1,912 research outputs found
Discrimination in the Workplace: Using Psychological Research for Prevention
Bias in the workplace is a problem across the private and public sector. There are a set of tools in social psychology that are useful to other disciplines in preventing and responding to discriminatory behavior. An awareness of these largely unconscious processes and potential interventions for combatting bias can make the difference for an organization that aims to treat applicants and employees fairly. Most employers do not want to discriminate and almost all would like to avoid lawsuits. Knowledge about addressing discrimination is a valuable feature for Cal Poly graduates on the job market. Further, organizations benefit from diversity due to greater creativity and quality decision-making. In this module, psychological research on discrimination and diversity is distilled into a lecture that contains research findings, tips for improving organizations, and a classroom activity
Thermal conductance of thin film YIG determined using Bayesian statistics
Thin film YIG (YFeO) is a prototypical material for
experiments on thermally generated pure spin currents and the spin Seebeck
effect. The 3-omega method is an established technique to measure the
cross-plane thermal conductance of thin films, but can not be used in YIG/GGG
(GaGdO) systems in its standard form. We use two-dimensional
modeling of heat transport and introduce a technique based on Bayesian
statistics to evaluate measurement data taken from the 3-omega method. Our
analysis method allows us to study materials systems that have not been
accessible with the conventionally used 3-omega analysis. Temperature dependent
thermal conductance data of thin film YIG are of major importance for
experiments in the field of spin-caloritronics. Here we show data between room
temperature and 10 K for films covering a wide thickness range as well as the
magnetic field effect on the thermal conductance between 10 K and 50 K
Gene expression induced by interleukin-17 in fibroblast-like synoviocytes of patients with rheumatoid arthritis: upregulation of hyaluronan-binding protein TSG-6
Interleukin-17 (IL-17) has been characterized as a proinflammatory cytokine produced by CD4(+ )CD45RO(+ )memory T cells. Overproduction of IL-17 was detected in the synovium of patients with rheumatoid arthritis (RA) compared with patients with osteoarthritis. This study examines differentially expressed genes after the stimulation of fibroblast-like synoviocytes of RA patients by IL-17. Among these genes we identified the following: tumor necrosis factor-stimulated gene-6 (TSG-6), IL-6, IL-8, GRO-β, and bone morphogenetic protein-6 with an expression 3.6–10.6-fold that in the unstimulated control. IL-17 augmented the expression of TSG-6, a hyaluronan-binding protein, in a time- and dose-dependent manner. IL-17 showed additive effects with IL-1β and tumour necrosis factor-α on the expression of TSG-6, IL-6 and IL-8. The mitogen-activated protein kinase p38 seems to be necessary for the regulation of TSG-6 expression by IL-17, as shown by inhibition with SB203580. Our results support the hypothesis that IL-17 is important in the pathogenesis of RA, contributing to an unbalanced production of cytokines as well as participating in connective tissue remodeling
Stealthy Deception Attacks Against SCADA Systems
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to
network attacks such as session hijacking. Hence, research focuses on network
anomaly detection based on meta--data (message sizes, timing, command
sequence), or on the state values of the physical process. In this work we
present a class of semantic network-based attacks against SCADA systems that
are undetectable by the above mentioned anomaly detection. After hijacking the
communication channels between the Human Machine Interface (HMI) and
Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a
fake view of the industrial process, deceiving the human operator into taking
manual actions. Our most advanced attack also manipulates the messages
generated by the operator's actions, reversing their semantic meaning while
causing the HMI to present a view that is consistent with the attempted human
actions. The attacks are totaly stealthy because the message sizes and timing,
the command sequences, and the data values of the ICS's state all remain
legitimate.
We implemented and tested several attack scenarios in the test lab of our
local electric company, against a real HMI and real PLCs, separated by a
commercial-grade firewall. We developed a real-time security assessment tool,
that can simultaneously manipulate the communication to multiple PLCs and cause
the HMI to display a coherent system--wide fake view. Our tool is configured
with message-manipulating rules written in an ICS Attack Markup Language (IAML)
we designed, which may be of independent interest. Our semantic attacks all
successfully fooled the operator and brought the system to states of blackout
and possible equipment damage
Recommended from our members
Draft Genome Sequence of the Caffeine-Degrading Methylotroph Methylorubrum populi Pinkel.
A pink-pigmented facultative methylotroph, Methylorubrum populi Pinkel, was isolated from compost by selective enrichment with caffeine (3,5,7-trimethylxanthine) as the sole carbon, nitrogen, and energy source. We report here its high-quality draft genome sequence, assembled in 35 contigs totaling 5,630,907 bp. We identified 5,681 protein-coding sequences, including those putatively involved in caffeine degradation
Determination of the spin-flip time in ferromagnetic SrRuO3 from time-resolved Kerr measurements
We report time-resolved Kerr effect measurements of magnetization dynamics in
ferromagnetic SrRuO3. We observe that the demagnetization time slows
substantially at temperatures within 15K of the Curie temperature, which is ~
150K. We analyze the data with a phenomenological model that relates the
demagnetization time to the spin flip time. In agreement with our observations
the model yields a demagnetization time that is inversely proportional to T-Tc.
We also make a direct comparison of the spin flip rate and the Gilbert damping
coefficient showing that their ratio very close to kBTc, indicating a common
origin for these phenomena
- …