141,113 research outputs found
Development of an active fly-by-wire flight control system
A summary of the YF-16 flight control system is presented. The basic functions of the flight control system are discussed, as well as the unique features such as Relaxed Static Longitudinal Stability (RSS), Fly By Wire (FBW), and Side Stick Pilot's Controller (SSC). In addition, the basic philosophy behind the selection of the flight control system functions and unique features is discussed
Simplified landscapes for optimization of shaken lattice interferometry
Motivated by recent results using shaken optical lattices to perform atom
interferometry, we explore splitting of an atom cloud trapped in a
phase-modulated ("shaken") optical lattice. Using a simple analytic model we
are able to show that we can obtain the simplest case of splitting via single-frequency shaking. This is confirmed both
via simulation and experiment. Furthermore, we are able to split with a
relative phase between the two split arms of or depending on
our shaking frequency. Addressing higher-order splitting, we determine that
splitting is sufficient to be able to accelerate the
atoms in counter-propagating lattices. Finally, we show that we can use a
genetic algorithm to optimize and splitting to within by restricting our
optimization to the resonance frequencies corresponding to single- and
two-photon transitions between Bloch bands
Micellar Crystals in Solution from Molecular Dynamics Simulations
Polymers with both soluble and insoluble blocks typically self-assemble into
micelles, aggregates of a finite number of polymers where the soluble blocks
shield the insoluble ones from contact with the solvent. Upon increasing
concentration, these micelles often form gels that exhibit crystalline order in
many systems. In this paper, we present a study of both the dynamics and the
equilibrium properties of micellar crystals of triblock polymers using
molecular dynamics simulations. Our results show that equilibration of single
micelle degrees of freedom and crystal formation occurs by polymer transfer
between micelles, a process that is described by transition state theory. Near
the disorder (or melting) transition, bcc lattices are favored for all
triblocks studied. Lattices with fcc ordering are also found, but only at lower
kinetic temperatures and for triblocks with short hydrophilic blocks. Our
results lead to a number of theoretical considerations and suggest a range of
implications to experimental systems with a particular emphasis on Pluronic
polymers.Comment: 12 pages, 11 figures. Note that some figures are extremely low
quality to meet arXiv's file size limit
Fabrication process development of SiC/superalloy composite sheet for exhaust system components
A chemical compatibility study was conducted between SiC filament and the following P/M matrix alloys: Waspaloy, Hastelloy-X, NiCrAlY, Ha-188, S-57, FeCrAlY, and Incoloy 800. None of the couples demonstrated sufficient chemical compatibility to withstand the minimum HIP consolidation temperatures (996 C) or intended application temperature of the composite (982 C). However, Waspaloy, Haynes 188, and Hastelloy-X were the least reactive with SiC of the candidate alloys. Chemical vapor deposited tungsten was shown to be an effective diffusion barrier between the superalloy matrix and SiC filament providing a defect-free coating of sufficient thickness. However, the coating breaks down when the tungsten is converted into intermetallic compounds by interdiffusion with matrix constituents. Waspaloy was demonstrated to be the most effective matrix alloy candidate in contact with the CVD tungsten barrier because of its relatively low growth rate constant of the intermediate compound and the lack of formation of Kirkendall voids at the matrix-barrier interface. Fabrication methods were developed for producing panels of uniaxial and angle ply composites utilizing CVD tungsten coated filament
From present to future : beyond becoming a nation of readers
Includes bibliographical references (p. 13-19)The work upon which this publication was based was supported in part by the Office of Educational Research and Improvement under Cooperative Agreement No. OEG 0087-C100
A Fault Analytic Method against HB+
The search for lightweight authentication protocols suitable for low-cost
RFID tags constitutes an active and challenging research area. In this context,
a family of protocols based on the LPN problem has been proposed: the so-called
HB-family. Despite the rich literature regarding the cryptanalysis of these
protocols, there are no published results about the impact of fault analysis
over them. The purpose of this paper is to fill this gap by presenting a fault
analytic method against a prominent member of the HB-family: HB+ protocol. We
demonstrate that the fault analysis model can lead to a flexible and effective
attack against HB-like protocols, posing a serious threat over them
Numerical design of streamlined tunnel walls for a two-dimensional transonic test
An analytical procedure is discussed for designing wall shapes for streamlined, nonporous, two-dimensional, transonic wind tunnels. It is based upon currently available 2-D inviscid transonic and boundary layer analysis computer programs. Predicted wall shapes are compared with experimental data obtained from the NASA Langley 6 by 19 inch Transonic Tunnel where the slotted walls were replaced by flexible nonporous walls. Comparisons are presented for the empty tunnel operating at a Mach number of 0.9 and for a supercritical test of an NACA 0012 airfoil at zero lift. Satisfactory agreement is obtained between the analytically and experimentally determined wall shapes
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
The bounded storage model restricts the memory of an adversary in a
cryptographic protocol, rather than restricting its computational power, making
information theoretically secure protocols feasible. We present the first
protocols for commitment and oblivious transfer in the bounded storage model
with errors, i.e., the model where the public random sources available to the
two parties are not exactly the same, but instead are only required to have a
small Hamming distance between themselves. Commitment and oblivious transfer
protocols were known previously only for the error-free variant of the bounded
storage model, which is harder to realize
- …