1,799 research outputs found

    Opacified fibrous thermal insulation

    Get PDF
    Lightweight, opacified, glass fiber batting for high temperature insulation in cryogenic tanks has lower apparent thermal conductivity than untreated insulations. Decrease results from impeding the transmission of radiant energy without increasing the solid conductance of the material

    Analysis of a Bias-Based Exception to the Doctrine of Exhaustion in Wilson v. Bull

    Get PDF

    Simultaneous Avulsion Fractures of the Tibial Tuberosity of Both Knees in a 14-Year-Old Boy: A Case Report

    Get PDF
    Fractures of the tibial tuberosity are uncommon injuries in adolescents, representing an estimated 0.4% to 2.7% of all pediatric fractures. Most of these injuries occur in young, active males commonly between the ages of 12 to 17 years. Sports, particularly those involving jumping or sudden starts and stops, are most often implicated. Injuries of the tibial tuberosity of both knees are especially rare, with little more than 30 cases reported in the past 60 years. We present a 14-year-old male football player with simultaneous avulsion fractures of the tibial tuberosity of both knees. We reviewed the anatomy, mechanisms of injury, classification systems, treatment strategies, and complications regarding this rare injury

    Hash-based signatures for the internet of things

    Get PDF
    While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA. In this position paper we review a family of alternative signature schemes, based on hash functions, and we make the case for their application in Internet of Things (IoT) settings. Hash-based signatures provide postquantum security, and only make minimal security assumptions, in general requiring only a secure cryptographic hash function. This makes them extremely flexible, as they can be implemented on top of any hash function that satisfies basic security properties. Hash-based signatures also feature numerous parameters defining aspects such as signing speed and key size, that enable trade-offs in constrained environments. Simplicity of implementation and customization make hash based signatures an attractive candidate for the IoT ecosystem, which is composed of a number of diverse, constrained devices

    Honors program at M.U.

    Get PDF
    "Contemporary higher education faces a massive double challenge: to meet and accommodate a tidal wave of students, and at the same time to maintain and advance the highest possible intellectual standards. The building progrram is solid evidence that Missouri is meeting the first issue. The establishement of a formal Honors Program is equally substantial, though less immediately obvious, evidence that Missouri is also grappling with the second challenge."--Page

    2011 Title VI Survey Results

    Get PDF
    This report summarizes the results of a survey conducted in 2011 of Title VI (Native American Organizations) to assess the role of Title VI programs in offering services and supports to the elders in their communities. Over 80% of Title VI programs responded. Results describe demographic structure and characteristics, services provided and programs offered to ensure elders can age with independence in their homes and communities

    2014 Title VI Survey Results

    Get PDF
    This research record highlights the findings from a national survey of the Title VI Organizations (TO). Findings highlight TOs connection to the larger tribal infrastructure, key features and services of the TO programs, innovative care delivery, elder abuse prevention and intervention, expanding services and sustainability, and training and technical assistance needs

    Hyperpolarizability and operational magic wavelength in an optical lattice clock

    Get PDF
    Optical clocks benefit from tight atomic confinement enabling extended interrogation times as well as Doppler- and recoil-free operation. However, these benefits come at the cost of frequency shifts that, if not properly controlled, may degrade clock accuracy. Numerous theoretical studies have predicted optical lattice clock frequency shifts that scale nonlinearly with trap depth. To experimentally observe and constrain these shifts in an 171^{171}Yb optical lattice clock, we construct a lattice enhancement cavity that exaggerates the light shifts. We observe an atomic temperature that is proportional to the optical trap depth, fundamentally altering the scaling of trap-induced light shifts and simplifying their parametrization. We identify an "operational" magic wavelength where frequency shifts are insensitive to changes in trap depth. These measurements and scaling analysis constitute an essential systematic characterization for clock operation at the 10−1810^{-18} level and beyond.Comment: 5 + 2 pages, 3 figures, added supplementa
    • …
    corecore