139,690 research outputs found

    Development of an active fly-by-wire flight control system

    Get PDF
    A summary of the YF-16 flight control system is presented. The basic functions of the flight control system are discussed, as well as the unique features such as Relaxed Static Longitudinal Stability (RSS), Fly By Wire (FBW), and Side Stick Pilot's Controller (SSC). In addition, the basic philosophy behind the selection of the flight control system functions and unique features is discussed

    Simplified landscapes for optimization of shaken lattice interferometry

    Get PDF
    Motivated by recent results using shaken optical lattices to perform atom interferometry, we explore splitting of an atom cloud trapped in a phase-modulated ("shaken") optical lattice. Using a simple analytic model we are able to show that we can obtain the simplest case of ±2kL\pm2\hbar k_\mathrm{L} splitting via single-frequency shaking. This is confirmed both via simulation and experiment. Furthermore, we are able to split with a relative phase θ\theta between the two split arms of 00 or π\pi depending on our shaking frequency. Addressing higher-order splitting, we determine that ±6kL\pm6\hbar k_\mathrm{L} splitting is sufficient to be able to accelerate the atoms in counter-propagating lattices. Finally, we show that we can use a genetic algorithm to optimize ±4kL\pm4\hbar k_\mathrm{L} and ±6kL\pm6\hbar k_\mathrm{L} splitting to within 0.1%\approx0.1\% by restricting our optimization to the resonance frequencies corresponding to single- and two-photon transitions between Bloch bands

    Micellar Crystals in Solution from Molecular Dynamics Simulations

    Full text link
    Polymers with both soluble and insoluble blocks typically self-assemble into micelles, aggregates of a finite number of polymers where the soluble blocks shield the insoluble ones from contact with the solvent. Upon increasing concentration, these micelles often form gels that exhibit crystalline order in many systems. In this paper, we present a study of both the dynamics and the equilibrium properties of micellar crystals of triblock polymers using molecular dynamics simulations. Our results show that equilibration of single micelle degrees of freedom and crystal formation occurs by polymer transfer between micelles, a process that is described by transition state theory. Near the disorder (or melting) transition, bcc lattices are favored for all triblocks studied. Lattices with fcc ordering are also found, but only at lower kinetic temperatures and for triblocks with short hydrophilic blocks. Our results lead to a number of theoretical considerations and suggest a range of implications to experimental systems with a particular emphasis on Pluronic polymers.Comment: 12 pages, 11 figures. Note that some figures are extremely low quality to meet arXiv's file size limit

    Fabrication process development of SiC/superalloy composite sheet for exhaust system components

    Get PDF
    A chemical compatibility study was conducted between SiC filament and the following P/M matrix alloys: Waspaloy, Hastelloy-X, NiCrAlY, Ha-188, S-57, FeCrAlY, and Incoloy 800. None of the couples demonstrated sufficient chemical compatibility to withstand the minimum HIP consolidation temperatures (996 C) or intended application temperature of the composite (982 C). However, Waspaloy, Haynes 188, and Hastelloy-X were the least reactive with SiC of the candidate alloys. Chemical vapor deposited tungsten was shown to be an effective diffusion barrier between the superalloy matrix and SiC filament providing a defect-free coating of sufficient thickness. However, the coating breaks down when the tungsten is converted into intermetallic compounds by interdiffusion with matrix constituents. Waspaloy was demonstrated to be the most effective matrix alloy candidate in contact with the CVD tungsten barrier because of its relatively low growth rate constant of the intermediate compound and the lack of formation of Kirkendall voids at the matrix-barrier interface. Fabrication methods were developed for producing panels of uniaxial and angle ply composites utilizing CVD tungsten coated filament

    From present to future : beyond becoming a nation of readers

    Get PDF
    Includes bibliographical references (p. 13-19)The work upon which this publication was based was supported in part by the Office of Educational Research and Improvement under Cooperative Agreement No. OEG 0087-C100

    A Fault Analytic Method against HB+

    Get PDF
    The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family. Despite the rich literature regarding the cryptanalysis of these protocols, there are no published results about the impact of fault analysis over them. The purpose of this paper is to fill this gap by presenting a fault analytic method against a prominent member of the HB-family: HB+ protocol. We demonstrate that the fault analysis model can lead to a flexible and effective attack against HB-like protocols, posing a serious threat over them

    Numerical design of streamlined tunnel walls for a two-dimensional transonic test

    Get PDF
    An analytical procedure is discussed for designing wall shapes for streamlined, nonporous, two-dimensional, transonic wind tunnels. It is based upon currently available 2-D inviscid transonic and boundary layer analysis computer programs. Predicted wall shapes are compared with experimental data obtained from the NASA Langley 6 by 19 inch Transonic Tunnel where the slotted walls were replaced by flexible nonporous walls. Comparisons are presented for the empty tunnel operating at a Mach number of 0.9 and for a supercritical test of an NACA 0012 airfoil at zero lift. Satisfactory agreement is obtained between the analytically and experimentally determined wall shapes

    Commitment and Oblivious Transfer in the Bounded Storage Model with Errors

    Get PDF
    The bounded storage model restricts the memory of an adversary in a cryptographic protocol, rather than restricting its computational power, making information theoretically secure protocols feasible. We present the first protocols for commitment and oblivious transfer in the bounded storage model with errors, i.e., the model where the public random sources available to the two parties are not exactly the same, but instead are only required to have a small Hamming distance between themselves. Commitment and oblivious transfer protocols were known previously only for the error-free variant of the bounded storage model, which is harder to realize
    corecore