144 research outputs found

    International Organization for Standardization (ISO) activities for Long-Term Sustainability (LTS) of Space Activities

    Get PDF
    About ISO ISO established in 1947 to promote standards in international trade, communications, and manufacturing ISO general consultative status with UN ECOSOC since 1947 •ISO is an independent, non-governmental organization made up of members from national standards bodies of 163 countries “World\u27s largest developer of international standards” “One country, one vote

    TLS on Android – Evolution over the last decade

    Get PDF
    Mobile Geräte und mobile Plattformen sind omnipräsent. Android hat sich zum bedeutendsten mobilen Betriebssystem entwickelt und bietet Milliarden Benutzer:innen eine Plattform mit Millionen von Apps. Diese bieten zunehmend Lösungen für alltägliche Probleme und sind aus dem Alltag nicht mehr wegzudenken. Mobile Apps arbeiten dazu mehr und mehr mit persönlichen sensiblen Daten, sodass ihr Datenverkehr ein attraktives Angriffsziel für Man-in-the-Middle-attacks (MitMAs) ist. Schutz gegen solche Angriffe bieten Protokolle wie Transport Layer Security (TLS) und Hypertext Transfer Protocol Secure (HTTPS), deren fehlerhafter Einsatz jedoch zu ebenso gravierenden Unsicherheiten führen kann. Zahlreiche Ereignisse und frühere Forschungsergebnisse haben diesbezüglich Schwachstellen in Android Apps gezeigt. Diese Arbeit präsentiert eine Reihe von Forschungsbeiträgen, die sich mit der Sicherheit von Android befassen. Der Hauptfokus liegt dabei auf der Netzwerksicherheit von Android Apps. Hierbei untersucht diese Arbeit verschiedene Möglichkeiten zur Verbesserung der Netzwerksicherheit und deren Erfolg, wobei sie die Situation in Android auch mit der generellen Evolution von Netzwerksicherheit in Kontext setzt. Darüber hinaus schließt diese Arbeit mit einer Erhebung der aktuellen Situation und zeigt Möglichkeiten zur weiteren Verbesserung auf.Smart devices and mobile platforms are omnipresent. Android OS has evolved to become the most dominating mobile operating system on the market with billions of devices and a platform with millions of apps. Apps increasingly offer solutions to everyday problems and have become an indispensable part of people’s daily life. Due to this, mobile apps carry and handle more and more personal and privacy-sensitive data which also involves communication with backend or third party services. Due to this, their network traffic is an attractive target for Man-in-the-Middle-attacks (MitMAs). Protection against such attacks is provided by protocols such as Transport Layer Security (TLS) and Hypertext Transfer Protocol Secure (HTTPS). Incorrect use of these, however, can impose similar vulnerabilities lead to equally serious security issues. Numerous incidents and research efforts have featured such vulnerabilities in Android apps in this regard. This thesis presents a line of research addressing security on Android with a main focus on the network security of Android apps. This work covers various approaches for improving network security on Android and investigates their efficacy as well as it puts findings in context with the general evolution of network security in a larger perspective. Finally, this work concludes with a survey of the current state of network security in Android apps and envisions directions for further improvement

    A sketch of Mayan languages

    Get PDF
    From the introduction: The purpose of this paper is to present some of the principal features of Mayan languages. It will also touch on genetic relationships among the major members of the Mayan language family, as well as sketch some inferences regarding past migrations and inter-group contacts. A study of this nature is necessarily limited; only a few aspects of the languages are handled, and then only in a broad way. Nevertheless, a reading of this introductory work should provides beginning point for further study, especially for the student who may be contemplating doing field work in a Mayan language

    Solar Turbines Compressor Blade Installation Tools

    Get PDF
    The following report documents a California Polytechnic State University, Mechanical Engineering Senior Project sponsored by the gas turbine manufacturer, Solar Turbines. The senior project team consisted of four senior mechanical engineering students at Cal Poly, all with general concentrations; Ryan Bruce, Carolyn Honeycutt, Steve Oltrogge, and Emmett Ross. Kenneth Thomas sponsored the group and serves as the point of contact between the senior project team and Solar Turbines. He is a member of the Solar Turbines Mechanical Design Engineering Team and a Cal Poly graduate. Christoph Maurer served as the project team’s on-campus advisor. A gas turbine uses internal combustion to produce output shaft work and can be broken down into a “cold” section and a “hot” section. The cold section is composed of the air inlet and the air compressor, while the hot section is composed of the burner, turbine, and diffuser. This project was focused on the compressor, specifically compressor blade installation. Solar Turbines’ T130, Mars, and T250 turbines all contain multi-stage compressors, meaning that many sets of compressor blades spin around a single shaft to continually compress the air as it nears the burner. Many of the compressor stages are installed using a ring method, where the compressor blades are slid into large slots around the compressor rotor, radially, and held into place, axially, by a large ring. These stages require additional hardware to restrain the blades radially. However, the first several stages of the compressor use axially installed fan blades, where each blade slides into an individual slot on the rotor disk and is held in place, radially by the geometry of the compressor. These stages therefore require additional hardware to restrain the axial movement of the blades. This is accomplished via small steel retainer tabs. This project focuses on the installation of these metal retainer tabs. The current process for installing the early stage compressor blades, those requiring retainer tabs, involves several, individual, time-consuming steps. Additionally, there are numerous tools required for each of these steps and every individual installation technician can have an additional, personal set of installation tools. As a result compressor blade installation is a lengthy and imprecise process that leads to inconsistencies and risks damaging the compressor rotor. The task for the Cal Poly senior project group was to design a tool(s) and a corresponding standardized process to bend these retainer tabs into position. The sponsor, Solar Turbines, owns all Intellectual Property for the tools designed during the course of the project. In return, they provided funding for the project, access to necessary company proprietary information, manufacturing support (as needed), and general project guidance. The overall aim of this project was to design a tool or set of tools that removed as much of the variation from compressor blade retainer tab installation as possible. As well as reduced the time spent installing blades, therefore reducing the risk of damage to the turbine blades and rotors from non-standardized processes and tooling. Additionally the team focused on minimizes the number of tools used in the overall process. The final tool design consisted of two tools, a “backing” and a “bending” tool. Each should decrease the installation time, increase consistency, are more ergonomic, and are safer than the current methods

    Families of Alzheimer victims: A counseling overview

    Get PDF
    Alzheimer\u27s Disease is a disorder of the brain causing memory loss or serious mental deterioration that is progressive in nature. Eventually the individual is incapable of functioning independently in society. It is an impairment of orientation, memory, intellectual functioning, judgement and concentration. The disease affects an estimated 1.5 million Americans, with the number expected to increase as the elderly population grows (National Institute on Aging ( NIA) 1985)

    Correct Charge State Assignment of Native Electrospray Spectra of Protein Complexes

    Get PDF
    Correct charge state assignment is crucial to assigning an accurate mass to supramolecular complexes analyzed by electrospray mass spectrometry. Conventional charge state assignment techniques fall short of reliably and unambiguously predicting the correct charge state for many supramolecular complexes. We provide an explanation of the shortcomings of the conventional techniques and have developed a robust charge state assignment method that is applicable to all spectra

    Efficacy and safety of trabeculectomy with mitomycin C for childhood glaucoma: a study of results with long-term follow-up

    Get PDF
    OBJECTIVE: To evaluate the safety and effectiveness of trabeculectomy with mitomycin C in the management of childhood glaucoma. INTRODUCTION: The use of antifibrotic agents enhances the success of trabeculectomy performed in both adults and children. METHODS: A retrospective chart review (1991-2001) of 114 patients (114 eyes) from 0-14 years of age with congenital or developmental glaucoma. These patients underwent trabeculectomy with mitomycin but had not been previously treated with any antifibrotic agent. RESULTS: The mean patient age was 57.36 51.14 months (range: 0.5-168 months). Treatment was considered successful in 63 eyes (55.26%), with a mean intraocular pressure of 12.11 3.98 mmHg. For patients categorized as successfully treated, the mean follow-up time was 61.16 26.13 months (range 12-113 months). A post-surgical intraocular pressure of < 16 was observed in 47 eyes. The life-table success rates for intraocular pressure control at 24, 36, 48, and 60 months were 90.2%, 78.7%, 60.7% and 50.8%, respectively. The cumulative probability of failure was 40.8% at 12 months. Following surgery, endophthalmitis appeared in eight eyes (4.88%) after an average 36.96 months (range: 1.7-106 months). Other complications included expulsive hemorrhage, flat anterior chamber and bleb leak. DISCUSSION: It has been reported in pediatric patients that trabeculectomy without adjunctive antimetabolites achieves a successful outcome in 30% to 50% of cases. In our study, treatment was considered successful in 63 eyes (55.26%) within 61.16 26.13 months of follow-up. CONCLUSIONS: Trabeculectomy with mitomycin is safe and effective for short-term or long-term treatment of congenital or developmental glaucoma. The frequency of bleb-related endophthalmitis was no higher in these patients than that described in adults
    • …
    corecore