641 research outputs found

    Supporting flight data analysis for Space Shuttle Orbiter experiments at NASA Ames Research Center

    Get PDF
    The space shuttle orbiter experiments program is responsible for collecting flight data to extend the research and technology base for future aerospace vehicle design. The infrared imagery of shuttle (IRIS), catalytic surface effects, and tile gap heating experiments sponsored by Ames Research Center are part of this program. The software required to process the flight data which support these experiments is described. In addition, data analysis techniques, developed in support of the IRIS experiment, are discussed. Using the flight data base, the techniques provide information useful in analyzing and correcting problems with the experiment, and in interpreting the IRIS image obtained during the entry of the third shuttle mission

    Quantifying the security advantage of password expiration policies

    Full text link

    Presence of periorbital and conjunctival petechial hemorrhages in accidental pediatric drowning

    Get PDF
    Abstract The pathological findings of drowning are variable and non-specific. Petechial hemorrhages involving the periorbital region and the conjunctiva have been described in many causes of death, but are thought to be exceedingly uncommon in cases of drowning. However, such studies have not specifically addressed the pediatric population. The current study retrospectively examined 79 cases of accidental pediatric drowning for the presence of periorbital/conjunctival hemorrhages and analyzed factors that may have affected their presence. Ten victims had periorbital/ conjunctival petechial hemorrhages (13%), with five having periorbital petechiae, three having conjunctival petechiae, and two having both periorbital and conjunctival petechiae. The age and gender of the victim, site of drowning, resuscitation history and the presence of other pathological findings were not significantly associated with the presence of periorbital/conjunctival petechiae. However, as the interval between the drowning episode and autopsy increased, the incidence of periorbital/conjunctival petechiae decreased (28% for <24 h; 7% for >24 h). The presence of periorbital/conjunctival hemorrhages in a significant proportion of pediatric drowning victims confirms that the pathologist must add this finding to the spectrum of changes seen in pediatric drowning. Crow

    The use of the 1 mm laparoscope to assist in port insertion in pelvic oncological surgery

    Get PDF
    BACKGROUND: A 1 mm minilaparoscope (Lifeline Biotechnoligies, Florida, USA) was assessed for aiding port site insertions. METHODS: Ten consecutive patients having laparoscopic procedures in a gynaecological oncology unit were included. Minilaparoscopy was feasible in all cases and was used to insert the umbilical port under direct vision in all patients. In one case, a thick band of abdominal adhesions was identified and a further lateral port site was inserted to aid their dissection. RESULTS: The minilaparoscope correctly identified all 10 patients with peritoneal disease and identified all patients who were suitable for debulking procedures. CONCLUSION: Minilaparoscopy with the 1 mm endoscope appears to be safe and accurate and we feel that it has a place in helping the surgeon identify adhesions and peritoneal disease as well as assisting further port site insertion safely and with minimal complications

    A second look at the usability of click-based graphical passwords

    Full text link
    Click-based graphical passwords, which involve clicking a set of user-selected points, have been proposed as a usable alternative to text passwords. We conducted two user studies: an initial lab study to revisit these usability claims, explore for the first time the impact on usability of a wide-range of images, and gather information about the points selected by users; and a large-scale field study to examine how click-based graphical passwords work in practice. No such prior field studies have been reported in the literature. We found significant differences in the usability results of the two studies, providing empirical evidence that relying solely on lab studies for security interfaces can be problematic. We also present a first look at whether interference from having multiple graphical passwords affects usability and whether more memorable passwords are necessarily weaker in terms of security

    Influencing users towards better passwords: Persuasive cued click-points

    Get PDF
    Usable security has unique usability challenges because the need for security often means that standard human-computerinteraction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space. In click-based graphical passwords, poorly chosen passwords lead to the emergence of hotspots ' portions of the image where users are more likely to select click-points, allowing attackers to mount more successful dictionary attacks. We use persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more secure, click-points. Our approach is to introduce persuasion to the Cued Click-Points graphical password scheme (Chiasson, van Oorschot, Biddle, 2007). Our resulting scheme significantly reduces hotspots while still maintaining its usability

    Polynomial approximation of quasipolynomials based on digital filter design principles

    Get PDF
    This contribution is aimed at a possible procedure approximating quasipolynomials by polynomials. Quasipolynomials appear in linear time-delay systems description as a natural consequence of the use of the Laplace transform. Due to their infinite root spectra, control system analysis and synthesis based on such quasipolynomial models are usually mathematically heavy. In the light of this fact, there is a natural research endeavor to design a sufficiently accurate yet simple engineeringly acceptable method that approximates them by polynomials preserving basic spectral information. In this paper, such a procedure is presented based on some ideas of discrete-time (digital) filters designing without excessive math. Namely, the particular quasipolynomial is subjected to iterative discretization by means of the bilinear transformation first; consequently, linear and quadratic interpolations are applied to obtain integer powers of the approximating polynomial. Since dominant roots play a decisive role in the spectrum, interpolations are made in their very neighborhood. A simulation example proofs the algorithm efficiency. © Springer International Publishing Switzerland 2016
    • …
    corecore