188 research outputs found

    Linked region detection using high-density SNP genotype data via the minimum recombinant model of pedigree haplotype inference

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>With the rapid development of high-throughput genotyping technologies, efficient methods for identifying linked regions using high-density SNP genotype data have become more and more important. Recently, a deterministic method that works very well on SNP genotyping data has been developed (Lin et al. Bioinformatics 2008, 24(1): 86–93). However, that program can only work on a limited number of family structures. In particular, the results (if any) will be poor when the genotype data for the whole chromosome of one of the parents in a nuclear family is missing.</p> <p>Results</p> <p>We have developed a software package (LIden) for identifying linked regions using high-density SNP genotype data. We focus on handling the case where the genotype data for the whole chromosome of one of the parents in a nuclear family is missing. We use the minimum recombinant model for haplotype inference in pedigrees. Several local optimization algorithms are used to infer the haplotype of each individual and determine the linked regions based on the inferred haplotype data. We have developed a more flexible method to combine nuclear families to further refine (reduce the length of) the linked regions.</p> <p>Conclusion</p> <p>Our new package (LIden) is efficient software for linked region detection using high-density SNP genotype data. LIden can handle some important cases where the existing programs do not work well. In particular, the new package can handle many cases where the genotype data of one of the two parents is missing for the entire chromosome. The running time of the program is <it>O</it>(<it>mn</it>), where <it>m </it>is the number of members in the family and <it>n </it>is the number of SNP sites in the chromosome. LIden is specifically suitable for handling big sized families. This research also demonstrates another practical use of the minimum recombinant model for haplotype inference in pedigrees.</p> <p>The software package can be downloaded at <url>http://www.cs.cityu.edu.hk/~lwang/software/Link</url>.</p

    Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes

    Get PDF
    Evil-twin is becoming a common attack in Smart Home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel evil-twin attack detection method based on the received signal strength indicator (RSSI). Our key insight is that the location of the genuine AP rarely moves in a home environment and as a result the RSSI of the genuine AP is relatively stable. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the WIFI signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of an one-off, modest connection delay

    Exploiting dynamic scheduling for VM-based code obfuscation

    Get PDF
    Code virtualization built upon virtual machine (VM) technologies is emerging as a viable method for implementing code obfuscation to protect programs against unauthorized analysis. State-of-the-art VM-based protection approaches use a fixed scheduling structure where the program follows a single, static execution path for the same input. Such approaches, however, are vulnerable to certain scenarios where the attacker can reuse knowledge extracted from previously seen software to crack applications using similar protection schemes. This paper presents DSVMP, a novel VM-based code obfuscation approach for software protection. DSVMP brings together two techniques to provide stronger code protection than prior VM-based schemes. Firstly, it uses a dynamic instruction scheduler to randomly direct the program to execute different paths without violating the correctness across different runs. By randomly choosing the program execution paths, the application exposes diverse behavior, making it much more difficult for an attacker to reuse the knowledge collected from previous runs or similar applications to perform attacks. Secondly, it employs multiple VMs to further obfuscate the relationship between VM bytecode and their interpreters, making code analysis even harder. We have implemented DSVMP in a prototype system and evaluated it using a set of widely used applications. Experimental results show that DSVMP provides stronger protection with comparable runtime overhead and code size when compared to two commercial VMbased code obfuscation tools

    Coating effect of micro-sized droplets impacting on low temperature spherical particles

    Full text link
    [EN] In this paper, the effect of spray droplets on the coating of cold spherical particles was studied.The microcapsule granulator produces micron-sized droplets to coat the spherical particles in cold storage, and the high-definition camera and precision balance are used to photograph and weigh the particles before and after the spraying. The droplets are obtained by using the image and data processing technology coating area and coating quality, the droplet coating effect was evaluated by a number of dimensionless parameters such as coating ratio and mass ratio.By orthogonal design experiment and uncertainty analysis, the effects of droplet size and flow rate, spherical particle temperature and diameter on coating effect were studied, and the effect of droplet group coating on low temperature spherical particles was obtained.The authors acknowledge Projects supported by the National Natural Science Foundation of China (Grant No. 31571906 & No.21506163).Wu, X.; Ma, X.; Xu, Q.; Li, Z.; Wang, R. (2018). Coating effect of micro-sized droplets impacting on low temperature spherical particles. En IDS 2018. 21st International Drying Symposium Proceedings. Editorial Universitat Politècnica de València. 1759-1766. https://doi.org/10.4995/IDS2018.2018.7734OCS1759176

    Cardiac Epithelioid PEComa: Report of Two Cases and Review of the Literature

    Get PDF
    Cardiac PEComa is very rare. We reported two cases of epithelioid PEComas, one in an adult and one in a 2-year-old child. Both tumors were composed of sheets of epithelioid cells with coagulation necrosis. In addition, the adult case showed marked nuclear atypia and high mitotic activity with atypical mitosis and the pediatric case showed unusual clear cell features. Immunohistochemically, both tumors were positive for HMB-45 and SMA and negative for S100 and cytokeratin. Electron microscopy was performed in the pediatric case and showed premelanosomes. The adult patient developed extensive metastasis indicating malignant behavior. Prior to the two cases, only 5 other cases of cardiac PEComa were reported and the literatures are reviewed

    Defeat Your Enemy Hiding Behind Public WiFi:WiGuard Can Protect Your Sensitive information from CSI-based Attack

    Get PDF
    Channel state information (CSI) has been recently shown to be useful in performing security attacks in public WiFi environments. By analyzing how CSI is affected by finger motions, CSI-based attacks can effectively reconstruct text-based passwords and locking patterns. This paper presents WiGuard, a novel system to protect sensitive on-screen input information in a public place. Our approach carefully exploits WiFi channel interference to introduce noise to attacker’s CSI measurements to reduce the success rate of CSI-based attacks. Our approach automatically detects when a CSI-based attack happens. We evaluate our approach by applying it to protect text-based passwords and pattern locks on mobile devices. Experimental results show that our approach is able to reduce the success rate of CSI-based attacks from 92–42% for text-based passwords and from 82–22% for pattern lock

    Protect sensitive information against channel state information based attacks

    Get PDF
    Channel state information (CSI) has been recently shown to be useful in performing security attacks in public WiFi environments. By analyzing how CSI is affected by the finger motions, CSI-based attacks can effectively reconstruct text-based passwords and locking patterns. This paper presents WiGuard, a novel system to protect sensitive on-screen gestures in a public place. Our approach carefully exploits the WiFi channel interference to introduce noise into the attacker's CSI measurement to reduce the success rate of the attack. Our approach automatically detects when a CSI-based attack happens. We evaluate our approach by applying it to protect text-based passwords and pattern locks on mobile devices. Experimental results show that our approach is able to reduce the success rate of CSI attacks from 92% to 42% for text-based passwords and from 82% to 22% for pattern lock
    corecore