15,093 research outputs found

    Anthony Rorrer v. City of Stow et al.

    Get PDF

    Tandem Fan Applications in Advanced STOVL Fighter Configurations

    Get PDF
    The series/parallel tandem fan engine is evaluated for application in advanced STOVL supersonic fighter aircraft. Options in engine cycle parameters and design of the front fan flow diverter are examined for their effects on engine weight, dimensions, and other factors in integration of the engine with the aircraft. Operation of the engine in high-bypass flow mode during cruise and loiter flight is considered as a means of minimizizng fuel consumption. Engine thrust augmentation by burning in the front fan exhaust is discussed. Achievement of very sort takeoff with vectored thrust in briefly reviewed for tandem fan engine configurations with vectorable front fan nozzles. Examples are given of two aircraft configuration planforms, a delta-canard, and a forward-swept wing, to illustrate the major features. design considerations, and potential performance of the tandem fan installation in each. Full realization of the advantages of tandem fan propulsion are found to depend on careful selection of the aircraft configuration, since integration requirements can strongly influence the engine performance

    GravEn: Software for the simulation of gravitational wave detector network response

    Full text link
    Physically motivated gravitational wave signals are needed in order to study the behaviour and efficacy of different data analysis methods seeking their detection. GravEn, short for Gravitational-wave Engine, is a MATLAB software package that simulates the sampled response of a gravitational wave detector to incident gravitational waves. Incident waves can be specified in a data file or chosen from among a group of pre-programmed types commonly used for establishing the detection efficiency of analysis methods used for LIGO data analysis. Every aspect of a desired signal can be specified, such as start time of the simulation (including inter-sample start times), wave amplitude, source orientation to line of sight, location of the source in the sky, etc. Supported interferometric detectors include LIGO, GEO, Virgo and TAMA.Comment: 10 Pages, 3 Figures, Presented at the 10th Gravitational Wave Data Analysis Workshop (GWDAW-10), 14-17 December 2005 at the University of Texas, Brownsvill

    Chapter 15: State and Local Taxation

    Get PDF

    Trellis decoding complexity of linear block codes

    Get PDF
    In this partially tutorial paper, we examine minimal trellis representations of linear block codes and analyze several measures of trellis complexity: maximum state and edge dimensions, total span length, and total vertices, edges and mergers. We obtain bounds on these complexities as extensions of well-known dimension/length profile (DLP) bounds. Codes meeting these bounds minimize all the complexity measures simultaneously; conversely, a code attaining the bound for total span length, vertices, or edges, must likewise attain it for all the others. We define a notion of “uniform” optimality that embraces different domains of optimization, such as different permutations of a code or different codes with the same parameters, and we give examples of uniformly optimal codes and permutations. We also give some conditions that identify certain cases when no code or permutation can meet the bounds. In addition to DLP-based bounds, we derive new inequalities relating one complexity measure to another, which can be used in conjunction with known bounds on one measure to imply bounds on the others. As an application, we infer new bounds on maximum state and edge complexity and on total vertices and edges from bounds on span lengths

    Side-channel-free quantum key distribution

    Get PDF
    Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.Comment: Considering general quantum systems, we extended QKD to the presence of an untrusted relay, whose measurement creates secret correlations in remote stations (achievable rate lower-bounded by the coherent information). This key ingredient, i.e., the use of a measurement-based untrusted relay, has been called 'measurement-device independence' in another arXiv submission (arXiv:1109.1473
    corecore