internal function
Recently Published Documents


TOTAL DOCUMENTS

28
(FIVE YEARS 11)

H-INDEX

3
(FIVE YEARS 0)

Nutrients ◽  
2021 ◽  
Vol 13 (7) ◽  
pp. 2245
Author(s):  
Oana Zanoaga ◽  
Cornelia Braicu ◽  
Paul Chiroi ◽  
Nutu Andreea ◽  
Nadim Al Hajjar ◽  
...  

Nutrition plays an important role in overall human health. Although there is no direct evidence supporting the direct involvement of nutrition in curing disease, for some diseases, good nutrition contributes to disease prevention and our overall well-being, including energy level, optimum internal function, and strength of the immune system. Lately, other major, but more silent players are reported to participate in the body’s response to ingested nutrients, as they are involved in different physiological and pathological processes. Furthermore, the genetic profile of an individual is highly critical in regulating these processes and their interactions. In particular, miR-155, a non-coding microRNA, is reported to be highly correlated with such nutritional processes. In fact, miR-155 is involved in the orchestration of various biological processes such as cellular signaling, immune regulation, metabolism, nutritional responses, inflammation, and carcinogenesis. Thus, this review aims to highlight those critical aspects of the influence of dietary components on gene expression, primarily on miR-155 and its role in modulating cancer-associated processes.


Doklady BGUIR ◽  
2021 ◽  
Vol 19 (3) ◽  
pp. 89-95
Author(s):  
R. M. Ospanov ◽  
Ye. N. Seitkulov ◽  
B. B. Yergaliyeva ◽  
N. M. Sisenov

The purpose of this article is to construct an internal function underlying the “Sponge” scheme for constructing  cryptographic  hash  functions.  An  internal  function in  the  “Sponge”  scheme  is  a  fixed-length transformation  or  permutation  that  operates  on  a  fixed  number  of  bits  that  make  up  the  internal  state  of  the function. There are various constructive approaches to functiondesign. The most common approach is to use a permutation based on a symmetric block encryption algorithm with constants as the key. This article builds an internal  function  using  the  generalized  AES  design  methodology. This  methodology  makes  it  easy  to  design block  ciphers  to  encrypt  large  blocks  of  plaintext  with  small  components,  representing  the  processed  data as  multidimensional  arrays.  The  internal  function  is  a  block  cipher  that  processes  2048  bits,  represented as  a  9-dimensional  array  of  512  4-bit  elements  with  size  2 × 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2.  Each  round of encryption  consists  of  three  transformations  (S-blocks,  linear  transformation,  and  permutation),  similar  to the three round transformations of AES SubBytes, MixColumns, and ShiftRows. The constructed function can be used as an internal function in the modified “Sponge” schemefor constructing cryptographic hash functions.


Libri ◽  
2021 ◽  
Vol 71 (4) ◽  
pp. 375-387
Author(s):  
Seungmin Lee

Abstract A pidgin metadata framework based on the concept of pidgin metadata is proposed to complement the limitations of existing approaches to metadata interoperability and to achieve more reliable metadata interoperability. The framework consists of three layers, with a hierarchical structure, and reflects the semantic and structural characteristics of various metadata. Layer 1 performs both an external function, serving as an anchor for semantic association between metadata elements, and an internal function, providing semantic categories that can encompass detailed elements. Layer 2 is an arbitrary layer composed of substantial elements from existing metadata and performs a function in which different metadata elements describing the same or similar aspects of information resources are associated with the semantic categories of Layer 1. Layer 3 implements the semantic relationships between Layer 1 and Layer 2 through the Resource Description Framework syntax. With this structure, the pidgin metadata framework can establish the criteria for semantic connection between different elements and fully reflect the complexity and heterogeneity among various metadata. Additionally, it is expected to provide a bibliographic environment that can achieve more reliable metadata interoperability than existing approaches by securing the communication between metadata.


2021 ◽  
pp. 23-59
Author(s):  
Stacie Tronto ◽  
◽  
Brenda L. Killingsworth ◽  

Many auditing professionals would contend that continuous monitoring is a function of management and not internal audit. However, effective continuous auditing is highly dependent upon a strong continuous monitoring system. Further, by integrating technology of these two systems, continuous assurance can be achieved, and audit efficiency and effectiveness can be improved through the reduction of costs and effort. This paper discusses how internal audit can collaborate with a business operation to develop a continuous monitoring application utilizing visual reporting and overcome the potential barriers to success. The specific business operation selected for modification was the procurement card program at a large public university. Following an introduction of the scenario, an overview of the ProCard™ program is provided, highlighting the program risks and controls. Third, a four-phased approach used to develop the continuous monitoring tool is described, including specific steps taken to ensure effective use of the real-time data by auditors. Fourth, challenges the internal function encountered when implementing the system are described, including how those challenges were addressed. Fifth, the paper provides concluding comments and future initiatives planned. Finally, the paper provides additional examples for continuous auditing and monitoring and suggests future research topics in this area. Keywords: Continuous auditing, continuous monitoring, visual reporting, internal audit, procurement card.


2021 ◽  
Vol 5 (3) ◽  
Author(s):  
Habib R Khan ◽  
William K Chan ◽  
Juliana Kanawati ◽  
Raymond Yee

Abstract Background Modern permanent pacemakers (PPMs) have individual features designed to identify cardiac rhythm abnormalities and improve their performance. Inappropriate pacing inhibition may be an undesired outcome from these features and cause symptoms in patients who require frequent pacing, leading to dizziness, and syncope. Inappropriate inhibition can be difficult to identify in circumstances that are intermittent and difficult to reproduce. Case summary A 57-year-old female underwent a mitral valve replacement (MVR) for severe mitral stenosis. One month following MVR, she presented with symptomatic third-degree atrioventricular block, and a dual-chamber PPM (Advisa™, Medtronic, Minneapolis, USA) was implanted and programmed DDD 50–130 b.p.m. At the 3-month follow-up, she reported frequent episodes of lightheadedness. She was found to have intermittent ventricular pacing inhibition on a 48-h Holter monitor due to an internal function of the Advisa™ series of PPMs that attempts to store an electrogram (EGM) every 1 h and 30 s. During the EGM storage, an amplified signal from the storage capacitor can result in oversensing by the ventricular channel and inappropriate pacing inhibition. Discussion To rectify the issue, the ventricular lead sensitivity value was increased from 0.9 mV to 1.2 mV. No instances of inappropriate ventricular pacing inhibition were noted on follow-up. To our knowledge, this is a rare case of inappropriate ventricular pacing inhibition caused by a combination of PPM self-adjusting sensitivity algorithm and oversensing every 1 h and 30 s from an amplified storage capacitor. Physicians should be aware of this possible complication and differentiate it from device or lead malfunction.


Author(s):  
Ruslan M. Ospanov ◽  
◽  
Yerzhan N. Seitkulov ◽  
Nurbek M. Sissenov ◽  
Banu B. Yergalieva ◽  
...  

The article discusses a new version of the internal function underlying the perspective modern scheme for constructing cryptographic hash functions Sponge (cryptographic sponge). The considered example of an internal function is similar to the Keccak permutation, but it has a number of main differences. The inner function operates on a 2048-bit state S, which can be viewed as a three-dimensional bit array of 4 x 8 x 64 size. The structure of the internal function is made up of 5 transformations similar to Keccak. However, firstly, in this example, instead of a 5-bit S-box, an 8-bit one is used. In this regard, the parameters of the three-dimensional representation of the state have been changed. Secondly, instead of a linear feedback shift register, a dictionary shift register with ring carry feedback is used to generate round constants. The properties of these transformations are analyzed in the work.


Author(s):  
Pavle Vesic

In last fifty years, consciousness appeared to be the most intriguing scientific question. For most people, that question, does not exists. The fact that we are aware that we exist is something what is not questionable. With the development of quantum mechanics, where the matter was described by wave function, life and accompanied processes were supposed to be mathematically describable. Most of living internal function were successfully described by temporary chemistry and physic but, consciousness phenomena was not explainable within that domain. David Chalmers posed the most difficulties consciousness question: hard problem. This article, in short, describes consciousness as a result in ether energy resonant stabilization process (EERSP), based on ATOS (1) and Process physics (2).


Author(s):  
Zeng Wenbo ◽  
Jie Ganxin ◽  
Zou Jianqiang ◽  
Guo Lin ◽  
Wang Gan ◽  
...  
Keyword(s):  

2020 ◽  
Vol 7 (1) ◽  
pp. 14-21
Author(s):  
Adrián Alfonso Peñate ◽  
Pablo Freyre Arrozarena

Abstract— With the approve of the cryptographic algorithm Rijndael as the AES (Advanced Encryption Standard) and a collection of works exists with the purpose that one or several of its internal functions depend on the selected key. In this work we will study a fault analysis model against the algorithm AES, and then we will analyze for dynamic (in the key-dependency sense) cryptographic algorithms based on AES, in the which ones the internal function ShiftRows is randomly selected in every round, how strong is this attack.Tóm tắt— Với việc thuật toán mã hóa Rijndael được chấp nhận là Tiêu chuẩn mã hóa nâng cao (Advanced Encryption Standard - AES), và một loạt các công trình nghiên cứu về một hoặc một số chức năng bên trong của thuật toán phụ thuộc vào khóa đã được công bố. Bài báo này trình bày về nghiên cứu mô hình phân tích lỗi dựa trên thuật toán AES và phân tích các thuật toán mã hóa động (theo nghĩa phụ thuộc khóa) dựa trên AES. Trong đó, các hàm nội bộ ShiftRows được chọn ngẫu nhiên trong mỗi vòng, để đánh giá mức độ nguy hiểm của cuộc tấn công.


Author(s):  
Tomasz Kusio

The contents of the chapter refer to innovations in organizations and particularly as their perception processes are implemented. At this point, the role and importance of academic institutions is more likely to be discussed as the internal initiatives for academia are concerned. The main objective of the work was to obtain the systematic approach to the issues of university transformation to such a point that the need of innovativeness at universities is discussed. This is compared against the requirements of stakeholders. The need for solutions is a normative issue, as expected by stakeholders. However, the issue of implementing innovative solutions is a topic of scientific discussion that is closely related to innovation, and which at the same time outlines a new dimension of perception of innovation in both business units and scientific units. Considerations can be made that implementation is the internal function of innovation that verifies in proportion to the radicalism of innovation the possibilities of their practical application.


Sign in / Sign up

Export Citation Format

Share Document