolution look at this
well-studied source in a wavelength region largely inaccessible from the ground
(625-157 um). From the roughly 8,000 spectral features in the survey, a total
of 72 isotopologues arising from 44 different molecules have been identified,
ranging from light hydrides to complex organics, and arising from a variety of
environments from cold and diffuse to hot and dense gas. We present an LTE
model to the spectral signatures of each molecule, constraining the source
sizes for hot core species with complementary SMA interferometric observations,
and assuming that molecules with related functional group composition are
cospatial. For each molecule, a single model is given to fit all of the
emission and absorption features of that species across the entire 480-1910 GHz
spectral range, accounting for multiple temperature and velocity components
when needed to describe the spectrum. As with other HIFI surveys toward massive
star forming regions, methanol is found to contribute more integrated line
intensity to the spectrum than any other species. We discuss the molecular
abundances derived for the hot core, where the local thermodynamic equilibrium
approximation is generally found to describe the spectrum well, in comparison
to abundances derived for the same molecules in the Orion KL region from a
similar HIFI survey.Comment: Accepted to ApJ. 64 pages, 14 figures. Truncated abstrac
Leakage-Resilient Public-Key Encryption from Obfuscation
The literature on leakage-resilient cryptography contains various leakage models that provide different levels of security. In this work, we consider the \emph{bounded leakage} and the \emph{continual leakage} models.
In the bounded leakage model (Akavia et al. -- TCC 2009), it is assumed that there is a fixed upper bound on the number of bits the attacker may leak on the secret key in the entire lifetime of the scheme. Alternatively, in the continual leakage model (Brakerski et al. -- FOCS 2010, Dodis et al. -- FOCS 2010), the lifetime of a cryptographic scheme is divided into ``time periods\u27\u27 between which the scheme\u27s secret key is updated. Furthermore, in its attack the adversary is allowed to obtain some bounded amount of leakage on the current secret key during each time period.
In the continual leakage model, a challenging problem has been to provide security against \emph{leakage on key updates}, that is, leakage that is a function not only of the current secret key but also the \emph{randomness used to update it}. We propose a new, modular approach to overcome this problem. Namely, we present a compiler that transforms any public-key encryption or signature scheme that achieves a slight strengthening of continual leakage resilience, which we call \emph{consecutive} continual leakage resilience, to one that is continual leakage resilient with leakage on key updates, assuming \emph{indistinguishability obfuscation} (Barak et al. --- CRYPTO 2001, Garg et al. -- FOCS 2013). Under the stronger assumption of \emph{public-coin differing-inputs obfuscation} (Ishai et al. -- TCC 2015) the leakage rate tolerated by our compiled scheme is essentially as good as that of the starting scheme. Our compiler is obtained by making a new connection between the problems of leakage on key updates and so-called ``sender-deniable\u27\u27 encryption (Canetti et al. -- CRYPTO 1997), which was recently realized for the first time by Sahai and Waters (STOC 2014).
In the bounded leakage model, we develop a new approach to constructing leakage-resilient encryption from obfuscation, based upon the public-key encryption scheme from \iO and punctured pseudorandom functions due to Sahai and Waters (STOC 2014). In particular, we achieve leakage-resilient
public key encryption tolerating bits of leakage for any from \iO
and one-way functions. We build on this to achieve leakage-resilient public key encryption with optimal leakage rate of based on public-coin differing-inputs obfuscation and collision-resistant hash functions. Such a leakage rate is not known to be achievable in a generic way based on public-key encryption alone. We then develop entirely new techniques to construct a new public key encryption scheme that is secure under (consecutive) continual leakage resilience (under appropriate assumptions), which we believe is of independent interest
Recommended from our members
Topical Ranibizumab as a Treatment of Corneal Neovascularization
Purpose
To examine the effect of topical ranibizumab on clinically stable corneal neovascularization (NV).
Methods
This was a prospective, open-label, monocentric, uncontrolled, non-comparative study. Ten eyes of 9 patients with corneal NV received topical ranibizumab (1%) 4 times a day for 3 weeks with a follow-up of 16 weeks. The main corneal neovascularization outcome measures were: neovascular area (NA), the area occupied by the corneal neovessels; vessel caliber (VC), the mean diameter of the corneal neovessels; and invasion area (IA), the fraction of the total cornea area covered by the vessels. This study was conducted at the Massachusetts Eye and Ear Infirmary, Boston, MA, USA.
Results
Statistically significant decreases in NA (55.3%, P<0.001), which lasted through 16 weeks, and VC (59%, P<0.001), which continued to improve up to week 16, were observed after treatment. No significant decrease was observed in IA (12.3%, P=0.49). There was no statistically significant change in visual acuity or intraocular pressure. No adverse events ascribed to the treatment were noted.
Conclusions
Topical application of ranibizumab is effective in reducing the severity of corneal NV in the context of established corneal NV, mostly through decrease in VC rather than IA
- …