3,483 research outputs found

    Structural factoring approach for analyzing stochastic networks

    Get PDF
    The problem of finding the distribution of the shortest path length through a stochastic network is investigated. A general algorithm for determining the exact distribution of the shortest path length is developed based on the concept of conditional factoring, in which a directed, stochastic network is decomposed into an equivalent set of smaller, generally less complex subnetworks. Several network constructs are identified and exploited to reduce significantly the computational effort required to solve a network problem relative to complete enumeration. This algorithm can be applied to two important classes of stochastic path problems: determining the critical path distribution for acyclic networks and the exact two-terminal reliability for probabilistic networks. Computational experience with the algorithm was encouraging and allowed the exact solution of networks that have been previously analyzed only by approximation techniques

    A Taxonomy for and Analysis of Anonymous Communications Networks

    Get PDF
    Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama’s Cybersecurity Chief-elect recognizes the challenge of increasingly sophisticated cyber attacks. Now through April 2009, the White House is reviewing federal cyber initiatives to protect US citizen privacy rights. Indeed, the rising quantity and ubiquity of new surveillance technologies in cyberspace enables instant, undetectable, and unsolicited information collection about entities. Hence, anonymity and privacy are becoming increasingly important issues. Anonymization enables entities to protect their data and systems from a diverse set of cyber attacks and preserves privacy. This research provides a systematic analysis of anonymity degradation, preservation and elimination in cyberspace to enhance the security of information assets. This includes discovery/obfuscation of identities and actions of/from potential adversaries. First, novel taxonomies are developed for classifying and comparing well-established anonymous networking protocols. These expand the classical definition of anonymity and capture the peer-to-peer and mobile ad hoc anonymous protocol family relationships. Second, a unique synthesis of state-of-the-art anonymity metrics is provided. This significantly aids an entity’s ability to reliably measure changing anonymity levels; thereby, increasing their ability to defend against cyber attacks. Finally, a novel epistemic-based mathematical model is created to characterize how an adversary reasons with knowledge to degrade anonymity. This offers multiple anonymity property representations and well-defined logical proofs to ensure the accuracy and correctness of current and future anonymous network protocol design

    GCS programmer's manual

    Get PDF
    A variety of instructions to be used in the development of implementations of software for the Guidance and Control Software (GCS) project is described. This document fulfills the Radio Technical Commission for Aeronautics RTCA/DO-178A guidelines, 'Software Considerations in Airborne Systems and Equipment Certification' requirements for document No. 4, which specifies the information necessary for understanding and programming the host computer, and document No. 12, which specifies the software design and implementation standards that are applicable to the software development and testing process. Information on the following subjects is contained: activity recording, communication protocol, coding standards, change management, error handling, design standards, problem reporting, module testing logs, documentation formats, accuracy requirements, and programmer responsibilities

    Nitrogen Fertilizer and Irrigation Effects on Seed Yield and Oil in Camelina

    Get PDF
    Interest is growing in camelina (Camelina sativa L. Crantz) as a biofuel feedstock. However, there has been little camelina research in irrigated arid systems. A 2-yr field study in Maricopa, AZ, under an overhead sprinkler irrigation system determined the effects of 10 water levels (irrigation fraction 0.5–1.1) and five N fertilizer rates (38–150 kg N ha–1) on seed yield, seed oil content, and N use efficiency. Cultivar Robinson was planted in December 2012 and 2013. Nitrogen fertilizer (urea ammonium nitrate) was applied in three split applications. Irrigation amounts were from 125 to 380 mm, and in-season rain was 70 and 50 mm, in 2013 and 2014, respectively. Camelina seed yields were maximum at water level 7 (irrigation fraction 0.93) in 2013 at 1800 kg ha–1. Maximum seed yields were 1600 kg ha–1 at water level 6 (irrigation fraction 0.83) in 2014. These highest seed yields were achieved with 150 kg N ha–1 in both years. Oil content (maximum 41%) decreased with N rate but increased with water level. Seed N increased with N rate but decreased with irrigation level. Recovery efficiency of N fertilizer by camelina ranged from 12 to 72%. The results indicate that good high-oil camelina yields can be produced in the southwestern United States with 320 to 380 mm irrigation plus rain and N fertilizer rates of 150 kg N ha–1

    Cost efficient narrow linewidth laser transmitter for coherent detection

    Get PDF
    Authors present a cost efficient narrow linewidth laser transmitter for future coherent detection systems. The spectral purity of the laser allows the phase modulation of data signals at bit rates as low as 155 Mb/s

    The effects of fatigue on robotic surgical skill training in Urology residents

    Get PDF
    This study reports on the effect of fatigue on Urology residents using the daVinci surgical skills simulator (dVSS). Seven Urology residents performed a series of selected exercises on the dVSS while pre-call and post-call. Prior to dVSS performance a survey of subjective fatigue was taken and residents were tested with the Epworth Sleepiness Scale (ESS). Using the metrics available in the dVSS software, the performance of each resident was evaluated. The Urology residents slept an average of 4.07 h (range 2.5-6 h) while on call compared to an average of 5.43 h while not on call (range 3-7 h, p = 0.08). Post-call residents were significantly more likely to be identified as fatigued by the Epworth Sleepiness Score than pre-call residents (p = 0.01). Significant differences were observed in fatigued residents performing the exercises, Tubes and Match Board 2 (p = 0.05, 0.02). Additionally, there were significant differences in the total number of critical errors during the training session (9.29 vs. 3.14, p = 0.04). Fatigue in post-call Urology residents leads to poorer performance on the dVSS simulator. The dVSS may become a useful instrument in the education of fatigued residents and a tool to identify fatigue in trainees

    Peoria-Pekin Regional Ground-Water Quality Assessment

    Get PDF
    This study reports the results of sampling a major aquifer in central Illinois and seeks to define a baseline measure of ground-water quality. The area was targeted because of the use of hazardous substances in proximity to ground-water users. The initial assumption that potential problems might exist proved to be overly pessimistic. The overall quality of ground water from the Sankoty aquifer was found to be excellent, although very hard. The study does recognize, however, that naturally occurring organic carbon occurs more frequently than was previously thought. Methane is dissolved in ground water and frequently occurs, in the eastern portion of the study area, as a volatile organic compound (VOC).Ope

    The glacial geomorphology of upper Godthåbsfjord (Nuup Kangerlua) in south-west Greenland

    Get PDF
    © 2018 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group on behalf of Journal of Maps. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.The Greenland Ice Sheet (GrIS) is known to have experienced widespread retreat over the last century. Information on outlet glacier dynamics, prior to this, are limited due to both a lack of observations and a paucity of mapped or mappable deglacial evidence which restricts our understanding of centennial to millennial timescale dynamics of the GrIS. Here we present glacial geomorphological mapping, for upper Godthåbsfjord, covering 5800 km 2 at a scale of 1:92,000, using a combination of ASTER GDEM V2, a medium-resolution DEM (error < 10 m horizontal and < 6 m vertical accuracy), panchromatic orthophotographs and ground truthing. This work provides a detailed geomorphological assessment for the area, compiled as a single map, comprising of moraines, meltwater channels, streamlined bedrock, sediment lineations, ice-dammed lakes, trimlines, terraces, gullied sediment and marine limits. Whilst some of the landforms have been previously identified, the new information presented here improves our understanding of ice margin behaviour and can be used for future numerical modelling and landform dating programmes. Data also form the basis for palaeoglaciological reconstructions and contribute towards understanding of the centennial to millennial timescale record of this sector of the GrIS.Peer reviewedFinal Published versio
    corecore