47,494 research outputs found

    A Web-Based Distributed Virtual Educational Laboratory

    Get PDF
    Evolution and cost of measurement equipment, continuous training, and distance learning make it difficult to provide a complete set of updated workbenches to every student. For a preliminary familiarization and experimentation with instrumentation and measurement procedures, the use of virtual equipment is often considered more than sufficient from the didactic point of view, while the hands-on approach with real instrumentation and measurement systems still remains necessary to complete and refine the student's practical expertise. Creation and distribution of workbenches in networked computer laboratories therefore becomes attractive and convenient. This paper describes specification and design of a geographically distributed system based on commercially standard components

    Use of airborne vehicles as research platforms

    Get PDF
    This is the accepted version of the following chapter: Gratton, G. 2012. Use of Airborne Vehicles as Research Platforms. Encyclopedia of Aerospace Engineering, which has been published in final form at http://onlinelibrary.wiley.com/doi/10.1002/9780470686652.eae604/full. Copyright @ John Wiley & Sons 2012.The use of aircraft is often valuable to position airborne sensors or to conduct experiments in ways not possible purely on the ground. An airframe, typically an older one, must be selected then adapted to the role – likely to include inlets, windows, structural changes, power supply, computing and data recording capacity, and likely the provision of external hardpoints. Once the research vehicle is created, the instruments on board will require calibration, either in isolation or by intercomparison against already calibrated instruments on board another aircraft. This calibration process will continue throughout the life of the airplane. Additionally, an operating organization must be created and obtain any necessary organizational approvals. For some specialist applications, unmanned aerial vehicles (UAVs) may also be used, which carry some special considerations of autonomy and interoperability, but similar concerns of instrument, vehicle, and operational integrity

    Uranium exploration methodology in cold climates

    Get PDF
    The uranium prospecting boom of the past decade had, as a major consequence, the rapid development and proliferation of exploration methods for source materials. Numerous established methods were developed and refined whilst new techniques were introduced proving, in some instances, to be highly successful. To the explorationist the proliferation of instrumental hardware and detection systems was something of a headache with the result that in uranium exploration, more so than in other types of prospecting, the choice of exploration method at the appropriate stage of prospecting was frequently ill founded. The situation also spawned ‘black box’ purveyors who made extravagant claims for their equipment. Money was wasted through over kill applications of exploration method accompanied in many instances by deficiencies in the interpretation of results. This project was originally conceived as a means of evaluating, reviewing and filtering from a burgeoning array of systems the most appropriate exploration techniques applicable to cold climate environments. This goal has been trimmed somewhat since it had been hoped to incorporate site investigation data assembled in the field by the writer as appropriate case history material. This was not possible and as a consequence this report is a 'state of the art review' of the applicability of currently available techniques in Arctic and Subarctic environments. Reference is made to published case history data, where appropriate, supportive of the techniques or methods reviewed.Abstract -- Introduction -- Prospecting methods in relation to Arctic and Subarctic environments -- Review of direct exploration methods -- Radiometric methods -- Airborne spectrometry -- Car borne and hand held instrumentation -- Geochemical methods -- Soil and stream sediment methods -- Geobotanical methods -- Water sampling - Hydrogeochemical methods -- Other metods -- Optimal exploration method selection -- References -- Table of exploration methods discussed in this report

    Using shared-data localization to reduce the cost of inspector-execution in unified-parallel-C programs

    Get PDF
    Programs written in the Unified Parallel C (UPC) language can access any location of the entire local and remote address space via read/write operations. However, UPC programs that contain fine-grained shared accesses can exhibit performance degradation. One solution is to use the inspector-executor technique to coalesce fine-grained shared accesses to larger remote access operations. A straightforward implementation of the inspector executor transformation results in excessive instrumentation that hinders performance.; This paper addresses this issue and introduces various techniques that aim at reducing the generated instrumentation code: a shared-data localization transformation based on Constant-Stride Linear Memory Descriptors (CSLMADs) [S. Aarseth, Gravitational N-Body Simulations: Tools and Algorithms, Cambridge Monographs on Mathematical Physics, Cambridge University Press, 2003.], the inlining of data locality checks and the usage of an index vector to aggregate the data. Finally, the paper introduces a lightweight loop code motion transformation to privatize shared scalars that were propagated through the loop body.; A performance evaluation, using up to 2048 cores of a POWER 775, explores the impact of each optimization and characterizes the overheads of UPC programs. It also shows that the presented optimizations increase performance of UPC programs up to 1.8 x their UPC hand-optimized counterpart for applications with regular accesses and up to 6.3 x for applications with irregular accesses.Peer ReviewedPostprint (author's final draft

    Shining Light On Shadow Stacks

    Full text link
    Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge,i.e., indirect calls through function pointers and virtual calls. Protecting the backward edge is left to stack canaries, which are easily bypassed through information leaks. Shadow Stacks are a fully precise mechanism for protecting backwards edges, and should be deployed with CFI mitigations. We present a comprehensive analysis of all possible shadow stack mechanisms along three axes: performance, compatibility, and security. For performance comparisons we use SPEC CPU2006, while security and compatibility are qualitatively analyzed. Based on our study, we renew calls for a shadow stack design that leverages a dedicated register, resulting in low performance overhead, and minimal memory overhead, but sacrifices compatibility. We present case studies of our implementation of such a design, Shadesmar, on Phoronix and Apache to demonstrate the feasibility of dedicating a general purpose register to a security monitor on modern architectures, and the deployability of Shadesmar. Our comprehensive analysis, including detailed case studies for our novel design, allows compiler designers and practitioners to select the correct shadow stack design for different usage scenarios.Comment: To Appear in IEEE Security and Privacy 201
    • 

    corecore