7,429 research outputs found

    Tensile properties of textile composites

    Get PDF
    The importance of textile composite materials in aerospace structural applications has been gaining momentum in recent years. With a view to better understand the suitability of these materials in aerospace applications, an experimental program was undertaken to assess the mechanical properties of these materials. Specifically, the braided textile preforms were infiltrated with suitable polymeric matrices leading to the fabrication of composite test coupons. Evaluation of the tensile properties and the analyses of the results in the form of strength moduli, Poisson's ratio, etc., for the braided composites are presented. Based on our past experience with the textile coupons, the fabrication techniques have been modified (by incorporating glass microballoons in the matrix and/or by stabilizing the braid angle along the length of the specimen with axial fibers) to achieve enhanced mechanical properties of the textile composites. This paper outlines the preliminary experimental results obtained from testing these composites

    Hidden Home Videos: Surreptitious Video Surveillance in Divorce

    Get PDF
    In divorce court, often a very contentious and emotional court, parties frequently use what they can to gain the upper hand. The invention of new technology gives them an even wider arsenal. While tracking each other on the computer or checking phone records has become common, courts are now encountering instances where one spouse has placed hidden video cameras around the house to catch the other spouse doing something wrong. Under many state laws, courts have been forced to conclude that the surreptitious video recordings are not illegal. Perhaps more surprisingly, a few courts have concluded that the law either allows or requires the court to admit the recordings into evidence in divorce proceedings. This article examines the possible implications of allowing secret video recordings between spouses and the consequences of bringing these recordings into the courtroom. This article concludes with suggestions to limit the negative impact of these surreptitious video recordings

    Hidden Home Videos: Surreptitious Video Surveillance in Divorce

    Get PDF
    In divorce court, often a very contentious and emotional court, parties frequently use what they can to gain the upper hand. The invention of new technology gives them an even wider arsenal. While tracking each other on the computer or checking phone records has become common, courts are now encountering instances where one spouse has placed hidden video cameras around the house to catch the other spouse doing something wrong. Under many state laws, courts have been forced to conclude that the surreptitious video recordings are not illegal. Perhaps more surprisingly, a few courts have concluded that the law either allows or requires the court to admit the recordings into evidence in divorce proceedings. This article examines the possible implications of allowing secret video recordings between spouses and the consequences of bringing these recordings into the courtroom. This article concludes with suggestions to limit the negative impact of these surreptitious video recordings

    Onsager's Wien Effect on a Lattice

    Full text link
    The Second Wien Effect describes the non-linear, non-equilibrium response of a weak electrolyte in moderate to high electric fields. Onsager's 1934 electrodiffusion theory along with various extensions has been invoked for systems and phenomena as diverse as solar cells, surfactant solutions, water splitting reactions, dielectric liquids, electrohydrodynamic flow, water and ice physics, electrical double layers, non-Ohmic conduction in semiconductors and oxide glasses, biochemical nerve response and magnetic monopoles in spin ice. In view of this technological importance and the experimental ubiquity of such phenomena, it is surprising that Onsager's Wien effect has never been studied by numerical simulation. Here we present simulations of a lattice Coulomb gas, treating the widely applicable case of a double equilibrium for free charge generation. We obtain detailed characterisation of the Wien effect and confirm the accuracy of the analytical theories as regards the field evolution of the free charge density and correlations. We also demonstrate that simulations can uncover further corrections, such as how the field-dependent conductivity may be influenced by details of microscopic dynamics. We conclude that lattice simulation offers a powerful means by which to investigate system-specific corrections to the Onsager theory, and thus constitutes a valuable tool for detailed theoretical studies of the numerous practical applications of the Second Wien Effect.Comment: Main: 12 pages, 4 figures. Supplementary Information: 7 page

    High speed sCMOS-based oblique plane microscopy applied to the study of calcium dynamics in cardiac myocytes

    Get PDF
    blique plane microscopy (OPM) is a form of light sheet microscopy that uses a single high numerical aperture microscope objective for both fluorescence excitation and collection. In this paper, measurements of the relative collection efficiency of OPM are presented. An OPM system incorporating two sCMOS cameras is then introduced that enables single isolated cardiac myocytes to be studied continuously for 22 seconds in two dimensions at 667 frames per second with 960 × 200 pixels and for 30 seconds with 960 × 200 × 20 voxels at 25 volumes per second. In both cases OPM is able to record in two spectral channels, enabling intracellular calcium to be studied via the probe Fluo-4 AM simultaneously with the sarcolemma and transverse tubule network via the membrane dye Cellmask Orange. The OPM system was then applied to determine the spatial origin of spontaneous calcium waves for the first time and to measure the cell transverse tubule structure at their point of origin. Further results are presented to demonstrate that the OPM system can also be used to study calcium spark parameters depending on their relationship to the transverse tubule structure

    What is the best treatment for wrist ganglion cysts?

    Get PDF
    Q: What is the best treatment for wrist ganglion cysts? Evidence-based answer: Open surgical excision of wrist ganglion cysts is associated with a lower recurrence rate than aspiration with or without corticosteroid injection (strength of recommendation [SOR]: B, systematic review of randomized clinical trials [RCTs] and observational trials and RCT). Even though the recurrence rate with aspiration is about 50%, most patients are satisfied with aspiration and report a decrease in symptoms involving pain, function, and range of motion (SOR: B, individual cohort and case series).Corey Lyon, DO; Stephanie V. Eldred, MD (University of Colorado Family Medicine Residency, Denver); Kristen DeSanto, MSLS, MS, RD, AHIP (University of Colorado Health Sciences Library, Denver)Includes bibliographical reference

    Path integral Monte Carlo calculations of helium and hydrogen-helium plasma thermodynamics and of the deuterium shock Hugoniot

    Full text link
    In this work we calculate the thermodynamic properties of hydrogen-helium plasmas with different mass fractions of helium by the direct path integral Monte Carlo method. To avoid unphysical approximations we use the path integral representation of the density matrix. We pay special attention to the region of weak coupling and degeneracy and compare the results of simulation with a model based on the chemical picture. Further with the help of calculated deuterium isochors we compute the shock Hugoniot of deuterium. We analyze our results in comparison with recent experimental and calculated data on the deuterium Hugoniot.Comment: 7 pages, 5 Postscript figures, accepted for publication in J. Phys. A: Math. Ge

    Effects of electrojet turbulence on a magnetosphere-ionosphere simulation of a geomagnetic storm

    Full text link
    Ionospheric conductance plays an important role in regulating the response of the magnetosphere‐ionosphere system to solar wind driving. Typically, models of magnetosphere‐ionosphere coupling include changes to ionospheric conductance driven by extreme ultraviolet ionization and electron precipitation. This paper shows that effects driven by the Farley‐Buneman instability can also create significant enhancements in the ionospheric conductance, with substantial impacts on geospace. We have implemented a method of including electrojet turbulence (ET) effects into the ionospheric conductance model utilized within geospace simulations. Our particular implementation is tested with simulations of the Lyon‐Fedder‐Mobarry global magnetosphere model coupled with the Rice Convection Model of the inner magnetosphere. We examine the impact of including ET‐modified conductances in a case study of the geomagnetic storm of 17 March 2013. Simulations with ET show a 13% reduction in the cross polar cap potential at the beginning of the storm and up to 20% increases in the Pedersen and Hall conductance. These simulation results show better agreement with Defense Meteorological Satellite Program observations, including capturing features of subauroral polarization streams. The field‐aligned current (FAC) patterns show little differences during the peak of storm and agree well with Active Magnetosphere and Planetary Electrodynamics Response Experiment (AMPERE) reconstructions. Typically, the simulated FAC densities are stronger and at slightly higher latitudes than shown by AMPERE. The inner magnetospheric pressures derived from Tsyganenko‐Sitnov empirical magnetic field model show that the inclusion of the ET effects increases the peak pressure and brings the results into better agreement with the empirical model.This material is based upon work supported by NASA grants NNX14AI13G, NNX13AF92G, and NNX16AB80G. The National Center for Atmospheric Research is sponsored by the National Science Foundation. This work used the XSEDE and TACC computational facilities, supported by National Science Foundation grant ACI-1053575. We would like to acknowledge high-performance computing support from Yellowstone (ark:/85065/d7wd3xhc) provided by NCAR's Computational and Information Systems Laboratory, sponsored by the National Science Foundation. We thank the AMPERE team and the AMPERE Science Center for providing the Iridium derived data products. All model output, simulation codes, and analysis routines are being preserved on the NCAR High-Performance Storage System and will be made available upon written request to the lead author of this publication. (NNX14AI13G - NASA; NNX13AF92G - NASA; NNX16AB80G - NASA; National Science Foundation; ACI-1053575 - National Science Foundation

    High fidelity quantum memory via dynamical decoupling: theory and experiment

    Full text link
    Quantum information processing requires overcoming decoherence---the loss of "quantumness" due to the inevitable interaction between the quantum system and its environment. One approach towards a solution is quantum dynamical decoupling---a method employing strong and frequent pulses applied to the qubits. Here we report on the first experimental test of the concatenated dynamical decoupling (CDD) scheme, which invokes recursively constructed pulse sequences. Using nuclear magnetic resonance, we demonstrate a near order of magnitude improvement in the decay time of stored quantum states. In conjunction with recent results on high fidelity quantum gates using CDD, our results suggest that quantum dynamical decoupling should be used as a first layer of defense against decoherence in quantum information processing implementations, and can be a stand-alone solution in the right parameter regime.Comment: 6 pages, 3 figures. Published version. This paper was initially entitled "Quantum gates via concatenated dynamical decoupling: theory and experiment", by Jacob R. West, Daniel A. Lidar, Bryan H. Fong, Mark F. Gyure, Xinhua Peng, and Dieter Suter. That original version split into two papers: http://arxiv.org/abs/1012.3433 (theory only) and the current pape

    An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks

    Full text link
    As today's organizational computer networks are ever evolving and becoming more and more complex, finding potential vulnerabilities and conducting security audits has become a crucial element in securing these networks. The first step in auditing a network is reconnaissance by mapping it to get a comprehensive overview over its structure. The growing complexity, however, makes this task increasingly effortful, even more as mapping (instead of plain scanning), presently, still involves a lot of manual work. Therefore, the concept proposed in this paper automates the scanning and mapping of unknown and non-cooperative computer networks in order to find security weaknesses or verify access controls. It further helps to conduct audits by allowing comparing documented with actual networks and finding unauthorized network devices, as well as evaluating access control methods by conducting delta scans. It uses a novel approach of augmenting data from iteratively chained existing scanning tools with context, using genuine analytics modules to allow assessing a network's topology instead of just generating a list of scanned devices. It further contains a visualization model that provides a clear, lucid topology map and a special graph for comparative analysis. The goal is to provide maximum insight with a minimum of a priori knowledge.Comment: 7 pages, 6 figure
    • 

    corecore