34,402 research outputs found

    Is primary angioplasty cost effective in the UK? Results of a comprehensive decision analysis

    Get PDF
    Objective: To assess the cost effectiveness of primary angioplasty, compared with medical management with thrombolytic drugs, to achieve reperfusion after acute myocardial infarction ( AMI) from the perspective of the UK NHS. Design: Bayesian evidence synthesis and decision analytic model. Methods: A systematic review was conducted and Bayesian statistical methods used to synthesise evidence from 22 randomised control trials. Resource utilisation was based on UK registry data, published literature and national databases, with unit costs taken from routine NHS sources and published literature. Main outcome measure: Costs from a health service perspective and outcomes measured as quality-adjusted life years (QALYs). Results: For the base case, the incremental cost-effectiveness ratio of primary angioplasty was pound 9241 for each additional QALY, with a probability of being cost effective of 0.90 for a cost-effectiveness threshold of pound 20 000. Results were sensitive to variations in the additional time required to initiate treatment with primary angioplasty. Conclusions: Primary angioplasty is cost effective for the treatment of AMI on the basis of threshold cost-effectiveness values used in the NHS and subject to a delay of up to about 80 minutes. These findings are mainly explained by the superior mortality benefit and the prevention of non-fatal outcomes associated with primary angioplasty for delays of up to this length

    Longitudinal-control design approach for high-angle-of-attack aircraft

    Get PDF
    This paper describes a control synthesis methodology that emphasizes a variable-gain output feedback technique that is applied to the longitudinal channel of a high-angle-of-attack aircraft. The aircraft is a modified F/A-18 aircraft with thrust-vectored controls. The flight regime covers a range up to a Mach number of 0.7; an altitude range from 15,000 to 35,000 ft; and an angle-of-attack (alpha) range up to 70 deg, which is deep into the poststall region. A brief overview is given of the variable-gain mathematical formulation as well as a description of the discrete control structure used for the feedback controller. This paper also presents an approximate design procedure with relationships for the optimal weights for the selected feedback control structure. These weights are selected to meet control design guidelines for high-alpha flight controls. Those guidelines that apply to the longitudinal-control design are also summarized. A unique approach is presented for the feed-forward command generator to obtain smooth transitions between load factor and alpha commands. Finally, representative linear analysis results and nonlinear batch simulation results are provided

    Application and flight test of linearizing transformations using measurement feedback to the nonlinear control problem

    Get PDF
    The design of nonlinear controllers has relied on the use of detailed aerodynamic and engine models that must be associated with the control law in the flight system implementation. Many of these controllers were applied to vehicle flight path control problems and have attempted to combine both inner- and outer-loop control functions in a single controller. An approach to the nonlinear trajectory control problem is presented. This approach uses linearizing transformations with measurement feedback to eliminate the need for detailed aircraft models in outer-loop control applications. By applying this approach and separating the inner-loop and outer-loop functions two things were achieved: (1) the need for incorporating detailed aerodynamic models in the controller is obviated; and (2) the controller is more easily incorporated into existing aircraft flight control systems. An implementation of the controller is discussed, and this controller is tested on a six degree-of-freedom F-15 simulation and in flight on an F-15 aircraft. Simulation data are presented which validates this approach over a large portion of the F-15 flight envelope. Proof of this concept is provided by flight-test data that closely matches simulation results. Flight-test data are also presented

    Wind-tunnel free-flight investigation of a supersonic persistence fighter

    Get PDF
    Wind-tunnel free-flight tests have been conducted in the Langley 30- by 60-Foot Wind Tunnel to examine the high-angle-of-attack stability and control characteristics and control law design of a supersonic persistence fighter (SSPF) at 1 g flight conditions. In addition to conventional control surfaces, the SSPF incorporated deflectable wingtips (tiperons) and pitch and yaw thrust vectoring. A direct eigenstructure assignment technique was used to design control laws to provide good flying characteristics well into the poststall angle-of-attack region. Free-flight tests indicated that it was possible to blend effectively conventional and unconventional control surfaces to achieve good flying characteristics well into the poststall angle-of-attack region

    Proving Abstractions of Dynamical Systems through Numerical Simulations

    Full text link
    A key question that arises in rigorous analysis of cyberphysical systems under attack involves establishing whether or not the attacked system deviates significantly from the ideal allowed behavior. This is the problem of deciding whether or not the ideal system is an abstraction of the attacked system. A quantitative variation of this question can capture how much the attacked system deviates from the ideal. Thus, algorithms for deciding abstraction relations can help measure the effect of attacks on cyberphysical systems and to develop attack detection strategies. In this paper, we present a decision procedure for proving that one nonlinear dynamical system is a quantitative abstraction of another. Directly computing the reach sets of these nonlinear systems are undecidable in general and reach set over-approximations do not give a direct way for proving abstraction. Our procedure uses (possibly inaccurate) numerical simulations and a model annotation to compute tight approximations of the observable behaviors of the system and then uses these approximations to decide on abstraction. We show that the procedure is sound and that it is guaranteed to terminate under reasonable robustness assumptions

    AEROX: Computer program for transonic aircraft aerodynamics to high angles of attack. Volume 1: Aerodynamic methods and program users' guide

    Get PDF
    The AEROX program estimates lift, induced-drag and pitching moments to high angles (typ. 60 deg) for wings and for wingbody combinations with or without an aft horizontal tail. Minimum drag coefficients are not estimated, but may be input for inclusion in the total aerodynamic parameters which are output in listed and plotted formats. The theory, users' guide, test cases, and program listing are presented

    Use of supervised machine learning for GNSS signal spoofing detection with validation on real-world meaconing and spoofing data : part I

    Get PDF
    The vulnerability of the Global Navigation Satellite System (GNSS) open service signals to spoofing and meaconing poses a risk to the users of safety-of-life applications. This risk consists of using manipulated GNSS data for generating a position-velocity-timing solution without the user's system being aware, resulting in presented hazardous misleading information and signal integrity deterioration without an alarm being triggered. Among the number of proposed spoofing detection and mitigation techniques applied at different stages of the signal processing, we present a method for the cross-correlation monitoring of multiple and statistically significant GNSS observables and measurements that serve as an input for the supervised machine learning detection of potentially spoofed or meaconed GNSS signals. The results of two experiments are presented, in which laboratory-generated spoofing signals are used for training and verification within itself, while two different real-world spoofing and meaconing datasets were used for the validation of the supervised machine learning algorithms for the detection of the GNSS spoofing and meaconing
    corecore