322,588 research outputs found
An Easy-to-Construct Automated Winkler Titration System
The instrument described in this report is an updated version of the high precision, automated Winkler titration system described by Friederich et al.(1984). The original instrument was based on the work of Bryan et al. (1976) who developed a colorimetric endpoint
detector and on the work of Williams and Jenkinson (1982) who produced an automated system that used this detector.
The goals of our updated version of the device described by Friederich et al. (1984) were as follows:
1) Move control of the system to the MS-DOS environment because HP-85 computers are no longer in production and because more user-friendly programs could be written using the IBM XT or AT computers that control the new device.
2) Use more "off the shelf" components and reduce the parts count in the new system so that it could be easily constructed and maintained.
This report describes how to construct and use the new automated Winkler titration device. It also includes information on the chemistry of the Winkler titration, and detailed instructions on how to prepare reagents, collect samples, standardize and perform the titrations (Appendix I: Codispoti, L.A. 1991 On the determination of dissolved oxygen in sea water, 15pp.). A disk containing the program needed to operate the new device is also included. (pdf contains 33 pages
Exploitation of Unintentional Ethernet Cable Emissions Using Constellation Based-Distinct Native Attribute (CB-DNA) Fingerprints to Enhance Network Security
This research contributed to the AFIT\u27s Radio Frequency Intelligence (RFINT) program by developing a new device discrimination technique called Constellation-Based Distinct Native Attribute (CB-DNA) Fingerprinting. This is of great interest to the Air Force Research Lab (AFRL), Sensor Directorate, who supported the research and now have new method for improving network security. CB-DNA fingerprints are used to authenticate wired network device identities, thwart unauthorized access, and augment traditional bit-level security measures that area easily bypassed by skilled hackers. Similar to human fingerprint features that uniquely identify individuals, CB-DNA uniquely identifies communication devices and improves the rate at which unauthorized rogue devices are granted network access
Can Jailbreaking Put You In Jail, Broke?
Most Americans own at least one “smart device.” These include smartphones and video game consoles. Device manufacturers limit an owner’s use of his smart device through both licensing agreements and technological measures. While the public largely ignores licensing agreements, the technological measures actively prevent an owner from using his device in whatever manner he sees fit, despite the fact that he owns the device. This prevention has led people to develop methods to circumvent these technological measures. These methods are device- dependent and include “jailbreaking” (iPhones), “modding” (video game consoles), and “rooting” (Androids).
This Note explores whether jailbreak developers or jailbreak users violate the Computer Fraud and Abuse Act, 18 U.S.C. § 1030. Congress passed the Act in response to the threat of criminals hacking into government or bank computers. As such, it makes little sense to apply the Act to people who want more freedom of use of their devices. A large number of smart device users employ some form of jailbreaking. The fact that the government could prosecute them under an anti-hacking statute for violating the licensing agreement for their devices, paves the way for many new and terrifying prosecutions
Health Law Outlook - Volume 3, Issue 2 (Spring 2010)
Inside this issue: Reforming New Jersey\u27s Vaccination Exemption Policy: The Conscientious Exemption Bill, Michael Poreda Value-Based Insurance Design: One Non-Legislative Health Reform Option, Kate Freed The Rigorous Requisites to Compassionate Use in New Jersey: The Highs (and Lows) of Legalizing Medical Marijuana, Nicole Hamberger So Close and Yet So Far: The Debate Over Legalization of Medical Marijuana, Stephanie Mazzaro Accountable Care Organizations: A New Thing With Some Old Problems, Professor Thomas L. Greaney Electronic Cigarettes: A Tobacco Product or a Drug-Device Combination, Mat McKennan He Who Has Health Has Hope, and He Who Has Hope Has Everything : An Analysis of the Health Implications of Child Marriage in West Africa, Dawn Pepin FDA Warnings on the Rise, Not the Usual Suspect: An Evaluation of FDA Regulatory Letter Policy, Rachel Jones End-of-Life Decisions in the Neonatal Intensive Care Unit: Who Gets to Decide?, Constantina Kousolousa
Lessons Learned from a Decade of Providing Interactive, On-Demand High Performance Computing to Scientists and Engineers
For decades, the use of HPC systems was limited to those in the physical
sciences who had mastered their domain in conjunction with a deep understanding
of HPC architectures and algorithms. During these same decades, consumer
computing device advances produced tablets and smartphones that allow millions
of children to interactively develop and share code projects across the globe.
As the HPC community faces the challenges associated with guiding researchers
from disciplines using high productivity interactive tools to effective use of
HPC systems, it seems appropriate to revisit the assumptions surrounding the
necessary skills required for access to large computational systems. For over a
decade, MIT Lincoln Laboratory has been supporting interactive, on-demand high
performance computing by seamlessly integrating familiar high productivity
tools to provide users with an increased number of design turns, rapid
prototyping capability, and faster time to insight. In this paper, we discuss
the lessons learned while supporting interactive, on-demand high performance
computing from the perspectives of the users and the team supporting the users
and the system. Building on these lessons, we present an overview of current
needs and the technical solutions we are building to lower the barrier to entry
for new users from the humanities, social, and biological sciences.Comment: 15 pages, 3 figures, First Workshop on Interactive High Performance
Computing (WIHPC) 2018 held in conjunction with ISC High Performance 2018 in
Frankfurt, German
The Renaissance of Black Phosphorus
One hundred years after its first successful synthesis in the bulk form in
1914, black phosphorus (black P) was recently rediscovered from the perspective
of a two-dimensional (2D) layered material, attracting tremendous interest from
condensed matter physicists, chemists, semiconductor device engineers and
material scientists. Similar to graphite and transition metal dichalcogenides
(TMDs), black P has a layered structure but with a unique puckered single layer
geometry. Because the direct electronic band gap of thin film black P can be
varied from 0.3 to around 2 eV, depending on its film thickness, and because of
its high carrier mobility and anisotropic in-plane properties, black P is
promising for novel applications in nanoelectronics and nanophotonics different
from graphene and TMDs. Black P as a nanomaterial has already attracted much
attention from researchers within the past year. Here, we offer our opinions on
this emerging material with the goal of motivating and inspiring fellow
researchers in the 2D materials community and the broad readership of PNAS to
discuss and contribute to this exciting new field. We also give our
perspectives on future 2D and thin film black P research directions, aiming to
assist researchers coming from a variety of disciplines who are desirous of
working in this exciting research field.Comment: 23 pages, 6 figures, perspective article, appeared online in PNA
AI-Generated Fashion Designs: Who or What Owns the Goods?
As artificial intelligence (“AI”) becomes an increasingly prevalent tool in a plethora of industries in today’s society, analyzing the potential legal implications attached to AI-generated works is becoming more popular. One of the industries impacted by AI is fashion. AI tools and devices are currently being used in the fashion industry to create fashion models, fabric designs, and clothing. An AI device’s ability to generate fashion designs raises the question of who will own the copyrights of the fashion designs. Will it be the fashion designer who hires or contracts with the AI device programmer? Will it be the programmer? Or will it be the AI device itself? Designers invest a lot of talent, time, and finances into designing and creating each article of clothing and accessory it releases to the public; yet, under the current copyright standards, designers will not likely be considered the authors of their creations. Ultimately, this Note makes policy proposals for future copyright legislation within the United States, particularly recommending that AI-generated and AI-assisted designs be copyrightable and owned by the designers who purchase the AI device
What's APPening to news? A mixed-method audience-centred study on mobile news consumption
News is increasingly being consumed on a multitude of media devices, including mobile devices. In recent years, mobile news consumption has permeated individuals’ news consumption repertoires. The main purpose of this study is twofold: (1) gain insight in how mobile news outlets infiltrated the broader news media repertoires of mobile device owners and (2) understand in what circumstances mobile news is consumed within these news media repertoires. The key is to understand how and why this widening agency in appropriating various places and social spaces in everyday life relates to general news media consumption (Peters, 2012). This two-phased study aims to illuminate how mobile device owners position their mobile news consumption in relation to other types of news media outlets. First, a guiding cluster analysis of a large-scale questionnaire (N = 1279) was preformed, indicating three types of news consumers. Second, in order to thicken the originally derived clusters, a mixed-method study was set up, combining objective data originating from mobile device logs with more subjective audience constructions through personal diaries and face-to-face interviews (N = 30). This study reveals the Janus-faced nature of mobile news. On the one hand, the majority of news consumers dominantly relies on traditional media outlets to stay informed, only to supplement with online mobile services in specific circumstances. Even then, there is at least a tendency to stick to trusted brand materials. On the other hand, these mobile news outlets/products do seem to increasingly infiltrate the daily lives of mobile audiences who were previously disengaged with news
- …