oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 11 )

2018 ( 18 )

2017 ( 23 )

2016 ( 21 )

Custom range...

Search Results: 1 - 10 of 6991 matches for " Steve Ko "
All listed articles are free for downloading (OA Articles)
Page 1 /6991
Display every page Item
Almost Universal Hash Families are also Storage Enforcing
Mohammad Iftekhar Husain,Steve Ko,Atri Rudra,Steve Uurtamo
Mathematics , 2012,
Abstract: We show that every almost universal hash function also has the storage enforcement property. Almost universal hash functions have found numerous applications and we show that this new storage enforcement property allows the application of almost universal hash functions in a wide range of remote verification tasks: (i) Proof of Secure Erasure (where we want to remotely erase and securely update the code of a compromised machine with memory-bounded adversary), (ii) Proof of Ownership (where a storage server wants to check if a client has the data it claims to have before giving access to deduplicated data) and (iii) Data possession (where the client wants to verify whether the remote storage server is storing its data). Specifically, storage enforcement guarantee in the classical data possession problem removes any practical incentive for the storage server to cheat the client by saving on storage space. The proof of our result relies on a natural combination of Kolmogorov Complexity and List Decoding. To the best of our knowledge this is the first work that combines these two techniques. We believe the newly introduced storage enforcement property of almost universal hash functions will open promising avenues of exciting research under memory-bounded (bounded storage) adversary model.
Storage Enforcement with Kolmogorov Complexity and List Decoding
Mohammad Iftekhar Husain,Steve Ko,Atri Rudra,Steve Uurtamo
Computer Science , 2011,
Abstract: We consider the following problem that arises in outsourced storage: a user stores her data $x$ on a remote server but wants to audit the server at some later point to make sure it actually did store $x$. The goal is to design a (randomized) verification protocol that has the property that if the server passes the verification with some reasonably high probability then the user can rest assured that the server is storing $x$. In this work we present an optimal solution (in terms of the user's storage and communication) while at the same time ensuring that a server that passes the verification protocol with any reasonable probability will store, to within a small \textit{additive} factor, $C(x)$ bits of information, where $C(x)$ is the plain Kolmogorov complexity of $x$. (Since we cannot prevent the server from compressing $x$, $C(x)$ is a natural upper bound.) The proof of security of our protocol combines Kolmogorov complexity with list decoding and unlike previous work that relies upon cryptographic assumptions, we allow the server to have unlimited computational power. To the best of our knowledge, this is the first work that combines Kolmogorov complexity and list decoding. Our framework is general enough to capture extensions where the user splits up $x$ and stores the fragment across multiple servers and our verification protocol can handle non-responsive servers and colluding servers. As a by-product, we also get a proof of retrievability. Finally, our results also have an application in `storage enforcement' schemes, which in turn have an application in trying to update a remote server that is potentially infected with a virus.
Why Can’t Canada Spend More on Mental Health?  [PDF]
Steve Lurie
Health (Health) , 2014, DOI: 10.4236/health.2014.68089
Abstract: The World Health Organization (WHO) notes that mental illness accounts for 13% of the world’s disease burden, yet most countries under invest despite the social and economic costs of mental illness. It has been suggested that this lack of investment may be a result of stigma. A number of high income countries invest 10% or more in their mental health services. Although Canada is a high income country, its mental health spending is 7.2% according to the WHO Mental Health Atlas. This article will review the factors influencing Canada and its provinces’ under investment in mental health, compare its performance with other countries and make the case on why and how this could change.
Studying the Utilization of Plastic Waste by Chemical Recycling Method  [PDF]
Adil Ko
Open Journal of Applied Sciences (OJAppS) , 2013, DOI: 10.4236/ojapps.2013.37051
Abstract:

The rapid increase in the use of plastic materials in the recent years led to the accumulation of excessive amounts of plastic waste. The so-called thermoplastics such as PE, PP, PS, PVC and PET as well as materials that are derived from these are the type of plastic that is most used and consequently creates most of the waste. In this study, the original and waste forms of PE and PP plastic types have been chosen for thermal and catalytic degradation. As process parameter, 410oC - 450oC temperature interval and 600 mL/min constant flow rate nitrogen gas have been chosen as the carrier gas and the reaction time was considered to be 90 minutes for all experiments. Liquid products collected in experiments were separated by means of fractioned distillation process. For purposes of determining product distribution, the fractions, which were separated by distillation, were diluted in an appropriate solution for analysis of GC/MS. In the study conducted, it has been observed that the liquid product distribution obtained mainly consists of a mixture of saturated and unsaturated (heptane, heptane, octane, nonane, dodecane, etc.) hydrocarbons.

A Study on Importance and Role of Irrigation and Hydropower Plant Operation in Integrated River Basin Management  [PDF]
Cengiz Ko
Computational Water, Energy, and Environmental Engineering (CWEEE) , 2017, DOI: 10.4236/cweee.2017.61001
Abstract: In this study, 16 irrigation schemes (Baklan, Irgilli, Sutlac, Cal, Cürüksu, Nazilli, Saraykoy, Pamukkale, Sultanhisar, Akcay, Aydin, Topcam, Karpuzlu, Isikli, Gümüssu ve Soke) having 166,381 hectares, built by State Hydraulic Works (DSI), and operated by participatory irrigation managements, and 14 hydroelectric power plants (HPP) operated and built on dams, canals and rivers by the public and private sectors are examined in the Büyük Menderes basin which is an important basin in terms of the agriculture, energy and ecology projects. Integrated basin management practices and the importance and role of irrigation and hydropower plant operation in integrated basin management, how it should be, optimal use of available water resources for irrigation and hydroelectric power plant operation, irrigation relationship with canal hydropower plants, operated under integrated basin management of irrigation and hydropower plants, environment and the ecological effects have been studied, and integrated basin management with the existing basin management conditions in terms of hydropower plant and irrigation operation on the basis of data of 2015 have been compared, reached important conclusions, and made recommendations on the subject.
A Study on Planned and Applied Irrigation Modules in Irrigation Networks: A Case Study at Büyük Menderes Basin, Turkey  [PDF]
Cengiz Ko
Computational Water, Energy, and Environmental Engineering (CWEEE) , 2016, DOI: 10.4236/cweee.2016.54011
Abstract: In this study, irrigation modules calculated in planning and actualized operational stage of the irrigation networks are examined. Irrigation module used irrigation networks is a constant discharge parameter, meeting the needs of irrigation water requirement smonthly of crops in one hectare of irrigation area and it is a constant discharge flowing continuously for a month. Extent of the overlapping between the irrigation planning module and the operation module actualized during the operational stage of the irrigation network depends on changes in the cropping patterns, differences in the effects of field irrigation methods used by farmers on the capacity of the constructed system, the increases or decreases in the water demands depending on the irrigation period, as well as the extent of sustainability according to the selected operation method. A2 irrigation area of Aydin plain irrigation network, locating in the Büyük Menderes basin, Turkey is selected as study area, with an area of 2500 ha. Irrigation planning module calculated for this network is q = 1.16 l/s/ha and it has been designed as per the supply demand operation method. For the study; actualized irrigation module in the operation stage has been compared with the planning irrigation module by using Excel software and taking parameters such as actual crop pattern and percentage distributions, actualized irrigated areas, irrigation networks and water distribution, water intake of irrigation networks which have been calculated without operation losses, as well as with 5%, 10%, and 15% operation losses. The July operation module calculated for the examined irrigation network generally conforms to the planning module, as it has received the values close to or below the value of irrigation planning modules.
Web-based GIS System for Real-time Field Data Collection Using Personal Mobile Phone  [PDF]
Ko Ko Lwin, Yuji Murayama
Journal of Geographic Information System (JGIS) , 2011, DOI: 10.4236/jgis.2011.34037
Abstract: Recently, use of mobile communicational devices in field data collection is increasing such as smart phones and cellular phones due to emergence of embedded Global Position System GPS and Wi-Fi Internet access. Accurate timely and handy field data collection is required for disaster management and emergency quick responses. In this article, we introduce web-based GIS system to collect the field data by personal mobile phone through Post Office Protocol POP3 mail server. The main objective of this work is to demonstrate real-time field data collection method to the students using their mobile phone to collect field data by timely and handy manners, either individual or group survey in local or global scale research.
Transient knockdown and overexpression reveal a developmental role for the zebrafish enosf1b gene
Steve Finckbeiner, Pin-Joe Ko, Blake Carrington, Raman Sood, Kenneth Gross, Bruce Dolnick, Janice Sufrin, Paul Liu
Cell & Bioscience , 2011, DOI: 10.1186/2045-3701-1-32
Abstract: Whole mount in situ hybridization (WISH) showed that zebrafish ENOSF1β (enosf1b) is zygotic and expressed ubiquitously through the first 24 hours post fertilization (hpf). After 24 hpf, enosf1b expression is restricted to the notochord. Embryos injected with enosf1b-EGFP mRNA grew slower than EGFP mRNA-injected embryos but caught up to the EGFP-injected embryos by 48 hpf. Embryos injected with ATG or exon 10 enosf1b mRNA-targeting morpholinos had kinked notochords, shortened anterior-posterior axes, and circulatory edema. WISH for ntl or pax2a expression showed that embryos injected with either morpholino have deformed notochord and pronephros. TUNEL staining revealed increased apoptosis in the peri-notochord region.This study is the first report of ENOSF1 function in a vertebrate and shows that ENOSF1 is required for embryonic development. Increased apoptosis following enosf1b knockdown suggests a potential survival advantage for increased ENOSF1β expression in human cancers.Sequence information and computational techniques can be used to group proteins into evolutionarily meaningful families and larger superfamilies. Dayhoff defined protein families as groups of proteins with high (>50%) sequence identity [1]. Members of protein superfamilies have lower sequence identities, but statistically significant pairwise alignment scores. Both protein families and protein superfamilies are thought to be monophyletic [1-4]. Since Dayhoff's original work, newer semi-automated classification schemes revealed thousands of protein superfamilies [5,6]. The enolase superfamily (ENOSF), named after the enolase of glycolysis, is used as a model of protein superfamily evolution [4,7]. Members of the enolase superfamily share a common ENOSF fold and catalyze a common half reaction: they all abstract protons adjacent to carboxyl groups from a wide array of substrates. Evolutionarily conserved acidic residues, located in loops at the end of two of the β sheets lining the C-terminal bar
Understanding the Relationships between Environmental and Social Risk Factors and Financial Performance of Global Infrastructure Projects  [PDF]
Daniil Kiose, Steve Keen
iBusiness (IB) , 2017, DOI: 10.4236/ib.2017.94007
Abstract: This study analyses the link between environmental and social risk (ESR) factors and the risk-return profile of infrastructure bonds. We provide support for the hypothesis that credit standing of infrastructure bonds is associated with ESR factors. Considering these factors along with bond and issuer specific information we discovered that several environmental and social risk covariates are strongly related to 1) expected risk-return profile of infrastructure bonds; and 2) the balance of risk around the expectation. Thus along with traditional drivers of bond risks (e.g. time to maturity, base interest rate, etc.) we find that also CO2 emission and percentage of independent directors emerge as important predictors. This study benefits from thoroughly developed, justified and validated non-parametric regression model used to derive key insights into the research question. This work makes a methodological contribution by applying non-parametric modelling techniques to study the financial risk of infrastructure projects. Moreover, it provides bond investors as well as policy makers with the guidance on where to focus their attention.
Evidence Based Medicine, in Precision Oncology  [PDF]
M. Nezami, Steve Hager
Journal of Cancer Therapy (JCT) , 2018, DOI: 10.4236/jct.2018.99057
Abstract: The disagreements in clinical data and therapy recommendations extracted from different sources/studies are a common finding in oncology research. Knowingly “biology is less reproducible than physics and mechanic engineering”, in order to overcome the disagreements and to find common grounds, we still rely on meta-analysis and systemic reviews for the highest level of evidence. To gather systemic review data base, a bibliographic search usually is conducted in the PubMed and in Cochrane Central Register of Controlled Trials databases to address a common clinical challenge. That said, frequently due to common conflicts between articles outcomes, an opinion of a third investigator is sought. Here in this article, we propose a rationale that could explain the differences in outcomes as a result of imperfect understanding of the current research database secondary to the unique biology of the tumor, rather than statistical interpretation on findings. We believe that the differences in findings merely are based on blinded inclusion criteria, and lack of accurate companion diagnostics to correlate the magnitude of response to each therapy. The objective of this article is to discuss a strategy to overcome such discordance by providing quantitative biological measures for genomic classification and correlation of tumor response to the selected targeted therapy. We further review such analysis in a case series of Her 2 positive breast cancer and conclude that
Page 1 /6991
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.