28,408 research outputs found

    Application of a transonic potential flow code to the static aeroelastic analysis of three-dimensional wings

    Get PDF
    Since the aerodynamic theory is nonlinear, the method requires the coupling of two iterative processes - an aerodynamic analysis and a structural analysis. A full potential analysis code, FLO22, is combined with a linear structural analysis to yield aerodynamic load distributions on and deflections of elastic wings. This method was used to analyze an aeroelastically-scaled wind tunnel model of a proposed executive-jet transport wing and an aeroelastic research wing. The results are compared with the corresponding rigid-wing analyses, and some effects of elasticity on the aerodynamic loading are noted

    Energy Efficient Engine: Control system component performance report

    Get PDF
    An Energy Efficient Engine (E3) program was established to develop technology for improving the energy efficiency of future commercial transport aircraft engines. As part of this program, General Electric designed and tested a new engine. The design, fabrication, bench and engine testing of the Full Authority Digital Electronic Control (FADEC) system used for controlling the E3 Demonstrator Engine is described. The system design was based on many of the proven concepts and component designs used on the General Electric family of engines. One significant difference is the use of the FADEC in place of hydromechanical computation currently used

    Control means for a gas turbine engine

    Get PDF
    A means is provided for developing a signal representative of the actual compressor casing temperature, a second signal representative of compressor inlet gas temperature, and a third signal representative of compressor speed. Another means is provided for receiving the gas temperature and compressor speed signals and developing a schedule output signal which is a representative of a reference casing temperature at which a predetermined compressor blade stabilized clearance is provided. A means is also provided for comparing the actual compressor casing temperature signal and the reference casing temperature signal and developing a clearance control system representative of the difference. The clearance control signal is coupled to a control valve which controls a flow of air to the compressor casing to control the clearance between the compressor blades and the compressor casing. The clearance control signal can be modified to accommodate transient characteristics. Other embodiments are disclosed

    Magnetoplasmadynamic thrustor research Final report

    Get PDF
    Radiation-cooled and water-cooled magnetoplasmadynamic thrustors tested in 10 to kW power range with 1000 to 5000 sec specific impuls

    Assessment of mapping exposed ferrous and ferric iron compounds using Skylab-EREP data

    Get PDF
    The author has identified the following significant results. The S190B color photography is as useful as LANDSAT data for the mapping of color differences in the rocks and soils of the terrain. An S192 ratio of 0.79 - 0.89 and 0.93 - 1.05 micron bands produced an apparently successful delineation of ferrous, ferric, and other materials, in agreement with theory and ratio code studies. From an analysis of S191 data, basalt and dacite were separated on the basis of differences in spectral emissivity in the 8.3 - 12 micron region

    Activating bound entanglement in multi-particle systems

    Get PDF
    We analyze the existence of activable bound entangled states in multi-particle systems. We first give a series of examples which illustrate some different ways in which bound entangled states can be activated by letting some of the parties to share maximally entangled states. Then, we derive necessary conditions for a state to be distillable as well as to be activable. These conditions turn out to be also sufficient for a certain family of multi-qubit states. We use these results to explicitely to construct states displaying novel properties related to bound entanglement and its activation.Comment: 8 pages, 3 figure

    An exploratory study of finite difference grids for transonic unsteady aerodynamics

    Get PDF
    Unsteady aerodynamic forces are calculated by the XTRAN2L finite difference program which solves the complete two dimensional unsteady transonic small perturbation equation. The unsteady forces are obtained using a pulse transfer function technique which assumes the flow field behaves in a locally linear fashion about a mean condition. Forces are calculated for a linear flat plate using the default grids from the LTRAN2-NLR, LTRAN2-HI, and XTRAN3S programs. The forces are compared to the exact theoretical values for flat plate, and grid generated boundary and internal numerical reflections are observed to cause significant errors in the unsteady airloads. Grids are presented that alleviate the reflections while reducing computational time up to fifty-three percent and program size up to twenty-eight percent. Forces are presented for a six percent thick parabolic arc airfoil which demonstrate that the transform technique may be successfully applied to nonlinear transonic flows

    A method of enciphering quantum states

    Get PDF
    In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties. First, even if an eavesdropper (Eve) steals qubits, she can extract information from them with certain probability at most. Second, Alice and Bob can confirm that the qubits are transmitted between them correctly by measuring a signature. If Eve measures m qubits one by one from n enciphered qubits and sends alternative ones (the Intercept/Resend attack), a probability that Alice and Bob do not notice Eve's action is equal to (3/4)^m or less. Passwords for decryption and the signature are given by classical binary strings and they are disclosed through a public channel. Enciphering classical information by this method is equivalent to the one-time pad method with distributing a classical key (random binary string) by the BB84 protocol. If Eve takes away qubits, Alice and Bob lose the original quantum information. If we apply our method to a state in iteration, Eve's success probability decreases exponentially. We cannot examine security against the case that Eve makes an attack with using entanglement. This remains to be solved in the future.Comment: 21 pages, Latex2e, 10 epsf figures. v2: 22 pages, added two references, several clarifying sentences are added in Sec. 5, typos corrected, a new proof is provided in Appendix A and it is shorter than the old one. v3: 23 pages, one section is adde

    Time-marching transonic flutter solutions including angle-of-attack effects

    Get PDF
    Transonic aeroelastic solutions based upon the transonic small perturbation potential equation were studied. Time-marching transient solutions of plunging and pitching airfoils were analyzed using a complex exponential modal identification technique, and seven alternative integration techniques for the structural equations were evaluated. The HYTRAN2 code was used to determine transonic flutter boundaries versus Mach number and angle-of-attack for NACA 64A010 and MBB A-3 airfoils. In the code, a monotone differencing method, which eliminates leading edge expansion shocks, is used to solve the potential equation. When the effect of static pitching moment upon the angle-of-attack is included, the MBB A-3 airfoil can have multiple flutter speeds at a given Mach number

    Simple Proof of Security of the BB84 Quantum Key Distribution Protocol

    Get PDF
    We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement-purification based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.Comment: 5 pages, Latex, minor changes to improve clarity and fix typo
    corecore