Background: In recent years, model based approaches such as maximum likelihood have become the methods of choice for constructing phylogenies. A number of authors have shown the importance of using adequate substitution models in order to produce accurate phylogenies. In the past, many empirical models of amino acid substitution have been derived using a variety of different methods and protein datasets. These matrices are normally used as surrogates, rather than deriving the maximum likelihood model from the dataset being examined. With few exceptions, selection between alternative matrices has been carried out in an ad hoc manner.
Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.
A three-dimensional (3D) object reconstruction technique that uses only phase information of a phaseshifting digital hologram and a phase-only spatial-light modulator is proposed. It is well known that a digital hologram can store both amplitude and phase information of an optical electric field and can reconstruct the original 3D object in a computer. We demonstrate that it is possible to reconstruct optically 3D objects using only phase information of the optical field calculated from phase-shifting digital holograms. The use of phase-only information enables us to reduce the amount of data in the digital hologram and reconstruct optically the 3D objects using a liquid-crystal spatial light modulator without optical power loss. Numerical evaluation of the reconstructed 3D object is presented.
Drawing upon previous theoretical and empirical work on mergers and acquisitions, survivors' reactions to layoffs, organizational stress, and perceived personal control, we proposed a structural model of managers' reactions to the acquisition of their company.The model was evaluated on the basis of survey data collected from a sample of middlelevel managers ( N = 91) whose company was acquired through a hostile takeover by another company. Both were Fortune 500 companies. Though most variables were measured 16 months after the initial implementation phase of the merger, manifest indicators of change in job control were measured twice: at the beginning of the implementation phase and 16 months later. Mixed latent/manifest variable structural equations analyses provided results that were generally consistent with the proposed model. Implications of the results as well as suggestions for future research are discussed.
Abstract:The Fourier plane encryption algorithm is subjected to a known-plaintext attack. The simulated annealing heuristic algorithm is used to estimate the key, using a known plaintext-ciphertext pair, which decrypts the ciphertext with arbitrarily low error. The strength of the algorithm is tested by using this estimated key to decrypt a different ciphertext which was also encrypted using the same original key. We assume that the plaintext is amplitude-encoded real-valued image, and analyze only the mathematical algorithm rather than a real optical system that can be more secure. The Fourier plane encryption algorithm is found to be susceptible to a known-plaintext heuristic attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.