35,848 research outputs found

    Three-axis adjustable loading structure

    Get PDF
    A three axis adjustable loading structure for testing the movable surfaces of aircraft by applying pressure, is described. The device has three electric drives where the wall angle, horizontal position, and vertical position of the test device can be rapidly and accurately positioned

    Advanced grid authorisation using semantic technologies - AGAST

    Get PDF
    Collaborative research requires flexible and fine-grained access control, beyond the common all-or-nothing access based purely on authentication. Existing systems can be hard to use, and do not lend themselves naturally to federation. We present an access-control architecture which builds on RDFs natural strength as an integration framework, which uses RDF scavenged from X.509 certificates, and policies expressed as ontologies and SPARQL queries, to provide flexible and distributed access control. We describe initial implementations

    Semantic security: specification and enforcement of semantic policies for security-driven collaborations

    Get PDF
    Collaborative research can often have demands on finer-grained security that go beyond the authentication-only paradigm as typified by many e-Infrastructure/Grid based solutions. Supporting finer-grained access control is often essential for domains where the specification and subsequent enforcement of authorization policies is needed. The clinical domain is one area in particular where this is so. However it is the case that existing security authorization solutions are fragile, inflexible and difficult to establish and maintain. As a result they often do not meet the needs of real world collaborations where robustness and flexibility of policy specification and enforcement, and ease of maintenance are essential. In this paper we present results of the JISC funded Advanced Grid Authorisation through Semantic Technologies (AGAST) project (www.nesc.ac.uk/hub/projects/agast) and show how semantic-based approaches to security policy specification and enforcement can address many of the limitations with existing security solutions. These are demonstrated into the clinical trials domain through the MRC funded Virtual Organisations for Trials and Epidemiological Studies (VOTES) project (www.nesc.ac.uk/hub/projects/votes) and the epidemiological domain through the JISC funded SeeGEO project (www.nesc.ac.uk/hub/projects/seegeo)

    A quantum mechanical approach to establishing the magnetic field orientation from a maser Zeeman profile

    Full text link
    Recent comparisons of magnetic field directions derived from maser Zeeman splitting with those derived from continuum source rotation measures have prompted new analysis of the propagation of the Zeeman split components, and the inferred field orientation. In order to do this, we first review differing electric field polarization conventions used in past studies. With these clearly and consistently defined, we then show that for a given Zeeman splitting spectrum, the magnetic field direction is fully determined and predictable on theoretical grounds: when a magnetic field is oriented away from the observer, the left-hand circular polarization is observed at higher frequency and the right-hand polarization at lower frequency. This is consistent with classical Lorentzian derivations. The consequent interpretation of recent measurements then raises the possibility of a reversal between the large-scale field (traced by rotation measures) and the small-scale field (traced by maser Zeeman splitting).Comment: 10 pages, 5 Figures, accepted for publication in MNRA

    The Magistrate's Courts

    Get PDF

    Instant restore after a media failure

    Full text link
    Media failures usually leave database systems unavailable for several hours until recovery is complete, especially in applications with large devices and high transaction volume. Previous work introduced a technique called single-pass restore, which increases restore bandwidth and thus substantially decreases time to repair. Instant restore goes further as it permits read/write access to any data on a device undergoing restore--even data not yet restored--by restoring individual data segments on demand. Thus, the restore process is guided primarily by the needs of applications, and the observed mean time to repair is effectively reduced from several hours to a few seconds. This paper presents an implementation and evaluation of instant restore. The technique is incrementally implemented on a system starting with the traditional ARIES design for logging and recovery. Experiments show that the transaction latency perceived after a media failure can be cut down to less than a second and that the overhead imposed by the technique on normal processing is minimal. The net effect is that a few "nines" of availability are added to the system using simple and low-overhead software techniques
    • ā€¦
    corecore