927 research outputs found

    The Dormant Commerce Clause and State Regulation of the Internet: Are Laws Protecting Minors From Sexual Predators Constitutionally Different Than Those Protecting Minors From Sexually Explicit Materials?

    Get PDF
    Several states have enacted statutes to protect minors from harmful or obscene materials disseminated over the Internet, as well as from pedophiles seeking to use the Internet to lure them into sexual conduct. State and federal courts have diverged in their analysis of the Dormant Commerce Clause\u27s impact on state regulation in these areas. While state courts have held that the Dormant Commerce Clause does not invalidate state luring statutes, federal courts have been consistent in finding state dissemination statutes unconstitutional. This iBrief summarizes recent state and federal jurisprudence in this area and concludes that state courts have not been successful in distinguishing state luring statutes from federal case law on state dissemination statutes. Therefore, state courts have prematurely aborted the Dormant Commerce Clause examination

    Evolution Of Object-Oriented Methods From The Reverse Engineering Of Programming Code

    Get PDF
    Many software development projects fail because of their inability to deliver the product in a timely and cost-effective manner, i.e. the software crisis. In a commercial airline company, a safety-critical system for preventing a “single-point of failure” needs to be developed and certified. To meet the project deadline an Agile approach was used in developing the first portion of the system. An appropriate software development methodology, i.e. reverse-engineering was then applied to the software system to develop method that would be used in system maintenance and evaluation. The goals of this research study were to develop a segment of one of the UML activity diagrams as a purposeful and systematic methodology for conducting reverse-engineering on complete safety critical systems of the airline system. This was done to capture very high and very low-level designs of software engineering and to verify and validate the source code. The UML activity diagram was developed from a source code of an aircraft-gate assignment system. This was done in order to capture very low-level details of the program code, from which the model was reversed engineered. The diagram was made to represent the entire source code, by going through and analyzing the source code line-by-line. Whenever there is a condition in the source code, the diagram branches out and interacts with other activities. To directly see the flow of the program, the directional arrows in the diagram were assigned. With the data flow of the source code being represented in the visual format of the UML activity diagram, the interaction of each component can be easily understood and identified. The user can see the information that goes into each method, and what each method required. Once the user understands the flow of data within the program, the user can validate and verify that the software was developed with correct methods. As the UML activity diagram represented the pseudo code of the program in a graphic way, it should be a good candidate to be used as a tool to help in reverse-engineering safety critical systems of an airline system. The UML activity diagram should be able to represent all aspects required in the deconstruction phrase of the reverse-engineering methodology. With the source code in the graphic diagram form, it should be much easier to identify the structure, functions and determine how each aspect of the program interact with each other so that the activity diagram can be used in a formal methodology for reverse-engineering

    Development and Assessment of Courses in Defensive Security and Ethical Hacking

    Get PDF
    In order to combat malicious actors of the digital age, cybersecurity experts have quickly become essential in almost every company. New employees must be ready to \u27hit the ground running\u27 in this dynamic and frequently changing fields. To effectively prepare students for careers in cybersecurity , enhancements are needed to traditional class-based lecture techniques. This work presents and evaluates two different methodologies used in cybersecurity education: a gamification approach which used a capture the flag model and competition -based approach.https://openprairie.sdstate.edu/asee_nmws_2020_posters/1000/thumbnail.jp

    Application of Pyroprinting for Source Tracking of E. coli in Pennington Creek

    Get PDF
    The goal of this project is to determine the source of fecal contamination in Pennington Creek. Dangerously high numbers of E. coli were recorded in the creek by the Morro Bay National Estuary Program (MBNEP) over the last 10 years. This is of particular concern because the creek runs directly through an outdoor school for K-12 education. One potential source of the contamination is the cattle in fields on either side of the creek for several miles, though they are supposedly kept out by fences. Another possibility is local wildlife—specifically wild turkeys, which roam around in flocks of over 100 and commonly roost directly over the creek. The Cal Poly Pyroprinting Project, housed in the Chevron Center for Applications in Biotechnology, is building a comprehensive database of genetic fingerprints (pyroprints) of E. coli from local wildlife and domestic animals for use in bacterial source tracking. Strain-specific pyroprints of E. coli isolates from the water body of interest are matched against wildlife pyroprints in the database. The two are matched up in a way similar to the matching of fingerprints, hence the term “pyroprints”. We will collect E. coli from two locations along Pennington Creek (labeled CPN and PEN) over a 16-month period, with additional bimonthly monitoring of overall E. coli counts. The two sites, along with an extended sampling period, will provide a good idea of the spatiotemporal fluctuations in concentration and sources of E. coli in the creek. The MBNEP has offered to help with the project by providing half of the supplies and reagents. The results of this project will be ultimately used by Cal Poly and the MBNEP to guide management decisions regarding Pennington Creek

    The Interaction of Phospholipase C-{beta}3 with Shank2 Regulates mGluR-mediated Calcium Signal

    Get PDF
    Phospholipase C-{beta} isozymes that are activated by G protein-coupled receptors (GPCR) and heterotrimeric G proteins carry a PSD-95/Dlg/ZO-1 (PDZ) domain binding motif at their C terminus. Through interactions with PDZ domains, this motif may endow the PLC-{beta} isozyme with specific roles in GPCR signaling events that occur in compartmentalized regions of the plasma membrane. In this study, we identified the interaction of PLC-{beta}3 with Shank2, a PDZ domain-containing multimodular scaffold in the postsynaptic density (PSD). The C terminus of PLC-{beta}3, but not other PLC-{beta} isotypes, specifically interacts with the PDZ domain of Shank2. Homer 1b, a Shank-interacting protein that is linked to group I metabotropic glutamate receptors and IP3 receptors, forms a multiple complex with Shank2 and PLC-{beta}3. Importantly, microinjection of a synthetic peptide specifically mimicking the C terminus of PLC-{beta}3 markedly reduces the mGluR-mediated intracellular calcium response. These results demonstrate that Shank2 brings PLC-{beta}3 closer to Homer 1b and constitutes an efficient mGluR-coupled signaling pathway in the PSD region of neuronal synapses

    Towards Energy Efficiency in RAN Network Slicing

    Full text link
    Network slicing is one of the major catalysts to turn future telecommunication networks into versatile service platforms. Along with its benefits, network slicing is introducing new challenges in the development of sustainable network operations. In fact, guaranteeing slices requirements comes at the cost of additional energy consumption, in comparison to non-sliced networks. Yet, one of the main goals of operators is to offer the diverse 5G and beyond services, while ensuring energy efficiency. To this end, we study the problem of slice activation/deactivation, with the objective of minimizing energy consumption and maximizing the users quality of service (QoS). To solve the problem, we rely on two Multi-Armed Bandit (MAB) agents to derive decisions at individual base stations. Our evaluations are conducted using a real-world traffic dataset collected over an operational network in a medium size French city. Numerical results reveal that our proposed solutions provide approximately 11-14\% energy efficiency improvement compared to a configuration where all the slice instances are active, while maintaining the same level of QoS. Moreover, our work explicitly shows the impact of prioritizing the energy over QoS, and vice versa

    empirical evidence from Myanmar (1989~2015)

    Get PDF
    Thesis(Master) --KDI School:Master of Public Policy,2017This study analyzes the growth rate of Myanmar economic by inflow of foreign direct investment based on Vector Error Correction (VECM) Model. The objective of this paper is to determine whether getting foreign direct investment has positive or negative effects on the growth rate of GDP has positive or negative effects in the long-run. This study discovered that the growth rate of GDP is positively associated with getting foreign direct investment in the long-run but it is not statistically significant. Moreover, this study found that the negative correlation between the balance of trade and the gowth rate of GDP in the long-run, which owes to a trade deficit situation of Myanmar economy. Therefore, this study suggests that the government should focus on the economic stability and sound foreign direct investment policies to gain growth in Myanmar economy.1. Introduction 2. Literature Review 3. Empirical Analysis 4. Results and Discussion 5. ConclusionmasterpublishedZun PANN

    Going Green in RAN Slicing

    Full text link
    Network slicing is essential for transforming future telecommunication networks into versatile service platforms, but it also presents challenges for sustainable network operations. While meeting the requirements of network slices incurs additional energy consumption compared to non-sliced networks, operators strive to offer diverse 5G and beyond services while maintaining energy efficiency. In this study, we address the issue of slice activation/deactivation to reduce energy consumption while maintaining the user quality of service (QoS). We employ Deep Contextual Multi-Armed Bandit and Thompson Sampling Contextual Multi-Armed Bandit agents to make activation/deactivation decisions for individual clusters. Evaluations are performed using the NetMob23 dataset, which captures the spatio-temporal consumption of various mobile services in France. Our simulation results demonstrate that our proposed solutions provide significant reductions in network energy consumption while ensuring the QoS remains at a similar level compared to a scenario where all slice instances are active
    • …
    corecore