1,712 research outputs found
Modeling Vocal Fold Motion with a New Hydrodynamic Semi-Continuum Model
Vocal fold (VF) motion is a fundamental process in voice production, and is
also a challenging problem for direct numerical computation because the VF
dynamics depend on nonlinear coupling of air flow with the response of elastic
channels (VF), which undergo opening and closing, and induce internal flow
separation. A traditional modeling approach makes use of steady flow
approximation or Bernoulli's law which is known to be invalid during VF
opening. We present a new hydrodynamic semi-continuum system for VF motion. The
airflow is modeled by a quasi-one dimensional continuum aerodynamic system, and
the VF by a classical lumped two mass system. The reduced flow system contains
the Bernoulli's law as a special case, and is derivable from the two
dimensional compressible Navier-Stokes equations. Since we do not make steady
flow approximation, we are able to capture transients and rapid changes of
solutions, e.g. the double pressure peaks at opening and closing stages of VF
motion consistent with experimental data. We demonstrate numerically that our
system is robust, and models in-vivo VF oscillation more physically. It is also
much simpler than a full two-dimensional Navier-Stokes system.Comment: 27 pages,6 figure
Stratosphere: Finding Vulnerable Cloud Storage Buckets
Misconfigured cloud storage buckets have leaked hundreds of millions of
medical, voter, and customer records. These breaches are due to a combination
of easily-guessable bucket names and error-prone security configurations,
which, together, allow attackers to easily guess and access sensitive data. In
this work, we investigate the security of buckets, finding that prior studies
have largely underestimated cloud insecurity by focusing on simple,
easy-to-guess names. By leveraging prior work in the password analysis space,
we introduce Stratosphere, a system that learns how buckets are named in
practice in order to efficiently guess the names of vulnerable buckets. Using
Stratosphere, we find wide-spread exploitation of buckets and vulnerable
configurations continuing to increase over the years. We conclude with
recommendations for operators, researchers, and cloud providers.Comment: Proceedings of the 24th International Symposium on Research in
Attacks, Intrusions and Defenses. 202
2018 ASME Student Design Competition - Group T Senior Design Project
The purpose of this project is to create a single soccer playing robot to compete in the 2018 ASME student design competition. The robot, along with spare parts and all other devices must fit inside a 50x50x50 cm box. This robot must be able to traverse the field via remote control and have the ability to control a tennis ball and shoot it with sufficient force
Understanding Law Enforcement Intelligence Processes: Report to the Office of University Programs, Science and Technology Directorate
Despite clear evidence of significant changes, very little research exists that examines issues related to the intelligence practices of state, local, and tribal (SLT) law enforcement agencies. Important questions on the nature of the issues that impact SLT intelligence practices remain. While there is some uncertainty among SLT law enforcement about current terrorism threats, there is certainty that these threats evolve in a largely unpredictable pattern. As a result there is an ongoing need for consistent and effective information collection, analysis and sharing. Little information is known about perceptions of how information is being shared between agencies and whether technologies have improved or hurt information sharing, and little is known about whether agencies think they are currently prepared for a terrorist attack, and the key factors distinguishing those that think they are compared to those who do not. This study was designed to address these issues, and a better understanding of these issues could significantly enhance intelligence practices and enhance public safety.This research was supported by the Department of Homeland Science and Technology Directorate’s Office of University Programs through Award Number 2012-ST-061-CS0001, Center for the Study of Terrorism and Behavior (CSTAB) 2.13 made to START to investigate the understanding and countering of terrorism within the U.S. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security or START
Understanding the Intelligence Practices of State, Local, and Tribal Law Enforcement Agencies
In addition, the study examined the activities of three fusion centers in order to identify strategies that are successful in increasing the information flow across agencies, the major obstacles to effective intelligence-gathering and information-sharing, and identify key practices for integrating domestic intelligence into the information-sharing environment and overcoming these obstacles. The study found that although significant progress has been made since 9/11 in installing fundamental policy and procedures related to building the intelligence capacity of law enforcement, there is significant room for improvement and a need to move agencies forward to be consistent with key requirements. Also, fusion centers are further along in instituting intelligence policies and practices than are individual law enforcement agencies. This is most likely because there has been a focus on developing fusion center operations and expertise by both the Department of Homeland Security and the Department of Justice. In addition, both samples of respondents emphasized that they have worked at building relationships with a diverse range of agencies, but they also indicated that they are not completely satisfied with these relationships. Further, there is a significant amount of information coming into and going out of these agencies. It is likely that without sufficient analysts within the organizations or poorly trained analysts, there are missed opportunities for strategic and tactical understanding of homeland security and criminal threats. Assessing the performance of analysts is difficult, but respondents emphasized the need to focus on the quality of strategic and tactical products produced
Law Enforcement’s Information Sharing Infrastructure: A National Assessment
The September 11 attacks impacted society generally, and law enforcement specifically, in dramatic ways. One of the major trends has been changing expectations regarding criminal intelligence practices among state, local, and tribal (SLT) law enforcement agencies and the need to coordinate intelligence efforts and share information at all levels of government. In fact, enhancing intelligence efforts has emerged as a critical issue for the prevention of all threats and crimes. To date, an increasing number of SLT law enforcement agencies have expanded their intelligence capacity, and there have been fundamental changes in the national, state, and local information sharing infrastructure. Moreover, critical to these expanding information sharing expectations is the institutionalization of fusion centers (FCs). Despite these dramatic changes, an expanding role, and the acknowledgement that local law enforcement intelligence is critical to the prevention and deterrence of threats and crimes, very little research exists that highlights issues related to the intelligence practices of SLT law enforcement agencies and FCs.1 This research describes what agencies are doing to build an intelligence capacity and assesses the state of information sharing among agencies. Specifically, a national survey was developed to examine the experiences of SLT agencies and FCs for building an intelligence capacity as well as to understand critical gaps in the sharing of information regarding intelligence
- …