1,823 research outputs found

    VHF command system study

    Get PDF
    Solutions are provided to specific problems arising in the GSFC VHF-PSK and VHF-FSK Command Systems in support of establishment and maintenance of Data Systems Standards. Signal structures which incorporate transmission on the uplink of a clock along with the PSK or FSK data are considered. Strategies are developed for allocating power between the clock and data, and spectral analyses are performed. Bit error probability and other probabilities pertinent to correct transmission of command messages are calculated. Biphase PCM/PM and PCM/FM are considered as candidate modulation techniques on the telemetry downlink, with application to command verification. Comparative performance of PCM/PM and PSK systems is given special attention, including implementation considerations. Gain in bit error performance due to coding is also considered

    The Injunctons of Scripture for a Well -Balanced Personality

    Get PDF
    The purpose of this paper is to show the power and aid that the Bible and Christianity can extend to mental and physical problems

    Challenges and solutions in measuring computer power supply efficiency for 80 PLUS® certification

    Get PDF
    Journal ArticleThis paper discusses the techniques, challenges, and results of measuring computer power supply (CPS) efficiency, power factor (PF), and input harmonic currents for the 80 PLUS® program since its beginning in 2002. To date, over 750 power supplies have been tested with many certified for the 80 PLUS® program. In spite of the large number of power supplies tested and years of testing, there is uncertainty within the computer power supply industry about the correct method for measuring efficiency, power factor, and harmonics. Moreover, in order to improve efficiency at light loading, manufacturers are adopting a duty-cycle control approach to power factor correction that raises even more questions on the proper measurement techniques. This paper presents detailed results of years of computer power supply testing, provides a detailed technical analysis on measurement accuracy with background on why specific measurement techniques were adopted, and looks to the future on upcoming technical difficulties and offers solutions for overcoming these difficulties

    ¿El tamaño y la orientación del grupo intruso afecta a la distancia de iniciación al vuelo en aves?

    Get PDF
    Wildlife managers use flight initiation distance (FID), the distance animals flee an approaching predator, to determine set back distances to minimize human impacts on wildlife. FID is typically estimated by a single person; this study examined the effects of intruder number and orientation on FID. Three different group size treatments (solitary person, two people side–by–side, two people one–behind–the–other) were applied to Pied Currawongs (Strepera graculina) and to Crimson Rosellas (Platycerus elegans). Rosellas flushed at significantly greater distances when approached by two people compared to a single person. This effect was not seen in currawongs. Intruder orientation did not influence the FID of either species. Results suggest that intruder number should be better integrated into estimates of set back distance to manage human visitation around sensitive species.Los gestores de la fauna utilizan la distancia de iniciación al vuelo (FID), la distancia a la que los animales huyen cuando se les acerca un depredador, para determinar las distancias de respuesta a fin de minimizar el impacto humano en la fauna. La FID es estimada típicamente por una sola persona; este estudio examinó los efectos del número y de la orientación del intruso en la FID. Se aplicaron tres tratamientos distintos de tamaño del grupo (persona solitaria, dos personas una al lado de la otra, dos personas una detras de la otra) a currawongs cálidos (Strepera graculina) y a pericos elegantes (Platycerus elegans). Los pericos elegantes huían a distancias perceptiblemente mayores cuando se le acercaban dos personas que cuando se le acercaba una sola. Este efecto no fue observado en los currawongs pálidos. La orientación del intruso no influenció en la FID de ninguna especie. Los resultados sugieren que el número de intrusos debería ser considerado en las estimaciones de las distancias de respuesta, para poder gestionar las visitas de personas cerca de especies sensibles

    Introduction to the Special Issue on the 2011 Tohoku Earthquake and Tsunami

    Get PDF
    The 11 March 2011 Tohoku earthquake (05:46:24 UTC) involved a massive rupture of the plate‐boundary fault along which the Pacific plate thrusts under northeastern Honshu, Japan. It was the fourth‐largest recorded earthquake, with seismic‐moment estimates of 3–5×10^(22)  N•m (M_w 9.0). The event produced widespread strong ground shaking in northern Honshu; in some locations ground accelerations exceeded 2g. Rupture extended ∼200  km along dip, spanning the entire width of the seismogenic zone from the Japan trench to below the Honshu coastline, and the aftershock‐zone length extended ∼500  km along strike of the subduction zone. The average fault slip over the entire rupture area was ∼10  m, but some estimates indicate ∼25  m of slip located around the hypocentral region and extraordinary slip of up to 60–80 m in the shallow megathrust extending to the trench. The faulting‐generated seafloor deformation produced a devastating tsunami that resulted in 5–10‐km inundation of the coastal plains, runup of up to 40 m along the Sanriku coastline, and catastrophic failure of the backup power systems at the Fukushima Daiichi nuclear power station, which precipitated a reactor meltdown and radiation release. About 18,131 lives appear to have been lost, 2829 people are still missing, and 6194 people were injured (as reported 28 September 2012 by the Fire and Disaster Management Agency of Japan) and over a half million were displaced, mainly due to the tsunami impact on coastal towns, where tsunami heights significantly exceeded harbor tsunami walls and coastal berms

    Runtime Analysis with R2U2: A Tool Exhibition Report

    Get PDF
    We present R2U2 (Realizable, Responsive, Unobtrusive Unit), a hardware-supported tool and framework for the continuous monitoring of safety-critical and embedded cyber-physical systems. With the widespread advent of autonomous systems such as Unmanned Aerial Systems (UAS), satellites, rovers, and cars, real-time, on-board decision making requires unobtrusive monitoring of properties for safety, performance, security, and system health. R2U2 models combine past-time and future-time Metric Temporal Logic, “mission time” Linear Temporal Logic, probabilistic reasoning with Bayesian Networks, and model-based prognostics. The R2U2 monitoring engine can be instantiated as a hardware solution, running on an FPGA, or as a software component. The FPGA realization enables R2U2 to monitor complex cyber-physical systems without any overhead or instrumentation of the flight software. In this tool exhibition report, we present R2U2 and demonstrate applications on system runtime monitoring, diagnostics, software health management, and security monitoring for a UAS. Our tool demonstration uses a hardware-based processor-in-the-loop “iron-bird” configuration

    Enabling EASEY deployment of containerized applications for future HPC systems

    Full text link
    The upcoming exascale era will push the changes in computing architecture from classical CPU-based systems in hybrid GPU-heavy systems with much higher levels of complexity. While such clusters are expected to improve the performance of certain optimized HPC applications, it will also increase the difficulties for those users who have yet to adapt their codes or are starting from scratch with new programming paradigms. Since there are still no comprehensive automatic assistance mechanisms to enhance application performance on such systems, we are proposing a support framework for future HPC architectures, called EASEY (Enable exASclae for EverYone). The solution builds on a layered software architecture, which offers different mechanisms on each layer for different tasks of tuning. This enables users to adjust the parameters on each of the layers, thereby enhancing specific characteristics of their codes. We introduce the framework with a Charliecloud-based solution, showcasing the LULESH benchmark on the upper layers of our framework. Our approach can automatically deploy optimized container computations with negligible overhead and at the same time reduce the time a scientist needs to spent on manual job submission configurations.Comment: International Conference on Computational Science ICCS2020, 13 page
    corecore