8,578 research outputs found
MSFC evaluation of the space fabrication demonstration system (beam builder)
The beam builder, designed and manufactured as a ground demonstration model, is a precursor to a machine for use in the space environment, transportable by the space shuttle. The beam builder has the capability to automatically fabricate triangular truss beams in low Earth orbit with a highly reliable machine that requires a minimum of in-space maintenance and repair. A performance assessment of the beam builder, which was fabricated from commercial hardware is given
A Multilevel File System for High Assurance
The designs of applications for multilevel systems cannot merely duplicate those of the untrusted world. When applications are built on a high assurance base they will be constrained by the underlying policy enforcement mechanism_ Consideration must be given to the creation and management of multilevel data structures by untrusted subjects_ Applications should be designed to rely upon the TCB s security policy enforcement services rather than build new access control services beyond the TCB perimeter The results of an analysis of the design of a general purpose  le system developed to execute as an untrusted application on a high assurance TCB are presented. The design illustrates a number of solutions to problems resulting from a high assurance environment.Approved for public release; distribution is unlimited
A Review of Spectral Methods for Variable Amplitude Fatigue Prediction and New Results
A comprehensive review of the available methods for estimating fatigue damage from variable amplitude loading is presented. The dependence of fatigue damage accumulation on power spectral density (psd) is investigated for random processes relevant to real structures such as in offshore or aerospace applications. Beginning with the Rayleigh (or narrow band) approximation, attempts at improved approximations or corrections to the Rayleigh approximation are examined by comparison to rainflow analysis of time histories simulated from psd functions representative of simple theoretical and real world applications. Spectral methods investigated include corrections by Wirsching and Light, Ortiz and Chen, the Dirlik formula, and the Single-Moment method, among other more recent proposed methods. Good agreement is obtained between the spectral methods and the time-domain rainflow identification for most cases, with some limitations. Guidelines are given for using the several spectral methods to increase confidence in the damage estimate
Emergency response for cyber infrastructure management
The objective of this research is to investigate architectural mechanisms to provide an emergency response capability for Cyber Infrastructure management through the use of distributed, highly secure, protected domains. Instead of creating a costly physically separate cyber domain, logical separation is used. This work developed an architecture and prototype demonstration in the context of an open source operating system.Approved for public release; distribution is unlimited
An introduction to Quality of Security Services
We examine the concept of security as a dimension of Quality of Service in distributed systems. We provide a discussion and examples of user- specified security variables and show how the range of service levels associated with these variables can support the provision of Quality of Security Service. We also discuss various design implications regarding security ranges provided in a QoS-aware distributed system. Our goal has been to provide an understanding of QoSS and variant security, and to determine whether these concepts can be useful in improving security service and system performance in QoS-aware distributed systems. We described the general requirements for system attributes to participate in the provision of Quality of Service, and described how certain security attributes might meet these requirements. We then described various forms of user and application security "ranges "and showed how these ranges can make sense in relation to existing security policies, when those ranges are presented as user choices. Finally we described security ranges as forming a coherent system of relationships in a distributed multi-tiered system. Our conclusion is that it may be possible for security to be a semantically meaningful dimension of Quality of Service without compromising existing security policies. Further study is needed to understand the effectiveness of QoSS in improving system performance in QoS-aware systems.Approved for public release; distribution is unlimited
Lithographically and electrically controlled strain effects on anisotropic magnetoresistance in (Ga,Mn)As
It has been demonstrated that magnetocrystalline anisotropies in (Ga,Mn)As
are sensitive to lattice strains as small as 10^-4 and that strain can be
controlled by lattice parameter engineering during growth, through post growth
lithography, and electrically by bonding the (Ga,Mn)As sample to a
piezoelectric transducer. In this work we show that analogous effects are
observed in crystalline components of the anisotropic magnetoresistance (AMR).
Lithographically or electrically induced strain variations can produce
crystalline AMR components which are larger than the crystalline AMR and a
significant fraction of the total AMR of the unprocessed (Ga,Mn)As material. In
these experiments we also observe new higher order terms in the
phenomenological AMR expressions and find that strain variation effects can
play important role in the micromagnetic and magnetotransport characteristics
of (Ga,Mn)As lateral nanoconstrictions.Comment: 11 pages, 4 figures, references fixe
- …
