44,005 research outputs found
The Myth of Superiority of American Encryption Products
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now restricts the export of encryption products with key lengths of more than 56 bits. The controls are futile, because strong encryption products are readily available overseas. Foreign-made encryption products are as good as, or better than, U.S.-made products. U.S. cryptographers have no monopoly on the mathematical knowledge and methods used to create strong encryption. Powerful encryption symmetric-key technologies developed in other countries include IDEA and GOST. Researchers in New Zealand have developed very strong public-key encryption systems. As patents on strong algorithms of U.S. origin expire, researchers in other countries will gain additional opportunities to develop strong encryption technology based on those algorithms
Liquid seeding atomizer
An atomizer for a liquid having an air supply is described. Liquid supply tubes extend longitudinally along the air supply tube. The air supply tube has at least one air orifice extending from an inner surface of the tube through the tube. The liquid supply tubes are positioned on either side of the air orifices and the liquid tubes are sealed to the air supply tube. The liquid supply tubes with facing liquid orifices are positioned adjacent to each of the air orifices. The liquid supply tubes are laterally spaced apart at the liquid orifices at a distance less than the diameter of the air orifices to enable a beneficial venturi effect when the atomizer is in operation
Observational Tests Of Intermediate Mass Star Yields Using Planetary Nebulae
This paper summarizes a project designed to study abundances in a sample of
planetary nebulae representing a broad range in progenitor mass and
metallicity. We collect abundances of C, N, and O determined for the entire
sample and compare them with theoretical predictions of planetary nebula
abundances from a grid of intermediate-mass star models. We find very good
agreement between observations and theory, lending strong support to our
current understanding of nucleosynthesis in stars with progenitor masses below
8 solar masses. This agreement between observation and theory also supports the
validity of published stellar yields of C and N in the study of the abundance
evolution of these two elements.Comment: 2 pages, to appear in the proceedings of ``Cosmic Evolution'', held
at Institut d'Astrophysique de Paris, November 13-17, 200
Variable geometry manned orbital vehicle Patent
Variable geometry manned orbital vehicle having high aerodynamic efficiency over wide speed range and incorporating auxiliary pivotal wing
Fractional Chemotaxis Diffusion Equations
We introduce mesoscopic and macroscopic model equations of chemotaxis with
anomalous subdiffusion for modelling chemically directed transport of
biological organisms in changing chemical environments with diffusion hindered
by traps or macro-molecular crowding. The mesoscopic models are formulated
using Continuous Time Random Walk master equations and the macroscopic models
are formulated with fractional order differential equations. Different models
are proposed depending on the timing of the chemotactic forcing.
Generalizations of the models to include linear reaction dynamics are also
derived. Finally a Monte Carlo method for simulating anomalous subdiffusion
with chemotaxis is introduced and simulation results are compared with
numerical solutions of the model equations. The model equations developed here
could be used to replace Keller-Segel type equations in biological systems with
transport hindered by traps, macro-molecular crowding or other obstacles.Comment: 25page
Space environments and their effects on space automation and robotics
Automated and robotic systems will be exposed to a variety of environmental anomalies as a result of adverse interactions with the space environment. As an example, the coupling of electrical transients into control systems, due to EMI from plasma interactions and solar array arcing, may cause spurious commands that could be difficult to detect and correct in time to prevent damage during critical operations. Spacecraft glow and space debris could introduce false imaging information into optical sensor systems. The presentation provides a brief overview of the primary environments (plasma, neutral atmosphere, magnetic and electric fields, and solid particulates) that cause such adverse interactions. The descriptions, while brief, are intended to provide a basis for the other papers presented at this conference which detail the key interactions with automated and robotic systems. Given the growing complexity and sensitivity of automated and robotic space systems, an understanding of adverse space environments will be crucial to mitigating their effects
Equivalence classes of augmentations and Morse complex sequences of Legendrian knots
Let L be a Legendrian knot in R^3 with the standard contact structure. In
[10], a map was constructed from equivalence classes of Morse complex sequences
for L, which are combinatorial objects motivated by generating families, to
homotopy classes of augmentations of the Legendrian contact homology algebra of
L. Moreover, this map was shown to be a surjection. We show that this
correspondence is, in fact, a bijection. As a corollary, homotopic
augmentations determine the same graded normal ruling of L and have isomorphic
linearized contact homology groups. A second corollary states that the count of
equivalence classes of Morse complex sequences of a Legendrian knot is a
Legendrian isotopy invariant.Comment: 28 pages, 17 figure
- …