27,780 research outputs found

    Development of molded, coated fabric joints: Fabric construction criteria for a spacesuit elbow joint

    Get PDF
    The design and fabrication of a molded, coated fabric elbow joint capable of operating reliably at 8 psi internal pressure for extended periods of flexure is considered. The overall design of the joint includes: (1) selection of heatsettable fiber of sufficient strengths; (2) choosing an optimum fabric construction; (3) a fatigue resistant; flexible coating; and (4) a molding technique. A polyester yarn of type 56 Dacron and a urethane coating system were selected. The relationships between yarn and weave parameters which lead to an optimum fabric construction for the 8 psi elbow joint are defined

    Developing Mathematics Enrichment Workshops for Middle School Students: Philosophy and Sample Workshops

    Get PDF
    This paper describes our approach to organizing enrichment activities using advanced mathematics topics for diverse audiences of middle school students. We discuss our philosophy and approaches for the structure of these workshops, and then provide sample schedules and resource materials. The workshops cover activities on the following topics: Graphing Calculators; The Chaos Game; Statistical Sampling; CT Scans–the reconstruction problem; The Platonic and Archimedean solids; The Shape of Space; Symmetry; The Binary Number System and the game of NIM; Graph Theory: Proof by Counterexample

    Psychological tools for knowledge acquisition

    Get PDF
    Knowledge acquisition is said to be the biggest bottleneck in the development of expert systems. The problem is getting the knowledge out of the expert's head and into a computer. In cognitive psychology, characterizing metal structures and why experts are good at what they do is an important research area. Is there some way that the tools that psychologists have developed to uncover mental structure can be used to benefit knowledge engineers? We think that the way to find out is to browse through the psychologist's toolbox to see what there is in it that might be of use to knowledge engineers. Expert system developers have relied on two standard methods for extracting knowledge from the expert: (1) the knowledge engineer engages in an intense bout of interviews with the expert or experts, or (2) the knowledge engineer becomes an expert himself, relying on introspection to uncover the basis of his own expertise. Unfortunately, these techniques have the difficulty that often the expert himself isn't consciously aware of the basis of his expertise. If the expert himself isn't conscious of how he solves problems, introspection is useless. Cognitive psychology has faced similar problems for many years and has developed exploratory methods that can be used to discover cognitive structure from simple data

    Additions to fused-fluoride lubricant coatings for reduction of low-temperature friction

    Get PDF
    Additions to fused-fluoride lubricant coatings for reduction of low temperature frictio

    Investigation of kilovolt ion sputtering second quarterly progress report

    Get PDF
    Kilovolt ion sputtering - electron beam focusing of cesium ion beam, radiation detection in copper atoms, ultrahigh vacuum system construction, and spectrometer pulse heigh

    Statics and Dynamics of Vortex Liquid Crystals

    Full text link
    Using numerical simulations we examine the static and dynamic properties of the recently proposed vortex liquid crystal state. We confirm the existence of a smectic-A phase in the absence of pinning. Quenched disorder can induce a smectic state even at T=0. When an external drive is applied, a variety of anisotropic dynamical flow states with distinct voltage signatures occur, including elastic depinning in the hard direction and plastic depinning in the easy direction. We discuss the implications of the anisotropic transport for other systems which exhibit depinning phenomena, such as stripes and electron liquid crystals.Comment: 4 pages, 4 postscript figure

    The Attack-and-Defense Group Contests: Best-shot versus Weakest-link

    Get PDF
    This study analyzes a group contest in which one group (defenders) follows a weakest-link whereas the other group (attackers) follows a best-shot impact function. We fully characterize the Nash and coalition-proof equilibria and show that with symmetric valuation the coalition-proof equilibrium is unique up to the permutation of the identity of the active player in the attacker group. With asymmetric valuation it is always an equilibrium for one of the highest valuation players to be active; it may also be the case that the highest valuation players in the attacker group free-ride completely on a group-member with a lower valuation. However, in any equilibrium, only one player in the attacker group is active, whereas all the players in the defender group are active and exert the same effort. We also characterize the Nash and coalition-proof equilibria for the case in which one group follows either a best-shot or a weakest-link but the other group follows an additive impact function

    The DOE/NASA wind turbine data acquisition system. Part 3: Unattended power performance monitor

    Get PDF
    Software documentation, operational procedures, and diagnostic instructions for development version of an unattended wind turbine performance monitoring system is provided. Designed to be used for off line intelligent data acquisition in conjunction with the central host computer
    • …
    corecore