440 research outputs found

    Raise High the Glass

    Get PDF

    FMEAssist: A knowledge-based approach to Failure Modes and Effects Analysis

    Get PDF
    A Failure Modes and Effects Analysis workstation (FMESassist) was designed for use during the development of the space station. It assists engineers in the complex task of tracking failures and their effects on the system. Engineers experience increased productivity through reduced clerical loads, reduced data inconsistency, and significantly reduced analysis time. System developments benefit from a more thorough analysis than was available using previous methods

    The use of artificial intelligence techniques to improve the multiple payload integration process

    Get PDF
    A maximum return of science and products with a minimum expenditure of time and resources is a major goal of mission payload integration. A critical component then, in successful mission payload integration is the acquisition and analysis of experiment requirements from the principal investigator and payload element developer teams. One effort to use artificial intelligence techniques to improve the acquisition and analysis of experiment requirements within the payload integration process is described

    Smart Power Strip

    Get PDF
    The Smart Power Strip revolutionizes all common power strips. Users have the ability to remotely toggle the individual outlets on the Smart Power Strip from a smart phone app and can also monitor how much energy the devices connected to the Smart Power Strip consume

    The Impact of Foam Rollers as a Form of Active Recovery on Lactate Disappearance

    Get PDF
    After anaerobic exercise, rate of blood lactate disappearance is often monitored as a way to detect the achievement of muscle recovery. In this study, the rate of blood lactate disappearance will be examined for two methods of muscle recovery, with a focus on the effectiveness of foam rollers. After performing a strenuous anaerobic task, the participants will either conduct a passive recovery or one of the two active recoveries, the passive recovery used as the control method. Active recovery through moderate exercise post-strenuous exercise has been shown to be very effective in lactate removal, but use of foam rollers has yielded inconclusive results. Participants will have their blood lactate analyzed before, directly after, and 5, 10, and 15 minutes into each recovery method. Results will help determine the true effectiveness of foam rollers, and gain further insight into the body\u27s reaction to physical stress. Data collection and analysis will be conducted in the spring of 2012 at the Athletics-Recreation Center

    Of Itzig and His Dog

    Get PDF

    My Neighbour, Itzig

    Get PDF

    Lunch and Afterwards

    Get PDF

    Improved Kernel Security Through Code Validation, Diversification, and Minimization

    Get PDF
    The vast majority of hosts on the Internet, including mobile clients, are running one of three commodity, general-purpose operating system families. In such operating systems the kernel software executes at the highest processor privilege level. If an adversary is able to hijack the kernel software then by extension he has full control of the system. This control includes the ability to disable protection mechanisms and hide evidence of compromise. The lack of diversity in commodity, general-purpose operating systems enables attackers to craft a single kernel exploit that has the potential to infect millions of hosts. If enough variants of the vulnerable software exist, then mass exploitation is much more difficult to achieve. We introduce novel kernel diversification techniques to improve kernel security. Many modern kernels are self-patching; they modify themselves at run-time. Self-patching kernels must therefore allow kernel code to be modified at run-time. To prevent code injection attacks, some operating systems and security mechanisms enforce a W^X memory protection policy for kernel code. This protection policy prevents self-patching kernels from applying patches at run-time. We introduce a novel run-time kernel instruction-level validation technique to validate the integrity of patches at run-time. Kernels shipped with general-purpose operating systems often contain extraneous code. The code may contain exploitable vulnerabilities or may be pieced together using return/jump-oriented programming to attack the system. Code-injection prevention techniques do not prevent such attacks. We introduce a novel run-time kernel minimization technique to improve kernel security. We show that it is possible to strengthen the defenses of commodity general-purpose computer operating systems by increasing the diversity of, validating the integrity of, and ensuring the minimality of the included kernel components without modifying the kernel source code. Such protections can therefore be added to existing widely-used unmodified operating systems to prevent malicious software from executing in supervisor mode
    corecore