1,454 research outputs found

    The Burnside Expedition

    Get PDF
    By Ambrose E. Burnside, Late Major-General, United States Army. Personal Narratives of Events of the War of the Rebellion being papers read before the Rhode Island Soldiers and Sailors Historical Society. No.6 – Second Series. 1882. Written by Ambrose Burnside and read before the Rhode Island Soldiers and Sailors Historical Society on July 7, 1880, the author discusses his military expedition along the North Carolina Coast between February and June of 1862. The expedition was part of General Winfield Scott’s overall Anaconda Plan, which was aimed at closing the blockade-running ports inside the Outer Banks.https://digitalcommons.providence.edu/ri_history/1001/thumbnail.jp

    Letter, Ambrose E. Burnside to J. Frank Howe, August 21, 1861

    Get PDF
    This handwritten letter, dated August 21, 1861, is written from Ambrose E. Burnside to J. Frank Howe as a reply to Howe\u27s request for an autograph and informs Howe that he would take great pleasure in writing a full account of the Battle of Bull\u27s Run. The letter is written on State of Rhode Island Quarter-Master General\u27s Office letterhead.https://scholarsjunction.msstate.edu/fvw-manuscripts-original-manuscripts/1120/thumbnail.jp

    Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation

    Get PDF
    Many current systems security research efforts focus on mechanisms for Intrusion Prevention and Self-Healing Software. Unfortunately, such systems find it difficult to gain traction in many deployment scenarios. For self-healing techniques to be realistically employed, system owners and administrators must have enough confidence in the quality of a generated fix that they are willing to allow its automatic deployment. In order to increase the level of confidence in these systems, the efficacy of a 'fix' must be tested and validated after it has been automatically developed, but before it is actually deployed. Due to the nature of attacks, such verification must proceed automatically. We call this problem Automatic Repair Validation (ARV). As a way to illustrate the difficulties faced by ARV, we propose the design of a system, Bloodhound, that tracks and stores malicious network flows for later replay in the validation phase for self-healing softwar

    Observations of neutral circulation at mid-latitudes during the Equinox Transition Study

    Get PDF
    Measurements of ion drift velocity made by the Millstone Hill incoherent scatter radar have been used to calculate the meridional neutral wind velocity during the Sept. 17 to 24, 1984 period. Strong daytime southward neutral surges were observed during the magnetically disturbed days of September 19 and 23, in contrast to the small daytime winds obtained as expected during the magnetically quiet days. The surge on September 19 was also seen at Arecibo. In addition, two approaches have been used to calculate the meridional wind component from the radar-derived height of the F-layer electron density peak. Results confirm the wind surge, particularly when the strong electric fields measured during the disturbed days are included in the calculations. The two approaches for the F-layer peak wind calculations are applied to the radar-derived electron density peak height as a function of latitude to study the variation of the southward daytime surges with latitude

    Radar cross section studies

    Get PDF
    The ultimate goal is to generate experimental techniques and computer codes of rather general capability that would enable the aerospace industry to evaluate the scattering properties of aerodynamic shapes. Another goal involves developing an understanding of scattering mechanisms so that modification of the vehicular structure could be introduced within constraints set by aerodynamics. The development of indoor scattering measurement systems with special attention given to the compact range is another goal. There has been considerable progress in advancing state-of-the-art scattering measurements and control and analysis of the electromagnetic scattering from general targets

    Radar Cross Section Studies/Compact Range Research

    Get PDF
    A summary is given of the achievements of NASA Grant NsG-1613 by Ohio State University from May 1, 1987 to April 30, 1988. The major topics covered are as follows: (1) electromagnetic scattering analysis; (2) indoor scattering measurement systems; (3) RCS control; (4) waveform processing techniques; (5) material scattering and design studies; (6) design and evaluation of design studies; and (7) antenna studies. Major progress has been made in each of these areas as verified by the numerous publications produced

    Class preserving automorphisms of unitriangular groups

    Full text link
    Let UTn(K)\textrm{UT}_n (K) be a unitriangular group over a field KK and Γn,k:=UTn(K)/γk(UTn(K))\Gamma_{n,k} := \textrm{UT}_n (K)/ \gamma_k(\textrm{UT}_n (K)), where γk(UTn(K))\gamma_k (\mathrm{UT}_n(K)) denotes the kk-th term of the lower central series of UTn(K)\mathrm{UT}_n (K), 2≤k≤n2 \le k \le n. We prove that the group of all class preserving automorphisms of Γn,k\Gamma_{n,k} is equal to \Inn(\Gamma_{n,k}) if and only if KK is a prime field. Let Gn(m):=UTn(Fpm)/γ3(UTn(Fpm))G_n^{(m)} := \mathrm{UT}_n (\mathbb{F}_{p^m}) / \gamma_3 (\mathrm{UT}_n(\mathbb{F}_{p^m})). We calculate the group of all class preserving automorphisms and class preserving outer automorphisms of Gn(m)G_n^{(m)}.Comment: 19 pages, accepted for publication in International Journal of Algebra and Computatio
    • …
    corecore