Karstens C.D.,Iowa State University |
Samaras T.M.,National Technical Systems |
Lee B.D.,WindLogics Inc. |
Gallus Jr. W.A.,Iowa State University |
Finley C.A.,WindLogics Inc.
Monthly Weather Review | Year: 2010
Since the spring of 2002, tornadoes were sampled on nine occasions using Hardened In-Situ Tornado Pressure Recorder probes, video probes, and mobile mesonet instrumentation. This study describes pressure and, in some cases, velocity data obtained from these intercepts. In seven of these events, the intercepted tornadoes were within the radar-indicated or visually identified location of the supercell low-level mesocyclone. In the remaining two cases, the intercepted tornadoes occurred outside of this region and were located along either the rear-flank downdraft gust front or an internal rear-flank downdraft surge boundary. The pressure traces, sometimes augmented with videography, suggest that vortex structures ranged from single-cell to two-cell, quite similar to the swirl-ratio-dependent continuum of vortex structures shown in laboratory and numerical simulations. Although near-ground tornado observations are quite rare, the number of contemporary tornado measurements now available permits a comparative range of observed pressure deficits for a wide variety of tornado sizes and intensities to be presented. © 2010 American Meteorological Society.
Anikin I.V.,National Technical Systems
2015 International Siberian Conference on Control and Communications, SIBCON 2015 - Proceedings | Year: 2015
We suggested a method for quantitative information security risk assessment and management in computer networks. We used questionnaires, expert judgments, fuzzy logic and analytic hierarchy process to evaluate an impact and possibility values for specific threats. We suggested fuzzy extension of Common Vulnerability Scoring System for vulnerability assessment. Fuzzy prediction rules are used to describe expert's knowledge about vulnerabilities. © 2015 IEEE.
Grivei A.-C.,National Technical Systems
Proceedings of the 2015 7th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2015 | Year: 2015
The common means of achieving authentication is by a token, a pin or a password. This type of authentication can be easily breached as the credentials can be obtained and inputted by another person. A more capable type of authentication is through the biometric features of the user. Software for Android devices has been developed to track the 8 most used inputs. Several algorithms were used and compared to determine which has the best performance in the authentication process. © 2015 IEEE.
Hosier T.,National Technical Systems
Test Engineering and Management | Year: 2012
Test lab operator are faced with a challenge to provide accurate and sound test services for an economical price, while maintaining a reasonable profit margin. By working with the customer well in advance of the test process, many of these issues can be mitigated. By offering design and development services, the operators are able to participate earlier in the product life cycle, which allows for design for testability, greatly increasing chances of a successful qualification/certification process. Engineers and technicians must be creative, customer-focused, and willing to work in a challenging environment, both physically and intellectually. Tools are being put in place in the lab to provide technicians with barcode readers to automatically record and validate equipment used. Customers can even witness testing virtually through a customer portal from any computer with an Internet connection.
Grishin S.N.,National Technical Systems
Biochemistry (Moscow) Supplement Series A: Membrane and Cell Biology | Year: 2014
The paper reviews data on mechanisms of calcium current and methods of its recording. The involvement of calcium ions in excitation of nerve and muscle cells and in particular in synaptic transmission processes is considered. Calcium signaling relies on voltage-dependent and ligand-gated calcium channels. The review focuses mainly on calcium currents flowing through voltage-dependent channels. The conditions evoking calcium currents, basic methods of their recordings, as well as effects of some important endogenous modulators of neuromuscular transmission are overviewed. © 2014 Pleiades Publishing, Ltd.