Sample records for locks security

  1. Safe-haven locking device

    DOEpatents

    Williams, J.V.

    1984-04-26

    Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.

  2. PWR integral tie plate and locking mechanism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flora, B.S.; Osborne, J.L.

    1980-08-26

    A locking mechanism for securing an upper tie plate to the tie rods of a nuclear fuel bundle is described. The mechanism includes an upper tie plate assembly and locking sleeves fixed to the ends of the tie rods. The tie plate is part of the upper tie plate assembly and is secured to the fuel bundle by securing the entire upper tie plate assembly to the locking sleeves fixed to the tie rods. The assembly includes, in addition to the tie plate, locking nuts for engaging the locking sleeves, retaining sleeves to operably connect the locking nuts to themore » assembly, a spring biased reaction plate to restrain the locking nuts in the locked position and a means to facilitate the removal of the entire assembly as a unit from the fuel bundle.« less

  3. Locking mechanism

    DOEpatents

    Williams, Gary L.; Goin, Jr., Jesse L.; Kirby, Patrick G.; McKenna, John P.

    1997-01-01

    The invention is a motorized linkage for operating a door strike. A six volt power source, controlled by a security code, rotates a small electric motor when a proper security code is given. The motor rotates a shaft which engages a coil spring. This moves a locking cam. When a catch on the locking cam separates from the locking lever catch, the latch bolt keeper may be manipulated by a user.

  4. 77 FR 73464 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ..., grantees, volunteers, interns, and others performing or working on a contract, service, grant, cooperative... tape records are stored in locked file rooms, locked file cabinets, or locked safes. RETRIEVABILITY... safeguarded in a secured environment. Buildings where records are stored have security cameras and 24-hour...

  5. Development of an Independent Locking Securement System for Mobility Aids on Public Transportation Vehicles

    DOT National Transportation Integrated Search

    1992-12-01

    The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...

  6. Portable appliance security apparatus

    NASA Technical Reports Server (NTRS)

    Kerley, J. J. (Inventor)

    1981-01-01

    An apparatus for securing a small computer, or other portable appliance, against theft is described. It is comprised of a case having an open back through which the computer is installed or removed. Guide members in the form of slots are formed in a rear portion of opposite walls of the case for receiving a back plate to cover the opening and thereby secure the computer within the case. An opening formed in the top wall of the case exposes the keyboard and display of the computer. The back plate is locked in the closed position by a key-operated plug type lock. The lock is attached to one end of a hold down cable, the opposite end thereof being secured to a desk top or other stationary object. Thus, the lock simultaneously secures the back plate to the case and retains the case to the stationary object.

  7. Vane segment support and alignment device

    DOEpatents

    McLaurin, L.D.; Sizemore, J.D.

    1999-07-13

    A support and alignment assembly for supporting and aligning a vane segment is provided. The support and alignment assembly comprises a torque plate which defines an opening for receiving an eccentric pin and a locking end member for receiving a lock socket member. An eccentric pin adjustably supported by the torque plate opening for supporting and aligning a vane segment is provided. A lock socket member adapted to securely receive the eccentric pin and rotated therewith, and adjustably engage the torque plate locking end is provided. The lock socket member receives the eccentric pin, such that when the eccentric pin is adjusted to align the vane segment, the lock socket member engages the torque plate locking end to secure the vane segment in the desired position. 5 figs.

  8. Vane segment support and alignment device

    DOEpatents

    McLaurin, Leroy Dixon; Sizemore, John Derek

    1999-01-01

    A support and alignment assembly for supporting and aligning a vane segment is provided. The support and alignment assembly comprises a torque plate which defines an opening for receiving an eccentric pin and a locking end member for receiving a lock socket member. An eccentric pin adjustably supported by the torque plate opening for supporting and aligning a vane segment is provided. A lock socket member adapted to securely receive the eccentric pin and rotated therewith, and adjustably engage the torque plate locking end is provided. The lock socket member receives the eccentric pin, such that when the eccentric pin is adjusted to align the vane segment, the lock socket member engages the torque plate locking end to secure the vane segment in the desired position.

  9. Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device

    PubMed Central

    Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik

    2014-01-01

    Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties. PMID:25202737

  10. Time pattern locking scheme for secure multimedia contents in human-centric device.

    PubMed

    Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik

    2014-01-01

    Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  11. Vane segment support and alignment device

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McLaurin, L.D.; Sizemore, J.D.

    1999-07-13

    A support and alignment assembly for supporting and aligning a vane segment is provided. The support and alignment assembly comprises a torque plate which defines an opening for receiving an eccentric pin and a locking end member for receiving a lock socket member. An eccentric pin adjustably supported by the torque plate opening for supporting and aligning a vane segment is provided. A lock socket member adapted to securely receive the eccentric pin and rotated therewith, and adjustably engage the torque plate locking end is provided. The lock socket member receives the eccentric pin, such that when the eccentric pinmore » is adjusted to align the vane segment, the lock socket member engages the torque plate locking end to secure the vane segment in the desired position. 5 figs.« less

  12. 49 CFR 236.780 - Plunger, facing point lock.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...

  13. 49 CFR 236.780 - Plunger, facing point lock.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...

  14. 49 CFR 236.780 - Plunger, facing point lock.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...

  15. 49 CFR 236.780 - Plunger, facing point lock.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...

  16. 49 CFR 236.780 - Plunger, facing point lock.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...

  17. TealLock 5.20 security software program for handheld devices.

    PubMed

    Tahil, Fatimah A

    2004-07-01

    The TealLock has a simple graphic interface, and the program is user-friendly with well thought out options to customize security settings. The program is inexpensive and works seamlessly with the Palm OS platform's built-in basic Security application. The developer offers a 30-day free trial version and there is no downside to trying it to see if it meets your needs. It seems to be an effective security software program for psychiatrists who keep confidential and sensitive patient information on their PDAs. In keeping with HIPAA regulations, the TealLock bolsters security for protected health information stored on PDAs or other handheld devices by providing safeguards that address authentication, access control, encryption, and selected aspects of transmission.

  18. Concatenated logic circuits based on a three-way DNA junction: a keypad-lock security system with visible readout and an automatic reset function.

    PubMed

    Chen, Junhua; Zhou, Shungui; Wen, Junlin

    2015-01-07

    Concatenated logic circuits operating as a biocomputing keypad-lock security system with an automatic reset function have been successfully constructed on the basis of toehold-mediated strand displacement and three-way-DNA-junction architecture. In comparison with previously reported keypad locks, the distinctive advantage of the proposed security system is that it can be reset and cycled spontaneously a large number of times without an external stimulus, thus making practical applications possible. By the use of a split-G-quadruplex DNAzyme as the signal reporter, the output of the keypad lock can be recognized readily by the naked eye. The "lock" is opened only when the inputs are introduced in an exact order. This requirement provides defense against illegal invasion to protect information at the molecular scale. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. The relationship between substance use and exit security on psychiatric wards.

    PubMed

    Simpson, Alan; Bowers, Len; Haglund, Kristina; Muir-Cochrane, Eimear; Nijman, Henk; Van der Merwe, Marie

    2011-03-01

    In this paper we report on the rates of drug/alcohol use on acute psychiatric wards in relation to levels and intensity of exit security measures. Many inpatient wards have become permanently locked, with staff concerned about the risk of patients leaving the ward and harming themselves or others, and of people bringing illicit substances into the therapeutic environment. In 2004/2005, a cross sectional survey on 136 acute psychiatric wards across three areas of England was undertaken. A comprehensive range of data including door locking and drug/alcohol use were collected over 6 months on each ward. In 2006, supplementary data on door locking and exit security were collected. Door locking, additional exit security measures and substance misuse rates of the 136 wards were analysed and the associations between these were investigated. No consistent relationships were found with exit security features, intensity of drug/alcohol monitoring procedures, or the locking of the ward door. There were indications that use of breath testing for alcohol might reduce usage and that the use of 'sniffer' dogs was associated with greater alcohol use. Greater exit security or locking of the ward door had no influence on rates of use of alcohol or illicit drugs by inpatients and thus cannot form part of any strategy to control substance use by inpatients. There are some grounds to believe that a greater use of screening might help reduce the frequency of alcohol/substance use on wards and may lead to a reduction in verbal abuse. © 2010 The Authors. Journal of Advanced Nursing © 2010 Blackwell Publishing Ltd.

  20. Data port security lock

    DOEpatents

    Quinby, Joseph D [Albuquerque, NM; Hall, Clarence S [Albuquerque, NM

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  1. 27 CFR 19.281 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... tanks containing spirits, denatured spirits, or wine shall be individually locked or locked within an... wines or the rooms or buildings in which they are housed, shall be equipped so that they may be secured... lights, alarm systems, guard services) or changes in construction, arrangement, or equipment shall be...

  2. The Development Of An Independent Locking Securement System For Mobility Aids In Public Transportation Vehicles: Volume 2

    DOT National Transportation Integrated Search

    1992-12-01

    The Quality Functional Deployment (QFD) method was used for the design of the Independent Locking Securement (ILS) System, developed by the Oregon State University. The project entailed the design, construction, and testing of the ILS system prototyp...

  3. A rhythm-based authentication scheme for smart media devices.

    PubMed

    Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk

    2014-01-01

    In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.

  4. A Rhythm-Based Authentication Scheme for Smart Media Devices

    PubMed Central

    Lee, Jae Dong; Park, Jong Hyuk

    2014-01-01

    In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. PMID:25110743

  5. 49 CFR 236.335 - Dogs, stops and trunnions of mechanical locking.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Dogs, stops and trunnions of mechanical locking..., AND APPLIANCES Interlocking Rules and Instructions § 236.335 Dogs, stops and trunnions of mechanical locking. Driving pieces, dogs, stops and trunnions shall be rigidly secured to locking bars. Swing dogs...

  6. 49 CFR 236.335 - Dogs, stops and trunnions of mechanical locking.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Dogs, stops and trunnions of mechanical locking..., AND APPLIANCES Interlocking Rules and Instructions § 236.335 Dogs, stops and trunnions of mechanical locking. Driving pieces, dogs, stops and trunnions shall be rigidly secured to locking bars. Swing dogs...

  7. 49 CFR 236.335 - Dogs, stops and trunnions of mechanical locking.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Dogs, stops and trunnions of mechanical locking..., AND APPLIANCES Interlocking Rules and Instructions § 236.335 Dogs, stops and trunnions of mechanical locking. Driving pieces, dogs, stops and trunnions shall be rigidly secured to locking bars. Swing dogs...

  8. 49 CFR 236.335 - Dogs, stops and trunnions of mechanical locking.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Dogs, stops and trunnions of mechanical locking..., AND APPLIANCES Interlocking Rules and Instructions § 236.335 Dogs, stops and trunnions of mechanical locking. Driving pieces, dogs, stops and trunnions shall be rigidly secured to locking bars. Swing dogs...

  9. 49 CFR 236.335 - Dogs, stops and trunnions of mechanical locking.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Dogs, stops and trunnions of mechanical locking..., AND APPLIANCES Interlocking Rules and Instructions § 236.335 Dogs, stops and trunnions of mechanical locking. Driving pieces, dogs, stops and trunnions shall be rigidly secured to locking bars. Swing dogs...

  10. 29 CFR 1915.162 - Ship's boilers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... dead boiler with the live system or systems shall be secured, blanked, and then locked or tagged, in... the dead boiler with the live system or systems shall be secured, and then locked or tagged, in accordance with § 1915.89. (2) Drain connections to atmosphere on all of the dead interconnecting systems...

  11. 29 CFR 1915.162 - Ship's boilers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... dead boiler with the live system or systems shall be secured, blanked, and then locked or tagged, in... the dead boiler with the live system or systems shall be secured, and then locked or tagged, in accordance with § 1915.89. (2) Drain connections to atmosphere on all of the dead interconnecting systems...

  12. 29 CFR 1915.162 - Ship's boilers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... dead boiler with the live system or systems shall be secured, blanked, and then locked or tagged, in... the dead boiler with the live system or systems shall be secured, and then locked or tagged, in accordance with § 1915.89. (2) Drain connections to atmosphere on all of the dead interconnecting systems...

  13. 46 CFR 108.157 - Locked doors.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Locked doors. 108.157 Section 108.157 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT... may be designed to lock except— (a) A crash door or a door that has a locking device that can be...

  14. Shape Memory Alloy (SMA)-Based Launch Lock

    NASA Technical Reports Server (NTRS)

    Badescu, Mircea; Bao, Xiaoqi; Bar-Cohen, Yoseph

    2014-01-01

    Most NASA missions require the use of a launch lock for securing moving components during the launch or securing the payload before release. A launch lock is a device used to prevent unwanted motion and secure the controlled components. The current launch locks are based on pyrotechnic, electro mechanically or NiTi driven pin pullers and they are mostly one time use mechanisms that are usually bulky and involve a relatively high mass. Generally, the use of piezoelectric actuation provides high precession nanometer accuracy but it relies on friction to generate displacement. During launch, the generated vibrations can release the normal force between the actuator components allowing shaft's free motion which could result in damage to the actuated structures or instruments. This problem is common to other linear actuators that consist of a ball screw mechanism. The authors are exploring the development of a novel launch lock mechanism that is activated by a shape memory alloy (SMA) material ring, a rigid element and an SMA ring holding flexure. The proposed design and analytical model will be described and discussed in this paper.

  15. 33 CFR 207.441 - St. Marys Falls Canal and Locks, Mich.; security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false St. Marys Falls Canal and Locks... OF THE ARMY, DEPARTMENT OF DEFENSE NAVIGATION REGULATIONS § 207.441 St. Marys Falls Canal and Locks... the conduct of crew and passengers while transiting St. Marys Falls Canal and Locks and for strict...

  16. 33 CFR 207.441 - St. Marys Falls Canal and Locks, Mich.; security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 3 2011-07-01 2011-07-01 false St. Marys Falls Canal and Locks... OF THE ARMY, DEPARTMENT OF DEFENSE NAVIGATION REGULATIONS § 207.441 St. Marys Falls Canal and Locks... the conduct of crew and passengers while transiting St. Marys Falls Canal and Locks and for strict...

  17. 33 CFR 207.441 - St. Marys Falls Canal and Locks, Mich.; security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 3 2013-07-01 2013-07-01 false St. Marys Falls Canal and Locks... OF THE ARMY, DEPARTMENT OF DEFENSE NAVIGATION REGULATIONS § 207.441 St. Marys Falls Canal and Locks... the conduct of crew and passengers while transiting St. Marys Falls Canal and Locks and for strict...

  18. 33 CFR 207.441 - St. Marys Falls Canal and Locks, Mich.; security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 3 2012-07-01 2012-07-01 false St. Marys Falls Canal and Locks... OF THE ARMY, DEPARTMENT OF DEFENSE NAVIGATION REGULATIONS § 207.441 St. Marys Falls Canal and Locks... the conduct of crew and passengers while transiting St. Marys Falls Canal and Locks and for strict...

  19. 33 CFR 207.441 - St. Marys Falls Canal and Locks, Mich.; security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 3 2014-07-01 2014-07-01 false St. Marys Falls Canal and Locks... OF THE ARMY, DEPARTMENT OF DEFENSE NAVIGATION REGULATIONS § 207.441 St. Marys Falls Canal and Locks... the conduct of crew and passengers while transiting St. Marys Falls Canal and Locks and for strict...

  20. The hobbyist phenomenon in physical security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michaud, E. C.

    Pro-Ams (professional amateurs) are groups of people who work on a problem as amateurs or unpaid persons in a given field at professional levels of competence. Astronomy is a good example of Pro-Am activity. At Galaxy Zoo, Pro-Ams evaluate data generated by professional observatories and are able to evaluate the millions of galaxies that have been observed but not classified, and report their findings at professional levels for fun. To allow the archiving of millions of galaxies that have been observed but not classified, the website has been engineered so that the public can view and classify galaxies even ifmore » they are not professional astronomers. In this endeavor, it has been found that amateurs can easily outperform automated vision systems. Today in the world of physical security, Pro-Ams are playing an ever-increasing role. Traditionally, locksmiths, corporations, and government organizations have been largely responsible for developing standards, uncovering vulnerabilities, and devising best security practices. Increasingly, however, nonprofit sporting organizations and clubs are doing this. They can be found all over the world, from Europe to the US and now South East Asia. Examples include TOOOL (The Open Organization of Lockpickers), the Longhorn Lockpicking Club, Sportsfreunde der Sperrtechnik - Deustcheland e.V., though there are many others. Members of these groups have been getting together weekly to discuss many elements of security, with some groups specializing in specific areas of security. When members are asked why they participate in these hobbyist groups, they usually reply (with gusto) that they do it for fun, and that they view defeating locks and other security devices as an interesting and entertaining puzzle. A lot of what happens at these clubs would not be possible if it weren't for 'Super Abundance', the ability to easily acquire (at little or no cost) the products, security tools, technologies, and intellectual resources traditionally limited to corporations, government organizations, or wealthy individuals. With this new access comes new discoveries. For example, hobbyist sport lockpicking groups discovered - and publicized - a number of new vulnerabilities between 2004 and 2009 that resulted in the majority of high-security lock manufacturers having to make changes and improvements to their products. A decade ago, amateur physical security discoveries were rare, at least those discussed publicly. In the interim, Internet sites such as lockpicking.org, lockpicking101.com and others have provided an online meeting place for people to trade tips, find friends with similar interests, and develop tools. The open, public discussion of software vulnerabilities, in contrast, has been going on for a long time. These two industries, physical security and software, have very different upgrade mechanisms. With software, a patch can typically be deployed quickly to fix a serious vulnerability, whereas a hardware fix for a physical security device or system can take upwards of months to implement in the field, especially if (as is often the case) hardware integrators are involved. Even when responding to publicly announced security vulnerabilities, manufacturers of physical security devices such as locks, intrusion detectors, or access control devices rarely view hobbyists as a positive resource. This is most unfortunate. In the field of software, it is common to speak of Open Source versus Closed Source. An Open Source software company may choose to distribute their software with a particular license, and give it away openly, with full details and all the lines of source code made available. Linux is a very popular example of this. A Close Source company, in contrast, chooses not to reveal its source code and will license its software products in a restrictive manor. Slowly, the idea of Open Source is now coming to the world of physical security. In the case of locks, it provides an alternative to the traditional Closed Source world of locksmiths. Now locks are physical objects, and can therefore be disassembled. As such, they have always been Open Source in a limited sense. Secrecy, in fact, is very difficult to maintain for a lock that is widely distributed. Having direct access to the lock design provides the hobbyist with a very open environment for finding security flaws, even if the lock manufacturer attempts to follow a Close Source model. It is clear that the field of physical security is going the digital route with companies such as Medeco, Mul-T-Lock, and Abloy manufacturing electromechanical locks. Various companies have already begun to add microcontrollers, cryptographic chip sets, solid-state sensors, and a number of other high-tech improvements to their product lineup in an effort to thwart people from defeating their security products.« less

  1. SELF-CENTERING POSITIVE LOCKING GRAPNEL

    DOEpatents

    Hopper, C.G.

    1961-07-01

    A grapnel used for remotely securing a load to be hoisted is described. The grapnel of the invention is generally conical in shape with a plurality of semi-open bores laterally disposed about the device. The bores meet at the apex of the grapnel and there provde a securing pocket for a spherical member. A load provided with a rigid support rod having a spherical member at its end can be secured by directing the spherical member down one of the bores and into the securing pocket. The major advantsges of the invention reside in the self- centering and positive locking features.

  2. Smart Sensing Based on DNA-Metal Interaction Enables a Label-Free and Resettable Security Model of Electrochemical Molecular Keypad Lock.

    PubMed

    Du, Yan; Han, Xu; Wang, Chenxu; Li, Yunhui; Li, Bingling; Duan, Hongwei

    2018-01-26

    Recently, molecular keypad locks have received increasing attention. As a new subgroup of smart biosensors, they show great potential for protecting information as a molecular security data processor, rather than merely molecular recognition and quantitation. Herein, label-free electrochemically transduced Ag + and cysteine (Cys) sensors were developed. A molecular keypad lock model with reset function was successfully realized based on the balanced interaction of metal ion with its nucleic acid and chemical ligands. The correct input of "1-2-3" (i.e., "Ag + -Cys-cDNA") is the only password of such molecular keypad lock. Moreover, the resetting process of either correct or wrong input order could be easily made by Cys, buffer, and DI water treatment. Therefore, our system provides an even smarter system of molecular keypad lock, which could inhibit illegal access of unauthorized users, holding great promise in information protection at the molecular level.

  3. 25 CFR 542.31 - What are the minimum internal control standards for drop and count for Tier B gaming operations?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...

  4. 25 CFR 542.41 - What are the minimum internal control standards for drop and count for Tier C gaming operations?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...

  5. 25 CFR 542.21 - What are the minimum internal control standards for drop and count for Tier A gaming operations?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...

  6. 25 CFR 542.31 - What are the minimum internal control standards for drop and count for Tier B gaming operations?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...

  7. 25 CFR 542.41 - What are the minimum internal control standards for drop and count for Tier C gaming operations?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...

  8. 25 CFR 542.31 - What are the minimum internal control standards for drop and count for Tier B gaming operations?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...

  9. 25 CFR 542.41 - What are the minimum internal control standards for drop and count for Tier C gaming operations?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...

  10. 25 CFR 542.21 - What are the minimum internal control standards for drop and count for Tier A gaming operations?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...

  11. 25 CFR 542.21 - What are the minimum internal control standards for drop and count for Tier A gaming operations?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...

  12. 25 CFR 542.21 - What are the minimum internal control standards for drop and count for Tier A gaming operations?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...

  13. 25 CFR 542.41 - What are the minimum internal control standards for drop and count for Tier C gaming operations?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...

  14. 25 CFR 542.31 - What are the minimum internal control standards for drop and count for Tier B gaming operations?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...

  15. 46 CFR 111.40-9 - Locking device.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Locking device. 111.40-9 Section 111.40-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-9 Locking device. The door of each panelboard enclosure that is accessible to...

  16. 46 CFR 111.40-9 - Locking device.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Locking device. 111.40-9 Section 111.40-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-9 Locking device. The door of each panelboard enclosure that is accessible to...

  17. 46 CFR 111.40-9 - Locking device.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Locking device. 111.40-9 Section 111.40-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-9 Locking device. The door of each panelboard enclosure that is accessible to...

  18. 46 CFR 111.40-9 - Locking device.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Locking device. 111.40-9 Section 111.40-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-9 Locking device. The door of each panelboard enclosure that is accessible to...

  19. 46 CFR 111.40-9 - Locking device.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Locking device. 111.40-9 Section 111.40-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-9 Locking device. The door of each panelboard enclosure that is accessible to...

  20. Nuclear reactor fuel rod attachment system

    DOEpatents

    Not Available

    1980-09-17

    A reusable system is described for removably attaching a nuclear reactor fuel rod to a support member. A locking cap is secured to the fuel rod and a locking strip is fastened to the support member. The locking cap has two opposing fingers shaped to form a socket having a body portion. The locking strip has an extension shaped to rigidly attach to the socket's body portion. The locking cap's fingers are resiliently deflectable. For attachment, the locking cap is longitudinally pushed onto the locking strip causing the extension to temporarily deflect open the fingers to engage the socket's body portion. For removal, the process is reversed.

  1. 46 CFR 190.10-20 - No means for locking doors.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false No means for locking doors. 190.10-20 Section 190.10-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS CONSTRUCTION AND ARRANGEMENT Means of Escape § 190.10-20 No means for locking doors. (a) No means shall be...

  2. 49 CFR 236.779 - Plate, top.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.779 Plate, top. A metal plate secured to a locking bracket to prevent the cross locking from being forced out of the...

  3. Locking Nut and Bolt

    NASA Technical Reports Server (NTRS)

    Bishop, R.

    1983-01-01

    Threaded fastener locks parts securely together despite together large loosening torques, even under conditions of high temperature and vibration. Positive locking action is suitable for use where conventional fasteners tend to work loose--for example, on high-speed rotating machinery. Bolt, nut and key are joined together so key occupies alined slots in bolt and nut and prevents nut from rotating off bolt.

  4. An Improved EKG-Based Key Agreement Scheme for Body Area Networks

    NASA Astrophysics Data System (ADS)

    Ali, Aftab; Khan, Farrukh Aslam

    Body area networks (BANs) play an important role in mobile health monitoring such as, monitoring the health of patients in a hospital or physical status of soldiers in a battlefield. By securing the BAN, we actually secure the lives of soldiers or patients. This work presents an electrocardiogram (EKG) based key agreement scheme using discrete wavelet transform (DWT) for the sake of generating a common key in a body area network. The use of EKG brings plug-and-play capability in BANs; i.e., the sensors are just placed on the human body and a secure communication is started among these sensors. The process is made secure by using the iris or fingerprints to lock and then unlock the blocks during exchange between the communicating sensors. The locking and unlocking is done through watermarking. When a watermark is added at the sender side, the block is locked and when it is removed at the receiver side, the block is unlocked. By using iris or fingerprints, the security of the technique improves and its plug-and-play capability is not affected. The analysis is done by using real 2-lead EKG data sampled at a rate of 125 Hz taken from MIT PhysioBank database.

  5. Third-year medical students' knowledge of privacy and security issues concerning mobile devices.

    PubMed

    Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M

    2012-01-01

    The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.

  6. 33 CFR 165.930 - Safety Zone, Brandon Road Lock and Dam to Lake Michigan including Des Plaines River, Chicago...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Safety Zone, Brandon Road Lock... Guard District § 165.930 Safety Zone, Brandon Road Lock and Dam to Lake Michigan including Des Plaines... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION...

  7. Nuclear reactor fuel rod attachment system

    DOEpatents

    Christiansen, David W.

    1982-01-01

    A reusable system for removably attaching a nuclear reactor fuel rod (12) to a support member (14). A locking cap (22) is secured to the fuel rod (12) and a locking strip (24) is fastened to the support member (14). The locking cap (22) has two opposing fingers (24a and 24b) shaped to form a socket having a body portion (26). The locking strip has an extension (36) shaped to rigidly attach to the socket's body portion (26). The locking cap's fingers are resiliently deflectable. For attachment, the locking cap (22) is longitudinally pushed onto the locking strip (24) causing the extension (36) to temporarily deflect open the fingers (24a and 24b) to engage the socket's body portion (26). For removal, the process is reversed.

  8. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  9. 33 CFR 207.476 - The Inland Route-lock in Crooked River, Alanson, Mich.; use, administration, and navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... feet. (3) Height above water—15 feet when upper pool is at low water datum. (4) Draft—6 feet when lower pool is at low water datum. (e) Signals. (1) Craft desiring lockage in either direction shall give... securely moored until the exit lock gate is fully open and the lock horn sounds one blast. (7) When the...

  10. 33 CFR 207.476 - The Inland Route-lock in Crooked River, Alanson, Mich.; use, administration, and navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... feet. (3) Height above water—15 feet when upper pool is at low water datum. (4) Draft—6 feet when lower pool is at low water datum. (e) Signals. (1) Craft desiring lockage in either direction shall give... securely moored until the exit lock gate is fully open and the lock horn sounds one blast. (7) When the...

  11. 33 CFR 207.476 - The Inland Route-lock in Crooked River, Alanson, Mich.; use, administration, and navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... feet. (3) Height above water—15 feet when upper pool is at low water datum. (4) Draft—6 feet when lower pool is at low water datum. (e) Signals. (1) Craft desiring lockage in either direction shall give... securely moored until the exit lock gate is fully open and the lock horn sounds one blast. (7) When the...

  12. Opto-mechanical door locking system

    NASA Astrophysics Data System (ADS)

    Patil, Saurabh S.; Rodrigues, Vanessa M.; Patil, Ajeetkumar; Chidangil, Santhosh

    2015-09-01

    We present an Opto-mechanical Door Locking System which is an optical system that combines a simple combination of a coherent light source (Laser) and a photodiode based sensor with focus toward security applications. The basic construct of the KEY comprises a Laser source in a cylindrical enclosure that slides perfectly into the LOCK. The Laser is pulsed at a fixed encrypted frequency unique to that locking system. Transistor-transistor logic (TTL) circuitry is used to achieve encryption. The casing of the key is designed in such a way that it will power the pulsing laser only when the key is inserted in the slot provided for it. The Lock includes a photo-sensor that will convert the detected light intensity to a corresponding electrical signal by decrypting the frequency. The lock also consists of a circuit with a feedback system that will carry the digital information regarding the encryption frequency code. The information received from the sensor is matched with the stored code; if found a perfect match, a signal will be sent to the servo to unlock the mechanical lock or to carry out any other operation. This technique can be incorporated in security systems for residences and safe houses, and can easily replace all conventional locks which formerly used fixed patterns to unlock. The major advantage of this proposed optomechanical system over conventional ones is that it no longer relies on a solid/imprinted pattern to perform its task and hence makes it almost impossible to tamper with.

  13. Securing a Lock on Safety.

    ERIC Educational Resources Information Center

    Daneman, Kathy

    1998-01-01

    Describes the integration of security systems to provide enhanced security that is both effective and long lasting. Examines combining card-access systems with camera surveillance, and highly visible emergency phones and security officers. as one of many possible combinations. Some systems most capable of being integrated are listed. (GR)

  14. 75 FR 69689 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ...'s as an identifier and may be shared with the Department); Citizenship; Contact information... facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital...

  15. Application of the Quality Functional Deployment Method in Mobility Aid Securement System Design

    DOT National Transportation Integrated Search

    1992-12-01

    The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...

  16. 78 FR 52553 - Privacy Act of 1974; Department of Homeland Security/ALL-035 Common Entity Index Prototype System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-23

    ... data elements: Full Name; Alias(es); Gender; Date of Birth; Country of Birth; Country of Citizenship... locked drawer behind a locked door. The records may be stored on magnetic disc, tape, or digital media...

  17. Clamp-mount device

    NASA Technical Reports Server (NTRS)

    Clark, K. H. (Inventor)

    1983-01-01

    A clamp-mount device is disclosed for mounting equipment to an associated I-beam and the like structural member of the type having oppositely extending flanges wherein the device comprises a base and a pair of oppositely facing clamping members carried diagonally on the base clamping flanges therebetween and having flange receiving openings facing one another. Lock means are carried diagonally by the base opposite the clamping members locking the flanges in the clamping members. A resilient hub is carried centrally of the base engaging and biasing a back side of the flanges maintaining tightly clamped and facilitating use on vertical as well as horizontal members. The base turns about the hub to receive the flanges within the clamping members. Equipment may be secured to the base by any suitable means such as bolts in openings. Slidable gate latches secure the hinged locks in an upright locking position. The resilient hub includes a recess opening formed in the base and a rubber-like pad carried in this opening being depressably and rotatably carried therein.

  18. Learning Locked down: Evaluating the Treatment of Students' Rights in High Security School Environments

    ERIC Educational Resources Information Center

    Bracy, Nicole L.

    2009-01-01

    Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…

  19. Electronic door locking mechanism

    DOEpatents

    Williams, Gary Lin; Kirby, Patrick Gerald

    1997-01-01

    The invention is a motorized linkage for engaging a thumb piece in a door mechanism. The device has an exterior lock assembly with a small battery cell and combination lock. Proper entry by a user of a security code allows the battery to operate a small motor within the exterior lock assembly. The small motor manipulates a cam-plunger which moves an actuator pin into a thumb piece. The user applies a force on to the thumb piece. This force is transmitted by the thumb piece to a latch engagement mechanism by the actuator pin. The latch engagement mechanism operates the door latch.

  20. Electronic door locking mechanism

    DOEpatents

    Williams, G.L.; Kirby, P.G.

    1997-10-21

    The invention is a motorized linkage for engaging a thumb piece in a door mechanism. The device has an exterior lock assembly with a small battery cell and combination lock. Proper entry by a user of a security code allows the battery to operate a small motor within the exterior lock assembly. The small motor manipulates a cam-plunger which moves an actuator pin into a thumb piece. The user applies a force on to the thumb piece. This force is transmitted by the thumb piece to a latch engagement mechanism by the actuator pin. The latch engagement mechanism operates the door latch. 6 figs.

  1. A proposal for new keypad design of electronic locks.

    PubMed

    Trayner, C

    1993-10-01

    Electronic locks, for which a password is entered on a computer-style keyboard, are described. Certain security problems associated with them are analysed. It is proposed that different labelling of the keyboard keys can reduce this problem. Theoretical figures are provided to support this claim and to aid design.

  2. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  3. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  4. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  5. Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet

    2005-01-01

    This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…

  6. Quantum-locked key distribution at nearly the classical capacity rate.

    PubMed

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  7. An evaluation of authentication methods for smartphone based on users’ preferences

    NASA Astrophysics Data System (ADS)

    Sari, P. K.; Ratnasari, G. S.; Prasetio, A.

    2016-04-01

    This study discusses about smartphone screen lock preferences using some types of authentication methods. The purpose is to determine the user behaviours based on the perceived security and convenience, as well as the preferences for different types of authentication methods. Variables used are the considerations for locking the screens and the types of authentication methods. The population consists of the smartphone users with the total samples of 400 respondents within a nonprobability sampling method. Data analysis method used is the descriptive analysis. The results showed that the convenience factor is still the major consideration for locking the smartphone screens. Majority of the users chose the pattern unlock as the most convenient method to use. Meanwhile, fingerprint unlock becomes the most secure method in the users’ perceptions and as the method chosen to be used in the future.

  8. 41 CFR 109-38.202-50 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...

  9. 41 CFR 109-38.202-50 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...

  10. 41 CFR 109-38.202-50 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...

  11. 41 CFR 109-38.202-50 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...

  12. How to Be Safe and Secure against School Vandalism.

    ERIC Educational Resources Information Center

    Stover, Del

    1990-01-01

    During 1990-91, vandals will cost the public schools $250 million. To battle vandalism, school executives are relying on numerous security techniques that police use to foil burglaries, including locks, alarms, electronic security systems, and antivandalism programs. Tips are provided for enlisting others' aid and checking a school's security…

  13. Mode-locking of an InAs Quantum Dot Based Vertical External Cavity Surface Emitting Laser Using Atomic Layer Graphene

    DTIC Science & Technology

    2015-07-16

    SECURITY CLASSIFICATION OF: The InAs quantum dot (QD) grown on GaAs substrates represents a highly performance active region in the 1 - 1.3 µm...2015 Approved for Public Release; Distribution Unlimited Final Report: Mode-locking of an InAs Quantum Dot Based Vertical External Cavity Surface...ABSTRACT Final Report: Mode-locking of an InAs Quantum Dot Based Vertical External Cavity Surface Emitting Laser Using Atomic Layer Graphene Report

  14. Ex vivo biomechanical evaluation of pigeon (Columba livia) cadaver intact humeri and ostectomized humeri stabilized with caudally applied titanium locking plate or stainless steel nonlocking plate constructs.

    PubMed

    Darrow, Brett G; Biskup, Jeffrey J; Weigel, Joseph P; Jones, Michael P; Xie, Xie; Liaw, Peter K; Tharpe, Josh L; Sharma, Aashish; Penumadu, Dayakar

    2017-05-01

    OBJECTIVE To evaluate mechanical properties of pigeon (Columba livia) cadaver intact humeri versus ostectomized humeri stabilized with a locking or nonlocking plate. SAMPLE 30 humeri from pigeon cadavers. PROCEDURES Specimens were allocated into 3 groups and tested in bending and torsion. Results for intact pigeon humeri were compared with results for ostectomized humeri repaired with a titanium 1.6-mm screw locking plate or a stainless steel 1.5-mm dynamic compression plate; the ostectomized humeri mimicked a fracture in a thin cortical bone. Locking plates were secured with locking screws (2 bicortical and 4 monocortical), and nonlocking plates were secured with bicortical nonlocking screws. Constructs were cyclically tested nondestructively in 4-point bending and then tested to failure in bending. A second set of constructs were cyclically tested non-destructively and then to failure in torsion. Stiffness, strength, and strain energy of each construct were compared. RESULTS Intact specimens were stiffer and stronger than the repair groups for all testing methods, except for nonlocking constructs, which were significantly stiffer than intact specimens under cyclic bending. Intact bones had significantly higher strain energies than locking plates in both bending and torsion. Locking and nonlocking plates were of equal strength and strain energy, but not stiffness, in bending and were of equal strength, stiffness, and strain energy in torsion. CONCLUSIONS AND CLINICAL RELEVANCE Results for this study suggested that increased torsional strength may be needed before bone plate repair can be considered as the sole fixation method for avian species.

  15. 78 FR 14160 - Airworthiness Directives; Diamond Aircraft Industries GmbH Airplanes

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... aviation product. The MCAI describes the unsafe condition as installation of an unsuitable self-locking nut... fuselage, as a result of installation of a non-suitable self-locking nut. The subsequent design review of... configuration has a failure potential when components such as thin self-securing nuts and bearings are aging and...

  16. 41 CFR 109-38.202-50 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Security. 109-38.202-50....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area with restricted access to prevent possible fraud or misuse. Tags which are damaged or unusable will be...

  17. Information Security in the 1990s: Keeping the Locks on.

    ERIC Educational Resources Information Center

    Kovac, Ron J.

    1999-01-01

    As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…

  18. Molecules for security measures: from keypad locks to advanced communication protocols.

    PubMed

    Andréasson, J; Pischel, U

    2018-04-03

    The idea of using molecules in the context of information security has sparked the interest of researchers from many scientific disciplines. This is clearly manifested in the diversity of the molecular platforms and the analytical techniques used for this purpose, some of which we highlight in this Tutorial Review. Moreover, those molecular systems can be used to emulate a broad spectrum of security measures. For a long time, molecular keypad locks enjoyed a clear preference and the review starts off with a description of how these devices developed. In the last few years, however, the field has evolved into something larger. Examples include more complex authentication protocols (multi-factor authentication and one-time passwords), the recognition of erroneous procedures in data transmission (parity devices), as well as steganographic and cryptographic protection.

  19. 77 FR 66409 - Airworthiness Directives; Diamond Aircraft Industries GmbH Airplanes

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-05

    ... of an unsuitable self-locking nut on the bell crank of the elevator push rod that can cause failure... in the tail section of the fuselage, as a result of installation of a non-suitable self-locking nut... identified that its current configuration has a failure potential when components such as thin self-securing...

  20. 40 CFR 63.3168 - What are the requirements for continuous parameter monitoring system installation, operation, and...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the atmosphere. (ii) Car-seal or lock-and-key valve closures. Secure any bypass line valve in the closed position with a car-seal or a lock-and-key type configuration. You must visually inspect the seal... sensor. (vii) At least monthly, inspect components for integrity and electrical connections for...

  1. 40 CFR 63.9306 - What are my continuous parameter monitoring system (CPMS) installation, operation, and...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... device to the atmosphere. (ii) Car-seal or lock-and-key valve closures. Secure any bypass line valve in the closed position with a car-seal or a lock-and-key type configuration. You must visually inspect... components for integrity and electrical connections for continuity, oxidation, and galvanic corrosion. (d...

  2. 40 CFR 63.3168 - What are the requirements for continuous parameter monitoring system installation, operation, and...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the atmosphere. (ii) Car-seal or lock-and-key valve closures. Secure any bypass line valve in the closed position with a car-seal or a lock-and-key type configuration. You must visually inspect the seal... sensor. (vii) At least monthly, inspect components for integrity and electrical connections for...

  3. The class characteristic mark of the H&M Mul-T-Lock picking tool in toolmarks examination.

    PubMed

    Volkov, Nikolai; Finkelstein, Nir; Novoselsky, Yehuda; Tsach, Tsadok

    2014-07-01

    Mul-T-Lock is a high security lock cylinder distinguished by the use of a telescoping "pin-in-pin"-tumbler design. Picking the Mul-T-Lock cylinder with a traditional picking tool is highly complicated because it can get stuck between the inner and outer pins. The H&M Mul-T-Lock picking tool was designed to overcome this problem and facilitate the picking of the "pin-in-pin" cylinder. The purpose of this research is to determine whether H&M Mul-T-Lock picking tool leaves class characteristic mark and whether it can be distinguished from traditional picking tools marks and from regular key marks. It also describes and determines the class characteristic mark left on telescopic pins, its origin, recurrence, and its benefit to the toolmarks examiner. When receiving a Mul-T-Lock from a crime scene, a toolmarks examiner can quickly determine whether or not it was picked by an H&M Mul-T-Lock picking tool by noticing the class characteristic mark which this typical tool leaves. © 2014 American Academy of Forensic Sciences.

  4. 78 FR 16733 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69114; File No. SR-ISE-2013-18] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Address Order Handling Under the Options Order Protection and Locked/Crossed Market Plan, the Authority of the Exchange To Cancel Orders When a...

  5. 78 FR 40538 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69890; File No. SR-NSCC-2013-05] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To Require That All Locked-In Trade Data Submitted to It for Trade Recording Be Submitted in Real-time June 28, 2013. I. Introduction On April 30, 2013,...

  6. Identity Dilemmas: The Consequence of Identity in Protracted Conflict

    DTIC Science & Technology

    2011-03-24

    prescribe method, or promote thought, the contributions of Thucydides, Plato , Aristotle, Hobbes, Locke, Kant and others offer penetrating insight into...Lebow, A Cultural Theory, 180. 28 Ibid., 180. For an exceptional examination of ontological security-seeking behavior and how rational security

  7. Research and develop locking design for NJDOT junction boxes : final report, April 2009.

    DOT National Transportation Integrated Search

    2009-04-01

    The report outlines the guidelines for securing electrical junction box covers to the junction box to prevent vandalism. The report provides details drawings that show various methods for securing the junction box cover to the junction box.

  8. Lock It Up! Computer Security.

    ERIC Educational Resources Information Center

    Wodarz, Nan

    1997-01-01

    The data contained on desktop computer systems and networks pose security issues for virtually every district. Sensitive information can be protected by educating users, altering the physical layout, using password protection, designating access levels, backing up data, reformatting floppy disks, using antivirus software, and installing encryption…

  9. National Computer Security Conference Proceedings (11th): A Postscript: Computer Security--Into the Future, 17-20 October 1988

    DTIC Science & Technology

    1988-10-20

    The LOCK project , from its very beginnings as an implementation study for the Provably Secure Operating System in 1979...to the security field, can study to gain insight into the evaluation process. The project has developed an innovative format for the DTLS and FTLS...management tern becomes available, the Al Secure DBMS will be system (DBMS) that is currently being developed un- ported to it . der the Advanced

  10. 33 CFR 401.42 - Passing hand lines.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... downbound vessel shall use its own hand lines, secured to the eye at the end of the mooring lines, by means... behind the splice of the eye; (3) At Iroquois Lock and Lock 8, Welland Canal, both upbound and downbound... to the eye of the No. 1 mooring wire by means of a bowline. (b) Mooring lines shall not be passed...

  11. 33 CFR 401.42 - Passing hand lines.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... downbound vessel shall use its own hand lines, secured to the eye at the end of the mooring lines, by means... behind the splice of the eye; (3) At Iroquois Lock and Lock 8, Welland Canal, both upbound and downbound... to the eye of the No. 1 mooring wire by means of a bowline. (b) Mooring lines shall not be passed...

  12. 76 FR 43278 - Privacy Act; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-20

    ... computer (PC). The Security Management Officer's office remains locked when not in use. RETENTION AND... records to include names, addresses, social security numbers, service computation dates, leave usage data... that resides on a desktop computer. RETRIEVABILITY: Records maintained in file folders are indexed and...

  13. 78 FR 29408 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69571; File No. SR-NSCC-2013-05] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change, as Modified by Amendment No. 1, To Require that All Locked-in Trade Data Submitted to It for Trade Recording be Submitted in Real-Time May 14, 2013....

  14. 78 FR 35076 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-11

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69699; File No. SR-NSCC-2013-805] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Advance Notice, as Modified by Amendment No. 1, To Require That All Locked-in Trade Data Submitted to It for Trade Recording Be Submitted in Real-time June 5, 2013....

  15. 29 CFR 1915.162 - Ship's boilers.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... dead boiler with the live system or systems shall be secured, blanked, and tagged indicating that... and shutoff valves connecting the dead boiler with the live system or systems shall be secured, locked, and tagged. (2) Drain connections to atmosphere on all of the dead interconnecting systems shall be...

  16. 29 CFR 1915.162 - Ship's boilers.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... dead boiler with the live system or systems shall be secured, blanked, and tagged indicating that... and shutoff valves connecting the dead boiler with the live system or systems shall be secured, locked, and tagged. (2) Drain connections to atmosphere on all of the dead interconnecting systems shall be...

  17. Do You Lock Your Network Doors? Some Network Management Precautions.

    ERIC Educational Resources Information Center

    Neray, Phil

    1997-01-01

    Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…

  18. Data Security: Locked Down, Not out

    ERIC Educational Resources Information Center

    Waters, John K.

    2007-01-01

    The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…

  19. 'Non-destructive' biocomputing security system based on gas-controlled biofuel cell and potentially used for intelligent medical diagnostics.

    PubMed

    Zhou, Ming; Zheng, Xiliang; Wang, Jin; Dong, Shaojun

    2011-02-01

    Biofuel cells (BFCs) based on enzymes and microbes are the promising future alternative sources of sustainable electrical energy under mild conditions (i.e. ambient temperature and neutral pH). By combining the adaptive behavior of BFCs self-regulating energy release with the versatility of biocomputing, we construct a novel gas-controlled biocomputing security system, which could be used as the potential implantable self-powered and 'smart' medical system with the logic diagnosis aim. We have demonstrated a biocomputing security system based on BFCs. Due to the unique 'RESET' reagent of N(2) applied in this work, the prepared biocomputing security system can be reset and cycled for a large number of times with no 'RESET' reagent-based 'waste'. This would be advantageous for the potential practical applications of such keypad lock as well as the development of biocomputing security devices. In order to validate the universality of the system and also to harvest energy directly from biofuels with enhanced power output, we replace the glucose with orange juice as the biofuel to operate BFCs-based biocomputing system, which also possesses the function of keypad lock. In addition, by introducing BFCs into the biocomputing security system, the adaptive behavior of the BFCs self-regulating the power release would be an immense advantage of such security keypad lock devices in potential self-powered implantable medical systems. The designed sequence gives the maximum power output and discriminate itself from the rest of the sequences. From this, we find that maximizing the dimensionless ratio of gap versus SD of the power output spectrum (a funnel in power outputs) gives the quantitative optimal design criterion. Therefore, our construction here may also provide a practical example and microscopic structural basis for mimicking the real biological network systems and bridge the gaps between the theoretical concepts and experiments important for biomolecular systems and synthetic biology.

  20. 78 FR 34335 - Foreign-Trade Zone (FTZ) 141-Monroe County, New York; Notification of Proposed Production...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-07

    ... steel, fire and water resistant storage chests, gun safes, security safes, portable security safes, cash..., touchpads, plastic gun racks, keypad assemblies, panel lock assemblies, door backs, plastic trays, drawers..., wood gun shelf racks, cable assemblies, communication cables, gasket kits, door springs, metal handles...

  1. Emerging Technology for School Security

    ERIC Educational Resources Information Center

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  2. Is Your Center Burglar/Vandal Proofed? Guidelines for Protecting Your Center.

    ERIC Educational Resources Information Center

    Adams, Shawn

    1998-01-01

    Identifies specific steps that child care centers can take to reduce the chances of burglary and vandalism. Differentiates loss prevention, loss control, and risk financing. Includes discussion of layering defenses, perimeter protection, security lighting, building surface security, locks, and alarm systems. Discusses the importance of reducing…

  3. 32 CFR 2001.53 - Open storage areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Open storage areas. 2001.53 Section 2001.53....53 Open storage areas. This section describes the minimum construction standards for open storage... storage. Doors other than those secured with the aforementioned locks shall be secured from the inside...

  4. 32 CFR 2001.53 - Open storage areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Open storage areas. 2001.53 Section 2001.53....53 Open storage areas. This section describes the minimum construction standards for open storage... storage. Doors other than those secured with the aforementioned locks shall be secured from the inside...

  5. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    ERIC Educational Resources Information Center

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  6. Security Management and Safeguards Office

    NASA Technical Reports Server (NTRS)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are in a safe environment.

  7. R AND D 100 EARLYBIRD AWARD ENTRY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dugan, J; Debbie Chapman, D

    2007-01-30

    The Smart Latch{trademark} is an electronically enhanced door lockset device for industrial and consumer applications, which uses existing neural network technology to analyze the sequence, timing, and acoustic signatures associated with lockset functions and provides immediate indication of failure to correctly lock and latch. It essentially ''listens'' to and learns the sequences and acoustic signatures associated with lockset function and latching. When triggered by specific door activity the Smart Latch{trademark} begins analyzing sequences, frequencies and other parameters. With a satisfactory outcome the device provides positive feedback (e.g. visual and/or audible) and returns to a ''sleep'' state awaiting the next activity.more » If any part of the normal door operation, including latching and length of time, are incorrect various alarm signals can be generated. With electronics and 5+ year battery integrated, the device is simple to install and transparent to the user. Because the device uses proven voice recognition algorithms, it could meet or exceed the performance of the human ear in detecting the unique and complex acoustic signature associated with a properly operating and secured door. Unlike existing technologies, such as limit switches, it is not easily spoofed or defeated and has a high level of immunity to interference. The Smart Latch{trademark} technology can be integrated into existing lockset and door hardware designs, including both low price consumer products and high end electronic/cipher locks. The concept and design are based on a simple security industry adage: ''It isn't locked if it isn't latched''. Even the most elaborate and robust security barriers are of little use if the locking and latching mechanisms are not properly functioning and engaged. Smart Latch{trademark} provides automatic verification of the first and most important step in facility security: Close and properly latch doors and barriers. It is a compelling product for households with children, elderly, or high traffic areas such as an office where a properly closed and latched door is essential for security and safety. In an age of ever increasing security concerns and limited human resources, Smart Latch{trademark} can be a significant addition to the $20 billion plus industrial and consumer lockset market. The Smart Latch{trademark} is unique because: (1) as an inexpensive, battery powered, stand-alone device or as integrated into any standard consumer lock set, the device uses neural network technology to analyze the acoustic signatures associated with normal door operation and generates an alert if a door is not latched correctly and within a set amount of time. (2) It is not easily spoofed or defeated. (3) Installation, setup, and use are simple.« less

  8. Mode Locking of Quantum Cascade Lasers

    DTIC Science & Technology

    2007-11-09

    E. Siegman , Lasers , University Science Books, Mill Valley, CA (1986). [2] A. Yariv, Quantum Electronics, 3rd edition, John Wiley and Sons, New...REPORT Mode Locking of Quantum Cascade Lasers 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: A theoretical and experimental study of multimode operation...regimes in quantum cascade lasers (QCLs) is presented. It is shown that the fast gain recovery of QCLs promotes two multimode regimes in QCLs: One is

  9. Pump Frequency Noise Coupling into a Microcavity by Thermo-optic Locking

    DTIC Science & Technology

    2014-06-05

    high coherence, Brillouin microcavity laser on silicon ,” Opt. Express 20, 20170–20180 (2012). 19. J. Li, H. Lee, and K. J. Vahala, “Microwave...measurements in a range of subjects including cavity optomechanics, microresonator-based frequency combs and microcavity Brillouin lasers ...SECURITY CLASSIFICATION OF: As thermo-optic locking is widely used to establish a stable frequency detuning between an external laser and a high Q

  10. Prosthetic elbow joint

    NASA Technical Reports Server (NTRS)

    Weddendorf, Bruce C. (Inventor)

    1994-01-01

    An artificial, manually positionable elbow joint for use in an upper extremity, above-elbow, prosthetic is described. The prosthesis provides a locking feature that is easily controlled by the wearer. The instant elbow joint is very strong and durable enough to withstand the repeated heavy loadings encountered by a wearer who works in an industrial, construction, farming, or similar environment. The elbow joint of the present invention comprises a turntable, a frame, a forearm, and a locking assembly. The frame generally includes a housing for the locking assembly and two protruding ears. The forearm includes an elongated beam having a cup-shaped cylindrical member at one end and a locking wheel having a plurality of holes along a circular arc on its other end with a central bore for pivotal attachment to the protruding ears of the frame. The locking assembly includes a collar having a central opening with a plurality of internal grooves, a plurality of internal cam members each having a chamfered surface at one end and a V-shaped slot at its other end; an elongated locking pin having a crown wheel with cam surfaces and locking lugs secured thereto; two coiled compression springs; and a flexible filament attached to one end of the elongated locking pin and extending from the locking assembly for extending and retracting the locking pin into the holes in the locking wheel to permit selective adjustment of the forearm relative to the frame. In use, the turntable is affixed to the upper arm part of the prosthetic in the conventional manner, and the cup-shaped cylindrical member on one end of the forearm is affixed to the forearm piece of the prosthetic in the conventional manner. The elbow joint is easily adjusted and locked between maximum flex and extended positions.

  11. Repair, Evaluation, Maintenance, and Rehabilitation Research Program. Floating Debris Control; A Literature Review.

    DTIC Science & Technology

    1987-06-01

    Debris diversion boom and debris, Appalachian Power Company Station at Winfield Lock and Dam, Kanavha River, West Virginia. Than, T 9 (sin a) - 1.94...control dam. Central gate Is blocked partly open causing .ime downstream scour. Water flows right to left. BOTTOM-Debris diversion boom and debris... Appalachian Power Company Station at Winfield Lock and Dam, Kanawha River, West Virginia. - 0 .’ Unclass ified SECURITY CLASSIFICATION OF THIS PAGE for- 40

  12. Door latching recognition apparatus and process

    DOEpatents

    Eakle, Jr., Robert F.

    2012-05-15

    An acoustic door latch detector is provided in which a sound recognition sensor is integrated into a door or door lock mechanism. The programmable sound recognition sensor can be trained to recognize the acoustic signature of the door and door lock mechanism being properly engaged and secured. The acoustic sensor will signal a first indicator indicating that proper closure was detected or sound an alarm condition if the proper acoustic signature is not detected within a predetermined time interval.

  13. Crossed and Locked Quotes in a Multi-Market Simulation

    PubMed Central

    Todd, Andrew; Beling, Peter; Scherer, William

    2016-01-01

    Financial markets are often fragmented, introducing the possibility that quotes in identical securities may become crossed or locked. There are a number of theoretical explanations for the existence of crossed and locked quotes, including competition, simultaneous actions, inattentiveness, fee structure and market access. In this paper, we perform a simulation experiment designed to examine the effect of simple order routing procedures on the properties of a fragmented market consisting of a single security trading in two independent limit order books. The quotes in the two markets are connected solely by the routing decision of the market participants. We report on the health of the consolidated market as measured by the duration of crossed and locked states, as well as the spread and the volatility of transaction prices in the consolidated market. We aim to quantify exactly how the prevalence of order routing among a population of market participants affects properties of the consolidated market. Our model contributes to the zero-intelligence literature by treating order routing as an experimental variable. Additionally, we introduce a parsimonious heuristic for limit order routing, allowing us to study the effects of both market order routing and limit order routing. Our model refines intuition for the sometimes subtle relationships between the prevalence of order routing and various market measures. Our model also provides a benchmark for more complex agent-based models. PMID:26959416

  14. Crossed and Locked Quotes in a Multi-Market Simulation.

    PubMed

    Todd, Andrew; Beling, Peter; Scherer, William

    2016-01-01

    Financial markets are often fragmented, introducing the possibility that quotes in identical securities may become crossed or locked. There are a number of theoretical explanations for the existence of crossed and locked quotes, including competition, simultaneous actions, inattentiveness, fee structure and market access. In this paper, we perform a simulation experiment designed to examine the effect of simple order routing procedures on the properties of a fragmented market consisting of a single security trading in two independent limit order books. The quotes in the two markets are connected solely by the routing decision of the market participants. We report on the health of the consolidated market as measured by the duration of crossed and locked states, as well as the spread and the volatility of transaction prices in the consolidated market. We aim to quantify exactly how the prevalence of order routing among a population of market participants affects properties of the consolidated market. Our model contributes to the zero-intelligence literature by treating order routing as an experimental variable. Additionally, we introduce a parsimonious heuristic for limit order routing, allowing us to study the effects of both market order routing and limit order routing. Our model refines intuition for the sometimes subtle relationships between the prevalence of order routing and various market measures. Our model also provides a benchmark for more complex agent-based models.

  15. Cost Comparative Analysis of Blast Mitigation Technologies with Regard to Explosive Remnants of War (ERW)

    DTIC Science & Technology

    2011-12-01

    Division, 1998) ............................................................................13  Figure 7:  Papercrete Block with Mortar (From The Center for...40.5 inches x 10 1/8 inch wide): 2 X $71.25 = $142.50 - 55-gallon industrial plastic trash cans: $55.00 20 - 5-gallon 3M Fastbond insulation...off in physical security with regard to the access of a plastic container, compared to a steel box with a high-security hasp lock. Added security

  16. Adapter plate assembly for adjustable mounting of objects

    DOEpatents

    Blackburn, R.S.

    1986-05-02

    An adapter plate and two locking discs are together affixed to an optic table with machine screws or bolts threaded into a fixed array of internally threaded holes provided in the table surface. The adapter plate preferably has two, and preferably parallel, elongated locating slots each freely receiving a portion of one of the locking discs for secure affixation of the adapter plate to the optic table. A plurality of threaded apertures provided in the adapter plate are available to attach optical mounts or other devices onto the adapter plate in an orientation not limited by the disposition of the array of threaded holes in the table surface. An axially aligned but radially offset hole through each locking disc receives a screw that tightens onto the table, such that prior to tightening of the screw the locking disc may rotate and translate within each locating slot of the adapter plate for maximum flexibility of the orientation thereof.

  17. Adapter plate assembly for adjustable mounting of objects

    DOEpatents

    Blackburn, Robert S.

    1987-01-01

    An adapter plate and two locking discs are together affixed to an optic table with machine screws or bolts threaded into a fixed array of internally threaded holes provided in the table surface. The adapter plate preferably has two, and preferably parallel, elongated locating slots each freely receiving a portion of one of the locking discs for secure affixation of the adapter plate to the optic table. A plurality of threaded apertures provided in the adapter plate are available to attach optical mounts or other devices onto the adapter plate in an orientation not limited by the disposition of the array of threaded holes in the table surface. An axially aligned but radially offset hole through each locking disc receives a screw that tightens onto the table, such that prior to tightening of the screw the locking disc may rotate and translate within each locating slot of the adapter plate for maximum flexibility of the orientation thereof.

  18. 16 CFR 1508.6 - Hardware.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... eliminates from any hardware accessible to a child within the crib the possibility of the hardware's... foreseeable damage or abuse. (b) Locking or latching devices used to secure dropside rails shall require a...

  19. 16 CFR 1508.6 - Hardware.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... eliminates from any hardware accessible to a child within the crib the possibility of the hardware's... foreseeable damage or abuse. (b) Locking or latching devices used to secure dropside rails shall require a...

  20. The key to security is a balancing act.

    PubMed

    Macdonald, Grant

    2011-11-01

    Grant Macdonald, managing director at supplier of mechanical and electronic door locks, Codelocks, examines some of the important issues for healthcare estates and facilities personnel considering how best to protect parts of a healthcare facility--large or small--given the need to minimise costs and not "over-specify" on security, while simultaneously ensuring that patients, staff, and hospital property, are safeguarded.

  1. Statistical Analysis of Firearms/Toolmarks Interpretation of Cartridge Case Evidence Using IBIS and Bayesian Networks

    DTIC Science & Technology

    2015-10-24

    reference material (SRM) was entered into IBIS 10 times by each of three users (EBF, RLJ, and EFL). Each of these users has more than 12 months...bullet leaves the muzzle. In a recoil action (locked breech) pistol, the barrel and slide are securely locked together at the moment of firing. They...travel backward together until the barrel unlocks, forced down by a link or inclined plane, and continues rearward under its own momentum. A

  2. Self-locking threaded fasteners

    DOEpatents

    Glovan, Ronald J.; Tierney, John C.; McLean, Leroy L.; Johnson, Lawrence L.

    1996-01-01

    A threaded fastener with a shape memory alloy (SMA) coatings on its threads is disclosed. The fastener has special usefulness in high temperature applications where high reliability is important. The SMA coated fastener is threaded into or onto a mating threaded part at room temperature to produce a fastened object. The SMA coating is distorted during the assembly. At elevated temperatures the coating tries to recover its original shape and thereby exerts locking forces on the threads. When the fastened object is returned to room temperature the locking forces dissipate. Consequently the threaded fasteners can be readily disassembled at room temperature but remains securely fastened at high temperatures. A spray technique is disclosed as a particularly useful method of coating of threads of a fastener with a shape memory alloy.

  3. Discussion and a new method of optical cryptosystem based on interference

    NASA Astrophysics Data System (ADS)

    Lu, Dajiang; He, Wenqi; Liao, Meihua; Peng, Xiang

    2017-02-01

    A discussion and an objective security analysis of the well-known optical image encryption based on interference are presented in this paper. A new method is also proposed to eliminate the security risk of the original cryptosystem. For a possible practical application, we expand this new method into a hierarchical authentication scheme. In this authentication system, with a pre-generated and fixed random phase lock, different target images indicating different authentication levels are analytically encoded into corresponding phase-only masks (phase keys) and amplitude-only masks (amplitude keys). For the authentication process, a legal user can obtain a specified target image at the output plane if his/her phase key, and amplitude key, which should be settled close against the fixed internal phase lock, are respectively illuminated by two coherent beams. By comparing the target image with all the standard certification images in the database, the system can thus verify the user's legality even his/her identity level. Moreover, in despite of the internal phase lock of this system being fixed, the crosstalk between different pairs of keys held by different users is low. Theoretical analysis and numerical simulation are both provided to demonstrate the validity of this method.

  4. Wireless Protection.

    ERIC Educational Resources Information Center

    Conforti, Fred

    2003-01-01

    Discusses wireless access-control equipment in the school and university setting, particularly the integrated reader lock at the door with a panel interface module at the control panel. Describes its benefits, how it works, and its reliability and security. (EV)

  5. Random Vibration and Torque Tests of Fasteners Secured With Locking Cable, Room Temperature Vulcanized (RTV) Rubber, and Closed Cell Foam to Support the Launch of STS-82

    NASA Technical Reports Server (NTRS)

    Yost, V. H.

    1997-01-01

    During a walkdown of the Space Transportation System (STS) orbiter for the 82nd Space Shuttle flight (STS-82), technicians found several safety cables for bolts with missing or loose ferrules. Typically, two or three bolts are secured with a cable which passes through one of the holes in the head of each bolt and a ferrule is crimped on each end of the cable to prevent it from coming out of the holes. The purpose of the cable is to prevent bolts from rotating should they become untightened. Other bolts are secured with either a locking cable or wire which is covered with RTV and foam. The RTV and foam would have to be removed to inspect for missing or loose ferrules. To determine whether this was necessary, vibration and torque test fixtures and tests were made to determine whether or not bolts with missing or loose ferrules would unloosen. These tests showed they would not, and the RTV and foam was not removed.

  6. Method and apparatus for close packing of nuclear fuel assemblies

    DOEpatents

    Newman, Darrell F.

    1993-01-01

    The apparatus of the present invention is a plate of neutron absorbing material. The plate may have a releasable locking feature permitting the plate to be secured within a nuclear fuel assembly between nuclear fuel rods during storage or transportation then removed for further use or destruction. The method of the present invention has the step of placing a plate of neutron absorbing material between nuclear fuel rods within a nuclear fuel assembly, preferably between the two outermost columns of nuclear fuel rods. Additionally, the plate may be releasably locked in place.

  7. Method and apparatus for close packing of nuclear fuel assemblies

    DOEpatents

    Newman, D.F.

    1993-03-30

    The apparatus of the present invention is a plate of neutron absorbing material. The plate may have a releasable locking feature permitting the plate to be secured within a nuclear fuel assembly between nuclear fuel rods during storage or transportation then removed for further use or destruction. The method of the present invention has the step of placing a plate of neutron absorbing material between nuclear fuel rods within a nuclear fuel assembly, preferably between the two outermost columns of nuclear fuel rods. Additionally, the plate may be releasably locked in place.

  8. Protecting Buildings from People

    ERIC Educational Resources Information Center

    Progressive Architecture, 1978

    1978-01-01

    Security in buildings ranges from simple locks to elaborate electronic systems. Most buildings do not need the level of sophistication it is possible to achieve. A survey of these products, however, is appropriate to appreciate their potential and variety. (Author/MLF)

  9. Self-locking threaded fasteners

    DOEpatents

    Glovan, R.J.; Tierney, J.C.; McLean, L.L.; Johnson, L.L.

    1996-01-16

    A threaded fastener with a shape memory alloy (SMA) coatings on its threads is disclosed. The fastener has special usefulness in high temperature applications where high reliability is important. The SMA coated fastener is threaded into or onto a mating threaded part at room temperature to produce a fastened object. The SMA coating is distorted during the assembly. At elevated temperatures the coating tries to recover its original shape and thereby exerts locking forces on the threads. When the fastened object is returned to room temperature the locking forces dissipate. Consequently the threaded fasteners can be readily disassembled at room temperature but remains securely fastened at high temperatures. A spray technique is disclosed as a particularly useful method of coating of threads of a fastener with a shape memory alloy. 13 figs.

  10. International Nuclear Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; andmore » (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.« less

  11. Beyond Firewalls: Professional Certification Ensures Your Staff Will Understand Information Security in Its Proper Context

    ERIC Educational Resources Information Center

    Svetcov, Eric

    2004-01-01

    When it comes to security, many people do not know what they do not know. Consider for example, an administrator who leaves her password taped under her keyboard, or a teacher who doesn't change his password (ever!) or can't be bothered to log out or lock the computer, all the firewalls and antivirus programs in the world will not protect a…

  12. Security Awareness Bulletin. Number 2-91, September 1991

    DTIC Science & Technology

    1991-09-01

    governments, competitors, In our rapidly changing workplace, computers and those having criminal intent, that uncontrolled access routinely communicate with...same as above; rental fee is slightly higher. Securily A wareness Bulletin 10 Number 2-91 New AIS Requirements in the Defense Industrial Security...original file copy. But remember, check the original for viruses 6. Files grow in size. Infamous to the Nvir, this before locking and relying upon it as a

  13. Management of comminuted proximal ulna fracture-dislocations using a multiplanar locking intramedullary nail.

    PubMed

    Edwards, Scott G; Argintar, Evan; Lamb, Joshua

    2011-06-01

    Intramedullary nails have been used for the fixation of olecranon fractures in an attempt to reduce the soft tissue irritation and resulting need for hardware removal seen with plating and tension banding. Further benefits include preservation of vascular supply, and increase stability and improved compression over some alternative techniques. Most intramedullary nails have been limited to simple olecranon fractures or osteotomies. One novel multiplanar, locking intramedullary nail, however, is indicated to stabilize all fracture patterns of the proximal ulna, including the coronoid. This particular locking nail has screws that radiate in multiple planes and form a fixed-angle lattice throughout the bone. The nail also has fixed-angle screws dedicated to the 3 parts of the coronoid: process tip, medial facet, and medial wall. This allows the nail to secure multiple fragments regardless of the fracture pattern's extent of instability. The objective of this article is to illustrate the recommended steps in reducing and stabilizing a comminuted proximal ulna fracture-dislocation using this multiplanar locking intramedullary nail.

  14. A novel cyanide-selective colorimetric and fluorescent chemosensor: first molecular security keypad lock based on phosphotungstic acid and CN- inputs.

    PubMed

    Tavallali, Hossein; Deilamy-Rad, Gohar; Parhami, Abolfath; Hasanli, Nahid

    2014-02-15

    Rhodamine B (RhB) an available dye has been developed as novel and efficient colorimetric and fluorometric chemosensor for cyanide ions in an absolutely aqueous media. The UV-vis absorption and fluorescent emission titrations experiments have been employed to study the sensing process. RhB could act as an efficient "ON-OFF" fluorescent response for phosphotungstic acid (H3PW12O40 or PTA) based on an ion associate process. Also (RhB(+))3 · PTA(3-) could operate as an "OFF-ON" fluorescent sensor for cyanide anions based on a ligand substitution process. It has been identified as highly sensitive probe for CN(-) which responds at 0.3 and 0.04 μmol L(-1) concentration levels by absorption and fluorescent method respectively. Depending upon the sequence of addition of PTA and CN(-) ions into the solution, RhB could be as a molecular security keypad lock with PTA and CN(-) inputs. The ionic inputs to new fluorophore have been mimicked as a superimposed electronic molecular keypad lock. The results were compared successfully (>96%) with the data of a spectrophotometry approved method (EPA 9014-1) for cyanide ions. Copyright © 2013 Elsevier B.V. All rights reserved.

  15. Lockout device for high voltage circuit breaker

    DOEpatents

    Kozlowski, Lawrence J.; Shirey, Lawrence A.

    1993-01-01

    An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the repsective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

  16. Lockout device for high voltage circuit breaker

    DOEpatents

    Kozlowski, L.J.; Shirey, L.A.

    1993-01-26

    An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

  17. Fatigue properties of die cast zinc alloys for automotive lock applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schrems, Karol K.; Dogan, Omer N.; Goodwin, F.E.

    2004-06-01

    During the 1970’s many automotive lock systems were converted from zinc die casting alloys to engineering plastics for reasons of weight and cost. Recent increases in requirements for precision and security have caused automotive and other lock designers to reconsider zinc alloy die-castings for these applications. To enable this, there is a need for mechanical property data comparable to that of the plastics materials used in these applications. In this work, rotary bending fatigue tests were performed on Alloys 3, 5, ZA-8 and AcuZinc 5 using an R.R. Moore fatigue machine. Testing was performed at 30 Hz and was stoppedmore » at 1x107 cycles. The fatigue limit results were compared to data reported in the literature for higher number of cycles and faster rotations.« less

  18. BLADED IMPELLER FOR TURBOBLOWERS

    DOEpatents

    Baumann, K.

    1949-10-01

    A means is given of holding open-sided impeller blades in a turbo-rotor. Two half blades, with dovetail roots of sufficient weight to contain the center of gravity, are fitted into slots cut in the rotor so as to form the desired angle between the blade faces. The adjoining edges of the half blades are welded to form one solid blade that is securely locked an the rotor. This design permits the manufacture of a V shaped impeller blade without the need of machining the entire V shaped contour from a single blank, and furthermore provides excellent locking characteristics for attachment to the rotor.

  19. Locked out

    ERIC Educational Resources Information Center

    Boulard, Garry

    2010-01-01

    As a collaborative program bringing the instructional resources of Wesleyan University to the maximum security Cheshire Correctional Institute in Connecticut enters its second semester, prison and higher education experts are seeing decreasing support for similar programs across the U.S. According to some experts, state funding on prison education…

  20. Remote Munitions Deployment from an Unmanned Ground Vehicle

    DTIC Science & Technology

    2011-08-09

    pack in a series of toe lugs. Then the rear of the pack is pushed downward over a novel spring-loaded latch /release mechanism, remaining locked in...Mason, Patrick R. Griffin, Charles E. Dean Page 4 of 5 UNCLASSIFIED developments and testing, it is not secured by a latch /release mechanism...However, the locating tabs act to wedge the pack in place while still allowing it to pull free during launch. Figure 6: Munitions secured and

  1. Automatic locking orthotic knee device

    NASA Technical Reports Server (NTRS)

    Weddendorf, Bruce C. (Inventor)

    1993-01-01

    An articulated tang in clevis joint for incorporation in newly manufactured conventional strap-on orthotic knee devices or for replacing such joints in conventional strap-on orthotic knee devices is discussed. The instant tang in clevis joint allows the user the freedom to extend and bend the knee normally when no load (weight) is applied to the knee and to automatically lock the knee when the user transfers weight to the knee, thus preventing a damaged knee from bending uncontrollably when weight is applied to the knee. The tang in clevis joint of the present invention includes first and second clevis plates, a tang assembly and a spacer plate secured between the clevis plates. Each clevis plate includes a bevelled serrated upper section. A bevelled shoe is secured to the tank in close proximity to the bevelled serrated upper section of the clevis plates. A coiled spring mounted within an oblong bore of the tang normally urges the shoes secured to the tang out of engagement with the serrated upper section of each clevic plate to allow rotation of the tang relative to the clevis plate. When weight is applied to the joint, the load compresses the coiled spring, the serrations on each clevis plate dig into the bevelled shoes secured to the tang to prevent relative movement between the tang and clevis plates. A shoulder is provided on the tang and the spacer plate to prevent overextension of the joint.

  2. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  3. Xenon Formal Security Policy Model

    DTIC Science & Technology

    2007-08-14

    munication primitives such as locks or semaphores , machine instruction results, hypercall results, traps, and interrupts. For an informal example...communicated on the corresponding side of the parallel oper- ator. Events that are in X ∪ Y are synchronized over the two processes. So if we define

  4. 75 FR 19622 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-15

    ... organization, office symbol/code, job title, job function, grade/rank, job series, military specialty, start... the locks, security personnel and administrative procedures.'' Retention and disposal: Delete entry... approves the retention and disposal schedule, records will be treated as permanent.'' System manager(s) and...

  5. Birds of a Feather: Supporting Secure Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Braswell III, H V

    2006-04-24

    Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less

  6. Self locking coupling mechanism for engaging and moving a load

    DOEpatents

    Wood, R.L.; Casamajor, A.B.; Parsons, R.E.

    1980-09-12

    A coupling mechanism for engaging and lifting a load has a housing with a guide passage for receiving a knob which is secured to the load through a neck of smaller diameter. A hollow ball in the housing has an opening which receives the knob and the ball is then turned to displace the opening from the housing passage and to cause the neck to enter a slot in the ball thereby securing the load to the coupling mechanism as elements of the housing block travel of the neck back into the opening when the ball is turned to the load holding orientation. As engagement of the load and locking of the coupling mechanism are accomplished simultaneously by the same ball motion, operation is simplified and reliability is greatly increased. The ball is preferably turned by a motor through worm gearing and the coupling mechanism may be controlled from a remote location. Among other uses, the coupling mechanism is adaptable to the handling of spent nuclear reactor fuel elements.

  7. Phase-noise limitations in continuous-variable quantum key distribution with homodyne detection

    NASA Astrophysics Data System (ADS)

    Corvaja, Roberto

    2017-02-01

    In continuous-variables quantum key distribution with coherent states, the advantage of performing the detection by using standard telecoms components is counterbalanced by the lack of a stable phase reference in homodyne detection due to the complexity of optical phase-locking circuits and to the unavoidable phase noise of lasers, which introduces a degradation on the achievable secure key rate. Pilot-assisted phase-noise estimation and postdetection compensation techniques are used to implement a protocol with coherent states where a local laser is employed and it is not locked to the received signal, but a postdetection phase correction is applied. Here the reduction of the secure key rate determined by the laser phase noise, for both individual and collective attacks, is analytically evaluated and a scheme of pilot-assisted phase estimation proposed, outlining the tradeoff in the system design between phase noise and spectral efficiency. The optimal modulation variance as a function of the phase-noise amount is derived.

  8. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McDonald, K; Curran, B

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less

  9. A discrete-time chaos synchronization system for electronic locking devices

    NASA Astrophysics Data System (ADS)

    Minero-Ramales, G.; López-Mancilla, D.; Castañeda, Carlos E.; Huerta Cuellar, G.; Chiu Z., R.; Hugo García López, J.; Jaimes Reátegui, R.; Villafaña Rauda, E.; Posadas-Castillo, C.

    2016-11-01

    This paper presents a novel electronic locking key based on discrete-time chaos synchronization. Two Chen chaos generators are synchronized using the Model-Matching Approach, from non-linear control theory, in order to perform the encryption/decryption of the signal to be transmitted. A model/transmitter system is designed, generating a key of chaotic pulses in discrete-time. A plant/receiver system uses the above mentioned key to unlock the mechanism. Two alternative schemes to transmit the private chaotic key are proposed. The first one utilizes two transmission channels. One channel is used to encrypt the chaotic key and the other is used to achieve output synchronization. The second alternative uses only one transmission channel for obtaining synchronization and encryption of the chaotic key. In both cases, the private chaotic key is encrypted again with chaos to solve secure communication-related problems. The results obtained via simulations contribute to enhance the electronic locking devices.

  10. Space probe/satellite ejection apparatus for spacecraft

    NASA Technical Reports Server (NTRS)

    Smyly, H. M.; Miller, C. D.; Cloyd, R. A.; Heller, C. (Inventor)

    1984-01-01

    An ejection apparatus for spinning and propelling objects for ejection from a spacecraft at a desired velocity and rotational speed is discussed. The apparatus includes a launch cradle on which the space object to be ejected rests. The cradle is rotatably supported by a central hub secured to the upper end of the pneumatic cylinder piston shaft. Release mechanisms consisting of a retractable pin and locking lug is utilized to hold the cradle and object to be ejected. The release mechanism has a fixed barrier member which holds the retractable pin in engagement with the locking lug until release by upward movement of the launch cradle beyond the barrier height.

  11. Security System Responsive to Optical Fiber Having Bragg Grating

    NASA Technical Reports Server (NTRS)

    Gary, Charles K. (Inventor); Ozcan, Meric (Inventor)

    1997-01-01

    An optically responsive electronic lock is disclosed comprising an optical fiber serving as a key and having Bragg gratings placed therein. Further, an identification system is disclosed which has the optical fiber serving as means for tagging and identifying an object. The key or tagged object is inserted into a respective receptacle and the Bragg gratings cause the optical fiber to reflect a predetermined frequency spectra pattern of incident light which is detected by a decoder and compared against a predetermined spectrum to determine if an electrical signal is generated to either operate the lock or light a display of an authentication panel.

  12. 49 CFR 173.196 - Category A infectious substances.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... heat seal, skirted stopper, or metal crimp seal. If screw caps are used, they must be secured by positive means, such as with adhesive tape, paraffin sealing tape, or manufactured locking closure... ampoules or rubber-stoppered glass vials fitted with metal seals. (2) Infectious substances shipped...

  13. 27 CFR 22.92 - Storage facilities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...

  14. 27 CFR 22.92 - Storage facilities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...

  15. 27 CFR 22.92 - Storage facilities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...

  16. 27 CFR 22.92 - Storage facilities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...

  17. 27 CFR 22.92 - Storage facilities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...

  18. How to supplement Social Security fairly and effectively.

    PubMed

    Ghilarducci, Teresa

    2010-04-01

    Over the past 3 decades, the base upon which Americans obtain income for retirement has become increasingly tied to fluctuations in the financial markets. Because Social Security provides a small percentage of pre-retirement income in retirement, most of the nation's workers need a supplement to Social Security. This study demonstrates the failure of the 401(k) system and advances a bold, but realistic, solution to America's crumbling retirement system: guaranteed retirement accounts (GRAs), a universal government program that supplements Social Security by providing guaranteed rates of return, by locking up balances until retirement, and by mandating annuities at retirement-with survivor's benefits. The GRA plan is compared to other proposals, including President Obama's, which aims to expand the voluntary, commercial, individually directed account-based system.

  19. Ethics in the Information Age: After Rules and Locks, What Do We Do?

    ERIC Educational Resources Information Center

    Webster, Sally

    1989-01-01

    The 1989 computer "worm" resulted in some needed attention to computer security. Academic computing has the goal of integrating computing into the fabric of teaching, learning, and research, and must be relatively open. Ways to raise awareness of ethical and social issues are described. (MLW)

  20. 78 FR 77719 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ..., leave and payroll deduction information; and job performance and personnel actions. For civil servants... report previous job injuries to worker's compensation organizations; (6) for person to notify in an...-electronic records are secured in locked rooms or files. RETENTION AND DISPOSAL: Records are maintained in...

  1. 19 CFR 151.30 - Sugar closets.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Sugar closets. 151.30 Section 151.30 Customs... (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Sugars, Sirups, and Molasses § 151.30 Sugar closets. Sugar closets for samples shall be substantially built and secured by locks furnished by Customs...

  2. 19 CFR 151.30 - Sugar closets.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 2 2011-04-01 2011-04-01 false Sugar closets. 151.30 Section 151.30 Customs... (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Sugars, Sirups, and Molasses § 151.30 Sugar closets. Sugar closets for samples shall be substantially built and secured by locks furnished by Customs...

  3. 10 CFR 73.23 - Protection of Safeguards Information-Modified Handling: Specific requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... Information not classified as Restricted Data or National Security Information related to physical protection... stored in a locked file drawer or cabinet. (3) A mobile device (such as a laptop computer) may also be... of intrusion detection devices, alarm assessment equipment, alarm system wiring, emergency power...

  4. 10 CFR 73.23 - Protection of Safeguards Information-Modified Handling: Specific requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    .... Information not classified as Restricted Data or National Security Information related to physical protection... stored in a locked file drawer or cabinet. (3) A mobile device (such as a laptop computer) may also be... of intrusion detection devices, alarm assessment equipment, alarm system wiring, emergency power...

  5. 10 CFR 73.23 - Protection of Safeguards Information-Modified Handling: Specific requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... Information not classified as Restricted Data or National Security Information related to physical protection... stored in a locked file drawer or cabinet. (3) A mobile device (such as a laptop computer) may also be... of intrusion detection devices, alarm assessment equipment, alarm system wiring, emergency power...

  6. 10 CFR 73.23 - Protection of Safeguards Information-Modified Handling: Specific requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    .... Information not classified as Restricted Data or National Security Information related to physical protection... stored in a locked file drawer or cabinet. (3) A mobile device (such as a laptop computer) may also be... of intrusion detection devices, alarm assessment equipment, alarm system wiring, emergency power...

  7. 10 CFR 73.23 - Protection of Safeguards Information-Modified Handling: Specific requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... Information not classified as Restricted Data or National Security Information related to physical protection... stored in a locked file drawer or cabinet. (3) A mobile device (such as a laptop computer) may also be... of intrusion detection devices, alarm assessment equipment, alarm system wiring, emergency power...

  8. Firearm Deaths among Children and Youth.

    ERIC Educational Resources Information Center

    O'Donnell, Clifford R.

    1995-01-01

    Examines the long- and short-term policy alternatives in reducing firearm deaths of children. The article advocates the need for multiple steps that include educational efforts such as conflict resolution; safety devices, such as trigger locks; security policies for schools to protect students; and gun access laws to reduce firearm acquisitions by…

  9. 19 CFR 151.30 - Sugar closets.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 2 2014-04-01 2014-04-01 false Sugar closets. 151.30 Section 151.30 Customs... (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Sugars, Sirups, and Molasses § 151.30 Sugar closets. Sugar closets for samples shall be substantially built and secured by locks furnished by Customs...

  10. 19 CFR 151.30 - Sugar closets.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 2 2013-04-01 2013-04-01 false Sugar closets. 151.30 Section 151.30 Customs... (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Sugars, Sirups, and Molasses § 151.30 Sugar closets. Sugar closets for samples shall be substantially built and secured by locks furnished by Customs...

  11. 19 CFR 151.30 - Sugar closets.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 2 2012-04-01 2012-04-01 false Sugar closets. 151.30 Section 151.30 Customs... (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Sugars, Sirups, and Molasses § 151.30 Sugar closets. Sugar closets for samples shall be substantially built and secured by locks furnished by Customs...

  12. 40 CFR 63.773 - Inspection and monitoring requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... secured in the non-diverting position using a car-seal or a lock-and-key type configuration, visually... value is greater. The temperature sensor shall be installed at a location in the combustion chamber downstream of the combustion zone. (B) For a catalytic vapor incinerator, a temperature monitoring device...

  13. 40 CFR 63.1283 - Inspection and monitoring requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... to the bypass device is secured in the non-diverting position using a car-seal or a lock-and-key type... combustion chamber downstream of the combustion zone. (B) For a catalytic vapor incinerator, a temperature... combustion chamber downstream of the combustion zone. (E) For a condenser, a temperature monitoring device...

  14. It's in the Cards.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2000-01-01

    Examines how the use of electronic access-control system enables college and universities to provide a safer environment for students and staff. The advantages of no-key doors, adapting entry card systems for multiple uses, and successfully retaining lock and key systems when facilities do not lend themselves to electronic security are discussed.…

  15. Smart security and securing data through watermarking

    NASA Astrophysics Data System (ADS)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  16. Manufacturing Accomplices: ICT Use in Securing the Safety State at Airports

    NASA Astrophysics Data System (ADS)

    Østerlie, Thomas; Asak, Ole Martin; Pettersen, Ole Georg; Tronhus, Håvard

    Based on a study of ICT use at an airport security checkpoint, this paper explores a possible explanation to the paradox that travelers find existing airport security measures inadequate while at the same time believing air travel to be sufficiently secure. We pursue this explanation by showing that, for the security checkpoint to function properly in relation to the overall function of the airport, travelers have to be enrolled in a particular program of action. They are then locked into this program through sanctions. Travelers are forced into participating in a system many of them find ethically and morally objectionable. Yet, active participation makes it difficult for them to object to the moral and ethical issues of their actions without damning themselves. Our explanation of the security paradox is, therefore, that while travelers remain critical of airport security, they avoid damning themselves by criticizing the system in terms of its own logic. They have been made accomplices.

  17. The climate sensitivity of food security in Mali - a historical perspective on availability and access dimensions

    NASA Astrophysics Data System (ADS)

    Giannini, A.; Krishnamurthy, P. K.; Cousin, R.; Choularton, R. J.

    2011-12-01

    We present results based on an analysis of a 2005 livelihood survey of ~2000 rural households in ~200 villages scattered across Mali, a sparsely populated, large land-locked country in West Africa, to elucidate the role of climate variability and change in shaping availability and access dimensions of food security. The Comprehensive Food Security Vulnerability Analysis is a recurrent survey carried out by the World Food Programme and in-country partners to map out nutritional and socio-economic status during normal (~food secure) conditions in the hope of understanding underlying cause(s) and prevent the next food security crisis. We set the spatial characterization of food security that emerges from the CFSVA against the background of a varying climate, on intra-seasonal, interannual and multi-decadal time scales: through elucidation of the influence of climate on agricultural production we arrive at an interpretation of structural and conjunctural events affecting food security. We conclude with a discussion of possible interventions to reduce vulnerability.

  18. 32 CFR 552.103 - Requirements for carrying and use.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and return. Stopping at other installation facilities while enroute is prohibited (i.e., Post Exchange..., weapons will be carried in an open manner (not concealed). Firearms will be unloaded when carried (i.e... readily accessible from the passenger area (i.e., locked tool box secured to bed of a truck). Firearms...

  19. 32 CFR 552.129 - Requirements for carrying and use.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... en route is prohibited (i.e., post exchange, club, offices, etc.). Individual must have in his/her... will be unloaded when carried (i.e., projectiles physically separated from the firearms, not just... from the passenger area (i.e., locked tool box secured to bed of a truck). Firearms will be unloaded...

  20. No Place for Kids: The Case for Reducing Juvenile Incarceration

    ERIC Educational Resources Information Center

    Mendel, Richard A.

    2011-01-01

    States confine juvenile offenders in many types of facilities, including group homes, residential treatment centers, boot camps, wilderness programs, or country-run youth facilities (some of them locked, others secured only through staff supervision). But the largest share of committed youth--about 40 percent of the total--are held in locked…

  1. 46 CFR 62.30-10 - Testing.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Testing. 62.30-10 Section 62.30-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION Reliability and Safety... accordance with subpart 61.40 of this chapter. (b) On-line built-in test equipment must not lock out or...

  2. 40 CFR 63.564 - Monitoring requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... all times when the car seals have been broken and the valve position has been changed. Each by-pass line valve shall be secured in the closed position with a car-seal or a lock-and-key type configuration... for this purpose). (e) Combustion device, except flare. For sources complying with § 63.563(b)(4), use...

  3. 40 CFR 63.564 - Monitoring requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... all times when the car seals have been broken and the valve position has been changed. Each by-pass line valve shall be secured in the closed position with a car-seal or a lock-and-key type configuration... for this purpose). (e) Combustion device, except flare. For sources complying with § 63.563(b)(4), use...

  4. Card Access Know-How.

    ERIC Educational Resources Information Center

    College Planning & Management, 2000

    2000-01-01

    Provides tips for expanding a school's card access system and making it more productive for all concerned. Tips include the use of electronic locks for better security; the need for state-of-the-art card reader system to save money in the long run; selecting vendors to one that manufactures, installs, and supports the card system; and having…

  5. 40 CFR 63.148 - Leak inspection provisions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...

  6. 40 CFR 63.148 - Leak inspection provisions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...

  7. 40 CFR 63.148 - Leak inspection provisions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...

  8. 40 CFR 63.148 - Leak inspection provisions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...

  9. RF lockout circuit for electronic locking system

    NASA Astrophysics Data System (ADS)

    Becker, Earl M., Jr.; Miller, Allen

    1991-02-01

    An electronics lockout circuit was invented that includes an antenna adapted to receive radio frequency signals from a transmitter, and a radio frequency detector circuit which converts the radio frequency signals into a first direct current voltage indicative of the relative strength of the field resulting from the radio frequency signals. The first direct current voltage is supplied to a trigger circuit which compares this direct current voltage to an adjustable direct current reference voltage. This provides a second direct current voltage at the output whenever the amplitude of the first direct current voltage exceeds the amplitude of the reference voltage provided by the comparator circuit. This is supplied to a disconnect relay circuit which, upon receiving a signal from the electronic control unit of an electronic combination lock during the time period at which the second direct current voltage is present, isolates the door strike coil of a security door from the electronic control unit. This prevents signals falsely generated by the electronic control unit because of radio frequency signals in the vicinity of the electronic control unit energizing the door strike coil and accidentally opening a security door.

  10. Delayed unlatching mechanism

    DOEpatents

    Bzorgi, Fariborz M.

    2015-05-19

    In various embodiments an apparatus is presented for securing a structure such as a door, window, hatch, or gate that moves between an open and a closed position relative to a fixed structure to provide or deny access to a compartment, a room, an outdoor area, or a facility. Various embodiments provide a delay in opening the closure of sufficient duration to frustrate a rapid activation that might be desired by a person who is attempting to pass through the closure for some illicit purpose. Typically, hydraulics are used to activate the apparatus and no electrical energy or electronic signals are employed. In one embodiment, a plurality of actuations of a hand lever operates a hydraulic pump that moves a locking bolt from a first position in which a locking bolt is engaged with a recess in the fixed structure (preventing opening of a gate) to a second position in which the locking bolt is disengaged from the recess to permit opening of the gate.

  11. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods

    PubMed Central

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones. PMID:28297719

  12. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.

    PubMed

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals' awareness of the consequences of security threats. By comparing participants' behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users' security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.

  13. New fixation method for maxillary distraction osteogenesis using locking attachments.

    PubMed

    Suzuki, Eduardo Yugo; Buranastidporn, Boonsiva; Ishii, Masatoshi

    2006-10-01

    The external traction hooks of the intraoral splint used in the rigid external distraction (RED) system for maxillary distraction osteogenesis interfere with the surgical procedures. The purpose of this study is to introduce an innovative splint fixation method for maxillary distraction osteogenesis with Locking Attachments and evaluate their advantages, such as reduction of operating time compared with the traditional intraoral splint method. Retrospective comparison of operative times of maxillary Le Fort I osteotomy procedures was carried out with the traditional protocol using the intraoral splint cemented to the maxillary dentition (n = 14), and a removable intraoral splint that is inserted postsurgically (n = 14). Operative procedure times were compared and analyzed statistically using the data extracted from the surgical records. There were no complications inserting the removable splint postsurgically, including pain, discomfort, or time-consuming procedure. Stable and secure splint fixation was obtained before the distraction procedure and the desired treatment goals were obtained in all patients. The total operative procedure times were significantly reduced in the Locking Attachments group by 24% to 41% (approximately 65 minutes) compared with earlier operations involving the conventional splints (P < .05). Maxillary distraction osteogenesis with the Locking Attachments is a highly effective fixation approach to manage severe hypoplastic maxilla, eliminating lip constraints resulting from scarring and allowing for easier, more deliberate and careful dissection. The use of the Locking Attachments is reliable in craniofacial surgery and has proved to be advantageous in the reduction of the operating time and surgical risks.

  14. 75 FR 8763 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-25

    ... at http://www.sec.gov and also on the Exchange's Internet Web site at http://nasdaqomxbx... Options Order Protection and Locked/Crossed Market Plan (``Decentralized Plan'').\\6\\ \\5\\ See Securities... mechanisms to remain fully compliant with the Decentralized Plan and BOX Rules and to no longer rely upon a...

  15. Repair, Evaluation, Maintenance, and Rehabilitation Research Program. Lock Accident Study

    DTIC Science & Technology

    1990-09-01

    ZIP Code) 10 . SOURCE OF FUNDIN6 NUMBERS -- . ;_ PROGRAM PROJECT TASK WORK UNIT Washington, DC 20314-1000 ELEMENT NO. NO. NO. . NO. 11. TITLE (1 eNy...miwcrwA; I ’+an na SECURITY CLASSIFICATION OF THIS PAGE 10 . WORK UNIT ACCESSION NO. (Continued). Funding provided by Repair, Evaluation, Maintenance, and... 10 PM S ............................................................... 10 District Records

  16. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ... receiver, electrical key and an electronic control module (ECM). The conventional key components consist of a transponder key ECU assembly, transponder key coil, security indicator, ignition key and an ECM... certification ECU and steering lock ECU receive confirmation of the valid key, allowing the ECM to start the...

  17. Door Locking Options in Schools

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2009

    2009-01-01

    Doors serve a variety of needs and purposes in schools: (1) Exterior doors provide building security and protection from the elements; and (2) Interior doors control the movement of people among school spaces, help control noise and air flow, and act as flame and smoke barriers during a fire. In a lockdown, they serve as safety barriers. From a…

  18. VIEW LOOKING SOUTHEAST AT BUILDING 121. THE BUILDING HOUSES OFFICES, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW LOOKING SOUTHEAST AT BUILDING 121. THE BUILDING HOUSES OFFICES, THE ROCKY FLATS PLANT CENTRAL ALARM STATION, ALARM CONSOLES, THE ARMORY, THE LOCK AND KEY SECTION, A COMPUTER ROOM, A UTILITY ROOM, AND LOCKER ROOMS WITH SHOWERS. (1/98) - Rocky Flats Plant, Security & Armory, West of Third Street, south of Central Avenue, Golden, Jefferson County, CO

  19. 36 CFR 79.9 - Standards to determine when a repository possesses the capability to provide adequate long-term...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the particular collection on a long-term basis using professional museum and archival practices; and... security such as locking the items in a safe, vault or museum specimen cabinet, as appropriate; (vi... staff and any consultants who are responsible for managing and preserving the collection to be qualified...

  20. 36 CFR 79.9 - Standards to determine when a repository possesses the capability to provide adequate long-term...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the particular collection on a long-term basis using professional museum and archival practices; and... security such as locking the items in a safe, vault or museum specimen cabinet, as appropriate; (vi... staff and any consultants who are responsible for managing and preserving the collection to be qualified...

  1. 36 CFR 79.9 - Standards to determine when a repository possesses the capability to provide adequate long-term...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the particular collection on a long-term basis using professional museum and archival practices; and... security such as locking the items in a safe, vault or museum specimen cabinet, as appropriate; (vi... staff and any consultants who are responsible for managing and preserving the collection to be qualified...

  2. 36 CFR 79.9 - Standards to determine when a repository possesses the capability to provide adequate long-term...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the particular collection on a long-term basis using professional museum and archival practices; and... security such as locking the items in a safe, vault or museum specimen cabinet, as appropriate; (vi... staff and any consultants who are responsible for managing and preserving the collection to be qualified...

  3. A secure operational model for mobile payments.

    PubMed

    Chang, Tao-Ku

    2014-01-01

    Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.

  4. A Secure Operational Model for Mobile Payments

    PubMed Central

    2014-01-01

    Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service. PMID:25386607

  5. Psychiatric wards with locked doors--advantages and disadvantages according to nurses and mental health nurse assistants.

    PubMed

    Haglund, K; von Knorring, L; von Essen, L

    2006-04-01

    To describe nurses' and mental health nurse assistants' perceptions of advantages and disadvantages about working on a psychiatric ward with a locked entrance door. Psychiatric staff sometimes needs to protect patients from harming themselves or others. To keep the entrance door locked may help staff to achieve this goal. How locked entrance doors at psychiatric wards are experienced by staff, working on these wards, has been investigated to a very limited extent. The study was explorative and descriptive. Audio taped, semi-structured interviews with open-ended questions about advantages and disadvantages about working on a psychiatric ward with a locked entrance door, were conducted with 20 nurses and 20 mental health nurse assistants. Data were analyzed with content analysis. A content analysis revealed eight categories of advantages and 18 categories of disadvantages. Most advantages mentioned by nurses and mental health nurse assistants were categorized as providing staff with control over patients, providing patients with a secure and efficient care and protecting patients and staff against 'the outside'. Most disadvantages mentioned by nurses were categorized as causing extra work for staff, making patients feel confined, making patients feel dependent and creating a non-caring environment. Most disadvantages mentioned by mental health nurse assistants were categorized as causing extra work for staff, making patients feel confined, causing emotional problems for patients, making staff's power obvious and forcing patients to adapt to other patients' needs. Nurses and mental health nurse assistants mentioned more disadvantages than advantages and nurses mentioned more disadvantages than mental health nurse assistants. Nurses and mental health nurse assistants perceive a number of advantages and disadvantages for themselves, patients and significant others with a locked door at a psychiatric ward. Most of these concern patients' experiences. It is important for staff working within psychiatric care to reflect upon the fact that a locked entrance door is connected with a range of negative as well as positive perceptions and to minimize patient and own concerns connected to the locked door.

  6. 75 FR 17810 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-07

    ... a party to the trade; (2) whether the transaction is ``media'' eligible (i.e., the trade report is... respect to media-eligible locked-in transactions in non-Nasdaq exchange-listed (or CTA) securities. A member that exceeds, in any given month, a daily average of 5,000 media reports in which the member is...

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cavieres, Andres; Al-Haddad, Tristan; Goodman, Joseph

    A photovoltaic panel mounting clip comprising a base, central indexing tabs, flanges, lateral indexing tabs, and vertical indexing tabs. The mounting clip removably attaches one or more panels to a beam or the like structure, both mechanically and electrically. It provides secure locking of the panels in all directions, while providing guidance in all directions for accurate installation of the panels to the beam or the like structure.

  8. 76 FR 4483 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-25

    ... restricted person by the U.S. Attorney General. The NSAR is also used to track the possession, use, and.... Attorney General. The NSAR is also used to track the possession, use, and transfer of select agents and is...) information designated for local disposition will be placed in a locked container or designated secure storage...

  9. Population growth, economic security, and cultural change in wilderness counties

    Treesearch

    Paul A. Lorah

    2000-01-01

    A familiar version of the “jobs versus the environment” argument asserts that wilderness areas limit economic growth by locking up potentially productive natural resources. Analysis of the development paths of rural Western counties shows that this is unlikely: the presence of Wilderness is correlated with income, employment and population growth. Similarly, Wilderness...

  10. 76 FR 78057 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-15

    ... have a time-in-force designation of Good Til Cancelled (``GTC'').\\5\\ \\3\\ See Securities Exchange Act... Orders are evaluated at the time of entry with respect to locking or crossing other orders as follows: (i..., Chapter VI, Section 1(g). At this time, the Exchange proposes to amend the definition in Chapter VI...

  11. Initiator-catalyzed self-assembly of duplex-looped DNA hairpin motif based on strand displacement reaction for logic operations and amplified biosensing.

    PubMed

    Bi, Sai; Yue, Shuzhen; Wu, Qiang; Ye, Jiayan

    2016-09-15

    Here we program an initiator-catalyzed self-assembly of duplex-looped DNA hairpin motif based on strand displacement reaction. Due to the recycling of initiator and performance in a cascade manner, this system is versatilely extended to logic operations, including the construction of concatenated logic circuits with a feedback function and a biocomputing keypad-lock security system. Compared with previously reported molecular security systems, the prominent feature of our keypad lock is that it can be spontaneously reset and recycled with no need of any external stimulus and human intervention. Moreover, through integrating with an isothermal amplification technique of rolling circle amplification (RCA), this programming catalytic DNA self-assembly strategy readily achieves sensitive and selective biosensing of initiator. Importantly, a magnetic graphene oxide (MGO) is introduced to remarkably reduced background, which plays an important role in enhancing the signal-to-noise ratio and improving the detection sensitivity. Therefore, the proposed sophisticated DNA strand displacement-based methodology with engineering dynamic functions may find broad applications in the construction of programming DNA nanostructures, amplification biosensing platform, and large-scale DNA circuits. Copyright © 2016 Elsevier B.V. All rights reserved.

  12. Self locking coupling mechanism for engaging and moving a load

    DOEpatents

    Wood, Richard L.; Casamajor, Alan B.; Parsons, Richard E.

    1982-01-01

    Coupling mechanism (11) for engaging and lifting a load (12) has a housing (19) with a guide passage (18) for receiving a knob (13) which is secured to the load (12) through a neck (15) of smaller diameter. A hollow ball (23) in the housing (19) has an opening (27) which receives the knob (13) and the ball (23) is then turned to displace the opening (27) from the housing passage (18) and to cause the neck (15) to enter a slot (29) in the ball (23) thereby securing the load (12) to the coupling mechanism (11) as elements (49) of the housing (19) block travel of the neck (15) back into the opening (27) when the ball (23) is turned to the load holding orientation. As engagement of the load (12) and locking of the coupling mechanism are accomplished simultaneously by the same ball (23) motion, operation is simplified and reliability is greatly increased. The ball (23) is preferably turned by a motor (32) through worm gearing (36) and the coupling mechanism (11) may be controlled from a remote location. Among other uses, the coupling mechanism (11) is adaptable to the handling of spent nuclear reactor fuel elements (12).

  13. Perceptions of firearms and suicide: The role of misinformation in storage practices and openness to means safety measures.

    PubMed

    Anestis, Michael D; Butterworth, Sarah E; Houtsma, Claire

    2018-02-01

    Firearm ownership and unsafe storage increase risk for suicide. Little is known regarding factors that influence storage practices and willingness to engage in means safety. Utilizing Amazon's Mechanical Turk program, we recruited an online sample of 300 adults living in the US who own at least one firearm. Firearm storage practices and openness to means safety measures were assessed using items designed for this study. Data were collected and analyzed in 2017. Firearms stored in non-secure locations and without a locking device were associated with lower beliefs in the relationship between firearm storage and suicide risk. Fearlessness about death moderated the association between current secure versus non-secure storage and beliefs regarding firearm storage and suicide risk, in that storage practices and beliefs were more strongly related at higher levels of fearlessness about death. For both secure and locked storage of a firearm, there was a significant indirect effect of current storage practices on willingness to engage in means safety in the future through current beliefs regarding the relationship between firearm storage and suicide risk. Unsafe storage practices were largely associated with an unwillingness to store firearms more safely or to allow a trusted peer to temporarily store the firearm outside the home in order to prevent their own or someone else's suicide. Self-report and cross-sectional data were used. Results may not generalize to non-firearm owners. Firearm owners are prone to inaccurate beliefs about the relationship between firearms and suicide. These beliefs may influence both current firearm storage practices and the willingness to engage in means safety. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Tool for Coupling a Torque Wrench to a Round Cable Connector

    NASA Technical Reports Server (NTRS)

    Hacker, Scott C.; Dean, Richard J.; Burge, Scott W.

    2006-01-01

    A tool makes it possible to couple a torque wrench to an externally knurled, internally threaded, round cable connector. The purpose served by the tool is to facilitate the tightening of multiple such connectors (or the repeated tightening of the same connector) to repeatable torques. The design of a prior cable-connector/ torque-wrench coupling tool provided for application of the torque-wrench jaws to a location laterally offset from the axis of rotation of the cable connector, making it necessary to correct the torque reading for the offset. Unlike the design of the prior tool, the design of the present tool provides for application of the torque-wrench jaws to a location on the axis of rotation, obviating correction of the torque reading for offset. The present tool (see figure) consists of a split collet containing a slot that provides clearance for inserting and bending the cable, a collet-locking sleeve, a collet-locking nut, and a torque-wrench adaptor that is press-fit onto the collet. Once the collet is positioned on the cable connector, the collet-locking nut is turned to force the collet-locking sleeve over the collet, compressing the collet through engagement of tapered surfaces on the outside of the collet and the inside of the locking sleeve. Because the collet is split and therefore somewhat flexible, this compression forces the collet inward to grip the connector securely. The torque wrench is then applied to the torque-wrench adaptor in the usual manner for torquing a nut or a bolt.

  15. Nuclear reactor fuel assembly duct-tube-to-inlet-nozzle attachment system

    DOEpatents

    Christiansen, David W.; Smith, Bob G.

    1982-01-01

    A reusable system for removably attaching the lower end 21 of a nuclear reactor fuel assembly duct tube to an upper end 11 of a nuclear reactor fuel assembly inlet nozzle. The duct tube's lower end 21 has sides terminating in locking tabs 22 which end in inwardly-extending flanges 23. The flanges 23 engage recesses 13 in the top section 12 of the inlet nozzle's upper end 11. A retaining collar 30 slides over the inlet nozzle's upper end 11 to restrain the flanges 23 in the recesses 13. A locking nut 40 has an inside threaded portion 41 which engages an outside threaded portion 15 of the inlet nozzle's upper end 11 to secure the retaining collar 30 against protrusions 24 on the duct tube's sides.

  16. A Strategic Design of an Opto-Chemical Security Device with Resettable and Reconfigurable Password Based Upon Dual Channel Two-in-One Chemosensor Molecule.

    PubMed

    Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda

    2017-02-20

    A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.

  17. Market turbulence creates financing opportunity.

    PubMed

    Cooper, James H

    2012-03-01

    The flight to high-quality assets resulting from Standard & Poor's downgrade of the U.S. government's credit rating has dropped the yield on U.S. Treasury securities as investors have sought refuge amid uncertain market conditions. Consequently, hospitals can now obtain mortgage insurance from the U.S. government to finance expansions and refinance their debt with GNMA securities at taxable interest rates that are often more favorable than tax-exempt bond fixed rates. Because GNMA certificates can be sold in a forward purchase transaction that locks in a fixed interest rate while avoiding payment of interest until construction funds are disbursed, they can help avoid the effects of negative arbitrage.

  18. A Strategic Design of an Opto-Chemical Security Device with Resettable and Reconfigurable Password Based Upon Dual Channel Two-in-One Chemosensor Molecule

    NASA Astrophysics Data System (ADS)

    Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda

    2017-02-01

    A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.

  19. Boolean Logic Tree of Label-Free Dual-Signal Electrochemical Aptasensor System for Biosensing, Three-State Logic Computation, and Keypad Lock Security Operation.

    PubMed

    Lu, Jiao Yang; Zhang, Xin Xing; Huang, Wei Tao; Zhu, Qiu Yan; Ding, Xue Zhi; Xia, Li Qiu; Luo, Hong Qun; Li, Nian Bing

    2017-09-19

    The most serious and yet unsolved problems of molecular logic computing consist in how to connect molecular events in complex systems into a usable device with specific functions and how to selectively control branchy logic processes from the cascading logic systems. This report demonstrates that a Boolean logic tree is utilized to organize and connect "plug and play" chemical events DNA, nanomaterials, organic dye, biomolecule, and denaturant for developing the dual-signal electrochemical evolution aptasensor system with good resettability for amplification detection of thrombin, controllable and selectable three-state logic computation, and keypad lock security operation. The aptasensor system combines the merits of DNA-functionalized nanoamplification architecture and simple dual-signal electroactive dye brilliant cresyl blue for sensitive and selective detection of thrombin with a wide linear response range of 0.02-100 nM and a detection limit of 1.92 pM. By using these aforementioned chemical events as inputs and the differential pulse voltammetry current changes at different voltages as dual outputs, a resettable three-input biomolecular keypad lock based on sequential logic is established. Moreover, the first example of controllable and selectable three-state molecular logic computation with active-high and active-low logic functions can be implemented and allows the output ports to assume a high impediment or nothing (Z) state in addition to the 0 and 1 logic levels, effectively controlling subsequent branchy logic computation processes. Our approach is helpful in developing the advanced controllable and selectable logic computing and sensing system in large-scale integration circuits for application in biomedical engineering, intelligent sensing, and control.

  20. Space and Missile Systems Center Standard: Space Flight Pressurized Systems

    DTIC Science & Technology

    2015-02-28

    24 5.7.2 Fire Resistant Fluids ......................................................................................... 24 5.7.3...connections. 5.1.7 Threaded Parts [5.1.7-1] All threaded parts in components shall be securely locked to resist uncoupling forces by acceptable safe... Resistant Fluids [5.7.2-1] Fire resistant or flame proof hydraulic fluid shall be used where the system design can expose hydraulic fluid to potential

  1. Design and Test Requirements for Space Flight Pressurized Systems

    DTIC Science & Technology

    2014-11-26

    5.7.2 Fire Resistant Fluids ......................................................................................... 24 5.7.3 Accumulators...5.1.7 Threaded Parts [5.1.7-1] All threaded parts in components shall be securely locked to resist uncoupling forces by acceptable safe design...event of force balance on both inlet ports may occur, thus causing the shutoff valve to restrict flow from the outlet port. 5.7.2 Fire Resistant

  2. 46 CFR 35.35-10 - Closing of freeing-ports, scuppers, and sea valves-TB/ALL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Closing of freeing-ports, scuppers, and sea valves-TB... OPERATIONS Cargo Handling § 35.35-10 Closing of freeing-ports, scuppers, and sea valves—TB/ALL. The person in... no circumstances may sea valves be secured by locks, the valves must be closed, and lashed or sealed...

  3. 46 CFR 35.35-10 - Closing of freeing-ports, scuppers, and sea valves-TB/ALL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Closing of freeing-ports, scuppers, and sea valves-TB... OPERATIONS Cargo Handling § 35.35-10 Closing of freeing-ports, scuppers, and sea valves—TB/ALL. The person in... no circumstances may sea valves be secured by locks, the valves must be closed, and lashed or sealed...

  4. Percutaneous fixation with Kirschner wires versus volar locking plate fixation in adults with dorsally displaced fracture of distal radius: randomised controlled trial.

    PubMed

    Costa, Matthew L; Achten, Juul; Parsons, Nick R; Rangan, Amar; Griffin, Damian; Tubeuf, Sandy; Lamb, Sarah E

    2014-08-05

    To compare the clinical effectiveness of Kirschner wire fixation with locking plate fixation for patients with a dorsally displaced fracture of the distal radius. A multicentre two arm parallel group assessor blind randomised controlled trial with 1:1 treatment allocation. 18 trauma centres in the United Kingdom. 461 adults with a dorsally displaced fracture of the distal radius within 3 cm of the radiocarpal joint that required surgical fixation. Patients were excluded if the surgeon thought that the surface of the wrist joint was so badly displaced it required open reduction. Kirschner wire fixation: wires are passed through the skin over the dorsal aspect of the distal radius and into the bone to hold the fracture in the correct anatomical position. Locking plate fixation: a locking plate is applied through an incision over the volar (palm) aspect of the wrist and secured to the bone with fixed angle locking screws. validated patient rated wrist evaluation (PRWE). This rates wrist function in two (equally weighted) sections concerning the patient's experience of pain and disability to give a score out of 100. disabilities of arm, shoulder, and hand (DASH) score, the EuroQol (EQ-5D), and complications related to the surgery. The baseline characteristics of the two groups were well balanced, and over 90% of patients completed follow-up. The wrist function of both groups of patients improved by 12 months. There was no clinically relevant difference in the patient rated wrist score at three, six, or 12 months (difference in favour of the plate group was -1.3, 95% confidence interval -4.5 to 1.8; P=0.40). Nor was there a clinically relevant difference in health related quality of life or the number of complications in each group. Contrary to the existing literature, and against the rapidly increasing use of locking plate fixation, this trial found no difference in functional outcome in patients with dorsally displaced fractures of the distal radius treated with Kirschner wires or volar locking plates. Kirschner wire fixation, however, is cheaper and quicker to perform. Current Controlled Trials ISCRTN 31379280. UKCRN 8956. © Costa et al 2014.

  5. Locking apparatus for gate valves

    DOEpatents

    Fabyan, J.; Williams, C.W.

    A locking apparatus for fluid operated valves having a piston connected to the valve actuator which moves in response to applied pressure within a cylinder housing having a cylinder head, a catch block is secured to the piston, and the cylinder head incorporates a catch pin. Pressure applied to the cylinder to open the valve moves the piston adjacent to the cylinder head where the catch pin automatically engages the catch block preventing further movement of the piston or premature closure of the valve. Application of pressure to the cylinder to close the valve, retracts the catch pin, allowing the valve to close. Included are one or more selector valves, for selecting pressure application to other apparatus depending on the gate valve position, open or closed, protecting such apparatus from damage due to premature closing caused by pressure loss or operational error.

  6. Myth, Metaphor, and Imagination: Framing Homeland Security as Art and Archetype

    DTIC Science & Technology

    2013-03-01

    repeatable, patterned, and consequential, science reveals stability and balance. As creative, emergent, mutant, and selfish, art is a self -styled...broader applications. Soft vigilance is open to novelty and takes in more information, while hyper vigilance locks in on an object of attention and...deficiency requirements of physiological needs, safety needs, love and belonging, and esteem, but also the being requirements of self -actualization and

  7. Hand and Power Tools

    DTIC Science & Technology

    1998-01-01

    equipped with a constant- pressure switch or control: drills; tappers; fastener drivers; horizontal, vertical, and angle grinders with wheels more than...hand-held power tools must be equipped with either a positive “on-off” control switch, a constant pressure switch , or a “lock-on” control: disc sanders...percussion tools with no means of holding accessories securely, must be equipped with a constant- pressure switch that will shut off the power when the

  8. 40 CFR 63.5150 - If I use a control device to comply with the emission standards, what monitoring must I do?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... line that could divert the exhaust stream away from the control device to the atmosphere. (ii) Car-seal or lock-and-key valve closures. Secure any bypass line valve in the closed position with a car-seal... thermocouple or temperature sensor in the combustion chamber at a location in the combustion zone. (iii) For a...

  9. 40 CFR 63.5150 - If I use a control device to comply with the emission standards, what monitoring must I do?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... line that could divert the exhaust stream away from the control device to the atmosphere. (ii) Car-seal or lock-and-key valve closures. Secure any bypass line valve in the closed position with a car-seal... thermocouple or temperature sensor in the combustion chamber at a location in the combustion zone. (iii) For a...

  10. The Evaluation of Rekeying Protocols Within the Hubenko Architecture as Applied to Wireless Sensor Networks

    DTIC Science & Technology

    2009-03-01

    SENSOR NETWORKS THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and...hierarchical, and Secure Lock within a wireless sensor network (WSN) under the Hubenko architecture. Using a Matlab computer simulation, the impact of the...rekeying protocol should be applied given particular network parameters, such as WSN size. 10 1.3 Experimental Approach A computer simulation in

  11. The locking-decoding frontier for generic dynamics.

    PubMed

    Dupuis, Frédéric; Florjanczyk, Jan; Hayden, Patrick; Leung, Debbie

    2013-11-08

    It is known that the maximum classical mutual information, which can be achieved between measurements on pairs of quantum systems, can drastically underestimate the quantum mutual information between them. In this article, we quantify this distinction between classical and quantum information by demonstrating that after removing a logarithmic-sized quantum system from one half of a pair of perfectly correlated bitstrings, even the most sensitive pair of measurements might yield only outcomes essentially independent of each other. This effect is a form of information locking but the definition we use is strictly stronger than those used previously. Moreover, we find that this property is generic, in the sense that it occurs when removing a random subsystem. As such, the effect might be relevant to statistical mechanics or black hole physics. While previous works had always assumed a uniform message, we assume only a min-entropy bound and also explore the effect of entanglement. We find that classical information is strongly locked almost until it can be completely decoded. Finally, we exhibit a quantum key distribution protocol that is 'secure' in the sense of accessible information but in which leakage of even a logarithmic number of bits compromises the secrecy of all others.

  12. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    PubMed

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  13. A resettable and reprogrammable DNA-based security system to identify multiple users with hierarchy.

    PubMed

    Li, Hailong; Hong, Wei; Dong, Shaojun; Liu, Yaqing; Wang, Erkang

    2014-03-25

    Molecular-level security devices have raised ever-increasing interest in recent years to protect data and information from illegal invasion. Prior molecular keypad locks have an output signal dependent upon not only the appropriate combination but also the exact sequence of inputs, but it cannot be reset or reprogrammed. Here, a DNA-based security system with reset and never-reported reprogram function is successfully developed in proof-of-principle, with which one can change the password in case that the system is cracked. The previous password becomes invalid in the reprogrammed security system. Interestingly, more than one password is designed to permit multiple users to access. By harnessing the intrinsic merit of the different passwords, the system can distinguish different user who is endowed with prior authority. The intelligent device is addressed on solid support and facilitates electronic processes, avoiding chemical accumulation in the system by simple removal of the electrode from the input solution and indicating a main avenue for its further development.

  14. Hyperbranched Hybridization Chain Reaction for Triggered Signal Amplification and Concatenated Logic Circuits.

    PubMed

    Bi, Sai; Chen, Min; Jia, Xiaoqiang; Dong, Ying; Wang, Zonghua

    2015-07-06

    A hyper-branched hybridization chain reaction (HB-HCR) is presented herein, which consists of only six species that can metastably coexist until the introduction of an initiator DNA to trigger a cascade of hybridization events, leading to the self-sustained assembly of hyper-branched and nicked double-stranded DNA structures. The system can readily achieve ultrasensitive detection of target DNA. Moreover, the HB-HCR principle is successfully applied to construct three-input concatenated logic circuits with excellent specificity and extended to design a security-mimicking keypad lock system. Significantly, the HB-HCR-based keypad lock can alarm immediately if the "password" is incorrect. Overall, the proposed HB-HCR with high amplification efficiency is simple, homogeneous, fast, robust, and low-cost, and holds great promise in the development of biosensing, in the programmable assembly of DNA architectures, and in molecular logic operations. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Selectively Lockable Knee Brace

    NASA Technical Reports Server (NTRS)

    Myers, W. Neill (Inventor); Shadoan, Michael D. (Inventor); Forbes, John C. (Inventor); Baker, Kevin J. (Inventor); Rice, Darron C. (Inventor)

    1996-01-01

    A knee brace for aiding in rehabilitation of damaged leg muscles includes upper and lower housings normally pivotable one relative to the other about the knee joint axis of a patient. The upper housing is attachable to the thigh of the patient above the knee joint while the lower housing is secured to a stirrup which extends downwardly along the patient's leg and is attached to the patient's shoe. An actuation rod is carried within the lower housing and is coupled to a cable. The upper and lower housings carry cooperative clutch/brake elements which normally are disengaged to permit relative movement between the upper and lower housings. When the cable is extended the clutch/brake elements engage and lock the housings together. A heel strike mechanism fastened to the stirrup and the heel of the shoe is connected to the cable to selectively extend the cable and lock the brace in substantially any position when the patient places weight on the heel.

  16. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Xuyang; Liu, Wenyuan; Wang, Pu; Li, Yongmin

    2017-06-01

    We experimentally demonstrated an all-fiber-based unidimensional continuous-variable quantum key distribution (CV QKD) protocol and analyzed its security under collective attack in realistic conditions. A pulsed balanced homodyne detector, which could not be accessed by eavesdroppers, with phase-insensitive efficiency and electronic noise, was considered. Furthermore, a modulation method and an improved relative phase-locking technique with one amplitude modulator and one phase modulator were designed. The relative phase could be locked precisely with a standard deviation of 0.5° and a mean of almost zero. Secret key bit rates of 5.4 kbps and 700 bps were achieved for transmission fiber lengths of 30 and 50 km, respectively. The protocol, which simplified the CV QKD system and reduced the cost, displayed a performance comparable to that of a symmetrical counterpart under realistic conditions. It is expected that the developed protocol can facilitate the practical application of the CV QKD.

  17. Selectively lockable knee brace

    NASA Technical Reports Server (NTRS)

    Myers, Neill (Inventor); Shadoan, Mike (Inventor); Forbes, John (Inventor); Baker, Kevin (Inventor)

    1994-01-01

    A knee brace for aiding in rehabilitation of damaged leg muscles includes upper and lower housings, normally pivotable, one relative to the other about the knee joint axis of a patient. The upper housing is attachable to the thigh of the patient above the knee joint, while the lower housing is secured to a stirrup which extends downwardly along the patient's leg and is attached to the patient's shoe. An actuation rod is carried within the lower housing and is coupled to a cable. The upper and lower housings carry cooperative clutch/brake elements which normally are disengaged to permit relative movement between the upper and lower housings. When the cable is extended, the clutch/brake elements engage and lock the housings together. A heel strike mechanism fastened to the stirrup and the heel of the shoe is connected to the cable to selectively extend the cable and lock the brace in substantially any position when the patient places weight on the heel.

  18. New Magnetic Materials and Phenomena for Radar and Microwave Signal Processing Devices - Bulk and Thin Film Ferrites and Metallic Films

    DTIC Science & Technology

    2009-02-15

    Magnon scattered light generally experiences a 90° rotation in polarization from the incident beam. The wave- vector selective BLS measurements...filters, phase locked microwave pulse sources, microwave and millimeter wave devices such as isolators, circulators, phase shifters, secure signal...Wave vector selective Brillouin light scattering measurements and analysis, " C. L. Ordofiez-Romero, B. A. Kalinikos, P. Krivosik, Wei Tong, P

  19. Stimulus and Response-Locked P3 Activity in a Dynamic Rapid Serial Visual Presentation (RSVP) Task

    DTIC Science & Technology

    2013-01-01

    Perception and Psychophysics 1973, 14, 265–272. Touryan, J.; Gibson, L.; Horne, J. H.; Weber, P. Real-Time Classification of Neural Signals ...execution. 15. SUBJECT TERMS P300, RSVP, EEG, target recognition, reaction time, ERP 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...applications and as an input signal in many brain computer interactive technologies (BCITs) for both patients and healthy individuals. ERPs are extracted

  20. Percutaneous fixation with Kirschner wires versus volar locking plate fixation in adults with dorsally displaced fracture of distal radius: randomised controlled trial

    PubMed Central

    Achten, Juul; Parsons, Nick R; Rangan, Amar; Griffin, Damian; Tubeuf, Sandy; Lamb, Sarah E

    2014-01-01

    Objectives To compare the clinical effectiveness of Kirschner wire fixation with locking plate fixation for patients with a dorsally displaced fracture of the distal radius. Design A multicentre two arm parallel group assessor blind randomised controlled trial with 1:1 treatment allocation. Setting 18 trauma centres in the United Kingdom. Participants 461 adults with a dorsally displaced fracture of the distal radius within 3 cm of the radiocarpal joint that required surgical fixation. Patients were excluded if the surgeon thought that the surface of the wrist joint was so badly displaced it required open reduction. Interventions Kirschner wire fixation: wires are passed through the skin over the dorsal aspect of the distal radius and into the bone to hold the fracture in the correct anatomical position. Locking plate fixation: a locking plate is applied through an incision over the volar (palm) aspect of the wrist and secured to the bone with fixed angle locking screws. Main outcome measures Primary outcome measure: validated patient rated wrist evaluation (PRWE). This rates wrist function in two (equally weighted) sections concerning the patient’s experience of pain and disability to give a score out of 100. Secondary outcomes: disabilities of arm, shoulder, and hand (DASH) score, the EuroQol (EQ-5D), and complications related to the surgery. Results The baseline characteristics of the two groups were well balanced, and over 90% of patients completed follow-up. The wrist function of both groups of patients improved by 12 months. There was no clinically relevant difference in the patient rated wrist score at three, six, or 12 months (difference in favour of the plate group was −1.3, 95% confidence interval −4.5 to 1.8; P=0.40). Nor was there a clinically relevant difference in health related quality of life or the number of complications in each group. Conclusions Contrary to the existing literature, and against the rapidly increasing use of locking plate fixation, this trial found no difference in functional outcome in patients with dorsally displaced fractures of the distal radius treated with Kirschner wires or volar locking plates. Kirschner wire fixation, however, is cheaper and quicker to perform. Trial registration Current Controlled Trials ISCRTN 31379280. UKCRN 8956. PMID:25096595

  1. Two-sided friction stir riveting by extrusion: A process for joining dissimilar materials

    DOE PAGES

    Evans, William T.; Cox, Chase D.; Strauss, Alvin M.; ...

    2016-06-25

    Two-sided friction stir riveting (FSR) by extrusion is an innovative process developed to rapidly, efficiently, and securely join dissimilar materials. This process extends a previously developed one sided friction stir extrusion process to create a strong and robust joint by producing a continuous, rivet-like structure through a preformed hole in one of the materials with a simultaneous, two-sided friction stir spot weld. The two-sided FSR by extrusion process securely joins the dissimilar materials together and effectively locks them in place without the use of any separate materials or fasteners. Lastly, in this paper we demonstrate the process by joining aluminummore » to steel and illustrate its potential application to automotive and aerospace manufacturing processes.« less

  2. A study for prevent theft of the bike design and analysis

    NASA Astrophysics Data System (ADS)

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  3. Preparation for an Airport Master Plan for Joint Use Operation at Scott AFB, Illinois.

    DTIC Science & Technology

    1987-08-01

    Airfield and approach lighting b) Air traffic control tower c) Meteorological facilities d) Airport access and service roads e) Utilities f) Public...use, and to comply with all requirements for control of air, water and noise pollution as well as solid waste disposal. Specific conditions would be...Identification of Persons e Identification of Ground Vehicles S• Fencing 0 Gates I * Security Lighting i * Locks and Key Control 9 Critical Areas (Other Than

  4. Water Infrastructure Needs and Investment: Review and Analysis of Key Issues

    DTIC Science & Technology

    2008-11-24

    the Rural Development Act of 1972, as amended (7 U.S.C. § 1926). The purpose of these USDA programs is to provide basic amenities, alleviate health...nonregulatory costs (e.g., routine replacement of basic infrastructure).12 Wastewater Needs. The most recent wastewater survey, conducted in 2004 and issued...1.6 billion just to implement the most basic steps needed to improve security (such as better controlling access to facilities with fences, locks

  5. Department of Defense Annual Report on Sexual Assault in the Military. Fiscal Year 2013

    DTIC Science & Technology

    2014-04-16

    a web based, self-guided training solution for SARCs and SAPR PMs consisting of simulations demonstrating DSAID’s capabilities;  Included D-SAACP...for future Soldiers. This is a web -based training tool for potential and new recruits that can be accessed and used in Recruiting Stations. Topics...sensitive” to protect and promote the welfare of the patient. Paper records are treated as “sensitive,” maintained in a locked, secured container

  6. Advancing U.S. Foreign Policy Through Homeland Security: The Logic for International Training and Professional Exchanges

    DTIC Science & Technology

    2013-12-01

    the liberal international relations theory from the political and philosophical theories of John Locke, Adam Smith, John Stuart Mill, and Immanuel... theory and usefulness of such global diplomacy and the practice of police exchanges with many different countries throughout the world is the Los Angeles...by Jon Hall . In the article, Hall notes, the art of persuasion was a major part of the ancients educational system and the ancients understood that

  7. Mechanical end joint system for structural column elements

    NASA Technical Reports Server (NTRS)

    Bush, H. G.; Wallsom, R. E. (Inventor)

    1982-01-01

    A mechanical end joint system, useful for the transverse connection of strut elements to a common node, comprises a node joint half with a semicircular tongue and groove, and a strut joint half with a semicircular tongue and groove. The two joint halves are engaged transversely and the connection is made secure by the inherent physical property characteristics of locking latches and/or by a spring-actioned shaft. A quick release mechanism provides rapid disengagement of the joint halves.

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olama, Mohammed M; Allgood, Glenn O; Kuruganti, Phani Teja

    Electric utilities have a main responsibility to protect the lives and safety of their workers when they are working on low-, medium-, and high-voltage power lines and distribution circuits. With the anticipated widespread deployment of smart grids, a secure and highly reliable means of maintaining isolation of customer-owned distributed generation (DG) from the affected distribution circuits during maintenance is necessary to provide a fully de-energized work area, ensure utility personnel safety, and prevent hazards that can lead to accidents such as accidental electrocution from unanticipated power sources. Some circuits are serviced while energized (live line work) while others are de-energizedmore » for maintenance. For servicing de-energized circuits and equipment, lock-out tag-out (LOTO) programs provide a verifiable procedure for ensuring that circuit breakers are locked in the off state and tagged to indicate that status to operational personnel so that the lines will be checked for voltage to verify they are de-energized. The de-energized area is isolated from any energized sources, which traditionally are the substations. This procedure works well when all power sources and their interconnections are known armed with this knowledge, utility personnel can determine the appropriate circuits to de-energize for isolating the target line or equipment. However, with customer-owned DG tied into the grid, the risk of inadvertently reenergizing a circuit increases because circuit connections may not be adequately documented and are not under the direct control of the local utility. Thus, the active device may not be properly de-energized or isolated from the work area. Further, a remote means of de-energizing and locking out energized devices provides an opportunity for greatly reduced safety risk to utility personnel compared to manual operations. In this paper, we present a remotely controllable LOTO system that allows individual workers to determine the configuration and status of electrical system circuits and permit them to lock out customer-owned DG devices for safety purposes using a highly secure and ultra-reliable radio signal. The system consists of: (1) individual personal lockout devices, (2) lockout communications and logic module at circuit breakers, which are located at all DG devices, and (3) a database and configuration control process located at the utility operations center. The lockout system is a close permissive, i.e., loss of control power or communications will cause the circuit breaker to open. Once the DG device is tripped open, a visual means will provide confirmation of a loss of voltage and current that verifies the disconnected status of the DG. Further the utility personnel will be able to place their own lock electronically on the system to ensure a lockout functionally. The proposed LOTO system provides enhanced worker safety and protection against unintended energized lines when DG is present. The main approaches and challenges encountered through designing the proposed region-wide LOTO system are discussed in this paper. These approaches include: (1) evaluating the reliability of the proposed approach under N-modular redundancy with voter/spares configurations and (2) conducting a system level risk assessment study using the failure modes and effects analysis (FMEA) technique to identify and rank failure modes by probability of occurrence, probability of detection, and severity of consequences. This ranking allows a cost benefits analysis to be conducted such that dollars and efforts will be applied to the failures that provide greatest incremental gains in system capability (resilience, survivability, security, reliability, availability, etc.) per dollar spent whether capital, operations, or investment. Several simulation scenarios and their results are presented to demonstrate the viability of these approaches.« less

  9. Tools for Administration of a UNIX-Based Network

    NASA Technical Reports Server (NTRS)

    LeClaire, Stephen; Farrar, Edward

    2004-01-01

    Several computer programs have been developed to enable efficient administration of a large, heterogeneous, UNIX-based computing and communication network that includes a variety of computers connected to a variety of subnetworks. One program provides secure software tools for administrators to create, modify, lock, and delete accounts of specific users. This program also provides tools for users to change their UNIX passwords and log-in shells. These tools check for errors. Another program comprises a client and a server component that, together, provide a secure mechanism to create, modify, and query quota levels on a network file system (NFS) mounted by use of the VERITAS File SystemJ software. The client software resides on an internal secure computer with a secure Web interface; one can gain access to the client software from any authorized computer capable of running web-browser software. The server software resides on a UNIX computer configured with the VERITAS software system. Directories where VERITAS quotas are applied are NFS-mounted. Another program is a Web-based, client/server Internet Protocol (IP) address tool that facilitates maintenance lookup of information about IP addresses for a network of computers.

  10. Photovoltaic panel clamp

    DOEpatents

    Mittan, Margaret Birmingham [Oakland, CA; Miros, Robert H. J. [Fairfax, CA; Brown, Malcolm P [San Francisco, CA; Stancel, Robert [Loss Altos Hills, CA

    2012-06-05

    A photovoltaic panel clamp includes an upper and lower section. The interface between the assembled clamp halves and the module edge is filled by a flexible gasket material, such as EPDM rubber. The gasket preferably has small, finger like protrusions that allow for easy insertion onto the module edge while being reversed makes it more difficult to remove them from the module once installed. The clamp includes mounting posts or an integral axle to engage a bracket. The clamp also may include a locking tongue to secure the clamp to a bracket.

  11. Photovoltaic panel clamp

    DOEpatents

    Brown, Malcolm P.; Mittan, Margaret Birmingham; Miros, Robert H. J.; Stancel, Robert

    2013-03-19

    A photovoltaic panel clamp includes an upper and lower section. The interface between the assembled clamp halves and the module edge is filled by a flexible gasket material, such as EPDM rubber. The gasket preferably has small, finger like protrusions that allow for easy insertion onto the module edge while being reversed makes it more difficult to remove them from the module once installed. The clamp includes mounting posts or an integral axle to engage a bracket. The clamp also may include a locking tongue to secure the clamp to a bracket.

  12. Human push capability.

    PubMed

    Barnett, Ralph L; Liber, Theodore

    2006-02-22

    Use of unassisted human push capability arises from time to time in the areas of crowd and animal control, the security of locked doors, the integrity of railings, the removal of tree stumps and entrenched vehicles, the manoeuvering of furniture, and athletic pursuits such as US football or wrestling. Depending on the scenario, human push capability involves strength, weight, weight distribution, push angle, footwear/floor friction, and the friction between the upper body and the pushed object. Simple models are used to establish the relationships among these factors.

  13. Detachable connection for a nuclear reactor fuel assembly

    DOEpatents

    Christiansen, D.W.; Karnesky, R.A.

    1983-08-29

    A locking connection for releasably attaching a handling socket to the duct tube of a fuel assembly for a nuclear reactor. The connection comprises a load pad housing mechanically attached to the duct tube and a handling socket threadably secured within the housing. A retaining ring is interposed between the housing and the handling socket and is formed with a projection and depression engagable within a cavity and groove of the housing and handling socket, respectively, to form a detachable interlocked connection assembly.

  14. Review of Department of the Navy, Judge Advocate General’s Surface Ship Fire Investigation Reports for the Period 1980 through 1986

    DTIC Science & Technology

    1989-12-26

    unauthorized storage (storage of material in a non-storage area), storage of a hazardous material in a storage area which was not designed for such a... hazard , e.g., storing flammable liquid in a non- sprinklered storeroom, and excessive amounts of material in a storage area. Applicable Reports: JAGs 6460...have been secured (locked) because of hazardous contents (e.g., flammable liquids, ordnance)but were not for various reasons presented an opportunity for

  15. Detachable connection for a nuclear reactor fuel assembly

    DOEpatents

    Christiansen, David W.; Karnesky, Richard A.

    1986-01-01

    A locking connection for releasably attaching a handling socket to the duct tube of a fuel assembly for a nuclear reactor. The connection comprises a load pad housing mechanically attached to the duct tube and a handling socket threadably secured within the housing. A retaining ring is interposed between the housing and the handling socket and is formed with a projection and depression engageable within a cavity and groove of the housing and handling socket, respectively, to form a detachable interlocked connection assembly.

  16. Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor

    DTIC Science & Technology

    2013-08-01

    system (OS). HyperCheck leverages the CPU System Management Mode ( SMM ), present in x86 systems, to securely generate and transmit the full state of the...HyperCheck harnesses the CPU System Management Mode ( SMM ) which is present in all x86 commodity systems to create a snapshot view of the current state of the...protect the software above it. Our assumptions are that the attacker does not have physical access to the machine and that the SMM BIOS is locked and

  17. Intramedullary fixation of forearm fractures with new locked nail.

    PubMed

    Bansal, Himanshu

    2011-09-01

    Lack of availability of interlocked nails made plate osteosynthesis the first choice of treatment of forearm fractures inspite of more surgical exposure, periosteal stripping and big skin incision subsequent scar along with higher risk of refracture on implant removal. We hereby report the first 12 cases with 19 forearm bone fractures internally fixed by indegenous interlocked nail. Existing square nails were modified to have a broad proximal end of 5.5 mm with a hole for locking screw of 2.5 mm. The nail has a distal hole of 1/1.2/1.5 mm in 2.5/3/3.5 mm diameter nail, respectively. A new method of distal locking with a clip made of k wire is designed. The clip after insertion into the bone and hole in nail and opposite cortex snuggly fits the bone providing a secure locking system. Twelve skeletally mature patients, mean age 32 years (range 24-45 years) with 19 diaphyseal fractures of the forearm were treated with this indigenously made new nail. The patient were evaluated for fracture union, functional recovery and complications. The functional outcome was assessed by disabilities of arm, shoulder and hand questionnaire (DASH score). Time to radiographic union ranged between 12 and 28 weeks, with a 100% union rate. Complications were minimal, with mild infection in open fracture (n=1) and delayed union (n=1) in patient with comminuted fracture of the ulna only. The clinical results were excellent. The DASH score ranged between 0 and 36 points. This new interlocking nail may be considered as an alternative to plate osteosynthesis for fractures of the forearm in adults. The advantages are benefit of closed reduction, smaller residual scar, reduced cost and early union with allowance of immediate movements.

  18. Loose-Lipped Mobile Device Intelligent Personal Assistants: A Discussion of Information Gleaned from Siri on Locked iOS Devices.

    PubMed

    Horsman, Graeme

    2018-04-23

    The forensic analysis of mobile handsets is becoming a more prominent factor in many criminal investigations. Despite such devices frequently storing relevant evidential content to support an investigation, accessing this information is becoming an increasingly difficult task due to enhanced effective security features. Where access to a device's resident data is not possible via traditional mobile forensic methods, in some cases it may still be possible to extract user information via queries made to an installed intelligent personal assistant. This article presents an evaluation of the information which is retrievable from Apple's Siri when interacted with on a locked iOS device running iOS 11.2.5 (the latest at the time of testing). The testing of verbal commands designed to elicit a response from Siri demonstrate the ability to recover call log, SMS, Contacts, Apple Maps, Calendar, and device information which may support any further investigation. © 2018 American Academy of Forensic Sciences.

  19. Extender for securing a closure

    DOEpatents

    Thomas, II, Patrick A.

    2012-10-02

    An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

  20. 13. VIEW OF FIRST FLOOR, LOOKING NORTHWEST. AT LEFT IS ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    13. VIEW OF FIRST FLOOR, LOOKING NORTHWEST. AT LEFT IS A 'EUREKA O.K.' BAGGING SCALE (S. Howe Co., Silver Creek, New York). THE SUSPENSION-TYPE HOPPER SCALE WEIGHS BULK FEED AS IT DESCENDS INTO A BAG SECURED BY THE RING AT THE BASE OF THE SCALE. AT RIGHT, FINISHED PRODUCTS ARE READY FOR SALE. AT CENTER REAR IS ONE OF THE MILL'S TWO VERTICAL TWIN-SPIRAL MIXERS. Photographer: Jet T. Lowe, 1985 - Alexander's Grist Mill, Lock 37 on Ohio & Erie Canal, South of Cleveland, Valley View, Cuyahoga County, OH

  1. Seismic explosive charge loader and anchor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mcreynolds, O.B.

    1981-07-14

    An improved seismic explosive charge loader and anchor for loading and anchoring explosives in cylindrical containers in bore holes is disclosed, which includes a snap in spring band shaped anchor which effectively anchors the loader in the well bore against upward movement, one aspect of the invention includes a snap lock threaded connection for securing an explosive container having interrupted threads to the loader and anchor, and the loader and anchor is constructed and arranged to maintain a detonator in place in the explosive container thereby assuring detonation of the explosive.

  2. Secure Distributed Processing Systems: Quarterly Technical Reports, 1 July 1977 - 30 April 1978

    DTIC Science & Technology

    1978-06-01

    choice does not assure that the network is encrypted. Thus, process - process encryption seems to be the highest safe choice . The details of the...site, except for the one where the LC is located, there is a local l°ck^f^16^ n r Those processes are responsible for ia^tainlnTa ?ocal copy of the...ed into the LOCK table at every site in a subsequent phase of the recovery process In ^nmary, the LOR B«ohanlsm amounts to electing a neH LC for

  3. Advanced fingerprint verification software

    NASA Astrophysics Data System (ADS)

    Baradarani, A.; Taylor, J. R. B.; Severin, F.; Maev, R. Gr.

    2016-05-01

    We have developed a fingerprint software package that can be used in a wide range of applications from law enforcement to public and private security systems, and to personal devices such as laptops, vehicles, and door- locks. The software and processing units are a unique implementation of new and sophisticated algorithms that compete with the current best systems in the world. Development of the software package has been in line with the third generation of our ultrasonic fingerprinting machine1. Solid and robust performance is achieved in the presence of misplaced and low quality fingerprints.

  4. Polyethylene wear debris in modular acetabular prostheses.

    PubMed

    Chen, P C; Mead, E H; Pinto, J G; Colwell, C W

    1995-08-01

    The longevity of total hip arthroplasty has brought forth the recognition of aseptic loosening of prosthetic components as the leading cause of implant failure. Modularity of implants, although a significant improvement in versatility, may increase debris formation, a recognized cause of implant failure. This study was designed to measure the relative motion, and to assess the polyethylene wear debris production at the interface between the metal acetabular shell and the back side of the polyethylene liner, in modular hip prostheses. Five models from 4 manufacturers with different locking mechanisms and acetabular shell surface treatments were tested under long-term simultaneous sinusoidal and static loading (10(7) cycles at 3 Hz with +/- 2.5 Nmeter and 220 N static load). Results showed that there were marked differences in the security of the acetabular shell and polyethylene liner locking mechanism, wear pattern, damage sites, and amount of polyethylene debris on the acetabular shell and polyethylene liner surfaces. The range of polyethylene liner motion observed among the 5 models during 1 cycle of testing varied from an average of 0.96 degrees to movement too small to be detected by the test machines. Image and scanning electron microscopy analysis showed different wear patterns and a wide range in the average polyethylene liner surface wear area (0.26 cm2-4.61 cm2). In general, a stable locking mechanism and a smooth acetabular shell surface are essential in minimizing polyethylene liner wear and polyethylene debris production.

  5. Apparatus for remotely handling components

    DOEpatents

    Szkrybalo, Gregory A.; Griffin, Donald L.

    1994-01-01

    The inventive apparatus for remotely handling bar-like components which define a longitudinal direction includes a gripper mechanism for gripping the component including first and second gripper members longitudinally fixedly spaced from each other and oriented parallel to each other in planes transverse to the longitudinal direction. Each gripper member includes a jaw having at least one V-groove with opposing surfaces intersecting at a base and extending radially relative to the longitudinal direction for receiving the component in an open end between the opposing surfaces. The V-grooves on the jaw plate of the first and second gripper members are aligned in the longitudinal direction to support the component in the first and second gripper members. A jaw is rotatably mounted on and a part of each of the first and second gripper members for selectively assuming a retracted mode in which the open end of the V-groove is unobstructed and active mode in which the jaw spans the open end of the V-groove in the first and second gripper members. The jaw has a locking surface for contacting the component in the active mode to secure the component between the locking surface of the jaw and the opposing surfaces of the V-groove. The locking surface has a plurality of stepped portions, each defining a progressively decreasing radial distance between the base of the V-groove and the stepped portion opposing the base to accommodate varying sizes of components.

  6. Fast and slowly evolving vector solitons in mode-locked fibre lasers.

    PubMed

    Sergeyev, Sergey V

    2014-10-28

    We report on a new vector model of an erbium-doped fibre laser mode locked with carbon nanotubes. This model goes beyond the limitations of the previously used models based on either coupled nonlinear Schrödinger or Ginzburg-Landau equations. Unlike the previous models, it accounts for the vector nature of the interaction between an optical field and an erbium-doped active medium, slow relaxation dynamics of erbium ions, linear birefringence in a fibre, linear and circular birefringence of a laser cavity caused by in-cavity polarization controller and light-induced anisotropy caused by elliptically polarized pump field. Interplay of aforementioned factors changes coherent coupling of two polarization modes at a long time scale and so results in a new family of vector solitons (VSs) with fast and slowly evolving states of polarization. The observed VSs can be of interest in secure communications, trapping and manipulation of atoms and nanoparticles, control of magnetization in data storage devices and many other areas. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  7. A Resettable Keypad Lock with Visible Readout Based on Closed Bipolar Electrochemistry and Electrochromic Poly(3-methylthiophene) Films.

    PubMed

    Wang, Lei; Lian, Wenjing; Liu, Hongyun

    2016-03-24

    A closed bipolar electrode (BPE) system was developed with electrochromic poly(3-methylthiophene) (PMT) films electropolymerized on the ITO/rGO electrode as one pole of BPE in the reporting reservoir and the bare ITO electrode as another pole of BPE in the analyte reservoir, in which rGO represents reduced graphene oxide. Under a suitable driving voltage (Vtot), the electrochemical reduction/oxidation of electroactive probes, such as H2O2/glutathione (Glu), in the analyte reservoir could induce the reversible color change of PMT films in the reporting reservoir between blue and red. Based on this, a keypad lock with H2O2 , Glu, and Vtot =-3.0 V as the three inputs and the color change of PMT films as the visible output was established. This system was easily operated and did not need to synthesize the complex compounds or DNA molecules. The security system was easy to reset and could be used repeatedly. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Are participants concerned about privacy and security when using short message service to report product adherence in a rectal microbicide trial?

    PubMed

    Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex

    2018-04-01

    During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.

  9. Single-pixel computational ghost imaging with helicity-dependent metasurface hologram.

    PubMed

    Liu, Hong-Chao; Yang, Biao; Guo, Qinghua; Shi, Jinhui; Guan, Chunying; Zheng, Guoxing; Mühlenbernd, Holger; Li, Guixin; Zentgraf, Thomas; Zhang, Shuang

    2017-09-01

    Different optical imaging techniques are based on different characteristics of light. By controlling the abrupt phase discontinuities with different polarized incident light, a metasurface can host a phase-only and helicity-dependent hologram. In contrast, ghost imaging (GI) is an indirect imaging modality to retrieve the object information from the correlation of the light intensity fluctuations. We report single-pixel computational GI with a high-efficiency reflective metasurface in both simulations and experiments. Playing a fascinating role in switching the GI target with different polarized light, the metasurface hologram generates helicity-dependent reconstructed ghost images and successfully introduces an additional security lock in a proposed optical encryption scheme based on the GI. The robustness of our encryption scheme is further verified with the vulnerability test. Building the first bridge between the metasurface hologram and the GI, our work paves the way to integrate their applications in the fields of optical communications, imaging technology, and security.

  10. Single-pixel computational ghost imaging with helicity-dependent metasurface hologram

    PubMed Central

    Liu, Hong-Chao; Yang, Biao; Guo, Qinghua; Shi, Jinhui; Guan, Chunying; Zheng, Guoxing; Mühlenbernd, Holger; Li, Guixin; Zentgraf, Thomas; Zhang, Shuang

    2017-01-01

    Different optical imaging techniques are based on different characteristics of light. By controlling the abrupt phase discontinuities with different polarized incident light, a metasurface can host a phase-only and helicity-dependent hologram. In contrast, ghost imaging (GI) is an indirect imaging modality to retrieve the object information from the correlation of the light intensity fluctuations. We report single-pixel computational GI with a high-efficiency reflective metasurface in both simulations and experiments. Playing a fascinating role in switching the GI target with different polarized light, the metasurface hologram generates helicity-dependent reconstructed ghost images and successfully introduces an additional security lock in a proposed optical encryption scheme based on the GI. The robustness of our encryption scheme is further verified with the vulnerability test. Building the first bridge between the metasurface hologram and the GI, our work paves the way to integrate their applications in the fields of optical communications, imaging technology, and security. PMID:28913433

  11. Optical authentication based on moiré effect of nonlinear gratings in phase space

    NASA Astrophysics Data System (ADS)

    Liao, Meihua; He, Wenqi; Wu, Jiachen; Lu, Dajiang; Liu, Xiaoli; Peng, Xiang

    2015-12-01

    An optical authentication scheme based on the moiré effect of nonlinear gratings in phase space is proposed. According to the phase function relationship of the moiré effect in phase space, an arbitrary authentication image can be encoded into two nonlinear gratings which serve as the authentication lock (AL) and the authentication key (AK). The AL is stored in the authentication system while the AK is assigned to the authorized user. The authentication procedure can be performed using an optoelectronic approach, while the design process is accomplished by a digital approach. Furthermore, this optical authentication scheme can be extended for multiple users with different security levels. The proposed scheme can not only verify the legality of a user identity, but can also discriminate and control the security levels of legal users. Theoretical analysis and simulation experiments are provided to verify the feasibility and effectiveness of the proposed scheme.

  12. Magnetic induction tomography of objects for security applications

    NASA Astrophysics Data System (ADS)

    Ward, Rob; Joseph, Max; Langley, Abbi; Taylor, Stuart; Watson, Joe C.

    2017-10-01

    A coil array imaging system has been further developed from previous investigations, focusing on designing its application for fast screening of small bags or parcels, with a view to the production of a compact instrument for security applications. In addition to reducing image acquisition times, work was directed toward exploring potential cost effective manufacturing routes. Based on magnetic induction tomography and eddy-current principles, the instrument captured images of conductive targets using a lock-in amplifier, individually multiplexing signals between a primary driver coil and a 20 by 21 imaging array of secondary passive coils constructed using a reproducible multiple tile design. The design was based on additive manufacturing techniques and provided 2 orthogonal imaging planes with an ability to reconstruct images in less than 10 seconds. An assessment of one of the imaging planes is presented. This technique potentially provides a cost effective threat evaluation technique that may compliment conventional radiographic approaches.

  13. Stable operation of a Secure QKD system in the real-world setting

    NASA Astrophysics Data System (ADS)

    Tomita, Akihisa

    2007-06-01

    Quantum Key Distribution (QKD) now steps forward from the proof of principle to the validation of the practical feasibility. Nevertheless, the QKD technology should respond to the challenges from the real-world such as stable operation against the fluctuating environment, and security proof under the practical setting. We report our recent progress on stable operation of a QKD system, and key generation with security assurance. A QKD system should robust to temperature fluctuation in a common office environment. We developed a loop-mirror, a substitution of a Faraday mirror, to allow easy compensation for the temperature dependence of the device. Phase locking technique was also employed to synchronize the system clock to the quantum signals. This technique is indispensable for the transmission system based on the installed fiber cables, which stretch and shrink due to the temperature change. The security proof of QKD, however, has assumed the ideal conditions, such as the use of a genuine single photon source and/or unlimited computational resources. It has been highly desirable to give an assurance of security for practical systems, where the ideal conditions are no longer satisfied. We have constructed a theory to estimate the leakage information on the transmitted key under the practically attainable conditions, and have developed a QKD system equipped with software for secure key distillation. The QKD system generates the final key at the rate of 2000 bps after 20 km fiber transmission. Eavesdropper's information on the final key is guaranteed to be less than 2-7 per bit. This is the first successful generation of the secure key with quantitative assurance of the upper bound of the leakage information. It will put forth the realization of highly secure metropolitan optical communication network against any types of eavesdropping.

  14. Multi-channel photon counting DOT system based on digital lock-in detection technique

    NASA Astrophysics Data System (ADS)

    Wang, Tingting; Zhao, Huijuan; Wang, Zhichao; Hou, Shaohua; Gao, Feng

    2011-02-01

    Relying on deeper penetration of light in the tissue, Diffuse Optical Tomography (DOT) achieves organ-level tomography diagnosis, which can provide information on anatomical and physiological features. DOT has been widely used in imaging of breast, neonatal cerebral oxygen status and blood oxygen kinetics observed by its non-invasive, security and other advantages. Continuous wave DOT image reconstruction algorithms need the measurement of the surface distribution of the output photon flow inspired by more than one driving source, which means that source coding is necessary. The most currently used source coding in DOT is time-division multiplexing (TDM) technology, which utilizes the optical switch to switch light into optical fiber of different locations. However, in case of large amounts of the source locations or using the multi-wavelength, the measurement time with TDM and the measurement interval between different locations within the same measurement period will therefore become too long to capture the dynamic changes in real-time. In this paper, a frequency division multiplexing source coding technology is developed, which uses light sources modulated by sine waves with different frequencies incident to the imaging chamber simultaneously. Signal corresponding to an individual source is obtained from the mixed output light using digital phase-locked detection technology at the detection end. A digital lock-in detection circuit for photon counting measurement system is implemented on a FPGA development platform. A dual-channel DOT photon counting experimental system is preliminary established, including the two continuous lasers, photon counting detectors, digital lock-in detection control circuit, and codes to control the hardware and display the results. A series of experimental measurements are taken to validate the feasibility of the system. This method developed in this paper greatly accelerates the DOT system measurement, and can also obtain the multiple measurements in different source-detector locations.

  15. 49 CFR 236.337 - Locking faces of mechanical locking; fit.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Locking faces of mechanical locking; fit. 236.337... Rules and Instructions § 236.337 Locking faces of mechanical locking; fit. Locking faces shall fit... face. ...

  16. 49 CFR 236.337 - Locking faces of mechanical locking; fit.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Locking faces of mechanical locking; fit. 236.337... Rules and Instructions § 236.337 Locking faces of mechanical locking; fit. Locking faces shall fit... face. ...

  17. 49 CFR 236.337 - Locking faces of mechanical locking; fit.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Locking faces of mechanical locking; fit. 236.337... Rules and Instructions § 236.337 Locking faces of mechanical locking; fit. Locking faces shall fit... face. ...

  18. 49 CFR 236.337 - Locking faces of mechanical locking; fit.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Locking faces of mechanical locking; fit. 236.337... Rules and Instructions § 236.337 Locking faces of mechanical locking; fit. Locking faces shall fit... face. ...

  19. 49 CFR 236.330 - Locking dog of switch-and-lock movement.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Locking dog of switch-and-lock movement. 236.330 Section 236.330 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... Rules and Instructions § 236.330 Locking dog of switch-and-lock movement. Locking dog of switch-and-lock...

  20. 49 CFR 236.330 - Locking dog of switch-and-lock movement.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Locking dog of switch-and-lock movement. 236.330 Section 236.330 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... Rules and Instructions § 236.330 Locking dog of switch-and-lock movement. Locking dog of switch-and-lock...

  1. 49 CFR 236.330 - Locking dog of switch-and-lock movement.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Locking dog of switch-and-lock movement. 236.330 Section 236.330 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... Rules and Instructions § 236.330 Locking dog of switch-and-lock movement. Locking dog of switch-and-lock...

  2. 49 CFR 236.330 - Locking dog of switch-and-lock movement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Locking dog of switch-and-lock movement. 236.330 Section 236.330 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... Rules and Instructions § 236.330 Locking dog of switch-and-lock movement. Locking dog of switch-and-lock...

  3. 49 CFR 236.330 - Locking dog of switch-and-lock movement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking dog of switch-and-lock movement. 236.330 Section 236.330 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... Rules and Instructions § 236.330 Locking dog of switch-and-lock movement. Locking dog of switch-and-lock...

  4. Fiber lasers and their applications [Invited].

    PubMed

    Shi, Wei; Fang, Qiang; Zhu, Xiushan; Norwood, R A; Peyghambarian, N

    2014-10-01

    Fiber lasers have seen progressive developments in terms of spectral coverage and linewidth, output power, pulse energy, and ultrashort pulse width since the first demonstration of a glass fiber laser in 1964. Their applications have extended into a variety of fields accordingly. In this paper, the milestones of glass fiber laser development are briefly reviewed and recent advances of high-power continuous wave, Q-switched, mode-locked, and single-frequency fiber lasers in the 1, 1.5, 2, and 3 μm regions and their applications in such areas as industry, medicine, research, defense, and security are addressed in detail.

  5. Visibility-Based Hypothesis Testing Using Higher-Order Optical Interference

    NASA Astrophysics Data System (ADS)

    Jachura, Michał; Jarzyna, Marcin; Lipka, Michał; Wasilewski, Wojciech; Banaszek, Konrad

    2018-03-01

    Many quantum information protocols rely on optical interference to compare data sets with efficiency or security unattainable by classical means. Standard implementations exploit first-order coherence between signals whose preparation requires a shared phase reference. Here, we analyze and experimentally demonstrate the binary discrimination of visibility hypotheses based on higher-order interference for optical signals with a random relative phase. This provides a robust protocol implementation primitive when a phase lock is unavailable or impractical. With the primitive cost quantified by the total detected optical energy, optimal operation is typically reached in the few-photon regime.

  6. 41. LOCK AND DAM NO. 26 (REPLACEMENT). LOCK LOCK ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    41. LOCK AND DAM NO. 26 (REPLACEMENT). LOCK -- LOCK GATES -- LIFT GATE, GATE LEAVES -- GENERAL ASSEMBLY. M-L 26(R) 21/28 - Upper Mississippi River 9-Foot Channel Project, Lock & Dam 26R, Alton, Madison County, IL

  7. 49 CFR 236.766 - Locking, movable bridge.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Locking, movable bridge. 236.766 Section 236.766... Locking, movable bridge. The rail locks, bridge locks, bolt locks, circuit controllers, and electric locks used in providing interlocking protection at a movable bridge. ...

  8. 49 CFR 236.766 - Locking, movable bridge.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking, movable bridge. 236.766 Section 236.766... Locking, movable bridge. The rail locks, bridge locks, bolt locks, circuit controllers, and electric locks used in providing interlocking protection at a movable bridge. ...

  9. 49 CFR 236.306 - Facing point lock or switch-and-lock movement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Facing point lock or switch-and-lock movement. 236... Interlocking Standards § 236.306 Facing point lock or switch-and-lock movement. Facing point lock or switch-and-lock movement shall be provided for mechanically operated switch, movable-point frog, or split-point...

  10. 49 CFR 236.306 - Facing point lock or switch-and-lock movement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Facing point lock or switch-and-lock movement. 236... Interlocking Standards § 236.306 Facing point lock or switch-and-lock movement. Facing point lock or switch-and-lock movement shall be provided for mechanically operated switch, movable-point frog, or split-point...

  11. 49 CFR 236.306 - Facing point lock or switch-and-lock movement.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Facing point lock or switch-and-lock movement. 236... Interlocking Standards § 236.306 Facing point lock or switch-and-lock movement. Facing point lock or switch-and-lock movement shall be provided for mechanically operated switch, movable-point frog, or split-point...

  12. 49 CFR 236.306 - Facing point lock or switch-and-lock movement.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Facing point lock or switch-and-lock movement. 236... Interlocking Standards § 236.306 Facing point lock or switch-and-lock movement. Facing point lock or switch-and-lock movement shall be provided for mechanically operated switch, movable-point frog, or split-point...

  13. 49 CFR 236.306 - Facing point lock or switch-and-lock movement.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Facing point lock or switch-and-lock movement. 236... Interlocking Standards § 236.306 Facing point lock or switch-and-lock movement. Facing point lock or switch-and-lock movement shall be provided for mechanically operated switch, movable-point frog, or split-point...

  14. Nuclear reactor fuel assembly duct-tube-to-handling-socket attachment system

    DOEpatents

    Christiansen, David W.; Smith, Bob G.

    1982-01-01

    A reusable system for removably attaching the upper end 10of a nuclear reactor duct tube to the lower end 30 of a nuclear reactor fuel assembly handling socket. A transition ring 20, fixed to the duct tube's upper end 10, has an interior-threaded section 22 with a first locking hole segment 24. An adaptor ring 40, fixed to the handling socket's lower end 30 has an outside-threaded section 42 with a second locking hole segment 44. The inside 22 and outside 42 threaded sections match and can be joined so that the first 24 and second 44 locking hole segments can be aligned to form a locking hole. A locking ring 50, with a locking pin 52, slides over the adaptor ring 40 so that the locking pin 52 fits in the locking hole. A swage lock 60 or a cantilever finger lock 70 is formed from the locking cup collar 26 to fit in a matching groove 54 or 56 in the locking ring 50 to prevent the locking ring's locking pin 52 from backing out of the locking hole.

  15. 49 CFR 236.337 - Locking faces of mechanical locking; fit.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking faces of mechanical locking; fit. 236.337 Section 236.337 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... Rules and Instructions § 236.337 Locking faces of mechanical locking; fit. Locking faces shall fit...

  16. 12. LOCK GATES AT THE SWAMP LOCKS, SEPARATING THE UPPER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. LOCK GATES AT THE SWAMP LOCKS, SEPARATING THE UPPER AND LOWER LOCK CHAMBERS, SHOWING PADDLE VALVES, LOOKING WEST: 1976 - Pawtucket Canal, Swamp Locks, Pawtucket & Merrimack Canals, Lowell, Middlesex County, MA

  17. Circuit breaker lockout device

    DOEpatents

    Kozlowski, Lawrence J.; Shirey, Lawrence A.

    1992-01-01

    An improved lockout assembly for locking a circuit breaker in a selected off or on position is provided. The lockout assembly includes a lock block and a lock pin. The lock block has a hollow interior which fits over the free end of a switch handle of the circuit breaker. The lock block includes at least one hole that is placed in registration with a hole in the free end of the switch handle. A lock tab on the lock block serves to align and register the respective holes on the lock block and switch handle. A lock pin is inserted through the registered holes and serves to connect the lock block to the switch handle. Once the lock block and the switch handle are connected, the position of the switch handle is prevented from being changed by the lock tab bumping up against a stationary housing portion of the circuit breaker. When the lock pin installed, an apertured-end portion of the lock pin is in registration with another hole on the lock block. Then a special scissors conforming to O.S.H.A. regulations can be installed, with one or more padlocks, on the lockout assembly to prevent removal of the lock pin from the lockout assembly, thereby preventing removal of the lockout assembly from the circuit breaker.

  18. Circuit breaker lockout device

    DOEpatents

    Kozlowski, L.J.; Shirey, L.A.

    1992-11-24

    An improved lockout assembly for locking a circuit breaker in a selected off or on position is provided. The lockout assembly includes a lock block and a lock pin. The lock block has a hollow interior which fits over the free end of a switch handle of the circuit breaker. The lock block includes at least one hole that is placed in registration with a hole in the free end of the switch handle. A lock tab on the lock block serves to align and register the respective holes on the lock block and switch handle. A lock pin is inserted through the registered holes and serves to connect the lock block to the switch handle. Once the lock block and the switch handle are connected, the position of the switch handle is prevented from being changed by the lock tab bumping up against a stationary housing portion of the circuit breaker. When the lock pin installed, an apertured-end portion of the lock pin is in registration with another hole on the lock block. Then a special scissors conforming to O.S.H.A. regulations can be installed, with one or more padlocks, on the lockout assembly to prevent removal of the lock pin from the lockout assembly, thereby preventing removal of the lockout assembly from the circuit breaker. 2 figs.

  19. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    NASA Astrophysics Data System (ADS)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  20. 42.8 Gb/s ASK homodyne receiver using standard DFB lasers

    NASA Astrophysics Data System (ADS)

    Becker, D.; Mohr, D.; Datta, S.; Wree, C.; Bhandare, S.; Joshi, A.

    2009-05-01

    Optical synchronous coherent detection is attracting greater attention within the defense and security community because it allows linear recovery both of the amplitude and phase of optical signals. Fiber-based transmission impairments such as chromatic dispersion and polarization mode dispersion can be compensated in the electrical domain. Additionally, synchronous detection offers the potential of improved receiver sensitivity and extended reach versus direct or interferometric detection schemes. 28 Gbaud/112 Gb/s and 42.8 Gbaud transmissions are now being considered in fiber networks worldwide. Due to the lack of broadband high frequency components centered at IF values of 56 GHz and 86 GHz, respectively, the coherent heterodyne approach is not viable for these baud rates. The homodyne approach remains one of the choices available to fully exploit the advantages of synchronous coherent detection at these transmission data rates. In order to implement the homodyne receiver, optical phase locking between the signal and local oscillator laser (LO) is required. Digital approaches for this task rely upon very complex, fast, and high power-consumption chips. A homodyne receiver using an analog approach for phase locking would allow for increased system simplicity at a lower cost. Use of commercial-off-the-shelf (COTS) DFB lasers embedded within the receiver would also increase system feasibility for defense applications. We demonstrate synchronous demodulation of a 42.8 Gbaud signal using an analog optical phase-locked loop. The homodyne system was optimized to use COTS DFB lasers having an aggregate linewidth of ~2 MHz. We also analyze the impact of uncompensated phase noise on receiver performance.

  1. [Distal clavicle fracture].

    PubMed

    Seppel, G; Lenich, A; Imhoff, A B

    2014-06-01

    Reposition and fixation of unstable distal clavicle fractures with a low profile locking plate (Acumed, Hempshire, UK) in conjunction with a button/suture augmentation cerclage (DogBone/FibreTape, Arthrex, Naples, FL, USA). Unstable fractures of the distal clavicle (Jäger and Breitner IIA) in adults. Unstable fractures of the distal clavicle (Jäger and Breitner IV) in children. Distal clavicle fractures (Jäger and Breitner I, IIB or III) with marked dislocation, injury of nerves and vessels, or high functional demand. Patients in poor general condition. Fractures of the distal clavicle (Jäger and Breitner I, IIB or III) without marked dislocation or vertical instability. Local soft-tissue infection. Combination procedure: Initially the lateral part of the clavicle is exposed by a 4 cm skin incision. After reduction of the fracture, stabilization is performed with a low profile locking distal clavicle plate. Using a special guiding device, a transclavicular-transcoracoidal hole is drilled under arthroscopic view. Additional vertical stabilization is arthroscopically achieved by shuttling the DogBone/FibreTape cerclage from the lateral portal cranially through the clavicular plate. The two ends of the FibreTape cerclage are brought cranially via adjacent holes of the locking plate while the DogBone button is placed under the coracoid process. Thus, plate bridging is achieved. Finally reduction is performed and the cerclage is secured by surgical knotting. Use of an arm sling for 6 weeks. Due to the fact that the described technique is a relatively new procedure, long-term results are lacking. In the short term, patients postoperatively report high subjective satisfaction without persistent pain.

  2. 4. LOOKING NORTHEAST TOWARDS LOCKS. 19TH CENTURY GRAVITY LOCKS ON ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    4. LOOKING NORTHEAST TOWARDS LOCKS. 19TH CENTURY GRAVITY LOCKS ON RIGHT. 20TH CENTURY ELECTRIC LIFT LOCKS ON LEFT. - New York State Barge Canal, Lockport Locks, Richmond Avenue, Lockport, Niagara County, NY

  3. KSC-05PD-1265

    NASA Technical Reports Server (NTRS)

    2005-01-01

    KENNEDY SPACE CENTER, FLA. This locker reveals a long-lost spacesuit recently uncovered at the Cape Canaveral Air Force Station (CCAFS) in Florida. A recent venture into a long-locked room at CCAFS uncovered interesting artifacts of a bygone era: retired space suits from Americans who trained in the 1960s to be astronauts aboard an Air Force orbiting reconnaissance laboratory. Two security officers were doing a check of a facility at Launch Complex 5/6 blockhouse. NASA Special Agent Dan E. Oakland and Security Manager Henry Butler, who is with Delaware North Parks and Resorts, the company that oversees the museum, discovered a locked room. Space suits from the Air Forces planned Manned Orbiting Laboratory (MOL) program were found in the room Begun in 1964, the MOL program was an Air Force initiative that would have sent Air Force astronauts to a space station in a Gemini capsule. After spending a few weeks in orbit, the crew would undock and return to Earth. A test launch from Complex 40 on Nov. 30, 1966, of a MOL was conducted with an unmanned Gemini capsule. The MOL was constructed from tankage of a Titan II rocket. The operational MOL was planned to be launched into a polar orbit from Vandenberg Air Force Base in California. The Air Force abandoned the program in 1969, but the program produced a great deal of technological development, and three groups of military officers trained to be MOL astronauts. When the program was cancelled, seven of the younger astronauts were transferred to the agencys human space flight program and went on to have standout careers. Among them were Robert Crippen, pilot of the first Space Shuttle mission, and Richard H. 'Dick' Truly, who later became NASA Administrator.

  4. KSC-05PD-1267

    NASA Technical Reports Server (NTRS)

    2005-01-01

    KENNEDY SPACE CENTER, FLA. This is Launch Complex 5/6 blockhouse, now a museum at the Cape Canaveral Air Force Station (CCAFS) in Florida, where long-lost space suits were found. A recent venture into a long-locked room at CCAFS uncovered interesting artifacts of a bygone era: retired space suits from Americans who trained in the 1960s to be astronauts aboard an Air Force orbiting reconnaissance laboratory. Two security officers were doing a check of a facility at Launch Complex 5/6 blockhouse. NASA Special Agent Dan E. Oakland and Security Manager Henry Butler, who is with Delaware North Parks and Resorts, the company that oversees the museum, discovered a locked room. Space suits from the Air Forces planned Manned Orbiting Laboratory (MOL) program were found in the room Begun in 1964, the MOL program was an Air Force initiative that would have sent Air Force astronauts to a space station in a Gemini capsule. After spending a few weeks in orbit, the crew would undock and return to Earth. A test launch from Complex 40 on Nov. 30, 1966, of a MOL was conducted with an unmanned Gemini capsule. The MOL was constructed from tankage of a Titan II rocket. The operational MOL was planned to be launched into a polar orbit from Vandenberg Air Force Base in California. The Air Force abandoned the program in 1969, but the program produced a great deal of technological development, and three groups of military officers trained to be MOL astronauts. When the program was cancelled, seven of the younger astronauts were transferred to the agencys human space flight program and went on to have standout careers. Among them were Robert Crippen, pilot of the first Space Shuttle mission, and Richard H. 'Dick' Truly, who later became NASA Administrator.

  5. KSC-05PD-1266

    NASA Technical Reports Server (NTRS)

    2005-01-01

    KENNEDY SPACE CENTER, FLA. NASA Special Agent Dan Oakland holds up a long-lost spacesuit recently uncovered at the Cape Canaveral Air Force Station (CCAFS) in Florida. A recent venture into a long-locked room at CCAFS uncovered interesting artifacts of a by-gone era: retired space suits from Americans who trained in the 1960s to be astronauts aboard an Air Force orbiting reconnaissance laboratory. Two security officers were doing a check of a facility at Launch Complex 5/6 blockhouse. Oakland and Security Manager Henry Butler, who is with Delaware North Parks and Resorts, the company that oversees the museum, discovered a locked room. Space suits from the Air Forces planned Manned Orbiting Laboratory (MOL) program were found in the room Begun in 1964, the MOL program was an Air Force initiative that would have sent Air Force astronauts to a space station in a Gemini capsule. After spending a few weeks in orbit, the crew would undock and return to Earth. A test launch from Complex 40 on Nov. 30, 1966, of a MOL was conducted with an unmanned Gemini capsule. The MOL was constructed from tankage of a Titan II rocket. The operational MOL was planned to be launched into a polar orbit from Vandenberg Air Force Base in California. The Air Force abandoned the program in 1969, but the program produced a great deal of technological development, and three groups of military officers trained to be MOL astronauts. When the program was cancelled, seven of the younger astronauts were transferred to the agencys human space flight program and went on to have standout careers. Among them were Robert Crippen, pilot of the first Space Shuttle mission, and Richard H. 'Dick' Truly, who later became NASA Administrator.

  6. KSC-05PD-1274

    NASA Technical Reports Server (NTRS)

    2005-01-01

    KENNEDY SPACE CENTER, FLA. This is Launch Complex 5/6 blockhouse, now a museum at the Cape Canaveral Air Force Station (CCAFS) in Florida, where long-lost spacesuits were found. A recent venture into a long-locked room at CCAFS uncovered interesting artifacts of a bygone era: retired space suits from Americans who trained in the 1960s to be astronauts aboard an Air Force orbiting reconnaissance laboratory. Two security officers were doing a check of a facility at Launch Complex 5/6 blockhouse. NASA Special Agent Dan E. Oakland and Security Manager Henry Butler, with Delaware North Parks and Resorts, which oversees the museum, discovered a locked room. Space suits from the Air Forces planned Manned Orbiting Laboratory (MOL) program were found in the room Begun in 1964, the MOL program was an Air Force initiative that would have sent Air Force astronauts to a space station in a Gemini capsule. After spending a few weeks in orbit, the crew would undock and return to Earth. A test launch from Complex 40 on Nov. 30, 1966, of a MOL was conducted with an unmanned Gemini capsule. The MOL was constructed from tankage of a Titan II rocket. The operational MOL was planned to be launched into a polar orbit from Vandenberg Air Force Base in California. The Air Force abandoned the program in 1969, but the program produced a great deal of technological development, and three groups of military officers trained to be MOL astronauts. When the program was cancelled, seven of the younger astronauts were transferred to the agencys human space flight program and went on to have standout careers. Among them were Robert Crippen, pilot of the first Space Shuttle mission, and Richard H. 'Dick' Truly, who later became NASA Administrator.

  7. 49 CFR 236.745 - Face, locking.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Face, locking. 236.745 Section 236.745 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Face, locking. The locking surface of a locking dog, tappet or cross locking of an interlocking machine. ...

  8. 49 CFR 236.745 - Face, locking.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Face, locking. 236.745 Section 236.745 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Face, locking. The locking surface of a locking dog, tappet or cross locking of an interlocking machine. ...

  9. 49 CFR 236.745 - Face, locking.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Face, locking. 236.745 Section 236.745 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Face, locking. The locking surface of a locking dog, tappet or cross locking of an interlocking machine. ...

  10. 49 CFR 236.745 - Face, locking.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Face, locking. 236.745 Section 236.745 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Face, locking. The locking surface of a locking dog, tappet or cross locking of an interlocking machine. ...

  11. 49 CFR 236.745 - Face, locking.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Face, locking. 236.745 Section 236.745 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Face, locking. The locking surface of a locking dog, tappet or cross locking of an interlocking machine. ...

  12. 35. INTERIOR VIEW OF THE GUARD LOCKS LOCK HOUSE: CLOSED ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    35. INTERIOR VIEW OF THE GUARD LOCKS LOCK HOUSE: CLOSED LOCK GATES AND TWO SETS OF MACHINERY TO ASSIST IN OPERATING THEM. VIEW FROM THE FAST END OF THE BUILDING LOOKING WEST 1976 - Pawtucket Canal, Guard Locks, Lowell, Middlesex County, MA

  13. 49 CFR 236.338 - Mechanical locking required in accordance with locking sheet and dog chart.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... locking sheet and dog chart. 236.338 Section 236.338 Transportation Other Regulations Relating to... in accordance with locking sheet and dog chart. Mechanical locking shall be in accordance with locking sheet and dog chart currently in effect. ...

  14. 49 CFR 236.338 - Mechanical locking required in accordance with locking sheet and dog chart.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... locking sheet and dog chart. 236.338 Section 236.338 Transportation Other Regulations Relating to... in accordance with locking sheet and dog chart. Mechanical locking shall be in accordance with locking sheet and dog chart currently in effect. ...

  15. 49 CFR 236.338 - Mechanical locking required in accordance with locking sheet and dog chart.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... locking sheet and dog chart. 236.338 Section 236.338 Transportation Other Regulations Relating to... in accordance with locking sheet and dog chart. Mechanical locking shall be in accordance with locking sheet and dog chart currently in effect. ...

  16. 49 CFR 236.338 - Mechanical locking required in accordance with locking sheet and dog chart.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... locking sheet and dog chart. 236.338 Section 236.338 Transportation Other Regulations Relating to... in accordance with locking sheet and dog chart. Mechanical locking shall be in accordance with locking sheet and dog chart currently in effect. ...

  17. 49 CFR 236.338 - Mechanical locking required in accordance with locking sheet and dog chart.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... locking sheet and dog chart. 236.338 Section 236.338 Transportation Other Regulations Relating to... in accordance with locking sheet and dog chart. Mechanical locking shall be in accordance with locking sheet and dog chart currently in effect. ...

  18. Frequency-Locked Detector Threshold Setting Criteria Based on Mean-Time-To-Lose-Lock (MTLL) for GPS Receivers

    PubMed Central

    Zhao, Na; Qin, Honglei; Sun, Kewen; Ji, Yuanfa

    2017-01-01

    Frequency-locked detector (FLD) has been widely utilized in tracking loops of Global Positioning System (GPS) receivers to indicate their locking status. The relation between FLD and lock status has been seldom discussed. The traditional PLL experience is not suitable for FLL. In this paper, the threshold setting criteria for frequency-locked detector in the GPS receiver has been proposed by analyzing statistical characteristic of FLD output. The approximate probability distribution of frequency-locked detector is theoretically derived by using a statistical approach, which reveals the relationship between probabilities of frequency-locked detector and the carrier-to-noise ratio (C/N0) of the received GPS signal. The relationship among mean-time-to-lose-lock (MTLL), detection threshold and lock probability related to C/N0 can be further discovered by utilizing this probability. Therefore, a theoretical basis for threshold setting criteria in frequency locked loops for GPS receivers is provided based on mean-time-to-lose-lock analysis. PMID:29207546

  19. Frequency-Locked Detector Threshold Setting Criteria Based on Mean-Time-To-Lose-Lock (MTLL) for GPS Receivers.

    PubMed

    Jin, Tian; Yuan, Heliang; Zhao, Na; Qin, Honglei; Sun, Kewen; Ji, Yuanfa

    2017-12-04

    Frequency-locked detector (FLD) has been widely utilized in tracking loops of Global Positioning System (GPS) receivers to indicate their locking status. The relation between FLD and lock status has been seldom discussed. The traditional PLL experience is not suitable for FLL. In this paper, the threshold setting criteria for frequency-locked detector in the GPS receiver has been proposed by analyzing statistical characteristic of FLD output. The approximate probability distribution of frequency-locked detector is theoretically derived by using a statistical approach, which reveals the relationship between probabilities of frequency-locked detector and the carrier-to-noise ratio ( C / N ₀) of the received GPS signal. The relationship among mean-time-to-lose-lock (MTLL), detection threshold and lock probability related to C / N ₀ can be further discovered by utilizing this probability. Therefore, a theoretical basis for threshold setting criteria in frequency locked loops for GPS receivers is provided based on mean-time-to-lose-lock analysis.

  20. Stuck in a job: being “locked-in” or at risk of becoming locked-in at the workplace and well-being over time

    PubMed Central

    Stengård, Johanna; Bernhard-Oettel, Claudia; Berntson, Erik; Leineweber, Constanze; Aronsson, Gunnar

    2016-01-01

    ABSTRACT In this study, being “locked-in” at the workplace is conceptualized as being in a non-preferred workplace while at the same time perceiving low employability. The aim of the study was to investigate how being locked-in or at risk of becoming locked-in (being in a non-preferred workplace yet currently satisfied, combined with perceiving low employability) relates to well-being (subjective health and depressive symptoms). The hypotheses were tested in a Swedish longitudinal sample (T1 in 2010 and T2 in 2012) of permanent employees (N = 3491). The results showed that stability with regard to locked-in-related status (being non-locked-in, at risk of becoming locked-in, or locked-in at both T1 and T2) was related to significant and stable differences in well-being. The non-locked-in status was associated with better well-being than being at risk of becoming locked-in. Moreover, those at risk of becoming locked-in showed better well-being than those with stable locked-in status. Changes towards non-locked-in were accompanied by significant improvements in well-being, and changes towards locked-in were associated with impairments in well-being. The relationships that were found could not be attributed to differences in demographic variables and occupational preference. The findings indicate that being locked-in is detrimental to well-being. This has implications for preventative interventions. PMID:27226678

  1. [Tibiotalocalcaneal arthrodesis using a retrograde nail locked in the sagittal plane].

    PubMed

    Veselý, R; Procházka, V; Visna, P; Valentová, J; Savolt, J

    2008-04-01

    To evaluate our experience with the use of a retrograde nail locked in the sagittal plane for tibiotalocalcaneal arthrodesis indicated in severe post-traumatic arthritis of the ankle. Twenty patients, 16 men and four women at an average age of 58.7 years (range, 23 to 72) were evaluated. All patients had severe post-traumatic changes in the talocrural and talocalcaneal joints. Five patients also had an equinus deformity. In two patients arthrodesis followed the treatment of purulent arthritis of the talocrural joint. A local fasciocutaneous flap was used for soft tissue reconstruction in three patients. All patients were operated on using the standard surgical technique. METHODS With the patient in a supine position, reamed by hand with the use of a driving rod, a straight retrograde AAN Orthofix nail was inserted through the heel bone and talus into the distal tibia and locked in these bones in the sagittal plane. No complications such as injury to the neurovascular plexus or pseudoarthrosis were recorded. Four patients showed a reaction to the proximal locking screw on the proximal tibial surface, which was treated by earlier screw removal under topical anaesthesia. Due to infectious complications, the nail had to be removed prematurely in one patient. The average Foot Function Index was 12 points (range, 10 to 15) and the average ankle-hindfoot score was 67.6 points (range, 59 to 84). Thirteen patients (65 %) were not limited in their daily activities or recreational sports, six (30 %) experienced pain in sports but not daily activities and one patient (5 %) reported pain even when walking. All fusions healed in the correct position within 18 weeks. Tibiotalocalcaneal arthrodesis is not a frequent surgical procedure in either trauma surgery or orthopaedics. For this complicated procedure, rather than intramedullary nails, internal fixation with screws or plates or external fixation are preferred. The high rate of bony healing can be explained by maintenance of exact nail locking in the sagittal plane. The antero- posterior approach provides a more secure locking in the bone and assists in neutralizing sagittal forces at the site of arthrodesis. The use of reamed interlocking nails can therefore be accepted not only for treatment of long-bone fractures, but also for treating pseudoarthrosis and in complicated or failed arthrodesis. Patients' satisfaction is the primary goal we strive to achieve in severe post-traumatic conditions of the talus and foot. Repeat surgery, spongioplasty, external fixation revision for pin-tract infection, persistent pain, activity restriction and poor clinical results reduce patients' satisfaction. In our group, the rate of healed arthrodesis was high and the number of complications was low, therefore our patients' satisfaction was high.

  2. Phase-lock loop frequency control and the dropout problem

    NASA Technical Reports Server (NTRS)

    Attwood, S.; Kline, A. J.

    1968-01-01

    Technique automatically sets the frequency of narrow band phase-lock loops within automatic lock-in-range. It presets a phase-lock loop to a desired center frequency with a closed loop electronic frequency discriminator and holds the phase-lock loop to that center frequency until lock is achieved.

  3. Cavity-locked ring down spectroscopy

    DOEpatents

    Zare, Richard N.; Paldus, Barbara A.; Harb, Charles C.; Spence, Thomas

    2000-01-01

    Distinct locking and sampling light beams are used in a cavity ring-down spectroscopy (CRDS) system to perform multiple ring-down measurements while the laser and ring-down cavity are continuously locked. The sampling and locking light beams have different frequencies, to ensure that the sampling and locking light are decoupled within the cavity. Preferably, the ring-down cavity is ring-shaped, the sampling light is s-polarized, and the locking light is p-polarized. Transmitted sampling light is used for ring-down measurements, while reflected locking light is used for locking in a Pound-Drever scheme.

  4. Angle-stable and compressed angle-stable locking for tibiotalocalcaneal arthrodesis with retrograde intramedullary nails. Biomechanical evaluation.

    PubMed

    Mückley, Thomas; Hoffmeier, Konrad; Klos, Kajetan; Petrovitch, Alexander; von Oldenburg, Geert; Hofmann, Gunther O

    2008-03-01

    Retrograde intramedullary nailing is an established procedure for tibiotalocalcaneal arthrodesis. The goal of this study was to evaluate the effects of angle-stable locking or compressed angle-stable locking on the initial stability of the nails and on the behavior of the constructs under cyclic loading conditions. Tibiotalocalcaneal arthrodesis was performed in fifteen third-generation synthetic bones and twenty-four fresh-frozen cadaver legs with use of retrograde intramedullary nailing with three different locking modes: a Stryker nail with compressed angle-stable locking, a Stryker nail with angle-stable locking, and a statically locked Biomet nail. Analyses were performed of the initial stability of the specimens (range of motion) and the laxity of the constructs (neutral zone) in dorsiflexion/plantar flexion, varus/valgus, and external rotation/internal rotation. Cyclic testing up to 100,000 cycles was also performed. The range of motion and the neutral zone in dorsiflexion/plantar flexion at specific cycle increments were determined. In both bone models, the intramedullary nails with compressed angle-stable locking and those with angle-stable locking were significantly superior, in terms of a smaller range of motion and neutral zone, to the statically locked nails. The compressed angle-stable nails were superior to the angle-stable nails only in the synthetic bone model, in external/internal rotation. Cyclic testing showed the nails with angle-stable locking and those with compressed angle-stable locking to have greater stability in both models. In the synthetic bone model, compressed angle-stable locking was significantly better than angle-stable locking; in the cadaver bone model, there was no significant difference between these two locking modes. During cyclic testing, five statically locked nails in the cadaver bone model failed, whereas one nail with angle-stable locking and one with compressed angle-stable locking failed. Regardless of the bone model, the nails with angle-stable or compressed angle-stable locking had better initial stability and better stability following cycling than did the nails with static locking.

  5. Aircraft Skin Penetrator and Agent Applicator. Volume 2. Test and Evaluation.

    DTIC Science & Technology

    1984-11-01

    U IA FR IO%(LANr -,I WWL7 2 - TI) _T 39.75*10F X.Of AR NEOPRENE_ _ NAME TAG I 71LINK LOCK 2 LA CH sl AD 13 b 110 - 2 4 X 1. 25 U 2 SOCKET HEAD SCREW...ensure that it is secured. A broken flex hos(.’s whiplash can be very dangerous. 3) The charging system pressure gauge should be a calibrated gage and be...Seez ’(or -,*iuivalent A. iAi.: theh tool bit shaft with the bear inq/seal in the irrlr ,ssembly and push slowly through wh,_,n the f L,w ~i rr, r-. aches

  6. VIEW LOOKING NORTHEAST, LOCK 35 IS ON THE RIGHT. CANAL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW LOOKING NORTHEAST, LOCK 35 IS ON THE RIGHT. CANAL WORKERS ARE CLEANING TRASH GRATES TO LOCK 35 WATER INLET. ENTRANCE TO OLD LOCK 71 ON LEFT. NOTE THE SEDIMENT BUILD UP IN THE ENTRANCE CHANNEL TO OLD LOCK 71. - New York State Barge Canal, Lockport Locks, Richmond Avenue, Lockport, Niagara County, NY

  7. System Security And Monitoring On Smart Home Using Android

    NASA Astrophysics Data System (ADS)

    Romadhon, A. S.

    2018-01-01

    Home security system is needed for homeowners who have a lot of activities, as a result, they often leave the house without locking the door and even leave the house in a state of lights that are not lit. In order to overcome this case, a system that can control and can monitor the state of the various devices contained in the house or smart home system is urgently required. The working principle of this smart home using android is when the homeowner sends a certain command using android, the command will be forwarded to the microcontroller and then it will be executed based on the parameters that have been determined. For example, it can turn off and on the light using android app. In this study, testing was conducted to a smart home prototype which is equipped with light bulbs, odour sensors, heat sensors, ultrasonic sensors, LDR, buzzer and camera. The test results indicate that the application has been able to control all the sensors of home appliances well.

  8. Supercritical fluid attachment of palladium nanoparticles on aligned carbon nanotubes.

    PubMed

    Ye, Xiang-Rong; Lin, Yuehe; Wai, Chien M; Talbot, Jan B; Jin, Sungho

    2005-06-01

    Nanocomposite materials consisting of Pd nanoparticles deposited on aligned multi-walled carbon nanotubes have been fabricated through hydrogen reduction of palladium-beta-diketone precursor in supercritical carbon dioxide. The supercritical fluid processing allowed deposition of high-density Pd nanoparticles (approximately 5-10 nm) on both as-grown (unfunctionalized) and functionalized (using HNO3 oxidation) nanotubes. However, the wet processing for functionalization results in pre-agglomerated, bundle-shaped nanotubes, thus significantly reducing the effective surface area for Pd particle deposition, although the bundling provides more secure, lock-in-place positioning of nanotubes and Pd catalyst particles. The nanotube bundling is substantially mitigated by Pd nanoparticle deposition on the unfunctionalized and geometrically separated nanotubes, which provides much higher catalyst surface area. Such nanocomposite materials utilizing geometrically secured and aligned nanotubes can be useful for providing much enhanced catalytic activities to chemical and electrochemical reactions (e.g., fuel cell reactions), and eliminate the need for tedious catalyst recovery process after the reaction is completed.

  9. 12. VIEW OF TYPICAL CELL LOCKING MECHANISM, BUILDING 220 CELL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. VIEW OF TYPICAL CELL LOCKING MECHANISM, BUILDING 220 CELL BLOCK 'A'. THE FACE PLATE OF THE CELL LOCK IS SHOWN REMOVED, EXPOSING THE ELECTROMAGNETIC LOCKING MECHANISM COMPRISING OF 2 MICROSWITCHES FOR LOCK POSITION INDICATION (FRONT LEFT CENTER AND REAR RIGHT CENTER OF PANEL); KEY SLOT MECHANICAL LOCK; LOCK SPRING (UPPER RIGHT OF PANEL); ELECTRIC SOLENOID (BOTTOM RIGHT CORNER OF PANEL); AND MISCELLANEOUS MECHANICAL LINKAGES. - U.S. Naval Base, Pearl Harbor, Brig, Neville Way near Ninth Street at Marine Barracks, Pearl City, Honolulu County, HI

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relatingmore » to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.« less

  11. Use of a secure Internet Web site for collaborative medical research.

    PubMed

    Marshall, W W; Haley, R W

    2000-10-11

    Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849.

  12. West Branch Pennsylvania Canal, Lock No. 34 Lock Keeper's House, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    West Branch Pennsylvania Canal, Lock No. 34 Lock Keeper's House, South of State Route 664 along North bank of West Branch of Susquehanna River, 2,000 feet East of Jay Street Bridge, Lock Haven, Clinton County, PA

  13. Screw-locking wrench

    NASA Technical Reports Server (NTRS)

    Vranish, John M. (Inventor)

    2007-01-01

    A tool comprises a first handle and a second handle, each handle extending from a gripping end portion to a working end portion, the first handle having first screw threads disposed circumferentially about an inner portion of a first through-hole at the working end portion thereof, the second handle having second screw threads disposed circumferentially about an inner portion of a second through-hole at the working end portion thereof, the first and second respective through-holes being disposed concentrically about a common axis of the working end portions. First and second screw locks preferably are disposed concentrically with the first and second respective through-holes, the first screw lock having a plurality of locking/unlocking screw threads for engaging the first screw threads of the first handle, the second screw lock having a plurality of locking/unlocking screw threads for engaging the second screw threads of the second handle. A locking clutch drive, disposed concentrically with the first and second respective through-holes, engages the first screw lock and the second screw lock. The first handle and the second handle are selectively operable at their gripping end portions by a user using a single hand to activate the first and second screw locks to lock the locking clutch drive for either clockwise rotation about the common axis, or counter-clockwise rotation about the common axis, or to release the locking clutch drive so that the handles can be rotated together about the common axis either the clockwise or counter-clockwise direction without rotation of the locking clutch drive.

  14. 49 CFR 236.765 - Locking, mechanical.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking, mechanical. 236.765 Section 236.765 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Locking, mechanical. An arrangement of locking bars, dogs, tappets, cross locking and other apparatus by...

  15. 49 CFR 236.7 - Circuit controller operated by switch-and-lock movement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Circuit controller operated by switch-and-lock... switch-and-lock movement. Circuit controller operated by switch-and-lock movement shall be maintained so... switch is locked. ...

  16. 49 CFR 236.7 - Circuit controller operated by switch-and-lock movement.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Circuit controller operated by switch-and-lock... switch-and-lock movement. Circuit controller operated by switch-and-lock movement shall be maintained so... switch is locked. ...

  17. 49 CFR 236.7 - Circuit controller operated by switch-and-lock movement.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Circuit controller operated by switch-and-lock... switch-and-lock movement. Circuit controller operated by switch-and-lock movement shall be maintained so... switch is locked. ...

  18. 49 CFR 236.7 - Circuit controller operated by switch-and-lock movement.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Circuit controller operated by switch-and-lock... switch-and-lock movement. Circuit controller operated by switch-and-lock movement shall be maintained so... switch is locked. ...

  19. 49 CFR 236.7 - Circuit controller operated by switch-and-lock movement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Circuit controller operated by switch-and-lock... switch-and-lock movement. Circuit controller operated by switch-and-lock movement shall be maintained so... switch is locked. ...

  20. [Card-based age control mechanisms at tobacco vending machines. Effect and consequences].

    PubMed

    Schneider, S; Meyer, C; Löber, S; Röhrig, S; Solle, D

    2010-02-01

    Until recently, 700,000 tobacco vending machines provided uncontrolled access to cigarettes for children and adolescents in Germany. On January 1, 2007, a card-based electronic locking device was attached to all tobacco vending machines to prevent the purchase of cigarettes by children and adolescents under 16. Starting in 2009, only persons older than 18 are able to buy cigarettes from tobacco vending machines. The aim of the present investigation (SToP Study: "Sources of Tobacco for Pupils" Study) was to assess changes in the number of tobacco vending machines after the introduction of these new technical devices (supplier's reaction). In addition, the ways smoking adolescents make purchases were assessed (consumer's reaction). We registered and mapped the total number of tobacco points of sale (tobacco POS) before and after the introduction of the card-based electronic locking device in two selected districts of the city of Cologne. Furthermore, pupils from local schools (response rate: 83%) were asked about their tobacco consumption and ways of purchase using a questionnaire. Results indicated that in the area investigated the total number of tobacco POSs decreased from 315 in 2005 to 277 in 2007. The rates of decrease were 48% for outdoor vending machines and 8% for indoor vending machines. Adolescents reported circumventing the card-based electronic locking devices (e.g., by using cards from older friends) and using other tobacco POSs (especially newspaper kiosks) or relying on their social network (mainly friends). The decreasing number of tobacco vending machines has not had a significant impact on cigarette acquisition by adolescent smokers as they tend to circumvent the newly introduced security measures.

  1. Passive Optical Locking Techniques for Diode Lasers

    NASA Astrophysics Data System (ADS)

    Zhang, Quan

    1995-01-01

    Most current diode-based nonlinear frequency converters utilize electronic frequency locking techniques. However, this type of locking technique typically involves very complex electronics, and suffers the 'power-drop' problem. This dissertation is devoted to the development of an all-optical passive locking technique that locks the diode laser frequency to the external cavity resonance stably without using any kind of electronic servo. The amplitude noise problem associated with the strong optical locking has been studied. Single-mode operation of a passively locked single-stripe diode with an amplitude stability better than 1% has been achieved. This passive optical locking technique applies to broad-area diodes as well as single-stripe diodes, and can be easily used to generate blue light. A schematic of a milliwatt level blue laser based on the single-stripe diode locking technique has been proposed. A 120 mW 467 nm blue laser has been built using the tapered amplifier locking technique. In addition to diode-based blue lasers, this passive locking technique has applications in nonlinear frequency conversions, resonant spectroscopy, particle counter devices, telecommunications, and medical devices.

  2. Interband optical pulse injection locking of quantum dot mode-locked semiconductor laser.

    PubMed

    Kim, Jimyung; Delfyett, Peter J

    2008-07-21

    We experimentally demonstrate optical clock recovery from quantum dot mode-locked semiconductor lasers by interband optical pulse injection locking. The passively mode-locked slave laser oscillating on the ground state or the first excited state transition is locked through the injection of optical pulses generated via the opposite transition bands, i.e. the first excited state or the ground state transition from the hybridly mode-locked master laser, respectively. When an optical pulse train generated via the first excited state from the master laser is injected to the slave laser oscillating via ground state, the slave laser shows an asymmetric locking bandwidth around the nominal repetition rate of the slave laser. In the reverse injection case of, i.e. the ground state (master laser) to the first excited state (slave laser), the slave laser does not lock even though both lasers oscillate at the same cavity frequency. In this case, the slave laser only locks to higher injection rates as compared to its own nominal repetition rate, and also shows a large locking bandwidth of 6.7 MHz.

  3. Lock-up control system for an automatic transmission

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Higashi, H.; Yashiki, S.; Waki, K.

    A lock-up control system is described for an automatic transmission including a torque converter coupled with the output portion on an engine, and a power transmitting gear arrangement coupled with the output portion of the torque converter and controlled to vary the transmitting gear ratio therein by gear ratio control means in accordance with a shifting up or down command supplied to the latter. A lock-up clutch is provided for locking up the output portion of the torque converter to the output portion of the engine. The lock-up control system comprises: lock-up operation control means for controlling the lock-up clutchmore » to be in its operative state and in its inoperative state selectively, and for causing the lock-up clutch to be in the inoperative state thereof when the gear ratio control means performs the control with the shifting up or down command, and lock-up command means for preventing the lock-up operation control means from causing the lock-up clutch to be in the inoperative state thereof until a predetermined reductive variation in the speed of the output portion of the torque converter arises after the shifting up command is supplied to the gear ratio control means under the condition in which the lock-up clutch is in operation to hold a lock-up state.« less

  4. 49 CFR 236.339 - Mechanical locking, maintenance requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Mechanical locking, maintenance requirements. 236... Interlocking Rules and Instructions § 236.339 Mechanical locking, maintenance requirements. Locking and... prevented: (a) Mechanical machine—(1) Latch-operated locking. Raising lever latch block so that bottom...

  5. A fast-locking PLL with all-digital locked-aid circuit

    NASA Astrophysics Data System (ADS)

    Kao, Shao-Ku; Hsieh, Fu-Jen

    2013-02-01

    In this article, a fast-locking phase-locked loop (PLL) with an all-digital locked-aid circuit is proposed and analysed. The proposed topology is based on two tuning loops: frequency and phase detections. A frequency detection loop is used to accelerate frequency locking time, and a phase detection loop is used to adjust fine phase errors between the reference and feedback clocks. The proposed PLL circuit is designed based on the 0.35 µm CMOS process with a 3.3 V supply voltage. Experimental results show that the locking time of the proposed PLL achieves a 87.5% reduction from that of a PLL without the locked-aid circuit.

  6. Injection-locking of terahertz quantum cascade lasers up to 35GHz using RF amplitude modulation.

    PubMed

    Gellie, Pierre; Barbieri, Stefano; Lampin, Jean-François; Filloux, Pascal; Manquest, Christophe; Sirtori, Carlo; Sagnes, Isabelle; Khanna, Suraj P; Linfield, Edmund H; Davies, A Giles; Beere, Harvey; Ritchie, David

    2010-09-27

    We demonstrate that the cavity resonance frequency - the round-trip frequency - of Terahertz quantum cascade lasers can be injection-locked by direct modulation of the bias current using an RF source. Metal-metal and single-plasmon waveguide devices with roundtrip frequencies up to 35GHz have been studied, and show locking ranges above 200MHz. Inside this locking range the laser round-trip frequency is phase-locked, with a phase noise determined by the RF-synthesizer. We find a square-root dependence of the locking range with RF-power in agreement with classical injection-locking theory. These results are discussed in the context of mode-locking operation.

  7. 49 CFR 236.758 - Lock, electric, forced drop.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Lock, electric, forced drop. 236.758 Section 236.758 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... § 236.758 Lock, electric, forced drop. An electric lock in which the locking member is mechanically...

  8. 49 CFR 236.758 - Lock, electric, forced drop.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Lock, electric, forced drop. 236.758 Section 236.758 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... § 236.758 Lock, electric, forced drop. An electric lock in which the locking member is mechanically...

  9. 49 CFR 236.758 - Lock, electric, forced drop.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Lock, electric, forced drop. 236.758 Section 236.758 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... § 236.758 Lock, electric, forced drop. An electric lock in which the locking member is mechanically...

  10. 49 CFR 236.758 - Lock, electric, forced drop.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Lock, electric, forced drop. 236.758 Section 236.758 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... § 236.758 Lock, electric, forced drop. An electric lock in which the locking member is mechanically...

  11. 27 CFR 19.282 - Breaking Government locks.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Breaking Government locks... Breaking Government locks. Where affixed, Government locks shall not be removed without the authorization... obtain authorization from an appropriate TTB officer, Government locks may be removed, by the proprietor...

  12. 33 CFR 207.476 - The Inland Route-lock in Crooked River, Alanson, Mich.; use, administration, and navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... management of the lock, and of the area set aside as the lock area, including the lock approach channels. He..., both to the employees of the Government and to any and every person within the limits of the lock area... object in the lock or approaches except by or under the direction of the lockmaster or his assistants. (c...

  13. 33 CFR 207.476 - The Inland Route-lock in Crooked River, Alanson, Mich.; use, administration, and navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... management of the lock, and of the area set aside as the lock area, including the lock approach channels. He..., both to the employees of the Government and to any and every person within the limits of the lock area... object in the lock or approaches except by or under the direction of the lockmaster or his assistants. (c...

  14. Low-cost, digital lock-in module with external reference for coating glass transmission/reflection spectrophotometer

    NASA Astrophysics Data System (ADS)

    Alonso, R.; Villuendas, F.; Borja, J.; Barragán, L. A.; Salinas, I.

    2003-05-01

    A versatile, low-cost, digital signal processor (DSP) based lock-in module with external reference is described. This module is used to implement an industrial spectrophotometer for measuring spectral transmission and reflection of automotive and architectonic coating glasses over the ultraviolet, visible and near-infrared wavelength range. The light beams are modulated with an optical chopper. A digital phase-locked loop (DPLL) is used to lock the lock-in to the chop frequency. The lock-in rejects the ambient radiation and permits the spectrophotometer to work in the presence of ambient light. The algorithm that implements the dual lock-in and the DPLL in the DSP56002 evaluation module from Motorola is described. The use of a DSP allows implementation of the lock-in and DPLL by software, which gives flexibility and programmability to the system. Lock-in module cost, under 300 euro, is an important parameter taking into account that two modules are used in the system. Besides, the algorithms implemented in this DSP can be directly implemented in the latest DSP generations. The DPLL performance and the spectrophotometer are characterized. Capture and lock DPLL ranges have been measured and checked to be greater than the chop frequency drifts. The lock-in measured frequency response shows that the lock-in performs as theoretically predicted.

  15. Comparative evaluation of 2.3 mm locking plate system vs conventional 2.0 mm non locking plate system for mandibular condyle fracture fixation: a seven year retrospective study.

    PubMed

    Zhang, J; Wang, X; Wu, R-H; Zhuang, Q-W; Gu, Q P; Meng, J

    2015-01-01

    This retrospective study evaluated the efficacy of a 2.3 mm locking plate/screw system compared with a 2.0-mm non-locking plate/screw system in fixation of isolated non comminuted mandibular condyle fractures. Surgical records of 101 patients who received either a 2.3 mm locking plate (group A, n = 51) or 2.0 mm non locking plate (group B, n = 50) were analyzed. All patients were followed up to a minimum of 6 months postoperatively and evaluated for hardware related complications, occlusal stability, need for and duration of MMF and mandibular functional results. Four complications occurred in the locking group and eighteen in the non locking group with complication rates equalling 8% and 36% respectively. When comparing the overall results according to plates used, the χ2 test showed a statistically significant difference between the locking and non locking plates (p < 0.001). Fewer patients required postoperative MMF in group A. Mandibular condyle fractures treated with a 2.3 mm locking plate exhibited stable osteosynthesis, were associated with minimal complications and resulted in acceptable mandibular range of motion compared with a 2.0 mm non locking plate.

  16. A recurrence network approach to analyzing forced synchronization in hydrodynamic systems

    NASA Astrophysics Data System (ADS)

    Murugesan, Meenatchidevi; Zhu, Yuanhang; Li, Larry K. B.

    2016-11-01

    Hydrodynamically self-excited systems can lock into external forcing, but their lock-in boundaries and the specific bifurcations through which they lock in can be difficult to detect. We propose using recurrence networks to analyze forced synchronization in a hydrodynamic system: a low-density jet. We find that as the jet bifurcates from periodicity (unforced) to quasiperiodicity (weak forcing) and then to lock-in (strong forcing), its recurrence network changes from a regular distribution of links between nodes (unforced) to a disordered topology (weak forcing) and then to a regular distribution again at lock-in (strong forcing). The emergence of order at lock-in can be either smooth or abrupt depending on the specific lock-in route taken. Furthermore, we find that before lock-in, the probability distribution of links in the network is a function of the characteristic scales of the system, which can be quantified with network measures and used to estimate the proximity to the lock-in boundaries. This study shows that recurrence networks can be used (i) to detect lock-in, (ii) to distinguish between different routes to lock-in, and (iii) as an early warning indicator of the proximity of a system to its lock-in boundaries. This work was supported by the Research Grants Council of Hong Kong (Project No. 16235716 and 26202815).

  17. Distal tibia fractures: locked or non-locked plating? A systematic review of outcomes.

    PubMed

    Khalsa, Amrit S; Toossi, Nader; Tabb, Loni P; Amin, Nirav H; Donohue, Kenneth W; Cerynik, Douglas L

    2014-06-01

    Although plating is considered to be the treatment of choice in distal tibia fractures, controversies abound regarding the type of plating for optimal fixation. We conducted a systematic review to evaluate and compare the outcomes of locked plating and non-locked plating in treatment of distal tibia fractures. A systematic review was conducted using PubMed to identify articles on the outcomes of plating in distal tibia fractures that were published up to June 2012. We included English language articles involving a minimum of 10 adult cases with acute fractures treated using single-plate, minimally invasive techniques. Study-level binomial regression on the pooled data was conducted to determine the effect of locking status on different outcomes, adjusted for age, sex, and other independent variables. 27 studies met the inclusion criteria and were included in the final analysis of 764 cases (499 locking, 265 non-locking). Based on descriptive analysis only, delayed union was reported in 6% of cases with locked plating and in 4% of cases with non-locked plating. Non-union was reported in 2% of cases with locked plating and 3% of cases with non-locked plating. Comparing locked and non-locked plating, the odds ratio (OR) for reoperation was 0.13 (95% CI: 0.03-0.57) and for malalignment it was 0.10 (95% CI: 0.02-0.42). Both values were statistically significant. This study showed that locked plating reduces the odds of reoperation and malalignment after treatment for acute distal tibia fracture. Future studies should accurately assess causality and the clinical and economic impact of these findings.

  18. Biomechanical comparison of locked versus non-locked symphyseal plating of unstable pelvic ring injuries.

    PubMed

    Godinsky, R J; Vrabec, G A; Guseila, L M; Filipkowski, D E; Elias, J J

    2018-04-01

    Locked symphyseal plates are utilized to provide higher levels of construct stiffness than non-locked plates. The current biomechanical study was performed to compare stiffness at the pubic symphysis between locked and non-locked plating systems. Synthetic models were utilized to represent injury to the pelvis and symphyseal plating combined with a sacro-iliac screw. Seven models were evaluated with plates and locking screws, and seven were evaluated with non-locking screws. Single limb stance was simulated, with all models loaded for 1000 cycles with 350 N applied at the sacrum. Two pairs of markers crossing the symphysis were tracked with a video-based tracking system. A coordinate system was developed to quantify motion between the pairs in three directions: medial-lateral gap, anterior-posterior shear translation, and superior-inferior shear translation. Significant differences between the plating systems were identified with t tests (p < 0.05). Anterior-posterior shear translation varied significantly between the two plating systems. From cycles 100 to 1000, average shear translation for the non-locked and locked systems was ~0.7 and 0.3 mm, respectively, at the markers closest to the plate and 2.2 and 1.4 mm, respectively, at the markers further from the plate. Motion in the other two directions did not differ significantly between locked and non-locked models. Locked symphyseal plating systems can provide better stability than non-locked systems for anterior-posterior shear translation. More stability could potentially reduce the risk of failure of the plate or screws.

  19. Research on phase locked loop in optical memory servo system

    NASA Astrophysics Data System (ADS)

    Qin, Liqin; Ma, Jianshe; Zhang, Jianyong; Pan, Longfa; Deng, Ming

    2005-09-01

    Phase locked loop (PLL) is a closed loop automatic control system, which can track the phase of input signal. It widely applies in each area of electronic technology. This paper research the phase locked loop in optical memory servo area. This paper introduces the configuration of digital phase locked loop (PLL) and phase locked servo system, the control theory, and analyses system's stability. It constructs the phase locked loop experiment system of optical disk spindle servo, which based on special chip. DC motor is main object, this system adopted phase locked servo technique and digital signal processor (DSP) to achieve constant linear velocity (CLV) in controlling optical spindle motor. This paper analyses the factors that affect the stability of phase locked loop in spindle servo system, and discusses the affection to the optical disk readout signal and jitter due to the stability of phase locked loop.

  20. Robust tilt and lock mechanism for hopping actuator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salton, Jonathan R.; Buerger, Stephen; Dullea, Kevin J.

    A tilt and lock apparatus that includes a tilt servomechanism, a spiral torsion spring, a lock wheel, and a lock hook is described herein. The spiral torsion spring is mechanically coupled to the tilt servomechanism and the lock wheel (which includes an opening). When a shaft is positioned through the opening, rotation of the lock wheel is in unison with rotation of the shaft. An external surface of the lock wheel includes one or more grooves. The lock hook includes a head that engages and disengages the grooves. The lock wheel is stationary when the head engages one of themore » grooves and is rotatable when the head disengages the grooves. The head and the grooves are geometrically aligned when engaged to prevent creation of a force that acts to disengage the head responsive to an applied force acting on the shaft.« less

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fox, Kevin

    The software provides a simple web api to allow users to request a time window where a file will not be removed from cache. HPSS provides the concept of a "purge lock". When a purge lock is set on a file, the file will not be removed from disk, entering tape only state. A lot of network file protocols assume a file is on disk so it is good to purge lock a file before transferring using one of those protocols. HPSS's purge lock system is very coarse grained though. A file is either purge locked or not. Nothing enforcesmore » quotas, timely unlocking of purge locks, or managing the races inherent with multiple users wanting to lock/unlock the same file. The Purge Lock Server lets you, through a simple REST API, specify a list of files to purge lock and an expire time, and the system will ensure things happen properly.« less

  2. Biomechanical strength of the Peri-Loc proximal tibial plate: a comparison of all-locked versus hybrid locked/nonlocked screw configurations.

    PubMed

    Estes, Chris; Rhee, Peter; Shrader, M Wade; Csavina, Kristine; Jacofsky, Marc C; Jacofsky, David J

    2008-01-01

    The purpose of this study was to compare the biomechanical properties of a contoured locking plate instrumented with either an all-locked or hybrid locked/nonlocked screw construct in a proximal metaphyseal fracture of the tibia (AO 41-A3.2). A standardized proximal metaphyseal wedge osteotomy (AO 41-A3.2) was created in five pairs of cadaveric tibia. Each pair was randomly instrumented with either an all-locked or combination locked/nonlocked screw construct using a locked contoured periarticular plate (Peri-Loc periarticular locked plating system, Smith & Nephew, Memphis, TN). Vertical subsidence (irreversible deformation) and deflection (reversible deformation) in each pair were analyzed and compared. Load to failure, defined by complete fracture gap closure, was also determined. There was no statistically significant difference in vertical subsidence (P = 0.19) or deflection (P = 0.19) of the proximal tibia between the all-locked and combination locked/nonlocked screw construct with increasing levels of cyclical axial load from 200 to 1200 N. Failure occurred at a mean value of 2160 N in the locked group and 1760 N in the hybrid group (P = 0.19); the failure mode was plate bending in all specimens. The results indicate that the use of compression screws with locked screws in this particular construct allows a similar amount of irreversible and reversible deformation in response to an axial load when compared to an all-locked screw construct. This suggests that there is no statistically significant difference in the stability in fixation between the two methods, allowing the surgeon the freedom to choose the appropriate screw combination unique to each fracture.

  3. Distal tibia fractures: locked or non-locked plating?

    PubMed Central

    Khalsa, Amrit S; Toossi, Nader; Tabb, Loni P; Amin, Nirav H; Donohue, Kenneth W; Cerynik, Douglas L

    2014-01-01

    Background and purpose Although plating is considered to be the treatment of choice in distal tibia fractures, controversies abound regarding the type of plating for optimal fixation. We conducted a systematic review to evaluate and compare the outcomes of locked plating and non-locked plating in treatment of distal tibia fractures. Patients and methods A systematic review was conducted using PubMed to identify articles on the outcomes of plating in distal tibia fractures that were published up to June 2012. We included English language articles involving a minimum of 10 adult cases with acute fractures treated using single-plate, minimally invasive techniques. Study-level binomial regression on the pooled data was conducted to determine the effect of locking status on different outcomes, adjusted for age, sex, and other independent variables. Results 27 studies met the inclusion criteria and were included in the final analysis of 764 cases (499 locking, 265 non-locking). Based on descriptive analysis only, delayed union was reported in 6% of cases with locked plating and in 4% of cases with non-locked plating. Non-union was reported in 2% of cases with locked plating and 3% of cases with non-locked plating. Comparing locked and non-locked plating, the odds ratio (OR) for reoperation was 0.13 (95% CI: 0.03–0.57) and for malalignment it was 0.10 (95% CI: 0.02–0.42). Both values were statistically significant. Interpretation This study showed that locked plating reduces the odds of reoperation and malalignment after treatment for acute distal tibia fracture. Future studies should accurately assess causality and the clinical and economic impact of these findings. PMID:24758325

  4. Locking design affects the jamming of screws in locking plates.

    PubMed

    Sandriesser, Sabrina; Rupp, Markus; Greinwald, Markus; Heiss, Christian; Augat, Peter; Alt, Volker

    2018-06-01

    The seizing of locking screws is a frequently encountered clinical problem during implant removal of locking compression plates (LCP) after completion of fracture healing. The aim of this study was to investigate the effect of two different locking mechanisms on the seizing of locking screws. Specifically, the removal torques before and after cyclic dynamic loading were assessed for screws inserted at the manufacturer-recommended torque or at an increased insertion torque. The seizing of 3.5-mm angular stable screws was assessed as a function of insertion torque for two different locking mechanisms (Thread & Conus and Thread Only). Locking screws (n=10 for each configuration) were inserted either according to the manufacturer-recommended torque or at an increased torque of 150% to simulate an over-insertion of the screw. Half of the screws were removed directly after insertion and the remaining half was removed after a dynamic load protocol of 100,000 cycles. The removal torques of locking screws exceeded the insertion torques for all tested conditions confirming the adequacy of the test setup in mimicking screw seizing in locked plating. Screw seizing was more pronounced for Thread Only design (+37%) compared to Thread & Conus design (+14%; P<0.0001). Cyclic loading of the locking construct consistently resulted in an increased seizing of the locking screws (P<0.0001). Clinical observations from patients treated with the Thread & Conus locking design confirm the biomechanical findings of reduction in seizing effect by using a Thread & Conus design. In conclusion, both over-tightening and cyclic loading are potential causes for screw seizing in locking plate implants. Both effects were found to be less pronounced in the Thread & Conus design as compared to the traditional Thread Only design. © 2018 Elsevier Ltd. All rights reserved.

  5. Efficient optical injection locking of electronic oscillators

    NASA Astrophysics Data System (ADS)

    Cochran, S. R.; Wang, S. Y.

    1989-05-01

    The paper presents techniques for direct optical injection locking of electronic oscillators and analyzes the problem of direct optical injection locking of a common-source FET oscillator using a high impedance optoelectronic transducer. A figure-of-merit for optically injection locked oscillators is defined, and an experimental oscillator based on the design criteria was fabricated. The oscillator achieved efficient, high power operation and moderate locking bandwidth with small locking signal magnitude. The experimental results are consistent with the theoretical model.

  6. Locking hinge

    NASA Technical Reports Server (NTRS)

    Wesselski, Clarence J. (Inventor)

    1988-01-01

    The space station configuration currently studied utilizes structures which require struts to be hinged in the middle in the stowed mode and locked into place in the deployed mode. Since there are hundreds of hinges involved, it is necessary that they have simple, positive locking features with a minimum of joint looseness or slack. This invention comprises two similar housings hinged together with a spring loaded locking member which assists in making as well as breaking the lock. This invention comprises a bracket hinge and bracket members with a spring biased and movable locking member. The locking or latch member has ear parts received in locking openings where wedging surfaces on the ear parts cooperate with complimentary surfaces on the bracket members for bringing the bracket members into a tight end-to-end alignment when the bracket members are in an extended position. When the locking member is moved to an unlocking position, pivoting of the hinge about a pivot pin automatically places the locking member to retain the locking member in an unlocked position. In pivoting the hinge from an extended position to a folded position, longitudinal spring members are placed under tension over annular rollers so that the spring tension in a folded position assists in return of the hinge from a folded to an extended position. Novelty lies in the creation of a locking hinge which allows compact storage and easy assembly of structural members having a minimal number of parts.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yee, Seonghwan, E-mail: Seonghwan.Yee@Beaumont.edu; Gao, Jia-Hong

    Purpose: To investigate whether the direction of spin-lock field, either parallel or antiparallel to the rotating magnetization, has any effect on the spin-lock MRI signal and further on the quantitative measurement of T1ρ, in a clinical 3 T MRI system. Methods: The effects of inverted spin-lock field direction were investigated by acquiring a series of spin-lock MRI signals for an American College of Radiology MRI phantom, while the spin-lock field direction was switched between the parallel and antiparallel directions. The acquisition was performed for different spin-locking methods (i.e., for the single- and dual-field spin-locking methods) and for different levels ofmore » clinically feasible spin-lock field strength, ranging from 100 to 500 Hz, while the spin-lock duration was varied in the range from 0 to 100 ms. Results: When the spin-lock field was inverted into the antiparallel direction, the rate of MRI signal decay was altered and the T1ρ value, when compared to the value for the parallel field, was clearly different. Different degrees of such direction-dependency were observed for different spin-lock field strengths. In addition, the dependency was much smaller when the parallel and the antiparallel fields are mixed together in the dual-field method. Conclusions: The spin-lock field direction could impact the MRI signal and further the T1ρ measurement in a clinical MRI system.« less

  8. VIEW LOOKING NORTHEAST INTO LOCK 71. NOTE THE SEDIMENT BUILD ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW LOOKING NORTHEAST INTO LOCK 71. NOTE THE SEDIMENT BUILD UP. THIS IS BY DESIGN, NOT ONLY ARE THE OLDER LOCKS USED AS AN OVERFLOW SPILLWAY FOR THE CURRENT LOCKS, THEY ARE ALSO USED FOR SEDIMENT AND DEBRIS CONTROL. - New York State Barge Canal, Lockport Locks, Richmond Avenue, Lockport, Niagara County, NY

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    McKenzie, Kirk; Spero, Robert E.; Shaddock, Daniel A.

    For the Laser Interferometer Space Antenna (LISA) to reach its design sensitivity, the coupling of the free-running laser frequency noise to the signal readout must be reduced by more than 14 orders of magnitude. One technique employed to reduce the laser frequency noise will be arm locking, where the laser frequency is locked to the LISA arm length. In this paper we detail an implementation of arm locking. We investigate orbital effects (changing arm lengths and Doppler frequencies), the impact of errors in the Doppler knowledge that can cause pulling of the laser frequency, and the noise limit of armmore » locking. Laser frequency pulling is examined in two regimes: at lock acquisition and in steady state. The noise performance of arm locking is calculated with the inclusion of the dominant expected noise sources: ultrastable oscillator (clock) noise, spacecraft motion, and shot noise. We find that clock noise and spacecraft motion limit the performance of dual arm locking in the LISA science band. Studying these issues reveals that although dual arm locking [A. Sutton and D. A. Shaddock, Phys. Rev. D 78, 082001 (2008)] has advantages over single (or common) arm locking in terms of allowing high gain, it has disadvantages in both laser frequency pulling and noise performance. We address this by proposing a modification to the dual arm-locking sensor, a hybrid of common and dual arm-locking sensors. This modified dual arm-locking sensor has the laser frequency pulling characteristics and low-frequency noise coupling of common arm locking, but retains the control system advantages of dual arm locking. We present a detailed design of an arm-locking controller and perform an analysis of the expected performance when used with and without laser prestabilization. We observe that the sensor phase changes beneficially near unity-gain frequencies of the arm-locking controller, allowing a factor of 10 more gain than previously believed, without degrading stability. With a time-delay error of 3 ns (equivalent of 1 m interspacecraft ranging error), time-delay interferometry (TDI) is capable of suppressing 300 Hz/{radical}(Hz) of laser frequency noise to the required level. We show that if no interspacecraft laser links fail, arm locking alone surpasses this noise performance for the entire mission. If one interspacecraft laser link fails, arm locking alone will achieve this performance for all but approximately 1 h per year, when the arm length mismatch of the two remaining arms passes through zero. Therefore, the LISA sensitivity can be realized with arm locking and time-delay interferometry only, without any form of prestabilization.« less

  10. A Digital Phase Lock Loop for an External Cavity Diode Laser

    NASA Astrophysics Data System (ADS)

    Wang, Xiao-Long; Tao, Tian-Jiong; Cheng, Bing; Wu, Bin; Xu, Yun-Fei; Wang, Zhao-Ying; Lin, Qiang

    2011-08-01

    A digital optical phase lock loop (OPLL) is implemented to synchronize the frequency and phase between two external cavity diode lasers (ECDL), generating Raman pulses for atom interferometry. The setup involves all-digital phase detection and a programmable digital proportional-integral-derivative (PID) loop in locking. The lock generates a narrow beat-note linewidth below 1 Hz and low phase-noise of 0.03rad2 between the master and slave ECDLs. The lock proves to be stable and robust, and all the locking parameters can be set and optimized on a computer interface with convenience, making the lock adaptable to various setups of laser systems.

  11. Mechanical stress in plates for bridging reconstruction mandibular defects and purposes of double plate reinforcement.

    PubMed

    Hoefert, Sebastian; Taier, Roberto

    2018-05-01

    To evaluate the biomechanical performance of a commercially available bridging plate (2.4) as well as screws and bone simulating the reconstruction of hemimandibular defects and to indicate alternatives of reinforcement to prevent plate fractures either by strength or fatigue. Two common hemimandibular defects are investigated using computed finite element analysis (FEA) approach. Simplified and refined computational models are developed for the geometry of the screw. Conditions of non-locking and locking plate-screw interfaces are considered. Static loads of 120 N are applied. Von Mises stresses and fatigue are calculated. As reinforcement, a second complete or partial plate is placed onto the original plate. Results demonstrate that reconstruction plates are often subjected to excessive stress that may lead to fracture either by strength or by fatigue. An attached complete or partial second plate is able to reduce stress in the plate, in screws and bone so that stress remains below the allowable limit of the materials. A simplified technique of attaching a whole or sectioned second plate onto the original plate can reduce the stress calculated and may reduce the frequency of plate fractures for the patient's comfort, security and financial savings. Copyright © 2018 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.

  12. [Arthrodesis of the shoulder. A new and soft-tissue-sparing technique with a deep locking plate in the supraspinatus fossa].

    PubMed

    Klonz, A; Habermeyer, P

    2007-10-01

    Arthrodesis of the glenohumeral joint is a difficult intervention that involves a relatively high probability of complications. A stable internal fixation and secure consolidation is required. The operation needs to achieve several conditions: thorough denudation of the cartilage and partial decortication of the subchondral bone; good congruence of the corresponding surfaces; compression of the gap by tension screws and lasting stability. For increased primary stability a neutralizing plate is generally used as well as a compression screw. Up to now, the plate has usually been applied starting from the scapular spine and extending across the acromial corner to the humeral shaft. A wide exposure is needed for this procedure; the plate is difficult to shape during the operation and often causes some discomfort because it protrudes at the acromial corner. We present an alternative position of the plate in the supraspinatus fossa, where we have sited a 4.5 mm LCP locking plate (Synthes). The implant is inserted under the acromion, does not cause any discomfort at the acromial corner, and is far easier to shape. When it is used in association with a transarticular compressive screw, the technique results in a very stable situation, which allows physiotherapy from the first day after surgery onward.

  13. Glutathione-facilitated design and fabrication of gold nanoparticle-based logic gates and keypad lock.

    PubMed

    Huang, Zhenzhen; Wang, Haonan; Yang, Wensheng

    2014-07-21

    In this paper, we describe how we developed a simple design and fabrication method for logic gates and a device by using a commercially available tripeptide, namely glutathione (GSH), together with metal ions and disodium ethylenediaminetetraacetate (EDTA) to control the dispersion and aggregation of gold nanoparticles (NPs). With the fast adsorption of GSH on gold NPs and the strong coordination of GSH with metal ions, the addition of GSH and Pb(2+) ions immediately resulted in the aggregation of gold NPs, giving rise to an AND function. Either Pb(2+) or Ba(2+) ions induced the aggregation of gold NPs in the presence of GSH, supporting an OR gate. Based on the fact that EDTA has a strong capacity to bind metal ions, thus preventing the aggregation of gold NPs, an INHIBIT gate was also fabricated. More interestingly, we found that the addition sequence of GSH and Hg(2+) ions influenced the aggregation of gold NPs in a controlled manner, which was used to design a sequential logic gate and a three-input keypad lock for potential use in information security. The GSH strategy addresses concerns of low cost, simple fabrication, versatile design and easy operation, and offers a promising platform for the development of functional logic systems.

  14. Fuel transfer tube quick opening hatch

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meuschke, R. E.; Sherwood, D. G.; Silverblatt, B. L.

    1985-05-28

    A quick opening hatch for use on a transfer tube of a nuclear reactor plant that is adapted to replace the conventional hatch on the transfer tube. A locking ring is provided with a plurality of screw openings that is adapted for connection to the transfer tube, and a hatch cover fitably received within the locking ring for closing-off the transfer tube. To lock the cover to the ring, latches are movably connected with the cover for locking engagement with the locking ring, and a sprocket with a plurality of crank arms is movably connected with the cover and themore » latches for movement thereof into locking engagement with a latch housing on the locking ring for locking the cover to the ring and out of engagement with the latch housing for releasing the cover from the locking ring so as to permit removal of the hatch cover from the locking ring to provide access to the transfer tube. A davit assembly is provided which is connected with the transfer tube and the hatch cover to move the cover away and to provide guidance for closing-off the transfer tube. The locking ring and hatch cover also include cooperating keys and keyways for alignment when closing the transfer tube. The cover is provided with sealing rings and the latch housing and latches include cooperating cam surfaces to provide a tight locking engagement by compressing the sealing rings between the transfer tube and the hatch cover.« less

  15. An analytical and experimental study of injection-locked two-port oscillators

    NASA Technical Reports Server (NTRS)

    Freeman, Jon C.; Downey, Alan N.

    1987-01-01

    A Ku-band IMPATT oscillator with two distinct output power ports was injection-locked alternately at both ports. The transmission locking bandwidth was nearly the same for either port. The lower free running power port had a reflection locking bandwidth that was narrower than its transmission locking one. Just the opposite was found at the other port. A detailed analytical model for two-port injection-locked oscillators is presented, and its results agree quite well with the experiments. A critique of the literature on this topic is included to clear up misconceptions and errors. It is concluded that two-port injection-locked oscillators may prove useful in certain communication systems.

  16. Influences of misalignment of control mirror of axisymmetric-structural CO2 laser on phase locking.

    PubMed

    Xu, Yonggen; Li, Yude; Qiu, Yi; Feng, Ting; Fu, Fuxing; Guo, Wei

    2008-11-20

    Based on the principle of phase locking of an axisymmetric-fold combination CO2 laser under the normal state condition, the mechanisms of phase locking are analyzed when the control mirror is misaligned. Then the overlapping rate (OR) of the mode volume is introduced: the main influences on phase locking are the OR, the average life of the light wave, the root mean square phase error, and the mode coupling coefficient; these influences on phase locking are studied. The distribution of the light intensity reflects the effect of phase locking. It is shown that the misaligned angle has little influence on the phase locking if it is within tolerance.

  17. Mode Locking of Lasers with Atomic Layer Graphene

    DTIC Science & Technology

    2012-07-01

    polarization components. As in order to obtain the vector soliton operation in a mode locked fiber laser no any polarization ...oscilloscope traces of a polarization locked vector soliton operation state. Figure 21: Oscilloscope traces of pulse train in a phase locked vector ... locked vector solitons , where the polarization of the solitons emitted by the laser is fixed, the polarization of the

  18. 46 CFR 154.345 - Air locks.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 5 2014-10-01 2014-10-01 false Air locks. 154.345 Section 154.345 Shipping COAST GUARD....345 Air locks. (a) An air lock may be used for access from a gas-dangerous zone on the weather deck to a gas-safe space. (b) Each air lock must: (1) Consist of two steel doors, at least 1.5 m (4.9 ft...

  19. 46 CFR 154.345 - Air locks.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 5 2012-10-01 2012-10-01 false Air locks. 154.345 Section 154.345 Shipping COAST GUARD....345 Air locks. (a) An air lock may be used for access from a gas-dangerous zone on the weather deck to a gas-safe space. (b) Each air lock must: (1) Consist of two steel doors, at least 1.5 m (4.9 ft...

  20. 46 CFR 154.345 - Air locks.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 5 2013-10-01 2013-10-01 false Air locks. 154.345 Section 154.345 Shipping COAST GUARD....345 Air locks. (a) An air lock may be used for access from a gas-dangerous zone on the weather deck to a gas-safe space. (b) Each air lock must: (1) Consist of two steel doors, at least 1.5 m (4.9 ft...

  1. 46 CFR 154.345 - Air locks.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 5 2011-10-01 2011-10-01 false Air locks. 154.345 Section 154.345 Shipping COAST GUARD....345 Air locks. (a) An air lock may be used for access from a gas-dangerous zone on the weather deck to a gas-safe space. (b) Each air lock must: (1) Consist of two steel doors, at least 1.5 m (4.9 ft...

  2. 46 CFR 154.345 - Air locks.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Air locks. 154.345 Section 154.345 Shipping COAST GUARD....345 Air locks. (a) An air lock may be used for access from a gas-dangerous zone on the weather deck to a gas-safe space. (b) Each air lock must: (1) Consist of two steel doors, at least 1.5 m (4.9 ft...

  3. 75 FR 71104 - Lock Hydro Friends Fund XXXV; FFP Missouri 7, LLC; Dashields Hydro, LLC; Notice of Competing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-22

    .... 13735-000; Project No. 13756-000; Project No. 13779-000] Lock Hydro Friends Fund XXXV; FFP Missouri 7... Soliciting Comments, and Motions To Intervene November 15, 2010. On May 18, 2010, Lock Hydro Friends Fund.... Descriptions of the proposed Dashields Lock and Dam Projects: Lock Hydro Friends Fund XXXV's project (Project...

  4. 75 FR 75999 - Lock + Hydro Friends Fund XlVI; FFP Missouri 17, LLC; Solia 3 Hydroelectric, LLC; Three Rivers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-07

    .... 13754-000; Project No. 13765-000; Project No. 13783-000; Project No. 13790-000] Lock + Hydro Friends..., and Motions To Intervene NOVEMBER 30, 2010. On May 18, 2010, Lock + Hydro Friends Fund XLVI, FFP... proposed Hildebrand Lock & Dam Projects: Lock+ Hydro Friends Fund XLVI's project (Project No. 13734-000...

  5. Evaluation of fish sampling using rotenone in a navigation lock

    USGS Publications Warehouse

    Margraf, F.J.; Knight, C.T.

    2002-01-01

    Annual sampling in locks with rotenone has been a principal means of assessing fish populations in the commercially navigable portions of the Ohio River. Despite extensive use, sampling in locks with rotenone and interpretation of the data obtained have not been adequately evaluated. The purpose of our study was to determine the degree of inter- and intraseasonal variation in lock samples, estimate correction factors (CFs) for fish recovery rates, and compare lock samples to other fish collections from the navigational pools above and below the lock. Lock samples from all seasons had a greater proportion of pelagic and demersal fish than samples from the navigational pools, which contained greater proportions of littoral species. CF for non-recovery of fish were determined. Spring and summer lock collections yielded several more species and estimates of overall fish biomass were an order of magnitude higher than fall collections. Within season variation between lock samples was relatively low; however, variation in lock samples among seasons was high, equivalent to that seen among the annual samples from the 1980s. Thus, single-season sampling may not be adequate, and fall may be the least preferred season.

  6. The strength of polyaxial locking interfaces of distal radius plates.

    PubMed

    Hoffmeier, Konrad L; Hofmann, Gunther O; Mückley, Thomas

    2009-10-01

    Currently available polyaxial locking plates represent the consequent enhancement of fixed-angle, first-generation locking plates. In contrast to fixed-angle locking plates which are sufficiently investigated, the strength of the new polyaxial locking options has not yet been evaluated biomechanically. This study investigates the mechanical strength of single polyaxial interfaces of different volar radius plates. Single screw-plate interfaces of the implants Palmar 2.7 (Königsee Implantate und Instrumente zur Osteosynthese GmbH, Allendorf, Germany), VariAx (Stryker Leibinger GmbH & Co. KG, Freiburg, Germany) und Viper (Integra LifeSciences Corporation, Plainsboro, NJ, USA) were tested by cantilever bending. The strength of 0 degrees, 10 degrees and 20 degrees screw locking angle was obtained during static and dynamic loading. The Palmar 2.7 interfaces showed greater ultimate strength and fatigue strength than the interfaces of the other implants. The strength of the VariAx interfaces was about 60% of Palmar 2.7 in both, static and dynamic loading. No dynamic testing was applied to the Viper plate because of its low ultimate strength. By static loading, an increase in screw locking angle caused a reduction of strength for the Palmar 2.7 and Viper locking interfaces. No influence was observed for the VariAx locking interfaces. During dynamic loading; angulation had no influence on the locking strength of Palmar 2.7. However, reduction of locking strength with increasing screw angulation was observed for VariAx. The strength of the polyaxial locking interfaces differs remarkably between the examined implants. Depending on the implant an increase of the screw locking angle causes a reduction of ultimate or fatigue strength, but not in all cases a significant impact was observed.

  7. UPSTREAM LOCK GATE DETAIL AND DOG HOUSE. NOTE ARM AND ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    UPSTREAM LOCK GATE DETAIL AND DOG HOUSE. NOTE ARM AND GEARING FOR CONTROLLING LOCK GATE. LOOKING WEST SOUTHWEST. - Illinois Waterway, Brandon Road Lock and Dam , 1100 Brandon Road, Joliet, Will County, IL

  8. DOWNSTREAM LOCK GATE DETAIL VIEW WITH DOG HOUSE. NOTE CONTROL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    DOWNSTREAM LOCK GATE DETAIL VIEW WITH DOG HOUSE. NOTE CONTROL ARM AND GEAR FOR GATE. LOOKING NORTHWEST. - Illinois Waterway, Dresden Island Lock and Dam , 7521 North Lock Road, Channahon, Will County, IL

  9. Self-locking degree-4 vertex origami structures

    PubMed Central

    Li, Suyi; Wang, K. W.

    2016-01-01

    A generic degree-4 vertex (4-vertex) origami possesses one continuous degree-of-freedom for rigid folding, and this folding process can be stopped when two of its facets bind together. Such facet-binding will induce self-locking so that the overall structure stays at a pre-specified configuration without additional locking elements or actuators. Self-locking offers many promising properties, such as programmable deformation ranges and piecewise stiffness jumps, that could significantly advance many adaptive structural systems. However, despite its excellent potential, the origami self-locking features have not been well studied, understood, and used. To advance the state of the art, this research conducts a comprehensive investigation on the principles of achieving and harnessing self-locking in 4-vertex origami structures. Especially, for the first time, this study expands the 4-vertex structure construction from single-component to dual-component designs and investigates their self-locking behaviours. By exploiting various tessellation designs, this research discovers that the dual-component designs offer the origami structures with extraordinary attributes that the single-component structures do not have, which include the existence of flat-folded locking planes, programmable locking points and deformability. Finally, proof-of-concept experiments investigate how self-locking can effectively induce piecewise stiffness jumps. The results of this research provide new scientific knowledge and a systematic framework for the design, analysis and utilization of self-locking origami structures for many potential engineering applications. PMID:27956889

  10. Self-locking degree-4 vertex origami structures.

    PubMed

    Fang, Hongbin; Li, Suyi; Wang, K W

    2016-11-01

    A generic degree-4 vertex (4-vertex) origami possesses one continuous degree-of-freedom for rigid folding, and this folding process can be stopped when two of its facets bind together. Such facet-binding will induce self-locking so that the overall structure stays at a pre-specified configuration without additional locking elements or actuators. Self-locking offers many promising properties, such as programmable deformation ranges and piecewise stiffness jumps, that could significantly advance many adaptive structural systems. However, despite its excellent potential, the origami self-locking features have not been well studied, understood, and used. To advance the state of the art, this research conducts a comprehensive investigation on the principles of achieving and harnessing self-locking in 4-vertex origami structures. Especially, for the first time, this study expands the 4-vertex structure construction from single-component to dual-component designs and investigates their self-locking behaviours. By exploiting various tessellation designs, this research discovers that the dual-component designs offer the origami structures with extraordinary attributes that the single-component structures do not have, which include the existence of flat-folded locking planes, programmable locking points and deformability. Finally, proof-of-concept experiments investigate how self-locking can effectively induce piecewise stiffness jumps. The results of this research provide new scientific knowledge and a systematic framework for the design, analysis and utilization of self-locking origami structures for many potential engineering applications.

  11. Acquisition and Tracking Behavior of Phase-Locked Loops

    NASA Technical Reports Server (NTRS)

    Viterbi, A. J.

    1958-01-01

    Phase-locked or APC loops have found increasing applications in recent years as tracking filters, synchronizing devices, and narrowband FM discriminators. Considerable work has been performed to determine the noise-squelching properties of the loop when it is operating in or near phase lock and is functioning as a linear coherent detector. However, insufficient consideration has been devoted to the non-linear behavior of the loop when it is out of lock and in the process of pulling in. Experimental evidence has indicated that there is a strong tendency for phase-locked loops to achieve lock under most circumstances. However, the analysis which has appeared in the literature iis limited to the acquisition of a constant frequency reference signal with only one phase-locked loop filter configuration. This work represents an investigation of frequency acquisition properties of phase-locked loops for a variety of reference-signal behavior and loop configurations

  12. CW injection locking for long-term stability of frequency combs

    NASA Astrophysics Data System (ADS)

    Williams, Charles; Quinlan, Franklyn; Delfyett, Peter J.

    2009-05-01

    Harmonically mode-locked semiconductor lasers with external ring cavities offer high repetition rate pulse trains while maintaining low optical linewidth via long cavity storage times. Continuous wave (CW) injection locking further reduces linewidth and stabilizes the optical frequencies. The output can be stabilized long-term with the help of a modified Pound-Drever-Hall feedback loop. Optical sidemode suppression of 36 dB has been shown, as well as RF supermode noise suppression of 14 dB for longer than 1 hour. In addition to the injection locking of harmonically mode-locked lasers requiring an external frequency source, recent work shows the viability of the injection locking technique for regeneratively mode-locked lasers, or Coupled Opto-Electronic Oscillators (COEO).

  13. 75 FR 5071 - Mississippi L&D 21, LLC, Mississippi River No. 21 Hydropower Company Lock + TM

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-01

    ... Lock + \\TM\\ Hydro Friends Fund XXXII, LLC; Notice of Preliminary Permit Applications Accepted for..., Lock + TM Hydro Friends Fund XXXII, LLC (Lock + Hydro) filed an application for a preliminary permit...

  14. 49 CFR 236.376 - Mechanical locking.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Mechanical locking. 236.376 Section 236.376 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... and Tests § 236.376 Mechanical locking. Mechanical locking in interlocking machine shall be tested...

  15. 49 CFR 236.761 - Locking, electric.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking, electric. 236.761 Section 236.761 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Locking, electric. The combination of one or more electric locks and controlling circuits by means of...

  16. 49 CFR 236.761 - Locking, electric.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Locking, electric. 236.761 Section 236.761 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Locking, electric. The combination of one or more electric locks and controlling circuits by means of...

  17. 49 CFR 236.105 - Electric lock.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Electric lock. 236.105 Section 236.105 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION...: All Systems Inspections and Tests; All Systems § 236.105 Electric lock. Electric lock, except forced...

  18. 49 CFR 236.105 - Electric lock.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Electric lock. 236.105 Section 236.105 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION...: All Systems Inspections and Tests; All Systems § 236.105 Electric lock. Electric lock, except forced...

  19. 49 CFR 236.761 - Locking, electric.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Locking, electric. 236.761 Section 236.761 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Locking, electric. The combination of one or more electric locks and controlling circuits by means of...

  20. 49 CFR 236.761 - Locking, electric.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Locking, electric. 236.761 Section 236.761 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Locking, electric. The combination of one or more electric locks and controlling circuits by means of...

  1. 49 CFR 236.761 - Locking, electric.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Locking, electric. 236.761 Section 236.761 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Locking, electric. The combination of one or more electric locks and controlling circuits by means of...

  2. 49 CFR 236.105 - Electric lock.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Electric lock. 236.105 Section 236.105 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION...: All Systems Inspections and Tests; All Systems § 236.105 Electric lock. Electric lock, except forced...

  3. 49 CFR 236.105 - Electric lock.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Electric lock. 236.105 Section 236.105 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION...: All Systems Inspections and Tests; All Systems § 236.105 Electric lock. Electric lock, except forced...

  4. 49 CFR 236.105 - Electric lock.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Electric lock. 236.105 Section 236.105 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION...: All Systems Inspections and Tests; All Systems § 236.105 Electric lock. Electric lock, except forced...

  5. Lock For Valve Stem

    NASA Technical Reports Server (NTRS)

    Burley, Richard K.; Guirguis, Kamal S.

    1991-01-01

    Simple, cheap device locks valve stem so its setting cannot be changed by unauthorized people. Device covers valve stem; cover locked in place with standard padlock. Valve lock made of PVC pipe and packing band. Shears, drill or punch, and forming rod only tools needed.

  6. 49 CFR 236.762 - Locking, indication.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking, indication. 236.762 Section 236.762 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Locking, indication. Electric locking which prevents manipulation of levers that would result in an unsafe...

  7. 49 CFR 236.760 - Locking, approach.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking, approach. 236.760 Section 236.760 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Locking, approach. Electric locking effective while a train is approaching, within a specified distance, a...

  8. 49 CFR 236.769 - Locking, traffic.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking, traffic. 236.769 Section 236.769 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Locking, traffic. Electric locking which prevents the manipulation of levers or other devices for changing...

  9. Fast flux locked loop

    DOEpatents

    Ganther, Jr., Kenneth R.; Snapp, Lowell D.

    2002-09-10

    A flux locked loop for providing an electrical feedback signal, the flux locked loop employing radio-frequency components and technology to extend the flux modulation frequency and tracking loop bandwidth. The flux locked loop of the present invention has particularly useful application in read-out electronics for DC SQUID magnetic measurement systems, in which case the electrical signal output by the flux locked loop represents an unknown magnetic flux applied to the DC SQUID.

  10. Observation of High-Order Polarization-Locked Vector Solitons in a Fiber Laser

    NASA Astrophysics Data System (ADS)

    Tang, D. Y.; Zhang, H.; Zhao, L. M.; Wu, X.

    2008-10-01

    We report on the experimental observation of a new type of polarization-locked vector soliton in a passively mode-locked fiber laser. The vector soliton is characterized by the fact that not only are the two orthogonally polarized soliton components phase-locked, but also one of the components has a double-humped intensity profile. Multiple phase-locked high-order vector solitons with identical soliton parameters and harmonic mode locking of the vector solitons were also obtained in the laser. Numerical simulations confirmed the existence of stable high-order vector solitons in the fiber laser.

  11. Observation of high-order polarization-locked vector solitons in a fiber laser.

    PubMed

    Tang, D Y; Zhang, H; Zhao, L M; Wu, X

    2008-10-10

    We report on the experimental observation of a new type of polarization-locked vector soliton in a passively mode-locked fiber laser. The vector soliton is characterized by the fact that not only are the two orthogonally polarized soliton components phase-locked, but also one of the components has a double-humped intensity profile. Multiple phase-locked high-order vector solitons with identical soliton parameters and harmonic mode locking of the vector solitons were also obtained in the laser. Numerical simulations confirmed the existence of stable high-order vector solitons in the fiber laser.

  12. A racetrack mode-locked silicon evanescent laser.

    PubMed

    Fang, Alexander W; Koch, Brian R; Gan, Kian-Giap; Park, Hyundai; Jones, Richard; Cohen, Oded; Paniccia, Mario J; Blumenthal, Daniel J; Bowers, John E

    2008-01-21

    By utilizing a racetrack resonator topography, an on-chip mode locked silicon evanescent laser (ML-SEL) is realized that is independent of facet polishing. This enables integration with other devices on silicon and precise control of the ML-SEL's repetition rate through lithographic definition of the cavity length. Both passive and hybrid mode-locking have been achieved with transform limited, 7 ps pulses emitted at a repetition rate of 30 GHz. Jitter and locking range are measured under hybrid mode locking with a minimum absolute jitter and maximum locking range of 364 fs, and 50 MHz, respectively.

  13. Blind-Side, High-Temperature Fastener Lock

    NASA Technical Reports Server (NTRS)

    Matza, E. C.; While, D. M.

    1985-01-01

    Formed-in-place staple provides positive mechanical lock. Post-supported, advanced carbon/carbon standoff panels, currently under consideration as alternate thermal protection system for Shuttle orbiter, locking feature applicable to temperatures of 1,600 degrees F (870 degrees C) and higher and employable after panel installed, resulting in blind application. Blind-side locking technique employs wire staple inserted into grooves in post, formed in place by ramped portion of post grooves. This splays out wire ends that move into castellated end of grommet, mechanically locking post and grommet against relative rotation. Splayed ends provide mechanical lock to prevent wire from falling out.

  14. RxPATROL: a Web-based tool for combating pharmacy theft.

    PubMed

    Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy

    2009-01-01

    To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.

  15. Process Sensitivity, Performance, and Direct Verification Testing of Adhesive Locking Features

    NASA Technical Reports Server (NTRS)

    Golden, Johnny L.; Leatherwood, Michael D.; Montoya, Michael D.; Kato, Ken A.; Akers, Ed

    2012-01-01

    Phase I: The use of adhesive locking features or liquid locking compounds (LLCs) (e.g., Loctite) as a means of providing a secondary locking feature has been used on NASA programs since the Apollo program. In many cases Loctite was used as a last resort when (a) self-locking fasteners were no longer functioning per their respective drawing specification, (b) access was limited for removal & replacement, or (c) replacement could not be accomplished without severe impact to schedule. Long-term use of Loctite became inevitable in cases where removal and replacement of worn hardware was not cost effective and Loctite was assumed to be fully cured and working. The NASA Engineering & Safety Center (NESC) and United Space Alliance (USA) recognized the need for more extensive testing of Loctite grades to better understand their capabilities and limitations as a secondary locking feature. These tests, identified as Phase I, were designed to identify processing sensitivities, to determine proper cure time, the correct primer to use on aerospace nutplate, insert and bolt materials such as A286 and MP35N, and the minimum amount of Loctite that is required to achieve optimum breakaway torque values. The .1900-32 was the fastener size tested, due to wide usage in the aerospace industry. Three different grades of Loctite were tested. Results indicate that, with proper controls, adhesive locking features can be successfully used in the repair of locking features and should be considered for design. Phase II: Threaded fastening systems used in aerospace programs typically have a requirement for a redundant locking feature. The primary locking method is the fastener preload and the traditional redundant locking feature is a self-locking mechanical device that may include deformed threads, non-metallic inserts, split beam features, or other methods that impede movement between threaded members. The self-locking resistance of traditional locking features can be directly verified during assembly by measuring the dynamic prevailing torque. Adhesive locking features or LLCs are another method of providing redundant locking, but a direct verification method has not been used in aerospace applications to verify proper installation when using LLCs because of concern for damage to the adhesive bond. The reliability of LLCs has also been questioned due to failures observed during testing with coupons for process verification, although the coupon failures have often been attributed to a lack of proper procedures. It is highly desirable to have a direct method of verifying the LLC cure or bond integrity. The purpose of the Phase II test program was to determine if the torque applied during direct verification of an adhesive locking feature degrades that locking feature. This report documents the test program used to investigate the viability of such a direct verification method. Results of the Phase II testing were positive, and additional investigation of direct verification of adhesive locking features is merited.

  16. Fastener Retention Requirements and Practices in Spaceflight Hardware

    NASA Technical Reports Server (NTRS)

    Dasgupta, Rajib

    2004-01-01

    This presentation reviews the requirements for safety critical fasteners in spaceflight hardware. Included in the presentation are design guidelines and information for Locking Helicoils, key locked inserts and thinwalled inserts, self locking screws and bolts. locknuts, and a locking adhesives, Loctite and Vibratite.

  17. 30 CFR 56.12068 - Locking transformer enclosures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Locking transformer enclosures. 56.12068 Section 56.12068 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND... § 56.12068 Locking transformer enclosures. Transformer enclosures shall be kept locked against...

  18. 30 CFR 56.12068 - Locking transformer enclosures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Locking transformer enclosures. 56.12068 Section 56.12068 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND... § 56.12068 Locking transformer enclosures. Transformer enclosures shall be kept locked against...

  19. 30 CFR 56.12068 - Locking transformer enclosures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Locking transformer enclosures. 56.12068 Section 56.12068 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND... § 56.12068 Locking transformer enclosures. Transformer enclosures shall be kept locked against...

  20. 30 CFR 56.12068 - Locking transformer enclosures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Locking transformer enclosures. 56.12068 Section 56.12068 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND... § 56.12068 Locking transformer enclosures. Transformer enclosures shall be kept locked against...

  1. 30 CFR 56.12068 - Locking transformer enclosures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Locking transformer enclosures. 56.12068 Section 56.12068 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND... § 56.12068 Locking transformer enclosures. Transformer enclosures shall be kept locked against...

  2. 49 CFR 236.378 - Time locking.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Time locking. 236.378 Section 236.378 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... and Tests § 236.378 Time locking. Time locking shall be tested when placed in service and thereafter...

  3. 49 CFR 236.378 - Time locking.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Time locking. 236.378 Section 236.378 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... and Tests § 236.378 Time locking. Time locking shall be tested when placed in service and thereafter...

  4. 12. Wayne Chandler, Photographer, July 2000 View to northwest. Poe ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. Wayne Chandler, Photographer, July 2000 View to northwest. Poe Lock at center. Davis Lock at center right and Sabin Lock at far right - St. Mary's Falls Canal, Soo Locks, St. Mary's River at Falls, Sault Ste. Marie, Chippewa County, MI

  5. 49 CFR 236.767 - Locking, route.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking, route. 236.767 Section 236.767 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Locking, route. Electric locking, effective when a train passes a signal displaying an aspect for it to...

  6. Digital multi-channel high resolution phase locked loop for surveillance radar systems

    NASA Astrophysics Data System (ADS)

    Rizk, Mohamed; Shaaban, Shawky; Abou-El-Nadar, Usama M.; Hafez, Alaa El-Din Sayed

    This paper present a multi-channel, high resolution, fast lock phase locked loop (PLL) for surveillance radar applications. Phase detector based PLLs are simple to design, suffer no systematic phase error, and can run at the highest speed. Reducing loop gain can proportionally improve jitter performance, but also reduces locking time and pull-in range. The proposed system is based on digital process and control the error signal to the voltage controlled oscillator (VCO) adaptively to control its gain in order to achieve fast lock times while improving in lock jitter performance. Under certain circumstances the design also improves the frequency agility capability of the radar system. The results show a fast lock, high resolution PLL with transient time less than 10 µ sec which is suitable to radar applications.

  7. The best location for proximal locking screw for femur interlocking nailing: A biomechanical study

    PubMed Central

    Karaarslan, Ahmet A; Karakaşli, Ahmet; Aycan, Hakan; Çeçen, Berivan; Yildiz, Didem Venüs; Sesli, Erhan

    2016-01-01

    Background: Proximal locking screw deformation and screw fracture is a frequently seen problem for femur interlocking nailing that affects fracture healing. We realized that there is lack of literature for the right level for the proximal locking screw. We investigated the difference of locking screw bending resistance between the application of screws on different proximal femoral levels. Materials and Methods: We used a total of 80 proximal locking screws for eight groups, 10 screws for each group. Three-point bending tests were performed on four types of screws in two different trochanteric levels (the lesser trochanter and 20 mm proximal). We determined the yield points at three-point bending tests that a permanent deformation started in the locking screws using an axial compression testing machine. Results: The mean yield point value of 5 mm threaded locking screws applied 20 mm proximal of lesser trochanter was 1022 ± 49 (range 986–1057) (mean ± standard deviation, 95% confidence interval). On the other hand, the mean yield point value of the same type of locking screws applied on the lesser trochanteric level was 2089 ± 249 (range 1911–2268). Which means 103% increase of screw resistance between two levels (P = 0.000). In all screw groups, on the lesser trochanter line we determined 98–174% higher than the yield point values of the same type of locking screws in comparison with 20 mm proximal to the lesser trochanter (P = 0.000). Conclusion: According to our findings, there is twice as much difference in locking screw bending resistance between these two application levels. To avoid proximal locking screw deformation, locking screws should be placed in the level of the lesser trochanter in nailing of 1/3 middle and distal femur fractures. PMID:26955183

  8. Phase-locked loops. [in analog and digital circuits communication system

    NASA Technical Reports Server (NTRS)

    Gupta, S. C.

    1975-01-01

    An attempt to systematically outline the work done in the area of phase-locked loops which are now used in modern communication system design is presented. The analog phase-locked loops are well documented in several books but discrete, analog-digital, and digital phase-locked loop work is scattered. Apart from discussing the various analysis, design, and application aspects of phase-locked loops, a number of references are given in the bibliography.

  9. Performance Monitoring System: Summary of Lock Statistics. Revision 1.

    DTIC Science & Technology

    1985-12-01

    2751 84 4057 4141 526 798 18 1342 5727 19 5523 3996 4587 8583 1056 1630 35 2721 6536LOCK A DAMI 2 AUXILIARY I Ins NO DATA RECORDD FOR THIS LOCK- " LOCK I...TOTAL (KTOMS) ’ - (AVt OPNP ETC) ’’ ,q [ " ARKANSAS RIVER "" FORRELL LOCK IP 7A/3TRC 9/N83 UPBOUID STATISTICS ISO 53 42 M6 553 356 909 221 41 21 M8

  10. Preliminary results toward injection locking of an incoherent laser array

    NASA Technical Reports Server (NTRS)

    Daher, J.

    1986-01-01

    The preliminary results of phase locking an incoherent laser array to a master source in an attempt to achieve coherent operation are presented. The techniques necessary to demonstrate phase locking are described along with some topics for future consideration. As expected, the results obtained suggest that injection locking of an array, where the spacing between adjacent longitudinal modes of its elements is significantly larger than the locking bandwidth, may not be feasible.

  11. Montgomery Point Lock and Dam, White River, Arkansas

    DTIC Science & Technology

    2016-01-01

    ER D C/ CH L TR -1 6- 1 Monitoring Completed Navigation Projects (MCNP) Program Montgomery Point Lock and Dam, White River, Arkansas Co...Navigation Projects (MCNP) Program ERDC/CHL TR-16-1 January 2016 Montgomery Point Lock and Dam, White River, Arkansas Allen Hammack, Michael Winkler, and...20314-1000 Under MCNP Work Unit: Montgomery Point Lock and Dam, White River, Arkansas ERDC/CHL TR-16-1 ii Abstract Montgomery Point Lock and

  12. Biomechanical comparison of double-row locking plates versus single- and double-row non-locking plates in a comminuted metacarpal fracture model.

    PubMed

    Gajendran, Varun K; Szabo, Robert M; Myo, George K; Curtiss, Shane B

    2009-12-01

    Open or unstable metacarpal fractures frequently require open reduction and internal fixation. Locking plate technology has improved fixation of unstable fractures in certain settings. In this study, we hypothesized that there would be a difference in strength of fixation using double-row locking plates compared with single- and double-row non-locking plates in comminuted metacarpal fractures. We tested our hypothesis in a gap metacarpal fracture model simulating comminution using fourth-generation, biomechanical testing-grade composite sawbones. The metacarpals were divided into 6 groups of 15 bones each. Groups 1 and 4 were plated with a standard 6-hole, 2.3-mm plate in AO fashion. Groups 2 and 5 were plated with a 6-hole double-row 3-dimensional non-locking plate with bicortical screws aimed for convergence. Groups 3 and 6 were plated with a 6-hole double-row 3-dimensional locking plate with unicortical screws. The plated metacarpals were then tested to failure against cantilever apex dorsal bending (groups 1-3) and torsion (groups 4-6). The loads to failure in groups 1 to 3 were 198 +/- 18, 223 +/- 29, and 203 +/- 19 N, respectively. The torques to failure in groups 4 to 6 were 2,033 +/- 155, 3,190 +/- 235, and 3,161 +/- 268 N mm, respectively. Group 2 had the highest load to failure, whereas groups 5 and 6 shared the highest torques to failure (p < .05). Locking and non-locking double-row plates had equivalent bending and torsional stiffness, significantly higher than observed for the single-row non-locking plate. No other statistical differences were noted between groups. When subjected to the physiologically relevant forces of apex dorsal bending and torsion in a comminuted metacarpal fracture model, double-row 3-dimensional non-locking plates provided superior stability in bending and equivalent stability in torsion compared with double-row 3-dimensional locking plates, whereas single-row non-locking plates provided the least stability.

  13. Lock-in in forced vibration of a circular cylinder

    NASA Astrophysics Data System (ADS)

    Kumar, Samvit; Navrose, Mittal, Sanjay

    2016-11-01

    The phenomenon of lock-in/synchronization in uniform flow past an oscillating cylinder is investigated via a stabilized finite element method at Re = 100. Computations are carried out for various amplitudes and frequencies of cylinder oscillation to accurately obtain the boundary of the lock-in regime. Results from earlier studies show a significant scatter in the lock-in boundary. The scatter might be an outcome of the difference in data collection or the use of a different criterion for identifying lock-in. A new criterion for lock-in is proposed, wherein the following two conditions are to be satisfied. (i) The most dominant frequency in the power spectrum of lift coefficient matches the frequency of cylinder oscillation (fy) and (ii) other peaks in the power spectrum, if any, are present only at super-harmonics of fy. Utilizing this criterion, three flow regimes are identified on the frequency-amplitude plane: lock-in, transition, and no lock-in. The behaviour of the wake is also investigated by examining the power spectra of the velocity traces at various locations downstream of the cylinder. Wake-lock-in is observed during lock-in. A wake-transition regime is identified wherein the near wake, up to a certain streamwise location, is in a lock-in state while the downstream region is in a desynchronized state. For a fixed fy, the location beyond which the wake is desynchronized moves downstream as the amplitude of oscillation is increased. The proposed criterion for lock-in addresses the wide scatter in the boundary of the lock-in regime among earlier studies. Energy transfer from the fluid to the structure, per cycle of cylinder oscillation, is computed from the data for forced vibration. The data is utilized to generate iso-energy transfer contours in the frequency-amplitude plane. The free vibration response with zero structural damping is found to be in very good agreement with the contour corresponding to zero energy transfer.

  14. 49 CFR 236.387 - Movable bridge locking.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Movable bridge locking. 236.387 Section 236.387 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... and Tests § 236.387 Movable bridge locking. Movable bridge locking shall be tested at least once a...

  15. 76 FR 67174 - Arkansas Electric Cooperative Corp., Riverbank Hydro No. 9 LLC, Solia 3 Hydroelectric LLC, Lock...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-31

    ... Hydroelectric LLC, Lock Hydro Friends Fund XLV, FFP Project 2 LLC; Notice of Competing Preliminary Permit... (Riverbank) and Solia 3 Hydroelectric LLC (Solia) and on May 3, 2011, Lock Hydro Friends Fund XLV (Lock Hydro...

  16. 49 CFR 236.387 - Movable bridge locking.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Movable bridge locking. 236.387 Section 236.387 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... and Tests § 236.387 Movable bridge locking. Movable bridge locking shall be tested at least once a...

  17. Physics and Control of Locked Modes in the DIII-D Tokamak

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Volpe, Francesco

    This Final Technical Report summarizes an investigation, carried out under the auspices of the DOE Early Career Award, of the physics and control of non-rotating magnetic islands (“locked modes”) in tokamak plasmas. Locked modes are one of the main causes of disruptions in present tokamaks, and could be an even bigger concern in ITER, due to its relatively high beta (favoring the formation of Neoclassical Tearing Mode islands) and low rotation (favoring locking). For these reasons, this research had the goal of studying and learning how to control locked modes in the DIII-D National Fusion Facility under ITER-relevant conditions ofmore » high pressure and low rotation. Major results included: the first full suppression of locked modes and avoidance of the associated disruptions; the demonstration of error field detection from the interaction between locked modes, applied rotating fields and intrinsic errors; the analysis of a vast database of disruptive locked modes, which led to criteria for disruption prediction and avoidance.« less

  18. Morbus-Locke's early essay on disease.

    PubMed

    Walmsley, J

    2000-01-01

    John Locke engaged in a systematic study of medicine from the late 1650's. In this period he acquainted himself with the three main competing natural philosophical theories of the time -Galenism, Paracelsianism and Mechanism. He was particularly interested in the work of Sennert, Helmont and Doyle. In 1666, just after the publication of Boyle's The Origine of Formes and Qualities, Locke wrote a short paper entitled Morbus. This paper gave Locke's own view of the nature of disease. Locke went out of his way to criticise Boyle's attempts to give mechanical explanations for biological phenomena. He endorsed Helmont's theory that disease was caused by "ferments" and "Archei" and re-introduced Galenic temperaments as factors of susceptibility in seminal diseases. Locke did not endorse a mechanical corpuscularianism at this stage in his career, when his contact with Boyle was most frequent. Consequently, Locke's espousal of the corpuscular philosophy in the Essay cannot be attributed to Locke's association with Boyle at this time.

  19. A magnetorheological fluid locking device

    NASA Astrophysics Data System (ADS)

    Kavlicoglu, Barkan; Liu, Yanming

    2011-04-01

    A magnetorheological fluid (MRF) device is designed to provide a static locking force caused by the operation of a controllable MRF valve. The intent is to introduce an MRF device which provides the locking force of a fifth wheel coupler while maintaining the "powerless" locking capability when required. A passive magnetic field supplied by a permanent magnet provides a powerless locking resistance force. The passively closed MRF valve provides sufficient reaction force to eliminate axial displacement to a pre-defined force value. Unlocking of the device is provided by means of an electromagnet which re-routes the magnetic field distribution along the MR valve, and minimizes the resistance. Three dimensional electromagnetic finite element analyses are performed to optimize the MRF lock valve performance. The MRF locking valve is fabricated and tested for installation on a truck fifth wheel application. An experimental setup, resembling actual working conditions, is designed and tests are conducted on vehicle interface schemes. The powerless-locking capacity and the unlocking process with minimal resistance are experimentally demonstrated.

  20. Numerical investigation into the injection-locking phenomena of gain switched lasers for optical frequency comb generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ó Dúill, Sean P., E-mail: sean.oduill@dcu.ie; Anandarajah, Prince M.; Zhou, Rui

    2015-05-25

    We present detailed numerical simulations of the laser dynamics that describe optical frequency comb formation by injection-locking a gain-switched laser. The typical rate equations for semiconductor lasers including stochastic carrier recombination and spontaneous emission suffice to show the injection-locking behavior of gain switched lasers, and we show how the optical frequency comb evolves starting from the free-running state, right through the final injection-locked state. Unlike the locking of continuous wave lasers, we show that the locking range for gain switched lasers is considerably greater because injection locking can be achieved by injecting at frequencies close to one of the combmore » lines. The quality of the comb lines is formally assessed by calculating the frequency modulation (FM)-noise spectral density and we show that under injection-locking conditions the FM-noise spectral density of the comb lines tend to that of the maser laser.« less

  1. External Tank (ET) Bipod Fitting Bolted Attachment Locking Insert Performance

    NASA Technical Reports Server (NTRS)

    Larsen, Curtis E.; Wilson, Tim R.; Elliott, Kenny B.; Raju, Ivatury S.; McManamen, John

    2008-01-01

    Following STS-107, the External Tank (ET) Project implemented corrective actions and configuration changes at the ET bipod fitting. Among the corrective actions, the existing bolt lock wire which provided resistance to potential bolt rotation was removed. The lock wire removal was because of concerns with creating voids during foam application and potential for lock wire to become debris. The bolts had been previously lubricated to facilitate assembly but, because of elimination of the lock wire, the ET Project wanted to enable the locking feature of the insert. Thus, the lubrication was removed from bolt threads and instead applied to the washer under the bolt head. Lubrication is necessary to maximize joint pre-load while remaining within the bolt torque specification. The locking feature is implemented by thread crimping in at four places in the insert. As the bolt is torqued into the insert the bolt threads its way past the crimped parts of the insert. This provides the locking of the bolt, as torque is required to loosen the joint after clamping.

  2. Automatic NMR field-frequency lock-pulsed phase locked loop approach.

    PubMed

    Kan, S; Gonord, P; Fan, M; Sauzade, M; Courtieu, J

    1978-06-01

    A self-contained deuterium frequency-field lock scheme for a high-resolution NMR spectrometer is described. It is based on phase locked loop techniques in which the free induction decay signal behaves as a voltage-controlled oscillator. By pulsing the spins at an offset frequency of a few hundred hertz and using a digital phase-frequency discriminator this method not only eliminates the usual phase, rf power, offset adjustments needed in conventional lock systems but also possesses the automatic pull-in characteristics that dispense with the use of field sweeps to locate the NMR line prior to closure of the lock loop.

  3. Homodyne locking of a squeezer.

    PubMed

    Heurs, M; Petersen, I R; James, M R; Huntington, E H

    2009-08-15

    We report on the successful implementation of an approach to locking the frequencies of an optical parametric oscillator (OPO)-based squeezed-vacuum source and its driving laser. The technique allows the simultaneous measurement of the phase shifts induced by a cavity, which may be used for the purposes of frequency locking, as well as the simultaneous measurement of the sub-quantum-noise-limited (sub-QNL) phase quadrature output of the OPO. The homodyne locking technique is cheap, easy to implement, and has the distinct advantage that subsequent homodyne measurements are automatically phase locked. The homodyne locking technique is also unique in that it is a sub-QNL frequency discriminator.

  4. Locking support for nuclear fuel assemblies

    DOEpatents

    Ledin, Eric

    1980-01-01

    A locking device for supporting and locking a nuclear fuel assembly within a cylindrical bore formed by a support plate, the locking device including a support and locking sleeve having upwardly extending fingers forming wedge shaped contact portions arranged for interaction between an annular tapered surface on the fuel assembly and the support plate bore as well as downwardly extending fingers having wedge shaped contact portions arranged for interaction between an annularly tapered surface on the support plate bore and the fuel assembly whereby the sleeve tends to support and lock the fuel assembly in place within the bore by its own weight while facilitating removal and/or replacement of the fuel assembly.

  5. Quasi-regenerative mode locking in a compact all-polarisation-maintaining-fibre laser

    NASA Astrophysics Data System (ADS)

    Nyushkov, B. N.; Ivanenko, A. V.; Kobtsev, S. M.; Pivtsov, V. S.; Farnosov, S. A.; Pokasov, P. V.; Korel, I. I.

    2017-12-01

    A novel technique of mode locking in erbium-doped all-polarisation-maintaining-fibre laser has been developed and preliminary investigated. The proposed quasi-regenerative technique combines the advantages of conventional active mode locking (when an intracavity modulator is driven by an independent RF oscillator) and regenerative mode locking (when a modulator is driven by an intermode beat signal from the laser itself). This scheme is based on intracavity intensity modulation driven by an RF oscillator being phase-locked to the actual intermode frequency of the laser. It features also possibilities of operation at multiple frequencies and harmonic mode-locking operation.

  6. 49 CFR 236.705 - Bar, locking.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Bar, locking. 236.705 Section 236.705..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.705 Bar, locking. A bar in an interlocking machine to which the locking dogs are attached. ...

  7. LOCK, DOG HOUSE, CONTROL STATION, DAM GATE, MANEUVER BOAT No. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    LOCK, DOG HOUSE, CONTROL STATION, DAM GATE, MANEUVER BOAT No. 1, AND DAM. NOTE LOWER LOCK GATE IN FOREGROUND. LOOKING NORTH NORTHEAST. - Illinois Waterway, La Grange Lock and Dam, 3/4 mile south of Country 795N at Illinois River, Versailles, Brown County, IL

  8. 49 CFR 236.410 - Locking, hand-operated switch; requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Locking, hand-operated switch; requirements. 236... Traffic Control Systems Standards § 236.410 Locking, hand-operated switch; requirements. (a) Each hand-operated switch in main track shall be locked either electrically or mechanically in normal position...

  9. 49 CFR 236.775 - Movement, switch-and-lock.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Movement, switch-and-lock. 236.775 Section 236.775... Movement, switch-and-lock. A device, the complete operation of which performs the three functions of unlocking, operating and locking a switch, movable-point frog or derail. ...

  10. 49 CFR 236.410 - Locking, hand-operated switch; requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking, hand-operated switch; requirements. 236... Traffic Control Systems Standards § 236.410 Locking, hand-operated switch; requirements. (a) Each hand-operated switch in main track shall be locked either electrically or mechanically in normal position...

  11. 49 CFR 236.410 - Locking, hand-operated switch; requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Locking, hand-operated switch; requirements. 236... Traffic Control Systems Standards § 236.410 Locking, hand-operated switch; requirements. (a) Each hand-operated switch in main track shall be locked either electrically or mechanically in normal position...

  12. 49 CFR 236.775 - Movement, switch-and-lock.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Movement, switch-and-lock. 236.775 Section 236.775... Movement, switch-and-lock. A device, the complete operation of which performs the three functions of unlocking, operating and locking a switch, movable-point frog or derail. ...

  13. 49 CFR 236.775 - Movement, switch-and-lock.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Movement, switch-and-lock. 236.775 Section 236.775... Movement, switch-and-lock. A device, the complete operation of which performs the three functions of unlocking, operating and locking a switch, movable-point frog or derail. ...

  14. 49 CFR 236.410 - Locking, hand-operated switch; requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Locking, hand-operated switch; requirements. 236... Traffic Control Systems Standards § 236.410 Locking, hand-operated switch; requirements. (a) Each hand-operated switch in main track shall be locked either electrically or mechanically in normal position...

  15. 49 CFR 236.775 - Movement, switch-and-lock.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Movement, switch-and-lock. 236.775 Section 236.775... Movement, switch-and-lock. A device, the complete operation of which performs the three functions of unlocking, operating and locking a switch, movable-point frog or derail. ...

  16. 49 CFR 236.410 - Locking, hand-operated switch; requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Locking, hand-operated switch; requirements. 236... Traffic Control Systems Standards § 236.410 Locking, hand-operated switch; requirements. (a) Each hand-operated switch in main track shall be locked either electrically or mechanically in normal position...

  17. 49 CFR 236.768 - Locking, time.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Locking, time. 236.768 Section 236.768... Locking, time. A method of locking, either mechanical or electrical, which, after a signal has been caused to display an aspect to proceed, prevents, until after the expiration of a predetermined time...

  18. 49 CFR 236.768 - Locking, time.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Locking, time. 236.768 Section 236.768... Locking, time. A method of locking, either mechanical or electrical, which, after a signal has been caused to display an aspect to proceed, prevents, until after the expiration of a predetermined time...

  19. 9. VIEW NORTH, EXCAVATED LOCK FROM WATER STREET (Numbers painted ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    9. VIEW NORTH, EXCAVATED LOCK FROM WATER STREET (Numbers painted on stones for reconstruction purposes) - Bald Eagle Cross-Cut Canal Lock, North of Water Street along West Branch of Susquehanna River South bank, 500 feet East of Jay Street Bridge, Lock Haven, Clinton County, PA

  20. Observation of Polarization-Locked Vector Solitons in an Optical Fiber

    NASA Astrophysics Data System (ADS)

    Cundiff, S. T.; Collings, B. C.; Akhmediev, N. N.; Soto-Crespo, J. M.; Bergman, K.; Knox, W. H.

    1999-05-01

    We observe polarization-locked vector solitons in a mode-locked fiber laser. Temporal vector solitons have components along both birefringent axes. Despite different phase velocities due to linear birefringence, the relative phase of the components is locked at +/-π/2. The value of +/-π/2 and component magnitudes agree with a simple analysis of the Kerr nonlinearity. These fragile phase-locked vector solitons have been the subject of much theoretical conjecture, but have previously eluded experimental observation.

  1. Navy Supplement to the DOD Dictionary of Military and Associated Terms

    DTIC Science & Technology

    2011-04-01

    light harpoon landing restraint system LI interference level LI/ LO lock-in/lock-out LIA laser illuminator assembly LIC low-intensity conflict lidar...monitoring system LMSR large, medium-speed roll-on/roll-off (ship) LN legalman (USN rating) LND land LNO liaison officer LO locked open; low...observable; lubricating oil fill, transfer and purification LO /LI lock-out/lock-in LO / LO lift-on/lift-off LOA letter of approval; letter of authorization

  2. Navy Supplement to the DOD Dictionary of Military and Associated Terms

    DTIC Science & Technology

    2012-06-01

    rate LI interference level LI/ LO lock-in/lock-out LIA laser illuminator assembly LIC low-intensity conflict lidar laser identification, detection, and...liaison officer LO locked open; low observable; lubricating oil fill, transfer and purification LO /LI lock-out/lock-in LO / LO lift-on/lift-off LOA letter...aid to navigation LOS launch on search; law of the sea; line of sight; line of sound; lubricating oil service, main LOT letter of transmittal LOTS

  3. Law enforcement officers' opinions about gun locks: anchors on life jackets?

    PubMed Central

    Coyne-Beasley, T; Johnson, R

    2001-01-01

    Objectives—One way law enforcement officers support firearm safety is by promoting the use of gun locks. This investigation examined law enforcement officers' willingness to use gun locks on their own guns, as well as their opinions regarding gun locks in general. Setting—Law enforcement officers from an urban agency in the southern region of the United States. Methods—Free keyed cable gun locks were distributed to all law enforcement officers in one agency who wanted one, and then an anonymous questionnaire survey was conducted about their subsequent use of, and attitudes toward, these devices. Results—About half of the 207 officers collected gun locks (n=103). Nearly three quarters (73%) completed and returned the questionnaire. Two thirds reported that they were not using the gun lock they collected (65%), and over half disagreed that gun lock use should be required (56%). Very few cited any actual or potential technical problems with the device. An important reason given for non-use of gun locks related to being able to access the weapon quickly in case of an emergency. Conclusions—The findings highlight the need for further investigation into law enforcement officers' attitudes toward gun locks, the degree to which their attitudes affect their firearm safety counseling, and the need to develop a gun safety device that can be disengaged quickly. PMID:11565984

  4. Numerical simulation of passively mode-locked fiber laser based on semiconductor optical amplifier

    NASA Astrophysics Data System (ADS)

    Yang, Jingwen; Jia, Dongfang; Zhang, Zhongyuan; Chen, Jiong; Liu, Tonghui; Wang, Zhaoying; Yang, Tianxin

    2013-03-01

    Passively mode-locked fiber laser (MLFL) has been widely used in many applications, such as optical communication system, industrial production, information processing, laser weapons and medical equipment. And many efforts have been done for obtaining lasers with small size, simple structure and shorter pulses. In recent years, nonlinear polarization rotation (NPR) in semiconductor optical amplifier (SOA) has been studied and applied as a mode-locking mechanism. This kind of passively MLFL has faster operating speed and makes it easier to realize all-optical integration. In this paper, we had a thorough analysis of NPR effect in SOA. And we explained the principle of mode-locking by SOA and set up a numerical model for this mode-locking process. Besides we conducted a Matlab simulation of the mode-locking mechanism. We also analyzed results under different working conditions and several features of this mode-locking process are presented. Our simulation shows that: Firstly, initial pulse with the peak power exceeding certain threshold may be amplified and compressed, and stable mode-locking may be established. After about 25 round-trips, stable mode-locked pulse can be obtained which has peak power of 850mW and pulse-width of 780fs.Secondly, when the initial pulse-width is greater, narrowing process of pulse is sharper and it needs more round-trips to be stable. Lastly, the bias currents of SOA affect obviously the shape of mode-locked pulse and the mode-locked pulse with high peak power and narrow width can be obtained through adjusting reasonably the bias currents of SOA.

  5. Effects of variations in flow characteristics through W.P. Franklin Lock and Dam on downstream water quality in the Caloosahatchee River Estuary and in McIntyre Creek in the J.N. “Ding” Darling National Wildlife Refuge, southern Florida, 2010–13

    USGS Publications Warehouse

    Booth, Amanda C.; Soderqvist, Lars E.; Knight, Travis M.

    2016-05-17

    The U.S. Geological Survey studied water-quality trends at the mouth of McIntyre Creek, an entry point to the J.N. “Ding” Darling National Wildlife Refuge, to investigate correlations between flow rates and volumes through the W.P. Franklin Lock and Dam and water-quality constituents inside the refuge from March 2010 to December 2013. Outflow from Lake Okeechobee, and flows from Franklin Lock, tributaries to the Caloosahatchee River Estuary, and the Cape Coral canal system were examined to determine the sources and quantity of water to the study area. Salinity, temperature, dissolved-oxygen concentration, pH, turbidity, and chromophoric dissolved organic matter fluorescence (FDOM) were measured during moving-boat surveys and at a fixed location in McIntyre Creek. Chlorophyll fluorescence was also recorded in McIntyre Creek. Water-quality surveys were completed on 20 dates between 2011 and 2014 using moving-boat surveys.Franklin Lock contributed the majority of flow to the Caloosahatchee River. Between 2010 and 2013, the monthly mean flow rate at Franklin Lock ranged from 29 cubic feet per second in May 2011 to 10,650 cubic feet per second in August 2013. Instantaneous near-surface salinity in McIntyre Creek ranged from 12.9 parts per thousand on September 26, 2013, to 37.9 parts per thousand on June 27, 2011. Salinity in McIntyre Creek decreased with increasing flow rate through Franklin Lock. Flow rates through Franklin Lock explained 61 percent of the variation in salinity in McIntyre Creek. Salinity data from moving-boat surveys also indicate that an increase in flow rate at Franklin Lock decreases salinity in the Caloosahatchee River Estuary, and a reduction or elimination in flow increases salinity. The FDOM in McIntyre Creek was positively correlated with flow at Franklin Lock, and 54 percent of the variation in FDOM can be attributed to the flow rate through Franklin Lock. Data from moving-boat surveys indicate that FDOM increases when flow volume from Franklin Lock increases. The highest FDOM recorded during a survey was at Billy’s Creek. Chlorophyll fluorescence was positively correlated with flow at Franklin Lock, with 23 percent of the variation explained by the flow rate at Franklin Lock. An increase in flow rate at Franklin Lock resulted in a decrease in pH (21 percent of variation explained by flow rates). Data from the pH surveys indicate an increase in pH with distance from Franklin Lock. Turbidity and dissolved oxygen near the surface in McIntyre Creek were not correlated with flow rate at Franklin Lock. Moving-boat surveys did not document a change in turbidity or dissolved oxygen with a change in distance from the Franklin Lock. Correlations between Franklin Lock flow rate and water quality in McIntyre Creek indicate that releases at Franklin Lock affect water quality in the Caloosahatchee River Estuary and Ding Darling Refuge.

  6. Cyclic loading of rotator cuff reconstructions: single-row repair with modified suture configurations versus double-row repair.

    PubMed

    Lorbach, Olaf; Bachelier, Felix; Vees, Jochen; Kohn, Dieter; Pape, Dietrich

    2008-08-01

    Double-row repair is suggested to have superior biomechanical properties in rotator cuff reconstruction compared with single-row repair. However, double-row rotator cuff repair is frequently compared with simple suture repair and not with modified suture configurations. Single-row rotator cuff repairs with modified suture configurations have similar failure loads and gap formations as double-row reconstructions. Controlled laboratory study. We created 1 x 2-cm defects in 48 porcine infraspinatus tendons. Reconstructions were then performed with 4 single-row repairs and 2 double-row repairs. The single-row repairs included transosseous simple sutures; double-loaded corkscrew anchors in either a double mattress or modified Mason-Allen suture repair; and the Magnum Knotless Fixation Implant with an inclined mattress. Double-row repairs were either with Bio-Corkscrew FT using modified Mason-Allen stitches or a combination of Bio-Corkscrew FT and PushLock anchors using the SutureBridge Technique. During cyclic load (10 N to 60-200 N), gap formation was measured, and finally, ultimate load to failure and type of failure were recorded. Double-row double-corkscrew anchor fixation had the highest ultimate tensile strength (398 +/- 98 N) compared to simple sutures (105 +/- 21 N; P < .0001), single-row corkscrews using a modified Mason-Allen stitch (256 +/- 73 N; P = .003) or double mattress repair (290 +/- 56 N; P = .043), the Magnum Implant (163 +/- 13 N; P < .0001), and double-row repair with PushLock and Bio-Corkscrew FT anchors (163 +/- 59 N; P < .0001). Single-row double mattress repair was superior to transosseous sutures (P < .0001), the Magnum Implant (P = .009), and double-row repair with PushLock and Bio-Corkscrew FT anchors (P = .009). Lowest gap formation was found for double-row double-corkscrew repair (3.1 +/- 0.1 mm) compared to simple sutures (8.7 +/- 0.2 mm; P < .0001), the Magnum Implant (6.2 +/- 2.2 mm; P = .002), double-row repair with PushLock and Bio-Corkscrew FT anchors (5.9 +/- 0.9 mm; P = .008), and corkscrews with modified Mason-Allen sutures (6.4 +/- 1.3 mm; P = .001). Double-row double-corkscrew anchor rotator cuff repair offered the highest failure load and smallest gap formation and provided the most secure fixation of all tested configurations. Double-loaded suture anchors using modified suture configurations achieved superior results in failure load and gap formation compared to simple suture repair and showed similar loads and gap formation with double-row repair using PushLock and Bio-Corkscrew FT anchors. Single-row repair with modified suture configurations may lead to results comparable to several double-row fixations. If double-row repair is used, modified stitches might further minimize gap formation and increase failure load.

  7. Automatically Locking/Unlocking Orthotic Knee Joint

    NASA Technical Reports Server (NTRS)

    Weddendorf, Bruce

    1994-01-01

    Proposed orthotic knee joint locks and unlocks automatically, at any position within range of bend angles, without manual intervention by wearer. Includes tang and clevis, locks whenever wearer transfers weight to knee and unlocks when weight removed. Locking occurs at any angle between 45 degrees knee bend and full extension.

  8. 49 CFR 236.304 - Mechanical locking or same protection effected by circuits.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Mechanical locking or same protection effected by..., AND APPLIANCES Interlocking Standards § 236.304 Mechanical locking or same protection effected by circuits. Mechanical locking, or the same protection effected by means of circuits, shall be provided. ...

  9. 49 CFR 236.308 - Mechanical or electric locking or electric circuits; requisites.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Mechanical or electric locking or electric..., AND APPLIANCES Interlocking Standards § 236.308 Mechanical or electric locking or electric circuits; requisites. Mechanical or electric locking or electric circuits shall be installed to prevent signals from...

  10. 49 CFR 236.757 - Lock, electric.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Lock, electric. 236.757 Section 236.757... Lock, electric. A device to prevent or restrict the movement of a lever, a switch or a movable bridge, unless the locking member is withdrawn by an electrical device, such as an electromagnet, solenoid or...

  11. 49 CFR 236.757 - Lock, electric.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Lock, electric. 236.757 Section 236.757... Lock, electric. A device to prevent or restrict the movement of a lever, a switch or a movable bridge, unless the locking member is withdrawn by an electrical device, such as an electromagnet, solenoid or...

  12. 49 CFR 236.757 - Lock, electric.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Lock, electric. 236.757 Section 236.757... Lock, electric. A device to prevent or restrict the movement of a lever, a switch or a movable bridge, unless the locking member is withdrawn by an electrical device, such as an electromagnet, solenoid or...

  13. 49 CFR 236.757 - Lock, electric.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Lock, electric. 236.757 Section 236.757... Lock, electric. A device to prevent or restrict the movement of a lever, a switch or a movable bridge, unless the locking member is withdrawn by an electrical device, such as an electromagnet, solenoid or...

  14. 49 CFR 236.757 - Lock, electric.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Lock, electric. 236.757 Section 236.757... Lock, electric. A device to prevent or restrict the movement of a lever, a switch or a movable bridge, unless the locking member is withdrawn by an electrical device, such as an electromagnet, solenoid or...

  15. 27 CFR 19.193 - Breaking Government locks.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Breaking Government locks... Requirements Other Plant Requirements § 19.193 Breaking Government locks. TTB may assign TTB officers to a distilled spirits plant and utilize controls, such as Government locks, if TTB determines that such measures...

  16. Shuttle-launch triangular space station

    NASA Technical Reports Server (NTRS)

    Schneider, W. C. (Inventor); Berka, R. B. (Inventor); Kavanaugh, C. (Inventor); Nagy, K. (Inventor); Parish, R. C. (Inventor); Schliesing, J. A. (Inventor); Smith, P. D. (Inventor); Stebbins, F. J. (Inventor); Wesselski, C. J. (Inventor)

    1986-01-01

    A triangular space station deployable in orbit is described. The framework is comprized of three trusses, formed of a pair of generally planar faces consistine of foldable struts. The struts expand and lock into rigid structural engagement forming a repetition of equilater triangles and nonfolding diagonal struts interconnecting the two faces. The struts are joined together by node fittings. The framework can be packaged into a size and configuration transportable by a space shuttle. When deployed, the framework provides a large work/construction area and ample planar surface area for solar panels and thermal radiators. A plurity of modules are secured to the framework and then joined by tunnels to make an interconnected modular display. Thruster units for the space station orientation and altitude maintenance are provided.

  17. TAMPERPROOF FILM BADGE

    DOEpatents

    Kocher, L.F.

    1958-10-01

    A persornel dosimeter film badge made of plastic, with provision for a picture of the wearer and an internal slide containing photographic film that is sensitive to various radiations, is described. Four windows made of differing material selectively attenuate alpha, beta, gamma rays, and neutrons so as to distinguish the particular type of radiation the wearer was subjected to. In addition, a lead shield has the identification number of the wearer perforated thereon so as to identify the film after processing. An internal magnetically actuated latch securely locks the slide within the body, and may be withdrawn only upon the external application of two strong magnetic forces in order to insure that the wearer or other curious persons will not accidentally expose the film to visual light.

  18. Mechanical connection for a tubular assembly

    DOEpatents

    Grover, J.M.

    1984-09-12

    Disclosed is a mechanical connection assembly for connecting two telescopically related parts together in a fluidtight relation. The system uses snap-in fasteners having flexible barbed tangs which are snapped into receiving holes formed in the parts being attached together. A locking pin can be inserted into a central aperture through the snap-in fastener to secure the fastener in the receiving holes. The system also includes a seal having sealing surfaces at least one of which is formed at an angle inclined relative to a true vertical. a metallic sealing element is interposed between the sealing surfaces. The geometry of the sealing surfaces is capable of compensating for the differential thermal growth rates occurring when the two parts are made from dissimilar metals.

  19. Carbon Lock-In: Barriers to the Deployment of Climate Change Mitigation Technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lapsa, Melissa Voss; Brown, Marilyn A.

    The United States shares with many other countries the objective of stabilizing greenhouse gas (GHG) concentrations in the Earth's atmosphere at a level that would prevent dangerous interference with the climate system. Many believe that accelerating the pace of technology improvement and deployment could significantly reduce the cost of achieving this goal. The critical role of new technologies is underscored by the fact that most anthropogenic greenhouse gases emitted over the next century will come from equipment and infrastructure built in the future. As a result, new technologies and fuels have the potential to transform the nation's energy system whilemore » meeting climate change as well as energy security and other goals.« less

  20. Efficient packet forwarding using cyber-security aware policies

    DOEpatents

    Ros-Giralt, Jordi

    2017-04-04

    For balancing load, a forwarder can selectively direct data from the forwarder to a processor according to a loading parameter. The selective direction includes forwarding the data to the processor for processing, transforming and/or forwarding the data to another node, and dropping the data. The forwarder can also adjust the loading parameter based on, at least in part, feedback received from the processor. One or more processing elements can store values associated with one or more flows into a structure without locking the structure. The stored values can be used to determine how to direct the flows, e.g., whether to process a flow or to drop it. The structure can be used within an information channel providing feedback to a processor.

Top