3,973 research outputs found
Spanning Properties of Theta-Theta Graphs
We study the spanning properties of Theta-Theta graphs. Similar in spirit
with the Yao-Yao graphs, Theta-Theta graphs partition the space around each
vertex into a set of k cones, for some fixed integer k > 1, and select at most
one edge per cone. The difference is in the way edges are selected. Yao-Yao
graphs select an edge of minimum length, whereas Theta-Theta graphs select an
edge of minimum orthogonal projection onto the cone bisector. It has been
established that the Yao-Yao graphs with parameter k = 6k' have spanning ratio
11.67, for k' >= 6. In this paper we establish a first spanning ratio of
for Theta-Theta graphs, for the same values of . We also extend the class of
Theta-Theta spanners with parameter 6k', and establish a spanning ratio of
for k' >= 5. We surmise that these stronger results are mainly due to a
tighter analysis in this paper, rather than Theta-Theta being superior to
Yao-Yao as a spanner. We also show that the spanning ratio of Theta-Theta
graphs decreases to 4.64 as k' increases to 8. These are the first results on
the spanning properties of Theta-Theta graphs.Comment: 20 pages, 6 figures, 3 table
Modulus Computational Entropy
The so-called {\em leakage-chain rule} is a very important tool used in many
security proofs. It gives an upper bound on the entropy loss of a random
variable in case the adversary who having already learned some random
variables correlated with , obtains some further
information about . Analogously to the information-theoretic
case, one might expect that also for the \emph{computational} variants of
entropy the loss depends only on the actual leakage, i.e. on .
Surprisingly, Krenn et al.\ have shown recently that for the most commonly used
definitions of computational entropy this holds only if the computational
quality of the entropy deteriorates exponentially in
. This means that the current standard definitions
of computational entropy do not allow to fully capture leakage that occurred
"in the past", which severely limits the applicability of this notion.
As a remedy for this problem we propose a slightly stronger definition of the
computational entropy, which we call the \emph{modulus computational entropy},
and use it as a technical tool that allows us to prove a desired chain rule
that depends only on the actual leakage and not on its history. Moreover, we
show that the modulus computational entropy unifies other,sometimes seemingly
unrelated, notions already studied in the literature in the context of
information leakage and chain rules. Our results indicate that the modulus
entropy is, up to now, the weakest restriction that guarantees that the chain
rule for the computational entropy works. As an example of application we
demonstrate a few interesting cases where our restricted definition is
fulfilled and the chain rule holds.Comment: Accepted at ICTS 201
Finding the Median (Obliviously) with Bounded Space
We prove that any oblivious algorithm using space to find the median of a
list of integers from requires time . This bound also applies to the problem of determining whether the median
is odd or even. It is nearly optimal since Chan, following Munro and Raman, has
shown that there is a (randomized) selection algorithm using only
registers, each of which can store an input value or -bit counter,
that makes only passes over the input. The bound also implies
a size lower bound for read-once branching programs computing the low order bit
of the median and implies the analog of for length oblivious branching programs
Flexible and Robust Privacy-Preserving Implicit Authentication
Implicit authentication consists of a server authenticating a user based on
the user's usage profile, instead of/in addition to relying on something the
user explicitly knows (passwords, private keys, etc.). While implicit
authentication makes identity theft by third parties more difficult, it
requires the server to learn and store the user's usage profile. Recently, the
first privacy-preserving implicit authentication system was presented, in which
the server does not learn the user's profile. It uses an ad hoc two-party
computation protocol to compare the user's fresh sampled features against an
encrypted stored user's profile. The protocol requires storing the usage
profile and comparing against it using two different cryptosystems, one of them
order-preserving; furthermore, features must be numerical. We present here a
simpler protocol based on set intersection that has the advantages of: i)
requiring only one cryptosystem; ii) not leaking the relative order of fresh
feature samples; iii) being able to deal with any type of features (numerical
or non-numerical).
Keywords: Privacy-preserving implicit authentication, privacy-preserving set
intersection, implicit authentication, active authentication, transparent
authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May
26-28, 2015, IFIP AICT, Springer, to appea
Care during the third stage of labour: obstetricians views and practice in an Albanian maternity hospital
<p>Abstract</p> <p>Background</p> <p>Relatively little is known about current practice during the third stage of labour in low and middle income countries. We conducted a survey of attitudes and an audit of practice in a large maternity hospital in Albania.</p> <p>Methods</p> <p>Survey of 35 obstetricians and audit of practice during the third stage was conducted in July 2008 at a tertiary referral hospital in Tirana. The survey questionnaire was self completed. Responses were anonymous. For the audit, information collected included time of administration of the uterotonic drug, gestation at birth, position of the baby before cord clamping, cord traction, and need for resuscitation.</p> <p>Results</p> <p>77% (27/35) of obstetricians completed the questionnaire, of whom 78% (21/27) reported always or usually using active management, and 22% (6/27) always or usually using physiological care. When using active management: 56% (15/27) gave the uterotonic after cord clamping; intravenous oxytocin was almost always the drug used; and 71% (19/27) clamped the cord within one minute. For physiological care: 42% (8/19) clamped the cord within 20 seconds, and 96% (18/19) within one minute. 93% would randomise women to a trial of early versus late cord clamping.</p> <p>Practice was observed for 156 consecutive births, of which 26% (42/156) were by caesarean section. A prophylactic uterotonic was used for 87% (137/156): this was given after cord clamping for 55% (75/137), although timing of administration was not recorded for 21% (29/137). For 85% of births (132/156) cord clamping was within 20 seconds, and for all babies it was within 50 seconds. Controlled cord traction was used for 49% (76/156) of births.</p> <p>Conclusions</p> <p>Most obstetricians reported always or usually using active management for the third stage of labour. For timing and choice of the uterotonic drug, reported practice was similar to actual practice. Although some obstetricians reported they waited longer than one minute before clamping the cord, this was not observed in practice. Controlled cord traction was used for half the births.</p
Gold nanoparticles delivery in mammalian live cells: a critical review
Functional nanomaterials have recently attracted strong interest from the biology community, not only as potential drug delivery vehicles or diagnostic tools, but also as optical nanomaterials. This is illustrated by the explosion of publications in the field with more than 2,000 publications in the last 2 years (4,000 papers since 2000; from ISI Web of Knowledge, ‘nanoparticle and cell’ hit). Such a publication boom in this novel interdisciplinary field has resulted in papers of unequal standard, partly because it is challenging to assemble the required expertise in chemistry, physics, and biology in a single team. As an extreme example, several papers published in physical chemistry journals claim intracellular delivery of nanoparticles, but show pictures of cells that are, to the expert biologist, evidently dead (and therefore permeable). To attain proper cellular applications using nanomaterials, it is critical not only to achieve efficient delivery in healthy cells, but also to control the intracellular availability and the fate of the nanomaterial. This is still an open challenge that will only be met by innovative delivery methods combined with rigorous and quantitative characterization of the uptake and the fate of the nanoparticles. This review mainly focuses on gold nanoparticles and discusses the various approaches to nanoparticle delivery, including surface chemical modifications and several methods used to facilitate cellular uptake and endosomal escape. We will also review the main detection methods and how their optimum use can inform about intracellular localization, efficiency of delivery, and integrity of the surface capping
A genetic contribution from the Far East into Ashkenazi Jews via the ancient Silk Road
Contemporary Jews retain a genetic imprint from their Near Eastern ancestry, but obtained substantial genetic components from their neighboring populations during their history. Whether they received any genetic contribution from the Far East remains unknown, but frequent communication with the Chinese has been observed since the Silk Road period. To address this issue, mitochondrial DNA (mtDNA) variation from 55,595 Eurasians are analyzed. The existence of some eastern Eurasian haplotypes in eastern Ashkenazi Jews supports an East Asian genetic contribution, likely from Chinese. Further evidence indicates that this connection can be attributed to a gene flow event that occurred less than 1.4 kilo-years ago (kya), which falls within the time frame of the Silk Road scenario and fits well with historical records and archaeological discoveries. This observed genetic contribution from Chinese to Ashkenazi Jews demonstrates that the historical exchange between Ashkenazim and the Far East was not confined to the cultural sphere but also extended to an exchange of genes
Placental transfusion: a review
Recently there have been a number of studies and presentations on the importance of providing a placental transfusion to the newborn. Early cord clamping is an avoidable, unphysiologic intervention that prevents the natural process of placental transfusion. However, placental transfusion, although simple in concept, is affected by multiple factors, is not always straightforward to implement, and can be performed using different methods, making this basic procedure important to discuss. Here, we review three placental transfusion techniques: delayed cord clamping, intact umbilical cord milking and cut-umbilical cord milking, and the evidence in term and preterm newborns supporting this practice. We will also review several factors that influence placental transfusion, and discuss perceived risks versus benefits of this procedure. Finally, we will provide key straightforward concepts and implementation strategies to ensure that placental-to-newborn transfusion can become routine practice at any institution
Kondo physics in carbon nanotubes
The connection of electrical leads to wire-like molecules is a logical step
in the development of molecular electronics, but also allows studies of
fundamental physics. For example, metallic carbon nanotubes are quantum wires
that have been found to act as one-dimensional quantum dots, Luttinger-liquids,
proximity-induced superconductors and ballistic and diffusive one-dimensional
metals. Here we report that electrically-contacted single-wall nanotubes can
serve as powerful probes of Kondo physics, demonstrating the universality of
the Kondo effect. Arising in the prototypical case from the interaction between
a localized impurity magnetic moment and delocalized electrons in a metallic
host, the Kondo effect has been used to explain enhanced low-temperature
scattering from magnetic impurities in metals, and also occurs in transport
through semiconductor quantum dots. The far higher tunability of dots (in our
case, nanotubes) compared with atomic impurities renders new classes of
Kondo-like effects accessible. Our nanotube devices differ from previous
systems in which Kondo effects have been observed, in that they are
one-dimensional quantum dots with three-dimensional metal (gold) reservoirs.
This allows us to observe Kondo resonances for very large electron number (N)
in the dot, and approaching the unitary limit (where the transmission reaches
its maximum possible value). Moreover, we detect a previously unobserved Kondo
effect, occurring for even values of N in a magnetic field.Comment: 7 pages, pdf onl
Intrinsic and Extrinsic Performance Limits of Graphene Devices on SiO2
The linear dispersion relation in graphene[1,2] gives rise to a surprising
prediction: the resistivity due to isotropic scatterers (e.g. white-noise
disorder[3] or phonons[4-8]) is independent of carrier density n. Here we show
that acoustic phonon scattering[4-6] is indeed independent of n, and places an
intrinsic limit on the resistivity in graphene of only 30 Ohm at room
temperature (RT). At a technologically-relevant carrier density of 10^12 cm^-2,
the mean free path for electron-acoustic phonon scattering is >2 microns, and
the intrinsic mobility limit is 2x10^5 cm^2/Vs, exceeding the highest known
inorganic semiconductor (InSb, ~7.7x10^4 cm^2/Vs[9]) and semiconducting carbon
nanotubes (~1x10^5 cm^2/Vs[10]). We also show that extrinsic scattering by
surface phonons of the SiO2 substrate[11,12] adds a strong temperature
dependent resistivity above ~200 K[8], limiting the RT mobility to ~4x10^4
cm^2/Vs, pointing out the importance of substrate choice for graphene
devices[13].Comment: 16 pages, 3 figure
- …