322,588 research outputs found

    An Easy-to-Construct Automated Winkler Titration System

    Get PDF
    The instrument described in this report is an updated version of the high precision, automated Winkler titration system described by Friederich et al.(1984). The original instrument was based on the work of Bryan et al. (1976) who developed a colorimetric endpoint detector and on the work of Williams and Jenkinson (1982) who produced an automated system that used this detector. The goals of our updated version of the device described by Friederich et al. (1984) were as follows: 1) Move control of the system to the MS-DOS environment because HP-85 computers are no longer in production and because more user-friendly programs could be written using the IBM XT or AT computers that control the new device. 2) Use more "off the shelf" components and reduce the parts count in the new system so that it could be easily constructed and maintained. This report describes how to construct and use the new automated Winkler titration device. It also includes information on the chemistry of the Winkler titration, and detailed instructions on how to prepare reagents, collect samples, standardize and perform the titrations (Appendix I: Codispoti, L.A. 1991 On the determination of dissolved oxygen in sea water, 15pp.). A disk containing the program needed to operate the new device is also included. (pdf contains 33 pages

    Exploitation of Unintentional Ethernet Cable Emissions Using Constellation Based-Distinct Native Attribute (CB-DNA) Fingerprints to Enhance Network Security

    Get PDF
    This research contributed to the AFIT\u27s Radio Frequency Intelligence (RFINT) program by developing a new device discrimination technique called Constellation-Based Distinct Native Attribute (CB-DNA) Fingerprinting. This is of great interest to the Air Force Research Lab (AFRL), Sensor Directorate, who supported the research and now have new method for improving network security. CB-DNA fingerprints are used to authenticate wired network device identities, thwart unauthorized access, and augment traditional bit-level security measures that area easily bypassed by skilled hackers. Similar to human fingerprint features that uniquely identify individuals, CB-DNA uniquely identifies communication devices and improves the rate at which unauthorized rogue devices are granted network access

    Can Jailbreaking Put You In Jail, Broke?

    Get PDF
    Most Americans own at least one “smart device.” These include smartphones and video game consoles. Device manufacturers limit an owner’s use of his smart device through both licensing agreements and technological measures. While the public largely ignores licensing agreements, the technological measures actively prevent an owner from using his device in whatever manner he sees fit, despite the fact that he owns the device. This prevention has led people to develop methods to circumvent these technological measures. These methods are device- dependent and include “jailbreaking” (iPhones), “modding” (video game consoles), and “rooting” (Androids). This Note explores whether jailbreak developers or jailbreak users violate the Computer Fraud and Abuse Act, 18 U.S.C. § 1030. Congress passed the Act in response to the threat of criminals hacking into government or bank computers. As such, it makes little sense to apply the Act to people who want more freedom of use of their devices. A large number of smart device users employ some form of jailbreaking. The fact that the government could prosecute them under an anti-hacking statute for violating the licensing agreement for their devices, paves the way for many new and terrifying prosecutions

    Health Law Outlook - Volume 3, Issue 2 (Spring 2010)

    Get PDF
    Inside this issue: Reforming New Jersey\u27s Vaccination Exemption Policy: The Conscientious Exemption Bill, Michael Poreda Value-Based Insurance Design: One Non-Legislative Health Reform Option, Kate Freed The Rigorous Requisites to Compassionate Use in New Jersey: The Highs (and Lows) of Legalizing Medical Marijuana, Nicole Hamberger So Close and Yet So Far: The Debate Over Legalization of Medical Marijuana, Stephanie Mazzaro Accountable Care Organizations: A New Thing With Some Old Problems, Professor Thomas L. Greaney Electronic Cigarettes: A Tobacco Product or a Drug-Device Combination, Mat McKennan He Who Has Health Has Hope, and He Who Has Hope Has Everything : An Analysis of the Health Implications of Child Marriage in West Africa, Dawn Pepin FDA Warnings on the Rise, Not the Usual Suspect: An Evaluation of FDA Regulatory Letter Policy, Rachel Jones End-of-Life Decisions in the Neonatal Intensive Care Unit: Who Gets to Decide?, Constantina Kousolousa

    Lessons Learned from a Decade of Providing Interactive, On-Demand High Performance Computing to Scientists and Engineers

    Full text link
    For decades, the use of HPC systems was limited to those in the physical sciences who had mastered their domain in conjunction with a deep understanding of HPC architectures and algorithms. During these same decades, consumer computing device advances produced tablets and smartphones that allow millions of children to interactively develop and share code projects across the globe. As the HPC community faces the challenges associated with guiding researchers from disciplines using high productivity interactive tools to effective use of HPC systems, it seems appropriate to revisit the assumptions surrounding the necessary skills required for access to large computational systems. For over a decade, MIT Lincoln Laboratory has been supporting interactive, on-demand high performance computing by seamlessly integrating familiar high productivity tools to provide users with an increased number of design turns, rapid prototyping capability, and faster time to insight. In this paper, we discuss the lessons learned while supporting interactive, on-demand high performance computing from the perspectives of the users and the team supporting the users and the system. Building on these lessons, we present an overview of current needs and the technical solutions we are building to lower the barrier to entry for new users from the humanities, social, and biological sciences.Comment: 15 pages, 3 figures, First Workshop on Interactive High Performance Computing (WIHPC) 2018 held in conjunction with ISC High Performance 2018 in Frankfurt, German

    The Renaissance of Black Phosphorus

    Get PDF
    One hundred years after its first successful synthesis in the bulk form in 1914, black phosphorus (black P) was recently rediscovered from the perspective of a two-dimensional (2D) layered material, attracting tremendous interest from condensed matter physicists, chemists, semiconductor device engineers and material scientists. Similar to graphite and transition metal dichalcogenides (TMDs), black P has a layered structure but with a unique puckered single layer geometry. Because the direct electronic band gap of thin film black P can be varied from 0.3 to around 2 eV, depending on its film thickness, and because of its high carrier mobility and anisotropic in-plane properties, black P is promising for novel applications in nanoelectronics and nanophotonics different from graphene and TMDs. Black P as a nanomaterial has already attracted much attention from researchers within the past year. Here, we offer our opinions on this emerging material with the goal of motivating and inspiring fellow researchers in the 2D materials community and the broad readership of PNAS to discuss and contribute to this exciting new field. We also give our perspectives on future 2D and thin film black P research directions, aiming to assist researchers coming from a variety of disciplines who are desirous of working in this exciting research field.Comment: 23 pages, 6 figures, perspective article, appeared online in PNA

    AI-Generated Fashion Designs: Who or What Owns the Goods?

    Get PDF
    As artificial intelligence (“AI”) becomes an increasingly prevalent tool in a plethora of industries in today’s society, analyzing the potential legal implications attached to AI-generated works is becoming more popular. One of the industries impacted by AI is fashion. AI tools and devices are currently being used in the fashion industry to create fashion models, fabric designs, and clothing. An AI device’s ability to generate fashion designs raises the question of who will own the copyrights of the fashion designs. Will it be the fashion designer who hires or contracts with the AI device programmer? Will it be the programmer? Or will it be the AI device itself? Designers invest a lot of talent, time, and finances into designing and creating each article of clothing and accessory it releases to the public; yet, under the current copyright standards, designers will not likely be considered the authors of their creations. Ultimately, this Note makes policy proposals for future copyright legislation within the United States, particularly recommending that AI-generated and AI-assisted designs be copyrightable and owned by the designers who purchase the AI device

    What's APPening to news? A mixed-method audience-centred study on mobile news consumption

    Get PDF
    News is increasingly being consumed on a multitude of media devices, including mobile devices. In recent years, mobile news consumption has permeated individuals’ news consumption repertoires. The main purpose of this study is twofold: (1) gain insight in how mobile news outlets infiltrated the broader news media repertoires of mobile device owners and (2) understand in what circumstances mobile news is consumed within these news media repertoires. The key is to understand how and why this widening agency in appropriating various places and social spaces in everyday life relates to general news media consumption (Peters, 2012). This two-phased study aims to illuminate how mobile device owners position their mobile news consumption in relation to other types of news media outlets. First, a guiding cluster analysis of a large-scale questionnaire (N = 1279) was preformed, indicating three types of news consumers. Second, in order to thicken the originally derived clusters, a mixed-method study was set up, combining objective data originating from mobile device logs with more subjective audience constructions through personal diaries and face-to-face interviews (N = 30). This study reveals the Janus-faced nature of mobile news. On the one hand, the majority of news consumers dominantly relies on traditional media outlets to stay informed, only to supplement with online mobile services in specific circumstances. Even then, there is at least a tendency to stick to trusted brand materials. On the other hand, these mobile news outlets/products do seem to increasingly infiltrate the daily lives of mobile audiences who were previously disengaged with news
    • …
    corecore