1,967 research outputs found

    Rotor fragment protection program: Statistics on aircraft gas turbine engine rotor failures that occurred in US commercial aviation during 1979

    Get PDF
    Statistical information relating to the number of gas turbine engine rotor failures which occurred during 1979 in commercial aviation service use is provided. The predominant failure mode involved blade fragments, 84 percent of which were contained. No uncontained disk failures occurred and although fewer rotor rim and seal failures occurred, 100 percent and 50 percent, respectively, were uncontained. Sixty-eight percent of the 157 rotor failures occurred during the take-off and climb stages of flight

    Rotor burst protection program: Statistics on aircraft gas turbine engine rotor failures that occurred in US commercial aviation during 1975

    Get PDF
    Statistics on gas turbine rotor failures that have occurred in U.S. commercial aviation during 1975 are presented. The compiled data were analyzed to establish: (1) The incidence of rotor failures and the number of contained and uncontained rotor bursts; (2) The distribution of rotor bursts with respect to engine rotor component; i.e., fan, compressor or turbine; (3) The type of rotor fragment (disk, rim or blade) typically generated at burst; (4) The cause of failure; (5) The type of engines involved; and (6) The flight condition at the time of failure

    Radcliffe incorporated: Ann Radcliffe, Mary Ann Radcliffe and the Minerva author

    Get PDF
    This essay examines the false and dubious attributions of select Minerva novels to both Ann Radcliffe and her lesser known contemporary Mary Ann Radcliffe, arguing that the constellations of texts and authors that signified under the Radcliffe aegis point to the existence of a corporate Radcliffe whose influence on Romantic print culture has yet to be fully documented. In sales catalogues and later scholarly studies and encyclopedias, this corporate Radcliffe blended work initially published anonymously by the Minerva Press with the known output of Ann Radcliffe and Mary Ann Radcliffe. These texts include the Minerva novels The Fate of Velina de Guidova (1790), Radzivil, a Romance (1790), Mary Ann Radcliffe’s The Memoirs of Mrs Mary Ann Radcliffe (1810) and The Female Advocate; or an Attempt to Recover the Rights of Women from Male Usurpation (1799), in addition to the gothic novels of Ann Radcliffe. A composite created by the print market-place and later scholars' own compulsion to fix or challenge questionable attributions, this corporate Radcliffe elevates the popular Romantic practices of imitation and translation and provides an alternative to narratives of Romantic authorship that rely on singular genius and originality

    Animal Assisted Therapy and Reducing Depression in Chronic Hemodialysis Patients

    Get PDF
    Chronic dialysis patients are dependent on a hemodialysis machine to cleanse their blood of waste that is normally excreted by healthy functioning kidneys. The average number of hemodialysis treatments required per week are three with an average treatment time being three to four hours per treatment. Discontinuation of hemodialysis will result in death. The only way to eliminate the need for hemodialysis is a kidney transplant (National Kidney Foundation, 2008, 2013). Hemodialysis is not without its inherent risks. Side effects can include but are not limited to: hypotension, cardiovascular complications, cramping from fluid removal, and bleeding (Aguera, Martin-Malo, Alvarez-Lara, Garcia-Montemayor, Canton, Soriano, & Aljama, 2015; Vijayalakshmi, & Rayidi, 2015; Zolfaghari, Asgari, Bahramnezhad, AhmadiRad & Haghani, 2015). Depression is common in patients with end-stage renal disease (Saeed, Ahmad, Ghafoor, & Kanwal, 2012, 946). Animal Assisted Therapy (AAT) has been shown to reduce anxiety and depression. AAT is a broad term used to describe the utilization of various species of animals in diverse manners beneficial to humans (American Veterinary Medical Association, 2016). The simple act of petting a dog has been found to reduce loneliness, anxiety, depression, and social isolation (Cherniack & Cherniack, 2014; Moretti, DeRhonchi, Bernabel, Marchetti, Ferrari, Forlani, Negretti, Sacchetti & Atti, 2011). For the purpose of this study AAT is defined as the use of canines that are pet therapy certified. The purpose of this study is to examine if there is a relationship between the uses of AAT during hemodialysis in a hospital based freestanding hemodialysis center and a reduction in depression in chronic hemodialysis patients

    Seeking Balance: How the Practice of Spiritual Disciplines Impacts the Health of Residence Hall Directors

    Get PDF
    Residence hall directors often fulfill an instrumental role in a student’s college experience. As residence hall directors facilitate programs and intentionally interact with students, a unique connection is formed between the student and his or her residence hall director. Residence hall directors experience unique work-related stress through flexible workhours each day of the week. Thus, it is crucial for residence hall directors to establish healthy rhythms of rest and rejuvenation as they integrate living where they work. Research suggests spirituality as an effective stress management tool. This study specifically focuses on how various spiritual disciplines of Christianity impact stress experienced as a residence hall director

    Creating a High Level Incident Response/Forensics Policy by Complying with State and Federal Regulations

    Get PDF
    With the increasing number of threats involving organization\u27s today, i.e., identity theft, fraud, and embezzlement, it\u27s imperative that companies have an incident response/forensic policy in place in order to successfully retain and preserve potential evidence. Organizations need to not only combat current problems, but to prevent them from reoccurring. Organizations should not feel alone in this battle. The federal government along with state governments have passed legislation that mandates an incident response/forensic policy be implemented in order to comply with the newly passed regulations, such has Sarbanes-Oxley (SOX), Health Insurance Portability and Accountability Act (HIPAA), and Gramm-Leach Bliley (GLBA). Also taken into account are guidances, frameworks, and standards that are the building blocks that many organizations have used to create their incident response/forensic policies and procedures. But how do organizations know what to document in these policies? How do they know if their policies comply with the ever growing number of regulations? How do they know that the information they are retrieving is not considered personally identifiable information that may have not been obtained legally? They do so by complying with the redundant, common criterion that is found in these regulations, standards, frameworks, and guidances. Before creating an incident response/forensic policy, organizations need to identify privacy provisions as well as pertinent regulations, standards, frameworks, and guidances. After the latter have been identified, the incident response/forensics requirements need to be identified as well. Many organizations are now realizing the commonality/redundancies when reviewing these regulations, standards, frameworks, and guidances. By identifying these requirements and eliminating the redundancy, organizations can create and maintain a doctrine of documents that ensure that they are in compliance. When new regulations, standards, frameworks, and/or guidances are drafted and released, organizations are inconsistent when trying to comply with the specified timelines instead of integrating them or identifying how they already fit with the current environment. Understanding the current computer incident state and federal laws is equally important, but this expertise is expected of the legal department and law enforcement. Such laws include The Compute Fraud and Abuse Act, The Computer Security Act of 1987, The US Privacy Act of 1974, The Electronic Communication Privacy Act of 1986, the Economic Espionage Act of 1996, The National Information Infrastructure Protection Act of 1996, USA PATRIOT Act of 2001, and the Homeland Security Act of 2002. Only law enforcement, legal departments, and state and federal district attorneys can determine whether or not the incident has the acceptable amount of evidence to prosecute at the state or federal level. For the purposes of this paper, the proceeding laws will not be analyzed. This paper will give a high level overview of the regulations, standards, frameworks, and guidances chosen for an incident response/forensics cross-mapping matrix. In addition, once the appropriate requirements have been identified, new common language requirements will be created, and the identified regulations, standards, frameworks, and guidances will be mapped to them. Once the mapping is complete, the requirements will be written as policy statements, which will create a high level policy that is in compliance with the noted regulations, standards, frameworks, and guidances. Although redundant requirements will have been eliminated, there is still not a standardize computer forensics/incidents handling policy, procedure or process for commercial organizations. When trying to establish a standardized process, circumstances that need to be taken into account are the size of the organization: people, resources, and budget. The latter are the three biggest restraints for organizations to move forward with an incident management program, so creating a standard will only force companies to either not have a process or have to expend above and beyond the resources they have to offer. Although there are many regulations, standards, frameworks, guidances, and requirements mandated and implemented by organizations today, the following standards (ISO 17799:2005, FFIEC Information Security Handbook, Basel II), regulations (HIPAA, Privacy and Security Rule, GLBA Privacy and Safeguard Rule, California Information Practice Act (CA SB 1386), NY State Security Breach and Notification Act (NY AB 4254), and Sarbanes-Oxley (SOX) Section 301, 302, 404, 409, and 806), frameworks and guidances (Control Objectives for Information and related Technology (COBIT), The Committee of Sponsoring Organizations of the Treadway Commission (COSO), The Information Security Forum (ISF March 2005), and VISA/MC Payment Card Industry (PCI) requirements will be the focus for this research. All requirements associated with the latter will be listed and then common language will be extracted to and mapped within a matrix

    Rotor burst protection program: Experimentation to provide guidelines for the design of turbine rotor burst fragment containment rings

    Get PDF
    Empirical guidelines for the design of minimum weight turbine rotor disk fragment containment rings made from a monolithic metal were generated by experimentally establishing the relationship between a variable that provides a measure of containment ring capability and several other variables that both characterized the configurational aspects of the rotor fragments and containment ring, and had been found from exploratory testing to have had significant influence on the containment process. Test methodology and data analysis techniques are described. Results are presented in graphs and tables

    Generational Formative Influences on Workplace Attitudes and Values

    Get PDF
    The purpose of this capstone project is to investigate the following question: How do members of the Baby Boom, Generation X and Millennial generations believe influences and experiences of their formative years impact their workplace attitudes and values? In the U.S. labor force, there are three predominant generations comprising a significant share of the workforce, each unique with their own set of core values that have been collectively shaped and defined by their formative political, cultural, and social experiences. For every generation, there are events and circumstances that mold preferences, expectations, and values that ultimately shape their workplace perspective and expectations. This paper was undertaken to provide a lens into the formative influences of each generation and the subsequent attitudes and values that emerge as a result of these experiences. By understanding the unique influences and motivations of each generation, we can qualitatively assess the research on generational influences on work-related attitudes. This capstone investigates the growing body of research and aligns it to survey data captured by members of each generation in a higher education institution in the Philadelphia area. This exploratory research is valuable for employees, management professionals, and practitioners who want to better understand generational values so they can evaluate their practices in order to communicate, engage, and lead their organizations effectively

    The Experiences of an Individual with Parkinson\u27s Engaging in a Relationship-based, Improvisational Music Therapy Group

    Get PDF
    This study explored the experiences of an individual with Parkinson’s engaging in a relationshipbased, improvisational music therapy group. The researcher utilized the methodology of naturalistic inquiry. An archived video recording of a group music therapy session held through a videoconferencing platform was observed. Music experiences and verbal dialogue were transcribed and put into notation software, and subsequently analyzed through inductive analysis. Two main themes were found: (a) Musical Interrelatedness and (b) Relationship Between Music and Words, with two subthemes under the former; Diane’s Musical Relationship with the Therapist and Diane’s Musical Relationship with the Group; and three under the latter; Words Enhancing Diane’s Musical Experience, Music Supporting Diane’s Verbal Responses, and Significance Of The Voice. Results illustrated the participant’s experience of a relationshipbased improvisational music therapy group as something supportive, creative, and potentially beneficial for their overall well-being

    Dirt Cheap Nutrition

    Get PDF
    The aim of this project is to reach a range of people who are suffering from food insecurity. Food insecurity is a spectrum; people have varying access to not only food, but to related resources such as cooking equipment and knowledge. Food insecurity is a broad term since there are varying reasons as to why people cannot access food such as transportation, money, and access. In most cases food insecurity is a symptom of a much bigger issue known as poverty. The typical person struggling with food insecurity suffers from both mental and physical complications such as decline in academic focus, lowered graduation rates, diabetes, obesity, and mental health disorders. I think another challenge it is associated with is having to choose between resources; for example, does a college student buy food or books or does a parent buy food or gas to get to work. Whether you are a student on campus or a community member, there may be periods in your life where the only cooking equipment you have access to is a microwave, and it is not always easy to create a meal that can be made completely in a microwave
    • …
    corecore