scholarly journals A Reputation System that Resists a Collusive Attack Focused on a Specific Target

2016 ◽  
Vol 24 (2) ◽  
pp. 211-216
Author(s):  
Fumiaki Sato
Author(s):  
Vaiva Grabauskienė ◽  
Vaiva Schoroškienė

The article explores possibilities of integrating mathematics and language learning. The language of mathematics differs remarkably from everyday speech, which may cause some difficulties not only for primary students, but also for pre-service teachers. One of the methods to resolve this issue is integrating mathematics and language learning. This method also develops university students’ skills to apply didactic and subject knowledge. The article examines skills of pre-service teachers that are revealed in their fictional stories on a chosen mathematical subject. The analysis of mathematical fiction demonstrates that subject integration emphasizes students’ abilities to distinguish essential aspects of the chosen mathematical phenomenon, as well as how students are able to apply and explain concepts, and to adjust to age-specific target audience.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Hussein Abulkasim ◽  
Atefeh Mashatan ◽  
Shohini Ghose

AbstractQuantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.


2019 ◽  
Vol 2 (1) ◽  
Author(s):  
Denise Barcelos ◽  
Karina Funabashi ◽  
Susana Mazloum ◽  
Mariana Fernandes ◽  
Leonardo Cardili

Abstract Gastrointestinal Stromal Tumors (GIST) present different types of mutations that may or may not be sensitive to specific target therapy. The laboratory procedure required to prepare histological sections traditionally demands multiple steps, making the process prone to contamination by exogenous genetic material (DNA). An eventual contamination of the biological sample with exogenous DNA may jeopardize subsequent analysis of mutations. The Short Tandem Repeat (STR) technique is frequently used in forensic science fields and presents a potential application in surgical pathology, especially in situations of suspected sample exchange. In the present study, the objective is to verify the possible contamination by exogenous DNA in gastric GIST samples and to evaluate if the presence of contamination can interfere in the detection of the mutations of interest. We assessed eight gastric GISTs by the Sanger sequencing and STR sequence analyses. Seven samples presented more than one profile, a result interpreted as contamination. Our results indicate that exogenous DNA contamination occurred in most of the samples studied and that this was more frequent in samples obtained from the slides than those obtained from the block. The presence of contamination did not inhibit the detection of the mutations of interest for a specific target therapy. Furthermore, the histologic block revealed to be more advantageously when compared to the slide for molecular pathology diagnosis.


2021 ◽  
Vol 295 ◽  
pp. 117056
Author(s):  
Tonghe Wang ◽  
Jian Guo ◽  
Songpu Ai ◽  
Junwei Cao

2016 ◽  
Vol 9 (18) ◽  
pp. 6335-6350
Author(s):  
Fu-Hau Hsu ◽  
Yu-Liang Hsu ◽  
Yan-Ling Hwang ◽  
Li-Han Chen ◽  
Chuan-Sheng Wang ◽  
...  

2021 ◽  
Author(s):  
Théo Le Moigne ◽  
Libero Gurrieri ◽  
Pierre Crozet ◽  
Christophe H. Marchand ◽  
Mirko Zaffagnini ◽  
...  

2002 ◽  
Vol 13 (07) ◽  
pp. 383-391 ◽  
Author(s):  
Albert R. De Chicchis ◽  
Michael Carpenter ◽  
Jerry L. Cranford ◽  
Murvin R. Hymel

This study examined the effects of selective attention versus stimulus competition on the late auditory evoked potential (LAEP) in 20 young and 20 elderly listeners. In a series of test runs, different oddball tonal sequences were presented to one or both ears, and listeners were instructed to attend to tones at a specific target ear. Peak amplitudes were recorded for the N1, P2, and the early and late N2 components of the LAEP. Significant attention effects were found for all four components. N1 amplitudes increased significantly when participants attended to the target stimuli, whereas the amplitudes of P2, N2e, and N2l decreased. For all LAEP components except N2l, the attention effect did not differ between young and elderly listeners. Significant competition effects also were found for all four components. Amplitudes were significantly larger in monaural than binaural conditions for all components except N2l. The magnitude of this competition effect also was significantly larger for the young listeners than the elderly for all components except N1. These results suggest that the ability to attend selectively to sounds may be more resistant to normal aging than are effects related to stimulus competition.


Sign in / Sign up

Export Citation Format

Share Document