2,977 research outputs found

    Measurements of Pilot Time Delay as Influenced by Controller Characteristics and Vehicles Time Delays

    Get PDF
    A study to measure and compare pilot time delay when using a space shuttle rotational hand controller and a more conventional control stick was conducted at NASA Ames Research Center's Dryden Flight Research Facility. The space shuttle controller has a palm pivot in the pitch axis. The more conventional controller used was a general-purpose engineering simulator stick that has a pivot length between that of a typical aircraft center stick and a sidestick. Measurements of the pilot's effective time delay were obtained through a first-order, closed-loop, compensatory tracking task in pitch. The tasks were implemented through a space shuttle cockpit simulator and a critical task tester device. The study consisted of 450 data runs with four test pilots and one nonpilot, and used three control stick configurations and two system delays. Results showed that the heavier conventional stick had the lowest pilot effective time delays associated with it, whereas the shuttle and light conventional sticks each had similar higher pilot time delay characteristics. It was also determined that each control stick showed an increase in pilot time delay when the total system delay was increased

    A characterization of Hermitian varieties as codewords

    Get PDF
    It is known that the Hermitian varieties are codewords in the code defined by the points and hyperplanes of the projective spaces PG(r,q2)PG(r,q^2). In finite geometry, also quasi-Hermitian varieties are defined. These are sets of points of PG(r,q2)PG(r,q^2) of the same size as a non-singular Hermitian variety of PG(r,q2)PG(r,q^2), having the same intersection sizes with the hyperplanes of PG(r,q2)PG(r,q^2). In the planar case, this reduces to the definition of a unital. A famous result of Blokhuis, Brouwer, and Wilbrink states that every unital in the code of the points and lines of PG(2,q2)PG(2,q^2) is a Hermitian curve. We prove a similar result for the quasi-Hermitian varieties in PG(3,q2)PG(3,q^2), q=phq=p^{h}, as well as in PG(r,q2)PG(r,q^2), q=pq=p prime, or q=p2q=p^2, pp prime, and r4r\geq 4

    Model of the meniscus of an ionic liquid ion source.

    Get PDF
    A simple model of the transfer of charge and ion evaporation in the meniscus of an ionic-liquid ion source working in the purely ionic regime is proposed on the basis of order-of-magnitude estimates which show that, in this regime, _i_ the flow in the meniscus is dominated by the viscosity of the liquid and is affected very little by the mass flux accompanying ion evaporation, and _ii_ the effect of the space charge around the evaporating surface is negligible and the evaporation current is controlled by the finite electrical conductivity of the liquid. The model predicts that a stationary meniscus of a very polar liquid undergoing ion evaporation is nearly hydrostatic and can exist only below a certain value of the applied electric field, at which the meniscus attains its maximum elongation but stays smooth. The electric current vs applied electric field characteristic displays a frozen regime of negligible ion evaporation at low fields and a conduction-controlled regime at higher fields, with a sharp transition between the two regimes owing to the high sensitivity of the ion evaporation rate to the electric field. A simplified treatment of the flow in the capillary or liquid layer through which liquid is delivered to the meniscus shows that the size of the meniscus decreases and the maximum attainable current increases when the feeding pressure is decreased, and that appropriate combinations of feeding pressure and pressure drop may lead to high maximum currents

    Plantas americanas nuevas para la flora adventicia del sur de España

    Get PDF
    New data about american neophytes for southern Andalusian flora.Palabras clave. Corología, xenófitos americanos, especies invasoras, Andalucía, SO de España.Key words. Chorology, american xenophytes, invasive flora, Andalusía, SW Spain

    Metastatic Uterine Leiomyosarcoma in the Upper Buccal Gingiva Misdiagnosed as an Epulis

    Get PDF
    Uterine leiomyosarcoma (LMS) is a rare tumor constituting 1% of all uterine malignancies. This sarcoma demonstrates an aggressive growth pattern with an high rate of recurrence with hematologic dissemination; the most common sites are lung, liver, and peritoneal cavity, head and neck district being rarely interested. Only other four cases of metastasis in the oral cavity have been previously described. The treatment of choice is surgery and the use of adjuvant chemotherapy and radiation has limited impact on clinical outcome. In case of metastases, surgical excision can be performed considering extent of disease, number and type of distant lesions, disease free interval from the initial diagnosis to the time of metastases, and expected life span. We illustrate a case of uterine LMS metastasis in the upper buccal gingiva that occurred during chemotherapy in a 63-year-old woman that underwent a total abdominal hysterectomy with bilateral salpingo-oophorectomy for a diagnosis of LMS staged as pT2bN0 and that developed lung metastases eight months after primary treatment. Surgical excision of the oral mass (previously misdiagnosed as epulis at a dental center) and contemporary reconstruction with pedicled temporalis muscle flap was performed in order to improve quality of life. Even if resection was achieved in free margins, "local" relapse was observed 5 months after surgery

    Mid-Pliocene shifts in ocean overturning circulation and the onset of Quaternary-style climates

    Get PDF
    A major tipping point of Earth's history occurred during the mid-Pliocene: the onset of major Northern-Hemisphere Glaciation (NHG) and of pronounced, Quaternary-style cycles of glacial-to-interglacial climates, that contrast with more uniform climates over most of the preceding Cenozoic and continue until today (Zachos et al., 2001). The severe deterioration of climate occurred in three steps between 3.2 Ma (warm MIS K3) and 2.7 Ma (glacial MIS G6/4) (Lisiecki and Raymo, 2005). Various models (sensu Driscoll and Haug, 1998) and paleoceanographic records (intercalibrated using orbital age control) suggest clear linkages between the onset of NHG and the three steps in the final closure of the Central American Seaways (CAS), deduced from rising salinity differences between Caribbean and the East Pacific. Each closing event led to an enhanced North Atlantic meridional overturning circulation and this strengthened the poleward transport of salt and heat (warmings of +2–3°C) (Bartoli et al., 2005). Also, the closing resulted in a slight rise in the poleward atmospheric moisture transport to northwestern Eurasia (Lunt et al., 2007), which probably led to an enhanced precipitation and fluvial run-off, lower sea surface salinity (SSS), and an increased sea-ice cover in the Arctic Ocean, hence promoting albedo and the build-up of continental ice sheets. Most important, new evidence shows that the closing of the CAS led to greater steric height of the North Pacific and thus doubled the low-saline Arctic Throughflow from the Bering Strait to the East Greenland Current (EGC). Accordingly, Labrador Sea IODP Site 1307 displays an abrupt but irreversible EGC cooling of 6°C and freshening by ~2 psu from 3.25/3.16–3.00 Ma, right after the first but still reversible attempt of closing the CAS

    How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack

    Get PDF
    In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, we make the first attempt to formally model the authentication in M2M. We first model four attacking adversaries that can formulate all possible attacks in M2M, which are channel eavesdropping attack, credential compromise attack, function compromise attack, and ghost compromise attack. Next, we propose four models to tackle those corresponding adversaries, namely, credential-based model, machine-metrics-based model, reference-based model, and witness-based model. We also illustrate several concrete attacking methods and authentication approaches. We proof the authentication security for all proposed models and compare them for clarity. Our models present soundness and completeness in terms of authentication security, which can guide the design and analysis of concrete authentication protocols. Particularly, we construct a uniform authentication framework for M2M context and point out all possible authentication mechanisms in M2M

    Methodological enhancements in MDO process investigated in the AGILE European project

    Get PDF
    This paper presents methodological investigations performed in research activities in the field of MDO in overall aircraft design in the ongoing EU funded research project AGILE. AGILE is developing the next generation of aircraft Multidisciplinary Design and Optimization processes, which target significant reductions in aircraft development costs and time to market, leading to cheaper and greener aircraft solutions. The paper introduces the AGILE project structure and describes the achievements of the 1st year (Design Campaign 1) leading to a reference distributed MDO system. A focus is then made on the different novel optimization techniques studied during the 2nd year, all willing to ease the optimization of complex work flows, characterized by high degree of discipline interdependencies, high number of design variables in the context of multi-level and multi-partner collaborative engineering projects. Then the implementation of these methods in the enhanced MDO framework is discussed
    corecore