84 research outputs found

    Prevalence of Underweight, Stunting, and Wasting among Children Infected with Human Immunodeficiency Virus in South India

    Get PDF
    Background. Growth failure is a common feature of children with human immunodeficiency virus (HIV) infection. Malnutrition increases mortality and may impair the response to antiretroviral treatment. Objective. Our objective was to describe the prevalence of stunting, underweight, and wasting in HIV-infected children in south India and to assess the utility of these parameters in predicting immune status. Methodology. In this cross-sectional study, anthropometric measurements and CD4 counts were performed on 231 HIV-infected children. Z scores for height for age, weight for age, and weight for height were correlated with CD4 cell counts and receiver operating characteristic curves plotted. Results. Prevalence of underweight was 63%, stunting 58%, and wasting 16%, respectively. 33–45% of children were moderately or severely malnourished even at CD4 >25%; sensitivity and specificity of stunting or underweight to predict HIV disease severity was low. Conclusions. Undernutrition and stunting are common among HIV-infected children at all stages of the disease in India. Early and aggressive nutritional intervention is required, if long-term outcomes are to be improved

    TAO: Techniques for algorithm-level obfuscation during high-level synthesis

    Get PDF
    Intellectual Property (IP) theft costs semiconductor design companies billions of dollars every year. Unauthorized IP copies start from reverse engineering the given chip. Existing techniques to protect against IP theft aim to hide the IC's functionality, but focus on manipulating the HDL descriptions. We propose TAO as a comprehensive solution based on high-level synthesis to raise the abstraction level and apply algorithmic obfuscation automatically. TAO includes several transformations that make the component hard to reverse engineer during chip fabrication, while a key is later inserted to unlock the functionality. Finally, this is a promising approach to obfuscate large-scale designs despite the hardware overhead needed to implement the obfuscation

    Dyslipidemia among HIV-infected Patients with Tuberculosis Taking Once-daily Nonnucleoside Reverse-Transcriptase Inhibitor–Based Antiretroviral Therapy in India

    Get PDF
    HIV-infected patients with tuberculosis who initiate nonnucleoside reverse-transcriptase-based anti-retroviral treatment in combination with rifampicin-based antituberculosis treatment demonstrate increases in total cholesterol, low-density cholesterol, and high-density cholesterol levels but no change in blood glucose level after 1 year. Cholesterol increases were more frequent among patients receiving efavirenz

    Electromagnetic Transmission of Intellectual Property Data to Protect FPGA Designs

    No full text
    International audienceOver the past 10 years, the designers of intellectual properties(IP) have faced increasing threats including cloning, counterfeiting, andreverse-engineering. This is now a critical issue for the microelectronicsindustry. The design of a secure, efficient, lightweight protection scheme fordesign data is a serious challenge for the hardware security community. In thiscontext, this chapter presents two ultra-lightweight transmitters using sidechannel leakage based on electromagnetic emanation to send embedded IPidentity discreetly and quickl

    CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States

    Get PDF
    Logic encryption has attracted much attention due to increasing IC design costs and growing number of untrusted foundries. Unreachable states in a design provide a space of flexibility for logic encryption to explore. However, due to the available access of scan chain, traditional combinational encryption cannot leverage the benefit of such flexibility. Cyclic logic encryption inserts key-controlled feedbacks into the original circuit to prevent piracy and overproduction. Based on our discovery, cyclic logic encryption can utilize unreachable states to improve security. Even though cyclic encryption is vulnerable to a powerful attack called CycSAT, we develop a new way of cyclic encryption by utilizing unreachable states to defeat CycSAT. The attack complexity of the proposed scheme is discussed and its robustness is demonstrated

    Xylanase and β-xylosidase production by Aspergillus ochraceus: new perspectives for the application of wheat straw autohydrolysis liquor

    Get PDF
    The xylanase biosynthesis is induced by its substrate—xylan. The high xylan content in some wastes such as wheat residues (wheat bran and wheat straw) makes them accessible and cheap sources of inducers to be mainly applied in great volumes of fermentation, such as those of industrial bioreactors. Thus, in this work, the main proposal was incorporated in the nutrient medium wheat straw particles decomposed to soluble compounds (liquor) through treatment of lignocellulosic materials in autohydrolysis process, as a strategy to increase and undervalue xylanase production by Aspergillus ochraceus. The wheat straw autohydrolysis liquor produced in several conditions was used as a sole carbon source or with wheat bran. The best conditions for xylanase and β-xylosidase production were observed when A. ochraceus was cultivated with 1% wheat bran added of 10% wheat straw liquor (produced after 15 min of hydrothermal treatment) as carbon source. This substrate was more favorable when compared with xylan, wheat bran, and wheat straw autohydrolysis liquor used separately. The application of this substrate mixture in a stirred tank bioreactor indicated the possibility of scaling up the process to commercial production.This work was supported by Fundacao de Amparo a Pesquisa do Estado de Sao Paulo (FAPESP/Brazil), Conselho Nacional de Desenvolvimento Cientifico e Tecnologico (CNPq/Brazil), National System for Research on Biodiversity (SISBIOTA-Brazil, CNPq 563260/2010-6/FAPESP no. 2010/52322-3), and Fundacao para a Ciencia e a Tecnologia (FCT/Portugal)

    The First Murchison Widefield Array low-frequency radio observations of cluster scale non-thermal emission: the case of Abell 3667

    Get PDF
    We present the first Murchison Widefield Array observations of the well-known cluster of galaxies Abell 3667 (A3667) between 105 and 241 MHz. A3667 is one of the best known examples of a galaxy cluster hosting a double radio relic and has been reported to contain a faint radio halo and bridge. The origin of radio haloes, relics and bridges is still unclear, however galaxy cluster merger seems to be an important factor. We clearly detect the north-west (NW) and south-east radio relics in A3667 and find an integrated flux density at 149 MHz of 28.1 ± 1.7 and 2.4 ± 0.1 Jy, respectively, with an average spectral index, between 120 and 1400 MHz, of −0.9 ± 0.1 for both relics. We find evidence of a spatial variation in the spectral index across the NW relic steepening towards the centre of the cluster, which indicates an ageing electron population. These properties are consistent with higher frequency observations. We detect emission that could be associated with a radio halo and bridge. However, due to the presence of poorly sampled large-scale Galactic emission and blended point sources we are unable to verify the exact nature of these features

    A formal foundation for secure remote execution of enclaves

    No full text
    corecore