Failure mode and effects analysisFailure mode and effects analysis (FMEA; often written with "failure modes" in plural) is the process of reviewing as many components, assemblies, and subsystems as possible to identify potential failure modes in a system and their causes and effects. For each component, the failure modes and their resulting effects on the rest of the system are recorded in a specific FMEA worksheet. There are numerous variations of such worksheets.
Shot peeningShot peening is a cold working process used to produce a compressive residual stress layer and modify the mechanical properties of metals and composites. It entails striking a surface with shot (round metallic, glass, or ceramic particles) with force sufficient to create plastic deformation. In machining, shot peening is used to strengthen and relieve stress in components like steel automobile crankshafts and connecting rods. In architecture it provides a muted finish to metal.
Orbital inclinationOrbital inclination measures the tilt of an object's orbit around a celestial body. It is expressed as the angle between a reference plane and the orbital plane or axis of direction of the orbiting object. For a satellite orbiting the Earth directly above the Equator, the plane of the satellite's orbit is the same as the Earth's equatorial plane, and the satellite's orbital inclination is 0°. The general case for a circular orbit is that it is tilted, spending half an orbit over the northern hemisphere and half over the southern.
PeeningIn metallurgy, peening is the process of working a metal's surface to improve its material properties, usually by mechanical means, such as hammer blows, by blasting with shot (shot peening), focusing light (laser peening), or in recent years, with water column impacts (water jet peening) and cavitation jets (cavitation peening). With the notable exception of laser peening, peening is normally a cold work process tending to expand the surface of the cold metal, thus inducing compressive stresses or relieving tensile stresses already present.
Compliant mechanismIn mechanical engineering, a compliant mechanism is a flexible mechanism that achieves force and motion transmission through elastic body deformation. It gains some or all of its motion from the relative flexibility of its members rather than from rigid-body joints alone. These may be monolithic (single-piece) or jointless structures. Some common devices that use compliant mechanisms are backpack latches and paper clips. One of the oldest examples of using compliant structures is the bow and arrow.
Cellular confinementCellular confinement systems (CCS)—also known as geocells—are widely used in construction for erosion control, soil stabilization on flat ground and steep slopes, channel protection, and structural reinforcement for load support and earth retention. Typical cellular confinement systems are geosynthetics made with ultrasonically welded high-density polyethylene (HDPE) strips or novel polymeric alloy (NPA)—and expanded on-site to form a honeycomb-like structure—and filled with sand, soil, rock, gravel or concrete.
Password strengthPassword strength is a measure of the effectiveness of a password against guessing or brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability. Using strong passwords lowers the overall risk of a security breach, but strong passwords do not replace the need for other effective security controls.
Password crackingIn cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system in scrambled form. A common approach (brute-force attack) is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password. Another type of approach is password spraying, which is often automated and occurs slowly over time in order to remain undetected, using a list of common passwords.