34,978 research outputs found

    The walking robot project

    Get PDF
    A walking robot was designed, analyzed, and tested as an intelligent, mobile, and a terrain adaptive system. The robot's design was an application of existing technologies. The design of the six legs modified and combines well understood mechanisms and was optimized for performance, flexibility, and simplicity. The body design incorporated two tripods for walking stability and ease of turning. The electrical hardware design used modularity and distributed processing to drive the motors. The software design used feedback to coordinate the system and simple keystrokes to give commands. The walking machine can be easily adapted to hostile environments such as high radiation zones and alien terrain. The primary goal of the leg design was to create a leg capable of supporting a robot's body and electrical hardware while walking or performing desired tasks, namely those required for planetary exploration. The leg designers intent was to study the maximum amount of flexibility and maneuverability achievable by the simplest and lightest leg design. The main constraints for the leg design were leg kinematics, ease of assembly, degrees of freedom, number of motors, overall size, and weight

    Match Probability Statistics and Gamma Ray Burst Recurrences in the BATSE Catalog

    Full text link
    We develop match probability statistics to test the recurrences of gamma ray bursts in the BATSE catalog 1B and 2B. We do not find a signal of repetitions at the match level of 1.e-3.Comment: 4 pages, LaTeX, two macros included (kluwer.sty, spacekap.sty) To appear in the proceedings of the Eslab29 symposium, ``gamma ray bursts: toward the source

    On the origin of noisy states whose teleportation fidelity can be enhanced through dissipation

    Full text link
    Recently Badziag \emph{et al.} \cite{badziag} obtained a class of noisy states whose teleportation fidelity can be enhanced by subjecting one of the qubits to dissipative interaction with the environment via amplitude damping channel (ADC). We show that such noisy states result while sharing the states (| \Phi ^{\pm}> =\frac{1}{\sqrt{2}}(| 00> \pm | 11>)) across ADC. We also show that under similar dissipative interactions different Bell states give rise to noisy entangled states that are qualitatively very different from each other in the sense, only the noisy entangled states constructed from the Bell states (| \Phi ^{\pm}>) can \emph{}be made better sometimes by subjecting the unaffected qubit to a dissipative interaction with the environment. Importantly if the noisy state is non teleporting then it can always be made teleporting with this prescription. We derive the most general restrictions on improvement of such noisy states assuming that the damping parameters being different for both the qubits. However this curious prescription does not work for the noisy entangled states generated from (| \Psi ^{\pm}> =\frac{1}{\sqrt{2}}(| 01> \pm | 10>)). This shows that an apriori knowledge of the noisy channel might be helpful to decide which Bell state needs to be shared between Alice and Bob. \emph{}Comment: Latex, 18 pages: Revised version with a new result. Submitted to PR

    Calculation of transonic steady and oscillatory pressures on a low aspect ratio model and comparison with experiment

    Get PDF
    Pressure data measured by the British Royal Aircraft Establishment for the AGARD SMP tailplane are compared with results calculated using the transonic small perturbation code XTRAN3S. A brief description of the analysis is given and a recently developed finite difference grid is described. Results are presented for five steady and nine harmonically oscillating cases near zero angle of attack and for a range of subsonic and transonic Mach numbers

    Shape optimization of three-dimensional stamped and solid automotive components

    Get PDF
    The shape optimization of realistic, 3-D automotive components is discussed. The integration of the major parts of the total process: modeling, mesh generation, finite element and sensitivity analysis, and optimization are stressed. Stamped components and solid components are treated separately. For stamped parts a highly automated capability was developed. The problem description is based upon a parameterized boundary design element concept for the definition of the geometry. Automatic triangulation and adaptive mesh refinement are used to provide an automated analysis capability which requires only boundary data and takes into account sensitivity of the solution accuracy to boundary shape. For solid components a general extension of the 2-D boundary design element concept has not been achieved. In this case, the parameterized surface shape is provided using a generic modeling concept based upon isoparametric mapping patches which also serves as the mesh generator. Emphasis is placed upon the coupling of optimization with a commercially available finite element program. To do this it is necessary to modularize the program architecture and obtain shape design sensitivities using the material derivative approach so that only boundary solution data is needed

    Simple Proof of Security of the BB84 Quantum Key Distribution Protocol

    Get PDF
    We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement-purification based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.Comment: 5 pages, Latex, minor changes to improve clarity and fix typo

    Judging the impact of leadership-development activities on school practice

    Get PDF
    The nature and effectiveness of professional-development activities should be judged in a way that takes account of both the achievement of intended outcomes and the unintended consequences that may result. Our research project set out to create a robust approach that school staff members could use to assess the impact of professional-development programs on leadership and management practice without being constrained in this judgment by the stated aims of the program. In the process, we identified a number of factors and requirements relevant to a wider audience than that concerned with the development of leadership and management in England. Such an assessment has to rest upon a clear understanding of educational leadership,a clearly articulated model of practice, and a clear model of potential forms of impact. Such foundations, suitably adapted to the subject being addressed, are appropriate for assessing all teacher professional development

    A cross-sectional study of predatory publishing emails received by career development grant awardees

    Get PDF
    OBJECTIVE: To investigate the scope of academic spam emails (ASEs) among career development grant awardees and the factors associated with the amount of time spent addressing them. DESIGN: A cross-sectional survey of career development grant investigators via an anonymous online survey was conducted. In addition to demographic and professional information, we asked investigators to report the number of ASEs received each day, how they determined whether these emails were spam and time they spent per day addressing them. We used bivariate analysis to assess factors associated with the amount of time spent on ASEs. SETTING: An online survey sent via email on three separate occasions between November and December 2016. PARTICIPANTS: All National Institutes of Health career development awardees funded in the 2015 fiscal year. MAIN OUTCOME MEASURES: Factors associated with the amount of time spent addressing ASEs. RESULTS: A total of 3492 surveys were emailed, of which 206 (5.9%) were returned as undeliverable and 96 (2.7%) reported an out-of-office message; our overall response rate was 22.3% (n=733). All respondents reported receiving ASEs, with the majority (54.4%) receiving between 1 and 10 per day and spending between 1 and 10 min each day evaluating them. The amount of time respondents reported spending on ASEs was associated with the number of peer-reviewed journal articles authored (p<0.001), a history of publishing in open access format (p<0.01), the total number of ASEs received (p<0.001) and a feeling of having missed opportunities due to ignoring these emails (p=0.04). CONCLUSIONS: ASEs are a common distraction for career development grantees that may impact faculty productivity. There is an urgent need to mitigate this growing problem

    Entanglement required in achieving entanglement-assisted channel capacities

    Full text link
    Entanglement shared between the two ends of a quantum communication channel has been shown to be a useful resource in increasing both the quantum and classical capacities for these channels. The entanglement-assisted capacities were derived assuming an unlimited amount of shared entanglement per channel use. In this paper, bounds are derived on the minimum amount of entanglement required per use of a channel, in order to asymptotically achieve the capacity. This is achieved by introducing a class of entanglement-assisted quantum codes. Codes for classes of qubit channels are shown to achieve the quantum entanglement-assisted channel capacity when an amount of shared entanglement per channel given by, E = 1 - Q_E, is provided. It is also shown that for very noisy channels, as the capacities become small, the amount of required entanglement converges for the classical and quantum capacities.Comment: 9 pages, 2 figures, RevTex

    ECOLOGICAL-ECONOMIC MODELING ON A WATERSHED BASIS: A CASE STUDY OF THE CACHE RIVER OF SOUTHERN ILLINOIS

    Get PDF
    A digitally represented watershed landscape (ARC/INFO GIS) is merged with farm optimization (linear programming) and sediment and chemical transport (AGNPS) models. Enhanced targeting of non-point source pollution to remedial policy and management initiatives result. The implications of which are linked back to farm income and forward to the managed ecosystem.Environmental Economics and Policy, Research and Development/Tech Change/Emerging Technologies,
    • …
    corecore