909 research outputs found

    A Woman

    Get PDF
    It\u27s vital to acknowledge that a woman\u27s worth is not solely defined by her reproductive capacity. We should celebrate and admire the beauty of a woman\u27s body not just for its reproductive potential, but also for its strength, resilience, and complexity. From the intricacies of her hormonal cycles to the incredible feat of childbirth, a woman\u27s biology is truly awe-inspiring and worthy of celebration

    ODSS: A Ghidra-based Static Analysis Tool for Detecting Stack-Based Buffer Overflows

    Get PDF
    To reduce code exploitabilty, techniques for analyzing binaries for potential buffer overflow vulnerabilities are needed. One method is static analysis, which involves inspection of disassembled binaries to identify exploitable weaknesses in the program. Buffer overflows can occur in libc functions. Such functions can be referred to as vulnerable sinks. We present Overflow Detection from Sinks and Sources (ODSS), a script written for the Ghidra API to search for vulnerable sinks in a binary and to find the source of all the parameters used in each sink. We conduct static analysis of ten common libc functions using ODSS, and show that it is possible to both find overflow vulnerabilities associated with functions using stack-allocated strings and to determine the feasibility of a buffer overflow exploitation

    Analysis of electromagnetic field variability in magnetized ionosphere plasma using the stochastic FDTD method

    Get PDF
    pre-printA stochastic finite-difference time-domain (S-FDTD) algorithm is presented for electromagnetic wave propagation in anisotropic magnetized plasma. This new algorithm efficiently calculates in a single simulation not only the mean electromagnetic field values, but also their variance as caused by the variability or uncertainty of the content of the ionosphere. By accounting for fully three-dimensional, high resolution (even cm-scale) structures and uncertainty in the ionosphere, this algorithm represents a paradigm shift in our ability to analyze realistic, complex wave propagation in the ionosphere

    Strategies to mitigate student resistance to active learning

    Full text link
    Abstract Background Research has shown that active learning promotes student learning and increases retention rates of STEM undergraduates. Yet, instructors are reluctant to change their teaching approaches for several reasons, including a fear of student resistance to active learning. This paper addresses this issue by building on our prior work which demonstrates that certain instructor strategies can positively influence student responses to active learning. We present an analysis of interview data from 17 engineering professors across the USA about the ways they use strategies to reduce student resistance to active learning in their undergraduate engineering courses. Results Our data reveal that instructor strategies for reducing student resistance generally fall within two broad types: explanation and facilitation strategies. Explanation strategies consist of the following: (a) explain the purpose, (b) explain course expectations, and (c) explain activity expectations. Facilitation strategies include the following: (a) approach non-participants, (b) assume an encouraging demeanor, (c) grade on participation, (d) walk around the room, (e) invite questions, (f) develop a routine, (g) design activities for participation, and (h) use incremental steps. Four of the strategies emerged from our analysis and were previously unstudied in the context of student resistance. Conclusions The findings of this study have practical implications for instructors wishing to implement active learning. There is a variety of strategies to reduce student resistance to active learning, and there are multiple successful ways to implement the strategies. Importantly, effective use of strategies requires some degree of intentional course planning. These strategies should be considered as a starting point for instructors seeking to better incorporate the use of active learning strategies into their undergraduate engineering classrooms.https://deepblue.lib.umich.edu/bitstream/2027.42/142791/1/40594_2018_Article_102.pd

    NASA Ames DEVELOP Interns Collaborate with the South Bay Salt Pond Restoration Project to Monitor and Study Restoration Efforts using NASA's Satellites

    Get PDF
    In the past, natural tidal marshes in the south bay were segmented by levees and converted into ponds for use in salt production. In an effort to provide habitat for migratory birds and other native plants and animals, as well as to rebuild natural capital, the South Bay Salt Pond Restoration Project (SBSPRP) is focused on restoring a portion of the over 15,000 acres of wetlands in California's South San Francisco Bay. The process of restoration begins when a levee is breached; the bay water and sediment flow into the ponds and eventually restore natural tidal marshes. Since the spring of 2010 the NASA Ames Research Center (ARC) DEVELOP student internship program has collaborated with the South Bay Salt Pond Restoration Project (SBSPRP) to study the effects of these restoration efforts and to provide valuable information to assist in habitat management and ecological forecasting. All of the studies were based on remote sensing techniques -- NASA's area of expertise in the field of Earth Science, and used various analytical techniques such as predictive modeling, flora and fauna classification, and spectral detection, to name a few. Each study was conducted by a team of aspiring scientists as a part of the DEVELOP program at Ames

    MicroRNA-125b transforms myeloid cell lines by repressing multiple mRNA

    Get PDF
    Background: We previously described a t(2;11)(p21;q23) chromosomal translocation found in patients with myelodysplasia or acute myeloid leukemia that leads to over-expression of the microRNA miR-125b, and we showed that transplantation of mice with murine stem/progenitor cells overexpressing miR-125b is able to induce leukemia. In this study, we investigated the mechanism of myeloid transformation by miR-125b. Design and Methods: To investigate the consequences of miR-125b over-expression on myeloid differentiation, apoptosis and proliferation, we used the NB4 and HL60 human promyelocytic cell lines and the 32Dclone3 murine promyelocytic cell line. To test whether miR-125b is able to transform myeloid cells, we used the non-tumorigenic and interleukin-3-dependent 32Dclone3 cell line over-expressing miR-125b, in xenograft experiments in nude mice and in conditions of interleukin-3 deprivation. To identify new miR-125b targets, we compared, by RNA-sequencing, the transcriptome of cell lines that do or do not over-express miR-125b. Results: We showed that miR-125b over-expression blocks apoptosis and myeloid differentiation and enhances proliferation in both species. More importantly, we demonstrated that miR-125b is able to transform the 32Dclone3 cell line by conferring growth independence from interleukin-3; xenograft experiments showed that these cells form tumors in nude mice. Using RNA-sequencing and quantitative real-time polymerase chain reaction experiments, we identified multiple miR-125b targets. We demonstrated that ABTB1, an anti-proliferative factor, is a new direct target of miR-125b and we confirmed that CBFB, a transcription factor involved in hematopoiesis, is also targeted by miR-125b. MiR-125b controls apoptosis by down-regulating genes involved in the p53 pathway including BAK1 and TP53INP1. Conclusions: This study demonstrates that in a myeloid context, miR-125b is an oncomiR able to transform cell lines. miR-125b blocks myeloid differentiation in part by targeting CBFB, blocks apoptosis through down-regulation of multiple genes involved in the p53 pathway, and confers a proliferative advantage to human and mouse myeloid cell lines in part by targeting ABTB1.Leukemia & Lymphoma Society of AmericaNational Institutes of Health (U.S.) (NIH grant DK068348)National Institutes of Health (U.S.) (NIH grant 5P01 HL066105

    MYSEA Testbed

    Get PDF
    The technical vision of the emerging net-centric Global Information Grid (GIG) encompasses support for high assurance authentication and multilevel security (MLS) as well as flexible, dynamic security policies. The GIG is intended to address the inefficient exchange of information in current military and intelligence operations that utilize a variety of specialized (so-called "stove-piped") systems. In this context, secure information access problems are exacerbated by the need to share information from networks at different classifications (e.g., Unclassified, Secret, and Top Secret) and within multinational coalitions in episodic, ad hoc situations. These challenges provide the impetus for the creation of the Monterey Security Architecture (MYSEA) Testbed. The purpose of this Testbed is to support research in high assurance multilevel security (MLS) [1, 2] and dynamic security, two areas that are critical to the realization of the GIG's assured information sharing vision.Approved for public release; distribution is unlimited

    Trusted emergency management

    Get PDF
    The ability for emergency first responders to access sensitive information for which they have not been pre-vetted can save lives and property. We describe a trusted emergency management solution for ensuring that sensitive information is protected from unauthorized access, while allowing for extraordinary access to be authorized under the duress of an emergency. Our solution comprises an emergency access control policy, an operational model and a scalable system security architecture. The operational model involves endusers who are on call as first responders, providers of critical information, and a coordinating authority. Extraordinary access to information is allowed to occur only during emergencies, and only in a confined emergency partition, which is unavailable before the emergency and can be completely purged after the emergency. As all information remains within its assigned partition, after the emergency the system can meaningfully enforce its pre-emergency access control policy. A major component of the architecture is the end-user device, and we describe mechanisms on the device for secure storage of data, and for management of emergency state, to indicate feasibility.Grant numbers: CNS-0430566 and CNS-0430598.Approved for public release; distribution is unlimited
    corecore