1,344 research outputs found

    Reactions of NaCl with Gaseous SO3, SO2, and O2

    Get PDF
    Hot corrosion of gas turbine engine components involves deposits of Na2SO4 which are produced by reactions between NaCl and oxides of sulfur. For the present investigation, NaCl single crystals were exposed at 100 to 850 C to gaseous mixtures of SO3, SO2, and O2. The products formed during this exposure depend, primarily, on the temperatures. The four product films were: NaCl-SO3; Na2S2O7; Na2SO4; and NaCl-Na2SO4. The kinetics of the reactions were measured

    Optimizing time allocation for network defence

    Get PDF
    The presence of unpatched, exploitable vulnerabilities in software is a prerequisite for many forms of cyberattack. Because of the almost inevitable discovery of a vulnerability and creation of an exploit for all types of software, multiple layers of security are usually used to protect vital systems from compromise. Accordingly, attackers seeking to access protected systems must circumvent all of these layers. Resource- and budget-constrained defenders must choose when to execute actions such as patching, monitoring and cleaning infected systems in order to best protect their networks. Similarly, attackers must also decide when to attempt to penetrate a system and which exploit to use when doing so. We present an approach to modelling computer networks and vulnerabilities that can be used to find the optimal allocation of time to different system defence tasks. The vulnerabilities, state of the system and actions by the attacker and defender are used to build partially observable stochastic games. These games capture the uncertainty about the current state of the system and the uncertainty about the future. The solution to these games is a policy, which indicates the optimal actions to take for a given belief about the current state of the system. We demonstrate this approach using several different network configurations and types of player. We consider a trade-off for the system administrator, where they must allocate their time to performing either security-related tasks or performing other required non-security tasks. The results presented highlight that, with the requirement for other tasks to be performed, following the optimal policy means spending time on only the most essential security-related tasks, while the majority of time is spent on non-security tasks

    Status, Dispersal, and Breeding Biology of the Exotic Eurasian Collared-Dove (Streptopelia decaocto) in Arkansas

    Get PDF
    The exotic Eurasian Collared-Dove (Streptopelia decaocto) was first sighted in Arkansas at Harrison (Boone Co.) on 25 June 1989. Since this initial sighting the species has grown in numbers and is now present in 42 of 75 counties across the state. In the spring and summer of 2009 and 2010, 20 nests were observed in the urban areas of Fort Smith (Sebastian County). Fifteen of the 20 nests (75%) were located on human-made structures of which 13 (65%) were on an electrical substation and two (10%) were on utility poles. The remaining 5 nests (25%) were in trees. Mean nest height was 7.62 m (n = 20 nests), and the mean width of the nest site support was 40 cm (n = 6 nests). Thirteen of the 20 nests (65%) yielded fledgling(s). Three focal nests were chosen for intense observation. Nest building lasted 1 to 3 days (mean = 2 days); incubation period was 15 days; and fledging occurred 17-18 days after hatching (n = 3 nests). A total of 6 young fledged from these 3 nests

    Information Security as Strategic (In)effectivity

    Full text link
    Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have. In this work, we suggest that information security is not a goal in itself, but rather a means of preventing potential attackers from compromising the correct behavior of the system. To formalize this, we first show how two information flows can be compared by looking at the adversary's ability to harm the system. Then, we propose that the information flow in a system is effectively information-secure if it does not allow for more harm than its idealized variant based on the classical notion of noninterference

    The effect of a 24-hour photoperiod on the survival, growth and swim bladder inflation of pre-flexion yellowfin tuna (Thunnus albacares) larvae

    Get PDF
    The effects of two different continuous photoperiod regimes on survival, growth and swim bladder inflation of pre-flexion yellowfin tuna (Thunnus albacares) larvae were investigated. Each photoperiod regime was tested twice with a different larval cohort to confirm the observed results. Trials 1 and 2 tested the effect of a reduced night-time light intensity (10-molesm-2s-1=30% of the daytime intensity) and found that those larvae reared for 8days under the 24h lighting (24-L) photoperiod exhibited a slight improvement in survival compared to those reared under the control photoperiod of 12h light (12-L), however these improvements were not significant. In addition, those larvae reared under this photoperiod regime were equal in length to those in the control. Trials 3 and 4 compared the same variables in larvae reared under a continuous photoperiod (24-L) with a constant light intensity of 30-molesm-2s-1, against those reared under the aforementioned 12-L photoperiod. Survival of larvae under the continuous photoperiods were 9±1% (n=2) and 10±2% (n=3) for Trials 3 and 4, respectively, compared to less than 1% in both control treatments; differences that in both cases were highly significant. In addition, in both trials larvae cultured under the 24-L photoperiod were significantly larger and exhibited more advanced development than those reared under the 12-L photoperiod, however swim bladder inflation was significantly lower. We suggest that the improved survival and growth achieved under a continuous photoperiod is due to the extended foraging time combined with the prevention of mortality caused by night-time sinking

    Visual art inspired by the collective feeding behavior of sand-bubbler crabs

    Full text link
    Sand--bubblers are crabs of the genera Dotilla and Scopimera which are known to produce remarkable patterns and structures at tropical beaches. From these pattern-making abilities, we may draw inspiration for digital visual art. A simple mathematical model is proposed and an algorithm is designed that may create such sand-bubbler patterns artificially. In addition, design parameters to modify the patterns are identified and analyzed by computational aesthetic measures. Finally, an extension of the algorithm is discussed that may enable controlling and guiding generative evolution of the art-making process

    Direct, biomimetic synthesis of (+)-artemone via a stereoselective, organocatalytic cyclization

    Get PDF
    We present a four-step synthesis of (+)-artemone from (–)- linalool, featuring iminium organocatalysis of a doubly diastereoselective conjugate addition reaction. The strategy follows a proposed biosynthetic pathway, rapidly generates stereochemical complexity, uses no protecting groups, and minimizes redox manipulations

    Services Available to Alzheimer\u27s Diseased Patients and Their Families

    Get PDF
    The focus of this project is an overview of services that are available to Alzheimer\u27s Disease clients. Since our society has seen an increase in the number of patients diagnosed with the disease, it\u27s necessary to plan into the future and direct our goals in providing good health care. One wants to be capable of handling every aspect of the disease we see today. One must also protect the client and health care professionals. The client must be allowed to live a productive and happy life. Unfortunately, because of the disease process, I feel it robs the client of the happiness they are entitled to. There will be insight as to how a family may cope with an Alzheimer\u27s diseased loved one -- how the disease will effect the family members -- how the husband, wife, or children may cope with the unpredictability of an Alzheimer\u27s patient -- the changes that the patients/ clients will experience. In the field of health care I have found varying correlation in the study of Alzheimer\u27s Disease. What I have set out to accomplish is some understanding of the interaction of the studies. However, I find it necessary to concentrate on the services available to the Alzheimer\u27s patient. I have found that the number of Alzheimer\u27s patients in nursing facilities are increasing. Also, yearly, large numbers of patients are diagnosed with signs or symptoms of Alzheimer\u27s Disease. It\u27s believed that the disease ·has relationship to previously termed Dementia. Dementia is not a disease in itself, but a group of symptoms that have characteristics of certain diseases and conditions
    corecore