1,985 research outputs found

    Dynamics of axial separation in long rotating drums

    Full text link
    We propose a continuum description for the axial separation of granular materials in a long rotating drum. The model, operating with two local variables, concentration difference and the dynamic angle of repose, describes both initial transient traveling wave dynamics and long-term segregation of the binary mixture. Segregation proceeds through ultra-slow logarithmic coarsening.Comment: 4 pages, 3 Postscript figures; submitted to PR

    NASA Workshop on future directions in surface modeling and grid generation

    Get PDF
    Given here is a summary of the paper sessions and panel discussions of the NASA Workshop on Future Directions in Surface Modeling and Grid Generation held a NASA Ames Research Center, Moffett Field, California, December 5-7, 1989. The purpose was to assess U.S. capabilities in surface modeling and grid generation and take steps to improve the focus and pace of these disciplines within NASA. The organization of the workshop centered around overviews from NASA centers and expert presentations from U.S. corporations and universities. Small discussion groups were held and summarized by group leaders. Brief overviews and a panel discussion by representatives from the DoD were held, and a NASA-only session concluded the meeting. In the NASA Program Planning Session summary there are five recommended steps for NASA to take to improve the development and application of surface modeling and grid generation

    Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks

    Get PDF
    © 2004-2012 IEEE. The medical industry is increasingly digitalized and Internet-connected (e.g., Internet of Medical Things), and when deployed in an Internet of Medical Things environment, software-defined networks (SDNs) allow the decoupling of network control from the data plane. There is no debate among security experts that the security of Internet-enabled medical devices is crucial, and an ongoing threat vector is insider attacks. In this paper, we focus on the identification of insider attacks in healthcare SDNs. Specifically, we survey stakeholders from 12 healthcare organizations (i.e., two hospitals and two clinics in Hong Kong, two hospitals and two clinics in Singapore, and two hospitals and two clinics in China). Based on the survey findings, we develop a trust-based approach based on Bayesian inference to figure out malicious devices in a healthcare environment. Experimental results in either a simulated and a real-world network environment demonstrate the feasibility and effectiveness of our proposed approach regarding the detection of malicious healthcare devices, i.e., our approach could decrease the trust values of malicious devices faster than similar approaches

    Thermophysical and elastic properties of Cu50Zr50 and (Cu50Zr50)95Al5 bulk-metallic-glass-forming alloys

    Get PDF
    By employing a containerless high-temperature high-vacuum electrostatic levitation technique, the thermophysical properties, including the ratio between the specific heat capacity and the hemispherical total emissivity, the specific volume, and the viscosity, of Cu50Zr50 and (Cu50Zr50)95Al5 bulk-metallic-glass (BMG)-forming liquids have been measured. Compared with Cu50Zr50, the improved glass-forming ability of (Cu50Zr50)95Al5 can be attributed to its dense liquid structure and its high value of viscosity. Additionally, the relationship between the viscosity of various BMG forming liquids at the melting temperature and the elastic properties of the corresponding glasses at room temperature will be compared

    Functional Hand Proportion is Approximated by the Fibonacci Series

    Get PDF
    The debatable relationship of functional human hand proportion with the Fibonacci series has remained an obscure scientific enigma short of clinical interest. The main difficulty of proving such a relationship lies in defining what should constitute true "functional" proportion. In this study, we re-evaluate this unique relationship using hand flexion creases as anatomical surrogates for the functional axes of joint rotation. Standardized desktop photocopies of palmar views of both hands in full digital extension and abduction were obtained from 100 healthy male volunteers of Chinese ethnicity. The functional axes were represented by the distal digital crease (distal interphalangeal joint, DIPJ), proximal digital crease (proximal interphalangeal joint, PIPJ), as well as the midpoint between the palmar digital and transverse palmar creases (metacarpophalangeal joint, MCPJ). The ratio of DIPJ-Fingertip:PIPJ-DIPJ:MCPJ-PIPJ (p3:p2:p1) were measured by two independent observers and represented as standard deviation about the mean, and then compared to the theoretical ratio of 1:1:2. Our results showed that, for the 2nd to 5th digits, the p2:p3 ratios were 0.97±0.09, 1.10±0.10, 1.04±0.12 and 0.80±0.08 respectively; whilst the p1:p2 ratios were 1.91±0.17, 1.98±0.14, 1.89±0.16 and 2.09±0.24 respectively. When the data were analyzed for all digits, they showed a combined p3:p2:p1 ratio of 1:0.98:2.01. In conclusion, our results suggest that functional human hand proportion, as defined by flexion creases, is approximated by the Fibonacci series

    A universal quantum estimator

    Get PDF
    Almost all computational tasks in the modem computer can be designed from basic building blocks. These building blocks provide a powerful and efficient language for describing algorithms. In quantum computers, the basic building blocks are the quantum gates. In this tutorial, we will look at quantum gates that act on one and two qubits and briefly discuss how these gates can be used in quantum networks

    Surface modeling and grid generation for aeropropulsion CFD

    Get PDF
    The efforts in geometry modeling and grid generation at the NASA Lewis Research Center, as applied to the computational fluid dynamic (CFD) analysis of aeropropulsion systems, are presented. The efforts are mainly characterized by a focus on the analysis of components of an aeropropulsion system, which involve turbulent viscous flow with heat transfer and chemistry. Thus, this discussion will follow that characterization and will sequence through the components of typical propulsion systems consisting of inlets, compressors, combustors, turbines, and nozzles. For each component, some applications of CFD analysis will be presented to show how CFD is used to compute the desired performance information, how geometry modeling and grid generation are performed, and what issues have developed related to geometry modeling and grid generation. The discussion will illustrate the following needs related to geometry modeling and grid generation as observed in aeropropulsion analysis: (1) accurate and efficient resolution of turbulent viscous and chemically-reacting flowfields; (2) easy-to-use interfaces with CAD data for automated grid generation about complex geometries; and (3) automated batch grid generation software for use with design and optimization software

    Fuzzy identity-based data integrity auditing for reliable cloud storage systems

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.As a core security issue in reliable cloud storage, data integrity has received much attention. Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced data without downloading the data. A key research challenge associated with existing designs of data auditing protocols is the complexity in key management. In this paper, we seek to address the complex key management challenge in cloud data integrity checking by introducing fuzzy identity-based auditing-the first in such an approach, to the best of our knowledge. More specifically, we present the primitive of fuzzy identity-based data auditing, where a user’s identity can be viewed as a set of descriptive attributes. We formalize the system model and the security model for this new primitive. We then present a concrete construction of fuzzy identity-based auditing protocol by utilizing biometrics as the fuzzy identity. The new protocol offers the property of error-tolerance, namely, it binds private key to one identity which can be used to verify the correctness of a response generated with another identity, if and only if both identities are sufficiently close. We prove the security of our protocol based on the computational Diffie-Hellman assumption and the discrete logarithm assumption in the selective-ID security model. Finally, we develop a prototype implementation of the protocol which demonstrates the practicality of the proposal.This work is supported by the National Natural Science Foundation of China (61501333,61300213,61272436,61472083), the Fundamental Research Funds for the Central Universities under Grant ZYGX2015J05
    corecore