2,660 research outputs found

    Reel safety brake

    Get PDF
    A braking apparatus is described for a tape transport device having two stacked coaxial reels and feelers mounted in proximity to the reels for sensing the tape being wound on each reel. A device is mounted in proximity to adjacent central hubs of the reels to a simultaneously, frictionally engage both hubs and brake both reels. A mechanical actuator is coupled to both feelers and to the brake device. The brake means comprises a pair of rubber shoulders that extend in opposite directions relative to a common axis, and turns about the axis in response to either of the feelers

    Soil moisture by extraction and gas chromatography

    Get PDF
    To determine moisture content of soils rapidly and conveniently extract moisture with methanol and determine water content of methanol extract by gas chromatography. Moisture content of sample is calculated from weight of water and methanol in aliquot and weight of methanol added to sample

    Overview: Exobiology in solar system exploration

    Get PDF
    In Aug. 1988, the NASA Ames Research Center held a three-day symposium in Sunnyvale, California, to discuss the subject of exobiology in the context of exploration of the solar system. Leading authorities in exobiology presented invited papers and assisted in setting future goals. The goals they set were as follows: (1) review relevant knowledge learned from planetary exploration programs; (2) detail some of the information that is yet to be obtained; (3) describe future missions and how exobiologists, as well as other scientists, can participate; and (4) recommend specific ways exobiology questions can be addressed on future exploration missions. These goals are in agreement with those of the Solar System Exploration Committee (SSEC) of the NASA Advisory Council. Formed in 1980 to respond to the planetary exploration strategies set forth by the Space Science Board of the National Academy of Sciences' Committee on Planetary and Lunar Exploration (COMPLEX), the SSEC's main function is to review the entire planetary program. The committee formulated a long-term plan (within a constrained budget) that would ensure a vital, exciting, and scientifically valuable effort through the turn of the century. The SSEC's goals include the following: determining the origin, evolution, and present state of the solar system; understanding Earth through comparative planetology studies; and revealing the relationship between the chemical and physical evolution of the solar system and the appearance of life. The SSEC's goals are consistent with the over-arching goal of NASA's Exobiology Program, which provides the critical framework and support for basic research. The research is divided into the following four elements: (1) cosmic evolution of the biogenic compounds; (2) prebiotic evolution; (3) origin and early evolution of life; and (4) evolution of advanced life

    Modulated voltage metastable ionization detector

    Get PDF
    The output current from a metastable ionization detector (MID) is applied to a modulation voltage circuit. An adjustment is made to balance out the background current, and an output current, above background, is applied to an input of a strip chart recorder. For low level concentrations, i.e., low detected output current, the ionization potential will be at a maximum and the metastable ionization detector will operate at its most sensitive level. When the detected current from the metastable ionization detector increases above a predetermined threshold level, a voltage control circuit is activated which turns on a high voltage transistor which acts to reduce the ionization potential. The ionization potential applied to the metastable ionization detector is then varied so as to maintain the detected signal level constant. The variation in ionization potential is now related to the concentration of the constituent and a representative amplitude is applied to another input of said strip chart recorder

    Automatic amino acid analyzer

    Get PDF
    Analyzer operates unattended or up to 15 hours. It has an automatic sample injection system and can be programmed. All fluid-flow valve switching is accomplished pneumatically from miniature three-way solenoid pilot valves

    Licorice Lize

    Get PDF
    https://digitalcommons.library.umaine.edu/mmb-vp/3529/thumbnail.jp

    Gas chromatography: Possible application of advanced instrumentation developed for solar system exploration to space station cabin atmospheres

    Get PDF
    Gas chromatography (GC) technology was developed for flight experiments in solar system exploration. The GC is a powerful analytical technique with simple devices separating individual components from complex mixtures to make very sensitive quantitative and qualitative measurements. It monitors samples containing mixtures of fixed gases and volatile organic molecules. The GC was used on the Viking mission in support of life detection experiments and on the Pioneer Venus Large Probe to determine the composition of the venusian atmosphere. A flight GC is under development to study the progress and extent of STS astronaut denitrogenation prior to extravehicular activity. Advanced flight GC concepts and systems for future solar system exploration are also studied. Studies include miniature ionization detectors and associated control systems capable of detecting from ppb up to 100% concentration levels. Further miniaturization is investigated using photolithography and controlled chemical etching in silicon wafers. Novel concepts such as ion mobility drift spectroscopy and multiplex gas chromatography are also developed for future flight experiments. These powerful analytical concepts and associated hardware are ideal for the monitoring of cabin atmospheres containing potentially dangerous volatile compounds

    Prevention of occupational exposure of tuberculosis to health care workers

    Get PDF
    The resurgence of tuberculosis in the United States within the past decade has prompted the health care community to develop tuberculosis elimination policies. However, recent outbreaks of tuberculosis have proved to be resistant to multiple antibiotics. Tuberculosis infections among health care workers is also rising. This increase in occupational exposures has prompted the examination of current exposure control measures. The occupational exposure to tuberculosis is prevented by the use of administrative policies, engineering controls and personal protective equipment. Each control measure has inherent strengths and weaknesses and when implemented through an exposure control plan the risk of occupational exposure can be reduced. Control techniques currently utilized may benefit from additional research and development. The research will not be squandered if tuberculosis is ultimately eliminated, as the knowledge gained may prove beneficial for exposure protection from future bio-hazardous aerosols

    The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

    Full text link
    The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations about malicious intentions behind such anomalies. Surprisingly, almost all discussions in the current literature assume that hijacking incidents are enabled by the lack of security mechanisms in the inter-domain routing protocol BGP. In this paper, we discuss an attacker model that accounts for the hijacking of network ownership information stored in Regional Internet Registry (RIR) databases. We show that such threats emerge from abandoned Internet resources (e.g., IP address blocks, AS numbers). When DNS names expire, attackers gain the opportunity to take resource ownership by re-registering domain names that are referenced by corresponding RIR database objects. We argue that this kind of attack is more attractive than conventional hijacking, since the attacker can act in full anonymity on behalf of a victim. Despite corresponding incidents have been observed in the past, current detection techniques are not qualified to deal with these attacks. We show that they are feasible with very little effort, and analyze the risk potential of abandoned Internet resources for the European service region: our findings reveal that currently 73 /24 IP prefixes and 7 ASes are vulnerable to be stealthily abused. We discuss countermeasures and outline research directions towards preventive solutions.Comment: Final version for TMA 201
    corecore