1,367 research outputs found
Simple Shelters?: Monitoring Radioactive Fallout Across Canada, 1959–63
During the early Cold War, the Canadian government adivsed public that they could cheaply build fallout shelters in their homes to protect their families from radiation after a nuclear war. Publicly, the government stayed out of the shelter-building business, citing the cost was too high. However, from 1959 to the mid-1960s, the Canadian Army secretly constructed a network of 2,000 fallout shelters in government building: the Nuclear Detonation and Fallout Reporting System. This article explores the origins of this network and the reasons for its decline
Analysis of Computer Network Security Storage System Based on Cloud Computing Environment
A fundamental component of cloud computers from a business perspective is that users are allowed to use any desire and pay with a product that desire. Its cloud services were accessible anytime and anywhere consumers needed them. As a result, consumers are free to purchase whatever IT services they want, and they don't have to worry about how easy things can be managed. The remote server is used in a new information storage computing architecture that is considered an Internet generation. Ensuring security, material at resource providers' sites is a challenge that must be addressed in cloud technology. Thus, rather than reliance on a single provider for knowledge storing, this research implies developing construction for protection of knowledge stockpiling with a variation of operations, in which knowledge is scrambled and divided into numerous cipher frames and distributed across a large number of provider places. This support was applied to provide greater security, scalability, or reliability that was suggested according to the new structure. This paper, presented an encoded model for the cloud environment to improve security. The proposed model comprises the parity metadata for the database management provision to the provider. In the developed encoder chunks parity is not stored within the single resources with the provision of the available information chunks. The constructed security architecture in the RAID layer increases the dependability of the data with the deployment of the RAID 10 deployment. The developed RAID-based encoder chunks exhibit improved efficiency for the higher uptime at a minimal cost
Comparing archival policies for Blue Waters
This paper introduces two new tape archival policies that can im- prove tape archive performance in certain regimes, compared to the classical RAIT (Redundant Array of Independent Tapes) policy. The first policy, PARALLEL, still requires as many parallel tape drives as RAIT but pre-computes large data stripes that are written contiguously on tapes to increase write/read performance. The second policy, VERTICAL, writes contiguous data into a single tape, while updating error correcting information on the fly and delaying its archival until enough data has been archived. This second approach reduces the number of tape drives used for every user request to one. The performance of the three RAIT, PARALLEL and VERTICAL policies is assessed through extensive simulations, using a hardware configuration and a distribution of I/O requests similar to these expected on the Blue Waters system. These simulations show that VERTICAL is the most suitable policy for small files, whereas PARALLEL must be used for files larger than 1 GB. We also demonstrate that RAIT never outperforms both proposed policies, and that a heterogeneous policies mixing VERTICAL and PARALLEL performs 10 times better than any other policy
FORT BRANCH, HAMILTON COUNTY, NORTH CAROLINA: RESEARCH DESIGN AND SITE MANAGEMENT PLAN
The purpose of this thesis is to produce a research design and a site management
plan for Fort Branch, a National Register-listed Confederate earthwork on Rainbow Bend
in Martin County, North Carolina. The thesis discusses the history of Fort Branch,
starting with a history of the Civil War in eastern North Carolina, to provide a context for
the fort’s construction. A specific history of the fort discusses the defenses of Rainbow
Bend and their eventual evolution into what is now Fort Branch. The research design
uses the historical and archaeological background to formulate site-specific
archaeological questions and uses case studies of Civil War archaeology to ensure that
research at Fort Branch is placed within the context of Civil War archaeology. Previous
archaeology, the archaeology of fort construction, an archaeological survey of the site,
the archaeology of skirmishes, the archaeology of encampment, landscape studies, and
the historic cemetery are discussed in this thesis. This research is important because it
will provide the Fort Branch Battlefield Commission with ways to better interpret the
battlefield, enhance its mission of preservation and restoration, and provide ways that the
site can be protected for future generations.M.A
Study program to improve the open-circuit voltage of low resistivity single crystal silicon solar cells
The results of a 14 month program to improve the open circuit voltage of low resistivity silicon solar cells are described. The approach was based on ion implantation in 0.1- to 10.0-ohm-cm float-zone silicon. As a result of the contract effort, open circuit voltages as high as 645 mV (AMO 25 C) were attained by high dose phosphorus implantation followed by furnace annealing and simultaneous SiO2 growth. One key element was to investigate the effects of bandgap narrowing caused by high doping concentrations in the junction layer. Considerable effort was applied to optimization of implant parameters, selection of furnace annealing techniques, and utilization of pulsed electron beam annealing to minimize thermal process-induced defects in the completed solar cells
Monitoring forest canopy alteration around the world with digital analysis of LANDSAT imagery
There are no author-identified significant results in this report
Service-oriented models for audiovisual content storage
What are the important topics to understand if involved with storage services to hold digital audiovisual content? This report takes a look at how content is created and moves into and out of storage; the storage service value networks and architectures found now and expected in the future; what sort of data transfer is expected to and from an audiovisual archive; what transfer protocols to use; and a summary of security and interface issues
- …