8,209 research outputs found

    Atmospheric scavenging of solid rocket exhaust effluents

    Get PDF
    Solid propellant rocket exhaust was directly utilized to ascertain raindrop scavenging rates for hydrogen chloride. Two chambers were used to conduct the experiments; a large, rigid walled, spherical chamber stored the exhaust constituents, while the smaller chamber housing all the experiments was charged as required with rocket exhaust HCl. Surface uptake experiments demonstrated an HCl concentration dependence for distilled water. Sea water and brackish water HCl uptake was below the detection limit of the chlorine-ion analysis technique used. Plant life HCl uptake experiments were limited to corn and soybeans. Plant age effectively correlated the HCl uptake data. Metallic corrosion was not significant for single 20 minute exposures to the exhaust HCl under varying relative humidity. Characterization of the aluminum oxide particles substantiated the similarity between the constituents of the small scale rocket and the full size vehicles

    Evaluation of omniweave reinforcement for composite fabrication

    Get PDF
    Molded composites made from type-2 Morganite and/or boron are suitable for structural skins. Layered-in-depth omniweave construction yields higher in-plane strength characteristics than fiber-pitch angle construction, and strength and moduli data vary with fiber orientation

    Sales of Personal Property as Secured Transactions Under Article 9 of the Uniform Commercial Code

    Get PDF
    The principal focus of Article 9 of the Uniform Commercial Code (UCC) has always dealt with transactions intended by the parties to create security interests in personal property. In 1998, the sponsors of the UCC approved a sweeping revision of Article 9; however, the main focus of the Article was not changed. § 9-109(a)(1) of revised Article 9 provides: [e]xcept as otherwise provided in subsection (c) and (d), this Article applies to (1) a transaction, regardless of its form, that creates a security interest in personal property or fixtures by contract, and § 1-201(37) of the Code, although modified to conform to some changes made in Article 9, retained the general definition of security interest quoted above without change. Nevertheless, Article 9 continues to apply to some transactions that are not intended to create security interests. Revised § 9-109 (a)(3) provides that, subject to exceptions in subsections (c) and (d), the Article applies to a sale of accounts, chattel paper, payment intangibles, or promissory notes. This Article has two objectives: (1) to explore the reasons for including some outright sales of personal property within the scope of Article 9 and the effect of such inclusions on the status of buyers and sellers of such property, and (2) to identify the difference between the two versions of the Article in their treatment of sales of personal property as secured transactions

    Sales of Personal Property as Secured Transactions Under Article 9 of the Uniform Commercial Code

    Get PDF
    The principal focus of Article 9 of the Uniform Commercial Code (UCC) has always dealt with transactions intended by the parties to create security interests in personal property. In 1998, the sponsors of the UCC approved a sweeping revision of Article 9; however, the main focus of the Article was not changed. § 9-109(a)(1) of revised Article 9 provides: [e]xcept as otherwise provided in subsection (c) and (d), this Article applies to (1) a transaction, regardless of its form, that creates a security interest in personal property or fixtures by contract, and § 1-201(37) of the Code, although modified to conform to some changes made in Article 9, retained the general definition of security interest quoted above without change. Nevertheless, Article 9 continues to apply to some transactions that are not intended to create security interests. Revised § 9-109 (a)(3) provides that, subject to exceptions in subsections (c) and (d), the Article applies to a sale of accounts, chattel paper, payment intangibles, or promissory notes. This Article has two objectives: (1) to explore the reasons for including some outright sales of personal property within the scope of Article 9 and the effect of such inclusions on the status of buyers and sellers of such property, and (2) to identify the difference between the two versions of the Article in their treatment of sales of personal property as secured transactions

    Preliminary operational results from the Willard solar power system

    Get PDF
    The solar powered system located near Willard, New Mexico, generates mechanical or electrical power at a capacity of 19 kW (25 HP). The solar collection system incorporates east/west tracking parabolic trough collectors with a total aperture area of 1275 sq m (13,720 sq ft). The hot oil type thermal energy storage is sufficient for approximately 20 hours of power system operation. The system utilizes a reaction type turbine in conjunction with an organic Rankine cycle engine. Total collector field efficiency reaches a maximum of 20 percent near the winter solstice and about 50 percent during the summer. During the month of July, 1979, the system pumped 60 percent of the 35,300 cu m (28.6 acre-feet) of water delivered. Operating efficiencies for the turbine component, organic Rankine cycle engine and the complete power system are respectively 65 to 75 percent, 12 to 15 percent and 5 to 6 percent. Significant maintenance time was expended on both the collector and power systems throughout the operational period

    Towards operational measures of computer security

    Get PDF
    Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit ‘more secure behaviour’ in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behaviour will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working towards measures of ‘operational security’ similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches (cf rate of occurrence of failures in reliability), or the probability that a specified ‘mission’ can be accomplished without a security breach (cf reliability function). This new approach is based on the analogy between system failure and security breach. A number of other analogies to support this view are introduced. We examine this duality critically, and have identified a number of important open questions that need to be answered before this quantitative approach can be taken further. The work described here is therefore somewhat tentative, and one of our major intentions is to invite discussion about the plausibility and feasibility of this new approach
    • …
    corecore