34,000 research outputs found

    Real time flight simulation methodology

    Get PDF
    An example sensitivity study is presented to demonstrate how a digital autopilot designer could make a decision on minimum sampling rate for computer specification. It consists of comparing the simulated step response of an existing analog autopilot and its associated aircraft dynamics to the digital version operating at various sampling frequencies and specifying a sampling frequency that results in an acceptable change in relative stability. In general, the zero order hold introduces phase lag which will increase overshoot and settling time. It should be noted that this solution is for substituting a digital autopilot for a continuous autopilot. A complete redesign could result in results which more closely resemble the continuous results or which conform better to original design goals

    A polymorphic reconfigurable emulator for parallel simulation

    Get PDF
    Microprocessor and arithmetic support chip technology was applied to the design of a reconfigurable emulator for real time flight simulation. The system developed consists of master control system to perform all man machine interactions and to configure the hardware to emulate a given aircraft, and numerous slave compute modules (SCM) which comprise the parallel computational units. It is shown that all parts of the state equations can be worked on simultaneously but that the algebraic equations cannot (unless they are slowly varying). Attempts to obtain algorithms that will allow parellel updates are reported. The word length and step size to be used in the SCM's is determined and the architecture of the hardware and software is described

    Computational complexity and fundamental limitations to fermionic quantum Monte Carlo simulations

    Full text link
    Quantum Monte Carlo simulations, while being efficient for bosons, suffer from the "negative sign problem'' when applied to fermions - causing an exponential increase of the computing time with the number of particles. A polynomial time solution to the sign problem is highly desired since it would provide an unbiased and numerically exact method to simulate correlated quantum systems. Here we show, that such a solution is almost certainly unattainable by proving that the sign problem is NP-hard, implying that a generic solution of the sign problem would also solve all problems in the complexity class NP (nondeterministic polynomial) in polynomial time.Comment: 4 page

    Zero gravity tissue-culture laboratory

    Get PDF
    Hardware was developed for performing experiments to detect the effects that zero gravity may have on living human cells. The hardware is composed of a timelapse camera that photographs the activity of cell specimens and an experiment module in which a variety of living-cell experiments can be performed using interchangeable modules. The experiment is scheduled for the first manned Skylab mission

    Muscle protein and glycogen responses to recovery from hypogravity and unloading by tail-cast suspension

    Get PDF
    Previous studies in this laboratory using the tail-bast hindlimb suspension model have shown that there are specific changes in protein and carbohydrate metabolism in the soleus muscle due to unloading. For example, 6 days of unloading caused a 27% decrease in mass and a 60% increase in glycogen content in the soleus muscle, while the extensor digitorum longus muscle was unaffected. Also, fresh tissue tyrosine and its in vitro release from the muscle are increased in the unloaded soleus, indicating that this condition causes a more negative protein balance. With these results in mind, studies to investigate the effect of hypogravity on protein and carbohydrate metabolism in a number of rat hindlimb muscles were carried out

    New CP-violation and preferred-frame tests with polarized electrons

    Get PDF
    We used a torsion pendulum containing 9×1022\sim 9 \times 10^{22} polarized electrons to search for CP-violating interactions between the pendulum's electrons and unpolarized matter in the laboratory's surroundings or the sun, and to test for preferred-frame effects that would precess the electrons about a direction fixed in inertial space. We find gPegSN/(c)<1.7×1036|g_{\rm P}^e g_{\rm S}^N|/(\hbar c)< 1.7 \times 10^{-36} and gAegVN/(c)<4.8×1056|g_{\rm A}^e g_{\rm V}^N|/(\hbar c) < 4.8 \times 10^{-56} for λ>1\lambda > 1AU. Our preferred-frame constraints, interpreted in the Kosteleck\'y framework, set an upper limit on the parameter b~e5.0×1021|\bm{\tilde {b}}^e| \leq 5.0 \times 10^{-21} eV that should be compared to the benchmark value me2/MPlanck=2×1017m_e^2/M_{\rm Planck}= 2 \times 10^{-17} eV.Comment: 4 figures, accepted for publication in Physical Review Letter

    Omental Vascularized Lymph Node Flap: A Radiographic Analysis

    Get PDF
    Background Vascularized lymph node transfer is an increasingly popular option for the treatment of lymphedema. The omental donor site is advantageous for its copious soft tissue, well-defined collateral circulation, and large number of available nodes, without the risk of iatrogenic lymphedema. The purpose of this study is to define the anatomy of the omental flap in the context of vascularized lymph node harvest. Methods Consecutive abdominal computed tomography angiography (CTA) images performed at a single institution over a 1-year period were reviewed. Right gastroepiploic artery (RGEA) length, artery caliber, lymph node size, and lymph node location in relation to the artery were recorded. A two-tailed Z-test was used to compare means. A Gaussian Mixture Model confirmed by normalized entropy criterion was used to calculate three-dimensional lymph node cluster locations along the RGEA. Results In total, 156 CTA images met inclusion criteria. The RGEA caliber at its origin was significantly larger in males compared with females (p < 0.001). An average of 3.1 (1.7) lymph nodes were present per patient. There was no significant gender difference in the number of lymph nodes identified. Average lymph node size was significantly larger in males (4.9 [1.9] × 3.3 [0.6] mm in males vs. 4.5 [1.5] × 3.1 [0.5] mm in females; p < 0.001). Three distinct anatomical variations of the RGEA course were noted, each with a distinct lymph node clustering pattern. Total lymph node number and size did not differ among anatomical subgroups. Conclusion The omentum is a reliable lymph node donor site with consistent anatomy. This study serves as an aid in preoperative planning for vascularized lymph node transfer using the omental flap

    Formation of molecular oxygen in ultracold O + OH reaction

    Full text link
    We discuss the formation of molecular oxygen in ultracold collisions between hydroxyl radicals and atomic oxygen. A time-independent quantum formalism based on hyperspherical coordinates is employed for the calculations. Elastic, inelastic and reactive cross sections as well as the vibrational and rotational populations of the product O2 molecules are reported. A J-shifting approximation is used to compute the rate coefficients. At temperatures T = 10 - 100 mK for which the OH molecules have been cooled and trapped experimentally, the elastic and reactive rate coefficients are of comparable magnitude, while at colder temperatures, T < 1 mK, the formation of molecular oxygen becomes the dominant pathway. The validity of a classical capture model to describe cold collisions of OH and O is also discussed. While very good agreement is found between classical and quantum results at T=0.3 K, at higher temperatures, the quantum calculations predict a larger rate coefficient than the classical model, in agreement with experimental data for the O + OH reaction. The zero-temperature limiting value of the rate coefficient is predicted to be about 6.10^{-12} cm^3 molecule^{-1} s^{-1}, a value comparable to that of barrierless alkali-metal atom - dimer systems and about a factor of five larger than that of the tunneling dominated F + H2 reaction.Comment: 9 pages, 8 figure

    Gendered Objects and Gendered Spaces: The Invisibilities of ‘Knife’ Crime

    Get PDF
    The knife is a relatively mundane, domestic and easily accessible household item. At the same time, it is the most commonly used weapon in intimate partner homicide. Recently however the knife has become an object of fear and panic in England and Wales when used in public by mostly young men on other young men. This aim of this article is to offer some reflections on the conundrums posed by these two observations. Here the ‘knife’ is considered through the integrated lenses of space, gender and materiality. Situated in this way the contemporary preoccupation with ‘knife’ crime illustrates the ongoing and deeply held assumptions surrounding debates on public and private violence. Whilst criminology has much to say on gender and violence the gendered, spatialized, and material presence of the knife remains poorly understood. In prioritising ‘knife’ crime as a ‘public’ problem over its manifestation as an ongoing ‘private’ one, its gendered and spatialized features remain hidden thus adding to the failure of policy to tackle ‘knife’ crime in the round

    Strategies for protecting intellectual property when using CUDA applications on graphics processing units

    Get PDF
    Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators examining the operation of software. The ability to carry out reverse-engineering of software is of great importance within the security and forensics elds, particularly when investigating malicious software or carrying out forensic analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Uni ed Device Architecture) framework, it is not clear how best to approach the reverse engineering of a piece of CUDA software. We carry out a review of the di erent binary output formats which may be encountered from the CUDA compiler, and their implications on reverse engineering. We then demonstrate the process of carrying out disassembly of an example CUDA application, to establish the various techniques available to forensic investigators carrying out black-box disassembly and reverse engineering of CUDA binaries. We show that the Nvidia compiler, using default settings, leaks useful information. Finally, we demonstrate techniques to better protect intellectual property in CUDA algorithm implementations from reverse engineering
    corecore