601 research outputs found

    An update on the middle levels problem

    Full text link
    The middle levels problem is to find a Hamilton cycle in the middle levels, M_{2k+1}, of the Hasse diagram of B_{2k+1} (the partially ordered set of subsets of a 2k+1-element set ordered by inclusion). Previously, the best result was that M_{2k+1} is Hamiltonian for all positive k through k=15. In this note we announce that M_{33} and M_{35} have Hamilton cycles. The result was achieved by an algorithmic improvement that made it possible to find a Hamilton path in a reduced graph of complementary necklace pairs having 129,644,790 vertices, using a 64-bit personal computer.Comment: 11 pages, 5 figure

    FLITECAM: current status and results from observatory verification flights

    Get PDF
    This paper describes the current status of FLITECAM, the near-infrared (1 - 5 ÎŒm) camera and spectrometer for NASA’s Stratospheric Observatory for Infrared Astronomy (SOFIA). Due to a change in schedule FLITECAM’s delivery was advanced, allowing it to be co-mounted with the HIPO instrument and used on four flights in October 2011 for observatory verification. Although not part of FLITECAM’s commissioning time, some preliminary performance characteristics were determined. Image size as a function of wavelength was measured prior to the installation of active mass dampers on the telescope. Preliminary grism spectroscopy was also obtained. In addition, FLITECAM was used to measure the emissivity of the telescope and warm optics in the co-mounted configuration. New narrow band filters were added to the instrument, including a Paschen alpha filter for line emission. Results are illustrated

    Fast and Vulnerable: A Story of Telematic Failures

    Get PDF
    Abstract Modern automobiles are complex distributed systems in which virtually all functionality -from acceleration and braking to lighting and HVAC -is mediated by computerized controllers. The interconnected nature of these systems raises obvious security concerns and prior work has demonstrated that a vulnerability in any single component may provide the means to compromise the system as a whole. Thus, the addition of new components, and especially new components with external networking capability, creates risks that must be carefully considered. In this paper we examine a popular aftermarket telematics control unit (TCU) which connects to a vehicle via the standard OBD-II port. We show that these devices can be discovered, targeted, and compromised by a remote attacker and we demonstrate that such a compromise allows arbitrary remote control of the vehicle. This problem is particularly challenging because, since this is aftermarket equipment, it cannot be well addressed by automobile manufacturers themselves

    Impact of Hemlock Woolly Adelgid (Hemiptera: Adelgidae) Infestation on the Jasmonic Acid-Elicited Defenses of Tsuga canadensis (Pinales: Pinaceae)

    Get PDF
    Hemlock woolly adelgid is an invasive piercing-sucking insect in eastern North America, which upon infestation of its main host, eastern hemlock (‘hemlock’), improves attraction and performance of folivorous insects on hemlock. This increased performance may be mediated by hemlock woolly adelgid feeding causing antagonism between the the jasmonic acid and other hormone pathways. In a common garden experiments using hemlock woolly adelgid infestation and induction with methyl jasmonate (MeJA) and measures of secondary metabolite contents and defense-associated enzyme activities, we explored the impact of hemlock woolly adelgid feeding on the local and systemic induction of jasmonic acid (JA)-elicited defenses. We found that in local tissue hemlock woolly adelgid or MeJA exposure resulted in unique induced phenotypes, whereas the combined treatment resulted in an induced phenotype that was a mixture of the two individual treatments. We also found that if the plant was infested with hemlock woolly adelgid, the systemic response of the plant was dominated by hemlock woolly adelgid, regardless of whether MeJA was applied. Interestingly, in the absence of hemlock woolly adelgid, hemlock plants had a very weak systemic response to MeJA. We conclude that hemlock woolly adelgid infestation prevents systemic induction of JA-elicited defenses. Taken together, compromised local JA-elicited defenses combined with weak systemic induction could be major contributors to increased folivore performance on hemlock woolly adelgid-infested hemlock

    The occupation of a box as a toy model for the seismic cycle of a fault

    Full text link
    We illustrate how a simple statistical model can describe the quasiperiodic occurrence of large earthquakes. The model idealizes the loading of elastic energy in a seismic fault by the stochastic filling of a box. The emptying of the box after it is full is analogous to the generation of a large earthquake in which the fault relaxes after having been loaded to its failure threshold. The duration of the filling process is analogous to the seismic cycle, the time interval between two successive large earthquakes in a particular fault. The simplicity of the model enables us to derive the statistical distribution of its seismic cycle. We use this distribution to fit the series of earthquakes with magnitude around 6 that occurred at the Parkfield segment of the San Andreas fault in California. Using this fit, we estimate the probability of the next large earthquake at Parkfield and devise a simple forecasting strategy.Comment: Final version of the published paper, with an erratum and an unpublished appendix with some proof
    • 

    corecore