9,815 research outputs found

    Orbital Fluid Resupply Assessment

    Get PDF
    Orbital fluid resupply can significantly increase the cost-effectiveness and operational flexibility of spacecraft, satellites, and orbiting platforms and observatories. Reusable tankers are currently being designed for transporting fluids to space. A number of options exist for transporting the fluids and propellant to the space-based user systems. The fluids can be transported to space either in the Shuttle cargo bay or using expendable launch vehicles (ELVs). Resupply can thus be accomplished either from the Shuttle bay, or the tanker can be removed from the Shuttle bay or launched on an ELV and attached to a carrier such as the Orbital Maneuvering Vehicle (OMV) or Orbital Transfer Vehicle (OTV) for transport to the user to be serviced. A third option involves locating the tanker at the space station or an unmanned platform as a quasi-permanent servicing facility or depot which returns to the ground for recycling once its tanks are depleted. Current modular tanker designs for monopropellants, bipropellants, and water for space station propulsion are discussed. Superfluid helium tankers are addressed, including trade-offs in tanker sizes, shapes to fit the range of ELVs currently available, and boil-off losses associated with longer-term (greater than 6-month) space-basing. It is concluded that the mixed fleet approach to on-orbit consumables resupply offers significant advantages to the overall logistics requirements

    Quantum Key Distribution without sending a Quantum Signal

    Full text link
    Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. Whilst this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is considered we show it is possible to distribute an unconditionally secure secret key without sending a quantum signal, instead harnessing the intrinsic entanglement between different regions of space time. The protocol is practical in free space given horizon technology and might be testable in principle in the near term using microwave technology

    What underlies the neuropsychological pattern of irregular>regular past-tense verb production?

    Get PDF
    The disadvantage in producing the past tense of regular relative to irregular verbs shown by some patients with non-fluent aphasia has been alternatively attributed (a) to the failure of a specific rule-based morphological mechanism, or (b) to a more generalised phonological impairment that penalises regular verbs more than irregular owing to the on-average greater phonological complexity of regular past-tense forms. Guided by the second of these two accounts, the current study was designed to identify more specific aspects of phonological deficit that might be associated with the pattern of irregular > regular past-tense production. Non-fluent aphasic patients (N = 8) were tested on past-tense verb production tasks and assessed with regard to the impact of three main manipulations in other word-production tasks: (i) insertion of a delay between stimulus and response in repetition; (ii) presence/ number of consonant clusters in a target word in repetition; (iii) position of stress within a bi-syllabic word in repetition and picture naming. The performance of all patients deteriorated in delayed repetition; but the patients with the largest discrepancy between regular and irregular past-tense production showed greater sensitivity to the other two manipulations. The phonological nature of the factors that correlated with verb-inflection performance emphasises the role of a phonological deficit in the observed pattern of irregular > regular

    An Experimental Study of Information Revelation Policies in Sequential Auctions

    Get PDF
    Theoretical models of information asymmetry have identied a tradeoff between the desire to learn and the desire to prevent an opponent from learning private information. This paper reports a laboratory experiment that investigates if actual bidders account for this tradeoff, using a sequential procurement auction with private cost information and varying information revelation policies. Specically, the Complete Information Policy, where all submitted bids are revealed between auctions, is compared against the Incomplete Information Policy, where only the winning bid is revealed. The experimental results are largely consistent with the theoretical predictions. For example, bidders pool with other types to prevent an opponent from learning signicantly more often under a Complete Information Policy. Also as predicted, the procurer pays less when employing an Incomplete Information Policy only when the market is highly competitive. Bids are usually more aggressive than the risk neutral quantitative prediction, which is usually consistent with risk aversion.Complete and Incomplete Information Revelation Policies, Laboratory Study, Procurement Auction, Multistage Game

    Phonological Priming In Young Children Who Stutter: Holistic Versus Incremental Processing

    Get PDF
    Purpose: To investigate the holistic versus incremental phonological encoding processes of young children who stutter (CWS; N = 26) and age- and gender-matched children who do not stutter (CWNS; N = 26) via a picture-naming auditory priming paradigm. Method: Children named pictures during 3 auditory priming conditions: neutral, holistic, and incremental. Speech reaction time (SRT) was measured from the onset of picture presentation to the onset of participant response. Results: CWNS shifted from being significantly faster in the holistic priming condition to being significantly faster in the incremental priming condition from 3 to 5 years of age. In contrast, the majority of 3- and 5-year-old CWS continued to exhibit faster SRT in the holistic than the incremental condition. Conclusion: CWS are delayed in making the developmental shift in phonological encoding from holistic to incremental processing, a delay that may contribute to their difficulties establishing fluent speech.Communication Sciences and Disorder

    Brownian motion on disconnected sets, basic hypergeometric functions, and some continued fractions of Ramanujan

    Full text link
    Motivated by L\'{e}vy's characterization of Brownian motion on the line, we propose an analogue of Brownian motion that has as its state space an arbitrary closed subset of the line that is unbounded above and below: such a process will be a martingale, will have the identity function as its quadratic variation process, and will be ``continuous'' in the sense that its sample paths don't skip over points. We show that there is a unique such process, which turns out to be automatically a reversible Feller-Dynkin Markov process. We find its generator, which is a natural generalization of the operator f↦1/2f′′f\mapsto{1/2}f''. We then consider the special case where the state space is the self-similar set {±qk:k∈Z}∪{0}\{\pm q^k:k\in \mathbb{Z}\}\cup\{0\} for some q>1q>1. Using the scaling properties of the process, we represent the Laplace transforms of various hitting times as certain continued fractions that appear in Ramanujan's ``lost'' notebook and evaluate these continued fractions in terms of basic hypergeometric functions (that is, qq-analogues of classical hypergeometric functions). The process has 0 as a regular instantaneous point, and hence its sample paths can be decomposed into a Poisson process of excursions from 0 using the associated continuous local time. Using the reversibility of the process with respect to the natural measure on the state space, we find the entrance laws of the corresponding It\^{o} excursion measure and the Laplace exponent of the inverse local time -- both again in terms of basic hypergeometric functions. By combining these ingredients, we obtain explicit formulae for the resolvent of the process. We also compute the moments of the process in closed form. Some of our results involve qq-analogues of classical distributions such as the Poisson distribution that have appeared elsewhere in the literature.Comment: Published in at http://dx.doi.org/10.1214/193940307000000383 the IMS Collections (http://www.imstat.org/publications/imscollections.htm) by the Institute of Mathematical Statistics (http://www.imstat.org

    Continuous Variable Quantum Cryptography - beating the 3 dB loss limit

    Get PDF
    We demonstrate that secure quantum key distribution systems based on continuous variables implementations can operate beyond the apparent 3 dB loss limit that is implied by the beam splitting attack . The loss limit was established for standard minimum uncertainty states such as coherent states. We show that by an appropriate postselection mechanism we can enter a region where Eve's knowledge falls behind the information shared between Alice and Bob even in the presence of substantial losses.Comment: 4 pages, 2 figure
    • …
    corecore