Search results for "Crypt"

showing 10 items of 1111 documents

Analyzing Cascading Effects in Interdependent Critical Infrastructures

2018

International audience; Critical Infrastructures (CIs) are resources that are essential for the performance of society, including its economy and its security. Large-scale disasters, whether natural or man-made, can have devastating primary (direct) effects on some CI and significant indirect effects (cascading effects) on other CIs, because CIs are interconnected and depend on each other’s services. Recent work by Laugé et al. expressed the dependency values among CIs as dependency matrices for various durations of the primary CI failure. For better preparedness and mitigation of CI failures knowledge of the weak points in CI interdependencies is crucial. To this effect, we have developed …

021110 strategic defence & security studiesDependency (UML)Computer sciencemedia_common.quotation_subjectPath dependency0211 other engineering and technologiesParallel loops effectCascading effects021107 urban & regional planning02 engineering and technologyInterdependenceRisk analysis (engineering)Loop dependencyExpert assessmentCode (cryptography)[INFO]Computer Science [cs]Cascading effectsParallel forward paths effectInterdependent CIsmedia_common
researchProduct

Ensuring the Reliability of an Autonomous Vehicle

2017

International audience; In automotive applications, several components, offering different services, can be composed in order to handle one specific task (autonomous driving for example). Nevertheless, component composition is not straightforward and is subject to the occurrence ofbugs resulting from components or services incompatibilities for instance. Hence, bugs detection in component-based systems at thedesign level is very important, particularly, when the developed system concerns automotive applications supporting critical services.In this paper, we propose a formal approach for modeling and verifying the reliability of an autonomous vehicle system, communicatingcontinuously with of…

021110 strategic defence & security studiesFocus (computing)021103 operations researchComputer sciencebusiness.industryDistributed computingReliability (computer networking)0211 other engineering and technologiesAutomotive industry[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationTask (project management)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Systems Modeling LanguageComponent (UML)Systems architectureTime constraint[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessProceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct

Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage

2019

Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.

021110 strategic defence & security studiesTheoretical computer scienceComputer sciencebusiness.industry0211 other engineering and technologiesCloud computing02 engineering and technologyString searching algorithmData structureEncryptionSimple (abstract algebra)Computer data storagePattern matchingbusinessBlossom algorithm2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Ziziphora tenuior L. essential oil from Dana Biosphere Reserve (Southern Jordan); chemical characterization and assessment of biological activities

2016

Abstract Ethnopharmacologic relevance Ziziphora tenuior L. (Lamiaceae) is a medicinal plant in Jordan, which is included in various antimicrobial, antiseptic, expectorant and wound healing preparations. It is used for the treatment of cough, stomach ache, dysentery, fever, uterus infection, gut inflammation and painful menstruation. Aim of the study The aim of this study was to assess, for the first time, the chemical composition of the essential oil of Z. tenuior originated from southern Jordan and its antifungal effects against several yeasts. Concomitantly, the mechanisms behind the anti-fungal activity against Candida albicans were also disclosed. Since the Z. tenuior traditional uses a…

0301 basic medicineAntifungal Agents030106 microbiologyAnti-Inflammatory AgentsGerm tubeCyclohexane MonoterpenesMicrobial Sensitivity Tests[SDV.BID]Life Sciences [q-bio]/Biodiversity01 natural sciencesCell Linelaw.inventionMicrobiologyMice03 medical and health scienceschemistry.chemical_compoundlawCell Line TumorCandida albicansDrug DiscoveryOils VolatileAnimalsHumansPlant OilsBiomassCandida albicansEssential oilComputingMilieux_MISCELLANEOUSPharmacologyJordanLamiaceaebiologyTerpenesMacrophagesBiological activityHep G2 Cellsbiology.organism_classificationAntimicrobialCorpus albicans3. Good health0104 chemical sciences010404 medicinal & biomolecular chemistryAspergilluschemistryCryptococcus neoformansMonoterpenesLamiaceaePulegone
researchProduct

Assessment of the Antimicrobial Activity and the Entomocidal Potential of Bacillus thuringiensis Isolates from Algeria.

2017

This work represents the first initiative to analyze the distribution of B. thuringiensis in Algeria and to evaluate the biological potential of the isolates. A total of 157 isolates were recovered, with at least one isolate in 94.4% of the samples. The highest Bt index was found in samples from rhizospheric soil (0.48) and from the Mediterranean area (0.44). Most isolates showed antifungal activity (98.5%), in contrast to the few that had antibacterial activity (29.9%). A high genetic diversity was made evident by the finding of many different crystal shapes and various combinations of shapes within a single isolate (in 58.4% of the isolates). Also, over 50% of the isolates harbored cry1, …

0301 basic medicineAntifungalStaphylococcus aureusmedicine.drug_classHealth Toxicology and Mutagenesis030106 microbiologyBacterial ToxinsBiological pest controlBacillus thuringiensisBiologyToxicologyArticleMicrobiology03 medical and health sciencesB. thuringiensisAnti-Infective AgentsBacterial ProteinsBacillus thuringiensismedicineEscherichia colibiocontrolGeneSoil MicrobiologyGenetic diversitycryChitinasesFungi<i>B. thuringiensis</i>; antibacterial; antifungal; <i>cry</i>; <i>vip3</i>; chitinase; biocontrolAntimicrobialbiology.organism_classificationCryptochromesantibacterialHexosaminidasesGenes BacterialAlgeriachitinaseChitinasePseudomonas aeruginosavip3biology.proteinMicroscopy Electron ScanningAntibacterial activityantifungalToxins
researchProduct

Fungal Infections of the Central Nervous System in Children.

2017

Although uncommon in children, fungal infections of the central nervous system can be devastating and difficult to treat. A better understanding of basic mycologic, immunologic, and pharmacologic processes has led to important advances in the diagnosis and management of these diseases, but their mortality rates remain unacceptably high. In this focused review, we examine the epidemiology and clinical features of the most common fungal pathogens of the central nervous system in children and explore recent advances in diagnosis and antifungal therapy.

0301 basic medicineCentral Nervous Systemmedicine.medical_specialtyAntifungal Agents030106 microbiologyCentral nervous systemAspergillosisHistoplasmosisBlastomycosis03 medical and health sciencesCentral Nervous System Fungal InfectionsEpidemiologymedicineAspergillosisHumansMucormycosisIntensive care medicineChildHistoplasmosisCoccidioidomycosisbusiness.industryMortality rateMucormycosisCandidiasisFungiGeneral MedicineCryptococcosismedicine.diseaseInfectious Diseasesmedicine.anatomical_structurePediatrics Perinatology and Child HealthCryptococcosisbusinessBlastomycosisJournal of the Pediatric Infectious Diseases Society
researchProduct

Anhydrobiosis and Dehydration of Yeasts

2017

Anhydrobiosis is a unique phenomenon of nature which gives possibility to various live organisms to survive during very hot and dry seasons of the year. It is the state in which all processes of metabolism are temporarily reversibly suspended as the result of strong dehydration of the cells. The state of anhydrobiosis is used for industrial production of active dry yeasts. Results of detailed studies of mechanisms of anhydrobiosis and of changes in the cells which take place during their drying by different methods help to improve the dehydration resistance of yeast strains necessary in traditional and nonconventional biotechnologies. The progress which has been made in these researches wit…

0301 basic medicineChemistry030106 microbiologymedicine.diseaseYeast03 medical and health sciences030104 developmental biologyDehydration rehydrationBiochemistryLive organismsmedicineDehydrationCryptobiosisIntracellular organelles
researchProduct

Impact of high-pressure processing on the stability and bioaccessibility of bioactive compounds in Clementine mandarin juice and its cytoprotective e…

2020

Mandarin juice is a rich source of antioxidant bioactive compounds. While the content and profile of bioactives are known, the impact of high-pressure processing (HPP) on their stability and bioaccessibility (BA) is unknown, but may allow obtaining safe, nutritious, and fresh-tasting juices with highly extractable bioactive compounds. The stability and BA of bioactive antioxidant compounds in untreated and HPP-treated (400 MPa/40 °C/1 min) Clementine mandarin juices, and the cytoprotective effect of its bioaccessible fractions (BF) obtained after simulated gastrointestinal digestion against H2O2-induced oxidative stress in differentiated Caco-2 cells were investigated. The BF of HPP-treated…

0301 basic medicineCitrusAntioxidantFood Handlingmedicine.medical_treatmentPhytochemicalsBiological AvailabilityPascalization03 medical and health sciences0404 agricultural biotechnologyCryoprotective AgentsAntioxidant activitymedicineHumansBeta-cryptoxanthinFood scienceOrange juiceCarotenoidchemistry.chemical_classificationOrange juicePulsed electric-fields030109 nutrition & dieteticsVitamin CVitamin-c04 agricultural and veterinary sciencesGeneral MedicineAscorbic acid040401 food scienceCytoprotectionIn-vitro bioaccessibilityFlavonoid compositionFruit and Vegetable JuiceschemistryPolyphenolOxidative stressCitrus juiceAscorbic acidCaco-2 CellsFood ScienceFoodfunction
researchProduct

Disease–Genes Must Guide Data Source Integration in the Gene Prioritization Process

2019

One of the main issues in detecting the genes involved in the etiology of genetic human diseases is the integration of different types of available functional relationships between genes. Numerous approaches exploited the complementary evidence coded in heterogeneous sources of data to prioritize disease-genes, such as functional profiles or expression quantitative trait loci, but none of them to our knowledge posed the scarcity of known disease-genes as a feature of their integration methodology. Nevertheless, in contexts where data are unbalanced, that is, where one class is largely under-represented, imbalance-unaware approaches may suffer a strong decrease in performance. We claim that …

0301 basic medicineClass (computer programming)Boosting (machine learning)Computer scienceProcess (engineering)media_common.quotation_subjectComputational biologyScarcity03 medical and health sciencesComputingMethodologies_PATTERNRECOGNITION030104 developmental biologyExpression quantitative trait lociKey (cryptography)Feature (machine learning)Gene prioritizationmedia_common
researchProduct