2,885 research outputs found

    Support and power plant documentation for the gas turbine powered bus demonstration program

    Get PDF
    The operational experience obtained for the GT404-4 gas turbine engines in the intercity and intracity Bus Demonstration Programs is described for the period January 1980 through September 1981. Support for the engines and automatic transmissions involved in this program provided engineering and field service, spare parts and tools, training, and factory overhauls. the Greyhound (intercity) coaches accumulated 183,054 mi (294,595 km) and 5154 hr of total operation. The Baltimore Transit (intracity) coaches accumulated 40,567 mi (65,285 km) and 1840 hr of total operation. In service, the turbine powered Greyhound and Transit coaches achieved approximately 25% and 40% lower fuel mileage, respectively, than did the production diesel powered coaches. The gas turbine engine will require the advanced ceramic development currently being sponsored by the DOE and NASA to achieve fuel economy equivalent not only to that of today's diesel engines but also to the projected fuel economy of the advanced diesel engines of the 1990s. Sufficient experience was not achieved with the coaches prior to the start of service to identify and eliminate many of the problems associated with the startup of new equipment. Because of these problems, the mean miles between incident were unacceptably low. The future gas turbine system should be developed sufficiently to establish satisfactory durability prior to evaluation in revenue service. Commercialization of the gas turbine bus engine remains a viable goal for the future

    Tracking Users across the Web via TLS Session Resumption

    Full text link
    User tracking on the Internet can come in various forms, e.g., via cookies or by fingerprinting web browsers. A technique that got less attention so far is user tracking based on TLS and specifically based on the TLS session resumption mechanism. To the best of our knowledge, we are the first that investigate the applicability of TLS session resumption for user tracking. For that, we evaluated the configuration of 48 popular browsers and one million of the most popular websites. Moreover, we present a so-called prolongation attack, which allows extending the tracking period beyond the lifetime of the session resumption mechanism. To show that under the observed browser configurations tracking via TLS session resumptions is feasible, we also looked into DNS data to understand the longest consecutive tracking period for a user by a particular website. Our results indicate that with the standard setting of the session resumption lifetime in many current browsers, the average user can be tracked for up to eight days. With a session resumption lifetime of seven days, as recommended upper limit in the draft for TLS version 1.3, 65% of all users in our dataset can be tracked permanently.Comment: 11 page

    Antonio Gramsci’s impact on critical pedagogy

    Get PDF
    This paper provides an account of Antonio Gramsci’s impact on the area of critical pedagogy. It indicates the Gramscian influence on the thinking of major exponents of the field. It foregrounds Gramsci's ideas and then indicates how they have been taken up by a selection of critical pedagogy exponents who were chosen on the strength of their identification and engagement with Gramsci's ideas, some of them even having written entire essays on Gramsci. The essay concludes with a discussion concerning an aspect of Gramsci's concerns, the question of powerful knowledge, which, in the present author's view, provides a formidable challenge to critical pedagogues.peer-reviewe

    Empirically-Based Warehouse Design: Can Academics Accept Such an Approach?

    Get PDF
    It is our opinion that existing research is not sufficient to support the design of a warehouse. As a result, facility designers that work in practice are left to face the design process with their own methods. These methods are in stark contrast to the analytical models developed in academia in that they are highly based on empirical observations. Supported by a collection of empirical observations, facility designers who work in practice employ an ad hoc design process. We present a design process based on empirical observations and then formalize it so that it can be taught and used. We illustrate the process with an example and discuss ways in which analytical methods can be used to supplement the process and improve the design. We conclude by describing additional work that is required if the design process is to be realized

    ProtoEXIST: Advanced Prototype CZT Coded Aperture Telescopes for EXIST

    Get PDF
    {\it ProtoEXIST1} is a pathfinder for the {\it EXIST-HET}, a coded aperture hard X-ray telescope with a 4.5 m2^2 CZT detector plane a 90×\times70 degree field of view to be flown as the primary instrument on the {\it EXIST} mission and is intended to monitor the full sky every 3 h in an effort to locate GRBs and other high energy transients. {\it ProtoEXIST1} consists of a 256 cm2^2 tiled CZT detector plane containing 4096 pixels composed of an 8×\times8 array of individual 1.95 cm ×\times 1.95 cm ×\times 0.5 cm CZT detector modules each with a 8 ×\times 8 pixilated anode configured as a coded aperture telescope with a fully coded 10∘×10∘10^\circ\times10^\circ field of view employing passive side shielding and an active CsI anti-coincidence rear shield, recently completed its maiden flight out of Ft. Sumner, NM on the 9th of October 2009. During the duration of its 6 hour flight on-board calibration of the detector plane was carried out utilizing a single tagged 198.8 nCi Am-241 source along with the simultaneous measurement of the background spectrum and an observation of Cygnus X-1. Here we recount the events of the flight and report on the detector performance in a near space environment. We also briefly discuss {\it ProtoEXIST2}: the next stage of detector development which employs the {\it NuSTAR} ASIC enabling finer (32×\times32) anode pixilation. When completed {\it ProtoEXIST2} will consist of a 256 cm2^2 tiled array and be flown simultaneously with the ProtoEXIST1 telescope

    Wigs, disguises and child's play : solidarity in teacher education

    Get PDF
    It is generally acknowledged that much contemporary education takes place within a dominant audit culture, in which accountability becomes a powerful driver of educational practices. In this culture both pupils and teachers risk being configured as a means to an assessment and target-driven end: pupils are schooled within a particular paradigm of education. The article discusses some ethical issues raised by such schooling, particularly the tensions arising for teachers, and by implication, teacher educators who prepare and support teachers for work in situations where vocational aims and beliefs may be in in conflict with instrumentalist aims. The article offers De Certeau’s concept of ‘la perruque’ to suggest an opening to playful engagement for human ends in education, as a way of contending with and managing the tensions generated. I use the concept to recover a concept of solidarity for teacher educators and teachers to enable ethical teaching in difficult times

    Investigation into the security and privacy of iOS VPN applications

    Get PDF
    Due to the increasing number of recommendations for people to use Virtual Private Networks (VPNs) to protect their privacy, more application developers are creating VPN applications and publishing them on the Apple App Store and Google Play Store. In this ‘gold rush’, applications are being developed quickly and, in turn, not being developed with security in mind.This paper investigated a selection of VPN applications available on the Apple App Store (for iOS devices) and tested the applications for security and privacy issues. This includes testing for any traffic being transmitted over plain HTTP, DNS leakage and transmission of personally identifiable information (such as phone number, International Mobile Equipment Identity (IMEI), email address, MAC address) and evaluating the security of the tunneling protocol used by the VPN.The testing methodology involved installing VPN applications on a test device, simulating network traffic for a pre-defined period of time and capturing the traffic. This allows for all traffic to be analysed to check for anything being sent without encryption. Other issues that often cause de-anonymization with VPN applications such as DNS leakage were also considered.The research found several common security issues with VPN applications tested, with a large majority of applications still using HTTP and not HTTPS for transmitting certain data. A large majority of the VPN applications failed to route additional user data (such as DNS queries) through the VPN tunnel. Furthermore, just fifteen of the tested applications were found to have correctly implemented the best-recommended tunneling protocol for user security.Outside of the regular testing criteria, other security anomalies were observed with specific applications, which included outdated servers with known vulnerabilities, applications giving themselves the ability to perform HTTPS interception and questionable privacy policies. From the documented vulnerabilities, this research proposes a set of recommendations for developers to consider when developing VPN applications
    • …
    corecore