1,469 research outputs found
Assessing and countering reaction attacks against post-quantum public-key cryptosystems based on QC-LDPC codes
Code-based public-key cryptosystems based on QC-LDPC and QC-MDPC codes are
promising post-quantum candidates to replace quantum vulnerable classical
alternatives. However, a new type of attacks based on Bob's reactions have
recently been introduced and appear to significantly reduce the length of the
life of any keypair used in these systems. In this paper we estimate the
complexity of all known reaction attacks against QC-LDPC and QC-MDPC code-based
variants of the McEliece cryptosystem. We also show how the structure of the
secret key and, in particular, the secret code rate affect the complexity of
these attacks. It follows from our results that QC-LDPC code-based systems can
indeed withstand reaction attacks, on condition that some specific decoding
algorithms are used and the secret code has a sufficiently high rate.Comment: 21 pages, 2 figures, to be presented at CANS 201
Process evaluation for complex interventions in primary care: understanding trials using the normalization process model
Background: the Normalization Process Model is a conceptual tool intended to assist in understanding the factors that affect implementation processes in clinical trials and other evaluations of complex interventions. It focuses on the ways that the implementation of complex interventions is shaped by problems of workability and integration.Method: in this paper the model is applied to two different complex trials: (i) the delivery of problem solving therapies for psychosocial distress, and (ii) the delivery of nurse-led clinics for heart failure treatment in primary care.Results: application of the model shows how process evaluations need to focus on more than the immediate contexts in which trial outcomes are generated. Problems relating to intervention workability and integration also need to be understood. The model may be used effectively to explain the implementation process in trials of complex interventions.Conclusion: the model invites evaluators to attend equally to considering how a complex intervention interacts with existing patterns of service organization, professional practice, and professional-patient interaction. The justification for this may be found in the abundance of reports of clinical effectiveness for interventions that have little hope of being implemented in real healthcare setting
Understanding clinician attitudes towards implementation of guided self-help cognitive behaviour therapy for those who hear distressing voices: using factor analysis to test normalisation process theory
Background
The Normalisation Process Theory (NPT) has been used to understand the implementation of physical health care interventions. The current study aims to apply the NPT model to a secondary mental health context, and test the model using exploratory factor analysis. This study will consider the implementation of a brief cognitive behaviour therapy for psychosis (CBTp) intervention.
Methods
Mental health clinicians were asked to complete a NPT-based questionnaire on the implementation of a brief CBTp intervention. All clinicians had experience of either working with the target client group or were able to deliver psychological therapies. In total, 201 clinicians completed the questionnaire.
Results
The results of the exploratory factor analysis found partial support for the NPT model, as three of the NPT factors were extracted: (1) coherence, (2) cognitive participation, and (3) reflexive monitoring. We did not find support for the fourth NPT factor (collective action). All scales showed strong internal consistency. Secondary analysis of these factors showed clinicians to generally support the implementation of the brief CBTp intervention.
Conclusions
This study provides strong evidence for the validity of the three NPT factors extracted. Further research is needed to determine whether participants’ level of seniority moderates factor extraction, whether this factor structure can be generalised to other healthcare settings, and whether pre-implementation attitudes predict actual implementation outcomes
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
This work presents a new code-based key encapsulation mechanism (KEM) called
LEDAkem. It is built on the Niederreiter cryptosystem and relies on
quasi-cyclic low-density parity-check codes as secret codes, providing high
decoding speeds and compact keypairs. LEDAkem uses ephemeral keys to foil known
statistical attacks, and takes advantage of a new decoding algorithm that
provides faster decoding than the classical bit-flipping decoder commonly
adopted in this kind of systems. The main attacks against LEDAkem are
investigated, taking into account quantum speedups. Some instances of LEDAkem
are designed to achieve different security levels against classical and quantum
computers. Some performance figures obtained through an efficient C99
implementation of LEDAkem are provided.Comment: 21 pages, 3 table
What traits are carried on mobile genetic elements, and why?
Although similar to any other organism, prokaryotes can transfer genes vertically from mother cell to daughter cell, they can also exchange certain genes horizontally. Genes can move within and between genomes at fast rates because of mobile genetic elements (MGEs). Although mobile elements are fundamentally self-interested entities, and thus replicate for their own gain, they frequently carry genes beneficial for their hosts and/or the neighbours of their hosts. Many genes that are carried by mobile elements code for traits that are expressed outside of the cell. Such traits are involved in bacterial sociality, such as the production of public goods, which benefit a cell's neighbours, or the production of bacteriocins, which harm a cell's neighbours. In this study we review the patterns that are emerging in the types of genes carried by mobile elements, and discuss the evolutionary and ecological conditions under which mobile elements evolve to carry their peculiar mix of parasitic, beneficial and cooperative genes
Territorial defense in a network: Audiences only matter to male fiddler crabs primed for confrontation
This is the author accepted manuscript. The final version is available from Oxford University Press via the DOI in this recordTerritorial contests often occur in the presence of conspecifics not directly involved in the interaction. Actors may alter their behavior
in the presence of this audience, an “audience effect,” and audiences themselves may alter their behavior as a result of observing an
interaction, a “bystander effect.” Previous work has documented these effects by looking at each in isolation, but to our knowledge,
none has investigated their interaction; something that is more likely to represent a realistic scenario for species where individuals
aggregate spatially. We therefore have a somewhat limited understanding of the extent and direction of these potentially complex
indirect social effects on behavior. Here, we examined how audience and bystander effects work in tandem to modify resident male
aggressive behavior towards intruders in European fiddler crabs, Afruca tangeri. We found that male crabs with an audience showed
greater aggressive behavior towards an intruder compared with males without an audience, but only if they had acted as a bystander
to an aggressive signaling interaction prior to the intrusion. Indeed, bystanding during aggressive interactions elevated aggressive
responses to intruders maximally if there was an audience present. Our results suggest that bystanding had a priming effect on territory-holding males, potentially by providing information on the immediate level of competition in the local neighborhood, and that
same-sex audiences only matter if males have been primed. This study highlights the fundamental importance of considering broader
interaction networks in studying real-world dyadic interactions and of including nonvertebrate taxonomic groups in these studiesDanish Council for Independent Research/Natural SciencesDFFLeverhulme Trust Early Careers Fellowshi
The Dawn of Open Access to Phylogenetic Data
The scientific enterprise depends critically on the preservation of and open
access to published data. This basic tenet applies acutely to phylogenies
(estimates of evolutionary relationships among species). Increasingly,
phylogenies are estimated from increasingly large, genome-scale datasets using
increasingly complex statistical methods that require increasing levels of
expertise and computational investment. Moreover, the resulting phylogenetic
data provide an explicit historical perspective that critically informs
research in a vast and growing number of scientific disciplines. One such use
is the study of changes in rates of lineage diversification (speciation -
extinction) through time. As part of a meta-analysis in this area, we sought to
collect phylogenetic data (comprising nucleotide sequence alignment and tree
files) from 217 studies published in 46 journals over a 13-year period. We
document our attempts to procure those data (from online archives and by direct
request to corresponding authors), and report results of analyses (using
Bayesian logistic regression) to assess the impact of various factors on the
success of our efforts. Overall, complete phylogenetic data for ~60% of these
studies are effectively lost to science. Our study indicates that phylogenetic
data are more likely to be deposited in online archives and/or shared upon
request when: (1) the publishing journal has a strong data-sharing policy; (2)
the publishing journal has a higher impact factor, and; (3) the data are
requested from faculty rather than students. Although the situation appears
dire, our analyses suggest that it is far from hopeless: recent initiatives by
the scientific community -- including policy changes by journals and funding
agencies -- are improving the state of affairs
Search For Heavy Pointlike Dirac Monopoles
We have searched for central production of a pair of photons with high
transverse energies in collisions at TeV using of data collected with the D\O detector at the Fermilab Tevatron in
1994--1996. If they exist, virtual heavy pointlike Dirac monopoles could
rescatter pairs of nearly real photons into this final state via a box diagram.
We observe no excess of events above background, and set lower 95% C.L. limits
of on the mass of a spin 0, 1/2, or 1 Dirac
monopole.Comment: 12 pages, 4 figure
Search for High Mass Photon Pairs in p-pbar --> gamma-gamma-jet-jet Events at sqrt(s)=1.8 TeV
A search has been carried out for events in the channel p-barp --> gamma
gamma jet jet. Such a signature can characterize the production of a
non-standard Higgs boson together with a W or Z boson. We refer to this
non-standard Higgs, having standard model couplings to vector bosons but no
coupling to fermions, as a "bosonic Higgs." With the requirement of two high
transverse energy photons and two jets, the diphoton mass (m(gamma gamma))
distribution is consistent with expected background. A 90(95)% C.L. upper limit
on the cross section as a function of mass is calculated, ranging from
0.60(0.80) pb for m(gamma gamma) = 65 GeV/c^2 to 0.26(0.34) pb for m(gamma
gamma) = 150 GeV/c^2, corresponding to a 95% C.L. lower limit on the mass of a
bosonic Higgs of 78.5 GeV/c^2.Comment: 9 pages, 3 figures. Replacement has new H->gamma gamma branching
ratios and corresponding new mass limit
Practice change in chronic conditions care: an appraisal of theories
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.Background
Management of chronic conditions can be complex and burdensome for patients and complex and costly for health systems. Outcomes could be improved and costs reduced if proven clinical interventions were better implemented, but the complexity of chronic care services appears to make clinical change particularly challenging. Explicit use of theories may improve the success of clinical change in this area of care provision. Whilst theories to support implementation of practice change are apparent in the broad healthcare arena, the most applicable theories for the complexities of practice change in chronic care have not yet been identified.
Methods
We developed criteria to review the usefulness of change implementation theories for informing chronic care management and applied them to an existing list of theories used more widely in healthcare.
Results
Criteria related to the following characteristics of chronic care: breadth of the field; multi-disciplinarity; micro, meso and macro program levels; need for field-specific research on implementation requirements; and need for measurement. Six theories met the criteria to the greatest extent: the Consolidate Framework for Implementation Research; Normalization Process Theory and its extension General Theory of Implementation; two versions of the Promoting Action on Research Implementation in Health Services framework and Sticky Knowledge. None fully met all criteria. Involvement of several care provision organizations and groups, involvement of patients and carers, and policy level change are not well covered by most theories. However, adaptation may be possible to include multiple groups including patients and carers, and separate theories may be needed on policy change. Ways of qualitatively assessing theory constructs are available but quantitative measures are currently partial and under development for all theories.
Conclusions
Theoretical bases are available to structure clinical change research in chronic condition care. Theories will however need to be adapted and supplemented to account for the particular features of care in this field, particularly in relation to involvement of multiple organizations and groups, including patients, and in relation to policy influence. Quantitative measurement of theory constructs may present difficulties
- …
