43 research outputs found
The Ginger-shaped Asteroid 4179 Toutatis: New Observations from a Successful Flyby of Chang'e-2
On 13 December 2012, Chang'e-2 conducted a successful flyby of the near-Earth
asteroid 4179 Toutatis at a closest distance of 770 120 meters from the
asteroid's surface. The highest-resolution image, with a resolution of better
than 3 meters, reveals new discoveries on the asteroid, e.g., a giant basin at
the big end, a sharply perpendicular silhouette near the neck region, and
direct evidence of boulders and regolith, which suggests that Toutatis may bear
a rubble-pile structure. Toutatis' maximum physical length and width are (4.75
1.95 km) 10, respectively, and the direction of the + axis
is estimated to be (2505, 635) with respect to the
J2000 ecliptic coordinate system. The bifurcated configuration is indicative of
a contact binary origin for Toutatis, which is composed of two lobes (head and
body). Chang'e-2 observations have significantly improved our understanding of
the characteristics, formation, and evolution of asteroids in general.Comment: 21 pages, 3 figures, 1 tabl
Recommended from our members
From the Real Vehicle to the Virtual Vehicle
We focus on systems with task arrivals in time and space. A good model for the single-customer case is the Dynamic Traveling Repairman Problem (DTRP) [1]. The DTRP literature has focused on optimizing the expected value of system time, defined as the elapsed time between the arrival and the completion of each task. We focus on the stability and distribution of system time, including its variance. This dissertation establishes a partially policy independent necessary and sufficient condition for stability in the DTRP. The policy class includes some of the policies proven to be optimal for system time expectation under light and heavy loads in the literature. We propose a new policy named PART-n-TSP and compute a good approximation for its system time distribution. PART-n-TSP has lower system time variance than PART-TSP [2] and Nearest Neighbor [1] when the load is neither too small or too large. We prove that PART-n-TSP is also optimal for system time expectation under light and heavy loads.In the multi-customer case, the scheduling policies of the DTRP and other vehicle routing problems do not create performance isolation [3] between customers. We explore performance isolation between customers by borrowing the virtual machine abstraction from cloud computing. Since our servers are moving vehicles, we propose a new equivalent of the virtual machine called the virtual vehicle enabling what we call cloud computing in space. The customer operates virtual vehicles that are in reality hosted by fewer, shared provider-operated real vehicles. We show that cloud computing in space can do better than conventional cloud computing in the sense of realizing high performance isolation (e.g. 98%) while requiring significantly fewer real vehicles (e.g. approximately 1-for-5)
Securing linked transportation systems: economic implications and investment strategies
The security of the transportation system depends on that of any of its components and how they are interlinked. But the securing of each component is oftentimes in the hand of the agency in whose jurisdiction it falls. Literature on reliability and security economics suggests that when security is defined by the weakest link in an interlinked system, then its level is determined by the agent with the highest cost-benefit ratio, and the other agents have the tendency to under-invest or free ride. When security is a function of total effort, then the opposite obtains and the reliability will depend on the agent with the lowest cost-benefit ratio. These conditions arise in urban transportation. This research explores agency investment behavior in multi-agency urban transportation systems develops guidelines for investments in security. The question to answer: is it preferable to let each agency operate its own security budget and make its own investment decisions or is this process better centralized
Securing linked transportation systems: economic implications and investment strategies
The security of the transportation system depends on that of any of its components and how they are interlinked. But the securing of each component is oftentimes in the hand of the agency in whose jurisdiction it falls. Literature on reliability and security economics suggests that when security is defined by the weakest link in an interlinked system, then its level is determined by the agent with the highest cost-benefit ratio, and the other agents have the tendency to under-invest or free ride. When security is a function of total effort, then the opposite obtains and the reliability will depend on the agent with the lowest cost-benefit ratio. These conditions arise in urban transportation. This research explores agency investment behavior in multi-agency urban transportation systems develops guidelines for investments in security. The question to answer: is it preferable to let each agency operate its own security budget and make its own investment decisions or is this process better centralized?Engineering
Model Selection for Exponential Power Mixture Regression Models
Finite mixture of linear regression (FMLR) models are among the most exemplary statistical tools to deal with various heterogeneous data. In this paper, we introduce a new procedure to simultaneously determine the number of components and perform variable selection for the different regressions for FMLR models via an exponential power error distribution, which includes normal distributions and Laplace distributions as special cases. Under some regularity conditions, the consistency of order selection and the consistency of variable selection are established, and the asymptotic normality for the estimators of non-zero parameters is investigated. In addition, an efficient modified expectation-maximization (EM) algorithm and a majorization-maximization (MM) algorithm are proposed to implement the proposed optimization problem. Furthermore, we use the numerical simulations to demonstrate the finite sample performance of the proposed methodology. Finally, we apply the proposed approach to analyze a baseball salary data set. Results indicate that our proposed method obtains a smaller BIC value than the existing method