417 research outputs found
Dynamic capacitor bank
Low power factor systems run inefficiently and cause power companies to lose thousands of dollars with wasted power. Correction systems currently implement static capacitor solutions to offset this power factor; however, companies where the power factor varies significantly need a better solution. In this paper, we discuss a reactive power factor correction system that could greatly benefit companies with this problem. The system is in its prototype state, which comprises of a capacitor bank, sensing circuit, a switching circuit and a microprocessor; we named it the Dynamic Capacitor Bank. During our project, we were able to get a sensing circuit to sense load voltage and current, as well as design a switching circuit and an inductive load for testing of the system. Our system performed the necessary steps to correct a power factor; however, we were limited by the power levels allowed for a senior design project and could not show precise information. Overall, a Dynamic Capacitor Bank could greatly benefit systems with varying power factor
The role of the mammalian prion protein in the control of sleep
Sleep disruption is a prevalent clinical feature in many neurodegenerative disorders, including human prion diseases where it can be the defining dysfunction, as in the case of the “eponymous” fatal familial insomnia, or an early-stage symptom as in certain types of Creutzfeldt-Jakob disease. It is important to establish the role of the cellular prion protein (PrPC), the key molecule involved in prion pathogenesis, within the sleep-wake system in order to understand fully the mechanisms underlying its contribution to both healthy circadian rhythmicity and sleep dysfunction during disease. Although severe disruption to the circadian rhythm and melatonin release is evident during the pathogenic phases of some prion diseases, untangling whether PrPC plays a role in circadian rhythmicity, as suggested in mice deficient for PrPC expression, is challenging given the lack of basic experimental research. We provide a short review of the small amount of direct literature focused on the role of PrPC in melatonin and circadian rhythm regulation, as well as suggesting mechanisms by which PrPC might exert influence upon noradrenergic and dopaminergic signaling and melatonin synthesis. Future research in this area should focus upon isolating the points of dysfunction within the retino-pineal pathway and further investigate PrPC mediation of pinealocyte GPCR activity
Developing a multimodal framework for stratification of severity and progression in isolated REM Sleep Behaviour Disorder
Austria’s progressive stance on cyber operations and international law
Artykuł analizuje narodowe stanowisko Austrii dotyczące stosowania prawa międzynarodowego do działań państw w cyberprzestrzeni. Austria przyjmuje kompleksowe i progresywne podejście, podkreślając, że suwerenność państwa jest fundamentalną zasadą prawa międzynarodowego obowiązującą także w cyberprzestrzeni. Pozycja ta poszerza tradycyjne podejścia, uznając, że cyberszpiegostwo, w tym przemysłowe, może naruszać suwerenność. Podkreśla nietykalność infrastruktury ICT na terenach misji dyplomatycznych i konsularnych oraz wprowadza koncepcję „ambasad danych”. Austria wskazuje również kampanie dezinformacyjne jako naruszenie zasady non-interwencji oraz popiera stosowanie kolektywnych środków zaradczych przez państwa w odpowiedzi na wrogie operacje cybernetyczne. Austria promuje rygorystyczną interpretację suwerenności i aktywne ramy prawne w celu przeciwdziałania rosnącym zagrożeniom cybernetycznym.This article analyzes Austria’s national position on the application of international law to State cyber activities. Austria adopts a comprehensive and progressive approach, emphasizing that State sovereignty is a fundamental rule of international law applicable in cyberspace. The position expands traditional views by considering cyber espionage, including industrial espionage, as potentially violating sovereignty. It underscores the inviolability of ICT infrastructure on diplomatic and consular premises and introduces the concept of "data embassies." Austria also highlights disinformation campaigns as breaches of the non-intervention principle and supports the use of collective countermeasures by States against malicious cyber operations. Overall, Austria promotes a strict interpretation of sovereignty and proactive legal frameworks to address growing cyber threats
School Uniforms: Background of and Descriptive Research
This study will examine the pros and cons of implementing a public school uniform policy along with the laws involved. By analyzing and comparing a few school districts which have created a uniform policy, a conclusion can be made about whether our public schools would have better environments if the students were dressed in uniform. This study includes information on both elementary and secondary schools in urban and suburban settings
An inspection regime for cyber weapons : a challenge too far?
Two of the most pressing questions concerning international peace and security today are how to avoid an escalation of conflicts in cyberspace and how to ensure responsible behavior and accountability of states in their use of information and communication technologies. With more than thirty states now possessing offensive cyber capabilities and cybersecurity incidents such as Stuxnet, WannaCry, and NotPetya causing significant physical effects or financial damage, there is a clear need to find a better way to manage security risks connected with the use of increasingly sophisticated cyber means by states. At present, this issue is on the agenda of two United Nations groups and is mainly addressed through a “framework for responsible behavior of states” consisting of international law, voluntary and non-binding norms, and confidence-building measures for states’ use of information and communication technologies. What the current discussions do not address, however, is whether the security risks could also be regulated through an arms control and inspection regime for cyber weapons. While such a regime has been proposed by scholars, states remain skeptical or even actively opposed to efforts to impose traditional arms control measures on offensive cyber capabilities. This essay examines why a cyber weapons inspection regime is so difficult to devise. It argues that due to their nature and mode of functioning, cyber weapons significantly differ from traditional nuclear, chemical, or biological weapons, such that mechanisms established by traditional arms control treaties either will not work or will not be agreed to by states. Instead, new regulatory approaches are necessary
School Uniforms: Background of and Descriptive Research
This study will examine the pros and cons of implementing a public school uniform policy along with the laws involved. By analyzing and comparing a few school districts which have created a uniform policy, a conclusion can be made about whether our public schools would have better environments if the students were dressed in uniform. This study includes information on both elementary and secondary schools in urban and suburban settings.SUNY BrockportEducation and Human DevelopmentMaster of Science in Education (MSEd)Education and Human Development Master's These
- …
