734 research outputs found

    Measuring packet reordering

    Get PDF

    Evaluation of Salmon (<i>Salmo salar</i>) and Rainbow Trout (<i>Oncorhynchus mykiss</i>) pin bones using textural analysis and micro X-ray computational tomography

    Get PDF
    Industrially, common problems arise with the deboning pin bone process, where Atlantic Salmon (Salmo salar) and Rainbow Trout (Oncorhynchus mykiss) fillets, post rigor, are subjected to a pulling process to remove the pin bones from the fillet. This study measured the length of pin bones from two species of fish and two different industrial graded weights, and then used a texture analyser and lCT X-ray to measure the pulling force, break point and volume of the pin bones of both species of fish. Results showed that salmon pin bones required significantly higher pulling force to remove pin bones from the fish fillet when compared with Trout pin bones. Interestingly Trout pin bones were significantly longer and stronger than Salmon pin bones, but had significantly lower volume. This research has progressed the issues surrounding pin boning industrially, however, more studies are required in order to understand if these differences affect the overall deboning pin bone process

    The effect of collagenase, water and calcium chloride on the removal of <i>Salmo salar</i> (salmon) and <i>Oncorhynchus mykiss</i> (trout) pin bones

    Get PDF
    The aim of this study was to determine the influence of the fillet structure on the deboning force required to remove salmon and trout pin bones. Salmon and trout fillets with differing fillet structure were used, in order to study the importance of the fillet structure on the deboning process. In the first test naturally gaping and non-gaping fillets were compared. To confirm the role that the collagen plays within the fillet structure, the fillets underwent series of treatments. Fillets were put into (i) a collagenase solution to remove the collagen in the fillet (ii) a calcium chloride solution to determine if collagen was the main influential factor. Both treated salmon and trout fillets were again compared to untreated fillets from the same batch. The results indicate that collagenase and calcium chloride have a large interaction on deboning force compared to water or no treatments

    A note on air temperature and precipitation variability and extremes over Asmara: 1914‐2015

    Get PDF
    Meteorological series (daily precipitation, minimum and maximum air temperature) for Asmara (Eritrea) for the last hundred years (1914 – 2015) are analysed. The data were quality controlled and homogenized using publicly available data from surrounding countries as well as newly recovered data from twelve stations in Eritrea. Overall, the Asmara data showed a consistent pattern and there were no outliers outside of four standard deviations from the corresponding reference. Climate indices were calculated using the program RClimDex. Overall, eight indices for description of the air temperature data and ten for precipitation data were calculated. The analyses of averages and indices reveal large climatic variations in the central highlands of Eritrea. The results indicate significant changes in air temperature since 1943, with daily minimum and maximum air temperature increasing at a similar rate of 0.22 and 0.19 °C dec-1, respectively. The diurnal air temperature range shows a non-significant decreasing trend over the study period. No significant variation was found in the annual total and the seasonal precipitation over the last century. Significant trends were detected for some daily precipitation indices, although the lack of reference series prevents an evaluation of their reliability

    Who’s Got Your Mail?:Characterizing Mail Service Provider Usage

    Get PDF
    E-mail has long been a critical component of daily communication and the core medium for modern business correspondence. While traditionally e-mail service was provisioned and implemented independently by each Internet-connected organization, increasingly this function has been outsourced to third-party services. As with many pieces of key communications infrastructure, such centralization can bring both economies of scale and shared failure risk. In this paper, we investigate this issue empirically --- providing a large-scale measurement and analysis of modern Internet e-mail service provisioning. We develop a reliable methodology to better map domains to mail service providers. We then use this approach to document the dominant and increasing role played by a handful of mail service providers and hosting companies over the past four years. Finally, we briefly explore the extent to which nationality (and hence legal jurisdiction) plays a role in such mail provisioning decisions

    Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy

    Full text link
    The critical role played by email has led to a range of extension protocols (e.g., SPF, DKIM, DMARC) designed to protect against the spoofing of email sender domains. These protocols are complex as is, but are further complicated by automated email forwarding -- used by individual users to manage multiple accounts and by mailing lists to redistribute messages. In this paper, we explore how such email forwarding and its implementations can break the implicit assumptions in widely deployed anti-spoofing protocols. Using large-scale empirical measurements of 20 email forwarding services (16 leading email providers and four popular mailing list services), we identify a range of security issues rooted in forwarding behavior and show how they can be combined to reliably evade existing anti-spoofing controls. We show how this allows attackers to not only deliver spoofed email messages to prominent email providers (e.g., Gmail, Microsoft Outlook, and Zoho), but also reliably spoof email on behalf of tens of thousands of popular domains including sensitive domains used by organizations in government (e.g., state.gov), finance (e.g., transunion.com), law (e.g., perkinscoie.com) and news (e.g., washingtonpost.com) among others

    Entropy Driven Crystal Formation on Highly Strained Substrates

    Get PDF
    In heteroepitaxy, lattice mismatch between the deposited material and the underlying surface strongly affects nucleation and growth processes. The effect of mismatch is well studied in atoms with growth kinetics typically dominated by bond formation with interaction lengths on the order of one lattice spacing. In contrast, less is understood about how mismatch affects crystallization of larger particles, such as globular proteins and nanoparticles, where interparticle interaction energies are often comparable to thermal fluctuations and are short ranged, extending only a fraction of the particle size. Here, using colloidal experiments and simulations, we find particles with short-range attractive interactions form crystals on isotropically strained lattices with spacings significantly larger than the interaction length scale. By measuring the free-energy cost of dimer formation on monolayers of increasing uniaxial strain, we show the underlying mismatched substrate mediates an entropy-driven attractive interaction extending well beyond the interaction length scale. Remarkably, because this interaction arises from thermal fluctuations, lowering temperature causes such substrate-mediated attractive crystals to dissolve. Such counterintuitive results underscore the crucial role of entropy in heteroepitaxy in this technologically important regime. Ultimately, this entropic component of lattice mismatched crystal growth could be used to develop unique methods for heterogeneous nucleation and growth of single crystals for applications ranging from protein crystallization to controlling the assembly of nanoparticles into ordered, functional superstructures. In particular, the construction of substrates with spatially modulated strain profiles would exploit this effect to direct self-assembly, whereby nucleation sites and resulting crystal morphology can be controlled directly through modifications of the substrate

    Fast and Vulnerable: A Story of Telematic Failures

    Get PDF
    Abstract Modern automobiles are complex distributed systems in which virtually all functionality -from acceleration and braking to lighting and HVAC -is mediated by computerized controllers. The interconnected nature of these systems raises obvious security concerns and prior work has demonstrated that a vulnerability in any single component may provide the means to compromise the system as a whole. Thus, the addition of new components, and especially new components with external networking capability, creates risks that must be carefully considered. In this paper we examine a popular aftermarket telematics control unit (TCU) which connects to a vehicle via the standard OBD-II port. We show that these devices can be discovered, targeted, and compromised by a remote attacker and we demonstrate that such a compromise allows arbitrary remote control of the vehicle. This problem is particularly challenging because, since this is aftermarket equipment, it cannot be well addressed by automobile manufacturers themselves

    Characterization of Anycast Adoption in the DNS Authoritative Infrastructure

    Get PDF
    Anycast has proven to be an effective mechanism to enhance resilience in the DNS ecosystem and for scaling DNS nameserver capacity, both in authoritative and the recursive resolver infrastructure. Since its adoption for root servers, anycast has mitigated the impact of failures and DDoS attacks on the DNS ecosystem. In this work, we quantify the adoption of anycast to support authoritative domain name service for top- level and second-level domains (TLDs and SLDs). Comparing two comprehensive anycast census datasets in 2017 and 2021, with DNS measurements captured over the same period, reveals that anycast adoption is increasing, driven by a few large operators. While anycast offers compelling resilience advantage, it also shifts some resilience risk to other aspects of the infrastructure. We discuss these aspects, and how the pervasive use of anycast merits a re-evaluation of how to measure DNS resilience
    corecore