1,424 research outputs found

    Midcourse maneuver operations program

    Get PDF
    Midcourse Maneuver Operations Program /MMOP/ computes the required velocity change to correct a spacecraft trajectory. The program establishes the existence of maneuvers which satisfy spacecraft constraints, explores alternate trajectories in the event that some out-of-tolerance condition forces a change in plans, and codes the maneuvers into commands

    Elligator : elliptic-curve points indistinguishable from uniform random strings

    Get PDF
    Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools without completely shutting down the Internet. Tools aim to shape their traffic patterns to match unblocked programs, so that simple traffic profiling cannot identify the tools within a reasonable number of traces; the censors respond by deploying rewalls with increasingly sophisticated deep-packet inspection. Cryptography hides patterns in user data but does not evade censorship if the censor can recognize patterns in the cryptography itself. In particular, elliptic-curve cryptography often transmits points on known elliptic curves, and those points are easily distinguishable from uniform random strings of bits. This paper introduces high-security high-speed elliptic-curve systems in which elliptic-curve points are encoded so as to be indistinguishable from uniform random strings. At a lower level, this paper introduces a new bijection between strings and about half of all curve points; this bijection is applicable to every odd-characteristic elliptic curve with a point of order 2, except for curves of j-invariant 1728. This paper also presents guidelines to construct, and two examples of, secure curves suitable for these encodings

    Non-invariant two-loop counterterms for the three-gauge-boson vertices

    Get PDF
    Some practical applications of algebraic renormalization are discussed. In particular we consider the two-loop QCD corrections to the three-gauge-boson vertices involving photons, Z and W bosons. For this purpose also the corresponding two-point functions have to be discussed. A recently developed procedure is used to analyze the breaking terms of the functional identities and explicit formulae for the universal counterterms are provided. Special attention is devoted to the treatment of infra-red divergences.Comment: Some minor corrections and improved discussion in the one-loop sectio

    Analysis of Sub-threshold Short Gamma-ray Bursts in Fermi GBM Data

    Get PDF
    The Fermi Gamma-ray Burst Monitor (GBM) is currently the most prolific detector of Gamma-Ray Bursts (GRBs). Recently the detection rate of short GRBs (SGRBs) has been dramatically increased through the use of ground-based searches that analyze GBM continuous time tagged event (CTTE) data. Here we examine the efficiency of a method developed to search CTTE data for sub-threshold transient events in temporal coincidence with LIGO/Virgo compact binary coalescence triggers. This targeted search operates by coherently combining data from all 14 GBM detectors by taking into account the complex spatial and energy dependent response of each detector. We use the method to examine a sample of SGRBs that were independently detected by the Burst Alert Telescope on board the Neil Gehrels Swift Observatory, but which were too intrinsically weak or viewed with unfavorable instrument geometry to initiate an on-board trigger of GBM. We find that the search can successfully recover a majority of the BAT detected sample in the CTTE data. We show that the targeted search of CTTE data will be crucial in increasing the GBM sensitivity, and hence the gamma-ray horizon, to weak events such as GRB 170817A. We also examine the properties of the GBM signal possibly associated with the LIGO detection of GW150914 and show that it is consistent with the observed properties of other sub-threshold SGRBs in our sample. We find that the targeted search is capable of recovering true astrophysical signals as weak as the signal associated with GW150914 in the untriggered data.Comment: 10 pages, 9 figures, 1 table, submitted to Ap

    The quantitative soil pit method for measuring belowground carbon and nitrogen stocks

    Get PDF
    Many important questions in ecosystem science require estimates of stocks of soil C and nutrients. Quantitative soil pits provide direct measurements of total soil mass and elemental content in depth-based samples representative of large volumes, bypassing potential errors associated with independently measuring soil bulk density, rock volume, and elemental concentrations. The method also allows relatively unbiased sampling of other belowground C and nutrient stocks, including roots, coarse organic fragments, and rocks. We present a comprehensive methodology for sampling these pools with quantitative pits and assess their accuracy, precision, effort, and sampling intensity as compared to other methods. At 14 forested sites in New Hampshire, nonsoil belowground pools (which other methods may omit, double-count, or undercount) accounted for upward of 25% of total belowground C and N stocks: coarse material accounted for 4 and 1% of C and N in the O horizon; roots were 11 and 4% of C and N in the O horizon and 10 and 3% of C and N in the B horizon; and soil adhering to rocks represented 5% of total B-horizon C and N. The top 50 cm of the C horizon contained the equivalent of 17% of B-horizon carbon and N. Sampling procedures should be carefully designed to avoid treating these important pools inconsistently. Quantitative soil pits have fewer sources of systematic error than coring methods; the main disadvantage is that because they are time-consuming and create a larger zone of disturbance, fewer observations can be made than with cores

    CacheZoom: How SGX Amplifies The Power of Cache Attacks

    Get PDF
    In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are malicious. However, SGX disregards side-channel attacks. We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. Our attack tool named CacheZoom is able to virtually track all memory accesses of SGX enclaves with high spatial and temporal precision. As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios. Our results show that SGX cannot protect critical data sensitive computations, and efficient AES key recovery is possible in a practical environment. In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements. We can successfully recover AES keys from T-Table based implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17

    Impact of Optics on CSR-Related Emittance Growth in Bunch Compressor Chicanes

    Get PDF
    Abstract The dependence of emittance growth due to Coherent Synchrotron Radiation (CSR) in bunch compressor chicanes on optics has been noticed and empirically studied in the past. We revisit the subject, suggesting a model to explain slice emittance growth dependence on chicane optics. A simplified model to calculate projected emittance growth when it is mainly caused by transverse slice centroid offsets is presented. It is then used to find optimal compensation of centroid kicks in the single chicanes of a two-stage compression system by adjusting the phase advance of the transport in between and the ration of the compression factors

    WNT5A regulates adipose tissue angiogenesis via antiangiogenic VEGF-A165b in obese humans

    Get PDF
    Experimental studies have suggested that Wingless-related integration site 5A (WNT5A) is a proinflammatory secreted protein that is associated with metabolic dysfunction in obesity. Impaired angiogenesis in fat depots has been implicated in the development of adipose tissue capillary rarefaction, hypoxia, inflammation, and metabolic dysfunction. We have recently demonstrated that impaired adipose tissue angiogenesis is associated with overexpression of antiangiogenic factor VEGF-A165b in human fat and the systemic circulation. In the present study, we postulated that upregulation of WNT5A is associated with angiogenic dysfunction and examined its role in regulating VEGF-A165b expression in human obesity. We biopsied subcutaneous and visceral adipose tissue from 38 obese individuals (body mass index: 44 ± 7 kg/m2, age: 37 ± 11 yr) during planned bariatric surgery and characterized depot-specific protein expression of VEGF-A165b and WNT5A using Western blot analysis. In both subcutaneous and visceral fat, VEGF-A165b expression correlated strongly with WNT5A protein (r = 0.9, P \u3c 0.001). In subcutaneous adipose tissue where angiogenic capacity is greater than in the visceral depot, exogenous human recombinant WNT5A increased VEGF-A165b expression in both whole adipose tissue and isolated vascular endothelial cell fractions (P \u3c 0.01 and P \u3c 0.05, respectively). This was associated with markedly blunted angiogenic capillary sprout formation in human fat pad explants. Moreover, recombinant WNT5A increased secretion of soluble fms-like tyrosine kinase-1, a negative regulator of angiogenesis, in the sprout media (P \u3c 0.01). Both VEGF-A165b-neutralizing antibody and secreted frizzled-related protein 5, which acts as a decoy receptor for WNT5A, significantly improved capillary sprout formation and reduced soluble fms-like tyrosine kinase-1 production (P \u3c 0.05). We demonstrated a significant regulatory nexus between WNT5A and antiangiogenic VEGF-A165b in the adipose tissue of obese subjects that was linked to angiogenic dysfunction. Elevated WNT5A expression in obesity may function as a negative regulator of angiogenesis
    corecore