540,274 research outputs found

    Materials Development: Pitfalls, Successes, and Lessons

    Get PDF
    The incorporation of new or improved materials in aerospace systems, or indeed any systems, can yield tremendous payoffs in the system performance or cost, and in many cases can be enabling for a mission or concept. However, the availability of new materials requires advance development, and too often this is neglected or postponed, leaving a project or mission with little choice. In too many cases, the immediate reaction is to use what was used before; this usually turns out not to be possible and results in large sums of money, and amounts of time, being expended on reinvention rather than development of a material with extended capabilities. Material innovation and development is time consuming, with some common wisdom claiming that the timeline is at least 20 years. This time expands considerably when development is stopped and restarted, or knowledge is lost. Down selection of materials is necessary, especially as the Technical Readiness Level (TRL) increases. However, the costs must be considered and approaches should be taken to retain knowledge and allow for restarting the development process. Regardless of the exact time required, it is clear that it is necessary to have materials, at all stages of development, in a research and development pipeline and available for maturation as required. This talk will discuss some of theses issues, including some of the elements for a development path for materials. Some history of materials developments will be included. The usefulness of computational materials science, as a route to decreasing material development time, will be an important element of this discussion. Collaboration with outside institutions and nations is also critical for innovation, but raises the issues of intellectual property and protections, and national security (ITAR rules, for example)

    Limits and opportunities of risk analysis application in railway systems

    Get PDF
    Risk Analysis is a collection of methods widely used in many industrial sectors. In the transport sector it has been particularly used for air transport applications. The reasons for this wide use are well-known: risk analysis allows to approach the safety theme in a stochastic - rather than deterministic - way, it forces to break down the system in sub-components, last but not least it allows a comparison between solutions with different costs, introducing de facto an element of economic feasibility of the project alternatives in the safety field. Apart from the United Kingdom, in Europe the application of this tool in the railway sector is relatively recent. In particular Directive 2004/49/EC (the "railway safety directive") provides for compulsory risk assessment in relation to the activities of railway Infrastructure Managers (IMs) and of Railway Undertakings (RUs). Nevertheless the peculiarity of the railway system - in which human, procedural, environmental and technological components have a continuous interchange and in which human responsibilities and technological functions often overlap - induced the EC to allow wide margins of subjectivity in the interpretation of risk assessment. When enacting Commission Regulation (EC) No 352/2009 which further regulates this subject, a risk assessment is considered positive also if the IM or RU declare to take safety measures widely used in normal practice. The paper shows the results of a structured comparative analysis of the rail sector and other industrial sectors, which illustrate the difficulties, but also the opportunities, of a transfer towards the railway system of the risk analysis methods currently in use for the other systems

    Experience in using a typed functional language for the development of a security application

    Full text link
    In this paper we present our experience in developing a security application using a typed functional language. We describe how the formal grounding of its semantic and compiler have allowed for a trustworthy development and have facilitated the fulfillment of the security specification.Comment: In Proceedings F-IDE 2014, arXiv:1404.578

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    Cyber security investigation for Raspberry Pi devices

    Get PDF
    Big Data on Cloud application is growing rapidly. When the cloud is attacked, the investigation relies on digital forensics evidence. This paper proposed the data collection via Raspberry Pi devices, in a healthcare situation. The significance of this work is that could be expanded into a digital device array that takes big data security issues into account. There are many potential impacts in health area. The field of Digital Forensics Science has been tagged as a reactive science by some who believe research and study in the field often arise as a result of the need to respond to event which brought about the needs for investigation; this work was carried as a proactive research that will add knowledge to the field of Digital Forensic Science. The Raspberry Pi is a cost-effective, pocket sized computer that has gained global recognition since its development in 2008; with the wide spread usage of the device for different computing purposes. Raspberry Pi can potentially be a cyber security device, which can relate with forensics investigation in the near future. This work has used a systematic approach to study the structure and operation of the device and has established security issues that the widespread usage of the device can pose, such as health or smart city. Furthermore, its evidential information applied in security will be useful in the event that the device becomes a subject of digital forensic investigation in the foreseeable future. In healthcare system, PII (personal identifiable information) is a very important issue. When Raspberry Pi plays a processor role, its security is vital; consequently, digital forensics investigation on the Raspberry Pies becomes necessary

    Supporting Career Development and Employment: Benefits Planning, Assistance and Outreach (BPA&O) and Protection and Advocacy for Beneficiaries of Social Security (PABSS)

    Get PDF
    This training curriculum is dedicated to increasing knowledge and understanding of the Social Security Administration\u27s disability and return to work programs and work incentive provisions as prescribed in the Social Security Act and Ticket to Work and Work Incentives Improvement Act of 1999 as well as other federal benefit programs. These informational resources were compiled and edited to provide continuing education and print materials for benefits specialists and protection and advocacy personnel on the interplay of these benefit programs and impact or employment
    corecore