1,034 research outputs found

    Effects of magnification and visual accommodation on aimpoint estimation in simulated landings with real and virtual image displays

    Get PDF
    Twenty professional pilots observed a computer-generated airport scene during simulated autopilot-coupled night landing approaches and at two points (20 sec and 10 sec before touchdown) judged whether the airplane would undershoot or overshoot the aimpoint. Visual accommodation was continuously measured using an automatic infrared optometer. Experimental variables included approach slope angle, display magnification, visual focus demand (using ophthalmic lenses), and presentation of the display as either a real (direct view) or a virtual (collimated) image. Aimpoint judgments shifted predictably with actual approach slope and display magnification. Both pilot judgments and measured accommodation interacted with focus demand with real-image displays but not with virtual-image displays. With either type of display, measured accommodation lagged far behind focus demand and was reliably less responsive to the virtual images. Pilot judgments shifted dramatically from an overwhelming perceived-overshoot bias 20 sec before touchdown to a reliable undershoot bias 10 sec later

    Preserving Liveness Guarantees from Synchronous Communication to Asynchronous Unstructured Low-Level Languages

    Get PDF
    In the implementation of abstract synchronous communication in asynchronous unstructured low-level languages, e.g. using shared variables, the preservation of safety and especially liveness properties is a hitherto open problem due to inherently different abstraction levels. Our approach to overcome this problem is threefold: First, we present our notion of handshake refinement with which we formally prove the correctness of the implementation relation of a handshake protocol. Second, we verify the soundness of our handshake refinement, i.e., all safety and liveness properties are preserved to the lower level. Third, we apply our handshake refinement to show the correctness of all implementations that realize the abstract synchronous communication with the handshake protocol. To this end, we employ an exemplary language with asynchronous shared variable communication. Our approach is scalable and closes the verification gap between different abstraction levels of communication

    Determination of ubiquitin fitness landscapes under different chemical stresses in a classroom setting

    Get PDF
    Ubiquitin is essential for eukaryotic life and varies in only 3 amino acid positions between yeast and humans. However, recent deep sequencing studies indicate that ubiquitin is highly tolerant to single mutations. We hypothesized that this tolerance would be reduced by chemically induced physiologic perturbations. To test this hypothesis, a class of first year UCSF graduate students employed deep mutational scanning to determine the fitness landscape of all possible single residue mutations in the presence of five different small molecule perturbations. These perturbations uncover \u27shared sensitized positions\u27 localized to areas around the hydrophobic patch and the C-terminus. In addition, we identified perturbation specific effects such as a sensitization of His68 in HU and a tolerance to mutation at Lys63 in DTT. Our data show how chemical stresses can reduce buffering effects in the ubiquitin proteasome system. Finally, this study demonstrates the potential of lab-based interdisciplinary graduate curriculum

    The Verifying Compiler: A Grand Challenge for Computing Research

    Get PDF
    Abstract. This contribution proposes a set of criteria that distinguish a grand challenge in science or engineering from the many other kinds of short-term or long-term research problems that engage the interest of scientists and engineers. As an example drawn from Computer Science, it revives an old challenge: the construction and application of a verifying compiler that guarantees correctness of a program before running it. Introduction. The primary purpose of the formulation and promulgation of a grand challenge is the advancement of science or engineering. A grand challenge represents a commitment by a significant section of the research community to work together towards a common goal, agreed to be valuable and achievable by a team effort within a predicted timescale. The challenge is formulated by th

    Field testing of ROCOF algorithms in multiple locations on Bornholm Island

    Get PDF
    The importance of rate of change of frequency (RoCoF) measurements in electrical power grids is discussed along with its measurement challenges. A measurement campaign in a renewable-rich grid to compare ROCOF measurement algorithms with a variety of configurations at multiple locations is presented. An example of a captured ROCOF event is given

    Field measurement of frequency and ROCOF in the presence of phase steps

    Get PDF
    A description of the importance of rate of change of frequency (ROCOF) measurements to the operation of electricity networks is given. The susceptibility of ROCOF measurements to common power system disturbances such as phase steps is described. A measurement campaign to observe ROCOF at multiple locations in an island grid dominated by renewable generation is described and some results are given. These captured ROCOF events are dominated by those associated with phase steps, which occur without significant change to underlying power system frequency. It is concluded that they constitute a “false” ROCOF event. A new algorithm is presented that attempts to remove the influence of the phase step and reduce the associated ROCOF error such that the reliability of ROCOF measurements can be improved in the presence of phase steps. The algorithm is then applied to some recorded waveform sequences from the island that contain phase steps and the results are presented. In one example, it is shown that a false ROCOF spike in excess of 100 Hz/s was reduced to less than 5 Hz/s

    Drained cavity expansion analysis with a unified state parameter model for clay and sand

    Get PDF
    This paper presents an analytical solution for drained expansion in both spherical and cylindrical cavities with a unified state parameter model for clay and sand (CASM). The solution developed here provides the stress and strain fields during the expansion of a cavity from an initial to an arbitrary final radius. Small strains are assumed for the elastic region and large strains are applied to soil in the plastic region by using logarithmic strain definitions. Since its development, the unified CASM model has been demonstrated by many researchers to be able to capture the overall soil behaviour for both clay and sand under both drained and undrained loading conditions. In this study, the CASM model is used to model soil behaviour whilst a drained cavity expansion solution is developed with the aid of an auxiliary variable. This is an extension of the undrained solution presented by the authors in 2017. The parametric study investigates the effects of various model constants including the stress-state coefficient and the spacing ratio on soil stress paths and cavity expansion curves. Both London clay and Ticino sand are modelled under various initial stress conditions and initial state parameters. The newly developed analytical solution highlights the potential applications in geotechnical practice (e.g., for the interpretation of cone penetration test data) and also provides useful benchmarks for numerical simulations of cavity expansion problems in critical state soils

    Novel Gene Acquisition on Carnivore Y Chromosomes

    Get PDF
    Despite its importance in harboring genes critical for spermatogenesis and male-specific functions, the Y chromosome has been largely excluded as a priority in recent mammalian genome sequencing projects. Only the human and chimpanzee Y chromosomes have been well characterized at the sequence level. This is primarily due to the presumed low overall gene content and highly repetitive nature of the Y chromosome and the ensuing difficulties using a shotgun sequence approach for assembly. Here we used direct cDNA selection to isolate and evaluate the extent of novel Y chromosome gene acquisition in the genome of the domestic cat, a species from a different mammalian superorder than human, chimpanzee, and mouse (currently being sequenced). We discovered four novel Y chromosome genes that do not have functional copies in the finished human male-specific region of the Y or on other mammalian Y chromosomes explored thus far. Two genes are derived from putative autosomal progenitors, and the other two have X chromosome homologs from different evolutionary strata. All four genes were shown to be multicopy and expressed predominantly or exclusively in testes, suggesting that their duplication and specialization for testis function were selected for because they enhance spermatogenesis. Two of these genes have testis-expressed, Y-borne copies in the dog genome as well. The absence of the four newly described genes on other characterized mammalian Y chromosomes demonstrates the gene novelty on this chromosome between mammalian orders, suggesting it harbors many lineage-specific genes that may go undetected by traditional comparative genomic approaches. Specific plans to identify the male-specific genes encoded in the Y chromosome of mammals should be a priority

    TAuth: Verifying timed security protocols

    Get PDF
    Quantitative timing is often explicitly used in systems for better security, e.g., the credentials for automatic website logon often has limited lifetime. Verifying timing relevant security protocols in these systems is very challenging as timing adds another dimension of complexity compared with the untimed protocol verification. In our previous work, we proposed an approach to check the correctness of the timed authentication in security protocols with fixed timing constraints. However, a more difficult question persists, i.e., given a particular protocol design, whether the protocol has security flaws in its design or it can be configured secure with proper parameter values? In this work, we answer this question by proposing a parameterized verification framework, where the quantitative parameters in the protocols can be intuitively specified as well as automatically analyzed. Given a security protocol, our verification algorithm either produces the secure constraints of the parameters, or constructs an attack that works for any parameter values. The correctness of our algorithm is formally proved. We implement our method into a tool called PTAuth and evaluate it with several security protocols. Using PTAuth, we have successfully found a timing attack in Kerberos V which is unreported before.No Full Tex
    corecore