176,367 research outputs found

    Towards Urban Air Mobility: NASAs Quadcopter Air Taxi Concept

    Get PDF
    Urban Air Mobility (UAM) is envisioned to be the future air transportation system over populated areas, where everything from small package delivery drones to passenger-carrying air taxis are able to interact safely and efficiently. The capacity of multi-rotor vehicles to perform vertical takeoff and landing (VTOL), together with their great maneuverability, make them an excellent choice for UAM aircraft. The accurate prediction of multirotor vehicles performance and acoustics is very challenging due to the unsteady and complex flows, as well as the aerodynamic interactions. By running high-fidelity computational fluid dynamics simulations on NASA supercomputers, researchers model the complex aerodynamics of multi-rotor flows, getting us closer to making UAM a reality

    Predicting a Protein's Stability under a Million Mutations

    Full text link
    Stabilizing proteins is a foundational step in protein engineering. However, the evolutionary pressure of all extant proteins makes identifying the scarce number of mutations that will improve thermodynamic stability challenging. Deep learning has recently emerged as a powerful tool for identifying promising mutations. Existing approaches, however, are computationally expensive, as the number of model inferences scales with the number of mutations queried. Our main contribution is a simple, parallel decoding algorithm. Our Mutate Everything is capable of predicting the effect of all single and double mutations in one forward pass. It is even versatile enough to predict higher-order mutations with minimal computational overhead. We build Mutate Everything on top of ESM2 and AlphaFold, neither of which were trained to predict thermodynamic stability. We trained on the Mega-Scale cDNA proteolysis dataset and achieved state-of-the-art performance on single and higher-order mutations on S669, ProTherm, and ProteinGym datasets. Code is available at https://github.com/jozhang97/MutateEverythingComment: NeurIPS 2023. Code available at https://github.com/jozhang97/MutateEverythin

    Simulation of Influence of Transverse Wheel-Set Movement on Torsion Oscillations

    Get PDF
    With increasing importance of the railway transport the demands on economic and functional features of the railway traffic increase as well. The features are influenced by many factors, whose identification, direct measuring and impact detection are not easy to obtain in the real service. A computational simulation and a roller rig are suitable means, which enable to recognize an amount of physical limitation influences in conjunction with proposed vehicle construction and with supposed surrounding service conditions make everything clear before a vehicle commissioning. Therefore, the Simulink model, focused on the field of research of traction wheel-sets torsion dynamics and an influence of adhesion conditions, was built, has been used and developed within SGS (Student Grant Competition) and PhD study programs. In the past, the model served for investigation of torsion oscillation excited by changes in torque transfer. In this paper we focus on another source of asynchronous peripheral speed of wheels of a wheel-set. It is given by railway vehicle wheel conicity. It will be shown, how the contact circle diameter change influences the torsion load of the wheel-set axle and the load type.S rostoucím významem kolejové dopravy rostou také nároky na ekonomiku a funkčnost jejího provozu. Ty jsou ovlivňovány řadou faktorů, jejichž identifikace, přímé zjišťování a dopad je v reálném provozu velmi obtížné měřit nebo dlouhodobě sledovat. Počítačová simulace a kladkový stav jsou vhodnými prostředky, kterými lze rozpoznat míru vlivu fyzikálních omezení ve spojení s navrhovanou konstrukcí vozidla a s předpokládanými okolními podmínkami provozu vše vyjasnit před uvedením vozidla do vlastního provozu. Proto byl v rámci SGS (studentská grantová soutěž) a doktorských studijních programů sestaven, používán a rozvíjen model v Simulinku zaměřený na oblast výzkumu torzní dynamiky hnaných náprav a vlivu adhezních podmínek. V minulosti sloužil ke zkoumání torzního kmitání buzeného změnami přenosu krouticího momentu. V tomto článku se zaměřujeme na jiný zdroj asynchronní obvodovou rychlost kol dvojkolí. To je dáno kuželovitostí kol kolejových vozidel. Bude ukázáno, jak změna průměru kontaktní kružnice ovlivňuje torzní zatížení osy dvojkolí a druh zatížení

    Gaming security by obscurity

    Get PDF
    Shannon sought security against the attacker with unlimited computational powers: *if an information source conveys some information, then Shannon's attacker will surely extract that information*. Diffie and Hellman refined Shannon's attacker model by taking into account the fact that the real attackers are computationally limited. This idea became one of the greatest new paradigms in computer science, and led to modern cryptography. Shannon also sought security against the attacker with unlimited logical and observational powers, expressed through the maxim that "the enemy knows the system". This view is still endorsed in cryptography. The popular formulation, going back to Kerckhoffs, is that "there is no security by obscurity", meaning that the algorithms cannot be kept obscured from the attacker, and that security should only rely upon the secret keys. In fact, modern cryptography goes even further than Shannon or Kerckhoffs in tacitly assuming that *if there is an algorithm that can break the system, then the attacker will surely find that algorithm*. The attacker is not viewed as an omnipotent computer any more, but he is still construed as an omnipotent programmer. So the Diffie-Hellman step from unlimited to limited computational powers has not been extended into a step from unlimited to limited logical or programming powers. Is the assumption that all feasible algorithms will eventually be discovered and implemented really different from the assumption that everything that is computable will eventually be computed? The present paper explores some ways to refine the current models of the attacker, and of the defender, by taking into account their limited logical and programming powers. If the adaptive attacker actively queries the system to seek out its vulnerabilities, can the system gain some security by actively learning attacker's methods, and adapting to them?Comment: 15 pages, 9 figures, 2 tables; final version appeared in the Proceedings of New Security Paradigms Workshop 2011 (ACM 2011); typos correcte

    Models of everywhere revisited: a technological perspective

    Get PDF
    The concept ‘models of everywhere’ was first introduced in the mid 2000s as a means of reasoning about the environmental science of a place, changing the nature of the underlying modelling process, from one in which general model structures are used to one in which modelling becomes a learning process about specific places, in particular capturing the idiosyncrasies of that place. At one level, this is a straightforward concept, but at another it is a rich multi-dimensional conceptual framework involving the following key dimensions: models of everywhere, models of everything and models at all times, being constantly re-evaluated against the most current evidence. This is a compelling approach with the potential to deal with epistemic uncertainties and nonlinearities. However, the approach has, as yet, not been fully utilised or explored. This paper examines the concept of models of everywhere in the light of recent advances in technology. The paper argues that, when first proposed, technology was a limiting factor but now, with advances in areas such as Internet of Things, cloud computing and data analytics, many of the barriers have been alleviated. Consequently, it is timely to look again at the concept of models of everywhere in practical conditions as part of a trans-disciplinary effort to tackle the remaining research questions. The paper concludes by identifying the key elements of a research agenda that should underpin such experimentation and deployment
    corecore