87 research outputs found

    Junior Honors Recital: Olivia Watkins, Soprano

    Get PDF
    Kemp Recital Hall November 10, 2018 Saturday Noo

    Recommendations for the use of online social support for African American men

    Full text link
    http://deepblue.lib.umich.edu/bitstream/2027.42/117269/1/27. Watkins & Jefferson, 2013.pdfDescription of 27. Watkins & Jefferson, 2013.pdf : Main articl

    Powder interlayer bonding of geometrically complex Ti-6Al-4V parts

    Get PDF
    Powder interlayer bonding (PIB) is a novel joining technique, which has been developed to facilitate high integrity repairs of aerospace components, manufactured from commonly used Titanium alloys. The technique utilises an interlayer between complex geometric components which are mated under pressure and a highly localised heating source. In this study, induction heating enabled bonding in an inert fusion zone by use of an oxygen displacing shielding gas, with particular attention to the initial heating and pressure application. These early stages proved crucial to the elimination of pores and consolidation of the alloy powder, with porosity volume fraction reduced to just 0.5% after just 20 seconds at the bonding force. The technique has produced high integrity bonds in alloys such as Ti-6Al-4V, retaining approximately 90% of the alloy strength in previous studies, offering advantages over established joining methods such as tungsten inert gas (TIG) and plasma arc (PA) welding due to a more highly localised heating and fusion zone. It is believed that powder interlayer bonding can compete against these techniques, providing a more time and cost effective repair route for net shape components manufactured from a range of alloys with minimal post processing

    How the Case United States v. Windsor Paved the Way for Same-Sex Marriage Legalization in the United States

    Get PDF
    This thesis looks at how the United States Supreme Court came to decide upon the issue of same-sex marriage. Starting in the lower courts and moving to the Supreme Court in 2013 and how the decision handed down by the court changed the law of the land. As well as how this decision has allowed for future changes in the law. Furthermore, how the new land has led individual states to overturn laws restricting marriage equality and how the Fourteenth Amendment can be used as a vehicle to legalize same-sex marriage across the states using the Courts decisions in United States v. Windsor and Loving v. Virginia. Also, where the law is headed in the near future and how the idea of percolation affects the direction of future legal decisions

    Strategies to Improve Nurse to Patient Ratios and its Affects on Patient Outcomes

    Get PDF
    https://scholarworks.moreheadstate.edu/student_scholarship_posters/1246/thumbnail.jp

    The Effect of Processing Variables on Powder Interlayer Bonding in Nickel-Based Superalloys

    Get PDF
    Powder Interlayer Bonding (PIB) has been considered as a lower-energy joining technology for nickel-based superalloys compared to conventional methods; such as friction welding. Typically; nickel-based superalloys exhibit high energy requirements for joining due to their high operating temperatures. However; PIB utilizes a localized temperature gradient created by an induction current; reducing the energy requirements for the process. PIB is a solid-state joining method that compresses and heats a powder interlayer between two faying surfaces to produce one joined workpiece. It has been successfully used to bond titanium alloys; and the objectives of this work were to explore its application as a joining method for nickel-based superalloys. Initial results showed that joining nickel-based superalloys via PIB is possible; and bondlines with very little porosity were observed. Further analysis showed that these bonded areas had lower porosity than the base material; suggesting PIB could be a successful joining method for difficult-to-join nickel-based superalloys

    Guiding Pretraining in Reinforcement Learning with Large Language Models

    Full text link
    Reinforcement learning algorithms typically struggle in the absence of a dense, well-shaped reward function. Intrinsically motivated exploration methods address this limitation by rewarding agents for visiting novel states or transitions, but these methods offer limited benefits in large environments where most discovered novelty is irrelevant for downstream tasks. We describe a method that uses background knowledge from text corpora to shape exploration. This method, called ELLM (Exploring with LLMs) rewards an agent for achieving goals suggested by a language model prompted with a description of the agent's current state. By leveraging large-scale language model pretraining, ELLM guides agents toward human-meaningful and plausibly useful behaviors without requiring a human in the loop. We evaluate ELLM in the Crafter game environment and the Housekeep robotic simulator, showing that ELLM-trained agents have better coverage of common-sense behaviors during pretraining and usually match or improve performance on a range of downstream tasks

    Tensor Trust: Interpretable Prompt Injection Attacks from an Online Game

    Full text link
    While Large Language Models (LLMs) are increasingly being used in real-world applications, they remain vulnerable to prompt injection attacks: malicious third party prompts that subvert the intent of the system designer. To help researchers study this problem, we present a dataset of over 126,000 prompt injection attacks and 46,000 prompt-based "defenses" against prompt injection, all created by players of an online game called Tensor Trust. To the best of our knowledge, this is currently the largest dataset of human-generated adversarial examples for instruction-following LLMs. The attacks in our dataset have a lot of easily interpretable stucture, and shed light on the weaknesses of LLMs. We also use the dataset to create a benchmark for resistance to two types of prompt injection, which we refer to as prompt extraction and prompt hijacking. Our benchmark results show that many models are vulnerable to the attack strategies in the Tensor Trust dataset. Furthermore, we show that some attack strategies from the dataset generalize to deployed LLM-based applications, even though they have a very different set of constraints to the game. We release all data and source code at https://tensortrust.ai/pape
    corecore