2,127 research outputs found

    Investigation of trailing-edge-flap, spanwise-blowing concepts on an advanced fighter configuration

    Get PDF
    The aerodynamic effects of spanwise blowing on the trailing edge flap of an advanced fighter aircraft configuration were determined in the 4 by 7 Meter Tunnel. A series of tests were conducted with variations in spanwise-blowing vector angle, nozzle exit area, nozzle location, thrust coefficient, and flap deflection in order to determine a superior configuration for both an underwing cascade concept and an overwing port concept. This screening phase of the testing was conducted at a nominal approach angle of attack from 12 deg to 16 deg; and then the superior configurations were tested over a more complete angle of attack range from 0 deg to 20 deg at tunnel free stream dynamic pressures from 20 to 40 lbf/sq ft at thrust coefficients from 0 to 2

    Thrust-induced effects on low-speed aerodynamics of fighter aircraft

    Get PDF
    Results of NASA Langley has conducted wind-tunnel investigations of several fighter configurations conducted to determine the effects of both thrust vectoring and spanwise blowing are reviewed. A recent joint NASA/Grumman Aerospace Corporation/U.S. Air Force Wright Aeronautical Laboratory wind-tunnel investigation was conducted to examine the effects of spanwise blowing on the trailing-edge flap system. This application contrasts with the more familiar method of spanwise blowing near the wing leading edge. Another joint program among NASA/McDonnell Aircraft Company/U.S. Air Force Wright Aeronautical Laboratory investigated the effects of reverse thrust on the low-speed aerodynamics of an F-15 configuration. The F-15 model was fitted with a rotating van thrust reverser concept which could simulate both in-flight reversing for approach and landing or full reversing for ground roll reduction. The significant results of these two joint programs are reported

    Translational energy dependence of cross sections for reactions of OH− (H2O) n with CO2 and SO2

    Get PDF
    This is the publisher's version, also available electronically from http://scitation.aip.org/content/aip/journal/jcp/80/10/10.1063/1.446510.A tandem mass spectrometer has been used to measure cross sections for reactions of the solvated negative ions OH−(H2O) n , where 0≤n≤3, with the neutral molecules CO2 and SO2 over the range of reactant translational energy 0.15–25.0 eV (LAB). The reactions observed include solvent switching, collisional dissociation, and charge transfer. The exoergic solvent switching reactions are very rapid, having cross sections which exceed a hundred square Angstroms at low energies. These cross sections decrease approximately as (energy)−0.5 up to 1 eV and then decrease much more rapidly at higher collision energies. Estimates of bond dissociation energies for the cluster ions are derived from the measured translational energy thresholds for the endothermic collisional dissociationreactions

    C-type virus particles in human urogenital tumours after heterotransplantation into nude mice.

    Get PDF
    C-type viruses were formed in heterotransplants of 5/14 human urogenital tumours which had been serially transferred in nude mice of NIH(S) background. Except for one case in which C-type particles were present in the epithelial cells as well as the connective tissue, the viruses were only found within the stroma of the heterotransplanted tumours. Peroxidase labelling with anti-mouse serum demonstrated that the connective tissue supporting the transplanted human tumours was of mouse origin. Competition radioimmunoassays demonstrated that MuLV interspecies viral protein was present in high titre in the transplanted tumour extracts and also in extracts of 2 spontaneous mouse-tumour extracts. These data suggest that endogenous viruses of the nude mice are activated by the graft, and only subsequently infect the human tumour cells and form particles

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples

    Expression of Cadherin-11 during Organogenesis in the Chick Embryo

    Get PDF
    Cadherin-11 (cad-11) is primarily a mesenchymal cadherin that appears in delaminating neural crest cells. Its expression correlates with morphogenetic events and the pattern has been studied in mouse, rat and Xenopus embryos, but not during avian organogenesis. Our purpose was to investigate this pattern in the chick embryo during organogenesis using immunolocalization and in situ hybridization. Cad-11 was expressed in mesenchyme around the pharynx and aortic arches, eyes, auditory vesicles, lung buds, stomach, and nasal placodes. Neural expression included some cranial ganglia and also new neuroepithelium within the tail bud region undergoing secondary neurulation. We also found expression in epithelia of the developing circulatory and digestive organs. The limb buds, pineal rudiment and mesonephros were also positive. Cad-11 expression became more widespread with development. Our findings support the role of cad-11 as a mesenchymal cadherin, but provide evidence for a wider role that includes epithelial morphogenesis and secondary neurulation

    The Course and Interrelationship of Maternal and Paternal perinatal Depression

    Get PDF
    The aims of the study were to describe course of depression in both mothers and fathers from the third trimester of pregnancy through 6 months postpartum and to examine the relationship between maternal and paternal depression. Hypotheses were as follows: (a) Depressive symptoms would be correlated between parents and (b) earlier depressive symptoms in one parent would predict later increases in depression in the other. Eighty cohabitating primiparous couples were recruited from prenatal OBGYN visits and community agencies and enrolled during pregnancy, between 28-week gestation and delivery. Participants completed measures of depression on four occasions: baseline and 1, 3, and 6 months postpartum. Ninety-eight percent of the enrolled couples (78; 156 individuals) completed the study. For both mothers and fathers, symptom severity ratings and classification as a probable case were stable across time, with prenatal depression persisting through 6 months in 75 % of mothers and 86 % of fathers. Prenatal depression in fathers predicted worsening depressive symptom severity in mothers across the first six postpartum months but not vice versa. In both expecting/new mothers and fathers, depression demonstrates a stable pattern of occurrence and symptom severity between 28-month gestation and 6 months postpartum. Although prenatal maternal depression is not predictive of symptom change in fathers, mothers with prenatally depressed partners showed significant worsening in overall symptom severity during the first six postpartum months

    Attacking Group Protocols by Refuting Incorrect Inductive Conjectures

    Get PDF
    Automated tools for finding attacks on flawed security protocols often fail to deal adequately with group protocols. This is because the abstractions made to improve performance on fixed 2 or 3 party protocols either preclude the modelling of group protocols all together, or permit modelling only in a fixed scenario, which can prevent attacks from being discovered. This paper describes Coral, a tool for finding counterexamples to incorrect inductive conjectures, which we have used to model protocols for both group key agreement and group key management, without any restrictions on the scenario. We will show how we used Coral to discover 6 previously unknown attacks on 3 group protocols

    Deduction with XOR Constraints in Security API Modelling

    Get PDF
    We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols
    corecore