4,283 research outputs found

    New technologies in general aviation

    Get PDF
    This research explored the technological needs of GA pilots at international levels. Overall, single pilot operators tend to value costs as the most important feature of any technology, followed by technology that helps with pre-flight tasks as well as during flight. Remote monitoring, post-flight analysis and 3-D displays are technological features of lesser importance

    The Transformation of the Antiquities Act: A Call for Amending the President’s Power Regarding National Monument Designations

    Get PDF
    Part I of this Comment discusses the background of the Antiquities Act, including: the legislature’s intent in drafting the Act, changes to the law, and how it has been used throughout the years. This section then discusses various legal challenges to designations made under the Antiquities Act and looks at why these designations are sometimes controversial. Part II discusses the calls by many politicians to either amend or repeal the Act and explains why current proposed legislation is insufficient. This Comment critiques the proposed legislation and calls for the passage of sensible legislation that would require a more transparent designation process while also implementing more concrete requirements for how national monuments are modified or designated. Part III concludes by explaining why the Antiquities Act should be amended, not repealed, in order to ensure the protection of public lands for future generations

    The Transformation of the Antiquities Act: A Call for Amending the President’s Power Regarding National Monument Designations

    Get PDF
    Part I of this Comment discusses the background of the Antiquities Act, including: the legislature’s intent in drafting the Act, changes to the law, and how it has been used throughout the years. This section then discusses various legal challenges to designations made under the Antiquities Act and looks at why these designations are sometimes controversial. Part II discusses the calls by many politicians to either amend or repeal the Act and explains why current proposed legislation is insufficient. This Comment critiques the proposed legislation and calls for the passage of sensible legislation that would require a more transparent designation process while also implementing more concrete requirements for how national monuments are modified or designated. Part III concludes by explaining why the Antiquities Act should be amended, not repealed, in order to ensure the protection of public lands for future generations

    Cuteness as a prime to enhance emotional recognition

    Get PDF
    The ability to recognize emotional expressions has important implications for survival and cooperation. Failing to recognize emotions indicative of some form of threat (anger, fear, disgust) may be particularly costly given these emotional expressions communicate a potential source of danger in the environment. Previous studies have shown that people tend to recognize threatening emotions faster and more accurately than non-threatening emotions. Infantile characteristics (kindchenschema) readily capture the attention of adults and have been shown to influence a variety of behaviors associated with caretaking; viewing cute stimuli increases behavioral carefulness on various visual and motor tasks. The current study sought to determine if viewing cute stimuli increases sensitivity to emotional expressions, particularly those related to threat, as the ability to recognize emotional displays has important implications for caretaking. In a sample of 43 women, viewing cute stimuli enhanced sensitivity to emotional expressions generally, but was not specific to threat-relevant emotions. This effect of priming was not apparent in a sample including men (n=6) and non-binary (n=3) participants. These results suggest that priming a caretaking mentality may enhance emotional sensitivity in addition to behavioral carefulness, at least in women

    A Flexible and Secure Deployment Framework for Distributed Applications

    Get PDF
    This paper describes an implemented system which is designed to support the deployment of applications offering distributed services, comprising a number of distributed components. This is achieved by creating high level placement and topology descriptions which drive tools that deploy applications consisting of components running on multiple hosts. The system addresses issues of heterogeneity by providing abstractions over host-specific attributes yielding a homogeneous run-time environment into which components may be deployed. The run-time environments provide secure binding mechanisms that permit deployed components to bind to stored data and services on the hosts on which they are running.Comment: 2nd International Working Conference on Component Deployment (CD 2004), Edinburgh, Scotlan

    Conservation Status and Residential Transaction Prices: Initial Evidence from Dallas, Texas

    Get PDF
    The traditional mechanisms of private covenants and public restrictions may not meet the needs of residential property owners who want to preserve a certain neighborhood style. Privately initiated and publicly enforced conservation district regulations can preserve desirable neighborhood characteristics and signal to buyers that neighborhood conformity will likely persist. We analyze residential transaction prices in Dallas, Texas and find premiums associated with residential properties within and buffering conservation district locations. These results are robust to the spatial autocorrelation common in residential transaction prices.

    A formal methodology for integral security design and verification of network protocols

    Full text link
    We propose a methodology for verifying security properties of network protocols at design level. It can be separated in two main parts: context and requirements analysis and informal verification; and formal representation and procedural verification. It is an iterative process where the early steps are simpler than the last ones. Therefore, the effort required for detecting flaws is proportional to the complexity of the associated attack. Thus, we avoid wasting valuable resources for simple flaws that can be detected early in the verification process. In order to illustrate the advantages provided by our methodology, we also analyze three real protocols

    Evaluating the Risk Posed by Propulsive Small Satellites with Unencrypted Communications Channels to High-Value Orbital Regimes

    Get PDF
    Propulsion systems for small-satellites are approaching the market. At the same time, some operators do not encrypt their communications links, creating the near-term potential for an unauthorized actor to send spurious commands to a satellite. At worst, an unauthorized activation of the propulsion system could precipitate a conjunction. Aside from the potential loss of system hardware, the reputational costs to the industry of such an incident could be significant and far-reaching. To establish a physical basis for the feasibility of this risk, we simulate the potential altitude increase from a 300 km circular orbit generated for a 10 kg nano-satellite coupled with each of the propulsion system types under advanced development. We find that chemical reaction systems enable the satellite to access all altitudes within LEO over short time domains and that electrostatic propulsion is capable of reaching GEO, though over long time domains. Manufacturers, launch service providers and brokers, regulators, and the CubeSat community all have potential roles to play in managing this risk

    Designing a Better Day: Annotated Bibliography of Adult Day Care Literature, 1990-1998

    Get PDF
    This monograph contains 56 annotated bibliographies of literature published since 1990 on Adult Day Care facilities. The annotations are organized into five components - organization, staff, family, client, and physical setting - all of which form the dimensions of place for Adult Day Care. A matrix of the annotated bibliographies gives an overview of categories addressed in each publication.https://dc.uwm.edu/caupr_mono/1007/thumbnail.jp

    Precisely Co-located Cameras with High Geometric and Thermo-mechanical Stability

    Get PDF
    Hyper-realistic telepresence is achieved by mounting an array of carefully calibrated cameras on a monitor. High-quality, three-dimensional (3D) telepresence is predicated on highly stable camera positions, e.g., cameras calibrated to a fraction of a millimeter, which, during operation, stay in position to within a fraction of a millimeter. The typical, bezel-mounted camera array in a monitor experiences thermally induced post-calibration positional drift large enough to make hyper-realistic telepresence infeasible. This disclosure describes cameras that are mounted in a manner that leverages the thermal stability and isolation of the cover glass of the monitor to achieve extremely stable camera positioning that lasts through the entirety of a video recording or conferencing session, and into future sessions. Mounting cameras directly on the cover glass results in advantages other than thermo-mechanical stability, such as simplified design, modularized assembly, accurate eye-tracking resulting in a better 3D viewing experience, etc
    corecore