410 research outputs found

    Design and analysis of the radiator structure for space power systems

    Get PDF
    The design, analysis, fabrication, and development of the 5-kWe radiator structure are shown. Thermal performance, meteoroid protection, structural capability during launch, development testing and space operation, material evaluation, and the configuration selection are described. The fin-tube development program depends on the relative values of the thermal coefficients of expansion. The initial selection of aluminum fins and Type 316 stainless-steel tubes was based on previous experience; however, the large differential in their expansion rates showed that an alternate, more compatible, combination was needed. Copper, stainless-steel-clad copper, boron-impregnated aluminum, and an independent radiator with a titanium structure were all considered as alternate materials. The final selection was Lockalloy fins with Type 304 stainless-steel D tubes

    Improved Portable Back Pain Relief Device with User Interface

    Get PDF
    The objective of this project is to design and create a massage system that is user interactive, portable, safe, efficient, and comfortable. The system should allow for user feedback from an outside peripheral such as a phone to be able to modify the system. Some challenges facing the implementation of such a system include: ensuring the product can withstand substantial force without breaking or malfunctioning while simultaneously being light enough for a consumer to carry without difficulty, engineering the massage heads to be able to move in multiple different motion types, creating the software that can control the device, and implementing a way for the user to easily power the system

    Accountable authentication with privacy protection: The Larch system for universal login

    Full text link
    Credential compromise is hard to detect and hard to mitigate. To address this problem, we present larch, an accountable authentication framework with strong security and privacy properties. Larch protects user privacy while ensuring that the larch log server correctly records every authentication. Specifically, an attacker who compromises a user's device cannot authenticate without creating evidence in the log, and the log cannot learn which web service (relying party) the user is authenticating to. To enable fast adoption, larch is backwards-compatible with relying parties that support FIDO2, TOTP, and password-based login. Furthermore, larch does not degrade the security and privacy a user already expects: the log server cannot authenticate on behalf of a user, and larch does not allow relying parties to link a user across accounts. We implement larch for FIDO2, TOTP, and password-based login. Given a client with four cores and a log server with eight cores, an authentication with larch takes 150ms for FIDO2, 91ms for TOTP, and 74ms for passwords (excluding preprocessing, which takes 1.23s for TOTP).Comment: This is an extended version of a paper appearing at OSDI 202

    SNAP 2 POWER CONVERSION SYSTEM. ROTATIONAL SPEED CONTROL. Topical Report No. 18

    Full text link
    The rotational speed control for the SNAP 2 power conversion system employs the concept of controlling speed by electrically loading the alternator. Speed is controlled in this manner to plus or minus 1% of nominal. This report covers work performed from March 1, 1960 to July 1, 1961. (auth

    Reducing Participation Costs via Incremental Verification for Ledger Systems

    Get PDF
    Ledger systems are applications run on peer-to-peer networks that provide strong integrity guarantees. However, these systems often have high participation costs. For a server to join this network, the bandwidth and computation costs grow linearly with the number of state transitions processed; for a client to interact with a ledger system, it must either maintain the entire ledger system state like a server or trust a server to correctly provide such information. In practice, these substantial costs centralize trust in the hands of the relatively few parties with the resources to maintain the entire ledger system state. The notion of *incrementally verifiable computation*, introduced by Valiant (TCC \u2708), has the potential to significantly reduce such participation costs. While prior works have studied incremental verification for basic payment systems, the study of incremental verification for a general class of ledger systems remains in its infancy. In this paper we initiate a systematic study of incremental verification for ledger systems, including its foundations, implementation, and empirical evaluation. We formulate a cryptographic primitive providing the functionality and security for this setting, and then demonstrate how it captures applications with privacy and user-defined computations. We build a system that enables incremental verification, for applications such as privacy-preserving payments, with universal (application-independent) setup. Finally, we show that incremental verification can reduce participation costs by orders of magnitude, for a bare-bones version of Bitcoin

    SNAP I POWER CONVERSION SYSTEM CONTROL DEVELOPMENT. Period covered: February 1, 1957 to June 30, 1959

    Full text link
    Development of the control elements for the SNAP 1 power conversion system is described. A description of test and prototype hardware and performance data are included. The control package in its final design is a combination of regulator and speed-sensitive feedback which provides satisfactory steady-state operation and serves as a mechanism correction for system disturbances. (J.R.D.

    Private Web Search with Tiptoe

    Get PDF
    Tiptoe is a private web search engine that allows clients to search over hundreds of millions of documents, while revealing no information about their search query to the search engine’s servers. Tiptoe’s privacy guarantee is based on cryptography alone; it does not require hardware enclaves or non-colluding servers. Tiptoe uses semantic embeddings to reduce the problem of private full-text search to private nearest-neighbor search. Then, Tiptoe implements private nearest-neighbor search with a new, high-throughput protocol based on linearly homomorphic encryption. Running on a 45-server cluster, Tiptoe can privately search over 360 million web pages with 145 core-seconds of server compute, 56.9 MiB of client-server communication (74% of which occurs before the client enters its search query), and 2.7 seconds of end-to-end latency. Tiptoe’s search works best on conceptual queries (“knee pain”) and less well on exact string matches (“123 Main Street, New York”). On the MS MARCO search-quality benchmark, Tiptoe ranks the best-matching result in position 7.7 on average. This is worse than a state-of-the-art, non-private neural search algorithm (average rank: 2.3), but is close to the classical tf-idf algorithm (average rank: 6.7). Finally, Tiptoe is extensible: it also supports private text-to-image search and, with minor modifications, it can search over audio, code, and more
    corecore