Network of Bones Morey, Sean; Killingsworth, M. Jimmie
2019
eBook
Both a far-removed place of refuge for the fringe of society and a high-status vacation destination, the Keys remain a legendary yet fragile place, still threatened by a human-made disaster, the 2010 ...Deepwater Horizon oil spill. Likewise, Key West, Florida, can be many things to many people, evoking laidback Margaritaville for some and Ernest Hemingway for others. In this mixture of memoir, travel writing, philosophical reflection, natural and cultural history, and meditation on language, Sean Morey wrestles with the varied and often contradictory nature of his hometown. Morey turns a sharp eye inward, teasing out the layers of natural and cultural developments that have shaped the Keys for both millions of years and the past few decades. He asks: What does it take for humans to accept our impact on Earth and, more importantly, what will move humans to take action to reverse adverse impacts? The answer, Morey posits, lies in imaginative thinking—in building connections between locations and individual interests and backgrounds to create a foundation for widespread ecological ethics. In Network of Bones , Morey guides readers through different images of Key West and connects them to global environmental issues, including overfishing, rising sea levels, and polluted oceans. Morey’s writing stimulates memory and invites engagement with the world as he shows us how learning about one place—no matter how specific and eccentric that place might be—can teach us about all other places. It’s just a matter of imagination. The author's proceeds from the sale of this book will benefit Coastal Conservation Association Florida.
Fluorescence imaging in the second near‐infrared window (NIR‐II) is a new technique that permits visualization of deep anatomical features with unprecedented spatial resolution. Although attractive, ...effectively suppressing the interference signal of the background is still an enormous challenge for obtaining target‐specific NIR‐II imaging in the complex and dynamic physiological environment. Herein, dual‐pathological‐parameter cooperatively activatable NIR‐II fluorescence nanoprobes (HISSNPs) are developed whereby hyaluronic acid chains and disulfide bonds act as the “double locks” to lock the fluorescence‐quenched aggregation state of the NIR‐II fluorescence dyes for performing ultrahigh specific imaging of tumors in vivo. The fluorescence can be lit up only when the “double locks” are opened by reacting with the “dual smart keys” (overexpressed hyaluronidase and thiols in tumor) simultaneously. In vivo NIR‐II imaging shows that they reduce nonspecific activitation and achieve ultralow background fluorescence, which is 10.6‐fold lower than single‐parameter activatable probes (HINPs) in the liver at 15 h postinjection. Consequently, these “dual lock‐and‐key”‐controlled HISSNPs exhibit fivefold higher tumor‐to‐normal tissue ratio than “single lock‐and‐key”‐controlled HINPs at 24 h postinjection, attractively realizing ultrahigh specificity of tumor imaging. This is thought to be the first attempt at implementing ultralow background interference with the participation of multiple pathological parameters in NIR‐II fluorescence imaging.
Dual‐pathological‐parameter cooperatively activatable nanoprobes, using a “dual lock‐and‐key” strategy, are constructed to adjust their aggregation degree for ultrahigh specific fluorescence imaging in the second near‐infrared window (NIR‐II). These nanoprobes based on self‐assembled NIR‐II dye‐pendent hyaluronans require the simultaneous presence of dual pathogens (hyaluronidase/thiols) to activate NIR‐II fluorescence. Thus, they significantly suppress the background signal, causing the ultrahigh specificity of tumor imaging.
Mining Keys for Graphs Alipourlangouri, Morteza; Chiang, Fei
Data & knowledge engineering,
March 2024, 2024-03-00, Letnik:
150
Journal Article
Recenzirano
Keys for graphs are a class of data quality rules that use topological and value constraints to uniquely identify entities in a data graph. They have been studied to support object identification, ...knowledge fusion, data deduplication, and social network reconciliation. Manual specification and discovery of graph keys is tedious and infeasible over large-scale graphs. To make GKeys useful in practice, we study the GKey discovery problem, and present GKMiner, an algorithm that mines keys over graphs. Our algorithm discovers keys in a graph via frequent subgraph expansion, and notably, identifies recursive keys, i.e., where the unique identification of an entity type is dependent upon the identification of another entity type. We introduce the key properties, minimality and support, which effectively help to reduce the space of candidate keys. GKMiner uses a set of auxillary structures to summarize an input graph, and to identify likely candidate keys for greater pruning efficiency and evaluation of the search space. Our evaluation shows that identifying and using recursive keys in entity linking, lead to improved accuracy, over keys found using existing graph key mining techniques.
Adaptive radiation is the rise of a diversity of ecological roles and role-specific adaptations within a lineage. Recently, some researchers have begun to use ‘adaptive radiation’ or ‘radiation’ as ...synonymous with ‘explosive species diversification’. This essay aims to clarify distinctions between these concepts, and the related ideas of geographic speciation, sexual selection, key innovations, key landscapes and ecological keys. Several examples are given to demonstrate that adaptive radiation and explosive diversification are not the same phenomenon, and that focusing on explosive diversification and the analysis of phylogenetic topology ignores much of the rich biology associated with adaptive radiation, and risks generating confusion about the nature of the evolutionary forces driving species diversification. Some ‘radiations’ involve bursts of geographic speciation or sexual selection, rather than adaptive diversification; some adaptive radiations have little or no effect on speciation, or even a negative effect. Many classic examples of ‘adaptive radiation’ appear to involve effects driven partly by geographic speciation, species' dispersal abilities, and the nature of extrinsic dispersal barriers; partly by sexual selection; and partly by adaptive radiation in the classical sense, including the origin of traits and invasion of adaptive zones that result in decreased diversification rates but add to overall diversity.
The decline in living coral since the 1970s has conspicuously slowed reef construction on a global scale, but the related process of reef erosion is less visible and not often quantified. Here, we ...present new data on the constructional and deconstructional sides of the carbonate-budget equation in the Florida Keys, U.S.A. We documented Orbicella spp. calcification rates at four offshore reefs and quantified decadal-scale rates of Orbicella-reef erosion at a mid-shore patch reef. Using Orbicella coral heads fitted with permanent markers in 1998, we measured reef-elevation loss at 28 stations over 17.3 yr to estimate a mean erosion rate of −5.5 (± 3.2, SD) mm yr−1. This loss equates to an erosion rate of −8.2 (± 4.8, SD) kg m−2 yr−1 on dead Orbicella colonies, or −6.6 kg m−2 yr−1 when adjusted reef-wide. Calculating net carbonate production using a census-based approach on the same patch reef in 2017, we estimated a reef-wide bioerosion rate of −1.9 (± 2.0, SD) kg m−2 yr−1, and a net carbonate production rate of 0.5 (± 0.3, SD) kg m−2 yr−1. Substituting the erosion rate we estimated with the markers would suggest that net carbonate production at this patch reef was lower and negative, −4.2 kg m−2 yr−1. This divergence could be a function of high erosion rates measured on the tops of Orbicella colonies, which may be preferentially targeted by parrotfish. Nonetheless, our study suggests the need for new field data to improve estimates of reef-structure persistence as coral reefs continue to degrade.
The intrinsic broadcast nature of wireless communication let the attackers to initiate several passive attacks such as eavesdropping. In this attack, the attackers do not disturb/stop or interrupt ...the communication channel, but it will silently steal the information between authentic users. For this purpose, physical layer security (PLS) is one of the promising methodologies to secure wireless transmissions from eavesdroppers. However, PLS is further divided into keyless security and secret key-based security. The keyless security is not practically implemented because it requires full/part of instantaneous/statistical channel state information (CSI) of the eavesdroppers. Alternatively, key-based security is exploiting the randomness and reciprocity of wireless channels that do not require any CSI from an eavesdropper. The secret key-based security is due to the unpredictability of wireless channels between two users. However, the secret key-based security mainly on two basic parameters, i.e. coherence time and transmission power. Nevertheless, the wireless channel between users has a short coherence time, and it will provide shorter keys' length due to which eavesdropper can easily extract keys between communicating parties. To overcome this limitation, we proposed the power allocation scheme to improve the secret key generation rate (SKGR) to strengthen the security between authentic users.
Icosahedral carboranes in medicine are still an emerging class of compounds with potential beneficial applications in drug design. These highly hydrophobic clusters are potential "new keys for old ...locks" which open up an exciting field of research for well-known, but challenging important therapeutic substrates, as demonstrated by the numerous examples discussed in this review.
The problem of simultaneously generating multiple keys for a cellular source model with a helper is investigated. In the model considered, there are four terminals, X 0 , X 1 , X 2 , and X 3 , each ...of which observes one component of a vector source. Terminal X 0 wishes to generate two secret keys K 1 and K 2 , respectively, with terminals X 1 and X 2 under the help of terminal X 3 . All terminals are allowed to communicate over a public channel. An eavesdropper is assumed to have access to the public discussion. Both symmetric and asymmetric key generations are considered. In symmetric key generation models, model 1a (with a trusted helper) requires that the two keys are concealed from the eavesdropper, and model 1b (with an untrusted helper) further requires that the two keys are concealed from the helper in addition to the eavesdropper. The asymmetric key generation models 2a and 2b are the same as symmetric key generation models 1a and 1b, respectively, except that the key K 2 is further required to be concealed from terminal X1. For all models studied, the key capacity region is established by designing a unified achievable strategy to achieve the cut-set outer bounds. We also study the problem of generating more than two keys and characterize its key capacity region when all the cellular terminals are required to generate independent keys with the base station.
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising ...challenge is to perform secure deduplication in cloud storage. Although convergent encryption has been extensively adopted for secure deduplication, a critical issue of making convergent encryption practical is to efficiently and reliably manage a huge number of convergent keys. This paper makes the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. We first introduce a baseline approach in which each user holds an independent master key for encrypting the convergent keys and outsourcing them to the cloud. However, such a baseline key management scheme generates an enormous number of keys with the increasing number of users and requires users to dedicatedly protect the master keys. To this end, we propose Dekey , a new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers. Security analysis demonstrates that Dekey is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement Dekey using the Ramp secret sharing scheme and demonstrate that Dekey incurs limited overhead in realistic environments.