sábado, 7 de junho de 2014

Are squiggly lines the future of password security?

 

June 4, 2014

Rutgers University

As more people use smart phones and tablets to store personal information and perform financial transactions, the need for robust password security is more critical than ever. A new study shows that free-form gestures -- sweeping fingers in shapes across the screen -- can be used to unlock phones and grant access to apps. These gestures are less likely to be observed and reproduced by 'shoulder surfers' who spy on users to gain unauthorized access.


Researchers studied the practicality of using free-form gestures for access authentication on smart phones and tablets. With the ability to create any shape in any size and location on the screen, the gestures had an inherent appeal as passwords. Since users create them without following a template, the researchers predicted these gestures would allow for greater complexity than grid-based gestures offer.

As more people use smart phones or tablets to pay bills, make purchases, store personal information and even control access to their houses, the need for robust password security has become more critical than ever.

A new Rutgers University study shows that free-form gestures -- sweeping fingers in shapes across the screen of a smart phone or tablet -- can be used to unlock phones and grant access to apps. These gestures are less likely than traditional typed passwords or newer "connect-the-dots" grid exercises to be observed and reproduced by "shoulder surfers" who spy on users to gain unauthorized access.

"All it takes to steal a password is a quick eye," said Janne Lindqvist, one of the leaders of the project and an assistant professor in the School of Engineering's Department of Electrical and Computer Engineering. "With all the personal and transactional information we have on our phones today, improved mobile security is becoming increasingly critical."

Lindqvist believes this is the first study to explore free-form gestures as passwords. The researchers will publish their findings in June as part of the proceedings of MobiSys '14, an international conference in mobile computing.

In developing a secure solution to this problem, Lindqvist and the other researchers from Rutgers and collaborators from Max-Planck Institute for Informatics, including Antti Oulasvirta, and University of Helsinki studied the practicality of using free-form gestures for access authentication. With the ability to create any shape in any size and location on the screen, the gestures had an inherent appeal as passwords. Since users create them without following a template, the researchers predicted these gestures would allow for greater complexity than grid-based gestures offer.

"You can create any shape, using any number of fingers, and in any size or location on the screen," Lindqvist said. "We saw that this security protection option was clearly missing in the scientific literature and also in practice, so we decided to test its potential."

To do so, the researchers applied a generate-test-retest paradigm where 63 participants were asked to create a gesture, recall it, and recall it again 10 days later. The gestures were captured on a recognizer system designed by the team. Using this data, the authors tested the memorability of free-form gestures and invented a novel method to measure the complexity and accuracy of each gesture using information theory. Their analysis demonstrated results favorable to user-generated, free-form gestures as passwords.

To put their analysis to practice, the Rutgers researchers then had seven computer science and engineering students, each with considerable experience with touchscreens, attempt to steal a free-form gesture password by shoulder surfing. None of the participants were able to replicate the gestures with enough accuracy, so while testing is in its preliminary stages, the gestures appear extremely powerful against attacks. While widespread adaptation of this technology is not yet clear, the research team plans to continue to analyze the security and management of free-form passwords in the future.


Story Source:

The above story is based on materials provided by Rutgers University. Note: Materials may be edited for content and length.

Intelligent machines for tomorrow's factory

 

June 5, 2014

Karlsruhe Institute of Technology

Mass production of industrial goods, such as furniture, clothing or ball pens, is inexpensive. In the future, even small series of individualized products might be manufactured rapidly and efficiently by means of intelligent machines that communicate with each other. To this end, researchers coordinate a project that is aimed at finding innovative solutions to considerably reduce changeover times in the production process.


Cooperation of intelligent machines: The robot gripper hands over a workpiece to a mobile platform that moves it to the next stage.

Mass production of industrial goods, such as furniture, clothing or ball pens, is inexpensive. In the future, even small series of individualized products might be manufactured rapidly and efficiently by means of intelligent machines that communicate with each other. To this end, researchers of the Karlsruhe Institute of Technology (KIT) coordinate the SkillPro EU research project that is aimed at finding innovative solutions to considerably reduce changeover times in the production process.

Having completed one order, manufacture of any new product ordered mostly requires a modification of the production process. When manufacturing small series, preparation, setup, and programming of the machine park often take much longer than manufacture proper. "Machines equipped with additional intelligence and communicating with each other are expected to significantly reduce the changeover time," says engineer Thomas Maier, Managing Director of KIT's Institute for Information Management in Engineering (IMI). A machine equipped with camera sensors, for instance, can recognize any workpiece even in case of changing products. Having examined the workpiece's shape and position, the machine can decide how to apply its gripper or suction caps and where to place the workpiece. Depending on the product, machines having gripping, welding, or bonding skills can determine their next task or production step. They "communicate" with neighboring machines and know whether they have to ask for a mobile robot to transport the product to the next workstation or the shipping department of the company.

Small and medium-sized enterprises in particular are to benefit from the intelligent production system. It allows for the low-cost production of niche products of variable shapes or fits. "The companies can offer individualized mass production and react flexibly to fluctuations in demand," Maier says. Quicker execution of small-series production will strengthen European industry production.

In the plug & produce process developed under the project, machines autonomously adjust for the product to be manufactured. The solution concept is based mainly on new developments in computer science. Prior to the start of production proper, a specially developed computer program calculates in which assembly line the orders are executed most efficiently. "Additional machines or technical capabilities can be integrated into the existing park with a small expenditure, as they inform the system about which part of the production process they will accomplish," Maier explains. The production sequence simulated in the planning phase and the real production process are displayed on a screen.

Robots and tools that communicate with each other and combine in variable factory lines within shortest periods of time are major elements of a smart factory. The factories of "Industry 4.0" combine production engineering with information technology. Under the SkillPro project, computer scientists cooperate with electrical engineers, business engineers, and mechanical engineers.

On the part of KIT, the Institute for Information Management in Engineering and the Institute for Anthropomatics and Robotics (IAR) with its Research Laboratory for Intelligent Process Control and Robotics (IPR) are involved in the project. "Existing plug & produce approaches are improved with the help of knowledge about the skills of new devices and their effects on the entire production system in terms of workflows and economic aspects," explains SkillPro coordinator Professor Björn Hein, who conducts research at the IPR. Apart from the KIT and the Fraunhofer Institute of Optronics, System Technologies, and Image Exploitation, industry partners from France, Greece, Spain, Estonia, Finland, and Germany participate in the project. The European Union (EU) funds the research project that started in 2012 with EUR 3.8 million. The funding period will expire in September 2015. "Interim evaluation after half of the project duration confirmed the feasibility of our approach," Thomas Maier emphasizes.


Story Source:

The above story is based on materials provided by Karlsruhe Institute of Technology. Note: Materials may be edited for content and length.

Saving trees in tropics could cut emissions by one-fifth, study shows

 


Reducing deforestation in the tropics would significantly cut the amount of carbon dioxide emitted into the atmosphere -- by as much as one-fifth -- research shows.

In the first study of its kind, scientists have calculated the amount of carbon absorbed by the world's tropical forests and the amounts of greenhouse gas emissions created by loss of trees, as a result of human activity.

They found that tropical forests absorb almost two billion tonnes of carbon each year, equivalent to one-fifth of the world's carbon emissions, by storing it in their bark, leaves and soil. However, an equivalent amount is lost through logging, clearing of land for grazing, and growing biofuel crops such as palm oil, soya bean and sugar. Peat fires in forests add significantly to the greenhouse gas emissions.

Researchers estimate that if all human-related deforestation of the tropics were to stop, the forests could absorb more carbon than at present, equivalent to one-fifth of global emissions.

Researchers say carbon emissions from tropical forests will increase as the climate warms, as rising temperatures accelerate the decay of dead plants and trees, giving off more CO2. Global temperatures are forecast to rise by two degrees by the year 2099, which is predicted to increase annual carbon emissions from the forest by three-quarters of a billion tonnes.

Scientists from the Universities of Edinburgh and Leeds analysed data from multiple previous studies, including satellite studies, to determine the amount of carbon absorbed and emitted by the world's tropical forests in South and Central America, equatorial Africa and Asia.

Their study, published in Global Change Biology, was supported by the Natural Environment Research Council.

Professor John Grace of the University of Edinburgh's School of GeoSciences, who led the study, said: "If we limit human activity in the tropical forests of the world, this could play a valuable role in helping to curb the rise in carbon dioxide in the atmosphere. Preventing further losses of carbon from our tropical forests must remain a high priority."


Story Source:

The above story is based on materials provided by University of Edinburgh. Note: Materials may be edited for content and length.


Journal Reference:

  1. John Grace, Edward Mitchard, Emanuel Gloor. Perturbations in the carbon budget of the tropics. Global Change Biology, 2014; DOI: 10.1111/gcb.12600

Clinical review of mixed urinary incontinence conducted

 

June 6, 2014

Women & Infants Hospital

Many women experience mixed urinary incontinence, urine loss with laughing, coughing and sneezing AND on their way to the bathroom. When women experience both types of urine leakage, their condition is called mixed urinary incontinence. It is estimated that 20 to 36 percent of women suffer from mixed urinary incontinence, which is challenging to diagnose and treat because symptoms vary and guidelines for treatment are not clear. A review of clinical work done has been conducted and published.


Many women experience bothersome urine loss with laughing, coughing and sneezing (stress urinary incontinence) AND on their way to the bathroom (urge urinary incontinence). When women experience both types of urine leakage, their condition is called mixed urinary incontinence. It is estimated that 20 to 36 percent of women suffer from mixed urinary incontinence, which is challenging to diagnose and treat because symptoms vary and guidelines for treatment are not clear.

A clinical review entitled "Clinical Crossroads -- Female Mixed Urinary Incontinence" by Deborah L. Myers, director of the Division of Urogynecology and Reconstructive Pelvic Surgery at Women & Infants Hospital of Rhode Island and The Warren Alpert Medical School of Brown University, has been published in the May 21, 2014 edition of the Journal of the American Medical Association (JAMA).

"Because mixed urinary incontinence involves both types of incontinence, it is difficult to treat. Our goal was to review the diagnosis and management of mixed urinary incontinence in women, with a focus on current available evidence," said Dr. Myers.

Dr. Myers reviewed 73 published articles that discussed the prevalence, diagnosis, results, and treatment of mixed urinary incontinence. She found that there is high-quality evidence for treating urinary incontinence with weight loss, for treating stress urinary incontinence with surgery, and for treating urge urinary incontinence with medications.

"However, there is a lack of direct, high quality evidence for treating women with mixed urinary incontinence, as well as an absence of clear, diagnostic criteria and management guidelines for these patients. Because of this, treatment usually begins with conservative management emphasizing the most bothersome component," continued Dr. Myers. "There is a clear need for randomized trials in women with mixed urinary incontinence."

Herpesviruses undercover: How the virus goes undetected by body's immune system

 


Toll-like receptor 2 is normally localized to the cell membrane (green outlines, left panel). However, a KSHV protein affects the normal distribution (diffuse green, right panel). Endoplasmic reticulum is shown in red.

Pathogens entering our body only remain unnoticed for a short period. Within minutes our immune cells detect the invader and trigger an immune response. However, some viruses have developed strategies to avoid detection and elimination by our immune system. Researchers from the Helmholtz Centre for Infection Research (HZI) in Braunschweig have now been able to show how the herpesviruses achieve this.

The Kaposi's sarcoma-associated herpesvirus (KSHV), a gammaherpesvirus that can cause multiple forms of cancer, establishes lifelong infections within the body. To do so the virus has to find a way to modulate the immune system of its host.

"Intruders are usually fought off immediately by an antiviral immune response that is triggered by sensors including the toll-like receptors (TLR)," says HZI researcher Dr. Kendra Bussey, author of the study that was published in the "Journal of Virology." Toll-like receptors detect the virus by binding to structures on the viral surface or the viral DNA, and trigger a signal chain that in the end leads to an antiviral immune response. Ideally this means that the pathogen is eliminated immediately. This mechanism, however, does not seem to work for KSHV and other gammaherpesviruses, as those can remain within the body for a long time.

How the virus does this was unknown until now. The scientists from the HZI research group "Viral Immune Modulation" under the leadership of Prof. Melanie Brinkmann have now been able to show that the virus is actively preventing activation of the innate immune system through Toll-like receptors.

It has yet to be established how exactly and in which part of the Toll-like receptor function is disturbed. This is one of the leverage points for future research: "The better we understand how the virus protects itself from attacks by the immune system, the better we can use this knowledge to fight infections," Brinkmann says.

This may lead to the development of new drugs against gammaherpesviruses. "Those agents could actively protect the immune system and prevent viruses from winning the fight against it," says Bussey. "However, this is still a long way off."

Ideally, our immune system will recognize and subsequently eliminate pathogens that enter our bodies. However, many microorganisms and viruses have evolved strategies to evade immune detection. The "Viral Immune Modulation" research group seeks to uncover the different mechanisms that particularly herpes viruses use to perform this feat.

Looking for the best strategy? Ask a chimp

 

The study, led by Colin Camerer, Robert Kirby Professor of Behavioral Economics, and appearing on June 5 in the online publication Scientific Reports, involved a simple game of hide-and-seek that researchers call the Inspection Game. In the game, two players (either a pair of chimps or a pair of humans) are set up back to back, each facing a computer screen. To start the game, each player pushes a circle on the monitor and then selects one of two blue boxes on the left or right side of the screen. After both players have chosen left or right, the computer shows each player her opponent's choice. This continues through 200 iterations per game. The goal of the players in the "hiding" role -- the "mismatchers" -- is to choose the opposite of their opponent's selection. Players in the "seeking" role -- the "matchers" -- win if they make the same choices as their opponent. Winning players receive a reward: a chunk of apple for the chimps or a small coin for the humans. If players are to win repeatedly, they have to accurately predict what their opponent will do next, anticipating their strategy.

The game, though simple, replicates a situation that is common in the everyday lives of both chimps and humans. Study coauthor Peter Bossaerts, a visiting associate in finance at Caltech, gives an example from human life: an employee who wants to work only when her employer is watching and prefers to play video games when unobserved. To better conceal her secret video game obsession, the employee must learn the patterns of the employer's behavior -- when they might or might not be around to check up on the worker. Employers who suspect their employees are up to no good, however, need to be unpredictable, popping in randomly to see what the staff is doing on company time.

The Inspection Game not only models such situations, it also provides methods to quantify behavioral choices. "The nice thing about the game theory used in this study is that it allows you to boil down all of these situations to their strategic essence," explains Caltech graduate student and coauthor Rahul Bhui.

However cleverly you play the Inspection Game, if your opponent is also playing strategically, there is a limit to how often you can win. That limit, many game theorists agree, is best described by the Nash equilibrium, named for mathematician John Forbes Nash Jr., winner of the 1994 Nobel Memorial Prize in Economic Sciences, whose life and career provided the inspiration for the Academy Award-winning 2001 film A Beautiful Mind.

In the first part of this study, coauthors Chris Martin and Tetsuro Matsuzawa compared the game play of six common chimpanzees (Pan troglodytes) and 16 Japanese students, always facing off against their own species, in the Kyoto research facility. The humans behaved as expected based on previous experiments; that is, they played reasonably well, slowly learning to predict opponent choices, but they did not play optimally. They ended up somewhat off the Nash equilibrium.

The performance of the chimps was far more impressive: they learned the game rapidly and nearly attained the predictions of the Nash theorem for optimal play. They continued to do so even as researchers introduced changes into the game, first by having players switch roles -- matchers (seekers) becoming mismatchers (hiders), and vice versa -- and then by adjusting the payoffs such that matchers received greater rewards when matching on one side of the screen (left or right) rather than the other. This latter adjustment changes the Nash equilibrium for the game, and the chimps changed right along with it.

In a second phase of the experiment in Bossou, Guinea, 12 adult men were asked to face one another in pairs. Instead of touching dots on a computer screen on the left or right, the men in Bossou each had a bottle cap that they placed top up or top down. As in the Kyoto experiments, one player in each pair was a mismatcher (hider) and the other was a matcher (seeker). However, the stakes were much higher in Bossou, amounting to about one full day's earnings for the winner, as opposed to the rewards for the Japanese students, who received a handful of one yen coins. Still, the players in Bossou did not match chimpanzee performance, landing as far off the Nash equilibrium as the Japanese students did.

A couple of simple explanations could account for the ability of these chimpanzees to outperform humans in the game. First, these particular chimps had more extensive training at this kind of task as well as more experience with the equipment used at the Research Institute than the human subjects did. Second, the chimps in Kyoto were related to one another -- they played in mother-child pairs -- and thus may have had intimate knowledge, borne of long acquaintance, of the sequence of choices their opponents would probably make.

Neither explanation seems likely, researchers say. Although the Japanese students may not have had experience with the type of touch screens employed in the Kyoto facility, they certainly had encountered video games and touch screens prior to the experiment. Meanwhile, the players in Bossou knew each other very well prior to the experiments and had the additional advantage of seeing one another while they played, yet they performed no better than the Japanese students.

Superior chimpanzee performance could be due to excellent short-term memory, a particular strength in chimps. This has been shown in other experiments undertaken at the Kyoto facility. In one game, a sequence of numbers is briefly flashed on the computer touch screen, and then the numbers quickly revert to white squares. Players must tap the squares in the sequence corresponding to the numbers they were initially shown. Chimpanzees are brilliant at this task, as video from the experiment shows; humans find it much more challenging, as seen in video from the Primate Research Center.

But before we join a species-specific pity party over our inferior brains, rest assured that researchers offer other explanations for chimpanzee superiority at the Inspection Game. There are two possible explanations that researchers currently find plausible. The first has to do with the roles of competition and cooperation in chimpanzee versus human societies; the second with the differential evolution of human and chimpanzee brains since our evolutionary paths split between 4 and 5 million years ago.

The past half-century has seen an enormous divergence of opinion as to how cooperative or competitive humans "naturally" are, and though this debate is far from settled, it is clear that wherever humans sit on the cooperative/competitive scale, common chimpanzees are more competitive with one another than we are. They create and continuously update a strong status and dominance hierarchy. (Another type of chimpanzee, Pan paniscus, or the bonobo, is considerably more cooperative than Pan troglodytes, but the former has not been studied as extensively as the latter.) Humans, in contrast, are highly prosocial and cooperative. Camerer notes that this difference is apparent in chimp and human social development. "While young chimpanzees hone their competitive skills with constant practice, playing hide-and-seek and wrestling, " says Camerer, "their human counterparts shift at a young age from competition to cooperation using our special skill at language."

Language is probably a key factor here. In the Inspection Game experiments, humans were not allowed to speak with one another, despite language being "key to human strategic interaction," according to Martin.

Language is also implicated in the "cognitive tradeoff hypothesis," the second explanation for the chimps' superior performance in the Inspection Game. According to this hypothesis, developed by Matsuzawa, the brain growth and specialization that led to distinctly human cognitive capacities such as language and categorization also caused us to process certain simpler competitive situations -- like the Inspection Game -- more abstractly and less automatically than our chimpanzee cousins.

These explanations remain speculative, but eventually, Bhui predicts, new technologies will make it possible to "map out the set of brain circuits that humans and chimps rely upon so we can discover whether or not human strategic choices go down a longer pathway or get diffused into different parts of the brain compared to chimps."

Long-sought molecular map of critical genetic machinery developed

 


Francisco J. Asturias, PhD, associate professor at The Scripps Research Institute, was the senior author of the Cell study.

A team led by researchers at The Scripps Research Institute (TSRI) has used advanced electron microscopy techniques to determine the first accurate structural map of Mediator, one of the largest and most complex "molecular machines" in cells.

Mediator is crucial for the regulation of most genes' activity and works in the cells of all plants and animals. The mapping of its structure -- which includes more than two dozen unique protein subunits -- represents a significant advance in basic cell biology and should shed light on medical conditions involving Mediator's dysfunction, from cancer to inherited developmental disorders.

The finding demonstrates how recently developed molecular imaging methods can be applied to characterize large and important protein complexes.

"Being able to determine how these large molecular machines look, how they're organized and how they move, will be critical for a better understanding of many key processes in cells," said TSRI Associate Professor Francisco J. Asturias, the senior author of the study, which was published on June 5, 2014 by the journal Cell.

A Complex Machine

The detailed map of Mediator comes nearly 20 years after the complex was first described by Stanford University biologist Roger Kornberg and colleagues. Kornberg, whose lab members at the time included Asturias, later won a Nobel Prize for his work on the gene transcription machinery of cells.

This gene transcription machinery evolved to perform one of the most basic and routine functions in biology, namely the copying of the information encoded in the DNA of genes into portable RNA "transcripts" -- some of which stay and work in the cell nucleus, while others exit the nucleus and are translated into proteins.

Each cell has its own pattern of gene transcription activity, determined by a regulatory system in which Mediator plays an indispensable role. The huge Mediator complex enables transcription factors and other regulatory proteins to influence the RNA polymerase II that actually performs the transcription.

To understand precisely how Mediator does its job, scientists have needed an accurate 3-D model of its architecture, including the locations of all its subunit proteins and a description of the different conformations Mediator can adopt to influence interactions between other components of the transcription machinery.

However, Mediator is enormous by biological standards: the version found in yeast has 25 distinct protein subunits and the human version has 30. It is also highly flexible. That combination of large size, high complexity and high flexibility makes it a poor candidate for high resolution imaging methods such as X-ray crystallography or nuclear magnetic resonance spectroscopy.

As a postdoctoral researcher in the Kornberg laboratory in the 1990s, Asturias helped pioneer the use of "single particle" electron microscopy (EM) for the imaging of large transcription complexes such as Mediator. Single-particle EM requires the taking of thousands of separate EM images of a particle of interest -- typically very "noisy" images, which depict a particle in different orientations and perhaps also in a number of different conformations. All these data must be filtered and averaged to reduce the noise and yield useful 3-D pictures. In a 1999 study in Science, Asturias and colleagues used an early form of single-particle EM to determine the first rough structure of the full Mediator complex.

In the decade and a half since then, Asturias's group has continued to use EM techniques to study Mediator. Others have used high-resolution techniques to study individual Mediator subunits or portions of the complex. However, a clear and accurate picture of how the whole structure fits together has been elusive until now.

Turning a Model on its Head

To determine the full structure clearly, Asturias and his colleagues began by producing highly pure quantities of a standard yeast version of Mediator -- the purification process itself being a major challenge. They then used this collection of Mediator particles to record roughly 85,000 EM images, which they categorized according to conformation. Averaging these yielded the clearest 3D model yet of the Mediator structure, to a resolution of about 18 Angstroms (1.8 billionths of a meter).

Using various other biochemical analyses, including the subtraction of different protein subunits to see how the EM images changed, the scientists were able to identify the precise locations of yeast Mediator's 25 protein subunits.

This mapping resulted in a comprehensive revision of the old rough model of Mediator's head-middle-tail structure. "After we located all the protein subunits, we realized that the head module is at the top of Mediator, not the bottom as had been thought," said Kuang-Lei Tsai, a postdoctoral fellow in the Asturias Laboratory, who was first author of the study. "These new data have helped us make sense of many previous biochemical observations."

Asturias and Tsai next collaborated with the laboratory of Joan and Ron Conaway -- Joan is another Kornberg alumnus -- at the Stowers Institute for Medical Research in Kansas City. The Conaway team had been working on human Mediator and now provided pure samples for EM imaging, as well as biochemical analyses of the subunit locations.

This work revealed that human Mediator shares the same broad architecture, implying that this structure has been, for the most part, conserved throughout the billion years of evolution that separate yeast and humans. "Basically the two Mediators have similar overall structure," said Tsai.

In the last part of the study, Asturias and Tsai used the new structural data to show how Mediator likely changes its conformation as it interacts with RNA polymerase on the one hand, and various transcription regulators on the other.

"This study has given us a fairly definitive picture of the Mediator architecture and how the different subunits are organized, so we can start to work towards an atomic resolution model," Asturias said. "We also want to understand better how Mediator interacts with all those other proteins to actually carry out transcription in a regulated manner."