6,602 research outputs found

    Does geothermal exploitation trigger earthquakes in Tuscany?

    Get PDF
    For the past 25 years, power production has been accompanied by a small but steady increase in seismicity near geothermal wells. A new project seeks to explore why

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users

    Infrared Spectroscopy of Molecular Supernova Remnants

    Get PDF
    We present Infrared Space Observatory spectroscopy of sites in the supernova remnants W28, W44, and 3C391, where blast waves are impacting molecular clouds. Atomic fine-structure lines were detected from C, N, O, Si, P, and Fe. The S(3) and S(9) lines of H2 were detected for all three remnants. The observations require both shocks into gas with moderate (~ 100 /cm3) and high (~10,000 /cm3) pre-shock densities, with the moderate density shocks producing the ionic lines and the high density shock producing the molecular lines. No single shock model can account for all of the observed lines, even at the order of magnitude level. We find that the principal coolants of radiative supernova shocks in moderate-density gas are the far-infrared continuum from dust grains surviving the shock, followed by collisionally-excited [O I] 63.2 and [Si II] 34.8 micron lines. The principal coolant of the high-density shocks is collisionally-excited H2 rotational and ro-vibrational line emission. We systematically examine the ground-state fine structure of all cosmically abundant elements, to explain the presence or lack of all atomic fine lines in our spectra in terms of the atomic structure, interstellar abundances, and a moderate-density, partially-ionized plasma. The [P II] line at 60.6 microns is the first known astronomical detection. There is one bright unidentified line in our spectra, at 74.26 microns. The presence of bright [Si II] and [Fe II] lines requires partial destruction of the dust. The required gas-phase abundance of Fe suggests 15-30% of the Fe-bearing grains were destroyed. The infrared continuum brightness requires ~1 Msun of dust survives the shock, suggesting about 1/3 of the dust mass was destroyed, in agreement with the depletion estimate and with theoretical models for dust destruction.Comment: 40 pages; 10 figures; accepted by ApJ July 11, 200

    Extracorporeal support for pulmonary resection: current indications and results.

    Get PDF
    Extracorporeal assistances are exponentially used for patients, with acute severe but reversible heart or lung failure, to provide more prolonged support to bridge patients to heart and/or lung transplantation. However, experience of use of extracorporeal assistance for pulmonary resection is limited outside lung transplantation. Airways management with standard mechanical ventilation system may be challenging particularly in case of anatomical reasons (single lung), presence of respiratory failure (ARDS), or complex tracheo-bronchial resection and reconstruction. Based on the growing experience during lung transplantation, more and more surgeons are now using such devices to achieve good oxygenation and hemodynamic support during such challenging cases. We review the different extracorporeal device and attempt to clarify the current practice and indications of extracorporeal support during pulmonary resection

    Surface-induced charge state conversion of nitrogen-vacancy defects in nanodiamonds

    Full text link
    We present a study of the charge state conversion of single nitrogen-vacancy (NV) defects hosted in nanodiamonds (NDs). We first show that the proportion of negatively-charged NV^{-} defects, with respect to its neutral counterpart NV0^{0}, decreases with the size of the ND. We then propose a simple model based on a layer of electron traps located at the ND surface which is in good agreement with the recorded statistics. By using thermal oxidation to remove the shell of amorphous carbon around the NDs, we demonstrate a significant increase of the proportion of NV^{-} defects in 10-nm NDs. These results are invaluable for further understanding, control and use of the unique properties of negatively-charged NV defects in diamondComment: 6 pages, 4 figure

    The Genetic and Environmental Sources of Resemblance Between Normative Personality and Personality Disorder Traits

    Get PDF
    Recent work has suggested a high level of congruence between normative personality, most typically represented by the big five factors, and abnormal personality traits. In 2,293 Norwegian adult twins ascertained from a population-based registry, the authors evaluated the degree of sharing of genetic and environmental influences on normative personality, assessed by the Big Five Inventory (BFI), and personality disorder traits (PDTs), assessed by the Personality Inventory for DSM-S-Norwegian Brief Form (PID-5NBF). For four of the five BFI dimensions, the strongest genetic correlation was observed with the expected PID-5-NBF dimension (e.g., neuroticism with negative affectivity [+], conscientiousness with disinhibition [-]). However, neuroticism, conscientiousness, and agreeableness had substantial genetic correlations with other PID-S-NBF dimensions (e.g., neuroticism with compulsivity [+], agreeableness with detachment [-]). Openness had no substantial genetic correlations with any PID-5-NBF dimension. The proportion of genetic risk factors shared in aggregate between the BFI traits and the PID-5-NBF dimensions was quite high for conscientiousness and neuroticism, relatively robust for extraversion and agreeableness, but quite low for openness. Of the six PID-S-NBF dimensions, three (negative affectivity, detachment, and disinhibition) shared, in aggregate, most of their genetic risk factors with normative personality traits. Genetic factors underlying psychoticism, antagonism, and compulsivity were shared to a lesser extent, suggesting that they are influenced by etiological factors not well indexed by the BFI

    Transcriptional activation of pericentromeric satellite repeats and disruption of centromeric clustering upon proteasome inhibition

    No full text
    Heterochromatinisation of pericentromeres, which in mice consist of arrays of major satellite repeats, are important for centromere formation and maintenance of genome stability. The dysregulation of this process has been linked to genomic stress and various cancers. Here we show in mice that the proteasome binds to major satellite repeats and proteasome inhibition by MG132 results in their transcriptional de-repression; this de-repression is independent of cell-cycle perturbation. The transcriptional activation of major satellite repeats upon proteasome inhibition is accompanied by delocalisation of heterochromatin protein 1 alpha (HP1α) from chromocentres, without detectable change in the levels of histone H3K9me3, H3K4me3, H3K36me3 and H3 acetylation on the major satellite repeats. Moreover, inhibition of the proteasome was found to increase the number of chromocentres per cell, reflecting destabilisation of the chromocentre structures. Our findings suggest that the proteasome plays a role in maintaining heterochromatin integrity of pericentromeres

    Robust T1-Weighted Structural Brain Imaging and Morphometry at 7T Using MP2RAGE.

    Get PDF
    PURPOSE: To suppress the noise, by sacrificing some of the signal homogeneity for numerical stability, in uniform T1 weighted (T1w) images obtained with the magnetization prepared 2 rapid gradient echoes sequence (MP2RAGE) and to compare the clinical utility of these robust T1w images against the uniform T1w images. MATERIALS AND METHODS: 8 healthy subjects (29.0±4.1 years; 6 Male), who provided written consent, underwent two scan sessions within a 24 hour period on a 7T head-only scanner. The uniform and robust T1w image volumes were calculated inline on the scanner. Two experienced radiologists qualitatively rated the images for: general image quality; 7T specific artefacts; and, local structure definition. Voxel-based and volume-based morphometry packages were used to compare the segmentation quality between the uniform and robust images. Statistical differences were evaluated by using a positive sided Wilcoxon rank test. RESULTS: The robust image suppresses background noise inside and outside the skull. The inhomogeneity introduced was ranked as mild. The robust image was significantly ranked higher than the uniform image for both observers (observer 1/2, p-value = 0.0006/0.0004). In particular, an improved delineation of the pituitary gland, cerebellar lobes was observed in the robust versus uniform T1w image. The reproducibility of the segmentation results between repeat scans improved (p-value = 0.0004) from an average volumetric difference across structures of ≈6.6% to ≈2.4% for the uniform image and robust T1w image respectively. CONCLUSIONS: The robust T1w image enables MP2RAGE to produce, clinically familiar T1w images, in addition to T1 maps, which can be readily used in uniform morphometry packages
    corecore