1,712 research outputs found

    Modeling Vocal Fold Motion with a New Hydrodynamic Semi-Continuum Model

    Full text link
    Vocal fold (VF) motion is a fundamental process in voice production, and is also a challenging problem for direct numerical computation because the VF dynamics depend on nonlinear coupling of air flow with the response of elastic channels (VF), which undergo opening and closing, and induce internal flow separation. A traditional modeling approach makes use of steady flow approximation or Bernoulli's law which is known to be invalid during VF opening. We present a new hydrodynamic semi-continuum system for VF motion. The airflow is modeled by a quasi-one dimensional continuum aerodynamic system, and the VF by a classical lumped two mass system. The reduced flow system contains the Bernoulli's law as a special case, and is derivable from the two dimensional compressible Navier-Stokes equations. Since we do not make steady flow approximation, we are able to capture transients and rapid changes of solutions, e.g. the double pressure peaks at opening and closing stages of VF motion consistent with experimental data. We demonstrate numerically that our system is robust, and models in-vivo VF oscillation more physically. It is also much simpler than a full two-dimensional Navier-Stokes system.Comment: 27 pages,6 figure

    Stratosphere: Finding Vulnerable Cloud Storage Buckets

    Full text link
    Misconfigured cloud storage buckets have leaked hundreds of millions of medical, voter, and customer records. These breaches are due to a combination of easily-guessable bucket names and error-prone security configurations, which, together, allow attackers to easily guess and access sensitive data. In this work, we investigate the security of buckets, finding that prior studies have largely underestimated cloud insecurity by focusing on simple, easy-to-guess names. By leveraging prior work in the password analysis space, we introduce Stratosphere, a system that learns how buckets are named in practice in order to efficiently guess the names of vulnerable buckets. Using Stratosphere, we find wide-spread exploitation of buckets and vulnerable configurations continuing to increase over the years. We conclude with recommendations for operators, researchers, and cloud providers.Comment: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses. 202

    2018 ASME Student Design Competition - Group T Senior Design Project

    Get PDF
    The purpose of this project is to create a single soccer playing robot to compete in the 2018 ASME student design competition. The robot, along with spare parts and all other devices must fit inside a 50x50x50 cm box. This robot must be able to traverse the field via remote control and have the ability to control a tennis ball and shoot it with sufficient force

    Understanding Law Enforcement Intelligence Processes: Report to the Office of University Programs, Science and Technology Directorate

    Get PDF
    Despite clear evidence of significant changes, very little research exists that examines issues related to the intelligence practices of state, local, and tribal (SLT) law enforcement agencies. Important questions on the nature of the issues that impact SLT intelligence practices remain. While there is some uncertainty among SLT law enforcement about current terrorism threats, there is certainty that these threats evolve in a largely unpredictable pattern. As a result there is an ongoing need for consistent and effective information collection, analysis and sharing. Little information is known about perceptions of how information is being shared between agencies and whether technologies have improved or hurt information sharing, and little is known about whether agencies think they are currently prepared for a terrorist attack, and the key factors distinguishing those that think they are compared to those who do not. This study was designed to address these issues, and a better understanding of these issues could significantly enhance intelligence practices and enhance public safety.This research was supported by the Department of Homeland Science and Technology Directorate’s Office of University Programs through Award Number 2012-ST-061-CS0001, Center for the Study of Terrorism and Behavior (CSTAB) 2.13 made to START to investigate the understanding and countering of terrorism within the U.S. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security or START

    Understanding the Intelligence Practices of State, Local, and Tribal Law Enforcement Agencies

    Get PDF
    In addition, the study examined the activities of three fusion centers in order to identify strategies that are successful in increasing the information flow across agencies, the major obstacles to effective intelligence-gathering and information-sharing, and identify key practices for integrating domestic intelligence into the information-sharing environment and overcoming these obstacles. The study found that although significant progress has been made since 9/11 in installing fundamental policy and procedures related to building the intelligence capacity of law enforcement, there is significant room for improvement and a need to move agencies forward to be consistent with key requirements. Also, fusion centers are further along in instituting intelligence policies and practices than are individual law enforcement agencies. This is most likely because there has been a focus on developing fusion center operations and expertise by both the Department of Homeland Security and the Department of Justice. In addition, both samples of respondents emphasized that they have worked at building relationships with a diverse range of agencies, but they also indicated that they are not completely satisfied with these relationships. Further, there is a significant amount of information coming into and going out of these agencies. It is likely that without sufficient analysts within the organizations or poorly trained analysts, there are missed opportunities for strategic and tactical understanding of homeland security and criminal threats. Assessing the performance of analysts is difficult, but respondents emphasized the need to focus on the quality of strategic and tactical products produced

    Law Enforcement’s Information Sharing Infrastructure: A National Assessment

    Get PDF
    The September 11 attacks impacted society generally, and law enforcement specifically, in dramatic ways. One of the major trends has been changing expectations regarding criminal intelligence practices among state, local, and tribal (SLT) law enforcement agencies and the need to coordinate intelligence efforts and share information at all levels of government. In fact, enhancing intelligence efforts has emerged as a critical issue for the prevention of all threats and crimes. To date, an increasing number of SLT law enforcement agencies have expanded their intelligence capacity, and there have been fundamental changes in the national, state, and local information sharing infrastructure. Moreover, critical to these expanding information sharing expectations is the institutionalization of fusion centers (FCs). Despite these dramatic changes, an expanding role, and the acknowledgement that local law enforcement intelligence is critical to the prevention and deterrence of threats and crimes, very little research exists that highlights issues related to the intelligence practices of SLT law enforcement agencies and FCs.1 This research describes what agencies are doing to build an intelligence capacity and assesses the state of information sharing among agencies. Specifically, a national survey was developed to examine the experiences of SLT agencies and FCs for building an intelligence capacity as well as to understand critical gaps in the sharing of information regarding intelligence
    • …
    corecore