Sample records for hacking rna hakai

  1. Hacking RNA: Hakai promotes tumorigenesis by switching on the RNA-binding function of PSF

    PubMed Central

    Figueroa, Angélica; Fujita, Yasuyuki; Gorospe, Myriam

    2009-01-01

    Hakai, an E3 ubiquitin ligase for the E-cadherin complex, plays a crucial role in lowering cell-cell contacts in epithelial cells, a hallmark feature of tumor progression. Recently, Hakai was also found to interact with PSF (PTB-associated splicing factor). While PSF can function as a DNA-binding protein with a tumor suppressive function, its association with Hakai promotes PSF’s RNA-binding ability and post-transcriptional influence on target mRNAs. Hakai overexpression enhanced the binding of PSF to mRNAs encoding cancer-related proteins, while knockdown of Hakai reduced the RNA-binding ability of PSF. Furthermore, the knockdown of PSF suppressed Hakai-induced cell proliferation. Thus, Hakai can affect the oncogenic phenotype both by altering E-cadherin-based intercellular adhesions and by increasing PSF’s ability to bind RNAs that promote cancer-related gene expression. PMID:19855157

  2. Identification of factors required for m6 A mRNA methylation in Arabidopsis reveals a role for the conserved E3 ubiquitin ligase HAKAI.

    PubMed

    Růžička, Kamil; Zhang, Mi; Campilho, Ana; Bodi, Zsuzsanna; Kashif, Muhammad; Saleh, Mária; Eeckhout, Dominique; El-Showk, Sedeer; Li, Hongying; Zhong, Silin; De Jaeger, Geert; Mongan, Nigel P; Hejátko, Jan; Helariutta, Ykä; Fray, Rupert G

    2017-07-01

    N6-adenosine methylation (m 6 A) of mRNA is an essential process in most eukaryotes, but its role and the status of factors accompanying this modification are still poorly understood. Using combined methods of genetics, proteomics and RNA biochemistry, we identified a core set of mRNA m 6 A writer proteins in Arabidopsis thaliana. The components required for m 6 A in Arabidopsis included MTA, MTB, FIP37, VIRILIZER and the E3 ubiquitin ligase HAKAI. Downregulation of these proteins led to reduced relative m 6 A levels and shared pleiotropic phenotypes, which included aberrant vascular formation in the root, indicating that correct m 6 A methylation plays a role in developmental decisions during pattern formation. The conservation of these proteins amongst eukaryotes and the demonstration of a role in writing m 6 A for the E3 ubiquitin ligase HAKAI is likely to be of considerable relevance beyond the plant sciences. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  3. PTB-associated splicing factor inhibits IGF-1-induced VEGF upregulation in a mouse model of oxygen-induced retinopathy.

    PubMed

    Dong, Lijie; Nian, Hong; Shao, Yan; Zhang, Yan; Li, Qiutang; Yi, Yue; Tian, Fang; Li, Wenbo; Zhang, Hong; Zhang, Xiaomin; Wang, Fei; Li, Xiaorong

    2015-05-01

    Pathological retinal neovascularization, including retinopathy of prematurity and age-related macular degeneration, is the most common cause of blindness worldwide. Insulin-like growth factor-1 (IGF-1) has a direct mitogenic effect on endothelial cells, which is the basis of angiogenesis. Vascular endothelial growth factor (VEGF) activation in response to IGF-1 is well documented; however, the molecular mechanisms responsible for the termination of IGF-1 signaling are still not completely elucidated. Here, we show that the polypyrimidine tract-binding protein-associated splicing factor (PSF) is a potential negative regulator of VEGF expression induced by IGF stimulation. Functional analysis demonstrated that ectopic expression of PSF inhibits IGF-1-stimulated transcriptional activation and mRNA expression of the VEGF gene, whereas knockdown of PSF increased IGF-1-stimulated responses. PSF recruited Hakai to the VEGF transcription complex, resulting in inhibition of IGF-1-mediated transcription. Transfection with Hakai siRNA reversed the PSF-mediated transcriptional repression of VEGF gene transcription. In summary, these results show that PSF can repress the transcriptional activation of VEGF stimulated by IGF-1 via recruitment of the Hakai complex and delineate a novel regulatory mechanism of IGF-1/VEGF signaling that may have implications in the pathogenesis of neovascularization in ocular diseases.

  4. Hakai overexpression effectively induces tumour progression and metastasis in vivo.

    PubMed

    Castosa, Raquel; Martinez-Iglesias, Olaia; Roca-Lema, Daniel; Casas-Pais, Alba; Díaz-Díaz, Andrea; Iglesias, Pilar; Santamarina, Isabel; Graña, Begoña; Calvo, Lourdes; Valladares-Ayerbes, Manuel; Concha, Ángel; Figueroa, Angélica

    2018-02-22

    At early stages of carcinoma progression, epithelial cells undergo a program named epithelial-to-mesenchymal transition characterized by the loss of the major component of the adherens junctions, E-cadherin, which in consequence causes the disruption of cell-cell contacts. Hakai is an E3 ubiquitin-ligase that binds to E-cadherin in a phosphorylated-dependent manner and induces its degradation; thus modulating cell adhesions. Here, we show that Hakai expression is gradually increased in adenoma and in different TNM stages (I-IV) from colon adenocarcinomas compared to human colon healthy tissues. Moreover, we confirm that Hakai overexpression in epithelial cells drives transformation in cells, a mesenchymal and invasive phenotype, accompanied by the downregulation of E-cadherin and the upregulation of N-cadherin, and an increased proliferation and an oncogenic potential. More importantly, for the first time, we have studied the role of Hakai during cancer progression in vivo. We show that Hakai-transformed MDCK cells dramatically induce tumour growth and local invasion in nude mice and tumour cells exhibit a mesenchymal phenotype. Furthermore, we have detected the presence of micrometastasis in the lung mice, further confirming Hakai role during tumour metastasis in vivo. These results lead to the consideration of Hakai as a potential new therapeutic target to block tumour development and metastasis.

  5. Appraising the roles of CBLL1 and the ubiquitin/proteasome system for flavivirus entry and replication.

    PubMed

    Fernandez-Garcia, Maria-Dolores; Meertens, Laurent; Bonazzi, Matteo; Cossart, Pascale; Arenzana-Seisdedos, Fernando; Amara, Ali

    2011-03-01

    The ubiquitin ligase CBLL1 (also known as HAKAI) has been proposed to be a critical cellular factor exploited by West Nile virus (WNV) for productive infection. CBLL1 has emerged as a major hit in a recent RNA interference screen designed to identify cellular factors required for the early stages of the WNV life cycle. Follow-up experiments showed that HeLa cells knocked down for CBLL1 by a small interfering RNA (siRNA) failed to internalize WNV particles and resisted infection. Furthermore, depletion of a free-ubiquitin pool by the proteasome inhibitor MG132 abolished WNV endocytosis, suggesting that CBLL1 acts in concert with the ubiquitin proteasome system to mediate virus internalization. Here, we examined the effect of CBLL1 knockdown and proteasome inhibitors on infection by WNV and other flaviviruses. We identified new siRNAs that repress the CBLL1 protein and strongly inhibit the endocytosis of Listeria monocytogenes, a bacterial pathogen known to require CBLL1 to invade host cells. Strikingly, however, we detected efficient WNV, dengue virus, and yellow fever virus infection of human cells, despite potent downregulation of CBLL1 by RNA interference. In addition, we found that the proteasome inhibitors MG132 and lactacystin did not affect WNV internalization but strongly repressed flavivirus RNA translation and replication. Together, these data do not support a requirement for CBLL1 during flavivirus entry and rather suggest an essential role of the ubiquitin/proteasome pathway for flavivirus genome amplification.

  6. 76 FR 29665 - Migratory Bird Permits; Changes in the Regulations Governing Raptor Propagation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-23

    ... hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under your propagation permit. Check with... you hack must have two attached functioning radio transmitters during hacking. (3) You may not hack a...

  7. The extent and consequences of p-hacking in science.

    PubMed

    Head, Megan L; Holman, Luke; Lanfear, Rob; Kahn, Andrew T; Jennions, Michael D

    2015-03-01

    A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as "p-hacking," occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses.

  8. 50 CFR 21.30 - Raptor propagation permits.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...

  9. 50 CFR 21.30 - Raptor propagation permits.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...

  10. 50 CFR 21.30 - Raptor propagation permits.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...

  11. 50 CFR 21.30 - Raptor propagation permits.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...

  12. The Extent and Consequences of P-Hacking in Science

    PubMed Central

    Head, Megan L.; Holman, Luke; Lanfear, Rob; Kahn, Andrew T.; Jennions, Michael D.

    2015-01-01

    A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as “p-hacking,” occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses. PMID:25768323

  13. Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times.

    PubMed

    Delgado, Ana; Callén, Blanca

    2017-02-01

    In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, 'hacking' is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey's experimental approach to politics, we analyse hacks as 'inquiry' to see how they serve to articulate public and political action. We argue that do-it-yourself and makers' hacks are technical and political demonstrations. What do-it-yourself and makers' hacks ultimately demonstrate is that things can be done otherwise and that 'you' can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration.

  14. P-Hacking in Orthopaedic Literature: A Twist to the Tail.

    PubMed

    Bin Abd Razak, Hamid Rahmatullah; Ang, Jin-Guang Ernest; Attal, Hersh; Howe, Tet-Sen; Allen, John Carson

    2016-10-19

    "P-hacking" occurs when researchers preferentially select data or statistical analyses until nonsignificant results become significant. We wanted to evaluate if the phenomenon of p-hacking was evident in orthopaedic literature. We text-mined through all articles published in three top orthopaedic journals in 2015. For anonymity, we cipher-coded the three journals. We included all studies that reported a single p value to answer their main hypothesis. These p values were then charted and frequency graphs were generated to illustrate any evidence of p-hacking. Binomial tests were employed to look for evidence of evidential value and significance of p-hacking. Frequency plots for all three journals revealed evidence of p-hacking. Binomial tests for all three journals were significant for evidence of evidential value (p < 0.0001 for all). However, the binomial test for p-hacking was significant only for one journal (p = 0.0092). P-hacking is an evolving phenomenon that threatens to jeopardize the evidence-based practice of medicine. Although our results show that there is good evidential value for orthopaedic literature published in our top journals, there is some evidence of p-hacking of which authors and readers should be wary. Copyright © 2016 by The Journal of Bone and Joint Surgery, Incorporated.

  15. 78 FR 29615 - Establishment of Area Navigation (RNAV) Routes; Washington, DC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-21

    ...). Q-72 extends between the HACKS, WV, intersection and the RAMAY, VA, WP. It provides an alternate route for jet route J-149 via a direct routing to the HACKS intersection, thus reducing miles flown for...]12'20'' W.) Q72 HACKS, WV to RAMAY, VA [New] HACKS, WV FIX (Lat. 39[deg]07'46'' N., long. 081[deg]05...

  16. Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value.

    PubMed

    Bishop, Dorothy V M; Thompson, Paul A

    2016-01-01

    Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an experimenter gathers data on several dependent variables but reports only those with statistically significant effects. We also examined a text-mined dataset used by Head et al. (2015) and assessed its suitability for investigating p-hacking. Results. We show that when there is ghost p-hacking, the shape of the p-curve depends on whether dependent variables are intercorrelated. For uncorrelated variables, simulated p-hacked data do not give the "p-hacking bump" just below .05 that is regarded as evidence of p-hacking, though there is a negative skew when simulated variables are inter-correlated. The way p-curves vary according to features of underlying data poses problems when automated text mining is used to detect p-values in heterogeneous sets of published papers. Conclusions. The absence of a bump in the p-curve is not indicative of lack of p-hacking. Furthermore, while studies with evidential value will usually generate a right-skewed p-curve, we cannot treat a right-skewed p-curve as an indicator of the extent of evidential value, unless we have a model specific to the type of p-values entered into the analysis. We conclude that it is not feasible to use the p-curve to estimate the extent of p-hacking and evidential value unless there is considerable control over the type of data entered into the analysis. In particular, p-hacking with ghost variables is likely to be missed.

  17. Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times

    PubMed Central

    Delgado, Ana; Callén, Blanca

    2016-01-01

    In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, ‘hacking’ is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey’s experimental approach to politics, we analyse hacks as ‘inquiry’ to see how they serve to articulate public and political action. We argue that do-it-yourself and makers’ hacks are technical and political demonstrations. What do-it-yourself and makers’ hacks ultimately demonstrate is that things can be done otherwise and that ‘you’ can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration. PMID:27233296

  18. P-Hacking: A Wake-Up Call for the Scientific Community.

    PubMed

    Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Salameh, Ziad

    2017-10-25

    P-hacking or data dredging involves manipulation of the research data in order to obtain a statistically significant result. The reasons behind P-hacking and the consequences of the same are discussed in the present manuscript.

  19. Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value

    PubMed Central

    Thompson, Paul A.

    2016-01-01

    Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an experimenter gathers data on several dependent variables but reports only those with statistically significant effects. We also examined a text-mined dataset used by Head et al. (2015) and assessed its suitability for investigating p-hacking. Results. We show that when there is ghost p-hacking, the shape of the p-curve depends on whether dependent variables are intercorrelated. For uncorrelated variables, simulated p-hacked data do not give the “p-hacking bump” just below .05 that is regarded as evidence of p-hacking, though there is a negative skew when simulated variables are inter-correlated. The way p-curves vary according to features of underlying data poses problems when automated text mining is used to detect p-values in heterogeneous sets of published papers. Conclusions. The absence of a bump in the p-curve is not indicative of lack of p-hacking. Furthermore, while studies with evidential value will usually generate a right-skewed p-curve, we cannot treat a right-skewed p-curve as an indicator of the extent of evidential value, unless we have a model specific to the type of p-values entered into the analysis. We conclude that it is not feasible to use the p-curve to estimate the extent of p-hacking and evidential value unless there is considerable control over the type of data entered into the analysis. In particular, p-hacking with ghost variables is likely to be missed. PMID:26925335

  20. Students "Hacking" School Computer Systems

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  1. 76 FR 50123 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ... temporary deviation from the regulation governing the operation of the Hack Freight Bridge, mile 3.1, across...-9826. SUPPLEMENTARY INFORMATION: The Hack Freight Bridge, across the Hackensack River at mile 3.1 has a... to provide openings. Under this temporary deviation the Hack Freight Bridge, mile 3.1, across the...

  2. 75 FR 68704 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-09

    ... temporary deviation from the regulation governing the operation of the Upper Hack Bridge at mile 6.9, across.... SUPPLEMENTARY INFORMATION: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a vertical.... Under this temporary deviation the Upper Hack Bridge, mile 6.9, across the Hackensack River may remain...

  3. 76 FR 4818 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-27

    ... temporary deviation from the regulation governing the operation of the Upper Hack Bridge across the...-9826. SUPPLEMENTARY INFORMATION: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a... temporary deviation the Upper Hack Bridge, mile 6.9, across the Hackensack River may remain in the closed...

  4. Transformative Rendering of Internet Resources

    DTIC Science & Technology

    2012-10-01

    4 Securing WiFi Connections...comes from legitimate web sites that have themselves been hacked . There is no way of anticipating which of these sites have been hacked and therefore...pose a security threat to visitors. The purpose of most of this web page hacking is to plant malicious code on the web site that will attack any

  5. 33 CFR 117.723 - Hackensack River.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...

  6. 33 CFR 117.723 - Hackensack River.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... stationed at Upper Hack and the other drawtender at the HX drawbridge. Adequate security measures shall be... Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New Jersey. In the event the HX...

  7. 33 CFR 117.723 - Hackensack River.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...

  8. 76 FR 13288 - Drawbridge Operation Regulations; Hackensack River, Secaucus, NJ

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-11

    ... deviation from the regulation governing the operation of the Upper Hack Bridge at mile 6.9, across the...: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a vertical clearance in the closed... rehabilitation at the bridge. Under this temporary deviation the Upper Hack Bridge, mile 6.9, across the...

  9. 33 CFR 117.723 - Hackensack River.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...

  10. 33 CFR 117.723 - Hackensack River.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...

  11. Free-space QKD system hacking by wavelength control using an external laser.

    PubMed

    Lee, Min Soo; Woo, Min Ki; Jung, Jisung; Kim, Yong-Su; Han, Sang-Wook; Moon, Sung

    2017-05-15

    We develop a way to hack free-space quantum key distribution (QKD) systems by changing the wavelength of the quantum signal laser using an external laser. Most free-space QKD systems use four distinct lasers for each polarization, thereby making the characteristics of each laser indistinguishable. We also discover a side-channel that can distinguish the lasers by using an external laser. Our hacking scheme identifies the lasers by automatically applying the external laser to each signal laser at different intensities and detecting the wavelength variation according to the amount of incident external laser power. We conduct a proof-of-principle experiment to verify the proposed hacking structure and confirm that the wavelength varies by several gigahertzes to several nanometers, depending on the intensity of the external laser. The risk of hacking is successfully proven through the experimental results. Methods for prevention are also suggested.

  12. 78 FR 76195 - Drawbridge Operation Regulations; Hackensack River, New Jersey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-17

    ... Upper Hack and HX Bridges, miles 6.9 and 7.7, respectively, all across the Hackensack River, NJ to... Upper Hack Bridge, mile 6.9, has a vertical clearance of 8 feet at mean high water, and 13 feet at mean... so at all times. Under this temporary deviation the PATH, Portal, Upper Hack and HX bridges may...

  13. 78 FR 10562 - Proposed Establishment of Area Navigation (RNAV) Routes; Washington, DC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-14

    ... (VORTAC) aid and the OTTTO, VA, waypoint (WP). Q-72 would extend between the HACKS, WV, intersection and... HACKS intersection, thus reducing miles flown for RNAV-equipped aircraft. Q-80 would extend between the...., long. 078[deg]22'27'' W.) OTTTO, VA WP (Lat. 38[deg]51'16'' N., long. 078[deg]12'20'' W.) Q72 HACKS, WV...

  14. Research in Computer Forensics

    DTIC Science & Technology

    2002-06-01

    systems and how they can aid in the recovery of digital evidence in a forensic analysis. Exposures to hacking techniques and tools in CS3675—Internet...cryptography, access control, authentication, biometrics, actions to be taken during an attack and case studies of hacking and information warfare. 11...chat, surfing, instant messaging and hacking with powerful access control and filter capabilities. The monitor can operates in a Prevention mode to

  15. Changing the Lines in the Coloring Book

    DTIC Science & Technology

    2004-05-18

    multitude of SCADA programmers creates a multitude of idiosyncratic programs, making it very difficult to know how to hack into large numbers of them...an observed pattern of hacking that would alert authorities seems not to have been discussed.) However, some SCADAs are not physically connected to the...normal hacking . Simultaneously, it would identify software vulnerabilities in other products and design viruses and worms for attacking them. (The

  16. Bioinformatics Challenge Days

    DTIC Science & Technology

    2013-12-30

    MIT Lincoln Laboratory in cooperation with Edgewood Chemical Biological Center (ECBC). These events explored the utility of a short-term “ hack day...conceived as an experiment applying a short “ hack day” format to bioinformatics problems of interest to DTRA. Participants of diverse technical...organizers took note of different types of previous hack day formats that had been very open-ended (i.e., gave participants a collection of hardware or

  17. RNA-protein interactions in plant disease: hackers at the dinner table.

    PubMed

    Spanu, Pietro D

    2015-09-01

    Plants are the source of most of our food, whether directly or as feed for the animals we eat. Our dinner table is a trophic level we share with the microbes that also feed on the primary photosynthetic producers. Microbes that enter into close interactions with plants need to evade or suppress detection and host immunity to access nutrients. They do this by deploying molecular tools - effectors - which target host processes. The mode of action of effector proteins in these events is varied and complex. Recent data from diverse systems indicate that RNA-interacting proteins and RNA itself are delivered by eukaryotic microbes, such as fungi and oomycetes, to host plants and contribute to the establishment of successful interactions. This is evidence that pathogenic microbes can interfere with the host software. We are beginning to see that pathogenic microbes are capable of hacking into the plants' immunity programs. © 2015 The Author. New Phytologist © 2015 New Phytologist Trust.

  18. Hacking Social Networks: Examining the Viability of Using Computer Network Attack Against Social Networks

    DTIC Science & Technology

    2007-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited. HACKING SOCIAL NETWORKS : EXAMINING THE...VIABILITY OF USING COMPUTER NETWORK ATTACK AGAINST SOCIAL NETWORKS by Russell G. Schuhart II March 2007 Thesis Advisor: David Tucker Second Reader...Master’s Thesis 4. TITLE AND SUBTITLE: Hacking Social Networks : Examining the Viability of Using Computer Network Attack Against Social Networks 6. AUTHOR

  19. A Framework for Programming and Budgeting for Cybersecurity

    DTIC Science & Technology

    2016-01-01

    environment in which hackers operate and extends beyond the confines of a single organization. Reducing the incen- tive for hacking and availability of...convey- ing to hackers that going after their organization entails a great deal of frustration (deterrence by denial) or risk (e.g., via hack -backs...components in the network: Systems are hacked because they have vulnerabilities (although a vulnerability-free system may be encounter risks from protocol

  20. Department of Defense Information Network (DODIN): A Study of Current Cyber Threats and Best Practices for Network Security

    DTIC Science & Technology

    2016-06-10

    DODIN) is being threatened by state actors, non-state actors, and continuous hacking and cyber-attacks. These threats against the network come in a...variety of forms; physical attacks from radio jamming, logical cyber threats from hacking , or a combination of both physical and logical attacks. Each...year the number of hacking attacks is increasing. Corporations like Symantec publish annual reports on cyber threats and provide tips for best

  1. The hacker ethic

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Granger, S.

    The hacker ethic can be a peculiar concept to those unfamiliar with hacking and what really is. In fact, the entire definition of hacking is somewhat obscure. Hacking originated as a challenge between programmers. Programmers at MIT are known for coining the term. Individuals would hack at code meaning that they would work at programming problems until they could maniuplate their computers into doing exactly what they wanted. The MIT hackers began with simple programs and moved on to fidding with UNIX machines, especially those on the Arpanet. Hackers started freely distributing their code to their friends and eventually tomore » their friends across the network. This gave rise to a notion that software should be free. Eventually this was taken to the extreme information and network access should also be free.« less

  2. The Need for Specific Penalties for Hacking in Criminal Law

    PubMed Central

    Oh, Sangkyo; Lee, Kyungho

    2014-01-01

    In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment. PMID:25032236

  3. The need for specific penalties for hacking in criminal law.

    PubMed

    Oh, Sangkyo; Lee, Kyungho

    2014-01-01

    In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment.

  4. A Systems Approach to Healthcare Innovation Using the MIT Hacking Medicine Model.

    PubMed

    Gubin, Tatyana A; Iyer, Hari P; Liew, Shirlene N; Sarma, Aartik; Revelos, Alex; Ribas, João; Movassaghi, Babak; Chu, Zen M; Khalid, Ayesha N; Majmudar, Maulik D; Lee, Christopher Xiang

    2017-07-26

    MIT Hacking Medicine is a student, academic, and community-led organization that uses systems-oriented "healthcare hacking" to address challenges around innovation in healthcare. The group has organized more than 80 events around the world that attract participants with diverse backgrounds. These participants are trained to address clinical needs from the perspective of multiple stakeholders and emphasize utility and implementation viability of proposed solutions. We describe the MIT Hacking Medicine model as a potential method to integrate collaboration and training in rapid innovation techniques into academic medical centers. Built upon a systems approach to healthcare innovation, the time-compressed but expertly guided nature of the events could enable more widely accessible preliminary training in systems-level innovation methodology, as well as creating a structured opportunity for interdisciplinary congregation and collaboration. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. [Natural or interactive kinds? The transient mental disorders in Ian Hacking's lectures at the Collège de France (2000-2006)].

    PubMed

    Delille, Emmanuel; Kirsch, Marc

    2016-12-01

    The concepts developed by Ian Hacking during his lectures at the Collège de France (2000-2006) have provided an important contribution to the debates within the field of philosophy of psychiatry. Professor at the Chair of Philosophy and History of Scientific Concepts after Michel Foucault, Hacking is the author of a reflection on the classification of mental disorders, which arises from the problem of the natural kinds. In order to explain the case studies developed in Hacking's Paris lectures, we first go back to the definition of a series of concepts, then we discuss the status of his scientific metaphors. Finally we analyze the relationship between the notions, respectively, of "transient mental illness" and "culture-bound syndrome". We emphasize that the latter derives from the Canadian transcultural psychiatry.

  6. Reanalyzing Head et al. (2015): investigating the robustness of widespread p-hacking.

    PubMed

    Hartgerink, Chris H J

    2017-01-01

    Head et al. (2015) provided a large collection of p -values that, from their perspective, indicates widespread statistical significance seeking (i.e., p -hacking). This paper inspects this result for robustness. Theoretically, the p -value distribution should be a smooth, decreasing function, but the distribution of reported p -values shows systematically more reported p -values for .01, .02, .03, .04, and .05 than p -values reported to three decimal places, due to apparent tendencies to round p -values to two decimal places. Head et al. (2015) correctly argue that an aggregate p -value distribution could show a bump below .05 when left-skew p -hacking occurs frequently. Moreover, the elimination of p  = .045 and p  = .05, as done in the original paper, is debatable. Given that eliminating p  = .045 is a result of the need for symmetric bins and systematically more p -values are reported to two decimal places than to three decimal places, I did not exclude p  = .045 and p  = .05. I conducted Fisher's method .04 <  p  < .05 and reanalyzed the data by adjusting the bin selection to .03875 <  p  ≤ .04 versus .04875 <  p  ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p -hacking remains when we look at the entire range between .04 <  p  < .05 or when we inspect the second-decimal. Taking into account reporting tendencies when selecting the bins to compare is especially important because this dataset does not allow for the recalculation of the p -values. Moreover, inspecting the bins that include two-decimal reported p -values potentially increases sensitivity if strategic rounding down of p -values as a form of p -hacking is widespread. Given the far-reaching implications of supposed widespread p -hacking throughout the sciences Head et al. (2015), it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p -hacking is found in this reanalysis, this does not mean that there is no p -hacking at all. These results nuance the conclusion by Head et al. (2015), indicating that the results are not robust and that the evidence for widespread left-skew p -hacking is ambiguous at best.

  7. Reanalyzing Head et al. (2015): investigating the robustness of widespread p-hacking

    PubMed Central

    2017-01-01

    Head et al. (2015) provided a large collection of p-values that, from their perspective, indicates widespread statistical significance seeking (i.e., p-hacking). This paper inspects this result for robustness. Theoretically, the p-value distribution should be a smooth, decreasing function, but the distribution of reported p-values shows systematically more reported p-values for .01, .02, .03, .04, and .05 than p-values reported to three decimal places, due to apparent tendencies to round p-values to two decimal places. Head et al. (2015) correctly argue that an aggregate p-value distribution could show a bump below .05 when left-skew p-hacking occurs frequently. Moreover, the elimination of p = .045 and p = .05, as done in the original paper, is debatable. Given that eliminating p = .045 is a result of the need for symmetric bins and systematically more p-values are reported to two decimal places than to three decimal places, I did not exclude p = .045 and p = .05. I conducted Fisher’s method .04 < p < .05 and reanalyzed the data by adjusting the bin selection to .03875 < p ≤ .04 versus .04875 < p ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p-hacking remains when we look at the entire range between .04 < p < .05 or when we inspect the second-decimal. Taking into account reporting tendencies when selecting the bins to compare is especially important because this dataset does not allow for the recalculation of the p-values. Moreover, inspecting the bins that include two-decimal reported p-values potentially increases sensitivity if strategic rounding down of p-values as a form of p-hacking is widespread. Given the far-reaching implications of supposed widespread p-hacking throughout the sciences Head et al. (2015), it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p-hacking is found in this reanalysis, this does not mean that there is no p-hacking at all. These results nuance the conclusion by Head et al. (2015), indicating that the results are not robust and that the evidence for widespread left-skew p-hacking is ambiguous at best. PMID:28265523

  8. Brief communication: Possible explanation of the values of Hack's drainage basin, river length scaling exponent

    NASA Astrophysics Data System (ADS)

    Hunt, Allen G.

    2016-04-01

    Percolation theory can be used to find water flow paths of least resistance. Application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law may allow interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.

  9. Explanation of the values of Hack's drainage basin, river length scaling exponent

    NASA Astrophysics Data System (ADS)

    Hunt, A. G.

    2015-08-01

    Percolation theory can be used to find water flow paths of least resistance. The application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law allows interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.

  10. 33 CFR 117.739 - Passaic River.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge, mile 3.4 on the Hackensack River, at Jersey City...

  11. 33 CFR 117.739 - Passaic River.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge, mile 3.4 on the Hackensack River, at Jersey City...

  12. 33 CFR 117.739 - Passaic River.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge, mile 3.4 on the Hackensack River, at Jersey City...

  13. 33 CFR 117.739 - Passaic River.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... signal if at least one hour advance notice is given to the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge...

  14. 33 CFR 117.739 - Passaic River.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... signal if at least one hour advance notice is given to the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge...

  15. Hacking Around.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    1999-01-01

    Discusses a complicated appellate-court case upholding a Milwaukee high-school junior's expulsion for advocating computer hacking in a student newspaper. The decision is noteworthy for signaling a growing technology-related litigation trend, conflating the advocacy/incitement issue, and showing courts' decreasing tolerance for perceived threats to…

  16. SFU Hacking for Non-Hackers v. 1.005

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carter, David James

    The program provides a limited virtual environment for exploring some concepts of computer hacking. It simulates a simple computer system with intentional vulnerabilities, allowing the user to issue commands and observe their results. It does not affect the computer on which it runs.

  17. Ethical Hacking in Information Security Curricula

    ERIC Educational Resources Information Center

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  18. The first SPIE software Hack Day

    NASA Astrophysics Data System (ADS)

    Kendrew, S.; Deen, C.; Radziwill, N.; Crawford, S.; Gilbert, J.; Gully-Santiago, M.; Kubánek, P.

    2014-07-01

    We report here on the software Hack Day organised at the 2014 SPIE conference on Astronomical Telescopes and Instrumentation in Montréal. The first ever Hack Day to take place at an SPIE event, the aim of the day was to bring together developers to collaborate on innovative solutions to problems of their choice. Such events have proliferated in the technology community, providing opportunities to showcase, share and learn skills. In academic environments, these events are often also instrumental in building community beyond the limits of national borders, institutions and projects. We show examples of projects the participants worked on, and provide some lessons learned for future events.

  19. Hack's relation and optimal channel networks: The elongation of river basins as a consequence of energy minimization

    NASA Astrophysics Data System (ADS)

    Ijjasz-Vasquez, Ede J.; Bras, Rafael L.; Rodriguez-Iturbe, Ignacio

    1993-08-01

    As pointed by Hack (1957), river basins tend to become longer and narrower as their size increases. This work shows that this property may be partially regarded as the consequence of competition and minimization of energy expenditure in river basins.

  20. SafeSlinger: An Easy-to-use and Secure Approach for Human Trust Establishment

    DTIC Science & Technology

    2012-03-12

    communication modalities (Bluetooth, WiFi , 4G), camera, and sensors. Unfortunately, smartphone platforms suffer from many risks. Vulnerabilities exist in...December 2010. [31] Dave Neal. Defcon hackers get hacked over 4G. http://www.theinquirer.net/inquirer/news/ 16 2100989/defcon-hackers- hacked -4g

  1. Internet Attack Traceback: Cross-Validation and Pebble-Trace

    DTIC Science & Technology

    2013-02-28

    stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical

  2. Connected Learning in the Library as a Product of Hacking, Making, Social Diversity and Messiness

    ERIC Educational Resources Information Center

    Bilandzic, Mark

    2016-01-01

    Learning is most effective when intrinsically motivated through personal interest, and situated in a supportive socio-cultural context. This paper reports on findings from a study that explored implications for design of interactive learning environments through 18 months of ethnographic observations of people's interactions at "Hack The…

  3. Ian Hacking, Learner Categories and Human Taxonomies

    ERIC Educational Resources Information Center

    Davis, Andrew

    2008-01-01

    I use Ian Hacking's views to explore ways of classifying people, exploiting his distinction between indifferent kinds and interactive kinds, and his accounts of how we "make up" people. The natural kind/essentialist approach to indifferent kinds is explored in some depth. I relate this to debates in psychiatry about the existence of mental…

  4. A Hands-On Approach for Teaching Denial of Service Attacks: A Case Study

    ERIC Educational Resources Information Center

    Trabelsi, Zouheir; Ibrahim, Walid

    2013-01-01

    Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…

  5. Second generation bioethanol production from Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.

    Treesearch

    Danilo Scordia; Salvatore L. Consentino; Thomas W. Jeffries

    2010-01-01

    Saccharum (Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.), is a rapidly growing, wide ranging high-yield perennial, suitable for second generation bioethanol production. This study evaluated oxalic acid as a pretreatment for bioconversion. Overall sugar yields, sugar degradation products, enzymatic glucan hydrolysis and ethanol production were studied as...

  6. p-Curve and p-Hacking in Observational Research.

    PubMed

    Bruns, Stephan B; Ioannidis, John P A

    2016-01-01

    The p-curve, the distribution of statistically significant p-values of published studies, has been used to make inferences on the proportion of true effects and on the presence of p-hacking in the published literature. We analyze the p-curve for observational research in the presence of p-hacking. We show by means of simulations that even with minimal omitted-variable bias (e.g., unaccounted confounding) p-curves based on true effects and p-curves based on null-effects with p-hacking cannot be reliably distinguished. We also demonstrate this problem using as practical example the evaluation of the effect of malaria prevalence on economic growth between 1960 and 1996. These findings call recent studies into question that use the p-curve to infer that most published research findings are based on true effects in the medical literature and in a wide range of disciplines. p-values in observational research may need to be empirically calibrated to be interpretable with respect to the commonly used significance threshold of 0.05. Violations of randomization in experimental studies may also result in situations where the use of p-curves is similarly unreliable.

  7. Can a biologist fix a smartphone?-Just hack it!

    PubMed

    Kamoun, Sophien

    2017-05-08

    Biological systems integrate multiscale processes and networks and are, therefore, viewed as difficult to dissect. However, because of the clear-cut separation between the software code (the information encoded in the genome sequence) and hardware (organism), genome editors can operate as software engineers to hack biological systems without any particularly deep understanding of the complexity of the systems.

  8. Employing Two Factor Authentication Mechanisms: A Case Study

    ERIC Educational Resources Information Center

    Lawrence, Cameron; Fulton, Eric; Evans, Gerald; Firth, David

    2014-01-01

    This case study examines the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Facebook. Part one of the case study examines how the hack was perpetrated and the fallout of losing control of one's digital identity. Part two of the…

  9. p-Curve and p-Hacking in Observational Research

    PubMed Central

    Bruns, Stephan B.; Ioannidis, John P. A.

    2016-01-01

    The p-curve, the distribution of statistically significant p-values of published studies, has been used to make inferences on the proportion of true effects and on the presence of p-hacking in the published literature. We analyze the p-curve for observational research in the presence of p-hacking. We show by means of simulations that even with minimal omitted-variable bias (e.g., unaccounted confounding) p-curves based on true effects and p-curves based on null-effects with p-hacking cannot be reliably distinguished. We also demonstrate this problem using as practical example the evaluation of the effect of malaria prevalence on economic growth between 1960 and 1996. These findings call recent studies into question that use the p-curve to infer that most published research findings are based on true effects in the medical literature and in a wide range of disciplines. p-values in observational research may need to be empirically calibrated to be interpretable with respect to the commonly used significance threshold of 0.05. Violations of randomization in experimental studies may also result in situations where the use of p-curves is similarly unreliable. PMID:26886098

  10. Scandalous: Christian identification, sex guilt, and the mediated demonization of the participants in the AshleyMadison scandal.

    PubMed

    Ashdown, Brien K; Hackathorn, Jana M; Daniels, Jordan

    2018-04-06

    In 2015, AshleyMadison.com (AshleyMadison) was hacked, leading to the release of site members' personal information. The exposed members faced public scrutiny, judgment, and other negative outcomes. In this study, we examined predictors of the demonization of the AshleyMadison participants (i.e., AshleyMadison members, owners, hackers) to help explain victim derogation. We attempted to discern the role religiosity and sexual guilt played in the demonization of the AshleyMadison hacking participants. We predicted sexual guilt would mediate between religiosity and demonization of the AshleyMadison hacking participants. Our findings indicate that religiosity alone does not predict demonization. Instead, sex guilt was a necessary part of the equation and mediated between participants' religiosity and the amount they demonized the different groups.

  11. "Hacking at Our Very Roots": Rearticulating White Racial Identity within the Context of Teacher Education

    ERIC Educational Resources Information Center

    Aveling, Nado

    2006-01-01

    When teaching about race and racism and how we as "Whites" are implicated in the discursive practices that sustain racism, we are indeed "hacking at the very roots" of the ways in which students have conceptualized their identity in terms of being non-racialized and at the same time non-racist. In this paper I focus on the challenges and…

  12. Forming a Cyber Coalition

    DTIC Science & Technology

    2012-04-06

    Estonia 6 :  98% of Estonian‟s territory was covered with Internet access: fixed line, broadband, WiMax, WiFi , and CDMA21 mobile wireless Internet...The hacked homepage displayed a prominent image of Bashar al-Assad, the President of Syria, with a text proclaiming “Syrian Electronic Army Were...update and harmonize their criminal laws against hacking , infringements on copyrights, computer facilitated fraud, child pornography, and other illicit

  13. Should We Turn the Robots Loose?

    DTIC Science & Technology

    2010-05-02

    interference. Potential sources of electromagnetic interference include everyday signals such as cell phones and Wifi , intentional friendly jamming of IED...might even attempt to hack or hijack our robotic warriors. Our current enemies have proven to be very adaptable and have developed simple counters to our...demonstrates the ease with which robot command and control might be hacked . It is reasonable to suspect that a future threat with a more robust

  14. Continuous-Tone Electrostatic Electrography

    DTIC Science & Technology

    1948-09-15

    selected as "being of greatest impor- tance: (l) exposure speed equivalent to 50 Westen» (2) high- quality continuous-tone reproduction, and...the developing or ’the fixing techniques» (10) Uniformity of Quality of Plates or Pilm from 3atch to Batch This cannot be considered until...directly to tho electrically cöhductivo hacking of the plato. This hacking is groundod aftor tho plate surfaco lias hoon chargod under corona

  15. Hacking medical devices a review - biomed 2013.

    PubMed

    Frenger, Paul

    2013-01-01

    Programmable, implantable and external biomedical devices (such as pacemakers, defibrillators, insulin pumps, pain management pumps, vagus nerve stimulators and others) may be vulnerable to unauthorized access, commonly referred to as “hacking”. This intrusion may lead to compromise of confidential patient data or loss of control of the device itself, which may be deadly. Risks to health from unauthorized access is in addition to hazards from faulty (“buggy”) software or circuitry. Historically, this aspect of medical device design has been underemphasized by both manufacturers and regulatory bodies until recently. However, an insulin pump was employed as a murder weapon in 2001 and successful hacking of an implantable defibrillator was demonstrated in 2008. To remedy these problems, professional groups have announced a variety of design standards and the governmental agencies of several countries have enacted device regulations. In turn, manufacturers have developed new software products and hardware circuits to assist biomedical engineering firms to improve their commercial offerings. In this paper the author discusses these issues, reviewing known problems and zero-day threats, with potential solutions. He outlines his approach to secure software and hardware challenges using the Forth language. A plausible scenario is described in which hacking of an implantable defibrillator by terrorists results in a severe national security threat to the United States.

  16. Science Hack Day: an opportunity for public engagement, art/science mash-ups, and inspiration

    NASA Astrophysics Data System (ADS)

    Bellis, Matthew

    2013-04-01

    The idea of a Science Hack Day (http://sciencehackday.com/) is to put non-scientists (designers, web developers, artists, interested enthusiasts) in a room with scientists and some good ideas, and see what science-themed project they can create in a weekend (about 24 hours of real hacking). The motto of the organizers is ``Get Excited and Make Things with Science!'' I have participated in several of these events including the first one held in the United State in Palo Alto in 2010 and as a remote advisor to participants in Nairobi, Kenya. To these events I have brought particle physics data from both the BaBar and the CMS (Compact Muon Solenoid) experiments, data from the CoGeNT dark matter direct-detection experiment, and my expertise and enthusiasm. The experience has been transformative for me as both a scientist and a science advocate. This talk will recount my experiences with Science Hack Day events in general and detail some projects that have come out of these days, including the Particle Physics Wind Chime (http://www.mattbellis.com/windchime/) and the Standard Model of Cocktail Physics (http://www.physicsdavid.net/2012/11/standard-model-of-cocktail-physics/). Opportunities for other scientists to take part in similar events will be discussed.

  17. The MAGTF’s Reliance on the Global Positioning System: A Critical Vulnerability

    DTIC Science & Technology

    2013-05-02

    Reference&ItemId=+++1 499015&Pubabbrev=JC4IJ 45 “AURA Mobile Communications GPS/ WiFi Jammer”, Jane’s Police and Homeland Security Equipment, last...securityaffairs.co/wordpress/2845/ hacking /gps-spoofing- old-threat-and-new-problems.html 52“GPS Spoofing, Old Threat and New Problems”, Pierluigi...Paganini, Security Affairs, last modified February 23, 2012, http://securityaffairs.co/wordpress/2845/ hacking /gps-spoofing- old-threat-and-new

  18. Cybersecurity for Cardiac Implantable Electronic Devices: What Should You Know?

    PubMed

    Baranchuk, Adrian; Refaat, Marwan M; Patton, Kristen K; Chung, Mina K; Krishnan, Kousik; Kutyifa, Valentina; Upadhyay, Gaurav; Fisher, John D; Lakkireddy, Dhanunjaya R

    2018-03-20

    Medical devices have been targets of hacking for over a decade, and this cybersecurity issue has affected many types of medical devices. Lately, the potential for hacking of cardiac devices (pacemakers and defibrillators) claimed the attention of the media, patients, and health care providers. This is a burgeoning problem that our newly electronically connected world faces. In this paper from the Electrophysiology Section Council, we briefly discuss various aspects of this relatively new threat in light of recent incidents involving the potential for hacking of cardiac devices. We explore the possible risks for the patients and the effect of device reconfiguration in an attempt to thwart cybersecurity threats. We provide an outline of what can be done to improve cybersecurity from the standpoint of the manufacturer, government, professional societies, physician, and patient. Copyright © 2018 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  19. Deconvolution of subcellular protrusion heterogeneity and the underlying actin regulator dynamics from live cell imaging.

    PubMed

    Wang, Chuangqi; Choi, Hee June; Kim, Sung-Jin; Desai, Aesha; Lee, Namgyu; Kim, Dohoon; Bae, Yongho; Lee, Kwonmoo

    2018-04-27

    Cell protrusion is morphodynamically heterogeneous at the subcellular level. However, the mechanism of cell protrusion has been understood based on the ensemble average of actin regulator dynamics. Here, we establish a computational framework called HACKS (deconvolution of heterogeneous activity in coordination of cytoskeleton at the subcellular level) to deconvolve the subcellular heterogeneity of lamellipodial protrusion from live cell imaging. HACKS identifies distinct subcellular protrusion phenotypes based on machine-learning algorithms and reveals their underlying actin regulator dynamics at the leading edge. Using our method, we discover "accelerating protrusion", which is driven by the temporally ordered coordination of Arp2/3 and VASP activities. We validate our finding by pharmacological perturbations and further identify the fine regulation of Arp2/3 and VASP recruitment associated with accelerating protrusion. Our study suggests HACKS can identify specific subcellular protrusion phenotypes susceptible to pharmacological perturbation and reveal how actin regulator dynamics are changed by the perturbation.

  20. Little River revisited - thirty-five years after Hack and Goodlett

    USGS Publications Warehouse

    Osterkamp, W.R.; Hupp, C.R.; Schening, M.R.

    1995-01-01

    In possibly the first detailed study to relate geomorphology, vegetation, and hydrology at a watershed scale, Hack and Goodlett (1960) documented variation in the eastern forest with topographic positions of cove, side slope, and nose. The study also described effects on landforms and vegetation of a catastrophic flood that occurred in June, 1949. Field investigations, conducted nearly four decades later, review selected parts of the study by Hack and Goodlett (1960). Replicate data provide a basis to evaluate their interpretations, to document geomorphic change since the 1949 flood, and to identify vegetation change in uplands and bottomlands. Results suggest that change to hillslope landforms has been minor since 1949, but that changes have occurred, seemingly during flow events of 1952, 1955 and 1985. Change in areal extent of forest types was not detected. Change in the relative abundances of dominant species may have resulted from 20th century fire suppression. -from Authors

  1. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  2. Concepts, Diagnosis and the History of Medicine: Historicising Ian Hacking and Munchausen Syndrome.

    PubMed

    Millard, Chris

    2017-08-01

    Concepts used by historians are as historical as the diagnoses or categories that are studied. The example of Munchausen syndrome (deceptive presentation of illness in order to adopt the 'sick role') is used to explore this. Like most psychiatric diagnoses, Munchausen syndrome is not thought applicable across time by social historians of medicine. It is historically specific, drawing upon twentieth-century anthropology and sociology to explain motivation through desire for the 'sick role'. Ian Hacking's concepts of 'making up people' and 'looping effects' are regularly utilised outside of the context in which they are formed. However, this context is precisely the same anthropological and sociological insight used to explain Munchausen syndrome. It remains correct to resist the projection of Munchausen syndrome into the past. However, it seems inconsistent to use Hacking's concepts to describe identity formation before the twentieth century as they are given meaning by an identical context.

  3. Georgia’s Cyber Left Hook

    DTIC Science & Technology

    2009-01-01

    Relations for the Joint Task Force- Global Network Operations (JTF-GNO/ J5 ). He assists in development of cyber policy and strategy for operations and...History (Manchester, U.K: Manchester Univ. Press, 2000), 1. 10. See The Steamship Appam, 243 U.S. 124 (1917). 11. Jeffrey T. G. Kelsey, “ Hacking into...Arrest for Computer Hacking ,” news release, 1 October 2007, http://www.cybercrime.gov/kingIndict.pdf. 39. Grant Gross, “FBI: Several Nations Eyeing U.S

  4. Does 'hacking' surface type affect equine forelimb foot placement, movement symmetry or hoof impact deceleration during ridden walk and trot exercise?

    PubMed

    Barstow, A; Bailey, J; Campbell, J; Harris, C; Weller, R; Pfau, T

    2018-04-17

    Both pleasure and competition horses regularly exercise on surfaces such as tarmac, gravel and turf during 'hacking'. Despite this, there is limited evidence relating to the effect of these surfaces upon foot-surface interaction. To investigate forelimb foot placement, hoof vibration and movement symmetry in pleasure horses on three commonly encountered hacking surfaces. Quantitative gait study in a convenience sample. Six horses regularly partaking in hacking exercise were ridden in walk and trot on all surfaces. Horses were equipped with one hoof-mounted, accelerometer and four body-mounted inertial measurement units (IMUs) to measure foot impact and movement symmetry. High-speed (400 FPS) video footage of foot-placement was acquired (dorsal, palmar, lateral views). Foot-impact and movement symmetry were analysed with a mixed effects model and Bowker symmetry tests for foot-placement analysis. Vibration power and frequency parameters increase as perceived surface firmness increases from grass, to gravel, to tarmac (P≤0.001). Vibration power parameters were consistently greater at trot compared with walk (P≤0.001), but the same was not true for vibration frequency (P≥0.2). Greatest movement asymmetry was recorded during grass surface trotting. No significant difference in foot-placement was detected between the three surfaces. This was a field study using three commonly encountered hacking surfaces. Surface properties change easily with water content and temperature fluctuations so care must be taken when considering other similar surfaces, especially at different times of the year. Six leisure horses were used so the results may not be representative of horses of all types. Vibration parameters generally increase as perceived surface firmness increases. Increasing speed alters vibration power but not frequency. Further investigations are required to determine the role that this may play in the development of musculoskeletal disease in horses. © 2018 EVJ Ltd.

  5. Efficacy of ‘hack and squirt’ application of imazapyr, triclopyr, and glyphosate to control the invasive tree species Chinese tallowtree

    Treesearch

    Charles A. Gresham

    2010-01-01

    In May 2005, 12 plots approximately 21 by 27 m each were established on the exterior bank of a dredge spoil area in Georgetown, SC. The tree cover was primarily Chinese tallowtree, but there were also live oak trees in each plot. Also in May 2005, Chinese tallowtree s (d.b.h. > 2.4 cm) in three randomly selected plots received a ‘hack and squirt’ application of...

  6. Comparison of macroscopic and microscopic (stereomicroscopy and scanning electron microscopy) features of bone lesions due to hatchet hacking trauma.

    PubMed

    Nogueira, Luísa; Quatrehomme, Gérald; Bertrand, Marie-France; Rallon, Christophe; Ceinos, Romain; du Jardin, Philippe; Adalian, Pascal; Alunni, Véronique

    2017-03-01

    This experimental study examined the lesions produced by a hatchet on human bones (tibiae). A total of 30 lesions were produced and examined macroscopically (naked eye) and by stereomicroscopy. 13 of them were also analyzed using scanning electron microscopy. The general shape of the lesion, both edges, both walls, the kerf floor and the extremities were described. The length and maximum width of the lesions were also recorded. The microscopic analysis of the lesions led to the description of a sharp-blunt mechanism. Specific criteria were identified (lateral pushing back, fragmentation of the upraising, fossa dug laterally to the edge and vertical striae) enabling the forensic expert to conclude that a hacking instrument was used. These criteria are easily identifiable using scanning electron microscopy, but can also be observed with stereomicroscopy. Overall, lateral pushing back and vertical striae visible using stereomicroscopy and scanning electron microscopy signal the use of a hacking tool.

  7. Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants

    PubMed Central

    Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena

    2016-01-01

    Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings. PMID:27242491

  8. Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants.

    PubMed

    Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena

    2016-01-01

    Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders-attention to detail and systemizing-may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings.

  9. Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

    NASA Astrophysics Data System (ADS)

    Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan

    2014-10-01

    In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

  10. Less noise, more hacking: how to deploy principles from MIT's hacking medicine to accelerate health care.

    PubMed

    DePasse, Jacqueline W; Carroll, Ryan; Ippolito, Andrea; Yost, Allison; Santorino, Data; Chu, Zen; Olson, Kristian R

    2014-07-01

    Medical technology offers enormous potential for scalable medicine--to improve the quality and access in health care while simultaneously reducing cost. However, current medical device innovation within companies often only offers incremental advances on existing products, or originates from engineers with limited knowledge of the clinical complexities. We describe how the Hacking Medicine Initiative, based at Massachusetts Institute of Technology has developed an innovative "healthcare hackathon" approach, bringing diverse teams together to rapidly validate clinical needs and develop solutions. Hackathons are based on three core principles; emphasis on a problem-based approach, cross-pollination of disciplines, and "pivoting" on or rapidly iterating on ideas. Hackathons also offer enormous potential for innovation in global health by focusing on local needs and resources as well as addressing feasibility and cultural contextualization. Although relatively new, the success of this approach is clear, as evidenced by the development of successful startup companies, pioneering product design, and the incorporation of creative people from outside traditional life science backgrounds who are working with clinicians and other scientists to create transformative innovation in health care.

  11. Upconversion-based receivers for quantum hacking-resistant quantum key distribution

    NASA Astrophysics Data System (ADS)

    Jain, Nitin; Kanter, Gregory S.

    2016-07-01

    We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  12. Machine Tool Software

    NASA Technical Reports Server (NTRS)

    1988-01-01

    A NASA-developed software package has played a part in technical education of students who major in Mechanical Engineering Technology at William Rainey Harper College. Professor Hack has been using (APT) Automatically Programmed Tool Software since 1969 in his CAD/CAM Computer Aided Design and Manufacturing curriculum. Professor Hack teaches the use of APT programming languages for control of metal cutting machines. Machine tool instructions are geometry definitions written in APT Language to constitute a "part program." The part program is processed by the machine tool. CAD/CAM students go from writing a program to cutting steel in the course of a semester.

  13. Progress on white papers from the Demographic Hack Session at WiA IV

    NASA Astrophysics Data System (ADS)

    Norman, Dara J.; WiA IV Demographics Hack Session Attendees.

    2018-06-01

    At the Women in Astronomy IV meeting in June 2017, a number of white papers were started as part of the Demographic Hack session. Several of these white papers are intended for submission to the Decadal Survey on topics including, ‘Providing a Timely Review of Input Demographics to Advisory Committees’, and ‘Tying Research Funding to Progress in Inclusion’. In my talk, I will review the content of these white papers and the progress that has been made in writing them. Interested session attendees are encouraged ‘endorse’ the papers by becoming signatories.

  14. p-hacking by post hoc selection with multiple opportunities: Detectability by skewness test?: Comment on Simonsohn, Nelson, and Simmons (2014).

    PubMed

    Ulrich, Rolf; Miller, Jeff

    2015-12-01

    Simonsohn, Nelson, and Simmons (2014) have suggested a novel test to detect p-hacking in research, that is, when researchers report excessive rates of "significant effects" that are truly false positives. Although this test is very useful for identifying true effects in some cases, it fails to identify false positives in several situations when researchers conduct multiple statistical tests (e.g., reporting the most significant result). In these cases, p-curves are right-skewed, thereby mimicking the existence of real effects even if no effect is actually present. (c) 2015 APA, all rights reserved).

  15. Optimised quantum hacking of superconducting nanowire single-photon detectors

    NASA Astrophysics Data System (ADS)

    Tanner, Michael G.; Makarov, Vadim; Hadfield, Robert H.

    2014-03-01

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  16. Macroscopic and stereomicroscopic comparison of hacking trauma of bones before and after carbonization.

    PubMed

    Alunni, Véronique; Nogueira, Luísa; Quatrehomme, Gérald

    2018-03-01

    This experimental study examined lesions produced by a hatchet on pig femurs before and after carbonization. A total of 30 lesions were produced and analyzed using stereomicroscopy and then reexamined after carbonization. Not only was the sharp-blunt mechanism of the hacking trauma (V-shape, regularity of one edge, irregularity of the other edge, upraising, lateral pushing back, fossae dug laterally to the edge) still recognizable after carbonization; in some instances, the carbonization actually enhanced the features observed. Carbonization also did not significantly alter the measurements of the lesions. Carbonization tends to alter the structure of the bone especially in areas weakened by the blunt trauma.

  17. Optimised quantum hacking of superconducting nanowire single-photon detectors.

    PubMed

    Tanner, Michael G; Makarov, Vadim; Hadfield, Robert H

    2014-03-24

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  18. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    PubMed

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  19. Editing Transgenic DNA Components by Inducible Gene Replacement in Drosophila melanogaster

    PubMed Central

    Lin, Chun-Chieh; Potter, Christopher J.

    2016-01-01

    Gene conversions occur when genomic double-strand DNA breaks (DSBs) trigger unidirectional transfer of genetic material from a homologous template sequence. Exogenous or mutated sequence can be introduced through this homology-directed repair (HDR). We leveraged gene conversion to develop a method for genomic editing of existing transgenic insertions in Drosophila melanogaster. The clustered regularly-interspaced palindromic repeats (CRISPR)/Cas9 system is used in the homology assisted CRISPR knock-in (HACK) method to induce DSBs in a GAL4 transgene, which is repaired by a single-genomic transgenic construct containing GAL4 homologous sequences flanking a T2A-QF2 cassette. With two crosses, this technique converts existing GAL4 lines, including enhancer traps, into functional QF2 expressing lines. We used HACK to convert the most commonly-used GAL4 lines (labeling tissues such as neurons, fat, glia, muscle, and hemocytes) to QF2 lines. We also identified regions of the genome that exhibited differential efficiencies of HDR. The HACK technique is robust and readily adaptable for targeting and replacement of other genomic sequences, and could be a useful approach to repurpose existing transgenes as new genetic reagents become available. PMID:27334272

  20. A consistent framework for Horton regression statistics that leads to a modified Hack's law

    USGS Publications Warehouse

    Furey, P.R.; Troutman, B.M.

    2008-01-01

    A statistical framework is introduced that resolves important problems with the interpretation and use of traditional Horton regression statistics. The framework is based on a univariate regression model that leads to an alternative expression for Horton ratio, connects Horton regression statistics to distributional simple scaling, and improves the accuracy in estimating Horton plot parameters. The model is used to examine data for drainage area A and mainstream length L from two groups of basins located in different physiographic settings. Results show that confidence intervals for the Horton plot regression statistics are quite wide. Nonetheless, an analysis of covariance shows that regression intercepts, but not regression slopes, can be used to distinguish between basin groups. The univariate model is generalized to include n > 1 dependent variables. For the case where the dependent variables represent ln A and ln L, the generalized model performs somewhat better at distinguishing between basin groups than two separate univariate models. The generalized model leads to a modification of Hack's law where L depends on both A and Strahler order ??. Data show that ?? plays a statistically significant role in the modified Hack's law expression. ?? 2008 Elsevier B.V.

  1. Development of a turn-key cloud chamber in collaboration with non-academic science enthusiasts

    NASA Astrophysics Data System (ADS)

    Muenkel, Jessica; Harrington, Meghan; Bellis, Matthew; Waldman, Ariel; Bergey, Nathan; Cooper, Ivan; Bombosch, Juliane

    2014-03-01

    Science Hack Day is an event that brings together scientists and science enthusiasts for 24 hours to ``hack'' a science project. These events serve two purposes. The first and most obvious is to provide a structured environment for science outreach. Academics and researchers have the opportunity for ``boots-on-the-ground'' interactions with the general public. The second purpose, though more challenging, is to enable science enthusiasts to donate their skills so that they are able to push back to educators and researchers in a fashion that that benefits their work. We discuss our experiences at the 2013 San Francisco Science Hack Day at the California Academy of Sciences. We worked with attendees of the conference to create a cloud chamber that worked with Peltier thermocoolers, rather than dry ice. In this fashion, we educated attendees about radiation and particle physics, while also benefitting from the experience and knowledge of the attendees in constructing the device. This ``turn-key'' cloud chamber is now in use at Siena College as an outreach and educational device. The properties of this device and the story of its construction will be presented. Representing CMS.

  2. Quantum key distribution with hacking countermeasures and long term field trial.

    PubMed

    Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J

    2017-05-16

    Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.

  3. The Role of Technologies, Behaviors, Gender, and Gender Stereotype Traits in Adolescents' Cyber Aggression.

    PubMed

    Wright, Michelle F

    2017-03-01

    The present study focused on the impact of gender and gender stereotype traits (i.e., masculinity, femininity) on cyber aggression perpetration utilizing different technologies (i.e., social-networking sites, gaming consoles, mobile phones) and behaviors (i.e., cyber relational aggression, cyber verbal aggression, hacking). Participants included 233 eighth graders (108 female; M age = 13.26, SD = 0.36) from two middle schools in the Midwestern United States. Adolescents completed questionnaires on their endorsement of masculinity and femininity traits as well as how often they engaged in cyber aggression perpetration (i.e., cyber relational aggression, cyber verbal aggression, hacking) through mobile phones, social-networking sites, and gaming consoles. Findings indicated that boys and girls with more feminine traits engaged in more cyber relational aggression through social-networking sites and mobile phones, while boys and girls who endorsed more masculine traits perpetrated this behavior and cyber verbal aggression more often through online gaming. In addition, these boys and girls engaged in more hacking through all technologies when compared with girls and boys who reported more feminine traits. Results of this study indicate the importance of delineating gender stereotype traits, behaviors, and technologies when examining cyber aggression perpetration.

  4. Hackathons as A Capacity Building Tool for Environmental Applications

    NASA Astrophysics Data System (ADS)

    Bye, B. L.; Mildorf, T.; Charvat, K.; Berre, A. J.

    2017-12-01

    Today's society requires easy, reliable and quick access to environmental information published by various organizations and initiatives. The environment questions require many activities that produce various sorts of data; by authorities through operation of instruments such as satellites, and through informal local and community activities producing videos, photos or oral stories. The collected information can contribute to up-to-date data. Volunteered geographic information (VGI) is the harnessing of tools to create, assemble, and disseminate geographic data provided voluntarily by individuals. Under the INSPIRE (Infrastructure for spatial information in Europe) umbrella, a number of EU projects co-organize hackathons - the INSPIRE Hack. The INSPIRE Hack focuses on methods where citizens are able to contribute to different environmental and societal issues through smart phones and other sensors. The INSPIRE Hack supports creativity, innovation, technical capabilities and knowledge sharing by combining open data, VGI, and data from citizens observatories or other citizen science activities. This presentation offer a capacity building perspective on the INSPIRE hackathons, the co-design aspects and the argility with respect to the accelerating technological and social innovations, and effective up-take in societal use. Starting in Europe, the concept can be broadened to encompass all continents.

  5. Acute loading and aging effects on myostatin pathway biomarkers in human skeletal muscle after three sequential bouts of resistance exercise.

    PubMed

    Dalbo, Vincent J; Roberts, Michael D; Sunderland, Kyle L; Poole, Chris N; Stout, Jeff R; Beck, Travis W; Bemben, Mike; Kerksick, Chad M

    2011-08-01

    To determine the influence of age and resistance exercise on myostatin pathway-related genes, younger (n = 10; 28 ± 5 years) and older (n = 10; 68 ± 6 years) men underwent four testing conditions (T1-T4). A baseline (T1) muscle sample was obtained, whereas the second and third biopsies were obtained 48 hours following the first and second training sessions (T2, T3), and a final biopsy was taken 24 hours following T3. The training sessions consisted of 3 sets of 10 repetitions (80% of one repetition maximum) on leg press, hack squat, and leg extension exercises. Follistatin (FST) messenger RNA was greater in older compared with younger men at T1 and T2 (p < .05). Follistatin-like 3 (FSTL3) messenger RNA was greater in older compared with younger men at T1 and T4 (p < .05). In older men, there was a significant decrease in myostatin (MSTN) messenger RNA at T4 (p < .05). Older men contained less active (Ser-425 phosphorylated) SMAD3 (p-SMAD3) protein than younger men at T3 and T4 (p < .05).Although it is well known that younger individuals possess a greater hypertrophic potential to resistance exercise, it appears that older individuals may paradoxically possess a more favorable resistance exercise response regarding myostatin pathway-related genes and a protein marker of pathway activity. Future research is warranted to examine the physiological significance of this age-dependent mechanism.

  6. Hacked E-mail

    MedlinePlus

    ... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Limiting Unwanted Calls and Emails Online Security "Free" Security Scans Computer Security Disposing of Old Computers ...

  7. Hack the Planet: What we Talk About When we Talk About Geoengineering

    NASA Astrophysics Data System (ADS)

    Kintisch, E.

    2010-12-01

    Hack the Planet (Wiley, 2010) explores how an idea once basically anathema to meetings like AGU has, in the space of a few years, become part of the geoscience mainstream. Through chapters involving researchers like David Battisti, Stephen Salter, Edward Teller and Brent Constanz the book documents the roots of this shift and how scientists are breaking new ground in the controversial field. And it shows how trying to engineer the planet's climate or manage its carbon poses novel scientific, geopolitical and moral risks and rewards. This session will cover how the topic of climate engineering has moved from something geoscientists don't talk about to something geoscientists can talk about, to something, in my view, that geoscientists must talk about.

  8. The Online Underworld.

    ERIC Educational Resources Information Center

    Scrogan, Len

    1988-01-01

    Discusses some of the misuses of telecommunicating using school computers, including online piracy, hacking, phreaking, online crime, and destruction boards. Suggests ways that schools can deal with these problems. (TW)

  9. Hacked off.

    PubMed

    1988-05-28

    The new book on occupational health for nurses called Nurses At Risk written by [illegible word] Salvage, former Nursing Standard journalist and Rosemary Rogers, currently our Clinical News Editor, received widespread press coverage.

  10. Examining publication bias—a simulation-based evaluation of statistical tests on publication bias

    PubMed Central

    2017-01-01

    Background Publication bias is a form of scientific misconduct. It threatens the validity of research results and the credibility of science. Although several tests on publication bias exist, no in-depth evaluations are available that examine which test performs best for different research settings. Methods Four tests on publication bias, Egger’s test (FAT), p-uniform, the test of excess significance (TES), as well as the caliper test, were evaluated in a Monte Carlo simulation. Two different types of publication bias and its degree (0%, 50%, 100%) were simulated. The type of publication bias was defined either as file-drawer, meaning the repeated analysis of new datasets, or p-hacking, meaning the inclusion of covariates in order to obtain a significant result. In addition, the underlying effect (β = 0, 0.5, 1, 1.5), effect heterogeneity, the number of observations in the simulated primary studies (N = 100, 500), and the number of observations for the publication bias tests (K = 100, 1,000) were varied. Results All tests evaluated were able to identify publication bias both in the file-drawer and p-hacking condition. The false positive rates were, with the exception of the 15%- and 20%-caliper test, unbiased. The FAT had the largest statistical power in the file-drawer conditions, whereas under p-hacking the TES was, except under effect heterogeneity, slightly better. The CTs were, however, inferior to the other tests under effect homogeneity and had a decent statistical power only in conditions with 1,000 primary studies. Discussion The FAT is recommended as a test for publication bias in standard meta-analyses with no or only small effect heterogeneity. If two-sided publication bias is suspected as well as under p-hacking the TES is the first alternative to the FAT. The 5%-caliper test is recommended under conditions of effect heterogeneity and a large number of primary studies, which may be found if publication bias is examined in a discipline-wide setting when primary studies cover different research problems. PMID:29204324

  11. Learning about Alpha-1 Antitrypsin Deficiency (AATD)

    MedlinePlus

    ... Tests Genomics and Health Disparities Genetic Discrimination Human Subjects Research Informed Consent for Genomics Research Intellectual Property ... the lungs are damaged. Symptoms of emphysema include difficulty breathing, a hacking cough and a barrel-shaped ...

  12. Hacking on decoy-state quantum key distribution system with partial phase randomization

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  13. Better P-curves: Making P-curve analysis more robust to errors, fraud, and ambitious P-hacking, a Reply to Ulrich and Miller (2015).

    PubMed

    Simonsohn, Uri; Simmons, Joseph P; Nelson, Leif D

    2015-12-01

    When studies examine true effects, they generate right-skewed p-curves, distributions of statistically significant results with more low (.01 s) than high (.04 s) p values. What else can cause a right-skewed p-curve? First, we consider the possibility that researchers report only the smallest significant p value (as conjectured by Ulrich & Miller, 2015), concluding that it is a very uncommon problem. We then consider more common problems, including (a) p-curvers selecting the wrong p values, (b) fake data, (c) honest errors, and (d) ambitiously p-hacked (beyond p < .05) results. We evaluate the impact of these common problems on the validity of p-curve analysis, and provide practical solutions that substantially increase its robustness. (c) 2015 APA, all rights reserved).

  14. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    PubMed

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  15. Metal accumulation in the greentail prawn, Metapenaeus bennettae, in Sydney and Port Hacking estuaries, Australia.

    PubMed

    Lewtas, K L M; Birch, G F; Foster-Thorpe, C

    2014-01-01

    Metal concentrations of the inshore greentail prawn, Metapenaeus bennettae, and surface sediments from locations within Sydney estuary and Port Hacking (Australia) were assessed for bioaccumulation and contamination. The current study aimed to assess metal concentrations in prawn tissue (tail muscle, exoskeleton, hepatopancreas and gills), relate whole body prawn tissue metal concentrations to sediment metal concentrations and animal size, as well as assess prawn consumption as a risk to human health. Metal concentrations were highest in sediment and prawns from contaminated locations (Iron Cove, Hen and Chicken Bay and Lane Cove) in Sydney estuary compared with the reference estuary (Port Hacking). Concentrations in sediments varied considerably between sites and between metals (As, Cd, Cr, Cu, Ni, Pb and Zn), and although concentrations exceeded Interim Sediment Quality Guideline-Low values, metals (As, Cd, Cr, Cu, Ni, Pb and Zn) were below Australian National Health and Medical Research Council human consumption guidelines in prawn tail muscle tissue. Metal concentrations in prawn tail muscle tissue were significantly different (p ≤ 0.05) amongst locations for Pb, Zn and Cd, and metal concentrations were generally highest in gills tissue, followed by the hepatopancreas, exoskeleton and tail muscle. The exoskeleton contained the highest Sr concentration; the hepatopancreas contained the highest As, Cu and Mo concentrations; and the gills contained the highest Al, Cr, Fe and Pb concentrations. Concentrations of Pb, As and Sr were significantly different (p ≤ 0.05) between size groups amongst locations.

  16. Hacking the quantum revolution: 1925-1975

    NASA Astrophysics Data System (ADS)

    Schweber, Silvan S.

    2015-01-01

    I argue that the quantum revolution should be seen as an Ian Hacking type of scientific revolution: a profound, longue durée, multidisciplinary process of transforming our understanding of physical nature, with deep-rooted social components from the start. The "revolution" exhibits a characteristic style of reasoning - the hierarchization of physical nature - and developed and uses a specific language - quantum field theory (QFT). It is by virtue of that language that the quantum theory has achieved some of its deepest insights into the description of the dynamics of the physical world. However, the meaning of what a quantum field theory is and what it describes has deeply altered, and one now speaks of "effective" quantum field theories. Interpreting all present day quantum field theories as but "effective" field theories sheds additional light on Phillip Anderson's assertion that "More is different". This important element is addressed in the last part of the paper.

  17. Hacking for astronomy: can 3D printers and open-hardware enable low-cost sub-/millimeter instrumentation?

    NASA Astrophysics Data System (ADS)

    Ferkinhoff, Carl

    2014-07-01

    There have been several exciting developments in the technologies commonly used n in the hardware hacking community. Advances in low cost additive-manufacturing processes (i.e. 3D-printers) and the development of openhardware projects, which have produced inexpensive and easily programmable micro-controllers and micro-computers (i.e. Arduino and Raspberry Pi) have opened a new door for individuals seeking to make their own devices. Here we describe the potential for these technologies to reduce costs in construction and development of submillimeter/millimeter astronomical instrumentation. Specifically we have begun a program to measure the optical properties of the custom plastics used in 3D-printers as well as the printer accuracy and resolution to assess the feasibility of directly printing sub- /millimeter transmissive optics. We will also discuss low cost designs for cryogenic temperature measurement and control utilizing Arduino and Raspberry Pi.

  18. NPF MECHANICAL CELL NaK DISPOSAL AND FUME ABATEMENT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rey, G.

    Some of the fuels originally scheduled for processing in the nonproduction fuel (NPF) processing program incorporated sodium or sodium- potassium alloy (NaK) as the bonding material between stainless-steel cladding and the uranium or uranium-molybdenum alloy core. Because of the special hazards involved in handling NaK, studies were made to determine safe methods for processing NaK-containing fuels. An underwater NaK dispensing system was installed, and tests were made to determine the characteristics of the NaK-water reaction. The equipment consisted of a dispenser, reaction pan, and off-gas scrubber. After initinl studies, a prototype test was made wherein U-Mo canned slugs containing NaKmore » reservoirs were hack sawed underwater. The studies demonstrated that the NaK reservoirs can be safely deactivated by hack sawing under a submerged hood in a shallow water bath. (W.L.H.)« less

  19. Informocracy.

    ERIC Educational Resources Information Center

    Hauptman, Robert

    2001-01-01

    Considers problems that have arisen with the vast quantities of information available as a result of the popularity of computers. Topics include inequity; capitalism, commodification, and privatization; hacking, privacy, and fraud; censorship; monitoring and surveillance; cyberethics; and integrity in an age of electronic communication. (LRW)

  20. Pulmonary Fibrosis

    MedlinePlus

    ... and your blood may not get enough oxygen. Causes of pulmonary fibrosis include environmental pollutants, some medicines, some connective tissue ... or scar the lungs. In most cases, the cause cannot be found. This is called ... fibrosis. Symptoms include Shortness of breath A dry, hacking ...

  1. Python in Astronomy 2016 Unproceedings

    NASA Astrophysics Data System (ADS)

    Robitaille, Thomas; Cruz, Kelle; Greenfield, Perry; Jeschke, Eric; Juric, Mario; Mumford, Stuart; Prescod-Weinstein, Chanda; Sosey, Megan; Tollerud, Erik; VanderPlas, Jake; Ford, Jes; Foreman-Mackey, Dan; Jenness, Tim; Aldcroft, Tom; Alexandersen, Mike; Bannister, Michele; Barbary, Kyle; Barentsen, Geert; Bennett, Samuel; Boquien, Médéric; Campos Rozo, Jose Ivan; Christe, Steven; Corrales, Lia; Craig, Matthew; Deil, Christoph; Dencheva, Nadia; Donath, Axel; Douglas, Stephanie; Ferreira, Leonardo; Ginsburg, Adam; Goldbaum, Nathan; Gordon, Karl; Hearin, Andrew; Hummels, Cameron; Huppenkothen, Daniela; Jennings, Elise; King, Johannes; Lawler, Samantha; Leonard, Andrew; Lim, Pey Lian; McBride, Lisa; Morris, Brett; Nunez, Carolina; Owen, Russell; Parejko, John; Patel, Ekta; Price-Whelan, Adrian; Ruggiero, Rafael; Sipocz, Brigitta; Stevens, Abigail; Turner, James; Tuttle, Sarah; Yanchulova Merica-Jones, Petia; Yoachim, Peter

    2016-03-01

    This document provides proceedings for unconference sessions as well as hacks/sprints which took place at the Python in Astronomy 2016 workshop, which was held at the University of Washington eScience Institute in Seattle from March 21st to 25th 2016.

  2. Intelligence, Information Technology, and Information Warfare.

    ERIC Educational Resources Information Center

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  3. Registration of 'hammock' centipedegrass.

    USDA-ARS?s Scientific Manuscript database

    ‘Hammock’ (Reg. No. ________, PI 652949) centipedegrass [Eremochloa ophiuroides (Munro) Hack] was developed at the Everglades Research and Education Center, IFAS, University of Florida, Belle Glade, FL and initially approved for release in 2006. A plant patent was filed in 2008 with Plant Patent PP...

  4. Police close unsolved 'climategate' investigation

    NASA Astrophysics Data System (ADS)

    Lavender, Gemma

    2012-09-01

    Police in Norfolk in the UK have closed an investigation into the hacking of e-mails at the University of East Anglia's Climate Research Unit (CRU) after admitting that they will not be able to find the hackers who broke into CRU computer servers.

  5. The Cybersecurity Challenge in Acquisition

    DTIC Science & Technology

    2016-04-30

    problems. Scarier yet, another group took control of a car’s computers through a cellular telephone and Bluetooth connections and could access...did more extensive work, hacking their way into a 2009 midsize car through its cellular, Bluetooth , and other wireless connections. Stefan Savage, a

  6. Hacking Facebook Privacy and Security

    DTIC Science & Technology

    2012-08-28

    that their information is somehow protected. However, practically this is not always the case and privacy on social networking sites has received...fraudsters target Facebook and other social networking sites to harvest information about you. Here’s how we recommend you set your Facebook privacy

  7. Inter-relationship between scaling exponents for describing self-similar river networks

    NASA Astrophysics Data System (ADS)

    Yang, Soohyun; Paik, Kyungrock

    2015-04-01

    Natural river networks show well-known self-similar characteristics. Such characteristics are represented by various power-law relationships, e.g., between upstream length and drainage area (exponent h) (Hack, 1957), and in the exceedance probability distribution of upstream area (exponent ɛ) (Rodriguez-Iturbe et al., 1992). It is empirically revealed that these power-law exponents are within narrow ranges. Power-law is also found in the relationship between drainage density (the total stream length divided by the total basin area) and specified source area (the minimum drainage area to form a stream head) (exponent η) (Moussa and Bocquillon, 1996). Considering that above three scaling relationships all refer to fundamental measures of 'length' and 'area' of a given drainage basin, it is natural to hypothesize plausible inter-relationship between these three scaling exponents. Indeed, Rigon et al. (1996) demonstrated the relationship between ɛ and h. In this study, we expand this to a more general ɛ-η-h relationship. We approach ɛ-η relationship in an analytical manner while η-h relationship is demonstrated for six study basins in Korea. Detailed analysis and implications will be presented. References Hack, J. T. (1957). Studies of longitudinal river profiles in Virginia and Maryland. US, Geological Survey Professional Paper, 294. Moussa, R., & Bocquillon, C. (1996). Fractal analyses of tree-like channel networks from digital elevation model data. Journal of Hydrology, 187(1), 157-172. Rigon, R., Rodriguez-Iturbe, I., Maritan, A., Giacometti. A., Tarboton, D. G., & Rinaldo, A. (1996). On Hack's Law. Water Resources Research, 32(11), 3367-3374. Rodríguez-Iturbe, I., Ijjasz-Vasquez, E. J., Bras, R. L., & Tarboton, D. G. (1992). Power law distributions of discharge mass and energy in river basins. Water Resources Research, 28(4), 1089-1093.

  8. Inadvertent P-hacking among trials and systematic reviews of the effect of progestogens in pregnancy? A systematic review and meta-analysis.

    PubMed

    Prior, M; Hibberd, R; Asemota, N; Thornton, J G

    2017-06-01

    Progestogens have been evaluated in numerous trials and meta-analyses, many of which concluded they were effective. However, two large trials PROMISE and OPPTIMUM have recently concluded that progesterone was ineffective. This raises the possibility that earlier studies and reviews had been biased by either selective publication or selective choice of outcomes, so called "P-hacking". To compare the findings all progestogen trials and systematic reviews with those of trials with pre-registered primary outcomes which avoided selective outcome reporting. Search of PubMed, the Cochrane Library and trial registries. Registration PROSPERO CRD42016035303. Systematic reviews of randomised trials comparing progestogen with placebo in pregnancy and the individual trials included in those reviews. The subset of trials reporting a pre-registered primary outcome were compared with the totality of trials and reviews. For reviews all outcomes were included. For individual trials all outcomes reported in the systematic reviews were included. For the comparison group we recorded the registered primary outcome from trials that were either registered before they started, or registered during the recruitment phase and also double blind. Nineteen of twenty-nine meta-analyses concluded that progestogens were effective. Twenty-two trials reported their pre-registered primary outcomes. There was no effect of progesterone on primary registered dichotomous outcome RR 1.00 (95% CI 0.94-1.07). Only one of the 22 showed a nominally statistically significant benefit. When evaluated in registered double-blind trials with analysis restricted to predefined primary outcomes, progestational agents in pregnancy are ineffective. Progestogens to prevent pregnancy loss, an example of P-hacking. © 2017 Royal College of Obstetricians and Gynaecologists.

  9. Meta-analyses and p-curves support robust cycle shifts in women's mate preferences: reply to Wood and Carden (2014) and Harris, Pashler, and Mickes (2014).

    PubMed

    Gildersleeve, Kelly; Haselton, Martie G; Fales, Melissa R

    2014-09-01

    Two meta-analyses evaluated shifts across the ovulatory cycle in women's mate preferences but reported very different findings. In this journal, we reported robust evidence for the pattern of cycle shifts predicted by the ovulatory shift hypothesis (Gildersleeve, Haselton, & Fales, 2014). However, Wood, Kressel, Joshi, and Louie (2014) claimed an absence of compelling support for this hypothesis and asserted that the few significant cycle shifts they observed were false positives resulting from publication bias, p-hacking, or other research artifacts. How could 2 meta-analyses of the same literature reach such different conclusions? We reanalyzed the data compiled by Wood et al. These analyses revealed problems in Wood et al.'s meta-analysis-some of which are reproduced in Wood and Carden's (2014) comment in the current issue of this journal-that led them to overlook clear evidence for the ovulatory shift hypothesis in their own set of effects. In addition, we present right-skewed p-curves that directly contradict speculations by Wood et al.; Wood and Carden; and Harris, Pashler, and Mickes (2014) that supportive findings in the cycle shift literature are false positives. Therefore, evidence from both of the meta-analyses and the p-curves strongly supports genuine, robust effects consistent with the ovulatory shift hypothesis and contradicts claims that these effects merely reflect publication bias, p-hacking, or other research artifacts. Unfounded speculations about p-hacking distort the research record and risk unfairly damaging researchers' reputations; they should therefore be made only on the basis of firm evidence. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  10. Hacking DNA copy number for circuit engineering.

    PubMed

    Wu, Feilun; You, Lingchong

    2017-07-27

    DNA copy number represents an essential parameter in the dynamics of synthetic gene circuits but typically is not explicitly considered. A new study demonstrates how dynamic control of DNA copy number can serve as an effective strategy to program robust oscillations in gene expression circuits.

  11. Computer Abuse: Vandalizing the Information Society.

    ERIC Educational Resources Information Center

    Furnell, Steven M.; Warren, Matthew J.

    1997-01-01

    Computing and telecommunications, key to an information-based society, are increasingly targets for criminals and mischief makers. This article examines the effects of malicious computer abuse: hacking and viruses, highlights the apparent increase in incidents, and examines their effect on public perceptions of technology. Presents broad…

  12. Future Operating Concept - Joint Computer Network Operations

    DTIC Science & Technology

    2010-02-17

    into the system‖ at a later date by circumventing the need for access privileges 3. Cyberwarfare Tools 67 • Social Engineering • Hacking ...Forces Command, Joint Operating Environment 2008, November 2008https://us.jfcom.mil/sites/ J5 /j59/default.aspx VIII Appendix V

  13. Potential highwall use by raptors in coal mine reclamation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Waage, B.

    In 1982, Western Energy Company`s Rosebud Mine, located in southeastern Montana, received legal exception, {open_quotes}a first{close_quotes} in Montana to leave a standing mine highwall extending a native bluff. This bluff extension stands 110 feet high and 900 feet long. Normally, all highwalls by law are reduced to a 5:1 slope. This legal exception was accomplished with the support of several governmental agencies and was justified on the highwalls potential value for raptors. Enhancement measures undertaken on the highwall included the construction of three artificial eryies and the release of young prairie falcons (Falco mexicanus) employing hacking methods of the Peregrinemore » Fund. The hack is now in its fourth year with a total of 46 young falcons having been released. Opportunities exist for creating a more diverse habitat for raptors and other cliff obligate species on reclaimed mine lands in the west. It is believed that this practical approach should be explored.« less

  14. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.

    PubMed

    King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S

    2018-05-01

    As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.

  15. The Period of 2167 Erin

    NASA Astrophysics Data System (ADS)

    Montigiana, N.; Benedetti, W.; Mannucci, M.; Riccetti, S.

    2008-09-01

    Analysis of data taken in March and April 2007 by groups from Osservatorio Astronomico Margherita Hack and the University of Wisconsin-Eau Claire indicates a likely period of 5.7186 ± 0.0001 h for 2167 Erin. The amplitude of the lightcurve was 0.53 ± 0.02 mag.

  16. Radio Frequency Based Programmable Logic Controller Anomaly Detection

    DTIC Science & Technology

    2013-09-01

    include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques

  17. Toward Realistic Acquisition Schedule Estimates

    DTIC Science & Technology

    2016-04-30

    Harrier successor. NASA and the UK both participated in this effort. It was merged by Congress with JAST in mid-1994.  CALF (Common Affordable...5th Generation revolution in military aviation. Space Daily. Sternstein, A. (2015, April 27). Here’s how you hack a military drone. Next Gov

  18. Teachers as Hackers: Implications for 21st Century Teacher Education

    ERIC Educational Resources Information Center

    Wizel, Maya

    2017-01-01

    This qualitative study introduces a new framework for describing teachers who act innovatively in public schools--teachers as "hackers." It examines the characteristics and conditions under which teachers "hack" their classroom pedagogy to create disruptive innovation in the public education system and identify implications for…

  19. Bit by Bit: Using Design-Based Research to Improve the Health Literacy of Adolescents

    PubMed Central

    St. Jean, Beth; Taylor, Natalie Greene; Kodama, Christie; Follman, Rebecca; Casciotti, Dana

    2015-01-01

    Background Although a low health literacy level has been found to be among the most powerful predictors of poor health outcomes, there is very little research focused on assessing and improving the health literacy skills of adolescents, particularly those from socioeconomically disadvantaged backgrounds. The vast majority of existing research focuses solely on reading comprehension, despite the fact that health literacy is actually a multifaceted concept, which entails many different types of skills. Objective The aim of this paper is to first mine existing literature to identify the many different skills that have been posited to constitute health literacy, and then, using this collection of skills as an overarching structure, to highlight the challenges that disadvantaged youth participating in our HackHealth after-school program encounter as they identify and articulate their health-related information needs, search for health-related information online, assess the relevance and credibility of this information, and manage and make use of it. Methods We utilized the design-based research method to design, implement, and revise our HackHealth program. To collect data regarding HackHealth participants’ health literacy skills and associated challenges, we used a variety of methods, including participant observation, surveys, interviews, focus groups, and logging of Web browser activities. We also collected data through specialized instructional activities and data collection forms that we developed for this purpose. Quantitative and qualitative techniques were used to analyze this data, as well as all of the artifacts that each student produced, including their final projects. Results We identified the various challenges that the 30 HackHealth participants faced in completing various health-related information activities during the course of the program. Based on these findings, we describe important implications for working with youth from socioeconomically disadvantaged backgrounds, how to assess and improve their health literacy skills, and offer specific recommendations for health literacy instruction aimed at this population. Conclusions With an increased societal focus on health and a shift from viewing patients as passive recipients of medical care to viewing them as active arbiters of their own health, today’s youth need to possess an array of health literacy skills to ensure that they can live long and healthy lives. Working with adolescents to help them develop and practice these skills will also help to break the cycle between poor health literacy and poor health outcomes, thereby reducing health disparities and improving the long-term outlook for the health of our nation. PMID:26025101

  20. Peter Hacke | NREL

    Science.gov Websites

    photovoltaic (PV) modules, inspections for root cause of module failures in the field, and accelerated lifetime delamination. His research interests are in modeling of degradation processes of PV modules, module integrated analysis of PV degradation data. He also explores accelerated multi-stress and combined stress testing to

  1. Hack City Summer: Computer Camps Can Bring a Vacation of Keyboard Delights.

    ERIC Educational Resources Information Center

    Shell, Ellen Ruppel

    1983-01-01

    Activities at a summer computer camp (Camp Atari held at East Stroudsburg State College PA) are described. The curriculum, using logic, systematic analysis, and other fundamental programing skills, teaches students to interact effectively and creatively with computers. Sources for finding a computer camp are included. (JN)

  2. Breach to Nowhere

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2009-01-01

    Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…

  3. THE INFORMATION BATTLESPACE: A LEVEL PLAYING FIELD FOR THE ASYMMETRIC FOE

    DTIC Science & Technology

    2016-02-01

    America” to carry out attacks on those listed.7 Despite ISIS claims that the list had been obtained via hacking by an advanced, tech-savvy division... Facebook , YouTube and Twitter. Many general officers maintain personal social media accounts that they personally use to communicate with multiple

  4. Hacking Say and Reviving ELIZA: Lessons from Virtual Environments

    ERIC Educational Resources Information Center

    Mazar, Rochelle; Nolan, Jason

    2009-01-01

    As text-based predecessors to Second Life, MOOs can offer educators important insights on managing virtual communities to create rich, meaningful learning experiences. Rochelle Mazar and Jason Nolan outline two instructional experiments in MOOs that have implications for current educational practice in Second Life. One involves modifying and…

  5. The Classroom, Board Room, Chat Room, and Court Room: School Computers at the Crossroads.

    ERIC Educational Resources Information Center

    Stewart, Michael

    2000-01-01

    In schools' efforts to maximize technology's benefits, ethical considerations have often taken a back seat. Computer misuse is growing exponentially and assuming many forms: unauthorized data access, hacking, piracy, information theft, fraud, virus creation, harassment, defamation, and discrimination. Integrated-learning activities will help…

  6. Right and Wrong Online. Teaching Your Children Ethics in Cyberspace.

    ERIC Educational Resources Information Center

    Our Children, 1998

    1998-01-01

    Parents must describe and reinforce the importance of truthfulness, responsibility, and respect when their children use the Internet. The paper presents potential situations that could arise and discusses issues related to the law online, copyrighted materials, copying or distributing software, privacy, hacking, and obscenity. A sidebar offers…

  7. Using Bloom's and Webb's Taxonomies to Integrate Emerging Cybersecurity Topics into a Computing Curriculum

    ERIC Educational Resources Information Center

    Harris, Mark A.; Patten, Karen P.

    2015-01-01

    Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…

  8. Hacked Landscapes: Tensions, Borders, and Positionality in Spatial Literacy

    ERIC Educational Resources Information Center

    Schmidt, Sandra J.

    2017-01-01

    By focusing on critical geographies, landscape, and spatial literacy, this article evaluates a semester-long spatial justice project conducted in a preservice teacher education program. The analysis recognizes the limitations of reading the products literally as a means of comprehending spatial representation. It expands the analysis by hacking…

  9. Workshop Report: The Future of ROK Navy-US Navy Cooperation

    DTIC Science & Technology

    2007-10-01

    vulnerability also increases. Cyber attacks to paralyze information and communication systems through hacking , virus attacks on computers, and jamming...Pacific Fleet (N5) 250 Makalpa Dr. Pearl Harbor, HI 96860-7000 Ms. Ariane L. Whitemore Chief of Staff, Strategic Planning and Policy HQ USPACOM/ J5 COS

  10. Care and the Construction of Hacker Identities, Communities, and Society

    ERIC Educational Resources Information Center

    Toombs, Austin Lewis

    2016-01-01

    Recent scholarship in Human-Computer Interaction, science and technology studies, and design research has focused on hacker communities as sites of innovation and entrepreneurship, novel forms of education, and the democratization of technological production. However, hacking practices are more than new technical practices; they are also…

  11. The gymnastics of epigenomics in rice.

    PubMed

    Banerjee, Aditya; Roychoudhury, Aryadeep

    2018-01-01

    Epigenomics is represented by the high-throughput investigations of genome-wide epigenetic alterations, which ultimately dictate genomic, transcriptomic, proteomic and metabolomic dynamism. Rice has been accepted as the global staple crop. As a result, this model crop deserves significant importance in the rapidly emerging field of plant epigenomics. A large number of recently available data reveal the immense flexibility and potential of variable epigenomic landscapes. Such epigenomic impacts and variability are determined by a number of epigenetic regulators and several crucial inheritable epialleles, respectively. This article highlights the correlation of the epigenomic landscape with growth, flowering, reproduction, non-coding RNA-mediated post-transcriptional regulation, transposon mobility and even heterosis in rice. We have also discussed the drastic epigenetic alterations which are reported in rice plants grown from seeds exposed to the extraterrestrial environment. Such abiotic conditions impose stress on the plants leading to epigenomic modifications in a genotype-specific manner. Some significant bioinformatic databases and in silico approaches have also been explained in this article. These softwares provide important interfaces for comparative epigenomics. The discussion concludes with a unified goal of developing epigenome editing to promote biological hacking of the rice epigenome. Such a cutting-edge technology if properly standardized, can integrate genomics and epigenomics together with the generation of high-yielding trait in several cultivars of rice.

  12. Enhanced Cyberspace Defense through Covert Publish-Subscribe Broker Pattern Communications

    DTIC Science & Technology

    2008-06-01

    http://www.cnn.com/TECH/computing/9902/26/t_t/internet.time/, accessed June 2008. [3] C. V. Clausewitz, On War, 1st ed.. London, England: Kegan ...34 2003. [17] T. Greene . (2008 , Apr.) Network World. [Online]. http://www.networkworld.com/news/2008/040908-rsa-hack-power-grid.html, accessed

  13. Always Wanted to Hack the Pentagon? DoD Says Bring It

    Science.gov Websites

    test and find vulnerabilities in the department's applications, websites and networks, he added Resolve/Foal Eagle 2010, a joint U.S. and South Korean command-post exercise with computer-based command-post exercise with computer-based simulations and field exercises. Cook said other networks

  14. Hacking Your Ride: Is Web 2.0 Creating Vulnerabilities To Surface Transportation

    DTIC Science & Technology

    2016-09-01

    SMSN’s vulnerabilities, and uncovers terrorists’ malign use of social media for intelligence gathering. Academic researchers have already discovered...of social media for intelligence gathering. Academic researchers have already discovered threats in social navigation platforms such as Waze and...51 4. Social Navigation as Intelligence ................................................52 C. FUTURE CONCERNS

  15. Diagnostic ultrasound exposure in man.

    PubMed

    Gramiak, R

    1975-09-01

    In his review of the AAPM statement on ultrasound, the author feels that allowing "some" research or demonstration on normal persons in the face of cautionary statements on as yet unknown side effects is an inconsistent position. The use of videotapes and the development of simulators hacked by data banks are offered in place of tissue phantoms.

  16. Developing a Pedagogy of "Making" through Collaborative Self-Study

    ERIC Educational Resources Information Center

    Bullock, Shawn M.; Sator, Andrea

    2018-01-01

    We believe that the ideas associated with the Maker Movement have profound implications for teacher education. We have isolated the pedagogical principles of hack, adapt, design, and create as central to exploring how they work with teacher candidate participants in a maker pedagogy lab. We frame these ideas as Maker Pedagogy, which is the…

  17. "Hack" Is Not A Dirty Word--The Tenth Anniversary of Patron Access Microcomputer Centers in Libraries.

    ERIC Educational Resources Information Center

    Dewey, Patrick R.

    1986-01-01

    The history of patron access microcomputers in libraries is described as carrying on a tradition that information and computer power should be shared. Questions that all types of libraries need to ask in planning microcomputer centers are considered and several model centers are described. (EM)

  18. Misconceived Relationships between Logical Positivism and Quantitative Research: An Analysis in the Framework of Ian Hacking.

    ERIC Educational Resources Information Center

    Yu, Chong Ho

    Although quantitative research methodology is widely applied by psychological researchers, there is a common misconception that quantitative research is based on logical positivism. This paper examines the relationship between quantitative research and eight major notions of logical positivism: (1) verification; (2) pro-observation; (3)…

  19. Hacking Culture.

    ERIC Educational Resources Information Center

    Vigh, Pia

    The paper presents the model behind net2art, a joint Nordic project of creating a platform for Nordic net art. The projects background and scope, organization, impact and experiences, funding structures, and copyright issues are covered. The paper argues that museums do not have a natural role in the distribution of net art (i.e., art that is made…

  20. 01010000 01001100 01000001 01011001: Play Elements in Computer Programming

    ERIC Educational Resources Information Center

    Breslin, Samantha

    2013-01-01

    This article explores the role of play in human interaction with computers in the context of computer programming. The author considers many facets of programming including the literary practice of coding, the abstract design of programs, and more mundane activities such as testing, debugging, and hacking. She discusses how these incorporate the…

  1. Suggested Approaches to the Measurement of Computer Anxiety.

    ERIC Educational Resources Information Center

    Toris, Carol

    Psychologists can gain insight into human behavior by examining what people feel about, know about, and do with, computers. Two extreme reactions to computers are computer phobia, or anxiety, and computer addiction, or "hacking". A four-part questionnaire was developed to measure computer anxiety. The first part is a projective technique which…

  2. Hacking an Algal Transcription Factor for Lipid Biosynthesis.

    PubMed

    Chen, Xiulai; Hu, Guipeng; Liu, Liming

    2018-03-01

    Transcriptional engineering is a viable means for engineering microalgae to produce lipid, but it often results in a trade-off between production and growth. A recent study shows that engineering a single transcriptional regulator enables efficient carbon partitioning to lipid biosynthesis with high biomass productivity. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Examining the Relationship of Business Operations and the Information Security Culture in the United States

    ERIC Educational Resources Information Center

    Wynn, Cynthia L.

    2017-01-01

    An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…

  4. 28 CFR 541.13 - Prohibited acts and disciplinary severity scale.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... personal safety; e.g., hack-saw blade) A. Recommend parole date rescission or retardation.B. Forfeit earned... disrupts or interferes with the security or orderly running of the institution or the Bureau of Prisons... interferes with the security or orderly running of the institution or the Bureau of Prisons. (Conduct must be...

  5. 28 CFR 541.3 - Prohibited acts and available sanctions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...

  6. 28 CFR 541.3 - Prohibited acts and available sanctions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...

  7. 28 CFR 541.3 - Prohibited acts and available sanctions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...

  8. 28 CFR 541.3 - Prohibited acts and available sanctions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...

  9. Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry 2008

    DTIC Science & Technology

    2009-01-16

    involving attempts to intrude or “ hack ” into the defense industrial base’s computer systems or networks originated from East Asia and the Pacifi c...easily mask IP addresses, utilize freely available anonymous proxies, or launch attacks from any of the open WiFi hotspots across the globe. These

  10. Wireless Sensor Node Data Gathering and Location Mapping

    DTIC Science & Technology

    2012-03-01

    adaptive two-phase approach to WiFi location sensing,” 4 th Int. Conf. on Pervasive Computing and Communications Workshops, Pisa, Italy, 2006, pp. 452...wrt.v24_micro_generic.bin, March 2010. [11] P. Asadoorian and L. Pesce, Linksys WRT54G Ultimate Hacking , Burlington, MA: Syngress, 2007, pp. 25. 32

  11. All About PID - Testing and Avoidance in the Field

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hacke, Peter; Johnston, Steve

    2016-09-01

    Potential-induced degradation can cause significant power loss in modules if the appropriate precautions are not taken. In the first part of a new series in PV Tech Power on module failure, Peter Hacke and Steve Johnston assess the current state-of-the-art in detecting, avoiding and mitigating the worst effects of PID.

  12. Lemongrass productivity oil content and composition as a function of nitrogen sulfur and harvest time

    USDA-ARS?s Scientific Manuscript database

    Lemongrass [Cymbopogon flexuosus (Steud.) Wats, (syn. Andropogon nardus var. flexuosus Hack; A. flexuosus Nees)] is one of the most widely grown essential oil plants in the world. Field experiments were conducted at Verona and Poplarville, Mississippi, to evaluate the effects of N (0, 40, 80, and 16...

  13. Deterring Iran’s Use of Offensive Cyber: A Case Study

    DTIC Science & Technology

    2014-10-01

    departments, such as Sharif University of Technology, began to hold hacking competitions to identify potential recruits.26 Dr . Hassan Abbasi, as well-known...that discovered it—to use social networking sites such as LinkedIn and Facebook to target hundreds of U.S. officials and their connections in order

  14. Intelligence Sharing, Fusion Centers, and Homeland Security

    DTIC Science & Technology

    2008-06-01

    particular area. For example, “J3” focuses on current operations, planning “ J5 ” focuses on future planning and “J2” focuses on intelligence. USNORTHCOM...rights of the suspected attacker, taking days or months to complete the investigation. For example, in February 1998, three teenagers hacked into 11

  15. A Framework for Event Prioritization in Cyber Network Defense

    DTIC Science & Technology

    2014-07-15

    U.S.," Reuters (US online Edition), pp. http://www.reuters.com/article/2013/11/06/net-us-usa-china- hacking - idUSBRE9A51AN20131106, 6 Nov 2013. [2...expressed individually, or as a single vector by using the magnitude of these three factors (cell J5 in Table 5

  16. The Benefits, and Fear, of Cookie Technology

    ERIC Educational Resources Information Center

    Goldsborough, Reid

    2004-01-01

    "Cookies" are tiny Web browser helpers and are an example of how the useful can get tossed in with the dangerous through the near hysteria brought about by the real threats of computer viruses, hacking, spyware, spam and phishing. This article briefly discusses antispyware legislation by Congress and the pros and cons of past and future…

  17. Teaching Hackers: School Computing Culture and the Future of Cyber-Rights.

    ERIC Educational Resources Information Center

    Van Buren, Cassandra

    2001-01-01

    Discussion of the need for ethical computing strategies and policies at the K-12 level to acculturate computer hackers away from malicious network hacking focuses on a three-year participant observation ethnographic study conducted at the New Technology High School (California) that examined the school's attempts to socialize its hackers to act…

  18. New results of the spectral observations of CP stars

    NASA Astrophysics Data System (ADS)

    Polosukhina, N. S.; Shavrina, A. V.; Drake, N. A.; Kudryavtsev, D. O.; Smirnova, M. A.

    2010-04-01

    The lithium problem in Ap-CP stars has been, for a long time, a subject of debate. Individual characteristics of CP stars, such as high abundance of the rare-earth elements presence of magnetic fields, complicate structure of the surface distribution of chemical elements, rapid oscillations of some CP-stars, make the detection of the lithium lines and the determination of the lithium abundance, a difficult task. During the International Meeting in Slovakia in 1996, the lithium problem in Ap-CP stars was discussed. The results of the Li study carried out in CrAO Polosukhina (1973-1976), the works of Hack & Faraggiana (1963), Wallerstein & Hack (1964), Faraggiana et al. (1992-1996) formed the basis of the International project ‘Lithium in the cool CP-stars with magnetic fields’. The main goal of the project was, using systematical observations of Ap-CP stars with phase rotation in the spectral regions of the resonance doublet Li I 6708 Å and subordinate 6104 Å lithium lines with different telescopes, to create a database, which will permit to explain the physical origin of anomalous Li abundance in the atmospheres of these stars.

  19. What is your #geosciencehack?

    NASA Astrophysics Data System (ADS)

    Stoof, Cathelijne; Hut, Rolf

    2016-04-01

    There's a secret MacGyver in every researcher, whether they realize it or not. It's always a challenge to get setups working, transport material, or create a solution that works in the exact environment that you have. We have our own tricks to deal with this, and know you have them too. Do you use a kitchen bowl and spatula to evenly mix water and sand, sanitary pads (super absorbent) to stop leaking flow experiments), nylons to line piezometers, duct tape for everything? No matter how obvious or simple your own geoscience hacks are to you, we'd like to hear about them! On this blank poster and on Twitter (#geosciencehack), we invite you to share the tricks that make your field and lab research work. We will collect all ideas and communicate them through Twitter (@geosciencehack), a blog (www.rolfhut.nl), and if we have sufficient material we plan to submit a joint paper to the upcoming MacGyver special issue in Frontiers, so leave your contact details along with your geoscience hack if you'd like to be a co-author.

  20. Reproductive hacking. A male seminal protein acts through intact reproductive pathways in female Drosophila.

    PubMed

    Rubinstein, C Dustin; Wolfner, Mariana F

    2014-01-01

    Seminal proteins are critical for reproductive success in all animals that have been studied. Although seminal proteins have been identified in many taxa, and female reproductive responses to receipt of these proteins have been documented in several, little is understood about the mechanisms by which seminal proteins affect female reproductive physiology. To explore this topic, we investigated how a Drosophila seminal protein, ovulin, increases ovulation rate in mated females. Ovulation is a relatively simple physiological process, with known female regulators: previous studies have shown that ovulation rate is promoted by the neuromodulator octopamine (OA) in D. melanogaster and other insects. We found that ovulin stimulates ovulation by increasing OA signaling in the female. This finding supports a model in which a male seminal protein acts through "hacking" a well-conserved, regulatory system females use to adjust reproductive output, rather than acting downstream of female mechanisms of control or in parallel pathways altogether. We also discuss similarities between 2 forms of intersexual control of behavior through chemical communication: seminal proteins and pheromones.

  1. After the data breach: Managing the crisis and mitigating the impact.

    PubMed

    Brown, Hart S

    2016-01-01

    Historically, the unauthorised access and theft of information was a tactic used between countries as part of espionage campaigns, during times of conflict as well as for personal and criminal purposes. The consumers of the information were relatively isolated and specific. As information became stored and digitised in larger quantities in the 1980s the ability to access mass amounts of records at one time became possible. The expertise needed to remotely access and exfiltrate the data was not readily available and the number of markets to monetise the data was limited. Over the past ten years, shadow networks have been used by criminals to collaborate on hacking techniques, exchange hacking advice anonymously and commercialise data on the black market. The intersection of these networks along with the unintentional losses of information have resulted in 5,810 data breaches made public since 2005 (comprising some 847,807,830 records) and the velocity of these events is increasing. Organisations must be prepared for a potential breach event to maintain cyber resiliency. Proper management of a breach response can reduce response costs and can serve to mitigate potential reputational losses.

  2. What caused the breach? An examination of use of information technology and health data breaches.

    PubMed

    Wikina, Suanu Bliss

    2014-01-01

    Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered. Removable/portable devices, desktop computers, and laptops were the top sources or locations of the breached information, while the top six states-Virginia, Illinois, California, Florida, New York, and Tennessee-in terms of the number of reported breaches accounted for nearly 75 percent of the total individual breaches, 33 percent of breaches in covered entities, and about 30 percent of the total breaches involving business associates.

  3. What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches

    PubMed Central

    Wikina, Suanu Bliss

    2014-01-01

    Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered. Removable/portable devices, desktop computers, and laptops were the top sources or locations of the breached information, while the top six states—Virginia, Illinois, California, Florida, New York, and Tennessee—in terms of the number of reported breaches accounted for nearly 75 percent of the total individual breaches, 33 percent of breaches in covered entities, and about 30 percent of the total breaches involving business associates. PMID:25593574

  4. Prime Suspect, Second Row Center

    ERIC Educational Resources Information Center

    Laird, Ellen A.

    2011-01-01

    His father had been hacked to death in his own bed with an ax the previous November. His mother was similarly brutalized and left for dead with her husband but survived. On the last Monday of that August, after several months and many investigative twists, turns, and fumbles, there sat the son--the prime suspect--in Ellen Laird's literature class,…

  5. Michael Woodhouse | NREL

    Science.gov Websites

    , physics and chemistry. (1998-2002) Featured Publications Fu, R., T.L. James, M. Woodhouse. "Economic /10.1039/C3EE40701B. Goodrich, A., P. Hacke, Q. Wang, B. Sopori, R. Margolis, T.L. James, and Woodhouse, M InformationMicrosoft Excel. Woodhouse, M., A. Goodrich, R. Margolis, T.L. James, M. Lokanc, and R. Eggert. "

  6. Five Ways to Hack and Cheat with Bring-Your-Own-Device Electronic Examinations

    ERIC Educational Resources Information Center

    Dawson, Phillip

    2016-01-01

    Bring-your-own-device electronic examinations (BYOD e-exams) are a relatively new type of assessment where students sit an in-person exam under invigilated conditions with their own laptop. Special software restricts student access to prohibited computer functions and files, and provides access to any resources or software the examiner approves.…

  7. Religion and Rationality: Quaker Women and Science Education 1790-1850

    ERIC Educational Resources Information Center

    Leach, Camilla

    2006-01-01

    This article examines the work of two Quaker women, Priscilla Wakefield (1750-1832) and Maria Hack (1777-1844) as popularizers of science and in the context of the development of scientific literacy. Both women were writers who specialized in scientific educational texts for children and young adults. As Quakers their community and culture played…

  8. Creative Nonfiction in the Classroom: Extending the Boundaries of Literary Study.

    ERIC Educational Resources Information Center

    Skrebels, Paul

    The net effect of the early experiences of writing "compositions" which involved either describing the circumstances of a student's life or recounting the kinds of events encapsulated in that proverbially hack title, "What I Did on My Summer Vacation," has been a tendency for older teachers to devalue nonfiction as an object of…

  9. The Impact of Premature Birth: A Correlational Study Assessing the Need for Children to Access Educational Support Services

    ERIC Educational Resources Information Center

    Jensen, Laura M.; Miller, Rebecca

    2009-01-01

    Accumulating evidence suggests children born premature are at increased risk of lower cognitive abilities, poor academic performance, low social competence and behavioral problems, compared with individuals born full-term (e.g., Whitside-Mansell, Barrett, Bradley & Gargus, 2006; Litt, Taylor, Klein, & Hack, 2005). The goal of the current…

  10. Flow Visualization Studies in the Novacor Left Ventricular Assist System CRADA PC91-002, Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Borovetz, H.S.; Shaffer, F.; Schaub, R.

    This paper discusses a series of experiments to visualize and measure flow fields in the Novacor left ventricular assist system (LVAS). The experiments utilize a multiple exposure, optical imaging technique called fluorescent image tracking velocimetry (FITV) to hack the motion of small, neutrally-buoyant particles in a flowing fluid.

  11. Listening to Students: How I Came to Love My Low-Residency Program

    ERIC Educational Resources Information Center

    Atwood, Megan

    2009-01-01

    Finding an academic program that caters to children's literature is hard. Many people consider children's literature no more sophisticated than its audience--an arena for those who cannot hack it either as writers or as teachers of adult literature. This author, however, found a new program--a "low residency program"--at Hamline…

  12. (DEPSCOR FY 09) Obfuscation and Deobfuscation of Intent of Computer Programs

    DTIC Science & Technology

    2012-12-21

    increased as the malware distribution mechanism has moved to the web through infected sites. In this use a site is hacked so as to distribute malware to...Simpósio Brasileiro em Segurança da Informaçao e de Sistemas Computacionais (2009). (Chen et al., 2012) Jundong Chen, Matthias R. Brust, Vir V. Phoha

  13. Google and the "Twisted Cyber Spy" Affair: US-Chinese Communication in an Age of Globalization

    ERIC Educational Resources Information Center

    Hartnett, Stephen John

    2011-01-01

    The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…

  14. An Epistemological Approach to Modeling: Cases Studies and Implications for Science Teaching

    ERIC Educational Resources Information Center

    Sensevy, Gerard; Tiberghien, Andree; Santini, Jerome; Laube, Sylvain; Griggs, Peter

    2008-01-01

    Models and modeling are a major issue in science studies and in science education. In addressing such an issue, we first propose an epistemological discussion based on the works of Cartwright (1983, 1999), Fleck (1935/1979), and Hacking (1983). This leads us to emphasize the transitions between the abstract and the concrete in the modeling…

  15. Hacking the Matrix.

    PubMed

    Czerwinski, Michael; Spence, Jason R

    2017-01-05

    Recently in Nature, Gjorevski et al. (2016) describe a fully defined synthetic hydrogel that mimics the extracellular matrix to support in vitro growth of intestinal stem cells and organoids. The hydrogel allows exquisite control over the chemical and physical in vitro niche and enables identification of regulatory properties of the matrix. Copyright © 2017 Elsevier Inc. All rights reserved.

  16. P-hacking.

    PubMed

    Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Sarode, Gargi

    2017-08-01

    Due to increasing rate of research articles getting published in recent times, medical science is evolving very fast. Open access policies of the journals make information easily available to the stakeholders for building future research proposal. Blindly having faith in whatever is published in the literature is detrimental for science; however, it is hard to find out the correctness of the data analysis.

  17. Policy-Aware Sender Anonymity in Location-Based Services

    ERIC Educational Resources Information Center

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  18. 75 FR 76263 - Inmate Discipline Program/Special Housing Units: Subpart Revision and Clarification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... security or orderly running of the institution or the Bureau of Prisons most like another prohibited act in... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... Conduct which disrupts or interferes with the security or orderly running of the institution or the Bureau...

  19. Learning Management System Calendar Reminders and Effects on Time Management and Academic Performance

    ERIC Educational Resources Information Center

    Mei, Jianyang

    2016-01-01

    This research project uses a large research university in the Midwest as a research site to explore the time management skills of international students and analyzes how using the Course Hack, an online Learning Management System (LMS) calendar tool, improves participants' time management skills and positively impacts their academic performance,…

  20. Recurrent selection for increased seed germination in sand bluestem (Andropogon hallii)

    USDA-ARS?s Scientific Manuscript database

    Water is essential for plant growth and under field conditions is often inadequate for satisfactory seed germination and seedling growth. The objective of this research was to improve the seed germination of sand bluestem (Andropogon hallii Hack.) lines ‘AB-medium Syn-0’ and ‘CD-tall Syn-0’ at low ...

  1. Picture of the Week: Hacking the bio-nano interface for better biofuels

    Science.gov Websites

    ) influence electron transfer between the enzyme and the electrode to determine the best placement of enzymes compounds) influence electron transfer between the enzyme and the electrode to determine the best placement studied how three quinones (a class of organic compounds) influence electron transfer between the enzyme

  2. Security Meets Real-World Computing. Building Digital Libraries

    ERIC Educational Resources Information Center

    Huwe, Terence K.

    2005-01-01

    The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…

  3. Should There Be an Expectation of Privacy in the Library? Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet L.

    2005-01-01

    Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…

  4. The Social Organization of the Computer Underground

    DTIC Science & Technology

    1989-08-01

    colleagues, with only small groups approaching peer relationships. 14 . SUBJECT TERMS HACK, Computer Underground 15. NUMBER OF PAGES 16. PRICE CODE 17...between individuals involved in a common activity (pp. 13- 14 ). Assessing the degree and manner in which the...criminalized over the past several years . Hackers, and the "danger" that they present in our computer dependent

  5. Hacking Blackboard: Customizing Access to Library Resources through the Blackboard Course Management System

    ERIC Educational Resources Information Center

    Kellam, Lynda M.; Cox, Richard; Winkler, Hannah

    2009-01-01

    Academic libraries have long been trying to gain access to users through their favorite online spaces, such as social networking sites. In this article a project of the University of North Carolina at Greensboro's University Libraries, which integrated library resources with the campus course management system, Blackboard, is detailed. The main…

  6. Joint Interagency Coordination Group - Cyber: Empowering the Combatant Commanders against the no-borders threat

    DTIC Science & Technology

    2009-05-04

    inconvenience and denial of Internet service, CNAs pose a threat to national security, if the right computer is hacked , to every day operations, if baking...expert J3: Current Operations Rep Private Sector/Civilian: cyber/CNA SME J5 Future Operations Rep Private Sector/Civilian: cyber/CND SME Table 2

  7. Cyber-Security Concerns Mount as Student Hacking Hits Schools: Districts Straining to Safeguard Online Networks

    ERIC Educational Resources Information Center

    Borja, Rhea R.

    2006-01-01

    While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…

  8. Flame Retardant: Cyberbullies Torment Their Victims 24/7: Here's How to Stop the Abuse

    ERIC Educational Resources Information Center

    Willard, Nancy

    2006-01-01

    Cyberbullying is the use of electronic information such as e-mail and other digital age tools to bully or harass individuals. Cyberbullies post angry and vulgar messages in online "flaming" wars or hack into a peer's e-mail account to wreak havoc, assaulting the reputations and already fragile egos of their young victims. The devastating effects…

  9. Fire effects on flaked stone, ground stone, and other stone artifacts [Chapter 4

    Treesearch

    Krista Deal

    2012-01-01

    Lithic artifacts can be divided into two broad classes, flaked stone and ground stone, that overlap depending on the defining criteria. For this discussion, flaked stone is used to describe objects that cut, scrape, pierce, saw, hack, etch, drill, or perforate, and the debris (debitage) created when these items are manufactured. Objects made of flaked stone include...

  10. Efficacy of stem injection treatments on striped maple in central West Virginia

    Treesearch

    Jeffrey D. Kochenderfer; James N. Kochenderfer

    2008-01-01

    Hack-and-squirt injection treatments were applied to individual striped maple (Acer pennsylvanicum L.) stems and to the largest stem in sprout clumps in a 25-year-old clearcut in central West Virginia to evaluate seasonal efficacy of imazapyr as Arsenal (28.7%) and glyphosate as Glypro Plus (41.0%) in water carriers. Complete control of injected...

  11. Trouble on My Mind: Toward a Framework of Humanizing Critical Sociocultural Knowledge for Teaching and Teacher Education

    ERIC Educational Resources Information Center

    Brown, Keffrelyn D.

    2013-01-01

    Drawing from the work of philosophers Sylvia Wynter and Ian Hacking, in this conceptual article I argue why a humanizing critical approach to sociocultural knowledge is needed for teacher education, particularly in preparing teachers to work effectively with black students. In light of enduring concerns in teacher education with improving the…

  12. Science and Theatre Education: A Cross-Disciplinary Approach of Scientific Ideas Addressed to Student Teachers of Early Childhood Education

    ERIC Educational Resources Information Center

    Tselfes, Vasilis; Paroussi, Antigoni

    2009-01-01

    There is, in Greece, an ongoing attempt to breach the boundaries established between the different teaching-learning subjects of compulsory education. In this context, we are interested in exploring to what degree the teaching and learning of ideas from the sciences' "internal life" (Hacking, in: Pickering (ed) "Science as practice…

  13. Historical Reflections on the Ascendancy of ADHD in North America, c. 1980 - c. 2005

    ERIC Educational Resources Information Center

    Neufeld, Paul; Foy, Michael

    2006-01-01

    An ecological niche framework (Hacking, 1998) is utilised to examine the growth of ADHD in North America. The analysis suggests ADHD flourishes, at least in part, due to a complex and historically situated interaction of factors that created a niche within which a particular kind of explanation and treatment for the troubling behaviours of…

  14. The New Taylorism: Hacking at the Philosophy of the University's End

    ERIC Educational Resources Information Center

    Goodman, Robin Truth

    2012-01-01

    This article looks at the critical writings of Mark C. Taylor. It suggests that Mark C. Taylor is rewriting a global imaginary devoid of the kind of citizenship that Henry Giroux claims as the basis for public education. Instead, Taylor wants to see the university take shape as profit-generating. According to Taylor, in lieu of learning to take…

  15. Measuring Cyber Operations Effectiveness

    DTIC Science & Technology

    2014-11-01

    are advanced firewalls capable of taking limited action to block malicious traffic or hacking attempts. Their capabilities vary widely and must be...using many automated tools, included in the defense hardware and software itself. These devices include hardware and software firewalls , Network...DoD networks are probed millions of times per day…the Air Force blocks roughly two billion threats and denies two million emails each week

  16. Radiation Effects in 3D Integrated SOl SRAM Circuits

    DTIC Science & Technology

    2011-08-23

    Because of the front-to- hack capacitive coupling, significant device parametric shifts can be observed unless the BOX has been engineered to...8. - l.E-12 .,..--------------, .. J5 ;::.. 5 63-MeV Protons · Tier1 • ner2 ner3 -c a • ’i 1.E-13 ----·· -----·-- ~ . = . i§ • • g • f L_

  17. New Results of Spectral Observations of CP Stars in the Li I 6708 Å Spectral Region with the 6-m BTA Telescope

    NASA Astrophysics Data System (ADS)

    Polosukhina, N.; Shavrina, A.; Drake, N.; Kudryavtsev, D.; Smirnova, M.

    The lithium problem in Ap-CP stars has for a long time been a subject of debates. Individual characteristics of CP stars, such as a high abundance of rare-earth elements, the presence of magnetic fields, complex structures of the surface distribution of chemical elements, rapid oscillations of some CP stars, make the detection of lithium lines, and determination of lithium abundance a challenging task. The lithium problem in Ap-CP stars was discussed during the meeting in Slovakia in 1996. The results of the Li study, carried out in CrAO (Polosukhina, 1973 - 1976), the works of Faraggiana & Hack (1963), Wallerstein & Hack (1964), Faraggiana et al. (1992 - 1996) formed the basis of the international project, called Lithium in the Cool CP Stars with Magnetic Fields. The main goal of the project was, using systematical observations of Ap-CP stars with phase rotation in the spectral regions of the resonance doublet Li I 6708 Å and subordinate 6104 Å lithium lines with different telescopes, to create a database, which will permit to explain the physical origin of the anomalous Li abundance in the atmospheres of these stars.

  18. Mind Invasion: Situated Affectivity and the Corporate Life Hack.

    PubMed

    Slaby, Jan

    2016-01-01

    In view of the philosophical problems that vex the debate on situated affectivity, it can seem wise to focus on simple cases. Accordingly, theorists often single out scenarios in which an individual employs a device in order to enhance their emotional experience, or to achieve new kinds of experience altogether, such as playing an instrument, going to the movies, or sporting a fancy handbag. I argue that this narrow focus on cases that fit a "user/resource model" tends to channel attention away from more complex and also more problematic instances of situated affectivity. Among these are scenarios in which a social domain draws individuals into certain modes of affective interaction, often by way of attunement and habituation to affective styles and interaction patterns that are normative in the domain in question. This can lead to a phenomenon that is not so much "mind extension" than "mind invasion": affectivity is dynamically framed and modulated from without, often contrary to the prior orientations of the individuals in question. As an example, I discuss affective patterns prevalent in today's corporate workplace. I claim that workplace affect sometimes contributes to what is effectively a "hack" of employees' subjectivity.

  19. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy

    NASA Astrophysics Data System (ADS)

    Pleban, Johann-Sebastian; Band, Ricardo; Creutzburg, Reiner

    2014-02-01

    In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.

  20. Morphology and Sediment Dynamics of the East Friesian Tidal Inlets, West Germany.

    DTIC Science & Technology

    1982-01-01

    by three major environmental factors: (1) the tide range, (2) the nearshore wave energy, and (3) the geometry of the hack -barrier hav. Both...ASg .147 Ebb a A~ ps4 . 0.1 Fig. 15(a) and (b). For legend see opposite. 18 t7 7d 7’AI 3LI EBBTIALDELA ARI- HNE Juy1 .17 EBBW TIDAL DELTA MARINCHNL j

  1. Lawful Hacking: Toward a Middle-Ground Solution to the Going Dark Problem

    DTIC Science & Technology

    2017-03-01

    14 2. 9/11 Terrorist Attacks..................................................................17 3. The Rise of Encryption Post -Snowden’s...taking pictures, posting pictures, shopping, conducting business, and searching the web. To investigate these 100,000 [the number of criminal cases his...non-U.S. person who does not have strong ties to the United States, FISA is the de facto Fourth Amendment limitation on government’s domestic

  2. Making an Adjustable C-Clamp. Kit No. 603. Instructor's Manual [and] Student Learning Activity Manual. [Revised.] T & I--Metalwork.

    ERIC Educational Resources Information Center

    White, Jim; Alexander, Larry

    This student activity kit consists of a programmed, self-instructional learning guide and an accompanying instructor's manual for use in teaching trade and industrial education students how to make an adjustable C-clamp. The student guide contains step-by-step instructions in the following areas: basic layout principles; use of a hack saw, file,…

  3. A comparison of two stem injection treatments applied to American beech in central West Virginia

    Treesearch

    Jeffrey D. Kochenderfer; Gary W. Miller; James N. Kochenderfer

    2012-01-01

    Efficacies for two herbicide stem injection treatments on American beech (Fagus grandifolia Ehrh.) and impacts to nontarget residual trees were evaluated in central West Virginia. The treatments consisted of hack-and-squirt injection of all beech stems ≥1.0 in. to 9.9 in. diameter at breast height (d.b.h.) with either imazapyr as Arsenal...

  4. Can Welfare Mothers Hack It in College? A Comparison of Achievement between TANF Recipients and General Population Community College Students

    ERIC Educational Resources Information Center

    Fenster, Judy

    2004-01-01

    The achievement of a group of undergraduate students enrolled in a pilot program for welfare recipients in the form of TANF (Temporary Aid to Needy Families) was compared with the achievement of general population students at an urban community college. Grades attained in a basic level, introductory Psychology course were used to measure academic…

  5. Herbicide hardwood crop tree release in central West Virginia

    Treesearch

    Jeffrey D. Kochenderfer; Shepard M. Zedaker; James E. Johnson; David W. Smith; Gary W. Miller

    2001-01-01

    Chemical crop tree release treatments were applied to young hardwood stands at three sites in central West Virginia to evaluate the effectiveness of glyphosate as Accord (41.5% SL), imazapyr as Arsenal AC (53.1% SL) and Chopper (27.6% EC), and triclopyr as Garlon 3A (44.4% triethylamine salt SL), and Garlon 4 (61.6% butoxyethyl ester EC) using hack-and-squirt injection...

  6. Language and Theory of Mind in Autism Spectrum Disorder: The Relationship between Complement Syntax and False Belief Task Performance

    ERIC Educational Resources Information Center

    Lind, Sophie E.; Bowler, Dermot M.

    2009-01-01

    This study aimed to test the hypothesis that children with autism spectrum disorder (ASD) use their knowledge of complement syntax as a means of "hacking out" solutions to false belief tasks, despite lacking a representational theory of mind (ToM). Participants completed a "memory for complements" task, a measure of receptive vocabulary, and…

  7. Hacking the Silos: Eliminating Information Barriers Between Public Health and Law Enforcement

    DTIC Science & Technology

    2018-03-01

    ELIMINATING INFORMATION BARRIERS BETWEEN PUBLIC HEALTH AND LAW ENFORCEMENT by Cody L. Minks March 2018 Thesis Advisor: Anke Richter...burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching...existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information . Send comments regarding this

  8. Organizing the Army for Information Warfare

    DTIC Science & Technology

    2013-03-01

    US’s reputation in the global community, but by pilfering intellectual property, foiling industrial controls, and ‘ hacking ’ into secured networks...human factors can be exploited to discern passwords and circumvent other physical safeguards that secure cyber infrastructure.48 The increasing...Ranking of America’s Largest Corporations.” 7 David F. Carr, Information Week, January 25, 2012, “ Facebook : The Database Of Wealth And Power,” http

  9. From "Hack to Hallé"--Making a Robot Orchestra for the Hallé Orchestra

    ERIC Educational Resources Information Center

    Moseley, Ainsley; White, Stephanie; Knowles, Mike

    2017-01-01

    As part of the celebration of Manchester being the European City of Science 2016, schools across the City were invited to take part in a Citizen-Engineering project, which set out a quest to make a recycled robot orchestra. It is a unique project, which is an experiment itself--to bring people together to create, collaborate and care for the…

  10. Integrated mobile robot control

    NASA Astrophysics Data System (ADS)

    Amidi, Omead; Thorpe, Chuck E.

    1991-03-01

    This paper describes the strucwre implementation and operation of a real-time mobile robot controller which integrates capabilities such as: position estimation path specification and hacking human interfaces fast communication and multiple client support The benefits of such high-level capabilities in a low-level controller was shown by its implementation for the Naviab autonomous vehicle. In addition performance results from positioning and tracking systems are reported and analyzed.

  11. DoD Involvement with The Rendon Group

    DTIC Science & Technology

    2007-03-06

    34ilC:r.dix E for ;he ~"port cist:-ibL;.~;or.. Th:• team mcnbC’"’- ~r.: listed insHic ":le hack C()\\’CV. _ 5~y~ Shelton R. Young Deput\\" lnspcc:u...Net Assessment; the Defense Intelligence Agency; the Joint Staff, J39; the U.S. Central Command (J2, 13, J5 , and Public Affairs); Multi-National Force

  12. Students at the University of Abertay Dundee Learn Computer Hacking to Defend Networks

    ERIC Educational Resources Information Center

    Vance, Erik

    2007-01-01

    In this article, the author describes a new cybersecurity course at the University of Abertay Dundee in Scotland. Geoffrey R. Lund, leader of the software-applications program at Abertay, says the course prepares students for a rapidly growing job market by teaching that the best defense is a good offense. Professors set up a network of 20 or so…

  13. Eclipsing and density effects on the spectral behavior of Beta Lyrae binary system in the UV

    NASA Astrophysics Data System (ADS)

    Sanad, M. R.

    2010-01-01

    We analyze both long and short high resolution ultraviolet spectrum of Beta Lyrae eclipsing binary system observed with the International Ultraviolet Explorer (IUE) between 1980 and 1989. The main spectral features are P Cygni profiles originating from different environments of Beta Lyrae. A set of 23 Mg II k&h spectral lines at 2800 Å, originating from the extended envelope [Hack, M., 1980. IAUS, 88, 271H], have been identified and measured to determine their fluxes and widths. We found that there is spectral variability for these physical parameters with phase, similar to that found for the light curve [Kondo, Y., McCluskey, G.E., Jeffery, M.M.S., Ronald, S.P., Carolina, P.S. McCluskey, Joel, A.E., 1994. ApJ, 421, 787], which we attribute to the eclipse effects [Ak, H., Chadima, P., Harmanec, P., Demircan, O., Yang, S., Koubský, P., Škoda, P., Šlechta, M., Wolf, M., Božić, H., 2007. A&A, 463, 233], in addition to the changes of density and temperature of the region from which these lines are coming, as a result of the variability of mass loss from the primary star to the secondary [Hoffman, J.L., Nordsieck, K.H., Fox, G.K., 1998. AJ, 115, 1576; Linnell, A.P., Hubeny, I., Harmanec, P., 1998. ApJ, 509, 379]. Also we present a study of Fe II spectral line at 2600 Å, originating from the atmosphere of the primary star [Hack, M., 1980. IAUS, 88, 271H]. We found spectral variability of line fluxes and line widths with phase similar to that found for Mg II k&h lines. Finally we present a study of Si IV spectral line at 1394 Å, originating from the extended envelope [Hack, M., 1980. IAUS, 88, 271H]. A set of 52 Si IV spectral line at 1394 Å have been identified and measured to determine their fluxes and widths. Also we found spectral variability of these physical parameters with phase similar to that found for Mg II k&h and Fe II spectral lines.

  14. Measuring What Matters

    DTIC Science & Technology

    2014-11-18

    multiple platforms were forced to be reset and Forbes.com and its WordPress platform were taken offline several times over 2 days. Forbes has focused...does not enter h1s credentials on the subsequent login page Returning to his blog, WordPress prompts him to log in again. Almost immediately...again compromise the WordPress super-administrator account and deface six Forbes blog pages with the phrase "Hacked By The Syrian Electronic Army

  15. Secure quantum key distribution

    NASA Astrophysics Data System (ADS)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  16. David Miller | NREL

    Science.gov Websites

    Publications D.C. Miller, E. Annigoni, A. Ballion, J.G. Bokria, L.S. Bruckman, D.M. Burns, X. Chen, L. Elliott , J. Feng, R.H. French, S. Fowler, C.C. Honeker, M.D. Kempe, H. Khonkar, M. Köhl, L.-E. Perret-Aebi , L. Elliott, L. Feng, R.H. French, S. Fowler, X. Gu, P.L. Hacke, C.C. Honeker, M.D. Kempe, H. Khonkar

  17. Air & Space Power Journal. Volume 27, Number 4, July-August 2013

    DTIC Science & Technology

    2013-08-01

    with old-fashioned radio communications . Meanwhile, our cyber warrior has successfully isolated the hack and goes on the counteroffensive with an...impostors is best solved with technological solutions. • Radio frequency identication • Biometrics • Embedded security markers Figure 4. Defectors...Museum, 26 July 1948, http://www.trumanlibrary.org/9981a.htm. 21. Jones, “ Community Defense in Afghanistan,” 11 . July–August 2013 Air & Space Power

  18. Consortia for Improving Medicine with Innovation and Technology

    DTIC Science & Technology

    2016-12-01

    2011 Out - 001585 11-484 Award Closed Hacking, Adam Non-invasive Fasciotomy to Treat Extremity Compartment Syndrome 2012 Out - 001706 12-1173 Award...592 Award Closed 7 Kaushal, Shalesh Low Energy Laser as a Therapeutic for Dry Age-related Macular Degeneration 2011 Out - 001607 11-397 Award Closed...Electrostatic dry powder inhaler for constant dose respiratory drug delivery 2010 Out - 000885 10-512 Award Closed McLaughlin, Bryan An implantable

  19. Plasma Cytokines Following Thermal Injury and Their Relationship with Patient Mortality, Burn Size, and Time Postburn,

    DTIC Science & Technology

    1993-09-01

    AND TIME POSTBURN Adriana C. Drost, MS, David G. Burleson, PhD, William G. Cioffi, Jr., MD, Bryan S. Jordan, RN, MS, Arthur D. Mason, Jr., MD, and...trauma. J 2, IL-6). Science 239-502,1i988 Surg Res 48:622, 1990 7. Garmnan RD, Jacobs KA , Clark SC, et al: B-cell-stimulatory factor 23. Hack CE, De Groot

  20. Genesis: A Framework for Achieving Software Component Diversity

    DTIC Science & Technology

    2007-01-01

    correctly—the initial filters develop to fix the Hotmail vulnerability could be circumvented by using alternate character encodings4. Hence, we focus on...Remotely Exploitable Cross-Site Scripting in Hotmail and Yahoo, (March 2004); http://www.greymagic.com/security/advisories/gm005-mc/. 4...EyeonSecurity, Microsoft Passport Account Hijack Attack: Hacking Hotmail and More, Hacker’s Digest. 5. Y.-W. Huang et al., Web Application Security Assessment by

  1. Surviving Hacker Attacks Proves That Every Cloud Has a Silver Lining

    ERIC Educational Resources Information Center

    Cheng, Kirby

    2005-01-01

    When I first realized I'd been hacked, I thought, 'Oh, my God, they really did it!" While trying to recover from the shock, I had to call the supervisors of the departments with services affected by the loss of the library's server. In a seemingly calm voice, I told them one by one, "Sorry to let you know, our server is down; it has been hacked…

  2. Re-engineering the Pancreas Tumor Microenvironment: A “Regenerative Program” Hacked

    PubMed Central

    Evan, Gerard I.; Hah, Nasun; Littlewood, Trevor D.; Sodir, Nicole M.; Vidal, Tania Campos; Downes, Michael; Evans, Ronald M.

    2017-01-01

    The “hallmarks” of pancreatic ductal adenocarcinoma (PDAC) include proliferative, invasive and metastatic tumor cells and an associated dense desmoplasia comprised of fibroblasts, pancreatic stellate cells, extracellular matrix and immune cells. The oncogenically-activated pancreatic epithelium and its associated stroma are obligatorily interdependent, with the resulting inflammatory and immune-suppressive microenvironment contributing greatly to the evolution and maintenance of PDAC. The peculiar pancreas-specific tumor phenotype is a consequence of oncogenes hacking the resident pancreas regenerative program, a tissue specific repair mechanism regulated by discrete super enhancer networks. Defined as genomic regions containing clusters of multiple enhancers, super enhancers play pivotal roles in cell/tissue specification, identity and maintenance. Hence, interfering with such super enhancer driven repair networks should exert a disproportionately disruptive effect on tumor versus normal pancreatic tissue. Novel drugs that directly or indirectly inhibit processes regulating epigenetic status and integrity, including those driven by histone deacetylases, histone methyltransferase and hydroxylases, DNA methyltransferases, various metabolic enzymes, and bromodomain and extra-terminal motif proteins (BETs) have shown the feasibility of disrupting super enhancer-dependent transcription in treating multiple tumor types, including PDAC. The idea that pancreatic adenocarcinomas rely on embedded super enhancer transcriptional mechanism suggests a vulnerability that can be potentially targeted as novel therapies for this intractable disease. PMID:28373363

  3. Integrating student feedback during "Dental Curriculum Hack-A-thon".

    PubMed

    Saffari, Shawheen S; Frederick Lambert, R; Dang, Lucy; Pagni, Sarah; Dragan, Irina F

    2018-05-02

    The future of dental education is at crossroads. This study used the parameter of the 2016 Dental Curriculum Hack-a-Thon to assess intra- and inter-institutional agreement between student and faculty views regarding dental curriculums to determine if there is an impact in student perceptions towards dental education from before and after the event. This exploratory, cross-sectional study involved two surveys, with Survey 1 being distributed among four faculty-student pairs of the four participating dental schools answering 14 questions. Survey 2 assessed the views of 20 participating dental students through 26 questions in a pre- and post- event survey design. Descriptive statistics were used to explore differences in perceptions towards dental education across both instrument surveys. The results revealed valuable student insights regarding intra- and inter-institutional agreement relevant for the change in dental curriculum that needs to occur. Survey 2 revealed that mandatory attendance in didactic courses, electronic based examination preferences, and the preference of preclinical courses being held in the first and second years of a four-year dental curriculum were of particular importance to student participants. The results of this study indicate that exposure and participation in subjects pertaining to dental education can be influential on student preferences and opinions on how dental education should be delivered in a four-year curriculum.

  4. Quantum key distribution: vulnerable if imperfectly implemented

    NASA Astrophysics Data System (ADS)

    Leuchs, G.

    2013-10-01

    We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

  5. Using hacked point and shoot cameras for time-lapse snow cover monitoring in an Alpine valley

    NASA Astrophysics Data System (ADS)

    Weijs, S. V.; Diebold, M.; Mutzner, R.; Golay, J. R.; Parlange, M. B.

    2012-04-01

    In Alpine environments, monitoring snow cover is essential get insight in the hydrological processes and water balance. Although measurement techniques based on LIDAR are available, their cost is often a restricting factor. In this research, an experiment was done using a distributed array of cheap consumer cameras to get insight in the spatio-temporal evolution of snowpack. Two experiments are planned. The first involves the measurement of eolic snow transport around a hill, to validate a snow saltation model. The second monitors the snowmelt during the melting season, which can then be combined with data from a wireless network of meteorological stations and discharge measurements at the outlet of the catchment. The poster describes the hardware and software setup, based on an external timer circuit and CHDK, the Canon Hack Development Kit. This latter is a flexible and developing software package, released under a GPL license. It was developed by hackers that reverse engineered the firmware of the camera and added extra functionality such as raw image output, more full control of the camera, external trigger and motion detection, and scripting. These features make it a great tool for geosciences. Possible other applications involve aerial stereo photography, monitoring vegetation response. We are interested in sharing experiences and brainstorming about new applications. Bring your camera!

  6. Speech Recognition: Acoustic, Phonetic and Lexical Knowledge

    DTIC Science & Technology

    1985-08-05

    J I ■ < < i* *’*"zz • sassss g SS««« SS7 «97 SSS«SS is m y^ e e 5 o « e S 2 .1 t 11 I e f Q ö i io • u ŗ...the words nock, hack , and mack li.xainplcs such as those shown in Figure 1 suggest that it is not possible to distinüuish nasaliyed and oral /owcls

  7. American Bald Eagle Restoration Plan for Dale Hollow Lake.

    DTIC Science & Technology

    1987-06-01

    Wildlife Resources Agency’s (TWRA) Reelfoot Lake site, Tennessee Valley Authority’s (TVA), Land Between the Lakes operation in Kentucky, and the Alabama...three active hacking sites were visited: (1) Reelfoot Lake (Tennessee), (2) Land Between the Lakes (Kentucky), and (3) Mud Creek (Alabama). These...somewhat differently. Some of the differences are hereby noted: (1) Reelfoot Lake -- The towers here are constructed in lIve cypress trees at a height

  8. Abuse of Customer Premise Equipment and Recommended Actions

    DTIC Science & Technology

    2014-08-07

    as reflectors. Descriptions of hacks and control of CPE are more difficult to provide, as such operations are more clandestine. DNS changer provides...connected to broadband Internet, as of July 2013. 7 In the United States, about 84% of those connections have a local home network, such as WiFi . 8...with 324 million WiFi -enabled consumer electronics devices shipped during 2013 in the United States alone. 10 Thus if there were a systematic

  9. Malware Pandemics

    DTIC Science & Technology

    2010-09-01

    in T-Mobile’s ,𔃽G IP range began expe- riencing extortion popup windows. The popup window notifies the victim that the phone has been hacked , and...range, 192.168.0.0/16. Such scanning may be of particular interest when the victim’s iPhone opportunistically connects to a WiFi LAN for Internet...connected to local WiFi networks should understand that the convenience of their Internet-tethered web, media, and email service, comes with a

  10. Window of Opportunity: Mitigating Threats from Disruptive Technologies Before Widespread Adoption

    DTIC Science & Technology

    2014-09-01

    involved. A contemporary example of this is the emergence of online peer-to-peer payment systems like Bitcoin . Bitcoin was left to proliferate...collapse of Mt. Gox, a bitcoin exchange.195 The problem with this method of protection is that governmental based actions are typically a tediously slow...195 Mt. Gox was one of the foremost bitcoin exchange networks, and it collapsed when it was hacked and lost the

  11. Air & Space Power Journal. Volume 28, Number 3, May-June 2014

    DTIC Science & Technology

    2014-06-01

    critical role that AETC organizations—such as the Air Force Security Assistance Training Squadron; HQ AETC/A3Q; the AAA; and, potentially , the IAAFA... Potential de- fects in the design are more likely than computer hacking and are most effectively abated through comprehensive testing demanded by the best...fascinating picture of the potential employment methodologies and skill sets demanded of crews that operate assets like FQ-X. From a cyber-defense

  12. National Register Testing of 19 Prehistoric Archeological Sites on Fort Hood, Texas: The 1995 Season

    DTIC Science & Technology

    1999-07-01

    arboreal species include ash (Fraxinus sp.), redbud (Cercis canadensis), hack- berry (Celtis sp.), Texas persimmon ( Diospyros texana), and Mexican...from flotation of hearth fill were identified as Celtis sp. nutlets, woody legume, Rosaceae wood, and Diospyros virginiana wood, the latter...early 1990s. For consistency, all of their studies have focused on a single genus , Rabdotus sp., that is abundant in the archeological deposits at

  13. Officer Education: Preparing Leaders for the Air Force of 2035

    DTIC Science & Technology

    2009-02-15

    Environment (JOE) 2008: Challenges and Implications for the Future Joint Force”, https://us.jfcom.mil/sites/ J5 /j59/default.aspx., 23. 6 The world...capabilities might be utilized in their work Unrestricted Warfare. In this book, “ Hacking into websites, targeting financial institutions, terrorism...Forces Command. “Joint Operating Environment: Challenges and Implications for the Future Joint Force.” https://us.jfcom.mil/sites/ J5 /j59

  14. Nickel-cobalt-iron-copper sulfides and arsenides in solution-collapse breccia pipes, northwestern Arizona

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wenrich, K.J.; Hlava, P.F.

    An extensive suite of Ni-Co-Fe-Cu sulfides and arsenides lies within the matrix of solution-collapse breccias buried deep within the plateaus of the Grand Canyon region. Ceilings over large caverns in the Redwall collapsed, brecciating the overlying sandstone and forming cylindrical breccia pipes up to 300 ft in diameter that extend vertically as much as 3,000 ft. These highly permeable breccias served as a host for the precipitation of a suite of over 100 minerals, including uraninite, sphalerite, galena and various copper phases, in addition to the Ni-Co-bearing-phase discussed here. Intricately zoned crystals of small (<1 mm), euhedral Ni-Co-Fe-As-S minerals weremore » the first to form during the second major episode of mineralization in these pipes. Several of these phases replace minerals, such as barite and anhydrite, from the first episode. Extensive microprobe work has been done on samples from two breccia pipe mines, the Hack 2 and Orphan, which are about 50 miles apart. Mineral compositions are similar except that no copper is found in the Ni-Co-Fe phases from the Hack 2 mine, while pyrites containing 1 wt % Cu are common from the Orphan, which was mined for copper. In some of these pyrites', Cu is dominant and the mineral is actually villamaninite. Pyrites from both mines characteristically contain 0.5 to 3 wt % As. Metal contents in zones pyrite-bravoite-vaesite (M[sub 1]S[sub 2]) crystals at the Hack 2 mine range from Fe[sub 1] to Fe[sub .12], Ni[sub 0] to Ni[sub .86], and Co[sub 0] to Co[sub .10]. The metal content for polydymite-siegenite-violarite averages about (Ni[sub 2.33]Co[sub .39]Fe[sub .23])(S[sub 3.9]As[sub .1]). Orphan mine pyrite-bravoite-vaesite-villamaninite ranges in composition from pure FeS[sub 2] to (Ni[sub .6]Fe[sub .21]Co[sub .17])S[sub 2], and (Cu[sub .46]Ni[sub .27]Fe[sub .21]Co[sub .13])S[sub 2]. Of all the sulfides or arsenides found in these breccia pipes, only nickeline consistently occurs as the pure end member.« less

  15. Composite Failure Analysis Handbook. Volume 2: Technical Handbook. Part 1 - Procedures and Techniques

    DTIC Science & Technology

    1992-02-01

    If abrasive cutting equipment is not available or coolant contamination is a concern, hand operated toothed blades or saws such as hack or coping saws...325 F) CE-345 7781 387 9.0 (15 PSI/250 F) CE-aSS 7781 35.1 8.1 (15 PS1/250 F) CE-339 120 A9.4 19.3 (15 PS4 /250 F) CE-324 7781 37 * 3 10.__5 I10 MIN/15

  16. Report of the Defense Science Board Task Force on Defensive Information Operations. 2000 Summer Study. Volume II

    DTIC Science & Technology

    2001-03-01

    distinguishing between attacks and other events such as accidents, system failures, or hacking by thrill-seekers. This challenge is exacerbated by the...and is referred to as Signaling System # 7 ( SS7 ). Commercial Intelligent Network Architecture Switching Signal Point (SSP) Service - Originates...Wireless access point to fixed infrastructure Ut c Signaling Transfer Point (STP) - Packet switch in CCITT#7 Network SP SW SS7 System Data Bases Network

  17. Public Key Infrastructure Utilization to Provide an Added Level of Authenticity to Transmitted Data

    DTIC Science & Technology

    2010-03-01

    WIFI Wireless Fidelity – a trademark of the Wi-Fi Alliance that manufacturers may use to brand certified products that belong to a class of...removed by the receiving computer. This security concept is applicable for any WIFI or EVDO wireless transmitted computer because only the end users... hacked and keeping the computer safe from outside sources was still a definite concern. Therefore, a non-Hotmail e-mail account was designed

  18. Philosophy Driving Ontology: Ideas from the Past Influencing the Future of Command (and Control)

    DTIC Science & Technology

    2010-04-01

    current communications technology is able to be penetrated and hacked by a determined and skilled foe. Two examples illustrate two different approaches...the Price of Progress: Thomas Hobbes (English, 1588-1679) lived an unusually long life that encompassed the birth of the Enlightenment. He... strategy , and supporting weapons’ technologies should be based on the idea of shaping and adapting to this change — and doing so faster than one’s

  19. Nomonhan: Japanese-Soviet Tactical Combat, 1939 (Leavenworth Papers, Number 2)

    DTIC Science & Technology

    1981-01-01

    describes the evolution of thatiJA tactical doctrine, and then pre- sents a detailed examination of how a partkular Japanese infantry battalion applied...transpmtation, and a field sanitation unit composed the task force. They set out to hack down and destroy an elu- 21 s1ve foe in the barren desert steppes...this sandy covering, the desert surface was genexally firm enough to support wheeled transport. South of the Holsten Rivex eucalyptus trees grew

  20. Unintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector

    DTIC Science & Technology

    2014-07-01

    the conclusions in the Verizon Data Breach Report 2013 that 47% of malware was downloaded through e-mail at- tachments, 48% of hacking took place...the attackers pivoted onto other systems and databases and exfiltrated approximately 8.2 GB of data . BREACH : Accessing an employee account via a...Symantec. “Internet Security Threat Report 2014.” 2013 Trends 19 (April 2014). Symantec Cor- poration. [Verizon 2013] Verizon. 2013 Data Breach Investigations

  1. The hack attack - Increasing computer system awareness of vulnerability threats

    NASA Technical Reports Server (NTRS)

    Quann, John; Belford, Peter

    1987-01-01

    The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).

  2. Re-engineering the Pancreas Tumor Microenvironment: A "Regenerative Program" Hacked.

    PubMed

    Evan, Gerard I; Hah, Nasun; Littlewood, Trevor D; Sodir, Nicole M; Campos, Tania; Downes, Michael; Evans, Ronald M

    2017-04-01

    The "hallmarks" of pancreatic ductal adenocarcinoma (PDAC) include proliferative, invasive, and metastatic tumor cells and an associated dense desmoplasia comprised of fibroblasts, pancreatic stellate cells, extracellular matrix, and immune cells. The oncogenically activated pancreatic epithelium and its associated stroma are obligatorily interdependent, with the resulting inflammatory and immunosuppressive microenvironment contributing greatly to the evolution and maintenance of PDAC. The peculiar pancreas-specific tumor phenotype is a consequence of oncogenes hacking the resident pancreas regenerative program, a tissue-specific repair mechanism regulated by discrete super enhancer networks. Defined as genomic regions containing clusters of multiple enhancers, super enhancers play pivotal roles in cell/tissue specification, identity, and maintenance. Hence, interfering with such super enhancer-driven repair networks should exert a disproportionately disruptive effect on tumor versus normal pancreatic tissue. Novel drugs that directly or indirectly inhibit processes regulating epigenetic status and integrity, including those driven by histone deacetylases, histone methyltransferase and hydroxylases, DNA methyltransferases, various metabolic enzymes, and bromodomain and extraterminal motif proteins, have shown the feasibility of disrupting super enhancer-dependent transcription in treating multiple tumor types, including PDAC. The idea that pancreatic adenocarcinomas rely on embedded super enhancer transcriptional mechanisms suggests a vulnerability that can be potentially targeted as novel therapies for this intractable disease. Clin Cancer Res; 23(7); 1647-55. ©2017 AACR See all articles in this CCR Focus section, "Pancreatic Cancer: Challenge and Inspiration." ©2017 American Association for Cancer Research.

  3. Better value digital health: the medium, the market and the role of openness.

    PubMed

    Reynolds, Carl J

    2013-08-01

    The recent NHS 'hack days' have showcased the enthusiasm and talent of the junior doctor body as well as the potential of open source, open governance and small-medium enterprise. There still remains much scope for developing better value digital health services within the NHS. This article sets out the current state of NHS information technology (IT), how it fails to meet the needs of patients and professionals alike and suggests how better value digital health can be achieved.

  4. Titanium Matrix/Continuous Fiber Composite Interface Interactions and their Influence on Mechanical Properties.

    DTIC Science & Technology

    1983-02-25

    Southwest Research Institute, Gerry Leverand, David Davidson and John Hack . 3. Discussions with Howard Katzman, Gary Steckle and George Kendall...C 10- 4 Ti-6A1-4V (4 K/ETi) -3 b.. ~. 010 10-5i I L ai f /Ec=20 x 10 6 psi w E~i=68 x 106 ps4 !i:’ )i"N2 Ti Ŕ-4 - 1x i - 3 1 0’- 3 10 - 1&~0 10ps

  5. Protecting the Homeland Report of the Defense Science Board Task Force on Defensive Information Operations. 2000 Summer Study. Volume II

    DTIC Science & Technology

    2001-03-01

    between attacks and other events such as accidents, system failures, or hacking by thrill-seekers. This challenge is exacerbated by the speed of events in...International Telegraph and Telephone (CCITT) international standards body and is referred to as Signaling System # 7 ( SS7 ). Commerc" I Intelligent...point to fixed infrastructure "" Signaling Transfer Point (STP) - Packet switch in CCITT#7 Network STP ... SS7 * System Data Bases i Network

  6. Guided Tour of Pythonian Museum

    NASA Technical Reports Server (NTRS)

    Lee, H. Joe

    2017-01-01

    At http:hdfeos.orgzoo, we have a large collection of Python examples of dealing with NASA HDF (Hierarchical Data Format) products. During this hands-on Python tutorial session, we'll present a few common hacks to access and visualize local NASA HDF data. We'll also cover how to access remote data served by OPeNDAP (Open-source Project for a Network Data Access Protocol). As a glue language, we will demonstrate how you can use Python for your data workflow - from searching data to analyzing data with machine learning.

  7. Establishing and operating an incident response team

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Padgett, K.M.

    1992-09-01

    Occurrences of improprieties dealing with computer usage are on the increase. They range all the way from misuse by employees to international computer telecommunications hacking. In addition, natural disasters and other disasters such as catastrophic fires may also fall into the same category. These incidents, like any other breach of acceptable behavior, may or may not involve actual law breaking. A computer incident response team should be created as a first priority. This report discusses the establishment and operation of a response team.

  8. Establishing and operating an incident response team

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Padgett, K.M.

    1992-01-01

    Occurrences of improprieties dealing with computer usage are on the increase. They range all the way from misuse by employees to international computer telecommunications hacking. In addition, natural disasters and other disasters such as catastrophic fires may also fall into the same category. These incidents, like any other breach of acceptable behavior, may or may not involve actual law breaking. A computer incident response team should be created as a first priority. This report discusses the establishment and operation of a response team.

  9. Consortia for Improving Medicine with Innovation and Technology (formerly known as Center for Integration of Medicine and Innovative Technology)

    DTIC Science & Technology

    2015-12-01

    Period 2011 Out - 001585 11-484 Award Closed Hacking, Adam Non-invasive Fasciotomy to Treat Extremity Compartment Syndrome 2012 Out - 001706 12-1173...10-592 Award Closed Kaushal, Shalesh Low Energy Laser as a Therapeutic for Dry Age-related Macular Degeneration 2011 Out - 001607 11-397 Award Closed...Electrostatic dry powder inhaler for constant dose respiratory drug delivery 2010 Out - 000885 10-512 Award Closed McLaughlin, Bryan An implantable

  10. The Ballistic Research Laboratory CAD Package Release, 4.0, Volume 1: The BRL CAD Philosophy

    DTIC Science & Technology

    1991-12-01

    basis. As with many large systems, parts of it were the result of years of evolution , with many band-aids, hacks, and •backward compatibility...6) and from a PATCH file VIa the FASTGEN code [ 5 ) Over a period spannmg more than fifteen years , two stgntficant communities of vulnerability...Release 4.0 follow the man pages. Release 3.0 Notes and Errata Sheets are found in the last sections of this volume. Papers discussing supplemental

  11. The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law Enforcement’s Role?

    DTIC Science & Technology

    2001-04-01

    defined as cyber crime or —hacker“. Although this category of hacker includes many kinds of cyber criminals , from a DOD perspective, the motivation of a...perpetrator. 6 In his book, —Fighting Computer Crime“, Wiley identifies several types of cyber criminals . They range from pranksters who perpetrate...usually financial11 This first group of cyber criminals or —hackers“ can be categorized as Unintentional Cyber actors. Although they have a variety of

  12. On Contending with Unruly Neighbors in the Global Village: Viewing Information Systems as Both Weapon and Target

    DTIC Science & Technology

    2011-04-01

    pornographic sites [Moaveni, 2002]. This demonstrates the flipside of launching online attacks: one tends to live within a ―glass house‖ created by the cycle of...also apparently has at times been in business running pornographic websites may somehow seem ironic given the target of its efforts. 302 Volume 28...National Security and What to Do About It, New York, NY: HarperCollins. CNN.com (2002) ― Pornographer Says He Hacked al Qaeda‖, Aug. 8, http

  13. On the Suitability of Radios That Interface with Tactical Apps on Android OS

    DTIC Science & Technology

    2014-08-21

    comprising TEC3 and longer-term research): a tablet with its own internal chip connected to a MANET; a tablet tethered to a TP-LINK3 connected to the...MANET; a tablet tethered to a TP-LINK connected to the MANET, and connected to the Internet (as a gateway) with its own internal chip; a tablet...establishment; and a tablet with its own internal chip connected to the MANET, and tethered to a HackRF to perform sensing operations. These

  14. Ignoring a Revolution in Military Affairs: The Need to Create a Separate Branch of the Armed Forces for Cyber Warfare

    DTIC Science & Technology

    2017-06-09

    those with talent in the computer sciences. Upon graduation from high school, computer -proficient teenagers are selected for an elite cyber force and...Arguably, the Massachusetts Institute of Technology (M.I.T.) is the premiere institution for computer science. M.I.T. graduates make, on average, $83,455...study specific to computer science and provide certification in programs like ethical hacking, cyber security, and programing. As with the other

  15. The Equivalent Static Accelerations of Shock Motions

    DTIC Science & Technology

    1948-06-21

    BLOW 3 HACK -.,. .:■-■ 5" PACK BL 0 » .r .a ^r .’.«.«.« -a TrMr Ih’fflVJiL BETWEEN TPACF IN’EHh Fig. 12...I • • • • fa « --^ o <« is >• 8 Sa 3 I! o • n Is i ä «H « <" 0 tJ u _ a> l-’S- bO ^ 2 c S3 5 | J5 I c a> 6 v fa 3

  16. Wireless Network Security Vulnerabilities and Concerns

    NASA Astrophysics Data System (ADS)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  17. Netwar

    NASA Astrophysics Data System (ADS)

    Keen, Arthur A.

    2006-04-01

    This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.

  18. Public Water Supply, Red River Parish, Louisiana.

    DTIC Science & Technology

    1982-04-01

    aI -4 w0 > k)~ 04 00 004 0 Ř 1-4 ua4 0 to 441 Ia) 40 1.H r. ) 4 14w w. ’a (A 0a 4) 0 a 0 Ai 0 41 .a- .a. to 0tic .. 9-:. PS4 W w~ u 00 r4 to- $4 0...tidT.ant sho~uld he recoarded on the hack -4 VA IL Ilbis Ir t o a. st.panite %heef andI alla, hv.. r I L_ 1 1 14. 4;. ian the valaies in ech

  19. SCP -- A Simple CCD Processing Package

    NASA Astrophysics Data System (ADS)

    Lewis, J. R.

    This note describes a small set of programs, written at RGO, which deal with basic CCD frame processing (e.g. bias subtraction, flat fielding, trimming etc.). The need to process large numbers of CCD frames from devices such as FOS or ISIS in order to extract spectra has prompted the writing of routines which will do the basic hack-work with a minimal amount of interaction from the user. Although they were written with spectral data in mind, there are no ``spectrum-specific'' features in the software which means they can be applied to any CCD data.

  20. Ideas for Advancing Code Sharing: A Different Kind of Hack Day

    NASA Astrophysics Data System (ADS)

    Teuben, P.; Allen, A.; Berriman, B.; DuPrie, K.; Hanisch, R. J.; Mink, J.; Nemiroff, R. J.; Shamir, L.; Shortridge, K.; Taylor, M. B.; Wallin, J. F.

    2014-05-01

    How do we as a community encourage the reuse of software for telescope operations, data processing, and ? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainstorming sessions and a brief summary by the moderator.

  1. Bell nonlocality: a resource for device-independent quantum information protocols

    NASA Astrophysics Data System (ADS)

    Acin, Antonio

    2015-05-01

    Bell nonlocality is not only one of the most fundamental properties of quantum physics, but has also recently acquired the status of an information resource for device-independent quantum information protocols. In the device-independent approach, protocols are designed so that their performance is independent of the internal working of the devices used in the implementation. We discuss all these ideas and argue that device-independent protocols are especially relevant or cryptographic applications, as they are insensitive to hacking attacks exploiting imperfections on the modelling of the devices.

  2. Water Powered Tools

    NASA Technical Reports Server (NTRS)

    1976-01-01

    Space Spin-Offs, Inc. under a contract with Lewis Research Center and Marshall Space Flight Center produced a new water-powered saw that cuts through concrete and steel plate reducing danger of explosion or electric shock in rescue and other operations. In prototype unit efficient water-powered turbine drives an 8 inch diameter grinding disk at 6,600 rpm. Exhaust water cools disk and workpiece quenching any sparks produced by cutting head. At maximum power, tool easily cuts through quarter inch steel plate. Adapter heads for chain saws, impact wrenches, heavy duty drills, and power hack saws can be fitted.

  3. A global distributed basin morphometric dataset

    NASA Astrophysics Data System (ADS)

    Shen, Xinyi; Anagnostou, Emmanouil N.; Mei, Yiwen; Hong, Yang

    2017-01-01

    Basin morphometry is vital information for relating storms to hydrologic hazards, such as landslides and floods. In this paper we present the first comprehensive global dataset of distributed basin morphometry at 30 arc seconds resolution. The dataset includes nine prime morphometric variables; in addition we present formulas for generating twenty-one additional morphometric variables based on combination of the prime variables. The dataset can aid different applications including studies of land-atmosphere interaction, and modelling of floods and droughts for sustainable water management. The validity of the dataset has been consolidated by successfully repeating the Hack's law.

  4. Defense Science Board 2003 Summer Study on DoD Roles and Missions in Homeland Security. Volume 1

    DTIC Science & Technology

    2003-11-01

    were used to develop a web-based "deployment picture." (A little money -a few million dollars-can go a long way in the combatant commands). OSD critical...AND MISSIONS f1 HOMELAND SECURJTY 91 APP8VD&XH Dr. Mark Harper U.S. Naval Academy Mr. Art Money Private Consultant Mr. Walter Morrow, Jr. MIT Lincoln...Protection BrigGen Irv Halter Discussion Mr. John Lauder Overview of NRO support to Homeland Security Mr. Brian Hack and Mr. Alan NRO Comms - NRO backbone

  5. Hacking into the granuloma: could antibody antibiotic conjugates be developed for TB?

    PubMed

    Ekins, Sean

    2014-12-01

    Alternatives to small molecule or vaccine approaches to treating tuberculosis are rarely discussed. Attacking Mycobacterium tuberculosis in the granuloma represents a challenge. It is proposed that the conjugation of small molecules onto a monoclonal antibody that recognizes macrophage or lymphocytes cell surface receptors, might be a way to target the bacteria in the granuloma. This antibody drug conjugate approach is currently being used in 2 FDA approved targeted cancer therapies. The pros and cons of this proposal for further research are discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Automation of Cyber Penetration Testing Using the Detect, Identify, Predict, React Intelligence Automation Model

    DTIC Science & Technology

    2013-09-01

    Ethical hacking & penetration testing,” University of Waterloo, Waterloo, Canada, 2011. [2] B. Jurjonas, “Smart selection and configuration of...Ettercap (XP) X X X X Wireshark X tshark X X Tethereal (XP) *Command line version of Ethereal * X X X X tcpdump X NetStumbler ( Wifi ) X X...Ethereal X X X dsniff X X X X Kismet ( Wifi ) X X X EtherApe X X X Netcat X X X X 2. Robustness Due to the limitations of the operating

  7. Defense Department Cyber Efforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

    DTIC Science & Technology

    2011-05-01

    communications and on computer networks—its Global Information Grid—which are potentially jeopardized by the millions of denial-of-service attacks, hacking ...Director,a National Security Agency Chief of Staff Joint Operations Center Defense Information Systems Agency Command Center J1 J2 J3 J4 J5 J6 J7 J8...DC Joint Staff • J39, Operations, Pentagon, Washington, DC • J5 , Strategic Plans and Policy, Pentagon, Washington, DC U.S. Strategic Command • J882

  8. Nondeestructive Measurement of Residual and Enforced Stresses by Means of X-Ray Diffraction. 2 - Some Applications to Aircraft Problems

    DTIC Science & Technology

    1945-11-01

    appliod, and then hacked off "by 15 por.cent "before EJaking tho X—ray exposures. To find what tho stroös distribution... J5 2.868 H s 3 a) 8.860 • ••4 4» 3 S.8S8 87 1.23 1.84 1.86 1.88 Ratio D 1.30 1.38 1.34 1.36 VD’« fro« f11a Figur« 37a.- Ohart for

  9. Nuclear Tracer Measurements of Low Temperature Water Diffusion in Silicon Dioxide (Si02) Thin Films.

    DTIC Science & Technology

    1982-06-01

    that value stably. . -:-’.i s ’.i1:n evacuated, this time through the hacking valve, and the w", ’<ought up to temperature. No difficulty was...I F+ ;. 91 F l i, : -’ t’.l [iv p IIf: i - 4’. -njf I’, I J5 + , -;4, I *,F’Th’.I , 1-5i . ]Ci-,Pr’I[’ t:I-., KJFFC "’ i 1! V TIt . F * F , 3l- . fr

  10. Evaluation of Tools for Protection of Interest against Hacking and Cracking

    NASA Astrophysics Data System (ADS)

    Jahankhani, Hossein; Antonijevic, Branko; Walcott, Terry

    The internet considered a tool that effectively ensures communication globally has been hindered by hackers and crackers continuously. In so doing, a multitude of network facilitated tools such as firewalls, virtual private networks (VPN) and a variety of antivirus software packages has been enabled for dealing with such predicaments. However, more often than not these facilitated tools are marketed as perfect solutions to the ever culminating problems such as loss of data and privacy in networked and world wide intercommunications. We provide a forum for addressing these perceived problems in this paper.

  11. Trunk muscle activation in the back and hack squat at the same relative loads.

    PubMed

    Clark, David R; Lambert, Michael I; Hunter, Angus M

    2017-07-12

    The hack squat (HS) is likely to produce a greater 1 repetition maximum (1RM) compared to the back squat (BS). This can be attributed to the support of the trunk during the HS compared to no support during BS. This support however, may compromise trunk muscle activation (TMA), therefore producing different training adaptations. Accordingly, the purpose of this study was to compare 1RM in BS and HS and TMA at 4 relative loads, 65, 75, 85 and 95% of maximal system mass. Ten males completed 3 test sessions:1) BS and HS 1RM, 2) HS & BS neuromuscular test familiarization, and, 3) Neuromuscular test for 3 reps at 4 loads for BS and HS. BS TMA was significantly greater (p<0.05) than HS for all muscles and phases except rectus abdominus in concentric phase. TMA increased (p<0.05) with load in all muscles for both exercises and phases apart from lumbar sacral erector spinae in HS eccentric phase. Mean HS 1RM and submaximal loads were significantly (p<0.0001) higher than the equivalent BS loads. Duration of the eccentric phase was higher (p<0.01) in HS than BS but not different in concentric phase. Duration increased significantly (p<0.01) with load in both exercises and both phases. Despite higher absolute tests loads in HS, TMA was higher in BS. TMA is sensitive to load in both exercises. BS is more effective than HS in activating the muscles of the trunk and therefore arguably more effective in developing trunk strength and stability for dynamic athletic performance.

  12. An analysis of United States K-12 stem education versus STEM workforce at the dawn of the digital revolution

    NASA Astrophysics Data System (ADS)

    Cataldo, Franca

    The world is at the dawn of a third industrial revolution, the digital revolution, that brings great changes the world over. Today, computing devices, the Internet, and the World Wide Web are vital technology tools that affect every aspect of everyday life and success. While computing technologies offer enormous benefits, there are equally enormous safety and security risks that have been growing exponentially since they became widely available to the public in 1994. Cybercriminals are increasingly implementing sophisticated and serious hack attacks and breaches upon our nation's government, financial institutions, organizations, communities, and private citizens. There is a great need for computer scientists to carry America's innovation and economic growth forward and for cybersecurity professionals to keep our nation safe from criminal hacking. In this digital age, computer science and cybersecurity are essential foundational ingredients of technological innovation, economic growth, and cybersecurity that span all industries. Yet, America's K-12 education institutions are not teaching the computer science and cybersecurity skills required to produce a technologically-savvy 21st century workforce. Education is the key to preparing students to enter the workforce and, therefore, American K-12 STEM education must be reformed to accommodate the teachings required in the digital age. Keywords: Cybersecurity Education, Cybersecurity Education Initiatives, Computer Science Education, Computer Science Education Initiatives, 21 st Century K-12 STEM Education Reform, 21st Century Digital Literacies, High-Tech Innovative Problem-Solving Skills, 21st Century Digital Workforce, Standardized Testing, Foreign Language and Culture Studies, Utica College, Professor Chris Riddell.

  13. Geodiversity and the natural history of landforms

    NASA Astrophysics Data System (ADS)

    Giusti, Christian

    2014-05-01

    For a long time, landforms were studied according to the criteria exposed in the theory of the geographical cycle, at least for geomorphologists claiming a Davisian approach. In this context, particular importance was attached, concerning landforms, to the remains of "peneplains". At this point, it must be remembered that Davis has never been followed unanimously, including the United States, but it was the German geomorphologists who by far developed the strongest criticism of Davisian ideas: scientists such as Albrecht Penck, Siegfried Passarge or Johannes Walther could not be satisfied with views so different of concepts and methods used by German naturalists in geology, geography and geomorphology. This intellectual opposition, however, leads Davis to constantly improve the model of the geographical cycle depending on climatic conditions (arid cycle, glacial cycle…), thick formations of limestones (karstic cycle), or a peculiar geographical position (coastal cycle, coral reef problem). After 1950, Davisian conceptions were, either abruptly given up (Strahler), or severely criticized (Tricart, Hack, Chorley), or deeply modified (King, Baulig, Klein), in particular to make them compatible with situations where it is not possible to identify in the topography the remains of several geographic cycles. For example, in the case of the Appalachians, Hack's originality is to reason exactly at the opposite to Davis and Johnson. Where the latter would select in the topographic continuum supposed elements of successive cycles, in order to interpret current landscape with the hypothetical lights of a theoretical past, Hack starts by a comprehensive analysis of landforms, patterned reliefs and soils of the present mountain chain, leading to the famous conclusion that the Appalachians are not evolving under decay conditions but are in situation of steady state through dynamic equilibrium. So the question becomes now to understand how far it is relevant and how it is possible for a geomorphologist to travel back in the past, a delicate and speculative succession of operations: as noted by Schumm (1979, 485), "The extrapolation of measured average rates of erosion and deposition to longer periods of time is misleading, in the sense that they do not reveal the natural complexity of landform development or the variability of existing landforms". Any extrapolation in the past or future implies true actualiste approach verifying only methodological uniformitarianism (i.e. spatial and temporal invariance of natural laws) as well as quantitative models purged of any hint of gradualism and which takes into account variations of timing, frequency and intensity in the action of morphogenetic forcings. In continuation of Hack's work, the concepts of landscape sensitivity developed by Brunsden and Thornes (1979) explain that some landforms are particularly well fitted to the present conditions of endogenetic and exogenetic forcings (characteristic landforms) while others not at all (transient landforms). This highly effective approach within the Holocene and the Pleistocene marks the beginning of a return to the investigation of the past in geomorphology, given that for the Neogene or even older times, the ancient concept of "héritage" (Birot, 1958) seems more relevant than the concepts of transient or characteristic landforms. We propose here as an illustration to describe the sequence of landforms defined in the Southern Massif Central (France). The full sequence is to be observed between the Languedoc Lowlands and the Monts de Lacaune Highlands, while an elision of the lower terms of the sequence towards the Aquitaine Basin allow to highlight a highly significant limit between two modes of landform development at regional level. In short, the natural history of landforms deserve a high status in the Earth sciences: geomorphology not only needs mechanics and chemistry (i.e. the changing ratio of tectonic-driven to climatic-driven processes), but history too (i.e. landform development in space and time).

  14. Mandrake--an ancient herbal discovered.

    PubMed

    Sutcliffe, Terry

    2008-09-01

    I recently purchased the pharmacy container (illustrated) from an antique dealer friend who had kept three of these tins for 20 years intending to convert them into lamp bases. Fortunately I persuaded him to sell them to me rather than being hacked up. The other two are labeled 'BETT. RT PUL' 'LUNGWORT'. (All three are similarly painted, lidded tins and all stand 13 inches high, with a diameter of seven inches.) The label 'MANDRAKERT' immediately conjured up two impressions, firstly my boyhood reading of Mandrake the magician comics, and secondly a strong interest to research the story behind this 19th century tin's mystical contents.

  15. A very deep IRAS survey. III - VLA observations

    NASA Astrophysics Data System (ADS)

    Hacking, Perry; Condon, J. J.; Houck, J. R.; Beichman, C. A.

    1989-04-01

    The 60-micron fluxes and positions of sources (primarily starburst galaxies) found in a deep IRAS survey by Hacking and Houck (1987) are compared with 1.49 HGz maps made by the Very Large Array. The radio results are consistent with radio measurements of brighter IRAS galaxies and provide evidence that infrared cirrus does not contaminate the 60-micron sample. The flux-independent ratio of infrared to radio flux densities implies that the 1.4 GHz luminosity function for spiral galaxies is evolving at less than (1 + z) to the power of 4 relative to the 60-micron luminosity function.

  16. POCKET $beta$ AND $gamma$ RADIOMETER (in Russian)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Markelov, V.V.; Lushikhin, A.M.; Nikoforov, V.I.

    A pocket BETA and gamma rate meter was designed by the Academy of Medical Sciences of U.S.S.R. for detecting gamma radiation of 0.25 to 2 Mev and for BETA particles of 0 to 50 and 0 to 500 particles/cm/sup 2/sec, with energies of 0.5 to 2 Mev. Measurements of BETA particles are made through the hack wall opening in the appuratus. The opening is closed durtng the recording of gamma radiation, which permits differentiation between the BETA and gamma radiation. The accuracy of the counter is within plus or minus 15%. (R.V.J.)

  17. Theoretical Investigations of Nitrocubane Decomposition.

    DTIC Science & Technology

    1988-02-29

    this line are the ammonium nitronate salts, e.g., 5j rNH C(NO,) 3 The synthesis and characterization of nitrocubanes such as these is currently of...arceenit i th the experimental results is also very good except at the 0% 40 30 00 C-)0 ~10 00 10 -0.8 -0.4 0.0 0.4 0.8 1.2 s(aO) 1Fiunpre 2. Comparison...excellent (differences of 18- 40 %) but at higher temperatures the computed rates are f .actors of 2.2 to 2.7 lwer than the results of Hack et. al. The

  18. Sony’s Nightmare before Christmas: The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace

    DTIC Science & Technology

    2018-02-01

    4,  2014), http://www.businessinsider.com/ experts-the-sony-hack-looks-a-lot-like-previous-attacks-on- south-korea-2014-12. 39 Kim Zetter, “Logic Bomb ...Set Off South Korea Cyberattack,” Wired (March 21, 2013), https://www.wired.com/2013/03/logic- bomb -south-korea-attack/. 40 Brian Krebs, “The Case...Agency (March  21,  2013), http://english.yonhapnews.co.kr/ national/2013/03/21/55/0302000000AEN20130321003552315F. HTML. 47 Kim Zetter, “Logic Bomb

  19. Using RF-DNA Fingerprints to Discriminate ZigBee Devices in an Operational Environment

    DTIC Science & Technology

    2013-03-01

    network keys and Media Access Control (MAC) lists which can be subverted through interception and spoofing using open-source hacking tools. This work...for Mobile Communication (GSM) cellular phones [40, 47], IEEE 802.11 WiFi [21, 23, 24, 28, 29, 35, 42], and IEEE 802.16 WiMAX [34, 35, 37, 38, 48...802.11a WiFi × [21, 28–30, 35, 48] GSM Cellular × [39, 40, 47] 802.16e WiMax × [34, 35, 38, 48] 802.15.4 ZigBee × [31] × [11, 12] Classifier Type MDA/ML

  20. PROCESS DEVELOPMENT QUARTERLY REPORT. II. PILOT PLANT WORK

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kuhlman, N. ed.

    1957-05-01

    Progress is reported on the gross solubility of U in digestions of Mallinokrodt feed materials, studies of variables affecting U purity in a TBP hexane extraction cycle, low-acid flowsheet for TBP--hexane extraction process based on a 440 g U/liter in lM HNO/sub 3/ digest liquor, hacking studies in the pilot plant pumperdecanter system, recovery of U from residues from the dingot process, lowering the H level in dingot metal, forging of dingot bar stock, dingot extrusion, fubrication of UO/sub 2/ fuel elements, and the determination of H content of derby and ingot metal. (W.L.H.)

  1. Hacker tracking Security system for HMI

    NASA Astrophysics Data System (ADS)

    Chauhan, Rajeev Kumar

    2011-12-01

    Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.

  2. Outcomes From AAS Hack Day at the 227th AAS Meeting

    NASA Astrophysics Data System (ADS)

    Kohler, Susanna

    2016-01-01

    Editors Note:This is a final post from the 227th AAS Meeting in Kissimmee, FL. This special summary of AAS Hack Day, a meeting of AAS members to collaboratively work on various small projects, was written by Meredith Rawls (@Merrdiff) and was originally posted on astrobites.com.As the 227thAmerican Astronomical Society meeting drew to a close (see highlights from Day 1, Day 2, Day 3, and Day 4), a group of at least 50 attendees spent Day 4working on small projects fondly called hacks. Thanks to sponsorship from LSST and Northrup Grumman, the industrious hackers werewell-caffeinated and fed so we could devote time and energy toworking in groups on one-day projects.TheHack Day beganat 10am with pitches. Anybody with a project idea was welcome to briefly speak and try to convince others to work with them. Only someideas panned out, but the enthusiasm was palpable. Its not every day you get a full room of astronomers and affiliates eager to spend hours working on fun and useful projects to benefit the community.#hackAAS is getting underway! #aas227 pic.twitter.com/yX7jlOnSCK James R A Davenport (@jradavenport) January 8, 2016Here is a rundown of what we accomplished. Pretty impressive for a single day! Many thanks to fellow astrobiter Erika Nesvold (now at Carnegie DTM; @erikanesvold) whose hack was live-documenting all the other hacks. Her tweets as @astrobites appeared with the #hackaas hashtag, and her notes made this recap post infinitely easier to write.Interested in joining the fun? Sign up for Hack Day at the 2017 JanuaryAAS meeting (its free with meeting registration), and consider applying for the .Astronomy conference this summer.Towards Optimal Session Scheduling:Adrian Price-Whelan (Columbia), David Hogg (NYU), and Scott Idem (AAS) began writing a program to take all submitted abstracts to a conference like AAS and sort them using keywords to avoid scheduling similar talks in parallel sessions. Its impossible to make everyone happy, but minimizing conflicts will be a huge first step.Gender in Astronomy Conferences: Jim Davenport (WWU), Ben Nelson (Northwestern), Mehmet Alpsalan (NASA Ames), and Erin Maier (University of Iowa) analyzed data collected during the conference on the gender breakdown of who asks questions after oral presentations. Now in its third year, one new finding from the study is that women dont ask questions as much as men do, but they tend to ask questions more when the speaker is a woman or the first question-asker is a woman.More from #hackaas at #aas227: Gender of speaker vs. 1st to ask a question for all 3 years of Gender in Astro survey pic.twitter.com/l74D3rSUOD Erin Maier (@fallelujah) January 9, 2016The Early Reference Project: Many pre-1950 publications lack up-to-date citation information because the text is digitally archived as an image. Brendan Wells (UC Santa Cruz) worked with representatives from ADS and Zooniverse to set up a crowd-sourced platform to identify references in these old papers.Glassdome: Ellie Schwab (CUNY) and colleagues Paige Godfrey, Munazza Alam, and Cam Buzzard began work on a website modeled after glassdoor for safely sharing experiences throughout their astronomy careers. Glassdome will feature career path stories, department reviews, and salaries, all optionally anonymous. The site is hosted by ScienceBetter and is under development.Observing Run Sharing: Sometimes near the end of a long night at the telescope you have observed everything you need but still have time left. Short of choosing randomly or hoping a colleague is online in the middle of the night, there is currently no good solution. To address this, Brooke Simmons (UC San Diego) designed a web app that would allow astronomers to submit their favorite night sky targets. The project is still a work in progress.ArXiv Podcast: Ruth Angus (Oxford) started a podcast featuring astronomers summarizing their new papers submitted to astro-ph in one minute. Its like audio astrobites! If youve recently published a paper, Ruth is seeking contributions of one-minute audio recordings.RadioFree LST: Radio observers dont care when the Sun is up, but they do care if their astronomical objects of interest are above the horizon. Demitri Muna (Ohio State) and Amanda Kepley (NRAO) created a calculator which uses local sidereal time (LST) to determine when sources rise and set based on the position of the observatory and the coordinates of the target..@demitrimuna @aakepley are creating a LST calculator for radio telescopes. #radiofreelst #hackaas pic.twitter.com/TEAdYe3hvi astrobites (@astrobites) January 8, 2016Hidden Killer Detective: The Kepler spacecraft has enabled many discoveries related to exoplanets and stars. But now that K2 is observing in the ecliptic plane, it should also find asteroids. Geert Barentsen (NASA Ames), Tom Barclay (NASA Ames), Meg Schwamb (ASIAA), and Brooke Simmons (UC San Diego) created a new crowd-sourced Zooniverse project so anyone can help search for moving objects that may be asteroids.Expanding Astronomy on Tap: This casual science pub night, started in 2013, is now a regular event in seven cities worldwide. Jeff Silverman (UT Austin) created a Launch Manifesto and guide for bringing Astronomy on Tap to your own city. If youre interested, fill out their survey to get more information.The Arceli Project: Arceli is publishing online astronomy content. A team led by ScienceBetter and Kelle Cruz (CUNY) including Daina Bouquin (Harvard CfA), Aram Zucker-Scharff, Lars Holm Nielsen (CERN), Jonathan Sick (LSST), Chris Erdmann (Harvard CfA), and Meredith Rawls (NMSU) worked on getting each component of Arceli to talk to the others. Eventually, Arceli will accept submissions of informal scholarly contentlike blog postswhich will become archived and citable just like traditional papers.Special Dark: Leonidas Moustakas (JPL/Caltech) and Tonima Ananna (Yale) hosted a special session at this years AAS meeting all about dark matter. During hack day, they began a repository for information that may help constrain the nature of dark matter. Assuming dark matter is aparticle, many different kinds of astronomical observations can help nail down its properties, but they are scattered all over the literature. The goal is to compile these observations in one place so the community can piece together a more complete picture of dark matter. A preliminary table of overlap from different astronomical surveys is available online..@lamoustakas @tonimatasnim are compiling dark matter data into one useful #specialdark repository. #hackaas pic.twitter.com/LnkDotaHej astrobites (@astrobites) January 8, 2016BibTeX Updater: Mike Lund (Vanderbilt) wrote a python program that takes a citation database created by Mendeley and updates its BibTeX reference information. This tool will help anyonewho uses Mendeley as a citation manager and writes papers in LaTeX with BibTeX. By the end of the day, someone from Mendeley had already gotten in touch with Mike to talk about implementing his fixes!Improved Plotly Colormaps: The open source Java graphing code plotly.js lacks colorblind-friendly color tables, so Timothy Pickering (STScI) added some. The color schemes include the new default viridis from matplotlib and are perceptually uniform, meaning they dont have any significant perceptual jumps in color. They are better for displaying data whether youre colorblind or not. Look for the new colors to be available after he submits a pull request to the main plotly repository.Interfacing with Amazons Web Services: Meagan Lang (UIUC), Kyle Conroy (Vanderbilt), and Kaylan Burleigh (UC Berkeley/LBNL) worked on a package to streamline running computing jobs with Amazons distributed computing. Right now, you can run parallelized computer programs with Amazon Web Services and pay per CPU-hour, but its a hassle to set everything up and ensure youdont pay for more time than you need. Their new rc-submit solves this.#MarsFilter: Becky Smethurst (Oxford), Meredith Durbin (STScI), and Jana Grcevich (AMNH) developed a filter for digital photos to make them look like they were taken on Mars by Curiosity.Coming soon from @becky1505 co: #marsfilter, for making your images look like they were taken on #Mars! #hackaas pic.twitter.com/2LVA1DRmwh Lucianne Walkowicz (@shaka_lulu) January 8, 2016Different Kind of Kepler Light Curve: Every so often, the Kepler spacecraft sends us an image of its entire field of view rather than just small regions of pixels near specific stars. Jennifer Cash (South Carolina U), Lucianne Walkowicz (Adler), and Joe Filipazzo (CUNY) worked with these Full-Frame Images to identify all the sources. The next step is to identify all the stars in the image and perform aperture photometry.There are likely new exoplanets, binary stars, and other interesting variable sources hidden in this dataset.Exoplanets in the WorldWide Telescope (WWT): Did someone say exoplanets?WWT, now run by the AAS, is an open source data visualization tool often used by planetariums to virtually fly around the Universe.David Weigal (Samford U) worked to improve WWT by adding exoplanetary systems. This was tricky, but he was able to demo one example of a planet orbiting a Sirius-like star.Career Paths: Peter Yoachim (UW) and Eric Bellm (Caltech) took different approaches to study career paths in astronomy. Peter tracked how publishing records affect hiring outcomes, while Eric mapped the careers of astronomers with prize fellowships. Explore their findingshere and here.Preliminary results from Peter Yoachims project show a significantly lower fraction of recent astronomy PhD recipients continue to publish regularly. Figure courtesy of Peter.Testing Stationarity of Time Series Data: Matthew Graham (Caltech) and Phil Marshall (Slac) wrote some codeto determine whether a set of observations taken over a period of time is stationary. This will be useful for surveys like LSST which observe the same source multiple times over many visits. It is important to have a way to quantify if something has changed since the last time we looked at it. Their idea was inspired bya paper about wavelets.FuzzyBlobs: David Nidever (LSST) and Phil Marshall (Slac) worked on a technique to automatically find nearby satellite galaxies to the Milky Way hidden in images from astronomical surveys. The name stems from the fact that satellite galaxies have a low surface brightness and generally appear as faint, fuzzy blobs in images.FabricPoster Fashion (#makeAAS at #hackAAS): What do you get when you bring a sewing machine to a hack day? Dozens of creative garments and accessories fashioned from research posters printed on fabric! This idea was originated on twitterby Emily Rice (CUNY), Josh Peek (STScI), and Ashley Pagnotta (AMNH), and dozens of astronomers including Rachael Livermore (UT Austin) and Haley Fica (Columbia) participated.So pleased with my #hackaas projecttote bag showing off @astr1101s new method of finding R CrB stars! #aas227 pic.twitter.com/1e160XfSQp Ashley Pagnotta (@ashpags) January 9, 2016My knit cowl from strips cut from fabric posters at #aas227 #makeaas #hackaas pic.twitter.com/tguDhDOoMp Katie Frey (@katieefrey) January 9, 2016Good use of #hackaas at #aas227: my research poster is now a stylish skirt! pic.twitter.com/4BPiIfHWnX Rachael Livermore (@rhaegal) January 8, 2016Heres all the #hackaas ex-poster finery at #hackaas from @ashpags @J_M_Silverman and more! pic.twitter.com/ofAYBDjaxH Lucianne Walkowicz (@shaka_lulu) January 8, 2016

  3. Scaling relations for large Martian valleys

    NASA Astrophysics Data System (ADS)

    Som, Sanjoy M.; Montgomery, David R.; Greenberg, Harvey M.

    2009-02-01

    The dendritic morphology of Martian valley networks, particularly in the Noachian highlands, has long been argued to imply a warmer, wetter early Martian climate, but the character and extent of this period remains controversial. We analyzed scaling relations for the 10 large valley systems incised in terrain of various ages, resolvable using the Mars Orbiter Laser Altimeter (MOLA) and the Thermal Emission Imaging System (THEMIS). Four of the valleys originate in point sources with negligible contributions from tributaries, three are very poorly dissected with a few large tributaries separated by long uninterrupted trunks, and three exhibit the dendritic, branching morphology typical of terrestrial channel networks. We generated width-area and slope-area relationships for each because these relations are identified as either theoretically predicted or robust terrestrial empiricisms for graded precipitation-fed, perennial channels. We also generated distance-area relationships (Hack's law) because they similarly represent robust characteristics of terrestrial channels (whether perennial or ephemeral). We find that the studied Martian valleys, even the dendritic ones, do not satisfy those empiricisms. On Mars, the width-area scaling exponent b of -0.7-4.7 contrasts with values of 0.3-0.6 typical of terrestrial channels; the slope-area scaling exponent $\\theta$ ranges from -25.6-5.5, whereas values of 0.3-0.5 are typical on Earth; the length-area, or Hack's exponent n ranges from 0.47 to 19.2, while values of 0.5-0.6 are found on Earth. None of the valleys analyzed satisfy all three relations typical of terrestrial perennial channels. As such, our analysis supports the hypotheses that ephemeral and/or immature channel morphologies provide the closest terrestrial analogs to the dendritic networks on Mars, and point source discharges provide terrestrial analogs best suited to describe the other large Martian valleys.

  4. Geology of the Carnegie museum dinosaur quarry site of Diplodocus carnegii, Sheep Creek, Wyoming

    USGS Publications Warehouse

    Brezinski, D.K.; Kollar, A.D.

    2008-01-01

    The holotype of Diplodocus carnegii Hatcher, 1901, consists of a partial skeleton (CM 84) that was recovered, along with a second partial skeleton of the same species (CM 94), from the upper 10 m of the Talking Rock facies of the Brushy Basin Member of the Morrison Formation exposed along Bone Quarry Draw, a tributary of Sheep Creek in Albany County, Wyoming. A composite measured section of the stratigraphic interval exposed adjacent to the quarry indicates that the Brushy Basin Member in this area is a stacked succession of lithofacies consisting of hackly, greenish gray, calcareous mudstone and greenish brown, dense, fine-grained limestone. The more erosion resistant limestone layers can be traced over many hundreds of meters. Thus, these strata do not appear to represent a highly localized deposit such as a stream channel, oxbow lake, or backwater pond. The Sheep Creek succession is interpreted as representing a clastic-dominated lake where high turbidity and sediment influx produced deposition of calcareous mudstone. During drier periods the lake's turbidity decreased and limestone and dolomite precipitation replaced mud deposition. Microkarsting at the top of some limestone/ dolomite layers suggests subaerial deposition may have prevailed during these dry episodes. The quarry of D. carnegii was excavated within the top strata of one of the numerous intervals of hackly, greenish gray, calcareous mudstone that represent an ephemeral freshwater lake. The quarry strata are directly overlain by 0.3 m of dolomite-capped limestone that was deposited shortly after interment of D. carnegii in the lake mudstones. The close vertical proximity of the overlying limestone to the skeleton's stratigraphic: level suggests that the animal's carcass may have been buried beneath the drying lake deposits during a period of decreased rainfall.

  5. Transgenic Centipedegrass (Eremochloa ophiuroides [Munro] Hack.) Overexpressing S-Adenosylmethionine Decarboxylase (SAMDC) Gene for Improved Cold Tolerance Through Involvement of H2O2 and NO Signaling.

    PubMed

    Luo, Jianhao; Liu, Mingxi; Zhang, Chendong; Zhang, Peipei; Chen, Jingjing; Guo, Zhenfei; Lu, Shaoyun

    2017-01-01

    Centipedegrass ( Eremochloa ophiuroides [Munro] Hack.) is an important warm-season turfgrass species. Transgenic centipedgrass plants overexpressing S-adenosylmethionine decarboxylase from bermudagrass ( CdSAMDC1 ) that was induced in response to cold were generated in this study. Higher levels of CdSAMDC1 transcript and sperimidine (Spd) and spermin (Spm) concentrations and enhanced freezing and chilling tolerance were observed in transgenic plants as compared with the wild type (WT). Transgenic plants had higher levels of polyamine oxidase (PAO) activity and H 2 O 2 than WT, which were blocked by pretreatment with methylglyoxal bis (guanylhydrazone) or MGBG, inhibitor of SAMDC, indicating that the increased PAO and H 2 O 2 were a result of expression of CdSAMDC1 . In addition, transgenic plants had higher levels of nitrate reductase (NR) activity and nitric oxide (NO) concentration. The increased NR activity were blocked by pretreatment with MGBG and ascorbic acid (AsA), scavenger of H 2 O 2 , while the increased NO level was blocked by MGBG, AsA, and inhibitors of NR, indicating that the enhanced NR-derived NO was dependent upon H 2 O 2 , as a result of expression CdSAMDC1 . Elevated superoxide dismutase (SOD) and catalase (CAT) activities were observed in transgenic plants than in WT, which were blocked by pretreatment with MGBG, AsA, inhibitors of NR and scavenger of NO, indicating that the increased activities of SOD and CAT depends on expression of CdSAMDC1 , H 2 O 2 , and NR-derived NO. Our results suggest that the elevated cold tolerance was associated with PAO catalyzed production of H 2 O 2 , which in turn led to NR-derived NO production and induced antioxidant enzyme activities in transgenic plants.

  6. Growth and physiological responses of two phenotypically distinct accessions of centipedegrass (Eremochloa ophiuroides (Munro) Hack.) to salt stress.

    PubMed

    Li, JianJian; Ma, Jingjing; Guo, Hailin; Zong, Junqin; Chen, Jingbo; Wang, Yi; Li, Dandan; Li, Ling; Wang, Jingjing; Liu, Jianxiu

    2018-05-01

    Salinity is one of the major abiotic environmental stress factors affecting plant growth and development. Centipedegrass (Eremochloa ophiuroides [Munro)] Hack.) is an important warm-season turfgrass species with low turf maintenance requirements, but is sensitive to salinity stress. To explore salt tolerant germplasms in centipedegrass and better understand the growth and physiological responses of centipedegrass to salinity, we conducted anatomic observation and phytochemical quantification, examined growth parameters, and investigated photosynthetic machinery and antioxidant system in two phenotypically distinct centipedegrass accessions under NaCl salt stress. The morphophenotypical difference of the stems in the two accessions mainly depends on whether or not a thickened epidermal horny layer with purple colour was formed, which was caused by anthocyanin accumulation in the tissue. Successive salinity treatment was found to result in an inhibition of leaf growth, a marked decrease in photosynthesis, chlorophyll contents, and the maximal photochemical efficiency of PSII (Fv/Fm). Under the same treatment, purple-stem accession (E092) showed a lower degree of inhibition or decrease than green-stem one (E092-1). With the exception of malondialdehyde level, both proline content and antioxidant enzymes were upregulated to a greater extent in E092 following exposure to salinity condition. Meanwhile, significant enhancements of anthocyanin accumulation and total protein synthesis were detected in E092 after salt treatment, but not in E092-1. These results demonstrated that E092 favor better accumulation of anthocyanins under salinity condition, which contribute to salt tolerance by adjusting physiological functions and osmotic balance, and better maintenance of high turf quality. Hence, genetic phenotype can be utilized as a key indicator in E. ophiuroides breeding for salt-tolerance. Copyright © 2018. Published by Elsevier Masson SAS.

  7. Increasing Lean Mass and Strength: A Comparison of High Frequency Strength Training to Lower Frequency Strength Training.

    PubMed

    Thomas, Michael H; Burns, Steve P

    The purpose of this study was to determine the effect strength training frequency has on improvements in lean mass and strength. Participants were 7 women and 12 men, age ( χ̄ = 34.64 years ± 6.91 years), with strength training experience, training age ( χ̄ = 51.16 months ± 39.02 months). Participants were assigned to one of two groups to equal baseline group demographics. High frequency training group (HFT) trained each muscle group as the agonist, 3 times per week, exercising with 3 sets per muscle group per session (3 total body workouts). Low frequency training group (LFT) trained each muscle group as the agonist one time per week, completing all 9 sets during that one workout. LFT consisted of a routine split over three days: 1) pectoralis, deltoids, and triceps; 2) upper back and biceps; 3) quadriceps, hamstrings, calves, and abdominals. Following eight weeks of training, HFT increased lean mass by 1.06 kg ± 1.78 kg, (1.9%), and LFT increased lean mass by .99 kg ± 1.31 kg, (2.0%). HFT strength improvements on the chest press was 9.07 kg ± 6.33 kg, (11%), and hack squat 20.16 kg ± 11.59 kg, (21%). LFT strength improvements on chest press was 5.80kg ± 4.26 kg, (7.0%), and hack squat 21.83 kg ± 11.17 kg, (24 %). No mean differences between groups were significant. These results suggest that HFT and LFT of equal set totals result in similar improvements in lean mass and strength, following 8 weeks of strength training.

  8. β Coronae Bolealis: Lithium and Cerium Contribution to the Blend at 6708 Å

    NASA Astrophysics Data System (ADS)

    Drake, N. A.; Hubrig, S.; Polosukhina, N. S.; de La Reza, R.

    2006-06-01

    We analyze the Li I 6708 Å spectral region of the chemically peculiar Ap star βCrB using high resolution, high signal-to-noise spectra obtained at different rotation phases. Our study shows that the Ce II line at 6708.099 Å is a main contributor to the spectral feature at 6708 Å. This fact explains the observed red shift of the Li I doublet of about 0.2 Å found by Hack et al. (1997). We derive the values of lithium and cerium abundances for different rotation phases and show that βCrB has ``cosmic'' Li abundance.

  9. The quantum Hall effects: Philosophical approach

    NASA Astrophysics Data System (ADS)

    Lederer, P.

    2015-05-01

    The Quantum Hall Effects offer a rich variety of theoretical and experimental advances. They provide interesting insights on such topics as gauge invariance, strong interactions in Condensed Matter physics, emergence of new paradigms. This paper focuses on some related philosophical questions. Various brands of positivism or agnosticism are confronted with the physics of the Quantum Hall Effects. Hacking's views on Scientific Realism, Chalmers' on Non-Figurative Realism are discussed. It is argued that the difficulties with those versions of realism may be resolved within a dialectical materialist approach. The latter is argued to provide a rational approach to the phenomena, theory and ontology of the Quantum Hall Effects.

  10. POLYANA-A tool for the calculation of molecular radial distribution functions based on Molecular Dynamics trajectories

    NASA Astrophysics Data System (ADS)

    Dimitroulis, Christos; Raptis, Theophanes; Raptis, Vasilios

    2015-12-01

    We present an application for the calculation of radial distribution functions for molecular centres of mass, based on trajectories generated by molecular simulation methods (Molecular Dynamics, Monte Carlo). When designing this application, the emphasis was placed on ease of use as well as ease of further development. In its current version, the program can read trajectories generated by the well-known DL_POLY package, but it can be easily extended to handle other formats. It is also very easy to 'hack' the program so it can compute intermolecular radial distribution functions for groups of interaction sites rather than whole molecules.

  11. Robust shot-noise measurement for continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Kunz-Jacques, Sébastien; Jouguet, Paul

    2015-02-01

    We study a practical method to measure the shot noise in real time in continuous-variable quantum key distribution systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e., noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  12. [Do-it-yourself biology and medicine: history, practices, issues].

    PubMed

    Meyer, Morgan

    2018-05-01

    Do-it-yourself (DIY) biology and medicine are based on various practices and logics: amateur and DIY practices, the ethics of hacking and open source, the drive to domesticate molecular biology and genetics, the ideal of participation and citizen science. The article shows that this democratization is a process that is at once spatial (construction of new spaces), technical (creative workarounds equipment), social (establishment of accessible networks/laboratories) and political. It is therefore through their practices, gestures and questions - tinkering, experimenting, working around, amaterializing, ethicizing, comparing, valuating, etc. - that we need to grasp DIY sciences. © 2018 médecine/sciences – Inserm.

  13. Development of Theoretical Foundations for Description and Analysis of Discrete Information Systems

    DTIC Science & Technology

    1975-05-07

    on work of M. Hack , M.W. Marean, J.M, Myers, and P.M. Shapiro. What is presented is an introduction to a body of methods related to Pngmatic...Program FrPPU910 which creates the Account Validation file (FFPFDS20) from input cards without contacting any other files in the system FP-910 The...34•"■ •""^•"’J«^ *• ^’’•"’»’">* ^’*», *’" \\’, A6. S18 FPU PDS 10 Rcqulslclo.) Master S20 FFPFDS20 Account Validation (used to check thai charges

  14. Using the Wiimote as a sensor in water research

    NASA Astrophysics Data System (ADS)

    Hut, R. W.; Weijs, S. V.; Luxemburg, W. M. J.

    2010-12-01

    The $40 "Wiimote" (an input device belonging with the Nintendo® Wii™ game system) can be used by hydrologists as a sensor. The device contains three accelerometers and an infrared camera with built-in source tracking. It communicates by Bluetooth®. Because of the efforts of the hacking community it is now easy to let the Wiimote communicate with a standard personal computer. Using a floating evaporation pan as an example, we show that the Wiimote, although it may have potential drawbacks when used in field campaigns, is a good addition to the hydrologist's bag of tools, especially for proof of concept testing.

  15. Groundwater Classification Document Fort Sheridan, Illinois, Volume 1, Sections 1.0 - 6.0 and Appendicies A - B/GEA5.

    DTIC Science & Technology

    1996-02-08

    SS6. Ccifcted SS7 . Si;*: amount of water Between spoon and 0’.:- Je ol sample. B - 33 Page 3 of - Fort Sheridan RI/FS a r — H5 -20 -25 m o...few cobbles. Colected SS7 . Collected SS8. B - 56 c- _- Fort Sheridan RI/FS Log of Well LF02SB02/LF2MW02 n SL — ID " Q — -15 II CD O...sana anc !Vie gravel, roots, very dark gray brown (IOYR 3/2). low plasticity, soft. aast. Coat sone fine sand and grave* Hack (2.5Y 2/0) to black

  16. A very deep IRAS survey - Constraints on the evolution of starburst galaxies

    NASA Astrophysics Data System (ADS)

    Hacking, Perry; Condon, J. J.; Houck, J. R.

    1987-05-01

    Counts of sources (primarily starburst galaxies) from a deep 60 microns IRAS survey published by Hacking and Houck (1987) are compared with four evolutionary models. The counts below 100 mJy are higher than expected if no evolution has taken place out to a redshift of approximately 0.2. Redshift measurements of the survey sources should be able to distinguish between luminosity-evolution and density-evolution models and detect as little as a 20 percent brightening or increase in density of infrared sources per billion years ago (H/0/ = 100 km/s per Mpc). Starburst galaxies cannot account for the reported 100 microns background without extreme evolution at high redshifts.

  17. A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory

    NASA Astrophysics Data System (ADS)

    Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu

    2014-07-01

    Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.

  18. Relation between the Li spots, dipolar magnetic field and other variable phenomena in the roAp star HD 83368

    NASA Astrophysics Data System (ADS)

    Polosukhina, N.

    The detection of remarkable variations in the profile of the resonance doublet Li I 6708 Å with rotational phase of the roAp star HD 83368 (North et al. 1998) prompted us to consider the behaviour of other characteristics of this star. The observational data on magnetic field (Heff), brightness and amplitude of rapid light oscillations of HD 83368 are analyzed. A clear synchronism appears between the variations of the Li line intensity, brightness, magnetic field and pulsation amplitude with rotational phase, which can be explained in terms of a spotted rotator model. Reference: North P., Polosukhina N., Malanushenko V., Hack M., 1998, A&A 333, 644

  19. Light field reconstruction robust to signal dependent noise

    NASA Astrophysics Data System (ADS)

    Ren, Kun; Bian, Liheng; Suo, Jinli; Dai, Qionghai

    2014-11-01

    Capturing four dimensional light field data sequentially using a coded aperture camera is an effective approach but suffers from low signal noise ratio. Although multiplexing can help raise the acquisition quality, noise is still a big issue especially for fast acquisition. To address this problem, this paper proposes a noise robust light field reconstruction method. Firstly, scene dependent noise model is studied and incorporated into the light field reconstruction framework. Then, we derive an optimization algorithm for the final reconstruction. We build a prototype by hacking an off-the-shelf camera for data capturing and prove the concept. The effectiveness of this method is validated with experiments on the real captured data.

  20. Measurement-device-independent quantum cryptography

    DOE PAGES

    Xu, Feihu; Curty, Marcos; Qi, Bing; ...

    2014-12-18

    In theory, quantum key distribution (QKD) provides information-theoretic security based on the laws of physics. Owing to the imperfections of real-life implementations, however, there is a big gap between the theory and practice of QKD, which has been recently exploited by several quantum hacking activities. To fill this gap, a novel approach, called measurement-device-independent QKD (mdiQKD), has been proposed. In addition, it can remove all side-channels from the measurement unit, arguably the most vulnerable part in QKD systems, thus offering a clear avenue toward secure QKD realisations. In this study, we review the latest developments in the framework of mdiQKD,more » together with its assumptions, strengths, and weaknesses.« less

  1. 7 years of MacGyver sessions at EGU and AGU: what happened?

    NASA Astrophysics Data System (ADS)

    Hut, Rolf; Selker, John; Weijs, Steven; Luxemburg, Wim; Wickert, Andy; Blume, Theresa; Bamburger, Jan; Stoof, Cathelijne; Tauro, Flavia

    2016-04-01

    The session that this poster is in, the: "Self-made sensors and unintended use of measurement equipment", also known as the "MacGyver-session" has had 7 years of scientists contributing their self made devices, hacks and solutions with the hydrological community. In 2009, the first session was held at the AGU fall meeting and since 2011 a session is also organised at the EGU General Assembly. On this poster, and in the accompanying review paper, we will present an overview of the work presented in the last 7 years, cataloging the work of the inventive scientists who have contributed to these successful, and above all: fun, sessions.

  2. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  3. Frequentist and Bayesian Orbital Parameter Estimaton from Radial Velocity Data Using RVLIN, BOOTTRAN, and RUN DMC

    NASA Astrophysics Data System (ADS)

    Nelson, Benjamin Earl; Wright, Jason Thomas; Wang, Sharon

    2015-08-01

    For this hack session, we will present three tools used in analyses of radial velocity exoplanet systems. RVLIN is a set of IDL routines used to quickly fit an arbitrary number of Keplerian curves to radial velocity data to find adequate parameter point estimates. BOOTTRAN is an IDL-based extension of RVLIN to provide orbital parameter uncertainties using bootstrap based on a Keplerian model. RUN DMC is a highly parallelized Markov chain Monte Carlo algorithm that employs an n-body model, primarily used for dynamically complex or poorly constrained exoplanet systems. We will compare the performance of these tools and their applications to various exoplanet systems.

  4. Yellowcake National Park

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dagget, D.

    Exploration for and mining of uranium ore is going on within 10 miles of the Grand Canyon National Park. The current rush started in 1980, when a Denver-based company, Energy Fuels Nuclear, took over a claim in Hack Canyon and uncovered a very rich deposit of uranium ore. Recent explorations have resulted in some 1300 claims in the area around the Grand Canyon, many of them in the Arizona Strip, the land between the Canyon and Utah. The center of current controversy is the 1872 Mining Law. Replacement of the law with a leasing system similar to that used formore » leasable minerals such as coal, oil shale, oil and gas, potash, and phosphate is advocated. 1 figure.« less

  5. Strange Bedfellows: Anachronisms, Identity Politics, and the Queer Case of Trans.

    PubMed

    Gailey, Nerissa

    2017-01-01

    This article explores trans identities, as articulated within a few historical texts. From early literary depictions of gender difference, to medicalized conceptions of transsexualism, to a proliferation of trans and queer identities represented by an ever-expanding "alphabet soup" of identity labels, our understandings of identities, sexualities, and queer community-building continue to change. I use the notion of "kind-making," as elaborated on in the work of Ian Hacking, to illustrate that some queer and trans identifications are affiliative, whereas others are contrastive or oppositional in nature, and these structural differences have important implications with respect to understanding identity and sexuality, and also trans inclusion within LGBT communities and activist efforts.

  6. Rehabilitation of degraded forests in Asia. World Bank technical paper

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Banerjee, A.K.

    The degraded forests discussed in this paper are those that have been so badly damaged they have completely lost their protective or productive functions--but still retain their potential revive. The paper focusses on the major areas in Asia fitting this description: swidden agriculture areas in moist forests; human-induced extensive Imperata grasslands; repeatedly hacked, low-profile hardwood forests; and overlogged forests. The areas are defined carefully to determine their extent in Asia; key characteristics are described; their impacts on the local ecology are evaluated; the social and economic pressures that prolong the degradation are analyzed; and technical methods for rehabilitating the damagedmore » areas are proposed.« less

  7. Hacking cell differentiation: transcriptional rerouting in reprogramming, lineage infidelity and metaplasia

    PubMed Central

    Regalo, Gonçalo; Leutz, Achim

    2013-01-01

    Initiating neoplastic cell transformation events are of paramount importance for the comprehension of regeneration and vanguard oncogenic processes but are difficult to characterize and frequently clinically overlooked. In epithelia, pre-neoplastic transformation stages are often distinguished by the appearance of phenotypic features of another differentiated tissue, termed metaplasia. In haemato/lymphopoietic malignancies, cell lineage ambiguity is increasingly recorded. Both, metaplasia and biphenotypic leukaemia/lymphoma represent examples of dysregulated cell differentiation that reflect a history of trans-differentiation and/or epigenetic reprogramming. Here we compare the similarity between molecular events of experimental cell trans-differentiation as an emerging therapeutic concept, with lineage confusion, as in metaplasia and dysplasia forecasting tumour development. PMID:23828660

  8. Cybersecurity Regulation of Wireless Devices for Performance and Assurance in the Age of “Medjacking”

    PubMed Central

    Armstrong, David G.; Kleidermacher, David N.; Klonoff, David C.; Slepian, Marvin J.

    2015-01-01

    We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as “medjacking”) is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. PMID:26319227

  9. Cybersecurity Regulation of Wireless Devices for Performance and Assurance in the Age of "Medjacking".

    PubMed

    Armstrong, David G; Kleidermacher, David N; Klonoff, David C; Slepian, Marvin J

    2015-08-27

    We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as "medjacking") is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. © 2015 Diabetes Technology Society.

  10. Why am I not disabled? Making state subjects, making statistics in post--Mao China.

    PubMed

    Kohrman, Matthew

    2003-03-01

    In this article I examine how and why disability was defined and statistically quantified by China's party-state in the late 1980s. I describe the unfolding of a particular epidemiological undertaking--China's 1987 National Sample Survey of Disabled Persons--as well as the ways the survey was an extension of what Ian Hacking has called modernity's "avalanche of numbers." I argue that, to a large degree, what fueled and shaped the 1987 survey's codification and quantification of disability was how Chinese officials were incited to shape their own identities as they negotiated an array of social, political, and ethical forces, which were at once national and transnational in orientation.

  11. Veterinary Aspects of Bird of Prey Reproduction.

    PubMed

    Bailey, Tom A; Lierz, Michael

    2017-05-01

    Captive breeding has contributed to successful restoration of many species of birds of prey. Avicultural techniques pioneered by raptor breeders include double clutching, direct fostering, cross-fostering, hatch and switch, hacking, imprinting male and female falcons for semen collection, and artificial insemination techniques. However, reproductive failure occurs related to management problems, including hygiene measures, food quality issues, breeding flock structure, or individual health issues of breeding birds. These may result in non-egg laying females, low-quality eggs, or infertile eggs caused by male infertility. Veterinary care of breeding collections is extremely important. This article provides an overview of veterinary involvement in raptor breeding projects. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems

    NASA Astrophysics Data System (ADS)

    Bianco, Louis J.

    The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is the biggest threat to SCADA systems.

  13. Quantifying uranium transport rates and storage of fluvially eroded mine tailings from a historic mine site in the Grand Canyon Region

    NASA Astrophysics Data System (ADS)

    Skalak, K.; Benthem, A. J.; Walton-Day, K. E.; Jolly, G.

    2015-12-01

    The Grand Canyon region contains a large number of breccia pipes with economically viable uranium, copper, and silver concentrations. Mining in this region has occurred since the late 19th century and has produced ore and waste rock having elevated levels of uranium and other contaminants. Fluvial transport of these contaminants from mine sites is a possibility, as this arid region is susceptible to violent storms and flash flooding which might erode and mobilize ore or waste rock. In order to assess and manage the risks associated with uranium mining, it is important to understand the transport and storage rates of sediment and uranium within the ephemeral streams of this region. We are developing a 1-dimensional sediment transportation model to examine uranium transport and storage through a typical canyon system in this region. Our study site is Hack Canyon Mine, a uranium and copper mine site, which operated in the 1980's and is currently experiencing fluvial erosion of its waste rock repository. The mine is located approximately 40km upstream from the Colorado River and is in a deep, narrow canyon with a small watershed. The stream is ephemeral for the upper half of its length and sediment is primarily mobilized during flash flood events. We collected sediment samples at 110 locations longitudinally through the river system to examine the distribution of uranium in the stream. Samples were sieved to the sand size and below fraction (<2mm) and uranium was measured by gamma-ray spectroscopy. Sediment storage zones were also examined in the upper 8km of the system to determine where uranium is preferentially stored in canyon systems. This information will quantify the downstream transport of constituents associated with the Hack Canyon waste rock and contribute to understanding the risks associated with fluvial mobilization of uranium mine waste.

  14. Topographyc metrics in the southern sector of the Marche foothills: implication for active tectonic analysis

    NASA Astrophysics Data System (ADS)

    Materazzi, Marco; Aringoli, Domenico; Carducci, Tamara; Cavitolo, Paolo; Farabollini, Piero; Giacopetti, Marco; Pambianchi, Gilberto; Tondi, Emanuele; Troiani, Francesco

    2016-04-01

    Quantitative geomorphic analysis can be provided a useful contribution to the study of recent tectonics. Some parameters, that quantify the channels morphology, as the Stream Length-Gradient (SL) Index (Hack, 1973) and the Steepness (Ks) Index (Flint, 1974), are generally used to detect anomalies on the expected concave-up equilibrium stream-profile, which can result in local abrupt changes in stream gradient (i.e., knickpoints) and/or broad convexities on stream long-profiles extending for tens of kilometres (i.e., knickzones). The main goal of this work is the study of the morphological and morphometrical features in the southern sector of the Marche Region, with the aim to gain new knowledge on the influences of rock resistance and rock uplift on the fluvial and topographic system. The investigated area is situated in central Italy and it extends from the axial zone of the Umbria-Marche Apennines to the Adriatic Sea, including the southern sector of the Marche Region and belongs to the foredeep domain of the Apennines orogenic system, which has affected by tectonic activity up to very recent times. The rheology of outcropping deposits doesn't allow the strain to be easily recorded at the outcrop scale. The analyses have been aimed at to test the sensitivity of both SL and Ks for evaluating active crustal deformations, acting at different wavelengths on land surface, within a low tectonically active thrust-and-fold belt. Additional purpose was the understanding of the pattern of regional differential crustal activity in the topographic arrangement of the study area In this research project two sets of analysis were conducted. References Hack J.T. 1973. Stream-profile analysis and stream-gradient index. Journal of Research of the U.S. Geological Survey, 1, 421-429. Flint J.J. 1974. Stream gradient as a function of order, magnitude and discharge. Water Resources Research, 10, 969-973.

  15. Performance of the Hack's Impairment Index Score: A Novel Tool to Assess Impairment from Alcohol in Emergency Department Patients.

    PubMed

    Hack, Jason B; Goldlust, Eric J; Ferrante, Dennis; Zink, Brian J

    2017-10-01

    Over 35 million alcohol-impaired (AI) patients are cared for in emergency departments (EDs) annually. Emergency physicians are charged with ensuring AI patients' safety by identifying resolution of alcohol-induced impairment. The most common standard evaluation is an extemporized clinical examination, as ethanol levels are not reliable or predictive of clinical symptoms. There is no standard assessment of ED AI patients. The objective was to evaluate a novel standardized ED assessment of alcohol impairment, Hack's Impairment Index (HII score), in a busy urban ED. A retrospective chart review was performed for all AI patients seen in our busy urban ED over 24 months. Trained nurses evaluated AI patients with both "usual" and HII score every 2 hours. Patients were stratified by frequency of visits for AI during this time: high (≥ 6), medium (2-5), and low (1). Within each category, comparisons were made between HII scores, measured ethanol levels, and usual nursing assessment of AI. Changes in HII scores over time were also evaluated. A total of 8,074 visits from 3,219 unique patients were eligible for study, including 7,973 (98.7%) with ethanol levels, 5,061 (62.7%) with complete HII scores, and 3,646 (45.2%) with health care provider assessments. Correlations between HII scores and ethanol levels were poor (Pearson's R 2  = 0.09, 0.09, and 0.17 for high-, medium-, and low-frequency strata). HII scores were excellent at discriminating nursing assessment of AI, while ethanol levels were less effective. Omitting extrema, HII scores fell consistently an average 0.062 points per hour, throughout patients' visits. The HII score applied a quantitative, objective assessment of alcohol impairment. HII scores were superior to ethanol levels as an objective clinical measure of impairment. The HII declines in a reasonably predictable manner over time, with serial evaluations corresponding well with health care provider evaluations. © 2017 by the Society for Academic Emergency Medicine.

  16. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    NASA Astrophysics Data System (ADS)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  17. Reliability and validity of two isometric squat tests.

    PubMed

    Blazevich, Anthony J; Gill, Nicholas; Newton, Robert U

    2002-05-01

    The purpose of the present study was first to examine the reliability of isometric squat (IS) and isometric forward hack squat (IFHS) tests to determine if repeated measures on the same subjects yielded reliable results. The second purpose was to examine the relation between isometric and dynamic measures of strength to assess validity. Fourteen male subjects performed maximal IS and IFHS tests on 2 occasions and 1 repetition maximum (1-RM) free-weight squat and forward hack squat (FHS) tests on 1 occasion. The 2 tests were found to be highly reliable (intraclass correlation coefficient [ICC](IS) = 0.97 and ICC(IFHS) = 1.00). There was a strong relation between average IS and 1-RM squat performance, and between IFHS and 1-RM FHS performance (r(squat) = 0.77, r(FHS) = 0.76; p < 0.01), but a weak relation between squat and FHS test performances (r < 0.55). There was also no difference between observed 1-RM values and those predicted by our regression equations. Errors in predicting 1-RM performance were in the order of 8.5% (standard error of the estimate [SEE] = 13.8 kg) and 7.3% (SEE = 19.4 kg) for IS and IFHS respectively. Correlations between isometric and 1-RM tests were not of sufficient size to indicate high validity of the isometric tests. Together the results suggest that IS and IFHS tests could detect small differences in multijoint isometric strength between subjects, or performance changes over time, and that the scores in the isometric tests are well related to 1-RM performance. However, there was a small error when predicting 1-RM performance from isometric performance, and these tests have not been shown to discriminate between small changes in dynamic strength. The weak relation between squat and FHS test performance can be attributed to differences in the movement patterns of the tests

  18. The "normal" elongation of river basins

    NASA Astrophysics Data System (ADS)

    Castelltort, Sebastien

    2013-04-01

    The spacing between major transverse rivers at the front of Earth's linear mountain belts consistently scales with about half of the mountain half-width [1], despite strong differences in climate and rock uplift rates. Like other empirical measures describing drainage network geometry this result seems to indicate that the form of river basins, among other properties of landscapes, is invariant. Paradoxically, in many current landscape evolution models, the patterns of drainage network organization, as seen for example in drainage density and channel spacing, seem to depend on both climate [2-4] and tectonics [5]. Hovius' observation [1] is one of several unexplained "laws" in geomorphology that still sheds mystery on how water, and rivers in particular, shape the Earth's landscapes. This narrow range of drainage network shapes found in the Earth's orogens is classicaly regarded as an optimal catchment geometry that embodies a "most probable state" in the uplift-erosion system of a linear mountain belt. River basins currently having an aspect away from this geometry are usually considered unstable and expected to re-equilibrate over geological time-scales. Here I show that the Length/Width~2 aspect ratio of drainage basins in linear mountain belts is the natural expectation of sampling a uniform or normal distribution of basin shapes, and bears no information on the geomorphic processes responsible for landscape development. This finding also applies to Hack's [6] law of river basins areas and lengths, a close parent of Hovius' law. [1]Hovius, N. Basin Res. 8, 29-44 (1996) [2]Simpson, G. & Schlunegger, F. J. Geophys. Res. 108, 2300 (2003) [3]Tucker, G. & Bras, R. Water Resour. Res. 34, 2751-2764 (1998) [4]Tucker, G. & Slingerland, R. Water Resour. Res. 33, 2031-2047 (1997) [5]Tucker, G. E. & Whipple, K. X. J. Geophys. Res. 107, 1-1 (2002) [6]Hack, J. US Geol. Surv. Prof. Pap. 294-B (1957)

  19. Effects of low-dose ibuprofen supplementation and resistance training on bone and muscle in postmenopausal women: A randomized controlled trial.

    PubMed

    Duff, Whitney R D; Kontulainen, Saija A; Candow, Darren G; Gordon, Julianne J; Mason, Riley S; Taylor-Gjevre, Regina; Nair, Bindu; Szafron, Michael; Baxter-Jones, Adam D G; Zello, Gordon A; Chilibeck, Philip D

    2016-12-01

    To compare the effects of nine months of exercise training and ibuprofen supplementation (given immeditately after exercise sessions) on bone and muscle in postmenopausal women. In a double-blind randomized trial, participants (females: n = 90, mean age 64.8, SD 4.3 years) were assigned (computer generated, double blind) to receive supervised resistance training or stretching 3 days/week, and ibuprofen (400 mg, post-exercise) or placebo (i.e. 4 groups) for 9 months. In this proof-of-concept study the sample size was halved from required 200 identified via 90% power calculation. Baseline and post-intervention testing included: Dual energy x-ray absorptiometry (DXA) for lumbar spine, femoral neck, and total body areal bone mineral density (aBMD); geometry of proximal femur; total body lean tissue and fat mass; predicted 1-repetition maximum muscle strength testing (1RM; biceps curl, hack squat). Exercise training or ibuprofen supplementation had no effects on aBMD of the lumbar spine, femoral neck, and total body. There was a significant exercise × supplement × time interaction for aBMD of Ward's region of the femoral neck (p = 0.015) with post hoc comparison showing a 6% decrease for stretching with placebo vs. a 3% increase for stretching with ibuprofen (p = 0.017). Resistance training increased biceps curl and hack squat strength vs. stretching (22% vs. 4% and 114% vs. 12%, respectively) (p < 0.01) and decreased percent body fat compared to stretching (2% vs. 0%) (p < 0.05). Ibuprofen supplementation provided some benefits to bone when taken independent of exercise training in postmenopausal women. This study provides evidence towards a novel, easily accessible stimulus for enhancing bone health [i.e. ibuprofen].

  20. Geochemical characterization of groundwater discharging from springs north of the Grand Canyon, Arizona, 2009–2016

    USGS Publications Warehouse

    Beisner, Kimberly R.; Tillman, Fred D.; Anderson, Jessica R.; Antweiler, Ronald C.; Bills, Donald J.

    2017-08-01

    A geochemical study was conducted on 37 springs discharging from the Toroweap Formation, Coconino Sandstone, Hermit Formation, Supai Group, and Redwall Limestone north of the Grand Canyon near areas of breccia-pipe uranium mining. Baseline concentrations were established for the elements As, B, Li, Se, SiO2, Sr, Tl, U, and V. Three springs exceeded U.S. Environmental Protection Agency drinking water standards: Fence Spring for arsenic, Pigeon Spring for selenium and uranium, and Willow (Hack) Spring for selenium. The majority of the spring sites had uranium values of less than 10 micrograms per liter (μg/L), but six springs discharging from all of the geologic units studied that are located stratigraphically above the Redwall Limestone had uranium values greater than 10 μg/L (Cottonwood [Tuckup], Grama, Pigeon, Rock, and Willow [Hack and Snake Gulch] Springs). The geochemical characteristics of these six springs with elevated uranium include Ca-Mg-SO4 water type, circumneutral pH, high specific conductance, correlation and multivariate associations between U, Mo, Sr, Se, Li, and Zn, low 87Sr/86Sr, low 234U/238U activity ratios (1.34–2.31), detectable tritium, and carbon isotopic interpretation indicating they may be a mixture of modern and pre-modern waters. Similar geochemical compositions of spring waters having elevated uranium concentrations are observed at sites located both near and away from sites of uranium-mining activities in the present study. Therefore, mining does not appear to explain the presence of elevated uranium concentrations in groundwater at the six springs noted above. The elevated uranium at the six previously mentioned springs may be influenced by iron mineralization associated with mineralized breccia pipe deposits. Six springs discharging from the Coconino Sandstone (Upper Jumpup, Little, Horse, and Slide Springs) and Redwall Limestone (Kanab and Side Canyon Springs) contained water with corrected radiocarbon ages as much as 9,300 years old. Of the springs discharging water with radiocarbon age, Kanab and Side Canyon Springs contain tritium of more than 1.3 picocuries per liter (pCi/L), indicating they may contain a component of modern water recharged after 1952. Springs containing high values of tritium (greater than 5.1 pCi/L), which may suggest a significant component of modern water, include Willow (Hack), Saddle Horse, Cottonwood (Tuckup), Hotel, Bitter, Unknown, Hole in the Wall, and Hanging Springs. Fence and Rider Springs, located on the eastern end of the study area near the Colorado River, have distinctly different geochemical compositions compared to the other springs of the study. Additionally, water from Fence Spring has the highest 87Sr/86Sr for samples analyzed from this study with a value greater than those known in sedimentary rocks from the region. Strontium isotope data likely indicate that water discharging at Fence Spring has interacted with Precambrian basement rocks. Rider Spring had the most depleted values of stable O and H isotopes indicating that recharge, if recent, occurred at higher elevations or was recharged during earlier, cooler-climate conditions.

  1. High Frequency Active Auroral Research Program (HAARP) Imager

    DTIC Science & Technology

    1993-09-30

    T-3 HCTL!; *WR-EN HCTL@ F- 3 HC7L! ; * HACK H(TL-@ F-4 HCTL!; ]NIiT-HOST 00 HB! F8 HCrL!; DSP-RESET INIT-HOST HCTL@ DUP F-6 HCTh! T-6 HCTU! DSP-IRQB...CONSTANTPS2 PI_HI P2-11 OR 3_-1O OR TG..LO OR CONSTANT PS3 P1I.,O P2_.i OR P3..LO OR TG_.LO OR CONSTANT PS4 PlLO P21-1I OR P3_H1 OR TGIIl OR CONSTANTPS5 P1_LO...CONSTANT PSTATEI PS2 SER-IDLE OR CONSTANT PSTATE2 PS3 SERIDLE OR CONSTANT PSTATE3 PS4 SERIDLE OR CONSTANT PSTATE4 PS5 SERIDLE OR CONSTANT PSTATES PS6

  2. Cybersecurity for Connected Diabetes Devices

    PubMed Central

    Klonoff, David C.

    2015-01-01

    Diabetes devices are increasingly connected wirelessly to each other and to data-displaying reader devices. Threats to the accurate flow of information and commands may compromise the function of these devices and put their users at risk of health complications. Sound cybersecurity of connected diabetes devices is necessary to maintain confidentiality, integrity, and availability of the data and commands. Diabetes devices can be hacked by unauthorized agents and also by patients themselves to extract data that are not automatically provided by product software. Unauthorized access to connected diabetes devices has been simulated and could happen in reality. A cybersecurity standard designed specifically for connected diabetes devices will improve the safety of these products and increase confidence of users that the products will be secure. PMID:25883162

  3. The Infrared Spectral Region of Stars

    NASA Astrophysics Data System (ADS)

    Jaschek, Carlos; Andrillat, Y.

    1991-09-01

    1. Stars in the infrared: results from IRAS H. J. G. L. M. Lamers and L. B. F. M. Watera; 2. What is expected from ISO J. P. Baluteau; 3. New infrared instrumentation S. Bensammar; 4. High resolution atomic spectroscopy in the infrared and its application to astrophysics S. Johansson; 5. Spectroscopy of early -type stars C. Jaschek; 6. Spectroscopy of late type stars U. F. Jøgensen; 7. Dust formation and evolution in circumstellar media J. P. J. Lafon; 8. The infrared solar spectrum N. Grevesse; 9. Symbiotic and related objects M. Hack; 10. Stellar photometry and spectrophotometry in the infrared R. F. Wing; 11. Stellar variability in the infrared A. Evans; 12. Circumstellar material in main sequence H. H. Aamann.

  4. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  5. Forecasting of indirect consumables for a Job Shop

    NASA Astrophysics Data System (ADS)

    Shakeel, M.; Khan, S.; Khan, W. A.

    2016-08-01

    A job shop has an arrangement where similar machines (Direct consumables) are grouped together and use indirect consumables to produce a product. The indirect consumables include hack saw blades, emery paper, painting brush etc. The job shop is serving various orders at a particular time for the optimal operation of job shop. Forecasting is required to predict the demand of direct and indirect consumables in a job shop. Forecasting is also needed to manage lead time, optimize inventory cost and stock outs. The objective of this research is to obtain the forecast for indirect consumables. The paper shows how job shop can manage their indirect consumables more accurately by establishing a new technique of forecasting. This results in profitable use of job shop by multiple users.

  6. Degrees of Freedom in Planning, Running, Analyzing, and Reporting Psychological Studies: A Checklist to Avoid p-Hacking

    PubMed Central

    Wicherts, Jelte M.; Veldkamp, Coosje L. S.; Augusteijn, Hilde E. M.; Bakker, Marjan; van Aert, Robbie C. M.; van Assen, Marcel A. L. M.

    2016-01-01

    The designing, collecting, analyzing, and reporting of psychological studies entail many choices that are often arbitrary. The opportunistic use of these so-called researcher degrees of freedom aimed at obtaining statistically significant results is problematic because it enhances the chances of false positive results and may inflate effect size estimates. In this review article, we present an extensive list of 34 degrees of freedom that researchers have in formulating hypotheses, and in designing, running, analyzing, and reporting of psychological research. The list can be used in research methods education, and as a checklist to assess the quality of preregistrations and to determine the potential for bias due to (arbitrary) choices in unregistered studies. PMID:27933012

  7. Very deep IRAS survey - constraints on the evolution of starburst galaxies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hacking, P.; Houck, J.R.; Condon, J.J.

    1987-05-01

    Counts of sources (primarily starburst galaxies) from a deep 60 microns IRAS survey published by Hacking and Houck (1987) are compared with four evolutionary models. The counts below 100 mJy are higher than expected if no evolution has taken place out to a redshift of approximately 0.2. Redshift measurements of the survey sources should be able to distinguish between luminosity-evolution and density-evolution models and detect as little as a 20 percent brightening or increase in density of infrared sources per billion years ago (H/0/ = 100 km/s per Mpc). Starburst galaxies cannot account for the reported 100 microns background withoutmore » extreme evolution at high redshifts. 21 references.« less

  8. Degrees of Freedom in Planning, Running, Analyzing, and Reporting Psychological Studies: A Checklist to Avoid p-Hacking.

    PubMed

    Wicherts, Jelte M; Veldkamp, Coosje L S; Augusteijn, Hilde E M; Bakker, Marjan; van Aert, Robbie C M; van Assen, Marcel A L M

    2016-01-01

    The designing, collecting, analyzing, and reporting of psychological studies entail many choices that are often arbitrary. The opportunistic use of these so-called researcher degrees of freedom aimed at obtaining statistically significant results is problematic because it enhances the chances of false positive results and may inflate effect size estimates. In this review article, we present an extensive list of 34 degrees of freedom that researchers have in formulating hypotheses, and in designing, running, analyzing, and reporting of psychological research. The list can be used in research methods education, and as a checklist to assess the quality of preregistrations and to determine the potential for bias due to (arbitrary) choices in unregistered studies.

  9. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  10. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  11. Experimental Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-01

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  12. Experimental measurement-device-independent quantum key distribution.

    PubMed

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-27

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  13. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.

    PubMed

    Sackner-Bernstein, Jonathan

    2017-03-01

    The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.

  14. Cybersecurity for Connected Diabetes Devices.

    PubMed

    Klonoff, David C

    2015-04-16

    Diabetes devices are increasingly connected wirelessly to each other and to data-displaying reader devices. Threats to the accurate flow of information and commands may compromise the function of these devices and put their users at risk of health complications. Sound cybersecurity of connected diabetes devices is necessary to maintain confidentiality, integrity, and availability of the data and commands. Diabetes devices can be hacked by unauthorized agents and also by patients themselves to extract data that are not automatically provided by product software. Unauthorized access to connected diabetes devices has been simulated and could happen in reality. A cybersecurity standard designed specifically for connected diabetes devices will improve the safety of these products and increase confidence of users that the products will be secure. © 2015 Diabetes Technology Society.

  15. Fable or fact?: did Janet really come to repudiate his dissociation theory?

    PubMed

    Dorahy, Martin J; van der Hart, Onno

    2006-01-01

    Commencing in the late 1880s Pierre Janet developed the most complete theory of dissociation of his time. It has been suggested that Janet later repudiated his belief in dissociation theory (e.g., Hacking, 1995). Recently this viewpoint has been cited to support skepticism in dissociative identity disorder and researchers and clinicians of dissociation may be faced with such suggestions to challenge their work. The veracity of whether Janet actually recanted, or even lost interest in his dissociation theory is investigated through an examination of his later writings. Although Janet expanded his theoretical interests well beyond phenomena accounted for by dissociation, there is no evidence to indicate he renounced or lost confidence in his dissociation theory.

  16. Common Scientific and Statistical Errors in Obesity Research

    PubMed Central

    George, Brandon J.; Beasley, T. Mark; Brown, Andrew W.; Dawson, John; Dimova, Rositsa; Divers, Jasmin; Goldsby, TaShauna U.; Heo, Moonseong; Kaiser, Kathryn A.; Keith, Scott; Kim, Mimi Y.; Li, Peng; Mehta, Tapan; Oakes, J. Michael; Skinner, Asheley; Stuart, Elizabeth; Allison, David B.

    2015-01-01

    We identify 10 common errors and problems in the statistical analysis, design, interpretation, and reporting of obesity research and discuss how they can be avoided. The 10 topics are: 1) misinterpretation of statistical significance, 2) inappropriate testing against baseline values, 3) excessive and undisclosed multiple testing and “p-value hacking,” 4) mishandling of clustering in cluster randomized trials, 5) misconceptions about nonparametric tests, 6) mishandling of missing data, 7) miscalculation of effect sizes, 8) ignoring regression to the mean, 9) ignoring confirmation bias, and 10) insufficient statistical reporting. We hope that discussion of these errors can improve the quality of obesity research by helping researchers to implement proper statistical practice and to know when to seek the help of a statistician. PMID:27028280

  17. Language and theory of mind in autism spectrum disorder: the relationship between complement syntax and false belief task performance.

    PubMed

    Lind, Sophie E; Bowler, Dermot M

    2009-06-01

    This study aimed to test the hypothesis that children with autism spectrum disorder (ASD) use their knowledge of complement syntax as a means of "hacking out" solutions to false belief tasks, despite lacking a representational theory of mind (ToM). Participants completed a "memory for complements" task, a measure of receptive vocabulary, and traditional location change and unexpected contents false belief tasks. Consistent with predictions, the correlation between complement syntax score and location change task performance was significantly stronger within the ASD group than within the comparison group. However, contrary to predictions, complement syntax score was not significantly correlated with unexpected contents task performance within either group. Possible explanations for this pattern of results are considered.

  18. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety

    PubMed Central

    Sackner-Bernstein, Jonathan

    2017-01-01

    Background: The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware. PMID:27837161

  19. Countermeasure against blinding attacks on low-noise detectors with a background-noise-cancellation scheme

    NASA Astrophysics Data System (ADS)

    Lee, Min Soo; Park, Byung Kwon; Woo, Min Ki; Park, Chang Hoon; Kim, Yong-Su; Han, Sang-Wook; Moon, Sung

    2016-12-01

    We developed a countermeasure against blinding attacks on low-noise detectors with a background-noise-cancellation scheme in quantum key distribution (QKD) systems. Background-noise cancellation includes self-differencing and balanced avalanche photon diode (APD) schemes and is considered a promising solution for low-noise APDs, which are critical components in high-performance QKD systems. However, its vulnerability to blinding attacks has been recently reported. In this work, we propose a countermeasure that prevents this potential security loophole from being used in detector blinding attacks. An experimental QKD setup is implemented and various tests are conducted to verify the feasibility and performance of the proposed method. The obtained measurement results show that the proposed scheme successfully detects occurring blinding-attack-based hacking attempts.

  20. Quantum hacking on quantum key distribution using homodyne detection

    NASA Astrophysics Data System (ADS)

    Huang, Jing-Zheng; Kunz-Jacques, Sébastien; Jouguet, Paul; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2014-03-01

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  1. Iris Cryptography for Security Purpose

    NASA Astrophysics Data System (ADS)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  2. From hacking the human genome to editing organs.

    PubMed

    Tobita, Takamasa; Guzman-Lepe, Jorge; Collin de l'Hortet, Alexandra

    2015-01-01

    In the recent decades, human genome engineering has been one of the major interesting research subjects, essentially because it raises new possibilities for personalized medicine and biotechnologies. With the development of engineered nucleases such as the Zinc Finger Nucleases (ZFNs), the Transcription activator-like effector nucleases (TALENs) and more recently the Clustered Regularly Interspaced short Palindromic Repeats (CRISPR), the field of human genome edition has evolved very rapidly. Every new genetic tool is broadening the scope of applications on human tissues, even before we can completely master each of these tools. In this review, we will present the recent advances regarding human genome edition tools, we will discuss the numerous implications they have in research and medicine, and we will mention the limits and concerns about such technologies.

  3. Encryption and watermark-treated medical image against hacking disease-An immune convention in spatial and frequency domains.

    PubMed

    Lakshmi, C; Thenmozhi, K; Rayappan, John Bosco Balaguru; Amirtharajan, Rengarajan

    2018-06-01

    Digital Imaging and Communications in Medicine (DICOM) is one among the significant formats used worldwide for the representation of medical images. Undoubtedly, medical-image security plays a crucial role in telemedicine applications. Merging encryption and watermarking in medical-image protection paves the way for enhancing the authentication and safer transmission over open channels. In this context, the present work on DICOM image encryption has employed a fuzzy chaotic map for encryption and the Discrete Wavelet Transform (DWT) for watermarking. The proposed approach overcomes the limitation of the Arnold transform-one of the most utilised confusion mechanisms in image ciphering. Various metrics have substantiated the effectiveness of the proposed medical-image encryption algorithm. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. Hacking cell differentiation: transcriptional rerouting in reprogramming, lineage infidelity and metaplasia.

    PubMed

    Regalo, Gonçalo; Leutz, Achim

    2013-08-01

    Initiating neoplastic cell transformation events are of paramount importance for the comprehension of regeneration and vanguard oncogenic processes but are difficult to characterize and frequently clinically overlooked. In epithelia, pre-neoplastic transformation stages are often distinguished by the appearance of phenotypic features of another differentiated tissue, termed metaplasia. In haemato/lymphopoietic malignancies, cell lineage ambiguity is increasingly recorded. Both, metaplasia and biphenotypic leukaemia/lymphoma represent examples of dysregulated cell differentiation that reflect a history of trans-differentiation and/or epigenetic reprogramming. Here we compare the similarity between molecular events of experimental cell trans-differentiation as an emerging therapeutic concept, with lineage confusion, as in metaplasia and dysplasia forecasting tumour development. © 2013 The Authors. Published by John Wiley and Sons, Ltd on behalf of EMBO.

  5. Controller–Pilot Data Link Communication Security

    PubMed Central

    Polishchuk, Tatiana; Wernberg, Max

    2018-01-01

    The increased utilization of the new types of cockpit communications, including controller–pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristics and properties of the CPDLC and construct the corresponding threat model. Based on the limitations imposed by the system parameters, we propose several solutions for the improved security of the data messaging communication used in air traffic management (ATM). We discuss the applicability of elliptical curve cryptography (ECC), protected aircraft communications addressing and reporting systems (PACARs) and the Host Identity Protocol (HIP) as possible countermeasures to the identified security threats. In addition, we consider identity-defined networking (IDN) as an example of a genuine security solution which implies global changes in the whole air traffic communication system. PMID:29783791

  6. Between control and hacker activism: the political actions of Anonymous Brasil.

    PubMed

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  7. Controller⁻Pilot Data Link Communication Security.

    PubMed

    Gurtov, Andrei; Polishchuk, Tatiana; Wernberg, Max

    2018-05-20

    The increased utilization of the new types of cockpit communications, including controller⁻pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristics and properties of the CPDLC and construct the corresponding threat model. Based on the limitations imposed by the system parameters, we propose several solutions for the improved security of the data messaging communication used in air traffic management (ATM). We discuss the applicability of elliptical curve cryptography (ECC), protected aircraft communications addressing and reporting systems (PACARs) and the Host Identity Protocol (HIP) as possible countermeasures to the identified security threats. In addition, we consider identity-defined networking (IDN) as an example of a genuine security solution which implies global changes in the whole air traffic communication system.

  8. Aquatic macrophyte diversity of the Pantanal wetland and upper basin.

    PubMed

    Pott, V J; Pott, A; Lima, L C P; Moreira, S N; Oliveira, A K M

    2011-04-01

    This is a short review of the state of the art concerning diversity of aquatic macrophytes and the main aquatic vegetation types in the Brazilian Pantanal wetland and upper watershed. There are ca. 280 species of aquatic macrophytes on the Pantanal floodplain, with scarce endemism. On the upper watershed, Cerrado wetlands (veredas) and limestone springs have a distinct flora from the Pantanal, with twice the species richness. As a representative case of aquatic habitats influenced by river flood, some primary data are presented for the Pantanal Matogrossense National Park and associated Acurizal Preserve, analysing the floristic similarity among aquatic vegetation types. We comment on problems of conservation and observe that Panicum elephantipes Nees is one of the few natives to compete with the invasive Urochloa arrecta (Hack. ex T. Durand & Schinz) Morrone & Zuloaga.

  9. From hacking the human genome to editing organs

    PubMed Central

    Tobita, Takamasa; Guzman-Lepe, Jorge; Collin de l'Hortet, Alexandra

    2015-01-01

    ABSTRACT In the recent decades, human genome engineering has been one of the major interesting research subjects, essentially because it raises new possibilities for personalized medicine and biotechnologies. With the development of engineered nucleases such as the Zinc Finger Nucleases (ZFNs), the Transcription activator-like effector nucleases (TALENs) and more recently the Clustered Regularly Interspaced short Palindromic Repeats (CRISPR), the field of human genome edition has evolved very rapidly. Every new genetic tool is broadening the scope of applications on human tissues, even before we can completely master each of these tools. In this review, we will present the recent advances regarding human genome edition tools, we will discuss the numerous implications they have in research and medicine, and we will mention the limits and concerns about such technologies PMID:26588350

  10. Empowered citizen 'health hackers' who are not waiting.

    PubMed

    Omer, Timothy

    2016-08-17

    Due to the easier access to information, the availability of low cost technologies and the involvement of well educated, passionate patients, a group of citizen 'Health Hackers', who are building their own medical systems to help them overcome the unmet needs of their conditions, is emerging. This has recently been the case in the type 1 diabetes community, under the movement #WeAreNotWaiting, with innovative use of current medical devices hacked to access data and Open-Source code producing solutions ranging from remote monitoring of diabetic children to producing an Artificial Pancreas System to automate the management and monitoring of a patient's condition. Timothy Omer is working with the community to utilise the technology already in his pocket to build a mobile- and smartwatch-based Artificial Pancreas System.

  11. Hacking commercial quantum cryptography systems by tailored bright illumination

    NASA Astrophysics Data System (ADS)

    Lydersen, Lars; Wiechers, Carlos; Wittmann, Christoffer; Elser, Dominique; Skaar, Johannes; Makarov, Vadim

    2010-10-01

    The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD systems can be fully remote-controlled using specially tailored bright illumination. This makes it possible to tracelessly acquire the full secret key; we propose an eavesdropping apparatus built from off-the-shelf components. The loophole is likely to be present in most QKD systems using avalanche photodiodes to detect single photons. We believe that our findings are crucial for strengthening the security of practical QKD, by identifying and patching technological deficiencies.

  12. Hacking the thylakoid proton motive force for improved photosynthesis: modulating ion flux rates that control proton motive force partitioning into Δψ and ΔpH.

    PubMed

    Davis, Geoffry A; Rutherford, A William; Kramer, David M

    2017-09-26

    There is considerable interest in improving plant productivity by altering the dynamic responses of photosynthesis in tune with natural conditions. This is exemplified by the 'energy-dependent' form of non-photochemical quenching ( q E ), the formation and decay of which can be considerably slower than natural light fluctuations, limiting photochemical yield. In addition, we recently reported that rapidly fluctuating light can produce field recombination-induced photodamage (FRIP), where large spikes in electric field across the thylakoid membrane (Δ ψ ) induce photosystem II recombination reactions that produce damaging singlet oxygen ( 1 O 2 ). Both q E and FRIP are directly linked to the thylakoid proton motive force ( pmf ), and in particular, the slow kinetics of partitioning pmf into its ΔpH and Δ ψ components. Using a series of computational simulations, we explored the possibility of 'hacking' pmf partitioning as a target for improving photosynthesis. Under a range of illumination conditions, increasing the rate of counter-ion fluxes across the thylakoid membrane should lead to more rapid dissipation of Δ ψ and formation of ΔpH. This would result in increased rates for the formation and decay of q E while resulting in a more rapid decline in the amplitudes of Δ ψ -spikes and decreasing 1 O 2 production. These results suggest that ion fluxes may be a viable target for plant breeding or engineering. However, these changes also induce transient, but substantial mismatches in the ATP : NADPH output ratio as well as in the osmotic balance between the lumen and stroma, either of which may explain why evolution has not already accelerated thylakoid ion fluxes. Overall, though the model is simplified, it recapitulates many of the responses seen in vivo , while spotlighting critical aspects of the complex interactions between pmf components and photosynthetic processes. By making the programme available, we hope to enable the community of photosynthesis researchers to further explore and test specific hypotheses.This article is part of the themed issue 'Enhancing photosynthesis in crop plants: targets for improvement'. © 2017 The Author(s).

  13. Is Ego Depletion Real? An Analysis of Arguments.

    PubMed

    Friese, Malte; Loschelder, David D; Gieseler, Karolin; Frankenbach, Julius; Inzlicht, Michael

    2018-03-01

    An influential line of research suggests that initial bouts of self-control increase the susceptibility to self-control failure (ego depletion effect). Despite seemingly abundant evidence, some researchers have suggested that evidence for ego depletion was the sole result of publication bias and p-hacking, with the true effect being indistinguishable from zero. Here, we examine (a) whether the evidence brought forward against ego depletion will convince a proponent that ego depletion does not exist and (b) whether arguments that could be brought forward in defense of ego depletion will convince a skeptic that ego depletion does exist. We conclude that despite several hundred published studies, the available evidence is inconclusive. Both additional empirical and theoretical works are needed to make a compelling case for either side of the debate. We discuss necessary steps for future work toward this aim.

  14. Snake oil for the 21st century.

    PubMed

    Bigby, M

    1998-12-01

    Dermatology has been associated with quackery for at least a century. The dictionary defines a quack as "a pretender to medical knowledge or skill; ignorantly or falsely pretending to cure." The term quack is derived from quacksalver, or one who quacks like a duck in promoting his salves. Quacksalvers hacked many potions, including snake oil, with claims that it cured everything from dermatitis to rheumatism. With the current promulgation of skin "products" and their promotion and even sale by dermatologists, and the use of treatments of no proven efficacy, this association between dermatology and quackery is set to continue well into the 21st century. The list of offending treatments includes silicone gel sheets and onion extract cream (Mederma) for keloids, alpha-hydroxy acid creams and peels, topical ascorbic acid and phytonadione, "laser resurfacing," and cimetidine for warts, to name only a few.

  15. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    NASA Astrophysics Data System (ADS)

    Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun

    2016-08-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

  16. Hypothesis testing in hydrology: Theory and practice

    NASA Astrophysics Data System (ADS)

    Kirchner, James; Pfister, Laurent

    2017-04-01

    Well-posed hypothesis tests have spurred major advances in hydrological theory. However, a random sample of recent research papers suggests that in hydrology, as in other fields, hypothesis formulation and testing rarely correspond to the idealized model of the scientific method. Practices such as "p-hacking" or "HARKing" (Hypothesizing After the Results are Known) are major obstacles to more rigorous hypothesis testing in hydrology, along with the well-known problem of confirmation bias - the tendency to value and trust confirmations more than refutations - among both researchers and reviewers. Hypothesis testing is not the only recipe for scientific progress, however: exploratory research, driven by innovations in measurement and observation, has also underlain many key advances. Further improvements in observation and measurement will be vital to both exploratory research and hypothesis testing, and thus to advancing the science of hydrology.

  17. Attacks on practical quantum key distribution systems (and how to prevent them)

    NASA Astrophysics Data System (ADS)

    Jain, Nitin; Stiller, Birgit; Khan, Imran; Elser, Dominique; Marquardt, Christoph; Leuchs, Gerd

    2016-07-01

    With the emergence of an information society, the idea of protecting sensitive data is steadily gaining importance. Conventional encryption methods may not be sufficient to guarantee data protection in the future. Quantum key distribution (QKD) is an emerging technology that exploits fundamental physical properties to guarantee perfect security in theory. However, it is not easy to ensure in practice that the implementations of QKD systems are exactly in line with the theoretical specifications. Such theory-practice deviations can open loopholes and compromise security. Several such loopholes have been discovered and investigated in the last decade. These activities have motivated the proposal and implementation of appropriate countermeasures, thereby preventing future attacks and enhancing the practical security of QKD. This article introduces the so-called field of quantum hacking by summarising a variety of attacks and their prevention mechanisms.

  18. Simulations of Fluvial Landscapes

    NASA Astrophysics Data System (ADS)

    Cattan, D.; Birnir, B.

    2013-12-01

    The Smith-Bretherton-Birnir (SBB) model for fluvial landsurfaces consists of a pair of partial differential equations, one governing water flow and one governing the sediment flow. Numerical solutions of these equations have been shown to provide realistic models in the evolution of fluvial landscapes. Further analysis of these equations shows that they possess scaling laws (Hack's Law) that are known to exist in nature. However, the simulations are highly dependent on the numerical methods used; with implicit methods exhibiting the correct scaling laws, but the explicit methods fail to do so. These equations, and the resulting models, help to bridge the gap between the deterministic and the stochastic theories of landscape evolution. Slight modifications of the SBB equations make the results of the model more realistic. By modifying the sediment flow equation, the model obtains more pronounced meandering rivers. Typical landsurface with rivers.

  19. Stability assessment of QKD procedures in commercial quantum cryptography systems versus quality of dark channel

    NASA Astrophysics Data System (ADS)

    Jacak, Monika; Melniczuk, Damian; Jacak, Janusz; Jóźwiak, Ireneusz; Gruber, Jacek; Jóźwiak, Piotr

    2015-02-01

    In order to assess the susceptibility of the quantum key distribution (QKD) systems to the hacking attack including simultaneous and frequent system self-decalibrations, we analyze the stability of the QKD transmission organized in two commercially available systems. The first one employs non-entangled photons as flying qubits in the dark quantum channel for communication whereas the second one utilizes the entangled photon pairs to secretly share the cryptographic key. Applying standard methods of the statistical data analysis to the characteristic indicators of the quality of the QKD communication (the raw key exchange rate [RKER] and the quantum bit error rate [QBER]), we have estimated the pace of the self-decalibration of both systems and the repeatability rate in the case of controlled worsening of the dark channel quality.

  20. Plug-and-play measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Choi, Yujun; Kwon, Osung; Woo, Minki; Oh, Kyunghwan; Han, Sang-Wook; Kim, Yong-Su; Moon, Sung

    2016-03-01

    Quantum key distribution (QKD) guarantees unconditional communication security based on the laws of quantum physics. However, practical QKD suffers from a number of quantum hackings due to the device imperfections. From the security standpoint, measurement-device-independent quantum key distribution (MDI-QKD) is in the limelight since it eliminates all the possible loopholes in detection. Due to active control units for mode matching between the photons from remote parties, however, the implementation of MDI-QKD is highly impractical. In this paper, we propose a method to resolve the mode matching problem while minimizing the use of active control units. By introducing the plug-and-play (P&P) concept into MDI-QKD, the indistinguishability in spectral and polarization modes between photons can naturally be guaranteed. We show the feasibility of P&P MDI-QKD with a proof-of-principle experiment.

  1. Widening the debate about conflict of interest: addressing relationships between journalists and the pharmaceutical industry.

    PubMed

    Lipworth, Wendy; Kerridge, Ian; Sweet, Melissa; Jordens, Christopher; Bonfiglioli, Catriona; Forsyth, Rowena

    2012-08-01

    The phone-hacking scandal that led to the closure of the News of the World newspaper in Britain has prompted international debate about media practices and regulation. It is timely to broaden the discussion about journalistic ethics and conduct to include consideration of the impact of media practices upon the population's health. Many commercial organisations cultivate relationships with journalists and news organisations with the aim of influencing the content of health-related news and information communicated through the media. Given the significant influence of the media on the health of individuals and populations, we should be alert to the potential impact of industry-journalist relationships on health care, health policy and public health. The approach taken by the medical profession to its interactions with the pharmaceutical industry provides a useful model for management of industry influence.

  2. Effects of Variables in Welding Technique on the Strength of Direct-Current Metal-Arc-Welded Joints in Aircraft Steel. 1 - Static Tension and Bending Fatigue Tests of Joints in SAE 4130 Steel Sheet

    DTIC Science & Technology

    1947-07-01

    specimen melting through. Neither metallic nor refrac- tory strips were used to hack up the weld groove. The single-head weld was used, rather than a...fr>J NACA TN No. 1361 co m > m d O •P CM CO s o In «3 § • rH 8 g 8 "S| « a> rH ^ j5 r— "-1 rH +» » • • • rH d VX> vo o in i-i J- K...01 5 o d 4> 01 4> J5 oi g 4> 4> 4» C -Ö P Q, O 5- 5 o g. o 8> II 2 - u d •do *» a, d 2

  3. The Shifting Aesthetics of Expertise in the Sharing Economy of Scientific Medicine.

    PubMed

    Ostherr, Kirsten

    2018-03-01

    Argument The deficit model of science communication assumes that the creation and dissemination of knowledge is limited to researchers with formal credentials. Recent challenges to this model have emerged among "e-patients" who develop extensive online activist communities, demand access to their own health data, conduct crowd-sourced experiments, and "hack" health problems that traditional medical experts have failed to solve. This article explores the aesthetics of medical media that enact the transition from a deficit model to a patient-driven model of visual representation and health communication. I present a framework for understanding the role of film and video in patient movements by analyzing the historical transition from researchers filming patients as nameless, voiceless human research subjects to patients recording their own health narratives through activist cinematography. By comparing several approaches to patient-centered video, I argue that imperfect production aesthetics play a critically important role in establishing the credibility of health communications.

  4. Whatever Happened to Formal Methods for Security?

    PubMed

    Voas, J; Schaffer, K

    2016-08-01

    We asked 7 experts 7 questions to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems. We are continually reminded of the 1996 paper by Tony Hoare "How did Software Get So Reliable Without Proof?" [1] In that vein, how did we get so insecure with proof? Given daily press announcements concerning new malware, data breaches, and privacy loss, is FM still relevant or was it ever? Our experts answered with unique personal insights. We were curious as to whether this successful methodology in "safety-critical" has succeeded as well for today's "build it, hack it, patch it" mindset. Our experts were John McLean (Naval Research Labs), Paul Black (National Institute of Standards and Technology), Karl Levitt (University of California at Davis), Joseph Williams (CloudEconomist.Com), Connie Heitmeyer (Naval Research Labs), Eugene Spafford (Purdue University), and Joseph Kiniry (Galois, Inc.). The questions and responses follow.

  5. Interaction of deep and shallow convection is key to Madden-Julian Oscillation simulation

    NASA Astrophysics Data System (ADS)

    Zhang, Guang J.; Song, Xiaoliang

    2009-05-01

    This study investigates the role of the interaction between deep and shallow convection in MJO simulation using the NCAR CAM3. Two simulations were performed, one using a revised Zhang-McFarlane convection scheme for deep convection and the Hack scheme for shallow convection, and the other disallowing shallow convection below 700 mb in the tropical belt. The two simulations produce dramatically different MJO characteristics. While the control simulation produces realistic MJOs, the simulation without shallow convection has very weak MJO signals in the Indian Ocean and western Pacific. Composite analysis finds that shallow convection serves to precondition the lower troposphere by moistening it ahead of deep convection. It also produces enhanced low-level mass convergence below 850 mb ahead of deep convection. This work, together with previous studies, suggests that a correct simulation of the interaction between deep and shallow convection is key to MJO simulation in global climate models.

  6. Psychology's Renaissance.

    PubMed

    Nelson, Leif D; Simmons, Joseph; Simonsohn, Uri

    2018-01-04

    In 2010-2012, a few largely coincidental events led experimental psychologists to realize that their approach to collecting, analyzing, and reporting data made it too easy to publish false-positive findings. This sparked a period of methodological reflection that we review here and call Psychology's Renaissance. We begin by describing how psychologists' concerns with publication bias shifted from worrying about file-drawered studies to worrying about p-hacked analyses. We then review the methodological changes that psychologists have proposed and, in some cases, embraced. In describing how the renaissance has unfolded, we attempt to describe different points of view fairly but not neutrally, so as to identify the most promising paths forward. In so doing, we champion disclosure and preregistration, express skepticism about most statistical solutions to publication bias, take positions on the analysis and interpretation of replication failures, and contend that meta-analytical thinking increases the prevalence of false positives. Our general thesis is that the scientific practices of experimental psychologists have improved dramatically.

  7. Looping Genomes: Diagnostic Change and the Genetic Makeup of the Autism Population.

    PubMed

    Navon, Daniel; Eyal, Gil

    2016-03-01

    This article builds on Hacking's framework of "dynamic nominalism" to show how knowledge about biological etiology can interact with the "kinds of people" delineated by diagnostic categories in ways that "loop" or modify both over time. The authors use historical materials to show how "geneticization" played a crucial role in binding together autism as a biosocial community and how evidence from genetics research later made an important contribution to the diagnostic expansion of autism. In the second part of the article, the authors draw on quantitative and qualitative analyses of autism rates over time in several rare conditions that are delineated strictly according to genomic mutations in order to demonstrate that these changes in diagnostic practice helped to both increase autism's prevalence and create its enormous genetic heterogeneity. Thus, a looping process that began with geneticization and involved the social effects of genetics research itself transformed the autism population and its genetic makeup.

  8. Romance, risk, and replication: Can consumer choices and risk-taking be primed by mating motives?

    PubMed

    Shanks, David R; Vadillo, Miguel A; Riedel, Benjamin; Clymo, Ashley; Govind, Sinita; Hickin, Nisha; Tamman, Amanda J F; Puhlmann, Lara M C

    2015-12-01

    Interventions aimed at influencing spending behavior and risk-taking have considerable practical importance. A number of studies motivated by the costly signaling theory within evolutionary psychology have reported that priming inductions (such as looking at pictures of attractive opposite sex members) designed to trigger mating motives increase males' stated willingness to purchase conspicuous consumption items and to engage in risk-taking behaviors, and reduce loss aversion. However, a meta-analysis of this literature reveals strong evidence of either publication bias or p-hacking (or both). We then report 8 studies with a total sample of over 1,600 participants which sought to reproduce these effects. None of the studies, including one that was fully preregistered, was successful. The results question the claim that romantic primes can influence risk-taking and other potentially harmful behaviors. (c) 2015 APA, all rights reserved).

  9. Hack-proof Synchronization Protocol for Multi-player Online Games

    NASA Astrophysics Data System (ADS)

    Fung, Yeung Siu; Lui, John C. S.

    Modern multi-player online games are popular and attractive because they provide a sense of virtual world experience to users: players can interact with each other on the Internet but perceive a local area network responsiveness. To make this possible, most modern multi-player online games use similar networking architecture that aims to hide the effects of network latency, packet loss, and high variance of delay from players. Because real-time interactivity is a crucial feature from a player's point of view, any delay perceived by a player can affect his/her performance [16]. Therefore, the game client must be able to run and accept new user commands continuously regardless of the condition of the underlying communication channel, and that it will not stop responding because of waiting for update packets from other players. To make this possible, multi-player online games typically use protocols based on "dead-reckoning" [5, 6, 9] which allows loose synchronization between players.

  10. Intrinsic imperfection of self-differencing single-photon detectors harms the security of high-speed quantum cryptography systems

    NASA Astrophysics Data System (ADS)

    Jiang, Mu-Sheng; Sun, Shi-Hai; Tang, Guang-Zhao; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2013-12-01

    Thanks to the high-speed self-differencing single-photon detector (SD-SPD), the secret key rate of quantum key distribution (QKD), which can, in principle, offer unconditionally secure private communications between two users (Alice and Bob), can exceed 1 Mbit/s. However, the SD-SPD may contain loopholes, which can be exploited by an eavesdropper (Eve) to hack into the unconditional security of the high-speed QKD systems. In this paper, we analyze the fact that the SD-SPD can be remotely controlled by Eve in order to spy on full information without being discovered, then proof-of-principle experiments are demonstrated. Here, we point out that this loophole is introduced directly by the operating principle of the SD-SPD, thus, it cannot be removed, except for the fact that some active countermeasures are applied by the legitimate parties.

  11. HackaMol: An Object-Oriented Modern Perl Library for Molecular Hacking on Multiple Scales

    DOE PAGES

    Riccardi, Demian M.; Parks, Jerry M.; Johs, Alexander; ...

    2015-03-20

    HackaMol is an open source, object-oriented toolkit written in Modern Perl that organizes atoms within molecules and provides chemically intuitive attributes and methods. The library consists of two components: HackaMol, the core that contains classes for storing and manipulating molecular information, and HackaMol::X, the extensions that use the core. We tested the core; it is well-documented and easy to install across computational platforms. Our goal for the extensions is to provide a more flexible space for researchers to develop and share new methods. In this application note, we provide a description of the core classes and two extensions: HackaMol::X::Calculator, anmore » abstract calculator that uses code references to generalize interfaces with external programs, and HackaMol::X::Vina, a structured class that provides an interface with the AutoDock Vina docking program.« less

  12. Classical phase space and Hadamard states in the BRST formalism for gauge field theories on curved spacetime

    NASA Astrophysics Data System (ADS)

    Wrochna, Michał; Zahn, Jochen

    We investigate linearized gauge theories on globally hyperbolic spacetimes in the BRST formalism. A consistent definition of the classical phase space and of its Cauchy surface analogue is proposed. We prove that it is isomorphic to the phase space in the ‘subsidiary condition’ approach of Hack and Schenkel in the case of Maxwell, Yang-Mills, and Rarita-Schwinger fields. Defining Hadamard states in the BRST formalism in a standard way, their existence in the Maxwell and Yang-Mills case is concluded from known results in the subsidiary condition (or Gupta-Bleuler) formalism. Within our framework, we also formulate criteria for non-degeneracy of the phase space in terms of BRST cohomology and discuss special cases. These include an example in the Yang-Mills case, where degeneracy is not related to a non-trivial topology of the Cauchy surface.

  13. A universal setup for active control of a single-photon detector

    NASA Astrophysics Data System (ADS)

    Liu, Qin; Lamas-Linares, Antía; Kurtsiefer, Christian; Skaar, Johannes; Makarov, Vadim; Gerhardt, Ilja

    2014-01-01

    The influence of bright light on a single-photon detector has been described in a number of recent publications. The impact on quantum key distribution (QKD) is important, and several hacking experiments have been tailored to fully control single-photon detectors. Special attention has been given to avoid introducing further errors into a QKD system. We describe the design and technical details of an apparatus which allows to attack a quantum-cryptographic connection. This device is capable of controlling free-space and fiber-based systems and of minimizing unwanted clicks in the system. With different control diagrams, we are able to achieve a different level of control. The control was initially targeted to the systems using BB84 protocol, with polarization encoding and basis switching using beamsplitters, but could be extended to other types of systems. We further outline how to characterize the quality of active control of single-photon detectors.

  14. Faked state attacks on realistic round robin DPS quantum key distribution systems and countermeasure

    NASA Astrophysics Data System (ADS)

    Iwakoshi, T.

    2015-05-01

    In May 2014, a new quantum key distribution protocol named "Round Robin Differential-Phase-Shift Quantum Key Distribution (RR DPS QKD)" was proposed. It has a special feature that the key consumption via privacy amplification is a small constant because RR DPS QKD guarantees its security by information causality, not by information-disturbance trade-off. Therefore, the authors claimed that RR DPS QKD systems does not need to monitor the disturbance by an attacker in the quantum channel. However, this study shows that a modified Faked-State Attack (or so-called bright illumination attack) can hack a RR DPS QKD system almost perfectly if it is implemented with realistic detectors even information-causality guarantees the security of RR DPS QKD protocol. Therefore, this study also proposes a possible Measurement-Device-Independent RR DPS QKD system to avoid the modified Faked-State Attack.

  15. DIY-Bio - economic, epistemological and ethical implications and ambivalences.

    PubMed

    Keulartz, Jozef; van den Belt, Henk

    2016-12-01

    Since 2008, we witness the emergence of the Do-It-Yourself Biology movement, a global movement spreading the use of biotechnology beyond traditional academic and industrial institutions and into the lay public. Practitioners include a broad mix of amateurs, enthusiasts, students, and trained scientists. At this moment, the movement counts nearly 50 local groups, mostly in America and Europe, but also increasingly in Asia. Do-It-Yourself Bio represents a direct translation of hacking culture and practicesfrom the realm of computers and software into the realm of genes and cells. Although the movement is still in its infancy, and it is even unclear whether it will ever reach maturity, the contours of a new paradigm of knowledge production are already becoming visible. We will subsequently sketch the economic, the epistemological and the ethical profile of Do-It-Yourself Bio, and discuss its implications and also its ambivalences.

  16. A universal setup for active control of a single-photon detector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Qin; Skaar, Johannes; Lamas-Linares, Antía

    2014-01-15

    The influence of bright light on a single-photon detector has been described in a number of recent publications. The impact on quantum key distribution (QKD) is important, and several hacking experiments have been tailored to fully control single-photon detectors. Special attention has been given to avoid introducing further errors into a QKD system. We describe the design and technical details of an apparatus which allows to attack a quantum-cryptographic connection. This device is capable of controlling free-space and fiber-based systems and of minimizing unwanted clicks in the system. With different control diagrams, we are able to achieve a different levelmore » of control. The control was initially targeted to the systems using BB84 protocol, with polarization encoding and basis switching using beamsplitters, but could be extended to other types of systems. We further outline how to characterize the quality of active control of single-photon detectors.« less

  17. Synthetic Immunology: Hacking Immune Cells to Expand Their Therapeutic Capabilities.

    PubMed

    Roybal, Kole T; Lim, Wendell A

    2017-04-26

    The ability of immune cells to survey tissues and sense pathologic insults and deviations makes them a unique platform for interfacing with the body and disease. With the rapid advancement of synthetic biology, we can now engineer and equip immune cells with new sensors and controllable therapeutic response programs to sense and treat diseases that our natural immune system cannot normally handle. Here we review the current state of engineered immune cell therapeutics and their unique capabilities compared to small molecules and biologics. We then discuss how engineered immune cells are being designed to combat cancer, focusing on how new synthetic biology tools are providing potential ways to overcome the major roadblocks for treatment. Finally, we give a long-term vision for the use of synthetic biology to engineer immune cells as a general sensor-response platform to precisely detect disease, to remodel disease microenvironments, and to treat a potentially wide range of challenging diseases.

  18. HackaMol: An Object-Oriented Modern Perl Library for Molecular Hacking on Multiple Scales.

    PubMed

    Riccardi, Demian; Parks, Jerry M; Johs, Alexander; Smith, Jeremy C

    2015-04-27

    HackaMol is an open source, object-oriented toolkit written in Modern Perl that organizes atoms within molecules and provides chemically intuitive attributes and methods. The library consists of two components: HackaMol, the core that contains classes for storing and manipulating molecular information, and HackaMol::X, the extensions that use the core. The core is well-tested, well-documented, and easy to install across computational platforms. The goal of the extensions is to provide a more flexible space for researchers to develop and share new methods. In this application note, we provide a description of the core classes and two extensions: HackaMol::X::Calculator, an abstract calculator that uses code references to generalize interfaces with external programs, and HackaMol::X::Vina, a structured class that provides an interface with the AutoDock Vina docking program.

  19. Microsoft Kinect Sensor Evaluation

    NASA Technical Reports Server (NTRS)

    Billie, Glennoah

    2011-01-01

    My summer project evaluates the Kinect game sensor input/output and its suitability to perform as part of a human interface for a spacecraft application. The primary objective is to evaluate, understand, and communicate the Kinect system's ability to sense and track fine (human) position and motion. The project will analyze the performance characteristics and capabilities of this game system hardware and its applicability for gross and fine motion tracking. The software development kit for the Kinect was also investigated and some experimentation has begun to understand its development environment. To better understand the software development of the Kinect game sensor, research in hacking communities has brought a better understanding of the potential for a wide range of personal computer (PC) application development. The project also entails the disassembly of the Kinect game sensor. This analysis would involve disassembling a sensor, photographing it, and identifying components and describing its operation.

  20. Public, experts join at town meeting

    NASA Astrophysics Data System (ADS)

    Bush, Susan

    About 80 citizens concerned with the threat of ozone depletion attended a public meeting on June 9 in Charlottesville, Va., to discuss the issue with a panel of six leading ozone experts. Held in conjunction with the Quadrennial Ozone Symposium, the town meeting was videotaped for airing on public broadcast stations this fall. The meeting was aimed at nonexperts, to “get the word out” to the public, said the moderator, journalist Peter Hackes.The lively, sometimes heated discussion showed the public's high awareness and concern over problems associated with ozone depletion. During the nearly 2-hour meeting topics ranged from the reparability of the ozone layer, to steps the public can take to help mitigate ozone loss, to reports of increased cases of skin cancer due to more ultraviolet radiation reaching the Earth's surface. There were also some claims that ozone depletion is overexaggerated and is a hoax for scientists to get more research funding.

  1. Publication bias and the canonization of false facts.

    PubMed

    Nissen, Silas Boye; Magidson, Tali; Gross, Kevin; Bergstrom, Carl T

    2016-12-20

    Science is facing a "replication crisis" in which many experimental findings cannot be replicated and are likely to be false. Does this imply that many scientific facts are false as well? To find out, we explore the process by which a claim becomes fact. We model the community's confidence in a claim as a Markov process with successive published results shifting the degree of belief. Publication bias in favor of positive findings influences the distribution of published results. We find that unless a sufficient fraction of negative results are published, false claims frequently can become canonized as fact. Data-dredging, p-hacking, and similar behaviors exacerbate the problem. Should negative results become easier to publish as a claim approaches acceptance as a fact, however, true and false claims would be more readily distinguished. To the degree that the model reflects the real world, there may be serious concerns about the validity of purported facts in some disciplines.

  2. European Stroke Science Workshop

    PubMed Central

    Mattle, Heinrich P.; Brainin, Michael; Chamorro, Angel; Diener, Hans Christoph; Hacke, Werner; Leys, Didier; Norrving, Bo; Ward, Nick

    2012-01-01

    The European Stroke Organisation (ESO) held its first European Stroke Science Workshop in Garmisch-Partenkirchen, Germany (15-17 December 2011). Stroke experts based in Europe were invited to present and discuss their current research. The scope of the workshop was to review the most recent findings of selected topics in stroke, to exchange ideas, to stimulate new research and to enhance collaboration between European stroke research groups. Seven scientific sessions were held, each starting with a keynote lecture to review the state of the art of the given topic, followed by 4 or 5 short presentations by experts. They were asked to limit their presentations to 10 slides containing only recent information. The meeting was organized by the executive committee of the ESO (Heinrich Mattle, chairman, Michael Brainin, Angel Chamorro, Werner Hacke, Didier Leys) and supported by the European Stroke Conference (Michael Hennerici). In this article we summarize the main contents of this successful workshop. PMID:22836350

  3. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.

    PubMed

    Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B

    2014-09-15

    Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

  4. Thermoluminescence dating of archaeological artefacts from the Middle Neolithic, Bronze Age and the Roman Empire period.

    PubMed

    Berger, T; Hajek, M; Primerano, W; Vana, N

    2002-01-01

    Thermoluminescence (TL) dating was applied for artefacts found near the small village of Michelstetten, Lower Austria. Settlements in this region can be traced hack a long time and, according to archaeologists, the discovered artefacts may be as old as 6000 years. A modified sample preparation technique based on the fine-grain method was developed. This technique results in a higher reproducibility and reduces the overall preparation time. For some artefacts the new information of the TL dating leads to an unforeseen re-interpretation of the archaeological age. Furthermore, an iron furnace from the period of the Roman Empire could be dated. For the first time, it was possible to estimate correctly the point of time of the burn-down of an ancient wooden house via an analysis of the house's clay plaster. The fire took place in the sixth century; this was confirmed by dating ceramic artefacts.

  5. The co-production of what? Knowledge, values, and social relations in health care.

    PubMed

    Filipe, Angela; Renedo, Alicia; Marston, Cicely

    2017-05-01

    "Co-production" is becoming an increasingly popular term in policymaking, governance, and research. While the shift from engagement and involvement to co-production in health care holds the promise of revolutionising health services and research, it is not always evident what counts as co-production: what is being produced, under what circumstances, and with what implications for participants. We discuss these questions and propose that co-production can be understood as an exploratory space and a generative process that leads to different, and sometimes unexpected, forms of knowledge, values, and social relations. By opening up this discussion, we hope to stimulate future debates on co-production as well as draw out ways of thinking differently about collaboration and participation in health care and research. Part of the title of this article is inspired by the book "The Social Construction of What?" by Ian Hacking (Cambridge, MA: Harvard University Press; 2000).

  6. HackaMol: An Object-Oriented Modern Perl Library for Molecular Hacking on Multiple Scales

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Riccardi, Demian M.; Parks, Jerry M.; Johs, Alexander

    HackaMol is an open source, object-oriented toolkit written in Modern Perl that organizes atoms within molecules and provides chemically intuitive attributes and methods. The library consists of two components: HackaMol, the core that contains classes for storing and manipulating molecular information, and HackaMol::X, the extensions that use the core. We tested the core; it is well-documented and easy to install across computational platforms. Our goal for the extensions is to provide a more flexible space for researchers to develop and share new methods. In this application note, we provide a description of the core classes and two extensions: HackaMol::X::Calculator, anmore » abstract calculator that uses code references to generalize interfaces with external programs, and HackaMol::X::Vina, a structured class that provides an interface with the AutoDock Vina docking program.« less

  7. Synthetic Immunology: Hacking Immune Cells to Expand Their Therapeutic Capabilities

    PubMed Central

    Roybal, Kole T.; Lim, Wendell A.

    2017-01-01

    The ability of immune cells to survey tissues and sense pathologic insults and deviations makes them a unique platform for interfacing with the body and disease. With the rapid advancement of synthetic biology, we can now engineer and equip immune cells with new sensors and controllable therapeutic response programs to sense and treat diseases that our natural immune system cannot normally handle. Here we review the current state of engineered immune cell therapeutics and their unique capabilities compared to small molecules and biologics. We then discuss how engineered immune cells are being designed to combat cancer, focusing on how new synthetic biology tools are providing potential ways to overcome the major roadblocks for treatment. Finally, we give a long-term vision for the use of synthetic biology to engineer immune cells as a general sensor-response platform to precisely detect disease, to remodel disease microenvironments, and to treat a potentially wide range of challenging diseases. PMID:28446063

  8. Using 10Be to quantify rates of landscape change in 'dead' orogens - millennial scale rates of bedrock and basin-scale erosion in the southern and central Appalachian Mountains

    NASA Astrophysics Data System (ADS)

    Bierman, P. R.; Reusser, L.; Portenga, E.

    2011-12-01

    The Appalachian Mountain chain stretches north-south along the eastern margin of North America, in places rising a thousand meters and more above the adjacent piedmont. Here, Davis built his paradigm of landscape evolution, seeing landscape rejuvenation and dissected peneplains, a transient landscape. Hack saw the Appalachians as a dynamic system where topography was adjusted to rock strength, a steady-state landscape. Neither had quantitative data by which to test their theories. Today, we approach landscapes of the Appalachian Mountains quite differently. Over the past decade, we and others have measured in situ-produced 10Be in more than 300 samples of quartz isolated from Appalachian drainage basin sediments and in more than 100 samples from exposed Appalachian bedrock outcrops, most of which are on ridgelines. Samples have been collected from the Susquehanna, Potomac, and Shenandoah drainage basins as well as from the area around the Great Smoky Mountain National Park and the Blue Ridge escarpment, and from rivers draining from the Appalachians across the southeastern United States Piedmont. Most areas of the Appalachian Mountains are eroding only slowly; the average for all drainage basin samples analyzed to date is ~18 m/My (n=328). The highest basin-scale erosion rates, 25-70 m/My are found in the Appalachian Plateau and in the Great Smoky Mountains. Lower rates, on the order on 10-20 m/My, characterize the Shenandoah, Potomac, and Blue Ridge escarpment areas. There is a significant, positive relationship between basin-scale erosion rates and average basin slope. Steeper basins are in general eroding more rapidly than less steep basins. On the whole, the erosion rates of bedrock outcrops are either lower than or similar to those measured at a basin scale. The average erosion rate for samples of outcropping bedrock collected from the Appalachians is ~15 m/My (n=101). In the Potomac River Basin and the Great Smoky Mountains, bedrock and basin-scale erosion rates are similar implying long-term steady erosion consistent with dynamic steady state as advocated by Hack. However, in the Susquehanna drainage, basin scale erosion rates are significantly higher than those measured from outcrops suggesting that over time, relief is increasing. The Susquehanna River basin appears to be responding to a transient perturbation, ala Davis.

  9. Intra-flow morphology variations within a single submarine flow: the 2005-2006 East Pacific Rise eruption

    NASA Astrophysics Data System (ADS)

    Fundis, A. T.; Soule, S.; Fornari, D. J.; Perfit, M. R.

    2009-12-01

    The 2005-2006 eruption near 9°50‧N marked the first observed repeat eruption at a mid-ocean ridge and provided a unique opportunity to deduce the emplacement dynamics of a single eruptive event. Since this new flow was documented in April 2006, a total of 41 deep-towed imaging surveys have been conducted with the Woods Hole Oceanographic Institution’s (WHOI) TowCam system. These surveys collected more than 60,000 digital color images and high-resolution (+ 10 cm) bathymetric profiles. We have analyzed the surface morphology of the flow using this data at a level of detail that has never before been possible. Pre-existing slope has been determined using bathymetric data previously collected with WHOI’s Autonomous Benthic Explorer and 30 kHz Simrad EM300 multibeam system. Our analyses quantify the spatial distributions of lava flow surface morphologies and allow us to investigate how these various morphologies relate to the physical characteristics of the ridge and dynamics of flow emplacement. Images of the 2005-2006 flow from each of the TowCam surveys were analyzed for lava flow morphology, the orientation of flow direction indicators, and for the presence of kipukas, collapse, faults and fissures. Our results support previous studies (Fornari et al., 1998, 2004; Soule et al., 2005) that suggest most of the 2005-2006 flows originated from nearly continuous fissures as discrete flow units and subsequently followed pre-existing bathymetric lows and flow channels away from the AST. These flow channels, found predominantly on the eastern flank of the ridge axis at ~9°50‧N, are primarily composed of transitions between sheet and hackly flows. The flows north of 9°53‧ and south of 9°49‧ are predominantly lobate flows with a high abundance of kipukas (<1 - 5 m diameter). The centers of lava channels that served as distribution pathways during the eruption tend to be characterized by sheet flows, while hackly flows that transition into lobate define the edges of the channels. Pillows, that are relatively rare, are concentrated at the termini of the flow lobes. The data indicate that the pre-existing slope did not influence the development of various morphologies of the 2005-2006 eruption.

  10. "Meta-analyses and P-curves support robust cycle shifts in women's mate preferences: Reply to Wood and Carden (2014) and Harris, Pashler, and Mickes (2014)": Correction to Gildersleeve, Haselton, and Fales (2014).

    PubMed

    2017-11-01

    Reports an error in "Meta-analyses and p -curves support robust cycle shifts in women's mate preferences: Reply to Wood and Carden (2014) and Harris, Pashler, and Mickes (2014)" by Kelly Gildersleeve, Martie G. Haselton and Melissa R. Fales ( Psychological Bulletin , 2014[Sep], Vol 140[5], 1272-1280). In the article, all p -curve analyses examining the Context Moderation Hypothesis Prediction mistakenly included the p-value from Little, Jones, Burt, & Perrett (2007) Study 2 for the simple effect of fertility on attraction to facial symmetry in a short-term relationship context ( p < .001). The analyses should have instead included the p -value for the fertility X relationship context interaction ( p = .011). In addition, the p -curve analyses examining exact two-tailed p -values for the Cycle Shift Prediction should have included an additional p -value from Provost et al. (2008) Study 1 for the main effect of fertility on attraction to gait masculinity. The reported p -value for this effect was .05, making it ineligible for inclusion in p -curves of reported p-values. However, the exact recalculated two-tailed p -value was .049, making it eligible for inclusion in p -curves of exact p -values. The corrected p -curve of exact two-tailed p -values evaluating the Cycle Shift Prediction and Context Moderation Prediction (displayed in Figure 2) now includes a total of 15 p -values ( N = 1442) is no longer significantly right skewed χ²(30) = 41.25, p = .08. The corrected p -curve of exact two-tailed p -values evaluating the Cycle Shift Prediction, Context Moderation Prediction, and Partner Qualities Moderation Prediction (displayed in Figure 3) now includes a total of 21 p -values ( N = 1707) and continues to be significantly right skewed Χ²(42) = 69.83, p = .004. As part of this correction, the online supplemental materials have been updated. (The following abstract of the original article appeared in record 2014-35938-003.) Two meta-analyses evaluated shifts across the ovulatory cycle in women's mate preferences but reported very different findings. In this journal, we reported robust evidence for the pattern of cycle shifts predicted by the ovulatory shift hypothesis (Gildersleeve, Haselton, & Fales, 2014). However, Wood, Kressel, Joshi, and Louie (2014) claimed an absence of compelling support for this hypothesis and asserted that the few significant cycle shifts they observed were false positives resulting from publication bias, p-hacking, or other research artifacts. How could 2 meta-analyses of the same literature reach such different conclusions? We reanalyzed the data compiled by Wood et al. These analyses revealed problems in Wood et al.'s meta-analysis-some of which are reproduced in Wood and Carden's (2014) comment in the current issue of this journal-that led them to overlook clear evidence for the ovulatory shift hypothesis in their own set of effects. In addition, we present right-skewed p-curves that directly contradict speculations by Wood et al.; Wood and Carden; and Harris, Pashler, and Mickes (2014) that supportive findings in the cycle shift literature are false positives. Therefore, evidence from both of the meta-analyses and the p-curves strongly supports genuine, robust effects consistent with the ovulatory shift hypothesis and contradicts claims that these effects merely reflect publication bias, p-hacking, or other research artifacts. Unfounded speculations about p-hacking distort the research record and risk unfairly damaging researchers' reputations; they should therefore be made only on the basis of firm evidence. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  11. Quantum network with trusted and untrusted relays

    NASA Astrophysics Data System (ADS)

    Ma, Xiongfeng; Annabestani, Razieh; Fung, Chi-Hang Fred; Lo, Hoi-Kwong; Lütkenhaus, Norbert; PitkäNen, David; Razavi, Mohsen

    2012-02-01

    Quantum key distribution offers two distant users to establish a random secure key by exploiting properties of quantum mechanics, whose security has proven in theory. In practice, many lab and field demonstrations have been performed in the last 20 years. Nowadays, quantum network with quantum key distribution systems are tested around the world, such as in China, Europe, Japan and US. In this talk, I will give a brief introduction of recent development for quantum network. For the untrusted relay part, I will introduce the measurement-device-independent quantum key distribution scheme and a quantum relay with linear optics. The security of such scheme is proven without assumptions on the detection devices, where most of quantum hacking strategies are launched. This scheme can be realized with current technology. For the trusted relay part, I will introduce so-called delayed privacy amplification, with which no error correction and privacy amplification is necessarily to be performed between users and the relay. In this way, classical communications and computational power requirement on the relay site will be reduced.

  12. Making up 'national trauma, in Israel: From collective identity to collective vulnerability.

    PubMed

    Plotkin-Amrami, Galia; Brunner, José

    2015-08-01

    We sketch a variety of institutional, discursive, professional, and personal 'vectors', dating back to the 1980s, in order to explain how 'national trauma' was able to go from a cultural into a professional category in Israeli mental health during the Al-Aqsa Intifada (2000-2005). Our genealogy follows Ian Hacking's approach to transient mental illnesses, both illustrating its fertility and expanding its horizon. Thus, we also explore the dynamics that developed in the Israeli mental health community with the advent of 'national trauma': while the vast majority of Israeli psychologists and psychiatrists did not adopt the category, they embraced much of its underlying logic, establishing a link between Israeli identity and the mental harm said to be caused by Palestinian terror. Remarkably, the nexus of national identity and collective psychic vulnerability also prompted the cooperation of Jewish and Palestinian-Israeli mental health scholars seeking to explore the psychological effect that the minority status of Israeli Palestinians had on them during the Al-Aqsa Intifada.

  13. Galaxy evolution and large-scale structure in the far-infrared. I - IRAS pointed observations

    NASA Astrophysics Data System (ADS)

    Lonsdale, Carol J.; Hacking, Perry B.

    1989-04-01

    Redshifts for 66 galaxies were obtained from a sample of 93 60-micron sources detected serendipitously in 22 IRAS deep pointed observations, covering a total area of 18.4 sq deg. The flux density limit of this survey is 150 mJy, 4 times fainter than the IRAS Point Source Catalog (PSC). The luminosity function is similar in shape with those previously published for samples selected from the PSC, with a median redshift of 0.048 for the fainter sample, but shifted to higher space densities. There is evidence that some of the excess number counts in the deeper sample can be explained in terms of a large-scale density enhancement beyond the Pavo-Indus supercluster. In addition, the faintest counts in the new sample confirm the result of Hacking et al. (1989) that faint IRAS 60-micron source counts lie significantly in excess of an extrapolation of the PSC counts assuming no luminosity or density evolution.

  14. Geomorphological origin of recession curves

    NASA Astrophysics Data System (ADS)

    Biswal, Basudev; Marani, Marco

    2010-12-01

    We identify a previously undetected link between the river network morphology and key recession curves properties through a conceptual-physical model of the drainage process of the riparian unconfined aquifer. We show that the power-law exponent, α, of -dQ/dt vs. Q curves is related to the power-law exponent of N(l) vs. G(l) curves (which we show to be connected to Hack's law), where l is the downstream distance from the channel heads, N(l) is the number of channel reaches exactly located at a distance l from their channel head, and G(l) is the total length of the network located at a distance greater or equal to l from channel heads. Using Digital Terrain Models and daily discharge observations from 67 US basins we find that geomorphologic α estimates match well the values obtained from recession curves analyses. Finally, we argue that the link between recession flows and network morphology points to an important role of low-flow discharges in shaping the channel network.

  15. Increasing operational command and control security by the implementation of device independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bovino, Fabio Antonio; Messina, Angelo

    2016-10-01

    In a very simplistic way, the Command and Control functions can be summarized as the need to provide the decision makers with an exhaustive, real-time, situation picture and the capability to convey their decisions down to the operational forces. This two-ways data and information flow is vital to the execution of current operations and goes far beyond the border of military operations stretching to Police and disaster recovery as well. The availability of off-the shelf technology has enabled hostile elements to endanger the security of the communication networks by violating the traditional security protocols and devices and hacking sensitive databases. In this paper an innovative approach based to implementing Device Independent Quantum Key Distribution system is presented. The use of this technology would prevent security breaches due to a stolen crypto device placed in an end-to-end communication chain. The system, operating with attenuated laser, is practical and provides the increasing of the distance between the legitimate users.

  16. Necessary detection efficiencies for secure quantum key distribution and bound randomness

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Cavalcanti, Daniel; Passaro, Elsa; Pironio, Stefano; Skrzypczyk, Paul

    2016-01-01

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. Our attack gives bounds on the critical detection efficiencies necessary for secure quantum key distribution, which show that the implementation of most partly device-independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely nonlocal correlations in which a nonsignalling eavesdropper can find out a posteriori the result of any implemented measurement.

  17. Rapid feedback control and stabilization of an optical tweezers with a budget microcontroller

    NASA Astrophysics Data System (ADS)

    Nino, Daniel; Wang, Haowei; Milstein, Joshua N.

    2014-09-01

    Laboratories ranging the scientific disciplines employ feedback control to regulate variables within their experiments, from the flow of liquids within a microfluidic device to the temperature within a cell incubator. We have built an inexpensive, yet fast and rapidly deployed, feedback control system that is straightforward and flexible to implement from a commercially available Arduino Due microcontroller. This is in comparison with the complex, time-consuming and often expensive electronics that are commonly implemented. As an example of its utility, we apply our feedback controller to the task of stabilizing the main trapping laser of an optical tweezers. The feedback controller, which is inexpensive yet fast and rapidly deployed, was implemented from hacking an open source Arduino Due microcontroller. Our microcontroller based feedback system can stabilize the laser intensity to a few tenths of a per cent at 200 kHz, which is an order of magnitude better than the laser's base specifications, illustrating the utility of these devices.

  18. Effect of source tampering in the security of quantum cryptography

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Xu, Feihu; Jiang, Mu-Sheng; Ma, Xiang-Chun; Lo, Hoi-Kwong; Liang, Lin-Mei

    2015-08-01

    The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV) quantum communication protocols (e.g., QKD, quantum coin tossing, weak-coherent-state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.

  19. Entanglement-distillation attack on continuous-variable quantum key distribution in a turbulent atmospheric channel

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Xie, Cailang; Liao, Qin; Zhao, Wei; Zeng, Guihua; Huang, Duan

    2017-08-01

    The survival of Gaussian quantum states in a turbulent atmospheric channel is of crucial importance in free-space continuous-variable (CV) quantum key distribution (QKD), in which the transmission coefficient will fluctuate in time, thus resulting in non-Gaussian quantum states. Different from quantum hacking of the imperfections of practical devices, here we propose a different type of attack by exploiting the security loopholes that occur in a real lossy channel. Under a turbulent atmospheric environment, the Gaussian states are inevitably afflicted by decoherence, which would cause a degradation of the transmitted entanglement. Therefore, an eavesdropper can perform an intercept-resend attack by applying an entanglement-distillation operation on the transmitted non-Gaussian mixed states, which allows the eavesdropper to bias the estimation of the parameters and renders the final keys shared between the legitimate parties insecure. Our proposal highlights the practical CV QKD vulnerabilities with free-space quantum channels, including the satellite-to-earth links, ground-to-ground links, and a link from moving objects to ground stations.

  20. What good cyber resilience looks like.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  1. Analysis of Multiple Data Hiding Combined Coloured Visual Cryptography and LSB

    NASA Astrophysics Data System (ADS)

    Maulana, Halim; Rahman Syahputra, Edy

    2017-12-01

    Currently the level of data security becoming a major factor in data transfer. As we know every process of sending data through any medium the risk of that data gets hacked will still be there. Some techniques for securing data such as steganography and cryptography also often used as a solution for securing data. But it does not last long because it has been found out the weaknesses of the algorithm so that the security be assured. So, in need of variety of new algorithms to be able to protect the data so that data security can be guaranteed. In this study tries to combine two visual algorithms that steganography and cryptography. Where in these experiments will try to secure two pieces of data type that is the type of image data and text data where both the data is regarded as a message so to obtain the correct information receiver should get that two types of data.

  2. Concepts, Diagnosis and the History of Medicine: Historicising Ian Hacking and Munchausen Syndrome

    PubMed Central

    Millard, Chris

    2017-01-01

    Summary Concepts used by historians are as historical as the diagnoses or categories that are studied. The example of Munchausen syndrome (deceptive presentation of illness in order to adopt the ‘sick role’) is used to explore this. Like most psychiatric diagnoses, Munchausen syndrome is not thought applicable across time by social historians of medicine. It is historically specific, drawing upon twentieth-century anthropology and sociology to explain motivation through desire for the ‘sick role’. Ian Hacking’s concepts of ‘making up people’ and ‘looping effects’ are regularly utilised outside of the context in which they are formed. However, this context is precisely the same anthropological and sociological insight used to explain Munchausen syndrome. It remains correct to resist the projection of Munchausen syndrome into the past. However, it seems inconsistent to use Hacking’s concepts to describe identity formation before the twentieth century as they are given meaning by an identical context. PMID:29713120

  3. Whatever Happened to Formal Methods for Security?

    PubMed Central

    Voas, J.; Schaffer, K.

    2016-01-01

    We asked 7 experts 7 questions to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems. We are continually reminded of the 1996 paper by Tony Hoare “How did Software Get So Reliable Without Proof?” [1] In that vein, how did we get so insecure with proof? Given daily press announcements concerning new malware, data breaches, and privacy loss, is FM still relevant or was it ever? Our experts answered with unique personal insights. We were curious as to whether this successful methodology in “safety-critical” has succeeded as well for today’s “build it, hack it, patch it” mindset. Our experts were John McLean (Naval Research Labs), Paul Black (National Institute of Standards and Technology), Karl Levitt (University of California at Davis), Joseph Williams (CloudEconomist.Com), Connie Heitmeyer (Naval Research Labs), Eugene Spafford (Purdue University), and Joseph Kiniry (Galois, Inc.). The questions and responses follow. PMID:27890940

  4. Galaxy evolution and large-scale structure in the far-infrared. I. IRAS pointed observations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lonsdale, C.J.; Hacking, P.B.

    1989-04-01

    Redshifts for 66 galaxies were obtained from a sample of 93 60-micron sources detected serendipitously in 22 IRAS deep pointed observations, covering a total area of 18.4 sq deg. The flux density limit of this survey is 150 mJy, 4 times fainter than the IRAS Point Source Catalog (PSC). The luminosity function is similar in shape with those previously published for samples selected from the PSC, with a median redshift of 0.048 for the fainter sample, but shifted to higher space densities. There is evidence that some of the excess number counts in the deeper sample can be explained inmore » terms of a large-scale density enhancement beyond the Pavo-Indus supercluster. In addition, the faintest counts in the new sample confirm the result of Hacking et al. (1989) that faint IRAS 60-micron source counts lie significantly in excess of an extrapolation of the PSC counts assuming no luminosity or density evolution. 81 refs.« less

  5. A valiant little terminal: A VLT user's manual

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weinstein, A.

    1992-08-01

    VLT came to be used at SLAC (Stanford Linear Accelerator Center), because SLAC wanted to assess the Amiga's usefulness as a color graphics terminal and T{sub E}X workstation. Before the project could really begin, the people at SLAC needed a terminal emulator which could successfully talk to the IBM 3081 (now the IBM ES9000-580) and all the VAXes on the site. Moreover, it had to compete in quality with the Ann Arbor Ambassador GXL terminals which were already in use at the laboratory. Unfortunately, at the time there was no commercial program which fit the bill. Luckily, Willy Langeveld hadmore » been independently hacking up a public domain VT100 emulator written by Dave Wecker et al. and the result, VLT, suited SLAC's purpose. Over the years, as the program was debugged and rewritten, the original code disappeared, so that now, in the present version of VLT, none of the original VT100 code remains.« less

  6. A valiant little terminal: A VLT user`s manual. Revision 4

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weinstein, A.

    1992-08-01

    VLT came to be used at SLAC (Stanford Linear Accelerator Center), because SLAC wanted to assess the Amiga`s usefulness as a color graphics terminal and T{sub E}X workstation. Before the project could really begin, the people at SLAC needed a terminal emulator which could successfully talk to the IBM 3081 (now the IBM ES9000-580) and all the VAXes on the site. Moreover, it had to compete in quality with the Ann Arbor Ambassador GXL terminals which were already in use at the laboratory. Unfortunately, at the time there was no commercial program which fit the bill. Luckily, Willy Langeveld hadmore » been independently hacking up a public domain VT100 emulator written by Dave Wecker et al. and the result, VLT, suited SLAC`s purpose. Over the years, as the program was debugged and rewritten, the original code disappeared, so that now, in the present version of VLT, none of the original VT100 code remains.« less

  7. Who goes there. A dialogue of questions and answers about benign hacking. [Securing access to computer from outside sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stevens, D.F.

    1987-04-01

    On August 23, 1986, it was noticed that the accounting files for one of LBL's computing systems failed to balance. On August 24, we received word that an unauthorized person was attempting entry into a US Navy computer from LBL. Preliminary investigation indicated that LBL was the victim of a benign hacker, where ''benign'' is used in the medical sense. It was thought that the perpetrator was a graduate student from a neighboring university, and that it would provide a useful object lesson to other such folk if he were caught and admonished. LBL therefore embarked upon a journey ofmore » detection and containment instead of prevention. That journey continues today, having led first across the country, then across the Atlantic. In the course of the journey we have gathered a number of observations that should be of interest to anyone running a computer with any connection to the outside world.« less

  8. Conducting Meta-Analyses Based on p Values

    PubMed Central

    van Aert, Robbie C. M.; Wicherts, Jelte M.; van Assen, Marcel A. L. M.

    2016-01-01

    Because of overwhelming evidence of publication bias in psychology, techniques to correct meta-analytic estimates for such bias are greatly needed. The methodology on which the p-uniform and p-curve methods are based has great promise for providing accurate meta-analytic estimates in the presence of publication bias. However, in this article, we show that in some situations, p-curve behaves erratically, whereas p-uniform may yield implausible estimates of negative effect size. Moreover, we show that (and explain why) p-curve and p-uniform result in overestimation of effect size under moderate-to-large heterogeneity and may yield unpredictable bias when researchers employ p-hacking. We offer hands-on recommendations on applying and interpreting results of meta-analyses in general and p-uniform and p-curve in particular. Both methods as well as traditional methods are applied to a meta-analysis on the effect of weight on judgments of importance. We offer guidance for applying p-uniform or p-curve using R and a user-friendly web application for applying p-uniform. PMID:27694466

  9. Galaxy evolution and large-scale structure in the far-infrared. I - IRAS pointed observations

    NASA Technical Reports Server (NTRS)

    Lonsdale, Carol J.; Hacking, Perry B.

    1989-01-01

    Redshifts for 66 galaxies were obtained from a sample of 93 60-micron sources detected serendipitously in 22 IRAS deep pointed observations, covering a total area of 18.4 sq deg. The flux density limit of this survey is 150 mJy, 4 times fainter than the IRAS Point Source Catalog (PSC). The luminosity function is similar in shape with those previously published for samples selected from the PSC, with a median redshift of 0.048 for the fainter sample, but shifted to higher space densities. There is evidence that some of the excess number counts in the deeper sample can be explained in terms of a large-scale density enhancement beyond the Pavo-Indus supercluster. In addition, the faintest counts in the new sample confirm the result of Hacking et al. (1989) that faint IRAS 60-micron source counts lie significantly in excess of an extrapolation of the PSC counts assuming no luminosity or density evolution.

  10. Publication bias and the canonization of false facts

    PubMed Central

    Nissen, Silas Boye; Magidson, Tali; Gross, Kevin; Bergstrom, Carl T

    2016-01-01

    Science is facing a “replication crisis” in which many experimental findings cannot be replicated and are likely to be false. Does this imply that many scientific facts are false as well? To find out, we explore the process by which a claim becomes fact. We model the community’s confidence in a claim as a Markov process with successive published results shifting the degree of belief. Publication bias in favor of positive findings influences the distribution of published results. We find that unless a sufficient fraction of negative results are published, false claims frequently can become canonized as fact. Data-dredging, p-hacking, and similar behaviors exacerbate the problem. Should negative results become easier to publish as a claim approaches acceptance as a fact, however, true and false claims would be more readily distinguished. To the degree that the model reflects the real world, there may be serious concerns about the validity of purported facts in some disciplines. DOI: http://dx.doi.org/10.7554/eLife.21451.001 PMID:27995896

  11. Facts, values, and journalism.

    PubMed

    Gilbert, Susan

    2017-03-01

    At a time of fake news, hacks, leaks, and unverified reports, many people are unsure whom to believe. How can we communicate in ways that make individuals question their assumptions and learn? My colleagues at The Hastings Center and many journalists and scientists are grappling with this question and have, independently, reached the same first step: recognize that facts can't be fully understood without probing their connection to values. "Explaining the basics is important, of course, but we also need to diversify our approach to the coverage of science-particularly as it intersects with the matrix of cultural, religious, social, and political values of our readers," said an article in Undark, an online magazine of science journalism. An editorial in Nature called for scientists to engage directly with citizens in debates over climate change and genome editing, noting that "the ethical issues can be critically dependent on the science, for example, in understanding where the boundaries between non-heritable and heritable genome modifications might be." We're here to help. © 2017 The Hastings Center.

  12. Conscientious workmen or booksellers' hacks? The professional identities of science writers in the mid-nineteenth century.

    PubMed

    Fyfe, Aileen

    2005-06-01

    Existing scholarship on the debates over expertise in mid-nineteenth-century Britain has demonstrated the importance of popular writings on the sciences to definitions of scientific authority. Yet while men of science might position themselves in opposition to the stereotype of the merely popular writer, the self-identity of the popular writer remained ambiguous. This essay examines the careers of William Charles Linnaeus Martin (1798-1864) and Thomas Milner (1808-ca. 1883) and places them in the context of others who made their living by writing works on the sciences for the general reader. Martin wrote on zoology and Milner moved between astronomy, geology, and geography. The essay unravels the close but ambivalent relationship between the professions of authorship and of science and highlights writing as another aspect of scientific practice. Both writers were moderately financially successful, but Martin's sense of failure and Milner's satisfaction reflect their contrasting images of their professional identity.

  13. Simple-1: Development stage of the data transmission system for a solid propellant mid-power rocket model

    NASA Astrophysics Data System (ADS)

    Yarce, Andrés; Sebastián Rodríguez, Juan; Galvez, Julián; Gómez, Alejandro; García, Manuel J.

    2017-06-01

    This paper presents the development stage of a communication module for a solid propellant mid-power rocket model. The communication module was named. Simple-1 and this work considers its design, construction and testing. A rocket model Estes Ventris Series Pro II® was modified to introduce, on the top of the payload, several sensors in a CanSat form factor. The Printed Circuit Board (PCB) was designed and fabricated from Commercial Off The Shelf (COTS) components and assembled in a cylindrical rack structure similar to this small format satellite concept. The sensors data was processed using one Arduino Mini and transmitted using a radio module to a Software Defined Radio (SDR) HackRF based platform on the ground station. The Simple-1 was tested using a drone in successive releases, reaching altitudes from 200 to 300 meters. Different kind of data, in terms of altitude, position, atmospheric pressure and vehicle temperature were successfully measured, making possible the progress to a next stage of launching and analysis.

  14. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong L.

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less

  15. Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

    NASA Astrophysics Data System (ADS)

    Navare, Jyoti; Gemikonakli, Orhan

    Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

  16. Introducing cyber.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  17. Geospatial Brokering - Challenges and Future Directions

    NASA Astrophysics Data System (ADS)

    White, C. E.

    2012-12-01

    An important feature of many brokers is to facilitate straightforward human access to scientific data while maintaining programmatic access to it for system solutions. Standards-based protocols are critical for this, and there are a number of protocols to choose from. In this discussion, we will present a web application solution that leverages certain protocols - e.g., OGC CSW, REST, and OpenSearch - to provide programmatic as well as human access to geospatial resources. We will also discuss managing resources to reduce duplication yet increase discoverability, federated search solutions, and architectures that combine human-friendly interfaces with powerful underlying data management. The changing requirements witnessed in brokering solutions over time, our recent experience participating in the EarthCube brokering hack-a-thon, and evolving interoperability standards provide insight to future technological and philosophical directions planned for geospatial broker solutions. There has been much change over the past decade, but with the unprecedented data collaboration of recent years, in many ways the challenges and opportunities are just beginning.

  18. Stand alone, low current measurements on possible sensing platforms via Arduino Uno microcontroller with modified commercially available sensors

    NASA Astrophysics Data System (ADS)

    Tanner, Meghan; Henson, Gabriel; Senevirathne, Indrajith

    Advent of cost-effective solid-state sensors has spurred an immense interest in microcontrollers, in particular Arduino microcontrollers. These include serious engineering and physical science applications due to their versatility and robustness. An Arduino microcontroller coupled with a commercially available sensor has been used to methodically measure, record, and explore low currents, low voltages, and corresponding dissipated power towards assessing secondary physical properties in a select set of engineered systems. System was assembled via breadboard, wire, and simple soldering with an Arduino Uno with ATmega328P microcontroller connected to a PC. The microcontroller was programmed with Arduino software while the bootloader was used to upload the code. High-side measurement INA169 current shunt monitor was used to measure corresponding low to ultra-low currents and voltages. A collection of measurements was obtained via the sensor and was compared with measurements from standardized devices to assess reliability and uncertainty. Some sensors were modified/hacked to improve the sensitivity of the measurements.

  19. Control of fixed-wing UAV at levelling phase using artificial intelligence

    NASA Astrophysics Data System (ADS)

    Sayfeddine, Daher

    2018-03-01

    The increase in the share of fly-by-wire and software controlled UAV is explained by the need to release the human-operator and the desire to reduce the degree of influence of the human factor errors that account for 26% of aircraft accidents. An important reason for the introduction of new control algorithms is also the high level of UAV failures due loss of communication channels and possible hacking. This accounts for 17% of the total number of accidents. The comparison with manned flights shows that the frequency of accidents of unmanned flights is 27,000 times higher. This means that the UAV has 1611 failures per million flight hours and only 0.06 failures at the same time for the manned flight. In view of that, this paper studies the flight autonomy of fixed-wing UAV at the levelling phase. Landing parameters of the UAV are described. They will be used to setup a control scheme for an autopilot based on fuzzy logic algorithm.

  20. Chance, determinism and the classical theory of probability.

    PubMed

    Vasudevan, Anubav

    2018-02-01

    This paper situates the metaphysical antinomy between chance and determinism in the historical context of some of the earliest developments in the mathematical theory of probability. Since Hacking's seminal work on the subject, it has been a widely held view that the classical theorists of probability were guilty of an unwitting equivocation between a subjective, or epistemic, interpretation of probability, on the one hand, and an objective, or statistical, interpretation, on the other. While there is some truth to this account, I argue that the tension at the heart of the classical theory of probability is not best understood in terms of the duality between subjective and objective interpretations of probability. Rather, the apparent paradox of chance and determinism, when viewed through the lens of the classical theory of probability, manifests itself in a much deeper ambivalence on the part of the classical probabilists as to the rational commensurability of causal and probabilistic reasoning. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A

    PubMed Central

    King, Cason R.; Zhang, Ali; Tessier, Tanner M.; Gameiro, Steven F.

    2018-01-01

    ABSTRACT As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected “hub” proteins to “hack” the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. PMID:29717008

  2. C5a alters blood-brain barrier integrity in experimental lupus

    PubMed Central

    Jacob, Alexander; Hack, Bradley; Chiang, Eddie; Garcia, Joe G. N.; Quigg, Richard J.; Alexander, Jessy J.

    2010-01-01

    The blood-brain barrier (BBB) is a crucial anatomic location in the brain. Its dysfunction complicates many neurodegenerative diseases, from acute conditions, such as sepsis, to chronic diseases, such as systemic lupus erythematosus (SLE). Several studies suggest an altered BBB in lupus, but the underlying mechanism remains unknown. In the current study, we observed a definite loss of BBB integrity in MRL/MpJ-Tnfrsf6lpr (MRL/lpr) lupus mice by IgG infiltration into brain parenchyma. In line with this result, we examined the role of complement activation, a key event in this setting, in maintenance of BBB integrity. Complement activation generates C5a, a molecule with multiple functions. Because the expression of the C5a receptor (C5aR) is significantly increased in brain endothelial cells treated with lupus serum, the study focused on the role of C5a signaling through its G-protein-coupled receptor C5aR in brain endothelial cells, in a lupus setting. Reactive oxygen species production increased significantly in endothelial cells, in both primary cells and the bEnd3 cell line treated with lupus serum from MRL/lpr mice, compared with those treated with control serum from MRL+/+ mice. In addition, increased permeability monitored by changes in transendothelial electrical resistance, cytoskeletal remodeling caused by actin fiber rearrangement, and increased iNOS mRNA expression were observed in bEnd3 cells. These disruptive effects were alleviated by pretreating cells with a C5a receptor antagonist (C5aRant) or a C5a antibody. Furthermore, the structural integrity of the vasculature in MRL/lpr brain was maintained by C5aR inhibition. These results demonstrate the regulation of BBB integrity by the complement system in a neuroinflammatory setting. For the first time, a novel role of C5a in the maintenance of BBB integrity is identified and the potential of C5a/C5aR blockade highlighted as a promising therapeutic strategy in SLE and other neurodegenerative diseases.—Jacob, A., Hack, B., Chiang, E., Garcia, J. G. N., Quigg, R. J., Alexander, J. J. C5a alters blood-brain barrier integrity in experimental lupus. PMID:20065106

  3. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    NASA Astrophysics Data System (ADS)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP and with the use of Anonymizers we have covered the identity of true source of data. Modifier tokens are generated along encryption of data which are distributed among virtual parties, then sent to TTP and finally used in the computation. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have also given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved.

  4. Revisiting Horton's laws with considerations of the directly drained VS source area

    NASA Astrophysics Data System (ADS)

    Yang, Soohyun; Paik, Kyungrock

    2015-04-01

    River networks have been regarded as excellent examples of self-similar patterns in nature. Fractal characteristics of river networks have been quantified through scaling relations between several morphologic variables (e.g., Hack, 1957; Flint, 1974). In particular, Horton's legendary study on scaling properties between numbers and lengths of streams in different orders (Horton, 1945) has significantly influenced research studies in this subject. Today, Horton's laws are referred to the log-linear relationships of three variables across stream orders, i.e., number, length, and area which is later added by Schumm (1956). In a closer look, there is a conceptual inconsistency between their definitions though. While length is defined as the length of stream of a specific order only, area by its definition includes drainage area of lower order streams. To deal with this inconsistency, there was an attempt to distinguish the average area drained directly by the stream of a particular order in the Hortonian formulation (Marani et al., 1991; Beer and Borgas, 1993). Nevertheless, there remains an interesting problem in the definition of directly drained area for 1st order and for the rest orders in these studies. While the whole area of 1st order stream is regarded as the directly drained area in these studies, for a channel to form it needs the minimum drainage area named source area. In this study, we evaluate how significant considering this zero order area separately is in understanding overall river network organization. To this end, we define new expression for the directly drained area and revisit Horton's laws with a generalized formulation. To test the proposed ideas, several river networks extracted from digital elevation models (DEMs) are analyzed. References Beer, T., & Borgas, M. (1993). Horton's laws and the fractal nature of streams. Water Resources Research, 29(5), 1475-1487. Flint, J. J. (1974). Stream gradient as a function of order, magnitude, and discharge. Water Resources Research, 10(5), 969-973. Hack, J. T. (1957). Studies of longitudinal river profiles in Virginia and Maryland. US, Geological Survey Professional Paper, 294. Horton, R. E. (1945). Erosional development of streams and their drainage basins; hydrophysical approach to quantitative morphology. Geological Society of America Bulletin, 56(3), 275-370. Marani, A., Rigon, R., & Rinaldo, A. (1991). A note on fractal channel networks. Water Resources Research, 27(12), 3041-3049. Schumm, S. A. (1956). Evolution of drainage systems and slopes in badlands at Perth Amboy, New Jersey. Geological Society of America Bulletin, 67(5), 597-646.

  5. An unusual case of smothering secondary to ingesting raw pet cat.

    PubMed

    Redpath, Margaret; Sauvageau, Anny

    2011-06-01

    Smothering is defined as an obstruction of the air passages above the level of the epiglottis, including the nose, mouth, and pharynx. This is in contrast to choking, which is considered to be due to an obstruction of the air passages below the epiglottis. The manner of death in smothering can be homicidal, suicidal, or an accident. Accidental smothering is considered to be a rare event among middle-aged adults, yet many cases still occur. Presented here is the case of a 39-year-old woman with a history of bipolar disease who was found dead on her living room floor by her neighbors. Her hands were covered in scratches and her pet cat was found disemboweled in the kitchen with its tail hacked off. On autopsy her stomach was found to be full of cat intestines, adipose tissue, and strips of fur-covered skin. An intact left kidney and adipose tissue were found lodged in her throat just above her epiglottis. After a complete investigation, the cause of death was determined to be asphyxia by smothering due to animal tissue.

  6. Galaxy evolution and large-scale structure in the far-infrared. II - The IRAS faint source survey

    NASA Astrophysics Data System (ADS)

    Lonsdale, Carol J.; Hacking, Perry B.; Conrow, T. P.; Rowan-Robinson, M.

    1990-07-01

    The new IRAS Faint Source Survey data base is used to confirm the conclusion of Hacking et al. (1987) that the 60 micron source counts fainter than about 0.5 Jy lie in excess of predictions based on nonevolving model populations. The existence of an anisotropy between the northern and southern Galactic caps discovered by Rowan-Robinson et al. (1986) and Needham and Rowan-Robinson (1988) is confirmed, and it is found to extend below their sensitivity limit to about 0.3 Jy in 60 micron flux density. The count anisotropy at f(60) greater than 0.3 can be interpreted reasonably as due to the Local Supercluster; however, no one structure accounting for the fainter anisotropy can be easily identified in either optical or far-IR two-dimensional sky distributions. The far-IR galaxy sky distributions are considerably smoother than distributions from the published optical galaxy catalogs. It is likely that structure of the large size discussed here have been discriminated against in earlier studies due to insufficient volume sampling.

  7. An eight-year study of internet-based remote medical counselling.

    PubMed

    Labiris, G; Coertzen, I; Katsikas, A; Karydis, A; Petounis, A

    2002-01-01

    We carried out a prospective study of an Internet-based remote counselling service. A total of 15456 Internet users visited the Website over eight years. From these, 1500 users were randomly selected for analysis. Medical counselling had been granted to 901 of the people requesting it (60%). One hundred and sixty-four physicians formed project groups to process the requests and responded using email. The distribution of patients using the service was similar to the availability of the Internet: 78% were from the European Union, North America and Australia. Sixty-seven per cent of the patients lived in urban areas and the remainder were residents of remote rural areas with limited local medical coverage. Sixty-five per cent of the requests were about problems of internal medicine and 30% of the requests concerned surgical issues. The remaining 5% of the patients sought information about recent developments, such molecular medicine or aviation medicine. During the project, our portal became inaccessible five times, and counselling was not possible on 44 days. There was no hacking of the Website. Internet-based medical counselling is a helpful addition to conventional practice.

  8. Harpy eagle (Harpia harpyja) nesting in manipulated forests

    USGS Publications Warehouse

    Alvarez, E.; Ellis, D.H.

    1994-01-01

    Continental records point to shooting, removal of young and destruction of nests as the primary conservation problems for harpy eagles (Harpia harpyja); bird-observer visits are a new source of concern. Nesting events are roughly 3 yr apart. Nests are used during and after intensive manipulation of the surrounding habitat, and minimum distance between active sites was 3-5 km. In nine nesting sites along a 100-km stretch of the Imalaca Mountains in Venezuela, we fitted five fledglings with satellite-tracked tags from NASA. One of these birds was hacked with the help of the loggers who destroyed its nest. All these nests were active while logging ensued. Out of three renesting attempts, one failed when the nest collapsed. We salvaged two additional fledglings found in captivity. We are monitoring five nests in the buffer area of the Darien National Park in Panama, all within 3 km of human settlements where trees are regularly felled for firewood, lumber, and to clear more cropland. Eagles have been killed at two sites, a third site remains inactive since 1991, and the other two nests currently have fledglings.

  9. Functional Topology of Evolving Urban Drainage Networks

    NASA Astrophysics Data System (ADS)

    Yang, Soohyun; Paik, Kyungrock; McGrath, Gavan S.; Urich, Christian; Krueger, Elisabeth; Kumar, Praveen; Rao, P. Suresh C.

    2017-11-01

    We investigated the scaling and topology of engineered urban drainage networks (UDNs) in two cities, and further examined UDN evolution over decades. UDN scaling was analyzed using two power law scaling characteristics widely employed for river networks: (1) Hack's law of length (L)-area (A) [L∝Ah] and (2) exceedance probability distribution of upstream contributing area (δ) [P>(A≥δ>)˜aδ-ɛ]. For the smallest UDNs (<2 km2), length-area scales linearly (h ˜ 1), but power law scaling (h ˜ 0.6) emerges as the UDNs grow. While P>(A≥δ>) plots for river networks are abruptly truncated, those for UDNs display exponential tempering [P>(A≥δ>)=aδ-ɛexp⁡>(-cδ>)]. The tempering parameter c decreases as the UDNs grow, implying that the distribution evolves in time to resemble those for river networks. However, the power law exponent ɛ for large UDNs tends to be greater than the range reported for river networks. Differences in generative processes and engineering design constraints contribute to observed differences in the evolution of UDNs and river networks, including subnet heterogeneity and nonrandom branching.

  10. Captive propagation of bald eagles at Patuxent Wildlife Research Center and introductions into the wild, 1976-80

    USGS Publications Warehouse

    Wiemeyer, Stanley N.

    1981-01-01

    One to 5 pairs of the Bald Eagle (Haliaeetus leucocephalus) were in the captive propagation project at Patuxent Wildlife Research Center during 1976-80. Four pairs produced viable eggs or young by natural mating in one or more years. Pairs laid second clutches 9 of 11 times when their first clutches were collected within 8 days of clutch completion. Sixty-nine percent of fertile artificially incubated eggs hatched; 93% of fertile parent-incubated eggs hatched. Eleven eaglets from artificially incubated eggs were hand reared. Age of birds at the time they were acquired from the wild was not a factor in their reproductive success. Ten hand-reared and 2 parent-reared young were fostered to adult Bald Eagles at active wild nests; 11 were accepted and survived. Eleven parent-reared young were provided to hacking projects. Egg transplants to wild nests were conducted, but discontinued because of poor success. Double clutching of captive pairs has not resulted in substantially increased numbers of eaglets. Additional research is needed in artificial incubation, artificial insemination, and nutrition and care of hand-reared eaglets.

  11. Solute-specific scaling of inorganic nitrogen and phosphorus uptake in streams

    NASA Astrophysics Data System (ADS)

    Hall, R. O., Jr.; Baker, M. A.; Rosi-Marshall, E. J.; Tank, J. L.; Newbold, J. D.

    2013-11-01

    Stream ecosystem processes such as nutrient cycling may vary with stream position in the network. Using a scaling approach, we examined the relationship between stream size and nutrient uptake length, which represents the mean distance that a dissolved solute travels prior to removal from the water column. Ammonium (NH4+) uptake length increased proportionally with stream size measured as specific discharge (discharge/stream width) with a scaling exponent = 1.01. In contrast, uptake lengths for nitrate (NO3-) and soluble reactive phosphorus (SRP) increased more rapidly than increases in specific discharge (scaling exponents = 1.19 for NO3- and 1.35 for SRP). Additionally, the ratio of inorganic nitrogen (N) uptake length to SRP uptake length declined with stream size; there was relatively lower demand for SRP compared to N as stream size increased. Finally, we related the scaling of uptake length with specific discharge to that of stream length using Hack's law and downstream hydraulic geometry. Ammonium uptake length increased less than proportionally with distance from the headwaters, suggesting a strong role for larger streams and rivers in regulating nutrient transport.

  12. Enhanced rearrangement technique for secure data transmission: case study credit card process

    NASA Astrophysics Data System (ADS)

    Vyavahare, Tushar; Tekade, Darshana; Nayak, Saurabh; kumar, N. Suresh; Blessy Trencia Lincy, S. S.

    2017-11-01

    Encryption of data is very important in order to keep the data secure and make secure transactions and transmission of data. Such as online shopping. whenever we give our card details there is possibility of data being hacked or intruded. So to secure that we need to encrypt the data and decryption strategy should be known only to that particular bank. Therefore to achieve this objective RSA algorithm can be used. Where only intended sender and receiver can know about the encryption and decryption of data. To make the RSA technique more secure in this paper we propose the technique we call it Modified RSA. for which a transposition module is designed which uses Row Transposition method to encrypt the data. Before giving the card details to RSA the input will be given to this transposition module which will scrambles the data and rearranges it. Output of transposition will be then provided to the modified RSA which produces the cipher text to send over the network. Use of RSA and the transposition module will provide the dual security to whole system.

  13. Galaxy evolution and large-scale structure in the far-infrared. II. The IRAS faint source survey

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lonsdale, C.J.; Hacking, P.B.; Conrow, T.P.

    1990-07-01

    The new IRAS Faint Source Survey data base is used to confirm the conclusion of Hacking et al. (1987) that the 60 micron source counts fainter than about 0.5 Jy lie in excess of predictions based on nonevolving model populations. The existence of an anisotropy between the northern and southern Galactic caps discovered by Rowan-Robinson et al. (1986) and Needham and Rowan-Robinson (1988) is confirmed, and it is found to extend below their sensitivity limit to about 0.3 Jy in 60 micron flux density. The count anisotropy at f(60) greater than 0.3 can be interpreted reasonably as due to themore » Local Supercluster; however, no one structure accounting for the fainter anisotropy can be easily identified in either optical or far-IR two-dimensional sky distributions. The far-IR galaxy sky distributions are considerably smoother than distributions from the published optical galaxy catalogs. It is likely that structure of the large size discussed here have been discriminated against in earlier studies due to insufficient volume sampling. 105 refs.« less

  14. Galaxy evolution and large-scale structure in the far-infrared. II - The IRAS faint source survey

    NASA Technical Reports Server (NTRS)

    Lonsdale, Carol J.; Hacking, Perry B.; Conrow, T. P.; Rowan-Robinson, M.

    1990-01-01

    The new IRAS Faint Source Survey data base is used to confirm the conclusion of Hacking et al. (1987) that the 60 micron source counts fainter than about 0.5 Jy lie in excess of predictions based on nonevolving model populations. The existence of an anisotropy between the northern and southern Galactic caps discovered by Rowan-Robinson et al. (1986) and Needham and Rowan-Robinson (1988) is confirmed, and it is found to extend below their sensitivity limit to about 0.3 Jy in 60 micron flux density. The count anisotropy at f(60) greater than 0.3 can be interpreted reasonably as due to the Local Supercluster; however, no one structure accounting for the fainter anisotropy can be easily identified in either optical or far-IR two-dimensional sky distributions. The far-IR galaxy sky distributions are considerably smoother than distributions from the published optical galaxy catalogs. It is likely that structure of the large size discussed here have been discriminated against in earlier studies due to insufficient volume sampling.

  15. Hacking the Bell test using classical light in energy-time entanglement-based quantum key distribution.

    PubMed

    Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke

    2015-12-01

    Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.

  16. Patterns of trauma induced by motorboat and ferry propellers as illustrated by three known cases from Rhode Island.

    PubMed

    Semeraro, Dominique; Passalacqua, Nicholas V; Symes, Steven; Gilson, Thomas

    2012-11-01

    Understanding patterns of trauma is important to determining cause and manner of death. A thorough evaluation of taphonomy, trauma, and bone fracture mechanisms is necessary to reconstruct the circumstances of the death. This study examines the skeletal trauma caused by boat propeller strikes in terms of wound characteristics and location based on three cases from Rhode Island. These case studies review the traumatic characteristics caused by propeller injuries and highlight the anatomic regions most likely to sustain skeletal trauma. With this information, investigators may be able to identify propeller trauma even in severely decomposed remains. The discussion of boat propeller trauma also raises issues regarding how forensic anthropologists and forensic pathologists classify trauma (specifically blunt force vs. sharp) and highlights semantic issues arising in trauma classification. The study also discusses why these propeller cases should be classified as blunt trauma rather than sharp or chop/hack trauma. Ultimately, the authors urge consistency and communication between pathologist and forensic anthropologists performing trauma analyses. © 2012 American Academy of Forensic Sciences.

  17. The strategic measures for the industrial security of small and medium business.

    PubMed

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  18. Patterns of online abortion among teenagers

    NASA Astrophysics Data System (ADS)

    Wahyudi, A.; Jacky, M.; Mudzakkir, M.; Deprita, R.

    2018-01-01

    An on-going debate of whether or not to legalize abortion has not stopped the number of abortion cases decreases. New practices of abortion such as online abortion has been a growing trend among teenagers. This study aims to determine how teenagers use social media such as Facebook, YouTube and Wikipedia for the practice of abortion. This study adopted online research methods (ORMs), a qualitative approach 2.0 by hacking analytical perspective developed. This study establishes online teen abortion as a research subject. This study finds patterns of online abortions among teenagers covering characteristics of teenagers as perpetrators, styles of communication, and their implication toward policy, particularly Electronic Transaction Information (ETI) regulation. Implications for online abortion behavior among teenagers through social media. The potential abortion client especially girls find practical, fast, effective, and efficient solutions that keep their secret. One of prevention patterns that has been done by some people who care about humanity and anti-abortion in the online world is posting a anti-abortion text, video or picture, anti-sex-free (anti -free intercourse before marriage) in an interesting, educative, and friendly ways.

  19. The Weak Spots in Contemporary Science (and How to Fix Them).

    PubMed

    Wicherts, Jelte M

    2017-11-27

    In this review, the author discusses several of the weak spots in contemporary science, including scientific misconduct, the problems of post hoc hypothesizing (HARKing), outcome switching, theoretical bloopers in formulating research questions and hypotheses, selective reading of the literature, selective citing of previous results, improper blinding and other design failures, p-hacking or researchers' tendency to analyze data in many different ways to find positive (typically significant) results, errors and biases in the reporting of results, and publication bias. The author presents some empirical results highlighting problems that lower the trustworthiness of reported results in scientific literatures, including that of animal welfare studies. Some of the underlying causes of these biases are discussed based on the notion that researchers are only human and hence are not immune to confirmation bias, hindsight bias, and minor ethical transgressions. The author discusses solutions in the form of enhanced transparency, sharing of data and materials, (post-publication) peer review, pre-registration, registered reports, improved training, reporting guidelines, replication, dealing with publication bias, alternative inferential techniques, power, and other statistical tools.

  20. An online forum as a qualitative research method: practical issues.

    PubMed

    Im, Eun-Ok; Chee, Wonshik

    2006-01-01

    Despite the positive aspects of online forums as a qualitative research method, very little is known on the practical issues involved in using online forums for data collection, especially for a qualitative research project. The aim of this study was to describe the practical issues encountered in implementing an online forum as a qualitative component of a larger study on cancer pain experience. Throughout the study process, the research staff recorded issues ranging from minor technical problems to serious ethical dilemmas as they arose and wrote memos about them. The memos and written records of the discussions were reviewed and analyzed using content analysis. Two practical issues related to credibility were identified: (a) a high response and retention rate and (b) automatic transcripts. An issue related to dependability was the participants' forgetfulness. The issues related to confirmability were difficulties in theoretical saturation and unstandardized computer and Internet jargon. A security issue related to hacking attempts was noted as well. The analysis of these issues suggests several implications for future researchers who want to use online forums as a qualitative data collection method.

  1. On the security of semi-device-independent QKD protocols

    NASA Astrophysics Data System (ADS)

    Chaturvedi, Anubhav; Ray, Maharshi; Veynar, Ryszard; Pawłowski, Marcin

    2018-06-01

    While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.

  2. Stranded Whole Transcriptome RNA-Seq for All RNA Types

    PubMed Central

    Yan, Pearlly X.; Fang, Fang; Buechlein, Aaron; Ford, James B.; Tang, Haixu; Huang, Tim H.; Burow, Matthew E.; Liu, Yunlong; Rusch, Douglas B.

    2015-01-01

    Stranded whole transcriptome RNA-Seq described in this unit captures quantitative expression data for all types of RNA including, but not limited to miRNA (microRNA), piRNA (Piwi-interacting RNA), snoRNA (small nucleolar RNA), lincRNA (large non-coding intergenic RNA), SRP RNA (signal recognition particle RNA), tRNA (transfer RNA), mtRNA (mitochondrial RNA) and mRNA (messenger RNA). The size and nature of these types of RNA are irrelevant to the approach described here. Barcoded libraries for multiplexing on the Illumina platform are generated with this approach but it can be applied to other platforms with a few modifications. PMID:25599667

  3. Herbaceous Forage and Selection Patterns by Ungulates across Varying Herbivore Assemblages in a South African Savanna

    PubMed Central

    Treydte, Anna Christina; Baumgartner, Sabine; Heitkönig, Ignas M. A.; Grant, Catharina C.; Getz, Wayne M.

    2013-01-01

    Herbivores generally have strong structural and compositional effects on vegetation, which in turn determines the plant forage species available. We investigated how selected large mammalian herbivore assemblages use and alter herbaceous vegetation structure and composition in a southern African savanna in and adjacent to the Kruger National Park, South Africa. We compared mixed and mono-specific herbivore assemblages of varying density and investigated similarities in vegetation patterns under wildlife and livestock herbivory. Grass species composition differed significantly, standing biomass and grass height were almost twice as high at sites of low density compared to high density mixed wildlife species. Selection of various grass species by herbivores was positively correlated with greenness, nutrient content and palatability. Nutrient-rich Urochloa mosambicensis Hack. and Panicum maximum Jacq. grasses were preferred forage species, which significantly differed in abundance across sites of varying grazing pressure. Green grasses growing beneath trees were grazed more frequently than dry grasses growing in the open. Our results indicate that grazing herbivores appear to base their grass species preferences on nutrient content cues and that a characteristic grass species abundance and herb layer structure can be matched with mammalian herbivory types. PMID:24358228

  4. Scaling relationships and concavity of small valley networks on Mars

    NASA Astrophysics Data System (ADS)

    Penido, Julita C.; Fassett, Caleb I.; Som, Sanjoy M.

    2013-01-01

    Valley networks are widely interpreted as the preserved erosional record of water flowing across the martian surface. The manner in which valley morphometric properties scale with drainage area has been widely examined on Earth. Earlier studies assessing these properties on Mars have suggested that martian valleys are morphometrically distinct from those on Earth. However, these earlier measurements were generally made on large valley systems because of the limited topographic data available. In this study, we determine the scaling properties of valley networks at smaller scales than have been previously assessed, using digital elevation models from the High Resolution Stereo Camera (HRSC). We find a Hack's law exponent of 0.74, larger than on Earth, and our measurements also reveal that individual small valleys have concave up, concave down, and quasi-linear longitudinal profiles, consistent with earlier studies of dissected terrain on Mars. However, for many valleys, widths are observed to increase downstream similarly to how they scale in terrestrial channels. The similarities and differences between valley networks on Mars and Earth are consistent with the idea that valleys on Mars are comparatively immature, and precipitation was a likely mechanism for delivering water to these networks.

  5. 3D morphometry of valley networks on Mars from HRSC/MEX DEMs: Implications for climatic evolution through time

    NASA Astrophysics Data System (ADS)

    Ansan, V.; Mangold, N.

    2013-09-01

    valley networks have been identified mainly in the Noachian heavily cratered uplands. Eight dense branching valley networks were studied in Noachian terrains of Huygens, Newcomb and Kepler craters, south Tyrrhena Terra, and Thaumasia, in Hesperian terrains of Echus Plateau and west Eberswalde craters, and in Amazonian terrains of Alba Patera, using images and digital elevation models from the Mars Express High Resolution Stereo Camera to determine 2D and 3D morphometric parameters. Extracted geomorphic parameters show similar geometry to terrestrial valleys: drainage densities, organization from bifurcation ratios and lengths ratios, Hack exponent consistent with terrestrial values of ~0.6, and progressive deepening of valleys with increasing Strahler order. In addition, statistics on valley depths indicate a deeper incision of Noachian valleys compared to younger post-Noachian valleys (<25 m for Amazonian ones compared to >100 m for Noachian ones), showing a strong difference in fluvial erosion. These characteristics show that dense Martian valley networks formed by overland flows in relation to a global atmospheric water cycle in Noachian epoch and confirm that the later stages of activity may be related to shorter duration of activity, distinct climatic conditions, and/or regional processes, or conditions.

  6. How bacteria hack the matrix and dodge the bullets of immunity.

    PubMed

    Paulsson, Magnus; Riesbeck, Kristian

    2018-06-30

    Haemophilus influenzae , Moraxella catarrhalis and Pseudomonas aeruginosa are common Gram-negative pathogens associated with an array of pulmonary diseases. All three species have multiple adhesins in their outer membrane, i.e. surface structures that confer the ability to bind to surrounding cells, proteins or tissues. This mini-review focuses on proteins with high affinity for the components of the extracellular matrix such as collagen, laminin, fibronectin and vitronectin. Adhesins are not structurally related and may be lipoproteins, transmembrane porins or large protruding trimeric auto-transporters. They enable bacteria to avoid being cleared together with mucus by attaching to patches of exposed extracellular matrix, or indirectly adhering to epithelial cells using matrix proteins as bridging molecules. As more adhesins are being unravelled, it is apparent that bacterial adhesion is a highly conserved mechanism, and that most adhesins target the same regions on the proteins of the extracellular matrix. The surface exposed adhesins are prime targets for new vaccines and the interactions between proteins are often possible to inhibit with interfering molecules, e.g heparin. In conclusion, this highly interesting research field of microbiology has unravelled host-pathogen interactions with high therapeutic potential. Copyright ©ERS 2018.

  7. Hydrology-based understanding of Ontario Lacus in Titan's south pole

    NASA Astrophysics Data System (ADS)

    Dhingra, Rajani D.; Barnes, Jason W.; Yanites, Brian J.; Kirk, Randolph L.

    2015-11-01

    Ontario Lacus is the largest presently filled lake at the south pole of Titan. Many other large basins in south pole exist at lower elevations than Ontario Lacus but are currently empty. To find out what sets Ontario apart from those empty basins, we have carried a detailed hydrological assessment of Ontario Lacus. Topography of the region, as derived from Cassini RADAR altimetry was used to determine the catchment area of Ontario Lacus. We could map the areal extent of catchments as far as southern mid-latitudes. Clouds in southern mid and high latitudes have been observed by Cassini VIMS which indicate possible precipitation in those regions. Precipitation in southern mid-latitudes coupled with the large catchment areas of Ontario Lacus could be the reason behind it being filled. Our mass conservation calculations indicate that if runoff was the only contributor to the lake volume, then the lake might be filled within one Titan year (29.5 Earth years) in entirety. We also observe a non-linear relationship between the longest identifiable stream and the catchment area (Hack's Law) which is consistent with terrestrial hydrological systems and may help in further interpretation of the hydrology of Ontario Lacus.

  8. Debates—Hypothesis testing in hydrology: Theory and practice

    NASA Astrophysics Data System (ADS)

    Pfister, Laurent; Kirchner, James W.

    2017-03-01

    The basic structure of the scientific method—at least in its idealized form—is widely championed as a recipe for scientific progress, but the day-to-day practice may be different. Here, we explore the spectrum of current practice in hypothesis formulation and testing in hydrology, based on a random sample of recent research papers. This analysis suggests that in hydrology, as in other fields, hypothesis formulation and testing rarely correspond to the idealized model of the scientific method. Practices such as "p-hacking" or "HARKing" (Hypothesizing After the Results are Known) are major obstacles to more rigorous hypothesis testing in hydrology, along with the well-known problem of confirmation bias—the tendency to value and trust confirmations more than refutations—among both researchers and reviewers. Nonetheless, as several examples illustrate, hypothesis tests have played an essential role in spurring major advances in hydrological theory. Hypothesis testing is not the only recipe for scientific progress, however. Exploratory research, driven by innovations in measurement and observation, has also underlain many key advances. Further improvements in observation and measurement will be vital to both exploratory research and hypothesis testing, and thus to advancing the science of hydrology.

  9. Landscape co-evolution and river discharge.

    NASA Astrophysics Data System (ADS)

    van der Velde, Ype; Temme, Arnaud

    2015-04-01

    Fresh water is crucial for society and ecosystems. However, our ability to secure fresh water resources under climatic and anthropogenic change is impaired by the complexity of interactions between human society, ecosystems, soils, and topography. These interactions cause landscape properties to co-evolve, continuously changing the flow paths of water through the landscape. These co-evolution driven flow path changes and their effect on river runoff are, to-date, poorly understood. In this presentation we introduce a spatially distributed landscape evolution model that incorporates growing vegetation and its effect on evapotranspiration, interception, infiltration, soil permeability, groundwater-surface water exchange and erosion. This landscape scale (10km2) model is calibrated to evolve towards well known empirical organising principles such as the Budyko curve and Hacks law under different climate conditions. To understand how positive and negative feedbacks within the model structure form complex landscape patterns of forests and peat bogs that resemble observed landscapes under humid and boreal climates, we analysed the effects of individual processes on the spatial distribution of vegetation and river peak and mean flows. Our results show that especially river peak flows and droughts decrease with increasing evolution of the landscape, which is a result that has direct implications for flood management.

  10. Uranium-bearing breccia pipes of northwestern Arizona - an overview

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chenoweth, W.L.

    During the 1950s and 1960s, the uranium deposits in breccia pipes of the Grand Canyon region were regarded as geologic curiosities. Today this area is the site of numerous exploration projects for ore-bearing pipes. The classic example of the older mines is the Orphan Lode, a patented claim within Grand Canyon National Park. Between 1956 and 1969, this deposit produced 4.26 million lb U/sub 3/O/sub 8/. Exploration since the mid-1970s has developed numerous new deposits in the Grand Canyon region. The Hack 1, 2, and 3, Pigeon, Kanab North, Canyon, and Pinenut deposits are, or will be, mined. The pipesmore » are circular and originated by dissolution of the Mississippian Redwall Limestone and collapse of the overlying strata. Uraninite ore occurs in both the pipe fill and in association with the peripheral shear zone. The principal host rocks are the Coconino Sandstone, Hermit Shale, and Esplanade Sandstone. Although small (3 to 5 million lb U/sub 3/O/sub 8/), the high grade (60 to 70% U/sub 3/O/sub 8/) of the deposits makes the pipes attractive exploration targets.« less

  11. U-Pb dating of uranium deposits in collapse breccia pipes of the Grand Canyon region

    USGS Publications Warehouse

    Ludwig, K. R.; Simmons, K.R.

    1992-01-01

    Two major periods of uranium mineralization are indicated by U-Pb isotope dating of uranium ores from collapse breccia pipes in the Grand Canyon region, northern Arizona. The Hack 2 and 3, Kanab North, and EZ 1 and 2 orebodies apparently formed in the interval of 200 ?? 20 Ma, similar to ages inferred for strata-bound, Late Triassic-hosted uranium deposits in southern Utah and northern Arizona. Samples from the Grand Canyon and Pine Nut pipes, however, indicate a distinctly older age of about 260 Ma. The clustering in ages for a variety of uranium deposits at about the age of the lower part of the Chinle Formation (Late Triassic) suggests that uranium in these deposits may have been derived by leaching from volcanic ash in the Chinle and mobilized by ground-water movement. Pb isotope ratios of galenas in mineralized pipes are more radiogenic than those of sulfides from either uranium-poor pipes or occurrences away from pipes. Fluids which passed through the pipes had interacted with the Proterozoic basement, possibly through the vertical fractures which influenced the location and evolution of the pipes themselves. -from Authors

  12. High-dimensional quantum cloning and applications to quantum hacking

    PubMed Central

    Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W.; Karimi, Ebrahim

    2017-01-01

    Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography. PMID:28168219

  13. High-dimensional quantum cloning and applications to quantum hacking.

    PubMed

    Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W; Karimi, Ebrahim

    2017-02-01

    Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography.

  14. Abhurite, a new tin hydroxychloride mineral, and a comparative study with a synthetic basic tin chloride.

    USGS Publications Warehouse

    Matzko, J.J.; Evans, H.T.; Mrose, M.E.; Aruscavage, P.

    1985-01-01

    Abhurite is a new mineral species found in blister-like protuberances on the surface of tin ingots submerged at a depth of 35 m in the Red Sea. It forms 1.5 mm diameter hexagonal plates bounded by the negative rhombohedron (0115); is colourless, transparent with opalescent lustre, white streak, hackly fracture, with no cleavage, and H.approx 2; D(calc) 4.34, D(meas) 4.29 g/cm3; epsilon approx 2.11, omega 2.06. Chemical analysis gave 73.4 wt.% Sn, 15.7 Cl, 11.0 0 and 0.4 H. leading to the formula Sn3O(OH)2Cl2. DTA shows release of H2O at 235oC and SnCl2 at 525oC. Indexed XRD powder data are tabulated; prominent lines 2.5313(100), 2.8915(70), 4.139(50), 3.404(50), 2.8175(50) A; a 10.0175(3), c 44.014(2) A; space group R3m, R3m or R32; Z = 21. Comparison is made with a hexagonal synthetic dimorph. The name refers to the geographical origin, an arm of the Red Sea known as Sharm Abhur.-L.T.T.

  15. Mind Invasion: Situated Affectivity and the Corporate Life Hack

    PubMed Central

    Slaby, Jan

    2016-01-01

    In view of the philosophical problems that vex the debate on situated affectivity, it can seem wise to focus on simple cases. Accordingly, theorists often single out scenarios in which an individual employs a device in order to enhance their emotional experience, or to achieve new kinds of experience altogether, such as playing an instrument, going to the movies, or sporting a fancy handbag. I argue that this narrow focus on cases that fit a “user/resource model” tends to channel attention away from more complex and also more problematic instances of situated affectivity. Among these are scenarios in which a social domain draws individuals into certain modes of affective interaction, often by way of attunement and habituation to affective styles and interaction patterns that are normative in the domain in question. This can lead to a phenomenon that is not so much “mind extension” than “mind invasion”: affectivity is dynamically framed and modulated from without, often contrary to the prior orientations of the individuals in question. As an example, I discuss affective patterns prevalent in today's corporate workplace. I claim that workplace affect sometimes contributes to what is effectively a “hack” of employees' subjectivity. PMID:26941705

  16. The Strategic Measures for the Industrial Security of Small and Medium Business

    PubMed Central

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414

  17. After geneticization.

    PubMed

    Arribas-Ayllon, Michael

    2016-06-01

    The concept of geneticization belongs to a style of thinking within the social sciences that refers to wide-ranging processes and consequences of genetic knowledge. Lippman's original use of the term was political, anticipating the onerous consequences of genetic reductionism and determinism, while more recent engagements emphasise the productivity and heterogeneity of genetic concepts, practices and technologies. This paper reconstructs the geneticization concept, tracing it back to early political critiques of medicine. The argument is made that geneticization belongs to a style of constructionist thinking that obscures and exaggerates the essentializing effects of genetic knowledge. Following Hacking's advice, we need a more literal sense of construction in terms of 'assembly' to give a clearer account of the relationship between processes and products. Using the 'assemblage' concept to explore the social ontology of genetics, the paper reviews three areas of the empirical literature on geneticization - disease classification, clinical practice and biosociality - to show that a new style of thinking has appeared within the social sciences. In the final assessment, the conditions that gave rise to geneticization are now obsolete. While it may serve as a useful ritual of debate, conceptually geneticization offers a limited account of the heterogeneity of socio-technical change. Copyright © 2016 The Author. Published by Elsevier Ltd.. All rights reserved.

  18. An Online Forum As a Qualitative Research Method: Practical Issues

    PubMed Central

    Im, Eun-Ok; Chee, Wonshik

    2008-01-01

    Background Despite positive aspects of online forums as a qualitative research method, very little is known about practical issues involved in using online forums for data collection, especially for a qualitative research project. Objectives The purpose of this paper is to describe the practical issues that the researchers encountered in implementing an online forum as a qualitative component of a larger study on cancer pain experience. Method Throughout the study process, the research staff recorded issues ranged from minor technical problems to serious ethical dilemmas as they arose and wrote memos about them. The memos and written records of discussions were reviewed and analyzed using the content analysis suggested by Weber. Results Two practical issues related to credibility were identified: a high response and retention rate and automatic transcripts. An issue related to dependability was the participants’ easy forgetfulness. The issues related to confirmability were difficulties in theoretical saturation and unstandardized computer and Internet jargon. A security issue related to hacking attempts was noted as well. Discussion The analysis of these issues suggests several implications for future researchers who want to use online forums as a qualitative data collection method. PMID:16849979

  19. Attack Detection in Sensor Network Target Localization Systems With Quantized Data

    NASA Astrophysics Data System (ADS)

    Zhang, Jiangfan; Wang, Xiaodong; Blum, Rick S.; Kaplan, Lance M.

    2018-04-01

    We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.

  20. RAID: a comprehensive resource for human RNA-associated (RNA-RNA/RNA-protein) interaction.

    PubMed

    Zhang, Xiaomeng; Wu, Deng; Chen, Liqun; Li, Xiang; Yang, Jinxurong; Fan, Dandan; Dong, Tingting; Liu, Mingyue; Tan, Puwen; Xu, Jintian; Yi, Ying; Wang, Yuting; Zou, Hua; Hu, Yongfei; Fan, Kaili; Kang, Juanjuan; Huang, Yan; Miao, Zhengqiang; Bi, Miaoman; Jin, Nana; Li, Kongning; Li, Xia; Xu, Jianzhen; Wang, Dong

    2014-07-01

    Transcriptomic analyses have revealed an unexpected complexity in the eukaryote transcriptome, which includes not only protein-coding transcripts but also an expanding catalog of noncoding RNAs (ncRNAs). Diverse coding and noncoding RNAs (ncRNAs) perform functions through interaction with each other in various cellular processes. In this project, we have developed RAID (http://www.rna-society.org/raid), an RNA-associated (RNA-RNA/RNA-protein) interaction database. RAID intends to provide the scientific community with all-in-one resources for efficient browsing and extraction of the RNA-associated interactions in human. This version of RAID contains more than 6100 RNA-associated interactions obtained by manually reviewing more than 2100 published papers, including 4493 RNA-RNA interactions and 1619 RNA-protein interactions. Each entry contains detailed information on an RNA-associated interaction, including RAID ID, RNA/protein symbol, RNA/protein categories, validated method, expressing tissue, literature references (Pubmed IDs), and detailed functional description. Users can query, browse, analyze, and manipulate RNA-associated (RNA-RNA/RNA-protein) interaction. RAID provides a comprehensive resource of human RNA-associated (RNA-RNA/RNA-protein) interaction network. Furthermore, this resource will help in uncovering the generic organizing principles of cellular function network. © 2014 Zhang et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.

  1. Two classes of silencing RNAs move between C. elegans tissues

    PubMed Central

    Jose, Antony M; Garcia, Giancarlo A; Hunter, Craig P

    2011-01-01

    Summary Organism-wide RNA interference (RNAi) is due to the transport of mobile silencing RNA throughout the organism but the identities of these mobile RNA species in animals are unknown. Here we present genetic evidence that both the initial double-stranded RNA (dsRNA), which triggers RNAi, and at least one dsRNA intermediate produced during RNAi can act as or generate mobile silencing RNA in Caenorhabditis elegans. This dsRNA intermediate requires the long dsRNA-binding protein RDE-4, the endonuclease DCR-1, which cleaves long dsRNA into double-stranded short-interfering RNA (ds-siRNA), and the putative nucleotidyltransferase MUT-2 (RDE-3). However, single-stranded siRNA and downstream secondary siRNA produced upon amplification by the RNA-dependent RNA Polymerase RRF-1 do not generate mobile silencing RNA. Restricting inter-tissue transport to long dsRNA and directly processed siRNA intermediates rather than amplified siRNA may serve to modulate the extent of systemic silencing in proportion to available dsRNA. PMID:21984186

  2. Two distinct extracellular RNA signatures released by a single cell type identified by microarray and next-generation sequencing

    PubMed Central

    Lässer, Cecilia; Shelke, Ganesh Vilas; Yeri, Ashish; Kim, Dae-Kyum; Crescitelli, Rossella; Raimondo, Stefania; Sjöstrand, Margareta; Gho, Yong Song; Van Keuren Jensen, Kendall; Lötvall, Jan

    2017-01-01

    ABSTRACT Cells secrete extracellular RNA (exRNA) to their surrounding environment and exRNA has been found in many body fluids such as blood, breast milk and cerebrospinal fluid. However, there are conflicting results regarding the nature of exRNA. Here, we have separated 2 distinct exRNA profiles released by mast cells, here termed high-density (HD) and low-density (LD) exRNA. The exRNA in both fractions was characterized by microarray and next-generation sequencing. Both exRNA fractions contained mRNA and miRNA, and the mRNAs in the LD exRNA correlated closely with the cellular mRNA, whereas the HD mRNA did not. Furthermore, the HD exRNA was enriched in lincRNA, antisense RNA, vault RNA, snoRNA, and snRNA with little or no evidence of full-length 18S and 28S rRNA. The LD exRNA was enriched in mitochondrial rRNA, mitochondrial tRNA, tRNA, piRNA, Y RNA, and full-length 18S and 28S rRNA. The proteomes of the HD and LD exRNA-containing fractions were determined with LC-MS/MS and analyzed with Gene Ontology term finder, which showed that both proteomes were associated with the term extracellular vesicles and electron microscopy suggests that at least a part of the exRNA is associated with exosome-like extracellular vesicles. Additionally, the proteins in the HD fractions tended to be associated with the nucleus and ribosomes, whereas the LD fraction proteome tended to be associated with the mitochondrion. We show that the 2 exRNA signatures released by a single cell type can be separated by floatation on a density gradient. These results show that cells can release multiple types of exRNA with substantial differences in RNA species content. This is important for any future studies determining the nature and function of exRNA released from different cells under different conditions. PMID:27791479

  3. A technical assessment of the porcine ejaculated spermatozoa for a sperm-specific RNA-seq analysis.

    PubMed

    Gòdia, Marta; Mayer, Fabiana Quoos; Nafissi, Julieta; Castelló, Anna; Rodríguez-Gil, Joan Enric; Sánchez, Armand; Clop, Alex

    2018-04-26

    The study of the boar sperm transcriptome by RNA-seq can provide relevant information on sperm quality and fertility and might contribute to animal breeding strategies. However, the analysis of the spermatozoa RNA is challenging as these cells harbor very low amounts of highly fragmented RNA, and the ejaculates also contain other cell types with larger amounts of non-fragmented RNA. Here, we describe a strategy for a successful boar sperm purification, RNA extraction and RNA-seq library preparation. Using these approaches our objectives were: (i) to evaluate the sperm recovery rate (SRR) after boar spermatozoa purification by density centrifugation using the non-porcine-specific commercial reagent BoviPure TM ; (ii) to assess the correlation between SRR and sperm quality characteristics; (iii) to evaluate the relationship between sperm cell RNA load and sperm quality traits and (iv) to compare different library preparation kits for both total RNA-seq (SMARTer Universal Low Input RNA and TruSeq RNA Library Prep kit) and small RNA-seq (NEBNext Small RNA and TailorMix miRNA Sample Prep v2) for high-throughput sequencing. Our results show that pig SRR (~22%) is lower than in other mammalian species and that it is not significantly dependent of the sperm quality parameters analyzed in our study. Moreover, no relationship between the RNA yield per sperm cell and sperm phenotypes was found. We compared a RNA-seq library preparation kit optimized for low amounts of fragmented RNA with a standard kit designed for high amount and quality of input RNA and found that for sperm, a protocol designed to work on low-quality RNA is essential. We also compared two small RNA-seq kits and did not find substantial differences in their performance. We propose the methodological workflow described for the RNA-seq screening of the boar spermatozoa transcriptome. FPKM: fragments per kilobase of transcript per million mapped reads; KRT1: keratin 1; miRNA: micro-RNA; miscRNA: miscellaneous RNA; Mt rRNA: mitochondrial ribosomal RNA; Mt tRNA: mitochondrial transference RNA; OAZ3: ornithine decarboxylase antizyme 3; ORT: osmotic resistance test; piRNA: Piwi-interacting RNA; PRM1: protamine 1; PTPRC: protein tyrosine phosphatase receptor type C; rRNA: ribosomal RNA; snoRNA: small nucleolar RNA; snRNA: small nuclear RNA; SRR: sperm recovery rate; tRNA: transfer RNA.

  4. Freiburg RNA tools: a central online resource for RNA-focused research and teaching.

    PubMed

    Raden, Martin; Ali, Syed M; Alkhnbashi, Omer S; Busch, Anke; Costa, Fabrizio; Davis, Jason A; Eggenhofer, Florian; Gelhausen, Rick; Georg, Jens; Heyne, Steffen; Hiller, Michael; Kundu, Kousik; Kleinkauf, Robert; Lott, Steffen C; Mohamed, Mostafa M; Mattheis, Alexander; Miladi, Milad; Richter, Andreas S; Will, Sebastian; Wolff, Joachim; Wright, Patrick R; Backofen, Rolf

    2018-05-21

    The Freiburg RNA tools webserver is a well established online resource for RNA-focused research. It provides a unified user interface and comprehensive result visualization for efficient command line tools. The webserver includes RNA-RNA interaction prediction (IntaRNA, CopraRNA, metaMIR), sRNA homology search (GLASSgo), sequence-structure alignments (LocARNA, MARNA, CARNA, ExpaRNA), CRISPR repeat classification (CRISPRmap), sequence design (antaRNA, INFO-RNA, SECISDesign), structure aberration evaluation of point mutations (RaSE), and RNA/protein-family models visualization (CMV), and other methods. Open education resources offer interactive visualizations of RNA structure and RNA-RNA interaction prediction as well as basic and advanced sequence alignment algorithms. The services are freely available at http://rna.informatik.uni-freiburg.de.

  5. Interconnections between mRNA degradation and RDR-dependent siRNA production in mRNA turnover in plants.

    PubMed

    Tsuzuki, Masayuki; Motomura, Kazuki; Kumakura, Naoyoshi; Takeda, Atsushi

    2017-03-01

    Accumulation of an mRNA species is determined by the balance between the synthesis and the degradation of the mRNA. Individual mRNA molecules are selectively and actively degraded through RNA degradation pathways, which include 5'-3' mRNA degradation pathway, 3'-5' mRNA degradation pathway, and RNA-dependent RNA polymerase-mediated mRNA degradation pathway. Recent studies have revealed that these RNA degradation pathways compete with each other in mRNA turnover in plants and that plants have a hidden layer of non-coding small-interfering RNA production from a set of mRNAs. In this review, we summarize the current information about plant mRNA degradation pathways in mRNA turnover and discuss the potential roles of a novel class of the endogenous siRNAs derived from plant mRNAs.

  6. The Modification of siRNA with 3′ Cholesterol to Increase Nuclease Protection and Suppression of Native mRNA by Select siRNA Polyplexes

    PubMed Central

    Ambardekar, Vishakha V.; Han, Huai-Yun; Varney, Michelle L.; Vinogradov, Serguei V.; Singh, Rakesh K.; Vetro, Joseph A.

    2010-01-01

    Polymer-siRNA complexes (siRNA polyplexes) are being actively developed to improve the therapeutic application of siRNA. A major limitation for many siRNA polyplexes, however, is insufficient mRNA suppression. Given that modifying the sense strand of siRNA with 3′ cholesterol (chol-siRNA) increases the activity of free nuclease-resistant siRNA in vitro and in vivo, we hypothesized that complexation of chol-siRNA can increase mRNA suppression by siRNA polyplexes. In this study, the characteristics and siRNA activity of self assembled polyplexes formed with chol-siRNA or unmodified siRNA were compared using three types of conventional, positively charged polymers: (i) biodegradable, cross-linked nanogels (BDNG) (ii) graft copolymers (PEI-PEG), and (iii) linear block copolymers (PLL10-PEG, and PLL50-PEG). Chol-siRNA did not alter complex formation or the resistance of polyplexes to siRNA displacement by heparin but increased nuclease protection by BDNG, PLL10-PEG, and PLL50-PEG polyplexes over polyplexes with unmodified siRNA. Chol-CYPB siRNA increased suppression of native CYPB mRNA in mammary microvascular endothelial cells (MVEC) by BDNG polyplexes (35%) and PLL10-PEG polyplexes (69%) over comparable CYPB siRNA polyplexes but had no effect on PEI-PEG or PLL50-PEG polyplexes. Overall, these results indicate that complexation of chol-siRNA increases nuclease protection and mRNA suppression by select siRNA polyplexes. These results also suggest that polycationic block length is an important factor in increasing mRNA suppression by PLL-PEG chol-siRNA polyplexes in mammary MVEC. PMID:21047680

  7. The modification of siRNA with 3' cholesterol to increase nuclease protection and suppression of native mRNA by select siRNA polyplexes.

    PubMed

    Ambardekar, Vishakha V; Han, Huai-Yun; Varney, Michelle L; Vinogradov, Serguei V; Singh, Rakesh K; Vetro, Joseph A

    2011-02-01

    Polymer-siRNA complexes (siRNA polyplexes) are being actively developed to improve the therapeutic application of siRNA. A major limitation for many siRNA polyplexes, however, is insufficient mRNA suppression. Given that modifying the sense strand of siRNA with 3' cholesterol (chol-siRNA) increases the activity of free nuclease-resistant siRNA in vitro and in vivo, we hypothesized that complexation of chol-siRNA can increase mRNA suppression by siRNA polyplexes. In this study, the characteristics and siRNA activity of self assembled polyplexes formed with chol-siRNA or unmodified siRNA were compared using three types of conventional, positively charged polymers: (i) biodegradable, cross-linked nanogels (BDNG) (ii) graft copolymers (PEI-PEG), and (iii) linear block copolymers (PLL10-PEG, and PLL50-PEG). Chol-siRNA did not alter complex formation or the resistance of polyplexes to siRNA displacement by heparin but increased nuclease protection by BDNG, PLL10-PEG, and PLL50-PEG polyplexes over polyplexes with unmodified siRNA. Chol-CYPB siRNA increased suppression of native CYPB mRNA in mammary microvascular endothelial cells (MVEC) by BDNG polyplexes (35%) and PLL10-PEG polyplexes (69%) over comparable CYPB siRNA polyplexes but had no effect on PEI-PEG or PLL50-PEG polyplexes. Overall, these results indicate that complexation of chol-siRNA increases nuclease protection and mRNA suppression by select siRNA polyplexes. These results also suggest that polycationic block length is an important factor in increasing mRNA suppression by PLL-PEG chol-siRNA polyplexes in mammary MVEC. Copyright © 2010 Elsevier Ltd. All rights reserved.

  8. Latest development on RNA-based drugs and vaccines.

    PubMed

    Lundstrom, Kenneth

    2018-06-01

    Drugs and vaccines based on mRNA and RNA viruses show great potential and direct translation in the cytoplasm eliminates chromosomal integration. Limitations are associated with delivery and stability issues related to RNA degradation. Clinical trials on RNA-based drugs have been conducted in various disease areas. Likewise, RNA-based vaccines for viral infections and various cancers have been subjected to preclinical and clinical studies. RNA delivery and stability improvements include RNA structure modifications, targeting dendritic cells and employing self-amplifying RNA. Single-stranded RNA viruses possess self-amplifying RNA, which can provide extreme RNA replication in the cytoplasm to support RNA-based drug and vaccine development. Although oligonucleotide-based approaches have demonstrated potential, the focus here is on mRNA- and RNA virus-based methods.

  9. RNA editing of microRNA prevents RNA-induced silencing complex recognition of target mRNA

    PubMed Central

    Cui, Yalei; Huang, Tianzhi; Zhang, Xiaobo

    2015-01-01

    MicroRNAs (miRNAs) integrate with Argonaut (Ago) to create the RNA-induced silencing complex, and regulate gene expression by silencing target mRNAs. RNA editing of miRNA may affect miRNA processing, assembly of the Ago complex and target mRNA binding. However, the function of edited miRNA, assembled within the Ago complex, has not been extensively investigated. In this study, sequence analysis of the Ago complex of Marsupenaeus japonicus shrimp infected with white spot syndrome virus (WSSV) revealed that host ADAR (adenosine deaminase acting on RNA) catalysed A-to-I RNA editing of a viral miRNA (WSSV-miR-N12) at the +16 site. This editing of the non-seed sequence did not affect association of the edited miRNA with the Ago protein, but inhibited interaction between the miRNA and its target gene (wsv399). The WSSV early gene wsv399 inhibited WSSV infection. As a result, the RNA editing of miRNA caused virus latency. Our results highlight a novel example of miRNA editing in the miRNA-induced silencing complex. PMID:26674414

  10. Current Research on Non-Coding Ribonucleic Acid (RNA).

    PubMed

    Wang, Jing; Samuels, David C; Zhao, Shilin; Xiang, Yu; Zhao, Ying-Yong; Guo, Yan

    2017-12-05

    Non-coding ribonucleic acid (RNA) has without a doubt captured the interest of biomedical researchers. The ability to screen the entire human genome with high-throughput sequencing technology has greatly enhanced the identification, annotation and prediction of the functionality of non-coding RNAs. In this review, we discuss the current landscape of non-coding RNA research and quantitative analysis. Non-coding RNA will be categorized into two major groups by size: long non-coding RNAs and small RNAs. In long non-coding RNA, we discuss regular long non-coding RNA, pseudogenes and circular RNA. In small RNA, we discuss miRNA, transfer RNA, piwi-interacting RNA, small nucleolar RNA, small nuclear RNA, Y RNA, single recognition particle RNA, and 7SK RNA. We elaborate on the origin, detection method, and potential association with disease, putative functional mechanisms, and public resources for these non-coding RNAs. We aim to provide readers with a complete overview of non-coding RNAs and incite additional interest in non-coding RNA research.

  11. Characterization of Human Salivary Extracellular RNA by Next-generation Sequencing.

    PubMed

    Li, Feng; Kaczor-Urbanowicz, Karolina Elżbieta; Sun, Jie; Majem, Blanca; Lo, Hsien-Chun; Kim, Yong; Koyano, Kikuye; Liu Rao, Shannon; Young Kang, So; Mi Kim, Su; Kim, Kyoung-Mee; Kim, Sung; Chia, David; Elashoff, David; Grogan, Tristan R; Xiao, Xinshu; Wong, David T W

    2018-04-23

    It was recently discovered that abundant and stable extracellular RNA (exRNA) species exist in bodily fluids. Saliva is an emerging biofluid for biomarker development for noninvasive detection and screening of local and systemic diseases. Use of RNA-Sequencing (RNA-Seq) to profile exRNA is rapidly growing; however, no single preparation and analysis protocol can be used for all biofluids. Specifically, RNA-Seq of saliva is particularly challenging owing to high abundance of bacterial contents and low abundance of salivary exRNA. Given the laborious procedures needed for RNA-Seq library construction, sequencing, data storage, and data analysis, saliva-specific and optimized protocols are essential. We compared different RNA isolation methods and library construction kits for long and small RNA sequencing. The role of ribosomal RNA (rRNA) depletion also was evaluated. The miRNeasy Micro Kit (Qiagen) showed the highest total RNA yield (70.8 ng/mL cell-free saliva) and best small RNA recovery, and the NEBNext library preparation kits resulted in the highest number of detected human genes [5649-6813 at 1 reads per kilobase RNA per million mapped (RPKM)] and small RNAs [482-696 microRNAs (miRNAs) and 190-214 other small RNAs]. The proportion of human RNA-Seq reads was much higher in rRNA-depleted saliva samples (41%) than in samples without rRNA depletion (14%). In addition, the transfer RNA (tRNA)-derived RNA fragments (tRFs), a novel class of small RNAs, were highly abundant in human saliva, specifically tRF-4 (4%) and tRF-5 (15.25%). Our results may help in selection of the best adapted methods of RNA isolation and small and long RNA library constructions for salivary exRNA studies. © 2018 American Association for Clinical Chemistry.

  12. Systematic review of computational methods for identifying miRNA-mediated RNA-RNA crosstalk.

    PubMed

    Li, Yongsheng; Jin, Xiyun; Wang, Zishan; Li, Lili; Chen, Hong; Lin, Xiaoyu; Yi, Song; Zhang, Yunpeng; Xu, Juan

    2017-10-25

    Posttranscriptional crosstalk and communication between RNAs yield large regulatory competing endogenous RNA (ceRNA) networks via shared microRNAs (miRNAs), as well as miRNA synergistic networks. The ceRNA crosstalk represents a novel layer of gene regulation that controls both physiological and pathological processes such as development and complex diseases. The rapidly expanding catalogue of ceRNA regulation has provided evidence for exploitation as a general model to predict the ceRNAs in silico. In this article, we first reviewed the current progress of RNA-RNA crosstalk in human complex diseases. Then, the widely used computational methods for modeling ceRNA-ceRNA interaction networks are further summarized into five types: two types of global ceRNA regulation prediction methods and three types of context-specific prediction methods, which are based on miRNA-messenger RNA regulation alone, or by integrating heterogeneous data, respectively. To provide guidance in the computational prediction of ceRNA-ceRNA interactions, we finally performed a comparative study of different combinations of miRNA-target methods as well as five types of ceRNA identification methods by using literature-curated ceRNA regulation and gene perturbation. The results revealed that integration of different miRNA-target prediction methods and context-specific miRNA/gene expression profiles increased the performance for identifying ceRNA regulation. Moreover, different computational methods were complementary in identifying ceRNA regulation and captured different functional parts of similar pathways. We believe that the application of these computational techniques provides valuable functional insights into ceRNA regulation and is a crucial step for informing subsequent functional validation studies. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Genetic recombination in plant-infecting messenger-sense RNA viruses: overview and research perspectives.

    PubMed

    Bujarski, Jozef J

    2013-01-01

    RNA recombination is one of the driving forces of genetic variability in (+)-strand RNA viruses. Various types of RNA-RNA crossovers were described including crosses between the same or different viral RNAs or between viral and cellular RNAs. Likewise, a variety of molecular mechanisms are known to support RNA recombination, such as replicative events (based on internal or end-to-end replicase switchings) along with non-replicative joining among RNA fragments of viral and/or cellular origin. Such mechanisms as RNA decay or RNA interference are responsible for RNA fragmentation and trans-esterification reactions which are likely accountable for ligation of RNA fragments. Numerous host factors were found to affect the profiles of viral RNA recombinants and significant differences in recombination frequency were observed among various RNA viruses. Comparative analyses of viral sequences allowed for the development of evolutionary models in order to explain adaptive phenotypic changes and co-evolving sites. Many questions remain to be answered by forthcoming RNA recombination research. (1) How various factors modulate the ability of viral replicase to switch templates, (2) What is the intracellular location of RNA-RNA template switchings, (3) Mechanisms and factors responsible for non-replicative RNA recombination, (4) Mechanisms of integration of RNA viral sequences with cellular genomic DNA, and (5) What is the role of RNA splicing and ribozyme activity. From an evolutionary stand point, it is not known how RNA viruses parasitize new host species via recombination, nor is it obvious what the contribution of RNA recombination is among other RNA modification pathways. We do not understand why the frequency of RNA recombination varies so much among RNA viruses and the status of RNA recombination as a form of sex is not well documented.

  14. RNA editing of microRNA prevents RNA-induced silencing complex recognition of target mRNA.

    PubMed

    Cui, Yalei; Huang, Tianzhi; Zhang, Xiaobo

    2015-12-01

    MicroRNAs (miRNAs) integrate with Argonaut (Ago) to create the RNA-induced silencing complex, and regulate gene expression by silencing target mRNAs. RNA editing of miRNA may affect miRNA processing, assembly of the Ago complex and target mRNA binding. However, the function of edited miRNA, assembled within the Ago complex, has not been extensively investigated. In this study, sequence analysis of the Ago complex of Marsupenaeus japonicus shrimp infected with white spot syndrome virus (WSSV) revealed that host ADAR (adenosine deaminase acting on RNA) catalysed A-to-I RNA editing of a viral miRNA (WSSV-miR-N12) at the +16 site. This editing of the non-seed sequence did not affect association of the edited miRNA with the Ago protein, but inhibited interaction between the miRNA and its target gene (wsv399). The WSSV early gene wsv399 inhibited WSSV infection. As a result, the RNA editing of miRNA caused virus latency. Our results highlight a novel example of miRNA editing in the miRNA-induced silencing complex. © 2015 The Authors.

  15. The RNA methyltransferase Dnmt2 is required for efficient Dicer-2-dependent siRNA pathway activity in Drosophila.

    PubMed

    Durdevic, Zeljko; Mobin, Mehrpouya Balaghy; Hanna, Katharina; Lyko, Frank; Schaefer, Matthias

    2013-09-12

    Transfer RNA (tRNA) fragmentation in response to stress conditions has been described in many organisms. tRNA fragments have been found in association with small interfering RNA (siRNA) components, but the biological role of these interactions remains unclear. We report here that the tRNA methyltransferase Dnmt2 is essential for efficient Dicer-2 (Dcr-2) function in Drosophila. Using small RNA (sRNA) sequencing, we confirmed that Dnmt2 limits the extent of tRNA fragmentation during the heat-shock response. tRNAs as well as tRNA fragments serve as Dcr-2 substrates, and Dcr-2 degrades tRNA-derived sequences, especially under heat-shock conditions. tRNA-derived RNAs are able to inhibit Dcr-2 activity on long double-stranded RNAs (dsRNAs). Consequently, heat-shocked Dnmt2 mutant animals accumulate dsRNAs, produce fewer siRNAs, and show misregulation of siRNA pathway-dependent genes. These results reveal the impact of tRNA fragmentation on siRNA pathways and implicate tRNA modifications in the regulation of sRNA homeostasis during the heat-shock response. Copyright © 2013 The Authors. Published by Elsevier Inc. All rights reserved.

  16. Unmasking Upstream Gene Expression Regulators with miRNA-corrected mRNA Data

    PubMed Central

    Bollmann, Stephanie; Bu, Dengpan; Wang, Jiaqi; Bionaz, Massimo

    2015-01-01

    Expressed micro-RNA (miRNA) affects messenger RNA (mRNA) abundance, hindering the accuracy of upstream regulator analysis. Our objective was to provide an algorithm to correct such bias. Large mRNA and miRNA analyses were performed on RNA extracted from bovine liver and mammary tissue. Using four levels of target scores from TargetScan (all miRNA:mRNA target gene pairs or only the top 25%, 50%, or 75%). Using four levels of target scores from TargetScan (all miRNA:mRNA target gene pairs or only the top 25%, 50%, or 75%) and four levels of the magnitude of miRNA effect (ME) on mRNA expression (30%, 50%, 75%, and 83% mRNA reduction), we generated 17 different datasets (including the original dataset). For each dataset, we performed upstream regulator analysis using two bioinformatics tools. We detected an increased effect on the upstream regulator analysis with larger miRNA:mRNA pair bins and higher ME. The miRNA correction allowed identification of several upstream regulators not present in the analysis of the original dataset. Thus, the proposed algorithm improved the prediction of upstream regulators. PMID:27279737

  17. Lowering the quantification limit of the QubitTM RNA HS assay using RNA spike-in.

    PubMed

    Li, Xin; Ben-Dov, Iddo Z; Mauro, Maurizio; Williams, Zev

    2015-05-06

    RNA quantification is often a prerequisite for most RNA analyses such as RNA sequencing. However, the relatively low sensitivity and large sample consumption of traditional RNA quantification methods such as UV spectrophotometry and even the much more sensitive fluorescence-based RNA quantification assays, such as the Qubit™ RNA HS Assay, are often inadequate for measuring minute levels of RNA isolated from limited cell and tissue samples and biofluids. Thus, there is a pressing need for a more sensitive method to reliably and robustly detect trace levels of RNA without interference from DNA. To improve the quantification limit of the Qubit™ RNA HS Assay, we spiked-in a known quantity of RNA to achieve the minimum reading required by the assay. Samples containing trace amounts of RNA were then added to the spike-in and measured as a reading increase over RNA spike-in baseline. We determined the accuracy and precision of reading increases between 1 and 20 pg/μL as well as RNA-specificity in this range, and compared to those of RiboGreen(®), another sensitive fluorescence-based RNA quantification assay. We then applied Qubit™ Assay with RNA spike-in to quantify plasma RNA samples. RNA spike-in improved the quantification limit of the Qubit™ RNA HS Assay 5-fold, from 25 pg/μL down to 5 pg/μL while maintaining high specificity to RNA. This enabled quantification of RNA with original concentration as low as 55.6 pg/μL compared to 250 pg/μL for the standard assay and decreased sample consumption from 5 to 1 ng. Plasma RNA samples that were not measurable by the Qubit™ RNA HS Assay were measurable by our modified method. The Qubit™ RNA HS Assay with RNA spike-in is able to quantify RNA with high specificity at 5-fold lower concentration and uses 5-fold less sample quantity than the standard Qubit™ Assay.

  18. Protein interactions and complexes in human microRNA biogenesis and function

    PubMed Central

    Perron, Marjorie P.; Provost, Patrick

    2010-01-01

    Encoded in the genome of most eukaryotes, microRNAs (miRNAs) have been proposed to regulate specifically up to 90% of human genes through a process known as miRNA-guided RNA silencing. The aim of this review is to present this process as the integration of a succession of specialized molecular machines exerting well defined functions. The nuclear microprocessor complex initially recognizes and processes its primary miRNA substrate into a miRNA precursor (pre-miRNA). This structure is then exported to the cytoplasm by the Exportin-5 complex where it is presented to the pre-miRNA processing complex. Following pre-miRNA conversion into a miRNA:miRNA* duplex, this complex is assembled into a miRNA-containing ribonucleoprotein (miRNP) complex, after which the miRNA strand is selected. The degree of complementarity of the miRNA for its messenger RNA (mRNA) target guides the recruitment of the miRNP complex. Initially repressing its translation, the miRNP-silenced mRNA is directed to the P-bodies, where the mRNA is either released from its inhibition upon a cellular signal and/or actively degraded. The potency and specificity of miRNA biogenesis and function rely on the distinct protein·protein, protein·RNA and RNA:RNA interactions found in different complexes, each of which fulfill a specific function in a well orchestrated process. PMID:17981733

  19. The ViennaRNA web services.

    PubMed

    Gruber, Andreas R; Bernhart, Stephan H; Lorenz, Ronny

    2015-01-01

    The ViennaRNA package is a widely used collection of programs for thermodynamic RNA secondary structure prediction. Over the years, many additional tools have been developed building on the core programs of the package to also address issues related to noncoding RNA detection, RNA folding kinetics, or efficient sequence design considering RNA-RNA hybridizations. The ViennaRNA web services provide easy and user-friendly web access to these tools. This chapter describes how to use this online platform to perform tasks such as prediction of minimum free energy structures, prediction of RNA-RNA hybrids, or noncoding RNA detection. The ViennaRNA web services can be used free of charge and can be accessed via http://rna.tbi.univie.ac.at.

  20. RNA methylation in nuclear pre-mRNA processing.

    PubMed

    Covelo-Molares, Helena; Bartosovic, Marek; Vanacova, Stepanka

    2018-06-19

    Eukaryotic RNA can carry more than 100 different types of chemical modifications. Early studies have been focused on modifications of highly abundant RNA, such as ribosomal RNA and transfer RNA, but recent technical advances have made it possible to also study messenger RNA (mRNA). Subsequently, mRNA modifications, namely methylation, have emerged as key players in eukaryotic gene expression regulation. The most abundant and widely studied internal mRNA modification is N 6 -methyladenosine (m 6 A), but the list of mRNA chemical modifications continues to grow as fast as interest in this field. Over the past decade, transcriptome-wide studies combined with advanced biochemistry and the discovery of methylation writers, readers, and erasers revealed roles for mRNA methylation in the regulation of nearly every aspect of the mRNA life cycle and in diverse cellular, developmental, and disease processes. Although large parts of mRNA function are linked to its cytoplasmic stability and regulation of its translation, a number of studies have begun to provide evidence for methylation-regulated nuclear processes. In this review, we summarize the recent advances in RNA methylation research and highlight how these new findings have contributed to our understanding of methylation-dependent RNA processing in the nucleus. This article is categorized under: RNA Processing > RNA Editing and Modification RNA Processing > Splicing Regulation/Alternative Splicing RNA Interactions with Proteins and Other Molecules > Protein-RNA Interactions: Functional Implications. © 2018 The Authors. WIREs RNA published by Wiley Periodicals, Inc.

Top