14,814 research outputs found

    A review of the Helophorus frater-praenanus group of species, with description of a new species and additional faunal records of Helophorus Fabricius from China and Bhutan (Coleoptera: Helophoridae)

    Get PDF
    The six species of the East Palaearctic Helophorus frater-praenanus group (Coleoptera: Helophoridae) are reviewed and a new species, H. aquila sp.n. is described from China (Qinghai). Habitus, head and pronotum and aedeagophores are figured for all the species and a key for their identification is given. Four further species which could be confused with the H. frater-praenanus group are discussed and illustrated. These are H. croaticus KUWERT, 1886, H. pumilio ERICHSON, 1837, H. pitcheri ANGUS, 1970 and H. shatrovskyi ANGUS, 1985. Additional faunal records of Helophorus FABRICIUS species from the Tibetan Plateau and other areas of China are given. Helophorus tuberculatus GYLLENHAL, 1808 is recorded from Bhutan for the first time©Wiener Coleopterologenverein (WCV). The attached paper is the published pdf. https://www.zobodat.at/pdf/KOR_84_2014_0209-0219.pd

    DeltaPhish: Detecting Phishing Webpages in Compromised Websites

    Full text link
    The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulnerable websites in the wild, to maximize profit while hindering attack traceability, detection and blacklisting. To the best of our knowledge, this is the first work that specifically leverages this adversarial behavior for detection purposes. We show that phishing webpages can be accurately detected by highlighting HTML code and visual differences with respect to other (legitimate) pages hosted within a compromised website. Our system, named DeltaPhish, can be installed as part of a web application firewall, to detect the presence of anomalous content on a website after compromise, and eventually prevent access to it. DeltaPhish is also robust against adversarial attempts in which the HTML code of the phishing page is carefully manipulated to evade detection. We empirically evaluate it on more than 5,500 webpages collected in the wild from compromised websites, showing that it is capable of detecting more than 99% of phishing webpages, while only misclassifying less than 1% of legitimate pages. We further show that the detection rate remains higher than 70% even under very sophisticated attacks carefully designed to evade our system.Comment: Preprint version of the work accepted at ESORICS 201

    Cellular modelling of Alström syndrome in human primary dermal fibroblasts and derived cells

    Get PDF
    RIGHTS : This article is licensed under the BioMed Central licence at http://www.biomedcentral.com/about/license which is similar to the 'Creative Commons Attribution Licence'. In brief you may : copy, distribute, and display the work; make derivative works; or make commercial use of the work - under the following conditions: the original author must be given credit; for any reuse or distribution, it must be made clear to others what the license terms of this work are

    Sub-Planckian black holes and the Generalized Uncertainty Principle

    Get PDF
    The Black Hole Uncertainty Principle correspondence suggests that there could exist black holes with mass beneath the Planck scale but radius of order the Compton scale rather than Schwarzschild scale. We present a modified, self-dual Schwarzschild-like metric that reproduces desirable aspects of a variety of disparate models in the sub-Planckian limit, while remaining Schwarzschild in the large mass limit. The self-dual nature of this solution under MM1M \leftrightarrow M^{-1} naturally implies a Generalized Uncertainty Principle with the linear form Δx1Δp+Δp\Delta x \sim \frac{1}{\Delta p} + \Delta p. We also demonstrate a natural dimensional reduction feature, in that the gravitational radius and thermodynamics of sub-Planckian objects resemble that of (1+1)(1+1)-D gravity. The temperature of sub-Planckian black holes scales as MM rather than M1M^{-1} but the evaporation of those smaller than 103610^{-36}g is suppressed by the cosmic background radiation. This suggests that relics of this mass could provide the dark matter.Comment: 12 pages, 9 figures, version published in J. High En. Phy

    Bribeproof mechanisms for two-values domains

    Full text link
    Schummer (Journal of Economic Theory 2000) introduced the concept of bribeproof mechanism which, in a context where monetary transfer between agents is possible, requires that manipulations through bribes are ruled out. Unfortunately, in many domains, the only bribeproof mechanisms are the trivial ones which return a fixed outcome. This work presents one of the few constructions of non-trivial bribeproof mechanisms for these quasi-linear environments. Though the suggested construction applies to rather restricted domains, the results obtained are tight: For several natural problems, the method yields the only possible bribeproof mechanism and no such mechanism is possible on more general domains.Comment: Extended abstract accepted to SAGT 2016. This ArXiv version corrects typos in the proofs of Theorem 7 and Claims 28-29 of prior ArXiv versio

    Hybrid copula mixed models for combining case-control and cohort studies in meta-analysis of diagnostic tests

    Get PDF
    Copula mixed models for trivariate (or bivariate) meta-analysis of diagnostic test accuracy studies accounting (or not) for disease prevalence have been proposed in the biostatistics literature to synthesize information. However, many systematic reviews often include case-control and cohort studies, so one can either focus on the bivariate meta-analysis of the case-control studies or the trivariate meta-analysis of the cohort studies, as only the latter contains information on disease prevalence. In order to remedy this situation of wasting data we propose a hybrid copula mixed model via a combination of the bivariate and trivariate copula mixed model for the data from the case-control studies and cohort studies, respectively. Hence, this hybrid model can account for study design and also due to its generality can deal with dependence in the joint tails. We apply the proposed hybrid copula mixed model to a review of the performance of contemporary diagnostic imaging modalities for detecting metastases in patients with melanoma

    Measurement of the Branching Fraction of J/psi --> pi+ pi- pi0

    Full text link
    Using 58 million J/psi and 14 million psi' decays obtained by the BESII experiment, the branching fraction of J/psi --> pi+ pi- pi0 is determined. The result is (2.10+/-0.12)X10^{-2}, which is significantly higher than previous measurements.Comment: 9 pages, 8 figures, RevTex

    Search for K_S K_L in psi'' decays

    Full text link
    K_S K_L from psi'' decays is searched for using the psi'' data collected by BESII at BEPC, the upper limit of the branching fraction is determined to be B(psi''--> K_S K_L) < 2.1\times 10^{-4} at 90% C. L. The measurement is compared with the prediction of the S- and D-wave mixing model of the charmonia, based on the measurements of the branching fractions of J/psi-->K_S K_L and psi'-->K_S K_L.Comment: 5 pages, 1 figur

    First observation of psi(2S)-->K_S K_L

    Full text link
    The decay psi(2S)-->K_S K_L is observed for the first time using psi(2S) data collected with the Beijing Spectrometer (BESII) at the Beijing Electron Positron Collider (BEPC); the branching ratio is determined to be B(psi(2S)-->K_S K_L) = (5.24\pm 0.47 \pm 0.48)\times 10^{-5}. Compared with J/psi-->K_S K_L, the psi(2S) branching ratio is enhanced relative to the prediction of the perturbative QCD ``12%'' rule. The result, together with the branching ratios of psi(2S) decays to other pseudoscalar meson pairs (\pi^+\pi^- and K^+K^-), is used to investigate the relative phase between the three-gluon and the one-photon annihilation amplitudes of psi(2S) decays.Comment: 5 pages, 4 figures, 2 tables, submitted to Phys. Rev. Let
    corecore