334 research outputs found

    Effect of a Leading-edge Flap upon the Lift, Drag, and Pitching Moment of an Airplane Employing a Thin, Unswept Wing

    Get PDF
    The effects of deflecting full-span, constant-chord, leading-edge flaps, having either round or sharp leading edges, upon the lift, drag,. and pitching moment characteristics of a model of an interceptor-type aircraft have been determined experimentally at subsonic and supersonic speeds. Results indicate that the variations of lift with angle of attack and of pitching moment with lift were unaffected by either the shape of the flap leading edge or flap deflection. Deflection of the flaps having either a round or sharp leading edge increased the drag at zero lift at both subsonic and supersonic speeds. In spite of the increase in the drag at zero lift, however, deflection of the flaps increased the maximum lift-drag ratio at subsonic speeds and had no deleterious effect at supersonic speeds

    A Metric Encoding for Bounded Model Checking (extended version)

    Full text link
    In Bounded Model Checking both the system model and the checked property are translated into a Boolean formula to be analyzed by a SAT-solver. We introduce a new encoding technique which is particularly optimized for managing quantitative future and past metric temporal operators, typically found in properties of hard real time systems. The encoding is simple and intuitive in principle, but it is made more complex by the presence, typical of the Bounded Model Checking technique, of backward and forward loops used to represent an ultimately periodic infinite domain by a finite structure. We report and comment on the new encoding technique and on an extensive set of experiments carried out to assess its feasibility and effectiveness

    Machine Assisted Proof of ARMv7 Instruction Level Isolation Properties

    Get PDF
    In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA) for user mode executions. To obtain guarantees that arbitrary (and unknown) user processes are able to run isolated from privileged software and other user processes, instruction level noninterference and integrity properties are provided, along with proofs that transitions to privileged modes can only occur in a controlled manner. This work establishes a main requirement for operating system and hypervisor verification, as demonstrated for the PROSPER separation kernel. The proof is performed in the HOL4 theorem prover, taking the Cambridge model of ARM as basis. To this end, a proof tool has been developed, which assists the verification of relational state predicates semi-automatically
    • …
    corecore