24 research outputs found

    General anesthesia does not have persistent effects on attention in rodents

    Get PDF
    Background: Studies in animals have shown that general anesthesia can cause persistent spatial memory impairment, but the influence of anesthetics on other cognitive functions is unclear. This study tested whether exposure to general anesthesia without surgery caused a persistent deficit in attention in rodents.Methods: To evaluate whether anesthesia has persistent effects on attention, rats were randomized to three groups. Group A was exposed for 2 h to isoflurane anesthesia, and tested the following seven days for attentional deficits. Group B was used as a control and received room air before attentional testing. Since there is some evidence that a subanesthetic dose of ketamine can improve cognition and reduce disorders of attention after surgery, rats in group C were exposed to isoflurane anesthesia in combination with a ketamine injection before cognitive assessment. Attention was measured in rats using the 5-Choice Serial Reaction Time Task, for which animals were trained to respond with a nose poke on a touchscreen to a brief, unpredictable visual stimulus in one of five possible grid locations to receive a food reward. Attention was analyzed as % accuracy, % omission, and premature responses.Results: Evaluating acute attention by comparing baseline values with data from the day after intervention did not reveal any differences in attentional measurements. No significant differences were seen in % accuracy, % omission, and premature responses for the three groups tested for 7 consecutive days.Conclusion: These data in healthy rodents suggest that general anesthesia without surgery has no persistent effect on attention and the addition of ketamine does not alter the outcome

    OSIRIS-REx Contamination Control Strategy and Implementation

    Get PDF
    OSIRIS-REx will return pristine samples of carbonaceous asteroid Bennu. This manuscript describes how pristine was defined based on expectations of Bennu and on a realistic understanding of what is achievable with a constrained schedule and budget, and how that definition flowed to requirements and implementation. To return a pristine sample, the OSIRIS-REx spacecraft sampling hardware was maintained at Level 100 A/2 and less than 180 nanograms per square centimeter of amino acids and hydrazine on the sampler head through precision cleaning, control of materials, and vigilance. Contamination is further characterized via witness material exposed to the spacecraft assembly and testing environment as well as in space. This characterization provided knowledge of the expected background and will be used in conjunction with archived spacecraft components for comparison with the samples when they are delivered to Earth for analysis. Most of all, the cleanliness of the OSIRIS-REx spacecraft was achieved through communication between scientists, engineers, managers, and technicians

    Quantifying energy expenditure in childhood: utility in managing pediatric metabolic disorders.

    Get PDF
    BACKGROUND: Energy expenditure prediction equations are used to estimate energy intake based on general population measures. However, when using equations to compare with a disease cohort with known metabolic abnormalities, it is important to derive one's own equations based on measurement conditions matching the disease cohort. OBJECTIVE: We aimed to use newly developed prediction equations based on a healthy pediatric population to describe and predict resting energy expenditure (REE) in a cohort of pediatric patients with thyroid disorders. METHODS: Body composition was measured by DXA and REE was assessed by indirect calorimetry in 201 healthy participants. A prediction equation for REE was derived in 100 healthy participants using multiple linear regression and z scores were calculated. The equation was validated in 101 healthy participants. This method was applied to participants with resistance to thyroid hormone (RTH) disorders, due to mutations in either thyroid hormone receptor β or α (β: female n = 17, male n = 9; α: female n = 1, male n = 1), with deviation of REE in patients compared with the healthy population presented by the difference in z scores. RESULTS: The prediction equation for REE = 0.061 * Lean soft tissue (kg) - 0.138 * Sex (0 male, 1 female) + 2.41 (R2 = 0.816). The mean ± SD of the residuals is -0.02 ± 0.44 kJ/min. Mean ± SD REE z scores for RTHβ patients are -0.02 ± 1.26. z Scores of -1.69 and -2.05 were recorded in male (n = 1) and female ( n = 1) RTHα patients. CONCLUSIONS: We have described methodology whereby differences in REE between patients with a metabolic disorder and healthy participants can be expressed as a z score. This approach also enables change in REE after a clinical intervention (e.g., thyroxine treatment of RTHα) to be monitored

    The OSIRIS-REx Contamination Control and Witness Strategy

    Get PDF
    The OSIRIS-REx mission (Origins, Spectral Interpretation, Resource Identification, and Security Regolith Explorer) is the third NASA New Frontiers mission. It is scheduled for launch in 2016. The primary objective of the mission is to return at least 60 g of "pristine" material from the B-type near- Earth asteroid (101955) Bennu, which is spectrally similar to organic-rich CI or CM meteorites [1]. The study of these samples will advance our understanding of materials available for the origin of life on Earth or elsewhere. The spacecraft will rendezvous with Bennu in 2018 and spend at least a year characterizing the asteroid before executing a maneuver to recover a sample of regolith in the touch-and-go sample acquisition mechanism (TAGSAM). The TAGSAM and sample is stowed in the sample return capsule (SRC) and returned to Earth in 2023

    Flash Memory ‘Bumping ’ Attacks

    No full text
    Abstract. This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually stores critical parts of algorithms, sensitive data and cryptographic keys. As a security measure, read-back access to the memory is not implemented leaving only authentication and verification options for integrity check. Verification is usually performed on relatively large blocks of data, making brute force searching infeasible. This paper evaluates memory verification and AES authentication schemes used in secure microcontrollers and a highly secure FPGA. By attacking the security in three steps, the search space can be reduced from infeasible> 2 100 to affordable ≈ 2 15 guesses per block of data. This progress was achieved by finding a way to preset certain bits in the data path to a known state using optical bumping. Research into positioning and timing dependency showed that Flash memory bumping attacks are relatively easy to carry out

    Physical Attacks and Tamper Resistance

    No full text

    Optically Enhanced Position-Locked Power Analysis

    No full text
    Abstract. This paper introduces a re¯nement of the power-analysis at-tack on integrated circuits. By using a laser to illuminate a speci¯c area on the chip surface, the current through an individual transistor can be made visible in the circuit's power trace. The photovoltaic e®ect converts light into a current that °ows through a closed transistor. This way, the contribution of a single transistor to the overall supply current can be modulated by light. Compared to normal power-analysis attacks, the semi-invasive position-locking technique presented here gives attackers not only access to Hamming weights, but to individual bits of processed data. This technique is demonstrated on the SRAM array of a PIC16F84 microcontroller and reveals both which memory locations are being ac-cessed, as well as their contents. Key words: side-channel attacks, power analysis, semi-invasive attacks, optical probing
    corecore