2,368 research outputs found

    Retrieval methods for ground-based millimeter-wave measurements for the network for the detection of stratospheric change

    Get PDF
    The fundamental objective is to determine the information available in ground-based millimeter-wave measurements of stratospheric constituent profiles, to identify the optimum method of retrieving this profile information, and to characterize the errors in the final result. A secondary objective is to produce retrieval software for operational use with Network for the Detection of Stratospheric Change (NDSC) measurements of O3, H2O, ClO, and perhaps N2O. Tests were performed on existing ozone retrieval programs in support of ongoing NDSC field measurements. The results show that if random spectral errors and retrieval bias errors are considered, accuracy of the retrieved profile is about 5 percent from 20-50 km, and about 10 percent from 50-60 km

    Improved Architectures for Secure Intra-process Isolation

    Get PDF
    Intra-process memory isolation can improve security by enforcing least-privilege at a finer granularity than traditional operating system controls without the context-switch overhead associated with inter-process communication. Because the process has traditionally been a fundamental security boundary, assigning different levels of trust to components within a process is a fundamental change in secure systems design. However, so far there has been little research on the challenges of securely implementing intra-process isolation on top of existing operating system abstractions. We find that frequently-used assumptions in secure system design do not precisely hold under realistic conditions, and that these discrepancies lead to exploitable vulnerabilities. We evaluate two recently-proposed memory isolation systems and show that both are vulnerable to the same generic attacks that break their security model. We then extend a subset of these attacks by applying them to a fully-precise model of control-flow integrity, demonstrating a data-only attack that bypasses both static and dynamic control-flow integrity enforcement by overwriting executable code in-memory even under typical w^x assumptions. From these two results, we propose a set of kernel modifications called Xlock that systemically addresses weaknesses in memory permissions enforcement on Linux, bringing them into line with w^x assumptions. Finally, we present modifications to intra-process isolation systems that preserve efficient userspace component transitions while drastically reducing risk of accidental kernel mismanagement by modeling intra-process components as separate processes from the kernel\u27s perspective. Taken together, these mitigations represent a more robust architecture for efficient and secure intra-process isolation

    Managing Water under Uncertainty and Risk: The United Nations World Water Development Report 4

    Get PDF
    This report introduces new aspects of water issues: 1) it reintroduces the 12 challenge area reports that provided the foundation for the first two World Water Development Reports (WWDR); 2) 4 new reports on water quality, groundwater, gender, and desertification, land degradation and drought; 3) in recognition that the global challenges of water can vary considerably across countries and regions, a series of 5 regional reports have been included; 4) a deeper analysis of the main external forces of freshwater resources and possibilities for their future evolution; 5) managing water under uncertainty and risk

    Context-Sensitive Auto-Sanitization for PHP

    Get PDF

    Model/data comparisons of ozone in the upper stratosphere and mesosphere

    Get PDF
    We compare ground-based microwave observations of ozone in the upper stratosphere and mesosphere with daytime observations made from the SME (Solar Mesosphere Explorer) satellite, with nighttime data from the LIMS instrument, and with a diurnal photochemical model. The results suggest that the data are all in reasonable agreement and that the model-data discrepancy is much less than previously thought, particularly in the mesosphere. This appears to be due to the fact that the latest data are lower than earlier reports and the updated model predicts more ozone than older versions. The model and the data agree to within a factor of 1.5 at all altitudes and typically are within 20 percent

    Effect of Glutathione Depletion on Sunburn Cell Formation in the Hairless Mouse

    Get PDF
    Cutaneous protection against ultraviolet B (UVB) radiation damage by endogenous glutathione (GSH) was evaluated in the epidermis of the hairless mouse by measuring the influence of GSH depletion on sunburn cell (SBC) formation. Cellular GSH exerts antioxidant effects and recent studies have suggested a role for oxygen radicals in the production of SBC. Hairless juice (Skh/h 1) received oral treatment with buthionine S,R-sulfoximine (BSO), an irreversible inhibitor of γ-glutamylcysteine synthetase, to deplete cutaneous GSH; 4 d later their ears were exposed to UVB radiation. BSO treatment significantly reduced GSH levels in the epidermis to 10–15% of control levels. Twenty-four hours after UVB exposure, SBC counts in the ears of animals with and without BSO treatment were measured, and those exposed to UVB were found to have increased. Greater numbers of SBC were found in the ears of BSO-treated mice exposed to 15 or 20 mJ/cm2 UVB, than in non-BSO-treated mice exposed to the same UVB doses. At higher UVB doses, there were no statistically significant differences between the groups. The results show that endogenous GSH provides the epidermis with measurable protection against injury by low or moderate UVB doses

    Proteomic analysis of the cerebrospinal fluid of patients with restless legs syndrome/Willis-Ekbom disease

    Get PDF
    BACKGROUND: Restless Legs Syndrome/Willis-Ekbom Disease (RLS/WED) is a sensorimotor disorder that causes patients to experience overwhelming and distressing sensations in the legs compelling the patient to move their legs to provide relief. The purpose of this study was to determine if biomarkers in the cerebrospinal fluid can distinguish RLS/WED patients from neurological controls. METHODS: We obtained CSF samples by lumbar puncture from 5 early-onset RLS/WED patients and 5 controls. We performed 2-dimensional difference in-gel electrophoresis (2D-DIGE). Proteins that were significantly altered were identified by Student’s t-test. Protein spots that were differentially expressed (p ≤ 0.05, Av. Ratio ≥ 2.0) between RLS/WED and control CSF samples were identified using MALDI-TOF-MS. Statistical analyses of the validation immunoblot assays were performed using Student’s t-test. RESULTS: In this discovery study we identified 6 candidate CSF protein markers for early-onset RLS/WED. Four proteins (Cystatin C, Lipocalin-type Prostaglandin D2 Synthase, Vitamin D binding Protein, and β-Hemoglobin) were increased and 2 proteins (Apolipoprotein A1 and α-1-acid Glycoprotein) were decreased in RLS/WED patients. CONCLUSIONS: Our results reveal a protein profile in the RLS/WED CSF that is consistent with clinical findings of disruptive sleep, cardiovascular dysfunction and painful symptoms. Moreover, protein profiles are consistent with neuropathological findings of activation of hypoxia inducible factor (HIF) pathways and alterations in dopaminergic systems. These data indicate the CSF of RLS/WED patients may provide information relevant to biological basis for RLS/WED, treatment strategies and potential new treatment targets
    • …
    corecore