903 research outputs found

    Fire protection and recompression systems for a hypobaric research chamber Final report, Jul. - Dec. 1967

    Get PDF
    Fire detection-extinguishment and automatic rapid recompression systems for hypobaric spacecraft cabin simulator

    Occupational therapy and sensory integration for children with autism: a feasibility, safety, acceptability and fidelity study.

    Get PDF
    Objective: To examine the feasibility, safety, and acceptability of a manualized protocol of occupational therapy using sensory integration principles for children with autism. Methods: Ten children diagnosed with autism spectrum disorder ages 4-8 years received intensive occupational therapy intervention using sensory integration principles following a manualized protocol. Measures of feasibility, acceptability and safety were collected from parents and interveners, and fidelity was measured using a valid and reliable fidelity instrument. Results: The intervention is safe and feasible to implement, acceptable to parents and therapist, and therapists were able to implement protocol with adequate fidelity. These data provide support for implementation of a randomized control trial of this intervention and identify specific procedural enhancements to improve study implementation

    The Z-Wave Routing Protocol and Its Security Implications

    Get PDF
    Z-Wave is a proprietary technology used to integrate sensors and actuators over RF and perform smart home and office automation services. Lacking implementation details, consumers are under-informed on the security aptitude of their installed distributed sensing and actuating systems. While the Physical (PHY) and Medium Access Control (MAC) layers of the protocol have been made public, details regarding the network layer are not available for analysis. Using a real-world Z-Wave network, the frame forwarding and topology management aspects of the Z-Wave routing protocol are reverse engineered. A security analysis is also performed on the network under study to identify source and data integrity vulnerabilities of the routing protocol. It is discovered that the topology and routes may be modified by an outsider through the exploitation of the blind trust inherent to the routing nodes of the network. A Black Hole attack is conducted on a real-world Z-Wave network to demonstrate a well-known routing attack that exploits the exposed vulnerabilities. As a result of the discoveries, several recommendations are made to enhance the security of the routing protocol

    System Safety Engineering for Social and Ethical ML Risks: A Case Study

    Full text link
    Governments, industry, and academia have undertaken efforts to identify and mitigate harms in ML-driven systems, with a particular focus on social and ethical risks of ML components in complex sociotechnical systems. However, existing approaches are largely disjointed, ad-hoc and of unknown effectiveness. Systems safety engineering is a well established discipline with a track record of identifying and managing risks in many complex sociotechnical domains. We adopt the natural hypothesis that tools from this domain could serve to enhance risk analyses of ML in its context of use. To test this hypothesis, we apply a "best of breed" systems safety analysis, Systems Theoretic Process Analysis (STPA), to a specific high-consequence system with an important ML-driven component, namely the Prescription Drug Monitoring Programs (PDMPs) operated by many US States, several of which rely on an ML-derived risk score. We focus in particular on how this analysis can extend to identifying social and ethical risks and developing concrete design-level controls to mitigate them.Comment: 14 pages, 5 figures, 3 tables. Accepted to 36th Conference on Neural Information Processing Systems, Workshop on ML Safety (NeurIPS 2022

    An Intervention for Sensory Difficulties in Children with Autism: A Randomized Trial.

    Get PDF
    This study evaluated a manualized intervention for sensory difficulties for children with autism, ages 4-8 years, using a randomized trial design. Diagnosis of autism was confirmed using gold standard measures. Results show that the children in the treatment group (n = 17) who received 30 sessions of the occupational therapy intervention scored significantly higher (p = 0.003, d = 1.2) on Goal Attainment Scales (primary outcome), and also scored significantly better on measures of caregiver assistance in self-care (p = 0.008 d = 0.9) and socialization (p = 0.04, d = 0.7) than the Usual Care control group (n = 15). The study shows high rigor in its measurement of treatment fidelity and use of a manualized protocol, and provides support for the use of this intervention for children with autism. Findings are discussed in terms of their implications for practice and future research

    A Novel Strategy Involved Anti-Oxidative Defense: The Conversion of NADH into NADPH by a Metabolic Network

    Get PDF
    The reduced nicotinamide adenine dinucleotide phosphate (NADPH) is pivotal to the cellular anti-oxidative defence strategies in most organisms. Although its production mediated by different enzyme systems has been relatively well-studied, metabolic networks dedicated to the biogenesis of NADPH have not been fully characterized. In this report, a metabolic pathway that promotes the conversion of reduced nicotinamide adenine dinucleotide (NADH), a pro-oxidant into NADPH has been uncovered in Pseudomonas fluorescens exposed to oxidative stress. Enzymes such as pyruvate carboxylase (PC), malic enzyme (ME), malate dehydrogenase (MDH), malate synthase (MS), and isocitrate lyase (ICL) that are involved in disparate metabolic modules, converged to create a metabolic network aimed at the transformation of NADH into NADPH. The downregulation of phosphoenol carboxykinase (PEPCK) and the upregulation of pyruvate kinase (PK) ensured that this metabolic cycle fixed NADH into NADPH to combat the oxidative stress triggered by the menadione insult. This is the first demonstration of a metabolic network invoked to generate NADPH from NADH, a process that may be very effective in combating oxidative stress as the increase of an anti-oxidant is coupled to the decrease of a pro-oxidant

    Dissolved noble gases and stable isotopes as tracers of preferential fluid flow along faults in the Lower Rhine Embayment, Germany

    Get PDF
    Groundwater in shallow unconsolidated sedimentary aquifers close to the Bornheim fault in the Lower Rhine Embayment (LRE), Germany, has relatively low δ2H and δ18O values in comparison to regional modern groundwater recharge, and 4He concentrations up to 1.7 × 10−4 cm3 (STP) g–1 ± 2.2 % which is approximately four orders of magnitude higher than expected due to solubility equilibrium with the atmosphere. Groundwater age dating based on estimated in situ production and terrigenic flux of helium provides a groundwater residence time of ∼107 years. Although fluid exchange between the deep basal aquifer system and the upper aquifer layers is generally impeded by confining clay layers and lignite, this study’s geochemical data suggest, for the first time, that deep circulating fluids penetrate shallow aquifers in the locality of fault zones, implying  that sub-vertical fluid flow occurs along faults in the LRE. However, large hydraulic-head gradients observed across many faults suggest that they act as barriers to lateral groundwater flow. Therefore, the geochemical data reported here also substantiate a conduit-barrier model of fault-zone hydrogeology in unconsolidated sedimentary deposits, as well as corroborating the concept that faults in unconsolidated aquifer systems can act as loci for hydraulic connectivity between deep and shallow aquifers. The implications of fluid flow along faults in sedimentary basins worldwide are far reaching and of particular concern for carbon capture and storage (CCS) programmes, impacts of deep shale gas recovery for shallow groundwater aquifers, and nuclear waste storage sites where fault zones could act as potential leakage pathways for hazardous fluids

    Mitochondrial Lactate Dehydrogenase Is Involved in Oxidative-Energy Metabolism in Human Astrocytoma Cells (CCF-STTG1)

    Get PDF
    Lactate has long been regarded as an end product of anaerobic energy production and its fate in cerebral metabolism has not been precisely delineated. In this report, we demonstrate, for the first time, the ability of a human astrocytic cell line (CCF-STTG1) to consume lactate and to generate ATP via oxidative phosphorylation. 13C-NMR and HPLC analyses aided in the identification of tricarboxylic acid (TCA) cyle metabolites and ATP in the astrocytic mitochondria incubated with lactate. Oxamate, an inhibitor of lactate dehydrogenase (LDH), abolished mitochondrial lactate consumption. Electrophoretic and fluorescence microscopic analyses helped localize LDH in the mitochondria. Taken together, this study implicates lactate as an important contributor to ATP metabolism in the brain, a finding that may significantly change our notion of how this important organ manipulates its energy budget

    Localization of a continuous CO2 leak from an isotropic flat-surface structure using acoustic emission detection and near-field beamforming techniques

    Get PDF
    Seal capacity is of great importance for the safety operation of pressurized vessels. It is crucial to locate the leak hole timely and accurately for reasons of safety and maintenance. This paper presents the principle and application of a linear acoustic emission sensor array and a near-field beamforming technique to identify the location of a continuous CO2 leak from an isotropic flat-surface structure on a pressurized vessel in the Carbon Capture and Storage system. Acoustic signals generated by the leak hole are collected using a linear high-frequency sensor array. Time-frequency analysis and a narrow-band filtering technique are deployed to extract effective information about the leak. The impacts of various factors on the performance of the localization technique are simulated, compared and discussed, including the number of sensors, distance between the leak hole and sensor array and spacing between adjacent sensors. Experiments were carried out on a laboratory-scale test rig to assess the effectiveness and operability of the proposed method. The results obtained suggest that the proposed method is capable of providing accurate and reliable localization of a continuous CO2 leak
    • …
    corecore