首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Zhang  Xuewang  Ye  Caijin 《Cluster computing》2022,25(2):1221-1235

With the rapid development of permissioned blockchains, the problem of privacy leakage within permissioned blockchains is increasingly serious. In this paper, for the privacy problem in permissioned blockchains, a novel privacy protection method has been put forward. In this novel method, the ring signature is used to protect the privacy of the user in permissioned blockchains. On the other hand, the unconditional anonymity of ring signature may be abused maliciously by the adversary. Conditional anonymity is considered to improve the ring signature. Therefore, based on conditionally anonymous ring signature, permissioned blockchains privacy protection scheme has also been laid down. Furthermore, the effects of smart contract for transaction flows are considered. The asynchronous signing transaction process is proposed. The security of the scheme has been formally reduced to the Discrete Logarithm assumption. The comparison with the state-of-the-art and simulation experiment have also demonstrated that the proposed scheme is efficient and practical.

  相似文献   

2.
Spatial point pattern is an important tool for describing the spatial distribution of species in ecology. Negative binomial distribution (NBD) is widely used to model spatial aggregation. In this paper, we derive the probability distribution model of event-to-event nearest neighbor distance (distance from a focal individual to its n-th nearest individual). Compared with the probability distribution model of point-to-event nearest neighbor distance (distance from a randomly distributed sampling point to the n-th nearest individual), the new probability distribution model is more flexible. We propose that spatial aggregation can be detected by fitting this probability distribution model to event-to-event nearest neighbor distances. The performance is evaluated using both simulated and empirical spatial point patterns.  相似文献   

3.
Private microsatellite alleles tend to be found in the tails rather than in the interior of the allele size distribution. To explain this phenomenon, we have investigated the size distribution of private alleles in a coalescent model of two populations, assuming the symmetric stepwise mutation model as the mode of microsatellite mutation. For the case in which four alleles are sampled, two from each population, we condition on the configuration in which three distinct allele sizes are present, one of which is common to both populations, one of which is private to one population, and the third of which is private to the other population. Conditional on this configuration, we calculate the probability that the two private alleles occupy the two tails of the size distribution. This probability, which increases as a function of mutation rate and divergence time between the two populations, is seen to be greater than the value that would be predicted if there was no relationship between privacy and location in the allele size distribution. In accordance with the prediction of the model, we find that in pairs of human populations, the frequency with which private microsatellite alleles occur in the tails of the allele size distribution increases as a function of genetic differentiation between populations.  相似文献   

4.
Telecare Medical Information Systems (TMIS) provide an effective way to enhance the medical process between doctors, nurses and patients. For enhancing the security and privacy of TMIS, it is important while challenging to enhance the TMIS so that a patient and a doctor can perform mutual authentication and session key establishment using a third-party medical server while the privacy of the patient can be ensured. In this paper, we propose an anonymous three-party password-authenticated key exchange (3PAKE) protocol for TMIS. The protocol is based on the efficient elliptic curve cryptosystem. For security, we apply the pi calculus based formal verification tool ProVerif to show that our 3PAKE protocol for TMIS can provide anonymity for patient and doctor while at the same time achieves mutual authentication and session key security. The proposed scheme is secure and efficient, and can be used in TMIS.  相似文献   

5.
Crepidula convexa, a calyptreid gastropod with direct embryonic development, changes sex from male to female in the course of its lifetime (protandry). Under sex-allocation theory, male reproductive success should be independent from age and size (a proxy used for age). However, this may be counterbalanced by female cryptic choice or gregarious behaviour. Eleven polymorphic microsatellite loci were thus developed to examine paternity of embryos and larvae. This set of loci appears suitable to carry out paternity analyses due to the high exclusion probability of unrelated males given the maternal genotype.  相似文献   

6.
Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme is proposed, which is based on the Generic Authentication Architecture (GAA), and is thus suitable for MTC communication in application layer. User authentication and session key agreement are achieved by the assistance of operator network in this scheme. Hence, the MTC server can only focus on service delivery. Performance of the proposal is also analyzed, and from this procedure, we obtain the function of lifetime of master session key against expected number of bootstrapping request. Finally, it is shown how the operator could set an optimized lifetime of master session key.  相似文献   

7.
The determination of rate constants from single-channel data can be very difficult, in part because the single-channel lifetime distributions commonly analyzed by experimenters often have a complicated mathematical relation to the channel gating mechanism. The standard treatment of channel gating as a Markov process leads to the prediction that lifetime distributions are exponential functions. As the number of states of a channel gating scheme increases, the number of exponential terms in the lifetime distribution increases, and the weights and decay constants of the lifetime distributions become progressively more complicated functions of the underlying rate constants. In the present study a mathematical strategy for inverting these functions is introduced in order to determine rate constants from single-channel lifetime distributions. This inversion is easy for channel gating schemes with two or fewer states of a given conductance, so the present study focuses on schemes with more states. The procedure is to derive explicit equations relating the parameters of the lifetime distribution to the rate constants of the scheme. Such equations can be derived using the equality between symmetric functions of eigenvalues of a matrix and sums over principle minors, as well as expressions for the moments, derivatives, and weights of a lifetime distribution. The rate constants are then obtained as roots to this system of equations. For a gating scheme with three sequential closed states and a single gateway state, exact analytical expressions were found for each rate constant in terms of the parameters of the three-exponential closed-time distribution. For several other gating schemes, systems of equations were found that could be solved numerically to obtain the rate constants. Lifetime distributions were shown to specify a unique set of real rate constants in sequential gating schemes with up to five closed or five open states. For kinetic schemes with multiple gating pathways, the analysis of simulated data revealed multiple solutions. These multiple solutions could be distinguished by examining two-dimensional probability density functions. The utility of the methods introduced here are demonstrated by analyzing published data on nicotinic acetylcholine receptors, GABA(A) receptors, and NMDA receptors.  相似文献   

8.
高猛 《生态学报》2016,36(14):4406-4414
最近邻体法是一类有效的植物空间分布格局分析方法,邻体距离的概率分布模型用于描述邻体距离的统计特征,属于常用的最近邻体法之一。然而,聚集分布格局中邻体距离(个体到个体)的概率分布模型表达式复杂,参数估计的计算量大。根据该模型期望和方差的特性,提出了一种简化的参数估计方法,并利用遗传算法来实现参数优化,结果表明遗传算法可以有效地估计的该模型的两个参数。同时,利用该模型拟合了加拿大南温哥华岛3个寒温带树种的空间分布数据,结果显示:该概率分布模型可以很好地拟合美国花旗松(P.menziesii)和西部铁杉(T.heterophylla)的邻体距离分布,但由于西北红柏(T.plicata)存在高度聚集的团簇分布,拟合结果不理想;美国花旗松在样地中近似随机分布,空间聚集参数对空间尺度的依赖性不强,但西北红柏和西部铁杉空间聚集参数具有尺度依赖性,随邻体距离阶数增加而变大。最后,讨论了该模型以及参数估计方法的优势和限制。  相似文献   

9.
Planning and architecture of modern housing projects should take into account the fact that human well-being depends very much on needs derived from the natural history of human evolutionary aspects, which include territoriality, security, and a balance between privacy and communal activity. Although model housing projects should consider space, all to often the need for privacy and the importance of the residential environment has been neglected. Putative consequences are a loss of social coherence, resulting in anonymity, vandalism and an increase in crime rates. On a game theoretical basis, we predict that a tendency for cooperation grows with the increasing probability of future meetings among inhabitants. The higher the probability to re-meet co-residents, the more interactions are to be expected. Frequent meetings lead to reciprocal recognition and enable the inhabitants to control their environment by identifying straners. This mechanism results in the identification with a common territory. Friendly interactions between residents are a motor for and an indicator of satisfactory living conditions. For this study, six different Viennese residential apartment blocks were selected and their quality measured using a checklist. The behavior of the residents was recorded using ethological standard methods (N = 1653), their subjective evaluation was assessed by on-site interviews (N = 300), and the frequency of physical incivilities was counted. The results support the hypotheses. The classification of urban environments relating to the presence of the above-listed features indicates that high habitat quality covaries with differences in preference for the site, extent of friendly interactions and familiarity with other residents, and occurrences of incivilities. One may conclude that the importance of the quality of the habitat environment cannot be overestimated, as its socially integrative potential is a means to counteract anonymity and crime incidence in cities.  相似文献   

10.
Diversity patterns cannot be properly interpreted without a theory providing criteria for their evaluation. We propose a concept to prevent artifictions caused by improper consideration of changes in observed patterns due to variation in taxon delimitation. Most biodiversity patterns concern assemblages of species of given higher taxon (e.g. class). Some patterns seem to be universal, e.g., body size distribution, species-abundance distribution, species-area relationship, or the relationship between diversity and energy availability. However, truly universal patterns should not change when we change taxonomic scope by focusing on subtaxa or when we merge several sister taxa together and analyze patterns in resulting higher taxon. Similarly, some patterns may not change when changing the basic unit of the study e.g., when replacing species by genera or families (or any monophyletic clades), although other patterns may not be invariant against the variation of the basic unit. In fact, there are only two possibilities: biodiversity patterns are either taxon-invariant or they vary systematically with taxonomic resolution, which would indicate some fundamental taxonomic level with interesting implications for biological processes behind those patterns. Here we develop the concept of taxon invariance of diversity patterns and apply it on the abovementioned patterns. We show that simple theoretical considerations markedly constrain the set of possible patterns, as some of them cannot be simultaneously valid for both a taxon and its subtaxa – frequency distributions of abundances cannot be simultaneously lognormal for a given taxon and all its subtaxa, the taxa-area relationship cannot follow a power-law for all levels of taxonomic resolution, and energy availability cannot affect diversity of all taxonomic units in the same way. Analyses of the variation in the form of biodiversity patterns with changing taxonomic resolution thus provide an extremely useful tool for revealing properties of respective patterns, their universality and logical consistency.  相似文献   

11.
Previous studies on sex allocation in simultaneous hermaphrodites have typically focused either on evolutionary or one-time, ontogenetic optimization of sex allocation, ignoring variation within an individual's lifetime. Here, we study whether hermaphrodites also possess facultative sex allocation, that is, a phenotypic flexibility, allowing them to distribute resources to either sex in an opportunistic way during their adult lifetime. We used the simultaneously hermaphroditic free-living flatworm Macrostomum lignano and raised individuals in pairs and groups of eight worms (further called octets) until sexual maturity was reached and sex allocation for the current conditions was expected to be set. Treatment groups were subsequently transferred to the alternative group size, that is, from pairs to octets or from octets to pairs, and compared to two control groups, which were transferred without changing group size. The results show that worms in treatment groups responded as expected by the local mate competition theory for simultaneous hermaphrodites: increasing group size resulted in a shift toward a more male-biased sex allocation and vice versa. These findings reveal that sex allocation in these animals is not fixed during ontogeny, but remains flexible after maturation. We argue that phenotypically flexible sex allocation in hermaphroditic animals may help us to understand the evolution and ecology of hermaphroditism.  相似文献   

12.
Sample size considerations in genetic polymorphism studies.   总被引:6,自引:0,他引:6  
C B-Rao 《Human heredity》2001,52(4):191-200
OBJECTIVES: Molecular studies for genetic polymorphisms are being carried out for a number of different applications, such as genetic disorders in different populations, pharmacogenomics, genetic identification of ethnic groups for forensic and legal applications, genetic identification of breed/stock in animals and plants for commercial applications and conservation of germ plasm. In this paper, for a random sampling scheme, we address two questions: (A) What should be the minimum size of the sample so that, with a prespecified probability, all alleles at a given locus (or haplotypes at a given set of loci) are detected? (B) What should be the sample size so that the allele frequency distribution at a given locus (or haplotype frequency distribution at a given set of loci) is estimated reliably within permissible error limits? METHODS: We have used combinatorial probabilistic arguments and Monte Carlo simulations to answer these questions. RESULTS: We found that the minimum sample size required in case A depends mainly on the prespecified probability of detecting all alleles, while in case B, it varies greatly depending on the permissible error in estimation (which will vary with the application). We have obtained the minimum sample sizes for different degrees of polymorphism at a locus under high stringency, as well as a relaxed level of permissible error. We present a detailed sampling procedure for estimating allele frequencies at a given locus, which will be of use in practical applications. CONCLUSION: Since the sample size required for reliable estimation of allele frequency distribution increases with the number of alleles at the locus, there is a strong case for using biallelic markers (like single nucleotide polymorphisms) when the available sample size is about 800 or less.  相似文献   

13.
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).  相似文献   

14.
Aggregated metapopulation lifetime statistics has been used to access stylized facts that might help identify the underlying patch-level dynamics. For instance, the emergence of scaling laws in the aggregated probability distribution of patch lifetimes can be associated to critical phenomena, in which the correlation length among system units tends to diverge. Nevertheless, an aggregated approach is biased by patch-level variability, a fact that can blur the interpretation of the data. Here, I propose a weakly-coupled metapopulation model to show how patch variability can solely trigger qualitatively different lifetime probability distribution at the aggregated level. In a generalized approach, I obtain a two-way connection between the variability of a certain patch property (e.g. carrying capacity or connectivity) and the aggregated lifetime probability distribution. Furthermore, for a particular case, assuming that scaling laws are observed at the aggregated-level, I speculate the heterogeneity that could be behind it, relating the qualitative features of the variability (mean, variance and concentration) to the scaling exponents. In this perspective, the results point to the possibility of equivalence between heterogeneous weakly-coupled metapopulations and homogeneous ones that exhibit critical behavior.  相似文献   

15.
A stochastic model of population growth is treated using the Bellman-Harris theory of agedependent stochastic branching processes. The probability distribution for the population size at any time and the expectation are obtained when it is assumed that there is probability (1−σ), 0≤σ<1, of the organism dividing into two at the end of its lifetime, and probability σ that division will not take place.  相似文献   

16.
Neutral macroevolutionary models, such as the Yule model, give rise to a probability distribution on the set of discrete rooted binary trees over a given leaf set. Such models can provide a signal as to the approximate location of the root when only the unrooted phylogenetic tree is known, and this signal becomes relatively more significant as the number of leaves grows. In this short note, we show that among models that treat all taxa equally, and are sampling consistent (i.e. the distribution on trees is not affected by taxa yet to be included), all such models, except one (the so-called PDA model), convey some information as to the location of the ancestral root in an unrooted tree.  相似文献   

17.
By formulating Helmholtz's ideas about perception, in terms of modern-day theories, one arrives at a model of perceptual inference and learning that can explain a remarkable range of neurobiological facts: using constructs from statistical physics, the problems of inferring the causes of sensory input and learning the causal structure of their generation can be resolved using exactly the same principles. Furthermore, inference and learning can proceed in a biologically plausible fashion. The ensuing scheme rests on Empirical Bayes and hierarchical models of how sensory input is caused. The use of hierarchical models enables the brain to construct prior expectations in a dynamic and context-sensitive fashion. This scheme provides a principled way to understand many aspects of cortical organisation and responses. In this paper, we show these perceptual processes are just one aspect of emergent behaviours of systems that conform to a free energy principle. The free energy considered here measures the difference between the probability distribution of environmental quantities that act on the system and an arbitrary distribution encoded by its configuration. The system can minimise free energy by changing its configuration to affect the way it samples the environment or change the distribution it encodes. These changes correspond to action and perception respectively and lead to an adaptive exchange with the environment that is characteristic of biological systems. This treatment assumes that the system's state and structure encode an implicit and probabilistic model of the environment. We will look at the models entailed by the brain and how minimisation of its free energy can explain its dynamics and structure.  相似文献   

18.
Median ranked set sampling may be combined with size biased probability of selection. A two-phase sample is assumed. In the first phase, units are selected with probability proportional to their size. In the second phase, units are selected using median ranked set sampling to increase the efficiency of the estimators relative to simple random sampling. There is also an increase in the efficiency relative to ranked set sampling (for some probability distribution functions). There will be a loss in efficiency depending on the amount of errors in ranking the units, the median ranked set sampling can be used to reduce the errors in ranking the units selected from the population. Estimators of the population mean and the population size are considered. The median ranked set sampling with probability proportion to size and with errors in ranking is considered and compared with ranked set sampling with errors in ranking. Computer simulation results for some probability distributions are also given.  相似文献   

19.
In this paper we describe and test a new method for characterizing the space use patterns of individual animals on the basis of successive locations of marked individuals. Existing methods either do not describe space use in probabilistic terms, e.g. the maximum distance between locations or the area of the convex hull of all locations, or they assume a priori knowledge of the probabilistic shape of each individual's use pattern, e.g. bivariate or circular normal distributions. We develop a method for calculating a probability of location distribution for an average individual member of a population that requires no assumptions about the shape of the distribution (we call this distribution the population utilization distribution or PUD). Using nine different sets of location data, we demonstrate that these distributions accurately characterize the space use patterns of the populations from which they were derived. The assumption of normality is found to result in a consistent and significant overestimate of the area of use. We then describe a function which relates probability of location to area (termed the MAP index) which has a number of advantages over existing size indices. Finally, we show how any quantities such as the MAP index derived from our average distributions can be subjected to standard statistical tests of significance.  相似文献   

20.
Fruit distribution among individuals in populations of three orchid species was analyzed. Fruit set was low in the three species. The distribution of fruits in the non-autogamous species was skewed to the right, with high variance: mean ratios, and a moderate to high proportion of fruitless plants. Larger inflorescence size did not necessarily result in an increase in percent fruit set but tended to increase the probability to produce at least one fruit. Pollinator-mediated selection on inflorescence size through fruit production may be limited by the low overall level of visitation and the resulting uncertainty of pollination at the individual level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号