4,244 research outputs found

    Artemis Curation: Preparing for Sample Return from the Lunar South Pole

    Get PDF
    Space Policy Directive-1 mandates that the United States will lead the return of humans to the Moon for long-term exploration and utilization, followed by human missions to Mars and other destinations. In addition, the Vice President stated that It is the stated policy of this administration and the United States of America to return American astronauts to the Moon within the next five years, that is, by 2024. These efforts, under the umbrella of the recently formed Artemis Program, include such historic goals as the flight of the first woman to the Moon and the exploration of the lunar south-polar region. Among the top priorities of the Artemis Program is the return of a suite of geologic samples, providing new and significant opportunities for progressing lunar science and human exploration. In particular, successful sample return is necessary for understanding the history of volatiles in the Solar System and the evolution of the Earth-Moon system, fully constraining the hazards of the lunar polar environment for astronauts, and providing the necessary data for constraining the abundance and distribution of resources for in-situ resource utilization (ISRU). Here we summarize the ef-forts of the Astromaterials Acquisition and Curation Office (hereafter referred to as the Curation Office) to ensure the success of Artemis sample return (per NASA Policy Directive (NPD) 7100.10E)

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples

    Symmetry breaking during homodimeric assembly activates an E3 ubiquitin ligase

    Get PDF
    Citation: Ye, Z., Needham, P. G., Estabrooks, S. K., Whitaker, S. K., Garcia, B. L., Misra, S., . . . Camacho, C. J. (2017). Symmetry breaking during homodimeric assembly activates an E3 ubiquitin ligase. Scientific Reports, 7(1). doi:10.1038/s41598-017-01880-4C-terminus of Hsc/p70-Interacting Protein (CHIP) is a homodimeric E3 ubiquitin ligase.Each CHIP monomer consists of a tetratricopeptide-repeat (TPR), helix-turn-helix (HH), and U-box domain.In contrast to nearly all homodimeric proteins, CHIP is asymmetric.To uncover the origins of asymmetry, we performed molecular dynamics simulations of dimer assembly.We determined that a CHIP monomer is most stable when the HH domain has an extended helix that supports intra-monomer TPR-U-box interaction, blocking the E2-binding surface of the U-box.We also discovered that monomers first dimerize symmetrically through their HH domains, which then triggers U-box dimerization.This brings the extended helices into close proximity, including a repulsive stretch of positively charged residues.Unable to smoothly unwind, this conflict bends the helices until the helix of one protomer breaks to relieve the repulsion.The abrupt snapping of the helix forces the C-terminal residues of the other protomer to disrupt that protomer's TPR-U-box tight binding interface, swiftly exposing and activating one of the E2 binding sites.Mutagenesis and biochemical experiments confirm that C-terminal residues are necessary both to maintain CHIP stability and function.This novel mechanism indicates how a ubiquitin ligase maintains an inactive monomeric form that rapidly activates only after asymmetric assembly. © 2017 The Author(s)

    Na, K-Rich Rim Around a Chondrule in Unequilibrated Ordinary Chondrite Lew 86018 (L3.1)

    Get PDF
    Ordinary chondrites represent the most abundant early Solar system extra-terrestrial (approximately 85% abundance) material available for laboratory studies and expectedly record the most extensive range of alterations effects from unmetamorphosed chondritic material to the highest temperatures of thermal metamorphism. The least metamorphosed chondrites belonging to petrologic type 3, the so called unequili-brated ordinary chondrites (UOCs), provide insights into alteration that happened during the primeval, ear-liest stage of Solar system formation. The higher grade petrologic types 4-6 ordinary chondrites on the other hand document up to near textural equilibrium (in type 6) extensive thermal metamorphism consisting of minerals and phases providing evidence of equilibration of heterogeneous mineral composition, solid-state recrystallization. Despite being the most abundant, the effect of alteration is less explicitly understood in ordinary chondrites (even less in UOCs) compared to other groups (e.g. CV, CO, CR). Additionally, the relationship between metasomatism (also referred as aqueous alteration or fluid-assisted metamorphism) and metamorphism (primarily thermal driven) has not been studied and alterations in the ordinary chondrites have been considered to have occurred in absence of fluids in general. Despite this conventional view, UOCs of lowest grades (3.0-3.2) show some evidence of low temperature (approximately 200 C), fluid assisted metamorphism in the form of the presence of phyllosilicates, ferroan olivine, and magnetites in their matrices and occasionally in chondrules. Here, we present petrographic and mineralogical studies of UOC, Lewis Hills (LEW) 86018 to further our understanding of the extent and relative importance of metasomatism and/or metamorphism in UOCs

    Some recent rural radio talks

    Get PDF
    Cream stirring is important. - D.C. Mickle Crossbreeding in pig production. - P. Beck Salmonella infection in sheep. - I.J. Miller Useful sprays for the home garden. A.A. Holland Tapeworm of dogs and cats. P.B. Lewis The poison plant and the animal. - R.D. Royce Sire surveys to prove bulls. K. Needham Peat as a substitute for horse manure. - L.T. Jone

    Notes on Conformal Invisibility Devices

    Get PDF
    As a consequence of the wave nature of light, invisibility devices based on isotropic media cannot be perfect. The principal distortions of invisibility are due to reflections and time delays. Reflections can be made exponentially small for devices that are large in comparison with the wavelength of light. Time delays are unavoidable and will result in wave-front dislocations. This paper considers invisibility devices based on optical conformal mapping. The paper shows that the time delays do not depend on the directions and impact parameters of incident light rays, although the refractive-index profile of any conformal invisibility device is necessarily asymmetric. The distortions of images are thus uniform, which reduces the risk of detection. The paper also shows how the ideas of invisibility devices are connected to the transmutation of force, the stereographic projection and Escheresque tilings of the plane

    Relativistic Chasles' theorem and the conjugacy classes of the inhomogeneous Lorentz group

    Full text link
    This work is devoted to the relativistic generalization of Chasles' theorem, namely to the proof that every proper orthochronous isometry of Minkowski spacetime, which sends some point to its chronological future, is generated through the frame displacement of an observer which moves with constant acceleration and constant angular velocity. The acceleration and angular velocity can be chosen either aligned or perpendicular, and in the latter case the angular velocity can be chosen equal or smaller than than the acceleration. We start reviewing the classical Euler's and Chasles' theorems both in the Lie algebra and group versions. We recall the relativistic generalization of Euler's theorem and observe that every (infinitesimal) transformation can be recovered from information of algebraic and geometric type, the former being identified with the conjugacy class and the latter with some additional geometric ingredients (the screw axis in the usual non-relativistic version). Then the proper orthochronous inhomogeneous Lorentz Lie group is studied in detail. We prove its exponentiality and identify a causal semigroup and the corresponding Lie cone. Through the identification of new Ad-invariants we classify the conjugacy classes, and show that those which admit a causal representative have special physical significance. These results imply a classification of the inequivalent Killing vector fields of Minkowski spacetime which we express through simple representatives. Finally, we arrive at the mentioned generalization of Chasles' theorem.Comment: Latex2e, 49 pages. v2: few typos correcte

    Formal Verification of Security Protocol Implementations: A Survey

    Get PDF
    Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages. Recently, some researchers have started investigating techniques that bring automated formal proofs closer to real implementations. This paper surveys these attempts, focusing on approaches that target the application code that implements protocol logic, rather than the libraries that implement cryptography. According to these approaches, libraries are assumed to correctly implement some models. The aim is to derive formal proofs that, under this assumption, give assurance about the application code that implements the protocol logic. The two main approaches of model extraction and code generation are presented, along with the main techniques adopted for each approac
    corecore