In healthcare, inter-organizational sharing and collaborative use of big data become increasingly important. The cloud-computing paradigm is expected to provide an environment perfectly matching the ...needs of collaborating healthcare workers. However, there are still many security and privacy challenges impeding the wide adoption of cloud computing in this domain. In this paper, we present a novel architecture and its implementation for inter-organizational data sharing, which provides a high level of security and privacy for patient data in semi-trusted cloud computing environments. This architecture features attribute-based encryption for selective access authorization and cryptographic secret sharing in order to disperse data across multiple clouds, reducing the adversarial capabilities of curious cloud providers. An implementation and evaluation by several experiments demonstrate the practical feasibility and good performance of our approach.
Research on the robustness of networks, and in particular the Internet, has gained critical importance in recent decades because more and more individuals, societies and firms rely on this global ...network infrastructure for communication, knowledge transfer, business processes and e-commerce. In particular, modeling the structure of the Internet has inspired several novel graph metrics for assessing important topological robustness features of large complex networks. This survey provides a comparative overview of these metrics, presents their strengths and limitations for analyzing the robustness of the Internet topology, and outlines a conceptual tool set in order to facilitate their future adoption by Internet research and practice but also other areas of network science.
In this explorative study, we examine the economy and transaction network of the decentralized digital currency Bitcoin during the first four years of its existence. The objective is to develop ...insights into the evolution of the Bitcoin economy during this period. For this, we establish and analyze a novel integrated dataset that enriches data from the Bitcoin blockchain with off-network data such as business categories and geo-locations. Our analyses reveal the major Bitcoin businesses and markets. Our results also give insights on the business distribution by countries and how businesses evolve over time. We also show that there is a gambling network that features many very small transactions. Furthermore, regional differences in the adoption and business distribution could be found. In the network analysis, the small world phenomenon is investigated and confirmed for several subgraphs of the Bitcoin network.
Celotno besedilo
Dostopno za:
CEKLJ, DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
It is long known that the nervous system of vertebrates can be shaped by internal and external factors. On the other hand, the nervous system of insects was long assumed to be stereotypic, although ...evidence for plasticity effects accumulated for several decades. To cover the topic comprehensively, this review recapitulates the establishment of the term "plasticity" in neuroscience and introduces its original meaning. We describe the basic composition of the insect olfactory system using
as a representative example and outline experience-dependent plasticity effects observed in this part of the brain in a variety of insects, including hymenopterans, lepidopterans, locusts, and flies. In particular, we highlight recent advances in the study of experience-dependent plasticity effects in the olfactory system of
, as it is the most accessible olfactory system of all insect species due to the genetic tools available. The partly contradictory results demonstrate that morphological, physiological and behavioral changes in response to long-term olfactory stimulation are more complex than previously thought. Different molecular mechanisms leading to these changes were unveiled in the past and are likely responsible for this complexity. We discuss common problems in the study of experience-dependent plasticity, ways to overcome them, and future directions in this area of research. In addition, we critically examine the transferability of laboratory data to natural systems to address the topic as holistically as possible. As a mechanism that allows organisms to adapt to new environmental conditions, experience-dependent plasticity contributes to an animal's resilience and is therefore a crucial topic for future research, especially in an era of rapid environmental changes.
Evaluating odor blends in sensory processing is a crucial step for signal recognition and execution of behavioral decisions. Using behavioral assays and 2-photon imaging, we have characterized the ...neural and behavioral correlates of mixture perception in the olfactory system of Drosophila. Mixtures of odors with opposing valences elicit strong inhibition in certain attractant-responsive input channels. This inhibition correlates with reduced behavioral attraction. We demonstrate that defined subsets of GABAergic interneurons provide the neuronal substrate of this computation at pre- and postsynaptic loci via GABA
- and GABA
receptors, respectively. Intriguingly, manipulation of single input channels by silencing and optogenetic activation unveils a glomerulus-specific crosstalk between the attractant- and repellent-responsive circuits. This inhibitory interaction biases the behavioral output. Such a form of selective lateral inhibition represents a crucial neuronal mechanism in the processing of conflicting sensory information.
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, ...vague statements, and the use of pacifying phrases concerning privacy. This represents the undertaking of a step forward in the literature on this topic through a comprehensive analysis encompassing both time and website coverage. It characterizes trends across website categories, top-level domains, and popularity ranks. Furthermore, studying the development in the context of the General Data Protection Regulation (GDPR) offers insights into the impact of regulations on policy comprehensibility. The findings reveal a concerning trend: privacy policies have grown longer and more ambiguous, making it challenging for users to comprehend them. Notably, there is an increased proportion of vague statements, while clear statements have seen a decrease. Despite this, the study highlights a steady rise in the inclusion of reassuring statements aimed at alleviating readers’ privacy concerns.
A combined damage model has been built by the use of degradation models and finite element simulations as physics-of-failure method to determine degradation rates. This approach has some advantages ...over the more common Coffin-Manson approach like the ability to explicitly consider interactions of failure modes and a better transferability to new geometries. Experimental data from literature, with the example of wire bond and soldered die-attach degradation of a power module under power cycling conditions, has been used to calibrate the degradation models. Degradation rates, failure modes and numbers of cycles to failure could be predicted with a manageable amount of FE simulations and good accuracy; typical observations from power cycling experiments could be reproduced with the combined damage approach. The proposed methodology could be expanded to other degradation effects, e.g. deterioration of the thermal interface to the heatsink, to determine their interaction with other failure modes and effect on lifetime.
•FEM degradation model•Power electronics reliability•Combined damage•Die-attach wire bond interaction
This paper presents a conceptual framework for security engineering, with a strong focus on security requirements elicitation and analysis. This conceptual framework establishes a clear-cut ...vocabulary and makes explicit the interrelations between the different concepts and notions used in security engineering. Further, we apply our conceptual framework to compare and evaluate current security requirements engineering approaches, such as the Common Criteria, Secure Tropos, SREP, MSRA, as well as methods based on UML and problem frames. We review these methods and assess them according to different criteria, such as the general approach and scope of the method, its validation, and quality assurance capabilities. Finally, we discuss how these methods are related to the conceptual framework and to one another.
Genetically modified organisms are crucial for our understanding of gene regulatory networks, physiological processes and ontogeny. With modern molecular genetic techniques allowing the rapid ...generation of different Drosophila melanogaster mutants, efficient in-depth morphological investigations become an important issue. Anatomical studies can elucidate the role of certain genes in developmental processes and point out which parts of gene regulatory networks are involved in evolutionary changes of morphological structures. The wingless mutation wg1 of D. melanogaster was discovered more than 40 years ago. While early studies addressed the external phenotype of these mutants, the documentation of the internal organization was largely restricted to the prominent indirect flight muscles. We used SEM micrographs, histological serial sections, μ-computed tomography, CLSM and 3D reconstructions to study and document the thoracic skeletomuscular system of the wild type and mutant. A recently introduced nomenclature for the musculature of neopteran insects was applied to facilitate comparisons with closely or more distantly related taxa. The mutation is phenotypically mainly characterized by the absence of one or both wings and halteres. The wing is partly or entirely replaced by duplications of mesonotal structures, whereas the haltere and its associated muscles are completely absent on body sides showing the reduction. Both the direct and indirect mesothoracic flight muscles are affected by loss and reorientation of bundles or fibers. Our observations lead to the conclusion that the wingless mutation causes a homeotic transformation in the imaginal discs of wings and halteres with a direct effect on the development of skeletal structures and an indirect effect on the associated muscular system.
•A recently introduced nomenclature for the thoracic musculature of Neoptera is applied.•Morphological differences between wild type and mutant are directly compared.•The mutation has an impact on organs, muscles and skeletal structures.•Skeletal modifications cause reorientations of both flight muscle types in mutants.•The applicability of the results to natural secondary loss of wings is discussed.
Predatory assassin bugs produce venomous saliva that enables them to overwhelm, kill, and pre-digest large prey animals. Venom from the posterior main gland (PMG) of the African assassin bug
has ...strong cytotoxic effects, but the responsible compounds are yet unknown. Using cation-exchange chromatography, we fractionated PMG extracts from
and screened the fractions for toxicity. Two venom fractions strongly affected insect cell viability, bacterial growth, erythrocyte integrity, and intracellular calcium levels in
olfactory sensory neurons. LC-MS/MS analysis revealed that both fractions contained gelsolin, redulysins, S1 family peptidases, and proteins from the uncharacterized venom protein family 2. Synthetic peptides representing the putative lytic domain of redulysins had strong antimicrobial activity against
and/or
but only weak toxicity towards insect or mammalian cells, indicating a primary role in preventing the intake of microbial pathogens. In contrast, a recombinant venom protein family 2 protein significantly reduced insect cell viability but exhibited no antibacterial or hemolytic activity, suggesting that it plays a role in prey overwhelming and killing. The results of our study show that
secretes multiple cytotoxic compounds targeting different organisms to facilitate predation and antimicrobial defense.