2,250 research outputs found

    'I have to live with the decisions I make': laying a foundation for decision making for children with life-limiting conditions and life-threatening illnesses.

    Get PDF
    The relationship between parents and clinician is critical to the care and treatment of children with life-limiting conditions (LLCs) and life-threatening illnesses (LTIs). This relationship is built and maintained largely in consultations. In this article we lay out factors that bear on the success of clinical consultations and the maintenance of the essential clinician-parent relationship at progression or deterioration of LLCs or LTIs. We suggest an approach to engaging parents in conversations about care and treatment that recognises and appreciates the dilemmas which clinicians and parents face and in so doing provides a way for everyone to live with the decisions that are made. A close analysis of a consultation at progression and excerpts of encounters among parents, clinician and researcher are used to illustrate our approach to research, analysis and development of recommendations for clinical practice

    The impact of alkyl chain purity on lipid based nucleic acid delivery systems – is the utilization of lipid components with technical grade justified?

    No full text
    The physicochemical properties and transfection efficacies of two samples of a cationic lipid have been investigated and compared in 2D (monolayers at the air/liquid interface) and 3D (aqueous bulk dispersions) model systems using different techniques. The samples differ only in their chain composition due to the purity of the oleylamine (chain precursor). Lipid 8 (using the oleylamine of technical grade for cost-efficient synthesis) shows lateral phase separation in the Langmuir layers. However, the amount of attached DNA, determined by IRRAS, is for both samples the same. In 3D systems, lipid 8 p forms cubic phases, which disappear after addition of DNA. At physiological temperatures, both lipids (alone and in mixture with cholesterol) assemble to lamellar aggregates and exhibit comparable DNA delivery efficiency. This study demonstrates that non-lamellar structures are not compulsory for high transfection rates. The results legitimate the utilization of oleyl chains of technical grade in the synthesis of cationic transfection lipid

    CacheZoom: How SGX Amplifies The Power of Cache Attacks

    Get PDF
    In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are malicious. However, SGX disregards side-channel attacks. We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. Our attack tool named CacheZoom is able to virtually track all memory accesses of SGX enclaves with high spatial and temporal precision. As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios. Our results show that SGX cannot protect critical data sensitive computations, and efficient AES key recovery is possible in a practical environment. In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements. We can successfully recover AES keys from T-Table based implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17

    Selective interlayer ferromagnetic coupling between the Cu spins in YBa2_2 Cu3_3 O7x_{7-x} grown on top of La0.7_{0.7} Ca0.3_{0.3} MnO3_3

    Full text link
    Studies to date on ferromagnet/d-wave superconductor heterostructures focus mainly on the effects at or near the interfaces while the response of bulk properties to heterostructuring is overlooked. Here we use resonant soft x-ray scattering spectroscopy to reveal a novel c-axis ferromagnetic coupling between the in-plane Cu spins in YBa2_2 Cu3_3 O7x_{7-x} (YBCO) superconductor when it is grown on top of ferromagnetic La0.7_{0.7} Ca0.3_{0.3} MnO3_3 (LCMO) manganite layer. This coupling, present in both normal and superconducting states of YBCO, is sensitive to the interfacial termination such that it is only observed in bilayers with MnO_2but not with La0.7_{0.7} Ca0.3_{0.3} interfacial termination. Such contrasting behaviors, we propose, are due to distinct energetic of CuO chain and CuO2_2 plane at the La0.7_{0.7} Ca0.3_{0.3} and MnO2_2 terminated interfaces respectively, therefore influencing the transfer of spin-polarized electrons from manganite to cuprate differently. Our findings suggest that the superconducting/ferromagnetic bilayers with proper interfacial engineering can be good candidates for searching the theorized Fulde-Ferrel-Larkin-Ovchinnikov (FFLO) state in cuprates and studying the competing quantum orders in highly correlated electron systems.Comment: Please note the change of the title. Text might be slightly different from the published versio

    New Constraints from PAMELA anti-proton data on Annihilating and Decaying Dark Matter

    Get PDF
    Recently the PAMELA experiment has released its updated anti-proton flux and anti-proton to proton flux ratio data up to energies of ~200GeV. With no clear excess of cosmic ray anti-protons at high energies, one can extend constraints on the production of anti-protons from dark matter. In this letter, we consider both the cases of dark matter annihilating and decaying into standard model particles that produce significant numbers of anti-protons. We provide two sets of constraints on the annihilation cross-sections/decay lifetimes. In the one set of constraints we ignore any source of anti-protons other than dark matter, which give the highest allowed cross-sections/inverse lifetimes. In the other set we include also anti-protons produced in collisions of cosmic rays with interstellar medium nuclei, getting tighter but more realistic constraints on the annihilation cross-sections/decay lifetimes.Comment: 7 pages, 3 figures, 3 table

    Improving SIEM for critical SCADA water infrastructures using machine learning

    Get PDF
    Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication, oil and water pipelines, building ventilation, etc.) Like other Internet of Things (IoT) implementations, SCADA systems are vulnerable to cyber-attacks, therefore, a robust anomaly detection is a major requirement. However, having an accurate anomaly detection system is not an easy task, due to the difficulty to differentiate between cyber-attacks and system internal failures (e.g. hardware failures). In this paper, we present a model that detects anomaly events in a water system controlled by SCADA. Six Machine Learning techniques have been used in building and evaluating the model. The model classifies different anomaly events including hardware failures (e.g. sensor failures), sabotage and cyber-attacks (e.g. DoS and Spoofing). Unlike other detection systems, our proposed work helps in accelerating the mitigation process by notifying the operator with additional information when an anomaly occurs. This additional information includes the probability and confidence level of event(s) occurring. The model is trained and tested using a real-world dataset

    Sustainable Sourcing of Global Agricultural Raw Materials: Assessing Gaps in Key Impact and Vulnerability Issues and Indicators.

    Get PDF
    Understanding how to source agricultural raw materials sustainably is challenging in today's globalized food system given the variety of issues to be considered and the multitude of suggested indicators for representing these issues. Furthermore, stakeholders in the global food system both impact these issues and are themselves vulnerable to these issues, an important duality that is often implied but not explicitly described. The attention given to these issues and conceptual frameworks varies greatly--depending largely on the stakeholder perspective--as does the set of indicators developed to measure them. To better structure these complex relationships and assess any gaps, we collate a comprehensive list of sustainability issues and a database of sustainability indicators to represent them. To assure a breadth of inclusion, the issues are pulled from the following three perspectives: major global sustainability assessments, sustainability communications from global food companies, and conceptual frameworks of sustainable livelihoods from academic publications. These terms are integrated across perspectives using a common vocabulary, classified by their relevance to impacts and vulnerabilities, and categorized into groups by economic, environmental, physical, human, social, and political characteristics. These issues are then associated with over 2,000 sustainability indicators gathered from existing sources. A gap analysis is then performed to determine if particular issues and issue groups are over or underrepresented. This process results in 44 "integrated" issues--24 impact issues and 36 vulnerability issues--that are composed of 318 "component" issues. The gap analysis shows that although every integrated issue is mentioned at least 40% of the time across perspectives, no issue is mentioned more than 70% of the time. A few issues infrequently mentioned across perspectives also have relatively few indicators available to fully represent them. Issues in the impact framework generally have fewer gaps than those in the vulnerability framework
    corecore