42,132 research outputs found

    The Myth of Superiority of American Encryption Products

    Get PDF
    Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now restricts the export of encryption products with key lengths of more than 56 bits. The controls are futile, because strong encryption products are readily available overseas. Foreign-made encryption products are as good as, or better than, U.S.-made products. U.S. cryptographers have no monopoly on the mathematical knowledge and methods used to create strong encryption. Powerful encryption symmetric-key technologies developed in other countries include IDEA and GOST. Researchers in New Zealand have developed very strong public-key encryption systems. As patents on strong algorithms of U.S. origin expire, researchers in other countries will gain additional opportunities to develop strong encryption technology based on those algorithms

    Population, Space, and Human Culture

    Get PDF

    Liquid seeding atomizer

    Get PDF
    An atomizer for a liquid having an air supply is described. Liquid supply tubes extend longitudinally along the air supply tube. The air supply tube has at least one air orifice extending from an inner surface of the tube through the tube. The liquid supply tubes are positioned on either side of the air orifices and the liquid tubes are sealed to the air supply tube. The liquid supply tubes with facing liquid orifices are positioned adjacent to each of the air orifices. The liquid supply tubes are laterally spaced apart at the liquid orifices at a distance less than the diameter of the air orifices to enable a beneficial venturi effect when the atomizer is in operation

    Observational Tests Of Intermediate Mass Star Yields Using Planetary Nebulae

    Get PDF
    This paper summarizes a project designed to study abundances in a sample of planetary nebulae representing a broad range in progenitor mass and metallicity. We collect abundances of C, N, and O determined for the entire sample and compare them with theoretical predictions of planetary nebula abundances from a grid of intermediate-mass star models. We find very good agreement between observations and theory, lending strong support to our current understanding of nucleosynthesis in stars with progenitor masses below 8 solar masses. This agreement between observation and theory also supports the validity of published stellar yields of C and N in the study of the abundance evolution of these two elements.Comment: 2 pages, to appear in the proceedings of ``Cosmic Evolution'', held at Institut d'Astrophysique de Paris, November 13-17, 200

    Variable geometry manned orbital vehicle Patent

    Get PDF
    Variable geometry manned orbital vehicle having high aerodynamic efficiency over wide speed range and incorporating auxiliary pivotal wing

    Fractional Chemotaxis Diffusion Equations

    Get PDF
    We introduce mesoscopic and macroscopic model equations of chemotaxis with anomalous subdiffusion for modelling chemically directed transport of biological organisms in changing chemical environments with diffusion hindered by traps or macro-molecular crowding. The mesoscopic models are formulated using Continuous Time Random Walk master equations and the macroscopic models are formulated with fractional order differential equations. Different models are proposed depending on the timing of the chemotactic forcing. Generalizations of the models to include linear reaction dynamics are also derived. Finally a Monte Carlo method for simulating anomalous subdiffusion with chemotaxis is introduced and simulation results are compared with numerical solutions of the model equations. The model equations developed here could be used to replace Keller-Segel type equations in biological systems with transport hindered by traps, macro-molecular crowding or other obstacles.Comment: 25page

    Space environments and their effects on space automation and robotics

    Get PDF
    Automated and robotic systems will be exposed to a variety of environmental anomalies as a result of adverse interactions with the space environment. As an example, the coupling of electrical transients into control systems, due to EMI from plasma interactions and solar array arcing, may cause spurious commands that could be difficult to detect and correct in time to prevent damage during critical operations. Spacecraft glow and space debris could introduce false imaging information into optical sensor systems. The presentation provides a brief overview of the primary environments (plasma, neutral atmosphere, magnetic and electric fields, and solid particulates) that cause such adverse interactions. The descriptions, while brief, are intended to provide a basis for the other papers presented at this conference which detail the key interactions with automated and robotic systems. Given the growing complexity and sensitivity of automated and robotic space systems, an understanding of adverse space environments will be crucial to mitigating their effects

    Equivalence classes of augmentations and Morse complex sequences of Legendrian knots

    Full text link
    Let L be a Legendrian knot in R^3 with the standard contact structure. In [10], a map was constructed from equivalence classes of Morse complex sequences for L, which are combinatorial objects motivated by generating families, to homotopy classes of augmentations of the Legendrian contact homology algebra of L. Moreover, this map was shown to be a surjection. We show that this correspondence is, in fact, a bijection. As a corollary, homotopic augmentations determine the same graded normal ruling of L and have isomorphic linearized contact homology groups. A second corollary states that the count of equivalence classes of Morse complex sequences of a Legendrian knot is a Legendrian isotopy invariant.Comment: 28 pages, 17 figure
    corecore