Objective To investigate LC3B-Ⅱand active caspase-3 expression in human colorectal cancer to elucidate the role of autophagy and to explore the relationship of autophagy with apoptosis in human colorectal cancer. Met...Objective To investigate LC3B-Ⅱand active caspase-3 expression in human colorectal cancer to elucidate the role of autophagy and to explore the relationship of autophagy with apoptosis in human colorectal cancer. Methods LC3B expression was detected by immunohistochemistry in 53 human colorectal cancer tissues and 20 normal colon tissues.The protein levels of LC3B-Ⅱand active caspase-3 were also determined by Western blot analysis in 23 human colorectal cancer tissues and 10 normal colon tissues. Results LC3B was expressed both in cancer cells and normal epithelial cells.LC3B expression in the peripheral area of cancer tissues was correlated with several clinicopathological factors,including tumor differentiation(P=0.002),growth pattern of the tumor margin (P=0.028),pN(P=0.002),pStage(P=0.032),as well as vessel and nerve plexus invasion(P=0.002).The protein level of LC3B-Ⅱin cancer tissue was significantly higher than in normal tissue(P=0.038),but the expression of active forms of procaspase-3 in cancer tissue was lower(P=0.041).There was a statistically significant positive correlation between the expression levels of LC3B-Ⅱand the active forms of procaspase-3(r=0.537,P=0.008). Conclusions Autophagy has a prosurvival role in human colorectal cancer.Autophagy enhances the aggressiveness of colorectal cancer cells and their ability to adapt to apoptotic stimulus.展开更多
Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity atta...Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity attack and the similarity attack. This paper proposes a novel model, (w,γ, k)-anonymity, to avoid generality attacks on both cases of numeric and categorical attributes. We show that the optimal (w, γ, k)-anonymity problem is NP-hard and conduct the Top-down Local recoding (TDL) algorithm to implement the model. Our experiments validate the improvement of our model with real data.展开更多
Infanticide by males is a common phenomenon in mammals, especially primates, as lactation lasts much longer than gestation in many species. Usually, infanticidal episodes occur soon after group takeovers, and are trad...Infanticide by males is a common phenomenon in mammals, especially primates, as lactation lasts much longer than gestation in many species. Usually, infanticidal episodes occur soon after group takeovers, and are traditionally considered a male reproductive strategy (i.e., support the sexual selection hypothesis, Hrdy, 1974). To verify the validity of this conception, we observed one group of Franqois' langurs in the Nonggang Nature Reserve, China, between August 2003 and July 2004. During the study period, a Francois' langur female with the youngest infant in the group was attacked three times by immigrating males, and later disappeared by the third day after the final attack. We suggest that these attacks on the female-infant dyad represent infanticide attempts by males, and may be the cause of the adult female and her infant's disappearance. Presumably, that female dispersed with her infant to avoid infanticide and was not killed. Though these observations do not completely verify the sexual selection hypothesis, they are not inconsistent with it.展开更多
In this paper, we investigate the effect due to the change of topology structure of network on the nonlinear dynamical behavior, by virtue of the OFC neuron evolution model with attack and repair strategy based on the...In this paper, we investigate the effect due to the change of topology structure of network on the nonlinear dynamical behavior, by virtue of the OFC neuron evolution model with attack and repair strategy based on the small world. In particular, roles of various parameters relating to the dynamical behavior are carefully studied and analyzed. In addition, the avalanche and EEC-like wave activities with attack and repair strategy are also explored in detail in this work.展开更多
With the rapid development of Internet of Things (IoT),the issue of trust in distributed routing systems has attracted more research attention.The existing trust management frameworks,however,suffer from some possible...With the rapid development of Internet of Things (IoT),the issue of trust in distributed routing systems has attracted more research attention.The existing trust management frameworks,however,suffer from some possible attacks in hostile environments,such as false accusation,collusion,on-off,and conflicting behavior.Therefore,more comprehensive models should be proposed to predict the trust level of nodes on potential routes more precisely,and to defeat several kinds of possible attacks.This paper makes an attempt to design an attack-resistant trust management model based on beta function for distributed routing strategy in IoT.Our model can evaluate and propagate reputation in distributed routing systems.We first describe possible attacks on existing systems.Our model is then proposed to establish reliable trust relations between self-organized nodes and defeat possible attacks in distributed routing systems.We also propose a theoretical basis and skeleton of our model.Finally,some performance evaluations and security analyses are provided to show the effectiveness and robustness of our model compared with the existing systems.展开更多
Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially ...Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially against group colluding attack. The group tracing is neglected in previous works. In this paper, we propose a novel multimedia group fingerprint to trace malicious middlemen along with customers. We explore the quality of the non degenerate linear shift register sequence (NDLSRS) which is convenient in group initialization and management. The theoretic analysis and simulation experiment results show that NDLSRS has good resistance against attacks from colluding groups/ members even after its volume expanded.展开更多
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ...Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem.展开更多
In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality lo...In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality loss is formalized as a dynamic procedure, instead of a static function, and described via the "waterfall" diagram; 2) confidentiality loss is quantified in a relative manner, i.e., taken as a quantitative metric, the ratio of the conditional entropy being reserved after observing the entropy of the original full confidential information; 3) the optimal attacks including exhaustive attacks as well as all possible attacks that have (or have not even) been discovered, are taken into account when defining the novel concept of the confidential degree. To elucidate the proposed model, we analyze the information leakage in side-channel attacks and the anonymity of DC-net in a quantitative manner.展开更多
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,how...Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack.展开更多
In experiments in vitro and observations in the clinic in vivo studied the state of the lumen of subcutaneous veins and blood rheology of patients after their interaction with vascular catheters and solutions of medic...In experiments in vitro and observations in the clinic in vivo studied the state of the lumen of subcutaneous veins and blood rheology of patients after their interaction with vascular catheters and solutions of medicines based on the values of temperature, volume, concentration, osmotic activity and pH. It is shown that heparin injection in blood not prevent, but solution of 4% sodium bicarbonate injection prevents blood clotting, blood clots and blockage blood clots of veins and of catheters. It is shown that the heating to a temperature of+42 ℃ with the solution of 4% sodium bicarbonate provides softening action on old dry blood clots in 1 min, and their subsequent irrigation with a warm solution of 4% sodium bicarbonate and 3% hydrogen peroxide provides complete destruction and discoloration of the remaining spots of blood during 2 s. Proposed new medicines and hygiene products for the protection of the veins and installed in them vascular catheters from blockage of blood clots, and for removing blood stains from clothes and body surface patients.展开更多
A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be...A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be recovered by a linearization attack with O(2^60.52) operations by solving a System of Linear Equations (SLE) with at most 2^20.538 unknowns. Frederik Armknecht [Cryptology ePrint Archive, 2002/191] proposed a linearization attack on the KSG olEo algorithm with O(2^70.341) operations by solving an SLE with at most 2^24.056 unknowns, so the modification proposed by Hermelin reduces the ability or E0 to resist the linearization attack by comparing with the results ofFrederik Armknecht.展开更多
Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and...Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and of two of her male peers and the children's father altogether exploring their obsession towards her and, moreover, traces the evaluation and devaluation of women to the presentation of TV exploring its influence on his heroines, namely Mrs. Tucker and the babysitter serving as victims of the patriarchal society. Through a close engagement with the sexual objectification theory, this paper analyzes in detail men's aggressive oppressions upon women as well as women's compromise and rebellion towards the sexual violence, and investigates that the awakening of female independent consciousness is a key factor in effectively helping women achieve the gender equality between sexes.展开更多
With this study, it is aimed at examining the effect of the gender and developmental phases on the aggression tendencies of the Turkish students. In this context, the meta-analysis of the studies existing in the liter...With this study, it is aimed at examining the effect of the gender and developmental phases on the aggression tendencies of the Turkish students. In this context, the meta-analysis of the studies existing in the literature and covering the Turkish students has been conducted. The examined researches to be included in the analysis have been identified in accordance with certain criteria. As criteria, the following conditions have been sought: inclusion of the studies published between 2004 and 2015, inclusion of child, adolescent, and young adult students in the sample, giving the validity and reliability studies of the measuring tools, the studies being obtained from sources of the published theses and articles; and in the data, the arithmetic mean, standard deviation, and sample size being given. In the research, gender has been found effective on the general aggression scores, at significant level (EDavg = .280, p 〈 .01), and against males at medium level. The general aggression scores from the moderator variables have been found to have a medium level of effect (EDavg = .402, p 〈 .01) on the childhood period, and to have the greatest effect against males.展开更多
Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good pro...Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good probability of survival and perfect efficiency of task accomplishment.It provides a new thought for and a new solution to the application of route planning in new era.展开更多
The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of ...The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of these expectations as predictors of pro-social and anti-social behaviour has been analysed. The research is based on the assumption that every culture develops specific benchmarks in reference to which people judge various social phenomena. Creation of an individual conception of oneself and making a plan for one's life is based, to some extent, on social values which constitute the crucial element of every culture. The hypothesis to be verified in this study was the presence of a significant link between the occurrence of anti-social and pro-social behaviour and the adopted axiological assumptions concerning students and their behaviour. The subjects of the study were students and teachers from 18 schools representing three types of culture and three educational levels (primary, lower secondary, and upper secondary). The total number of 1,212 students were observed (Goldsmith's Observational Questionnaire), and 36 teachers were interviewed. The results indicate a link between the adopted school culture and teachers' functioning, and open perspectives of further research on the connection between the values in school curricula and the occurrence of behaviour violating social norms and bounds.展开更多
A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover...A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the secu-rity of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.展开更多
HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by ...HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks.展开更多
Implicitly aggressive discourse belongs to one kind of aggressive discourses, which is an impolite phenomenon. However, implicitly aggressive discourse not only can threat and attack listeners, but also can avoid conf...Implicitly aggressive discourse belongs to one kind of aggressive discourses, which is an impolite phenomenon. However, implicitly aggressive discourse not only can threat and attack listeners, but also can avoid conflicting in public. So it is a worthy studying linguistic phenomenon. Based on Goal-direction principle, this article analyzes the language performance of implicitly aggressive discourse, which aims to reveal socially pragmatic constraints of implicit trigger of conflict talk and interpersonal function in interpersonal conflict.展开更多
It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, t...It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, the attachment introduces additional cost except performance penalty. For example, the attachment must be unique or restrictedly modified. In this paper, we propose a novel approach to detect integrity of dynamic control flows by counting executed branch instructions without involving any attachment. Our solution is based on the following observation. If a control flow is compromised, the number of executed branch instructions will be abnormally increased. The cause is that intruders usually hijack control flows for malicious execution which absolutely introduces additional branch instructions. Inspired by the above observation, in this paper, we devise a novel system named DCFI- Checker, which detect integrity corruption of dynamic control flows with the support of Performance Monitoring Counter (PMC). We have developed a proof-of-concept prototype system of DCFI-Checker on Linux fedora 5. Our experiments with existing kemel rootkits and buffer overflow attack show that DCFI- Checker is effective to detect compromised dynamic control transfer, and performance evaluations indicate that performance penaltyinduced by DCFI-Checker is acceptable.展开更多
基金supported by a grant from the Medical Scientific Research Foundation of Tianjin,China (No.2010KZ97)
文摘Objective To investigate LC3B-Ⅱand active caspase-3 expression in human colorectal cancer to elucidate the role of autophagy and to explore the relationship of autophagy with apoptosis in human colorectal cancer. Methods LC3B expression was detected by immunohistochemistry in 53 human colorectal cancer tissues and 20 normal colon tissues.The protein levels of LC3B-Ⅱand active caspase-3 were also determined by Western blot analysis in 23 human colorectal cancer tissues and 10 normal colon tissues. Results LC3B was expressed both in cancer cells and normal epithelial cells.LC3B expression in the peripheral area of cancer tissues was correlated with several clinicopathological factors,including tumor differentiation(P=0.002),growth pattern of the tumor margin (P=0.028),pN(P=0.002),pStage(P=0.032),as well as vessel and nerve plexus invasion(P=0.002).The protein level of LC3B-Ⅱin cancer tissue was significantly higher than in normal tissue(P=0.038),but the expression of active forms of procaspase-3 in cancer tissue was lower(P=0.041).There was a statistically significant positive correlation between the expression levels of LC3B-Ⅱand the active forms of procaspase-3(r=0.537,P=0.008). Conclusions Autophagy has a prosurvival role in human colorectal cancer.Autophagy enhances the aggressiveness of colorectal cancer cells and their ability to adapt to apoptotic stimulus.
基金supported in part by Research Fund for the Doctoral Program of Higher Education of China(No.20120009110007)Program for Innovative Research Team in University of Ministry of Education of China (No.IRT201206)+3 种基金Program for New Century Excellent Talents in University(NCET-110565)the Fundamental Research Funds for the Central Universities(No.2012JBZ010)the Open Project Program of Beijing Key Laboratory of Trusted Computing at Beijing University of TechnologyBeijing Higher Education Young Elite Teacher Project(No. YETP0542)
文摘Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity attack and the similarity attack. This paper proposes a novel model, (w,γ, k)-anonymity, to avoid generality attacks on both cases of numeric and categorical attributes. We show that the optimal (w, γ, k)-anonymity problem is NP-hard and conduct the Top-down Local recoding (TDL) algorithm to implement the model. Our experiments validate the improvement of our model with real data.
基金supported by National Nature Science Foundation of China (31172122)Guangxi Nature Science Foundation (2012GXNSFAA053039)
文摘Infanticide by males is a common phenomenon in mammals, especially primates, as lactation lasts much longer than gestation in many species. Usually, infanticidal episodes occur soon after group takeovers, and are traditionally considered a male reproductive strategy (i.e., support the sexual selection hypothesis, Hrdy, 1974). To verify the validity of this conception, we observed one group of Franqois' langurs in the Nonggang Nature Reserve, China, between August 2003 and July 2004. During the study period, a Francois' langur female with the youngest infant in the group was attacked three times by immigrating males, and later disappeared by the third day after the final attack. We suggest that these attacks on the female-infant dyad represent infanticide attempts by males, and may be the cause of the adult female and her infant's disappearance. Presumably, that female dispersed with her infant to avoid infanticide and was not killed. Though these observations do not completely verify the sexual selection hypothesis, they are not inconsistent with it.
基金The project supported by National Natural Science Foundation of China under Grant No.10675060
文摘In this paper, we investigate the effect due to the change of topology structure of network on the nonlinear dynamical behavior, by virtue of the OFC neuron evolution model with attack and repair strategy based on the small world. In particular, roles of various parameters relating to the dynamical behavior are carefully studied and analyzed. In addition, the avalanche and EEC-like wave activities with attack and repair strategy are also explored in detail in this work.
基金supported by the National Natural Science Foundation of China under Grant No.61100219the Fundamental Research Funds for the Central Universities under Grant No.2012JBM010the Key Program of National Natural Science Foundation of China under Grant No.60833002
文摘With the rapid development of Internet of Things (IoT),the issue of trust in distributed routing systems has attracted more research attention.The existing trust management frameworks,however,suffer from some possible attacks in hostile environments,such as false accusation,collusion,on-off,and conflicting behavior.Therefore,more comprehensive models should be proposed to predict the trust level of nodes on potential routes more precisely,and to defeat several kinds of possible attacks.This paper makes an attempt to design an attack-resistant trust management model based on beta function for distributed routing strategy in IoT.Our model can evaluate and propagate reputation in distributed routing systems.We first describe possible attacks on existing systems.Our model is then proposed to establish reliable trust relations between self-organized nodes and defeat possible attacks in distributed routing systems.We also propose a theoretical basis and skeleton of our model.Finally,some performance evaluations and security analyses are provided to show the effectiveness and robustness of our model compared with the existing systems.
文摘Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially against group colluding attack. The group tracing is neglected in previous works. In this paper, we propose a novel multimedia group fingerprint to trace malicious middlemen along with customers. We explore the quality of the non degenerate linear shift register sequence (NDLSRS) which is convenient in group initialization and management. The theoretic analysis and simulation experiment results show that NDLSRS has good resistance against attacks from colluding groups/ members even after its volume expanded.
基金This research was supported by the National Science Foundation of China for Funding Projects (61173089,61472298) and National Statistical Science Program of China(2013LZ46).
文摘Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem.
基金supported by the National Natural Science Foundation of China under Grants No.61172085,No.61272536,No.11061130539,No.61103221,No.61271118,No.61021004
文摘In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality loss is formalized as a dynamic procedure, instead of a static function, and described via the "waterfall" diagram; 2) confidentiality loss is quantified in a relative manner, i.e., taken as a quantitative metric, the ratio of the conditional entropy being reserved after observing the entropy of the original full confidential information; 3) the optimal attacks including exhaustive attacks as well as all possible attacks that have (or have not even) been discovered, are taken into account when defining the novel concept of the confidential degree. To elucidate the proposed model, we analyze the information leakage in side-channel attacks and the anonymity of DC-net in a quantitative manner.
基金supported by the National Natural Science Foundation of China(No. 71020107027) in part by the Doctoral Startup Fundation of Xinjiang University of Finace and Economics
文摘Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack.
文摘In experiments in vitro and observations in the clinic in vivo studied the state of the lumen of subcutaneous veins and blood rheology of patients after their interaction with vascular catheters and solutions of medicines based on the values of temperature, volume, concentration, osmotic activity and pH. It is shown that heparin injection in blood not prevent, but solution of 4% sodium bicarbonate injection prevents blood clotting, blood clots and blockage blood clots of veins and of catheters. It is shown that the heating to a temperature of+42 ℃ with the solution of 4% sodium bicarbonate provides softening action on old dry blood clots in 1 min, and their subsequent irrigation with a warm solution of 4% sodium bicarbonate and 3% hydrogen peroxide provides complete destruction and discoloration of the remaining spots of blood during 2 s. Proposed new medicines and hygiene products for the protection of the veins and installed in them vascular catheters from blockage of blood clots, and for removing blood stains from clothes and body surface patients.
文摘A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be recovered by a linearization attack with O(2^60.52) operations by solving a System of Linear Equations (SLE) with at most 2^20.538 unknowns. Frederik Armknecht [Cryptology ePrint Archive, 2002/191] proposed a linearization attack on the KSG olEo algorithm with O(2^70.341) operations by solving an SLE with at most 2^24.056 unknowns, so the modification proposed by Hermelin reduces the ability or E0 to resist the linearization attack by comparing with the results ofFrederik Armknecht.
文摘Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and of two of her male peers and the children's father altogether exploring their obsession towards her and, moreover, traces the evaluation and devaluation of women to the presentation of TV exploring its influence on his heroines, namely Mrs. Tucker and the babysitter serving as victims of the patriarchal society. Through a close engagement with the sexual objectification theory, this paper analyzes in detail men's aggressive oppressions upon women as well as women's compromise and rebellion towards the sexual violence, and investigates that the awakening of female independent consciousness is a key factor in effectively helping women achieve the gender equality between sexes.
文摘With this study, it is aimed at examining the effect of the gender and developmental phases on the aggression tendencies of the Turkish students. In this context, the meta-analysis of the studies existing in the literature and covering the Turkish students has been conducted. The examined researches to be included in the analysis have been identified in accordance with certain criteria. As criteria, the following conditions have been sought: inclusion of the studies published between 2004 and 2015, inclusion of child, adolescent, and young adult students in the sample, giving the validity and reliability studies of the measuring tools, the studies being obtained from sources of the published theses and articles; and in the data, the arithmetic mean, standard deviation, and sample size being given. In the research, gender has been found effective on the general aggression scores, at significant level (EDavg = .280, p 〈 .01), and against males at medium level. The general aggression scores from the moderator variables have been found to have a medium level of effect (EDavg = .402, p 〈 .01) on the childhood period, and to have the greatest effect against males.
基金The National Natural Science Foundation of China(No.60475027)
文摘Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good probability of survival and perfect efficiency of task accomplishment.It provides a new thought for and a new solution to the application of route planning in new era.
文摘The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of these expectations as predictors of pro-social and anti-social behaviour has been analysed. The research is based on the assumption that every culture develops specific benchmarks in reference to which people judge various social phenomena. Creation of an individual conception of oneself and making a plan for one's life is based, to some extent, on social values which constitute the crucial element of every culture. The hypothesis to be verified in this study was the presence of a significant link between the occurrence of anti-social and pro-social behaviour and the adopted axiological assumptions concerning students and their behaviour. The subjects of the study were students and teachers from 18 schools representing three types of culture and three educational levels (primary, lower secondary, and upper secondary). The total number of 1,212 students were observed (Goldsmith's Observational Questionnaire), and 36 teachers were interviewed. The results indicate a link between the adopted school culture and teachers' functioning, and open perspectives of further research on the connection between the values in school curricula and the occurrence of behaviour violating social norms and bounds.
基金Supported by the National Key Foundation Research "973" project (No.G1999035802) and the National Natural Science Foundation of China (No.60273027).
文摘A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the secu-rity of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.
基金supported by National Key Basic Research Program of China(973 program)under Grant No.2012CB315905National Natural Science Foundation of China under grants 61172048,61100184,60932005 and 61201128the Fundamental Research Funds for the Central Universities under Grant No ZYGX2011J007
文摘HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks.
文摘Implicitly aggressive discourse belongs to one kind of aggressive discourses, which is an impolite phenomenon. However, implicitly aggressive discourse not only can threat and attack listeners, but also can avoid conflicting in public. So it is a worthy studying linguistic phenomenon. Based on Goal-direction principle, this article analyzes the language performance of implicitly aggressive discourse, which aims to reveal socially pragmatic constraints of implicit trigger of conflict talk and interpersonal function in interpersonal conflict.
基金The work is supported in part by the National Natural Science Foundation of China,Natural Science Foundation of Beijing,National 863 High-Tech Research Development Program of China
文摘It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, the attachment introduces additional cost except performance penalty. For example, the attachment must be unique or restrictedly modified. In this paper, we propose a novel approach to detect integrity of dynamic control flows by counting executed branch instructions without involving any attachment. Our solution is based on the following observation. If a control flow is compromised, the number of executed branch instructions will be abnormally increased. The cause is that intruders usually hijack control flows for malicious execution which absolutely introduces additional branch instructions. Inspired by the above observation, in this paper, we devise a novel system named DCFI- Checker, which detect integrity corruption of dynamic control flows with the support of Performance Monitoring Counter (PMC). We have developed a proof-of-concept prototype system of DCFI-Checker on Linux fedora 5. Our experiments with existing kemel rootkits and buffer overflow attack show that DCFI- Checker is effective to detect compromised dynamic control transfer, and performance evaluations indicate that performance penaltyinduced by DCFI-Checker is acceptable.