3,017 research outputs found

    Information Security as Strategic (In)effectivity

    Full text link
    Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have. In this work, we suggest that information security is not a goal in itself, but rather a means of preventing potential attackers from compromising the correct behavior of the system. To formalize this, we first show how two information flows can be compared by looking at the adversary's ability to harm the system. Then, we propose that the information flow in a system is effectively information-secure if it does not allow for more harm than its idealized variant based on the classical notion of noninterference

    Computing infrared spectra of proteins using the exciton model

    Get PDF
    The ability to compute from first principles the infrared spectrum of a protein in solution phase representing a biological system would provide a useful connection to atomistic models of protein structure and dynamics. Indeed, such calculations are a vital complement to 2DIR experimental measurements, allowing the observed signals to be interpreted in terms of detailed structural and dynamical information. In this article, we have studied nine structurally and spectroscopically well-characterized proteins, representing a range of structural types. We have simulated the equilibrium conformational dynamics in an explicit point charge water model. Using the resulting trajectories based on MD simulations, we have computed the one and two dimensional infrared spectra in the Amide I region, using an exciton approach, in which a local mode basis of carbonyl stretches is considered. The role of solvent in shifting the Amide I band (by 30 to 50 cm−1) is clearly evident. Similarly, the conformational dynamics contribute to the broadening of peaks in the spectrum. The inhomogeneous broadening in both the 1D and 2D spectra reflects the significant conformational diversity observed in the simulations. Through the computed 2D cross-peak spectra, we show how different pulse schemes can provide additional information on the coupled vibrations

    Vigorous star formation hidden by dust in a galaxy at z=1.4z=1.4

    Get PDF
    Near-infrared surveys have revealed a substantial population of enigmatic faint galaxies with extremely red optical-to-near-infrared colours and with a sky surface density comparable to that of faint quasars. There are two scenarios for these extreme colours: (i) these distant galaxies have formed virtually all their stars at very high redshifts and, due to the absence of recently formed stars, the colours are extremely red and (ii) these distant galaxies contain large amounts of dust, severely reddening the rest-frame UV--optical spectrum. HR10 (z=1.44z = 1.44) is considered the archetype of the extremely red galaxies. Here we report the detection of the continuum emission from HR10 at 850μ\mum and at 1250μ\mum, demonstrating that HR10 is a very dusty galaxy undergoing a major episode of star formation. Our result provides a clear example of a high-redshift galaxy where the star formation rate inferred from the ultraviolet luminosity would be underestimated by a factor up to 1000, and shows that great caution should be used to infer the global star formation history of the Universe from optical observations only.Comment: 12 pages, 1 figure, Nature, in press (30 April 1998

    GIVE: portable genome browsers for personal websites.

    Get PDF
    Growing popularity and diversity of genomic data demand portable and versatile genome browsers. Here, we present an open source programming library called GIVE that facilitates the creation of personalized genome browsers without requiring a system administrator. By inserting HTML tags, one can add to a personal webpage interactive visualization of multiple types of genomics data, including genome annotation, "linear" quantitative data, and genome interaction data. GIVE includes a graphical interface called HUG (HTML Universal Generator) that automatically generates HTML code for displaying user chosen data, which can be copy-pasted into user's personal website or saved and shared with collaborators. GIVE is available at: https://www.givengine.org/

    On Semiclassical Limits of String States

    Get PDF
    We explore the relation between classical and quantum states in both open and closed (super)strings discussing the relevance of coherent states as a semiclassical approximation. For the closed string sector a gauge-fixing of the residual world-sheet rigid translation symmetry of the light-cone gauge is needed for the construction to be possible. The circular target-space loop example is worked out explicitly.Comment: 12 page

    A network traffic flow model for motorway and urban highways

    Get PDF
    The research reported in this paper develops a network level traffic flow model (NTFM) which is applicable for both motorway and urban roads. It forecasts the traffic flow rates, queue propagation at the junctions and travel delays through the network. NTFM uses sub-models associated with all road and junction types which comprise the highway. The flow at any one part of the network is obviously very dependent upon the flows at all other parts of the network. To predict the two-way traffic flow in NTFM, an iterative simulation method is executed to generate the evolution of dependent traffic flows and queues. To demonstrate the capability of the model it is applied to a small case study network and a local Loughborough-Nottingham highway network. The results indicate that NTFM is capable of identifying the relationship between traffic flows and capturing traffic phenomena such as queue dynamics. By introducing a reduced flow rate on links of the network then the effects of strategies employed to carry out roadworks can be mimicked

    For which side the bell tolls: The laterality of approach-avoidance associative networks

    Get PDF
    The two hemispheres of the brain appear to play different roles in emotion and/or motivation. A great deal of previous research has examined the valence hypothesis (left hemisphere = positive; right = negative), but an increasing body of work has supported the motivational hypothesis (left hemisphere = approach; right = avoidance) as an alternative. The present investigation (N = 117) sought to provide novel support for the latter perspective. Left versus right hemispheres were briefly activated by neutral lateralized auditory primes. Subsequently, participants categorized approach versus avoidance words as quickly and accurately as possible. Performance in the task revealed that approach-related thoughts were more accessible following left-hemispheric activation, whereas avoidance-related thoughts were more accessible following right-hemispheric activation. The present results are the first to examine such lateralized differences in accessible motivational thoughts, which may underlie more “downstream” manifestations of approach and avoidance motivation such as judgments, decision making, and behavior

    Cute Balloons with Thickness

    Get PDF
    Based on the fnite element method, we present a simple volume-preserved thin shell deformation algorithm to simulate the process of inflating a balloon. Diff erent from other thin shells, the material of balloons has special features: large stretch, small bend and shear, and incompressibility. Previous deformation methods often focus on typical three-dimensional models or thin plate models such as cloth model. The rest thin shell methods are complex or ignore the special features of thin shells especially balloons. We modify the triangle element to simple three-prism element, ignore bending and shearing deformation, and use volume preservation algorithm to match the incompressibility of balloons. Simple gas model is used, which interacts with shells to make the balloons inflated. Di different balloon examples have been tested in our experiments and the results are compared with those of other methods. The experiments show that our algorithm is simple and effective

    Four Years Since COVID-19 Day Zero: A Time to Evaluate Past and Future Pandemic Control Policies and Practices in Sub-Saharan Africa?

    Get PDF
    Four years after the first case of COVID-19, the world is still determining how best to prevent and control the long-term effects of SARS-CoV-2 infection. Non-pharmaceutical interventions (NPIs) were employed at the start of the pandemic as the only available options, prior to effective vaccines and antiviral agents. The World Health Organization recommended dual vaccination for 70% worldwide as the threshold for a return to “normal” community life. Immunization rates needed to increase in all global regions, irrespective of socioeconomic status, necessitating more equitable access. During the pandemic, wealthier countries hoarded vaccine supplies even when their citizens were immunized. This highlights the already enormous difficulties in healthcare provision faced by low-income sub-Saharan African countries, which remain at risk as industrialized nations have progressed to a post-pandemic era. Thus, in addition to redoubling vaccination efforts public health policymakers should consider ongoing and future use of NPIs. In this narrative account, we advocate that various NPI practices should not be shelved; rather, more research is needed to evaluate their impact in parallel with booster vaccination. This especially applies to so-called “long COVID”. Lessons learned from implementing best practices in resource-limited settings should be incorporated into preparedness guidelines for future infectious disease outbreaks
    corecore