2,276 research outputs found
Easy 4G/LTE IMSI Catchers for Non-Programmers
IMSI Catchers are tracking devices that break the privacy of the subscribers
of mobile access networks, with disruptive effects to both the communication
services and the trust and credibility of mobile network operators. Recently,
we verified that IMSI Catcher attacks are really practical for the
state-of-the-art 4G/LTE mobile systems too. Our IMSI Catcher device acquires
subscription identities (IMSIs) within an area or location within a few seconds
of operation and then denies access of subscribers to the commercial network.
Moreover, we demonstrate that these attack devices can be easily built and
operated using readily available tools and equipment, and without any
programming. We describe our experiments and procedures that are based on
commercially available hardware and unmodified open source software
Rehabilitation of Drug-Dependent Persons
In today\u27s fast-paced society, we are the witnesses of a very unusual phenomenon. People are consuming drugs at a rate never before realized. Stimulant drugs are being taken to keep the individual going during the day. Depressant drugs are being ingested to help the individual bury his anxieties. Drugs have been developed for practically every form of illness, whether organic or psychological. The majority of people who do use the various kinds of legend drugs do so legally, under a physician\u27s supervision. There is am growing minority, however, who abuse drugs to the extent that these individuals become what is currently known as drug-dependent. This situation presents a clear and existing danger. The problem of drug abuse is not confined to slum or ghetto communities, but is also a part of suburbia and more well-to-do societies
Long-term, multiwavelength light curves of ultra-cool dwarfs: II. The evolving light curves of the T2. 5 SIMP 0136 & the uncorrelated light curves of the M9 TVLM 513
We present multiwavelength, multi-telescope, ground-based follow-up photometry of the white dwarf WD 1145+017, that has recently been suggested to be orbited by up to six or more, short-period, low- mass, disintegrating planetesimals. We detect 9 significant dips in flux of between 10% and 30% of the stellar flux from our ground-based photometry. We observe transits deeper than 10% on average every ā¼3.6 hr in our photometry. This suggests that WD 1145+017 is indeed being orbited by multiple, short-period objects. Through fits to the multiple asymmetric transits that we observe, we confirm that the transit egress timescale is usually longer than the ingress timescale, and that the transit duration is longer than expected for a solid body at these short periods, all suggesting that these objects have cometary tails streaming behind them. The precise orbital periods of the planetesimals in this system are unclear from the transit-times, but at least one object, and likely more, have orbital periods of ā¼4.5 hours. We are otherwise unable to confirm the specific periods that have been reported, bringing into question the long-term stability of these periods. Our high precision photometry also displays low amplitude variations suggesting that dusty material is consistently passing in front of the white dwarf, either from discarded material from these disintegrating planetesimals or from the detected dusty debris disk. For the significant transits we observe, we compare the transit depths in the V- and R-bands of our multiwavelength photometry, and find no significant difference; therefore, for likely compositions the radius of single-size particles in the cometary tails streaming behind the planetesimals in this system must be ā¼0.15 Ī¼m or larger, or ā¼0.06 Ī¼m or smaller, with 2Ļ confidence
Holding Internet Service Providers Accountable
Internet service providers are today largely immune from liability for their role in the creation and propagation of worms, viruses, and other forms of malicious computer code. In this Essay, we question that state of affairs. Our purpose is not to weigh in on the detailsāfor example, whether liability should sound in negligence or strict liability, or whether liability is in this instance best implemented by statute or via gradual common law development. Rather, our aim is to challenge the recent trend in the courts and Congress away from liability and toward complete immunity for Internet service providers. In our view, such immunity is difficult to defend on policy grounds, and sharply inconsistent with conventional tort law principles. Internet service providers control the gateway through which Internet pests enter and reenter the public computer system. They should therefore bear some responsibility for stopping these pests before they spread and for helping to identify individuals who originate malicious code in the first place
Biosimilars and cancer treatment of older patients
AbstractBiosimilar monoclonal antibodies are being developed globally to meet clinical demand in oncology and potentially provide greater access to biologic therapies for patients with cancer, including older patients. In this supplement, we present an overview of the development, approval requirements, and characteristics of biosimilar monoclonal antibodies that may help practicing oncologists and other healthcare providers to acquire familiarity with this new group of therapeutic biologic agents. Furthermore, we review and discuss some of the challenges and potential strategies for the management of older patients with cancer, who represent an increasing population in many countries
Blending the Old and the New: Qualitative Data Analysis a s Critical Thinking and Using NVivo with a Generic Approach
In this article the authors seek to make the case that qualitative data analysis can be explained within the framework of critical thinking and incorporates within this framework the role of technology ā specifically NVivo. First they discuss critical thinking from the perspectives of Bloom, Adler, and Polanyi. They then link critical thinking to the concept of a general inductive approach to qualitative analysis as described by Thomas. Finally, they illustrate connections of both critical thinking and the general inductive approach to technology using NVivo screenshots
Turning Over a New Leaf: Cannabinoid and Endocannabinoid Modulation of Immune Function
Cannabis is a complex substance that harbors terpenoid-like compounds referred to as phytocannabinoids. The major psychoactive phytocannabinoid found in cannabis ā9-tetrahydrocannabinol (THC) produces the majority of its pharmacological effects through two cannabinoid receptors, termed CB1 and CB2. The discovery of these receptors as linked functionally to distinct biological effects of THC, and the subsequent development of synthetic cannabinoids, precipitated discovery of the endogenous cannabinoid (or endocannabinoid) system. This system consists of the endogenous lipid ligands N- arachidonoylethanolamine (anandamide; AEA) and 2-arachidonylglycerol (2-AG), their biosynthetic and degradative enzymes, and the CB1 and CB2 receptors that they activate. Endocannabinoids have been identified in immune cells such as monocytes, macrophages, basophils, lymphocytes, and dendritic cells and are believed to be enzymatically produced and released āon demandā in a similar fashion as the eicosanoids. It is now recognized that other phytocannabinoids such as cannabidiol (CBD) and cannabinol (CBN) can alter the functional activities of the immune system. This special edition of the Journal of Neuroimmune Pharmacology (JNIP) presents a collection of cutting edge original research and review articles on the medical implications of phytocannabinoids and the endocannabinoid system. The goal of this special edition is to provide an unbiased assessment of the state of research related to this topic from leading researchers in the field. The potential untoward effects as well as beneficial uses of marijuana, its phytocannabinoid composition, and synthesized cannabinoid analogs are discussed. In addition, the role of the endocannabinoid system and approaches to its manipulation to treat select human disease processes are addressed
- ā¦