970 research outputs found

    Sire Ranking Based upon Purebred Versus Crossbred Progeny Performance in Swine

    Get PDF
    Animal Scienc

    The Engineering Academy : increasing access to engineering

    Get PDF
    The Engineering Academy (EA) is an integrated programme between the University of Strathclyde, partner colleges and industry to widen access to undergraduate degrees in engineering. A partnership model was developed where students successfully complete an enhanced HNC at a partner college before transferring to second year of their chosen undergraduate degree within the Faculty of Engineering. EA entry requirements are lower than direct entry applications. Additional contextual information based on postcode; the Scottish Index of Multiple Deprivation; schools with low progression to university; or time in care, is used in selection. The programme also aligns with and accepts adult learner applicants from the Scottish Wider Access Programme. Three enhanced HNC pathways: Chemical Engineering, Electronic and Electrical Engineering and General Engineering require bespoke student transition activities tailored to the engineering discipline. The presentation will follow the evolution of the EA programme model from its inception to current day. This will include changes in the programme management; the establishment of curriculum and subject working groups to review, refine and share teaching practice; and development of transition activities. The results of these show a successful transition model into undergraduate engineering degrees for students from a range of backgrounds

    Deriving ChaCha20 Key Streams From Targeted Memory Analysis

    Get PDF
    There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly resistant to side-channel attacks, cryptographic artefacts may exist in memory. This paper identifies a significant vulnerability within OpenSSH and OpenSSL and which involves the discovery of cryptographic artefacts used within the ChaCha20 cipher. This can allow for the cracking of tunneled data using a single targeted memory extraction. With this, law enforcement agencies and/or malicious agents could use the vulnerability to take copies of the encryption keys used for each tunnelled connection. The user of a virtual machine would not be alerted to the capturing of the encryption key, as the method runs from an extraction of the running memory. Methods of mitigation include making cryptographic artefacts difficult to discover and limiting memory access

    A Forensic Audit of the Tor Browser Bundle

    Get PDF
    The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its local footprint within a host and over a network connection. The Tor browser, though, can leave behind digital artefacts which can be used by an investigator. This paper outlines an experimental methodology and provides results for evidence trails which can be used within real-life investigations

    Differences in management approaches for lupus nephritis within the UK

    Get PDF
    \ua9 The Author(s) 2024. Published by Oxford University Press on behalf of the British Society for Rheumatology.Objectives: Outcomes of therapy for LN are often suboptimal. Guidelines offer varied options for treatment of LN and treatment strategies may differ between clinicians and regions. We aimed to assess variations in the usual practice of UK physicians who treat LN. Methods: We conducted an online survey of simulated LN cases for UK rheumatologists and nephrologists to identify treatment preferences for class IV and class V LN. Results: Of 77 respondents, 48 (62.3%) were rheumatologists and 29 (37.7%) were nephrologists. A total of 37 (48.0%) reported having a joint clinic between nephrologists and rheumatologists, 54 (70.0%) reported having a multidisciplinary team meeting for LN and 26 (33.7%) reported having a specialized lupus nurse. Of the respondents, 58 (75%) reported arranging a renal biopsy before starting the treatment. A total of 20 (69%) of the nephrologists, but only 13 (27%) rheumatologists, reported having a formal departmental protocol for treating patients with LN (P < 0.001). The first-choice treatment of class IV LN in pre-menopausal patients was MMF [41 (53.2%)], followed by CYC [15 (19.6%)], rituximab [RTX; 12 (12.5%)] or a combination of immunosuppressive drugs [9 (11.7%)] with differences between nephrologists’ and rheumatologists’ choices (P \ubc 0.026). For class V LN, MMF was the preferred initial treatment, irrespective of whether proteinuria was in the nephrotic range or not. RTX was the preferred second-line therapy for non-responders. Conclusion: There was variation in the use of protocols, specialist clinic service provision, biopsies and primary and secondary treatment choices for LN reported by nephrologists and rheumatologists in the UK
    • …
    corecore