440 research outputs found

    Structures 2 - The response of a clamped circular plate to impulsive loads

    Get PDF
    Computer analysis of clamped circular plate response to axisymmetric impulsive loa

    Structures i- the response of beams and rings to high-intensity, short-duration loading

    Get PDF
    Computer programs for determining response of beams and rings to high intensity, short duration loadin

    Operation manual for the NOTS-NASA Rocket- Motor Acoustic Test Facility steady-state resonance tests with flow

    Get PDF
    Operation manual for steady state resonance tests through flow at rocket motor acoustic test facilit

    On the electromagnetic properties of active media

    Full text link
    Several results concerning active media or metamaterials are proved and discussed. In particular, we consider the permittivity, permeability, wave vector, and refractive index, and discuss stability, refraction, gain, and fundamental limitations resulting from causality

    Effects of detector efficiency mismatch on security of quantum cryptosystems

    Full text link
    We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photon detectors, this control parameter can be the timing of the incoming pulse. When the eavesdropper sends short pulses using the appropriate timing so that the two gated detectors in Bob's setup have different efficiencies, the security of quantum key distribution can be compromised. Specifically, we show for the Bennett-Brassard 1984 (BB84) protocol that if the efficiency mismatch between 0 and 1 detectors for some value of the control parameter gets large enough (roughly 15:1 or larger), Eve can construct a successful faked-states attack causing a quantum bit error rate lower than 11%. We also derive a general security bound as a function of the detector sensitivity mismatch for the BB84 protocol. Experimental data for two different detectors are presented, and protection measures against this attack are discussed.Comment: v3: identical to the journal version. However, after publication we have discovered that Eq. 11 is incorrect: the available bit rate after privacy amplification is reduced even in the case (QBER)=0 [see Quant. Inf. Comp. 7, 73 (2007)

    Population Pharmacokinetic Modeling To Estimate the Contributions of Genetic and Nongenetic Factors to Efavirenz Disposition

    Get PDF
    Efavirenz pharmacokinetics is characterized by large between-subject variability, which determines both therapeutic response and adverse effects. Some of the variability in efavirenz pharmacokinetics has been attributed to genetic variability in cytochrome P450 genes that alter efavirenz metabolism, such as CYP2B6 and CYP2A6. While the effects of additional patient factors have been studied, such as sex, weight, and body mass index, the extent to which they contribute to variability in efavirenz exposure is inconsistently reported. The aim of this analysis was to develop a pharmacometric model to quantify the contribution of genetic and nongenetic factors to efavirenz pharmacokinetics. A population-based pharmacokinetic model was developed using 1,132 plasma efavirenz concentrations obtained from 73 HIV-seronegative volunteers administered a single oral dose of 600 mg efavirenz. A two-compartment structural model with absorption occurring by zero- and first-order processes described the data. Allometric scaling adequately described the relationship between fat-free mass and apparent oral clearance, as well as fat mass and apparent peripheral volume of distribution. Inclusion of fat-free mass and fat mass in the model mechanistically accounted for correlation between these disposition parameters and sex, weight, and body mass index. Apparent oral clearance of efavirenz was reduced by 25% and 51% in subjects predicted to have intermediate and slow CYP2B6 metabolizer status, respectively. The final pharmacokinetic model accounting for fat-free mass, fat mass, and CYP2B6 metabolizer status was consistent with known mechanisms of efavirenz disposition, efavirenz physiochemical properties, and pharmacokinetic theory. (This study has been registered at ClinicalTrials.gov under identifier NCT00668395.

    Autonomous Robust Skill Generation Using Reinforcement Learning with Plant Variation

    Get PDF
    This paper discusses an autonomous space robot for a truss structure assembly using some reinforcement learning. It is difficult for a space robot to complete contact tasks within a real environment, for example, a peg-in-hole task, because of error between the real environment and the controller model. In order to solve problems, we propose an autonomous space robot able to obtain proficient and robust skills by overcoming error to complete a task. The proposed approach develops skills by reinforcement learning that considers plant variation, that is, modeling error. Numerical simulations and experiments show the proposed method is useful in real environments

    Controlling passively-quenched single photon detectors by bright light

    Full text link
    Single photon detectors based on passively-quenched avalanche photodiodes can be temporarily blinded by relatively bright light, of intensity less than a nanowatt. I describe a bright-light regime suitable for attacking a quantum key distribution system containing such detectors. In this regime, all single photon detectors in the receiver Bob are uniformly blinded by continuous illumination coming from the eavesdropper Eve. When Eve needs a certain detector in Bob to produce a click, she modifies polarization (or other parameter used to encode quantum states) of the light she sends to Bob such that the target detector stops receiving light while the other detector(s) continue to be illuminated. The target detector regains single photon sensitivity and, when Eve modifies the polarization again, produces a single click. Thus, Eve has full control of Bob and can do a successful intercept-resend attack. To check the feasibility of the attack, 3 different models of passively-quenched detectors have been tested. In the experiment, I have simulated the intensity diagrams the detectors would receive in a real quantum key distribution system under attack. Control parameters and side effects are considered. It appears that the attack could be practically possible.Comment: Experimental results from a third detector model added. Minor corrections and edits made. 11 pages, 10 figure

    Pi‐29

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/110026/1/cptclpt200664.pd
    corecore