Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment
NASA Astrophysics Data System (ADS)
Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung
2016-07-01
Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.
Analysis of brute-force break-ins of a palmprint authentication system.
Kong, Adams W K; Zhang, David; Kamel, Mohamed
2006-10-01
Biometric authentication systems are widely applied because they offer inherent advantages over classical knowledge-based and token-based personal-identification approaches. This has led to the development of products using palmprints as biometric traits and their use in several real applications. However, as biometric systems are vulnerable to replay, database, and brute-force attacks, such potential attacks must be analyzed before biometric systems are massively deployed in security systems. This correspondence proposes a projected multinomial distribution for studying the probability of successfully using brute-force attacks to break into a palmprint system. To validate the proposed model, we have conducted a simulation. Its results demonstrate that the proposed model can accurately estimate the probability. The proposed model indicates that it is computationally infeasible to break into the palmprint system using brute-force attacks.
Simple Criteria to Determine the Set of Key Parameters of the DRPE Method by a Brute-force Attack
NASA Astrophysics Data System (ADS)
Nalegaev, S. S.; Petrov, N. V.
Known techniques of breaking Double Random Phase Encoding (DRPE), which bypass the resource-intensive brute-force method, require at least two conditions: the attacker knows the encryption algorithm; there is an access to the pairs of source and encoded images. Our numerical results show that for the accurate recovery by numerical brute-force attack, someone needs only some a priori information about the source images, which can be quite general. From the results of our numerical experiments with optical data encryption DRPE with digital holography, we have proposed four simple criteria for guaranteed and accurate data recovery. These criteria can be applied, if the grayscale, binary (including QR-codes) or color images are used as a source.
Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft
2013-03-27
the cheapest computers currently on the market (the $35 Raspberry Pi [New13, Upt13]) to distribute the workload, a determined attacker would incur a...cCost of Brute-Force) for 6,318 Raspberry Pi systems (x) at $82 per 3DR-enabled Raspberry Pi (RPCost of RasPi) [3DR13, New13] to brute-force all 3,790,800...NIST, 2004. [New13] Newark. Order the Raspberry Pi , November 2013. last accessed: 19 Febru- ary 2014. URL: http://www.newark.com/jsp/search
Develop a solution for protecting and securing enterprise networks from malicious attacks
NASA Astrophysics Data System (ADS)
Kamuru, Harshitha; Nijim, Mais
2014-05-01
In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.
Security enhanced BioEncoding for protecting iris codes
NASA Astrophysics Data System (ADS)
Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya
2011-06-01
Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.
Fast optimization algorithms and the cosmological constant
NASA Astrophysics Data System (ADS)
Bao, Ning; Bousso, Raphael; Jordan, Stephen; Lackey, Brad
2017-11-01
Denef and Douglas have observed that in certain landscape models the problem of finding small values of the cosmological constant is a large instance of a problem that is hard for the complexity class NP (Nondeterministic Polynomial-time). The number of elementary operations (quantum gates) needed to solve this problem by brute force search exceeds the estimated computational capacity of the observable Universe. Here we describe a way out of this puzzling circumstance: despite being NP-hard, the problem of finding a small cosmological constant can be attacked by more sophisticated algorithms whose performance vastly exceeds brute force search. In fact, in some parameter regimes the average-case complexity is polynomial. We demonstrate this by explicitly finding a cosmological constant of order 10-120 in a randomly generated 1 09-dimensional Arkani-Hamed-Dimopoulos-Kachru landscape.
Step to improve neural cryptography against flipping attacks.
Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold
2004-12-01
Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.
1976-07-30
Interface Requirements 4 3.1.1.1 Interface Block Diagram 4 3.1.1.2 Detailed Interface Definition 7 3.1.1.2.1 Subsystems 7 3.1.1.2.2 Controls & Displays 11 r...116 3.2.3.2 Navigation Brute Force 121 3.2.3.3 Cargo Brute Force 125 3.2.3.4 Sensor Brute Force 129 3.2.3.5 Controls /Displays Brute Force 135 3.2.3.6...STD-T553 Multiplex Data Bus, with the avionic subsystems, flight * control system, the controls /displays, engine sensors, and airframe sensors. 3.1
DynaGuard: Armoring Canary-Based Protections against Brute-Force Attacks
2015-12-11
public domain. Non-exclusive copying or redistribution is...sje ng 462 .lib qua ntu m 464 .h2 64r ef 471 .om net pp 473 .as tar 483 .xa lan cbm k Apa che Ng inx Pos tgre SQ L SQ Lite My SQ L Sl ow do w n (n...k 456 .hm me r 458 .sje ng 462 .lib qua ntu m 464 .h2 64r ef 471 .om net pp 473 .as tar 483 .xa lan cbm k Apa che Ng inx Pos tgre SQ L SQ Lite My
Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.
Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262
Optical image encryption system using nonlinear approach based on biometric authentication
NASA Astrophysics Data System (ADS)
Verma, Gaurav; Sinha, Aloka
2017-07-01
A nonlinear image encryption scheme using phase-truncated Fourier transform (PTFT) and natural logarithms is proposed in this paper. With the help of the PTFT, the input image is truncated into phase and amplitude parts at the Fourier plane. The phase-only information is kept as the secret key for the decryption, and the amplitude distribution is modulated by adding an undercover amplitude random mask in the encryption process. Furthermore, the encrypted data is kept hidden inside the face biometric-based phase mask key using the base changing rule of logarithms for secure transmission. This phase mask is generated through principal component analysis. Numerical experiments show the feasibility and the validity of the proposed nonlinear scheme. The performance of the proposed scheme has been studied against the brute force attacks and the amplitude-phase retrieval attack. Simulation results are presented to illustrate the enhanced system performance with desired advantages in comparison to the linear cryptosystem.
Securing Digital Audio using Complex Quadratic Map
NASA Astrophysics Data System (ADS)
Suryadi, MT; Satria Gunawan, Tjandra; Satria, Yudi
2018-03-01
In This digital era, exchanging data are common and easy to do, therefore it is vulnerable to be attacked and manipulated from unauthorized parties. One data type that is vulnerable to attack is digital audio. So, we need data securing method that is not vulnerable and fast. One of the methods that match all of those criteria is securing the data using chaos function. Chaos function that is used in this research is complex quadratic map (CQM). There are some parameter value that causing the key stream that is generated by CQM function to pass all 15 NIST test, this means that the key stream that is generated using this CQM is proven to be random. In addition, samples of encrypted digital sound when tested using goodness of fit test are proven to be uniform, so securing digital audio using this method is not vulnerable to frequency analysis attack. The key space is very huge about 8.1×l031 possible keys and the key sensitivity is very small about 10-10, therefore this method is also not vulnerable against brute-force attack. And finally, the processing speed for both encryption and decryption process on average about 450 times faster that its digital audio duration.
NASA Astrophysics Data System (ADS)
Basri, M.; Mawengkang, H.; Zamzami, E. M.
2018-03-01
Limitations of storage sources is one option to switch to cloud storage. Confidentiality and security of data stored on the cloud is very important. To keep up the confidentiality and security of such data can be done one of them by using cryptography techniques. Data Encryption Standard (DES) is one of the block cipher algorithms used as standard symmetric encryption algorithm. This DES will produce 8 blocks of ciphers combined into one ciphertext, but the ciphertext are weak against brute force attacks. Therefore, the last 8 block cipher will be converted into 8 random images using Least Significant Bit (LSB) algorithm which later draws the result of cipher of DES algorithm to be merged into one.
A Survey of Image Encryption Algorithms
NASA Astrophysics Data System (ADS)
Kumari, Manju; Gupta, Shailender; Sardana, Pranshul
2017-12-01
Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve confidentiality of images over a reliable unrestricted public media. This medium is vulnerable to attacks and hence efficient encryption algorithms are necessity for secure data transfer. Various techniques have been proposed in literature till date, each have an edge over the other, to catch-up to the ever growing need of security. This paper is an effort to compare the most popular techniques available on the basis of various performance metrics like differential, statistical and quantitative attacks analysis. To measure the efficacy, all the modern and grown-up techniques are implemented in MATLAB-2015. The results show that the chaotic schemes used in the study provide highly scrambled encrypted images having uniform histogram distribution. In addition, the encrypted images provided very less degree of correlation coefficient values in horizontal, vertical and diagonal directions, proving their resistance against statistical attacks. In addition, these schemes are able to resist differential attacks as these showed a high sensitivity for the initial conditions, i.e. pixel and key values. Finally, the schemes provide a large key spacing, hence can resist the brute force attacks, and provided a very less computational time for image encryption/decryption in comparison to other schemes available in literature.
Phase-Image Encryption Based on 3D-Lorenz Chaotic System and Double Random Phase Encoding
NASA Astrophysics Data System (ADS)
Sharma, Neha; Saini, Indu; Yadav, AK; Singh, Phool
2017-12-01
In this paper, an encryption scheme for phase-images based on 3D-Lorenz chaotic system in Fourier domain under the 4f optical system is presented. The encryption scheme uses a random amplitude mask in the spatial domain and a random phase mask in the frequency domain. Its inputs are phase-images, which are relatively more secure as compared to the intensity images because of non-linearity. The proposed scheme further derives its strength from the use of 3D-Lorenz transform in the frequency domain. Although the experimental setup for optical realization of the proposed scheme has been provided, the results presented here are based on simulations on MATLAB. It has been validated for grayscale images, and is found to be sensitive to the encryption parameters of the Lorenz system. The attacks analysis shows that the key-space is large enough to resist brute-force attack, and the scheme is also resistant to the noise and occlusion attacks. Statistical analysis and the analysis based on correlation distribution of adjacent pixels have been performed to test the efficacy of the encryption scheme. The results have indicated that the proposed encryption scheme possesses a high level of security.
Near-Neighbor Algorithms for Processing Bearing Data
1989-05-10
neighbor algorithms need not be universally more cost -effective than brute force methods. While the data access time of near-neighbor techniques scales with...the number of objects N better than brute force, the cost of setting up the data structure could scale worse than (Continues) 20...for the near neighbors NN2 1 (i). Depending on the particular NN algorithm, the cost of accessing near neighbors for each ai E S1 scales as either N
Known-plaintext attack on the double phase encoding and its implementation with parallel hardware
NASA Astrophysics Data System (ADS)
Wei, Hengzheng; Peng, Xiang; Liu, Haitao; Feng, Songlin; Gao, Bruce Z.
2008-03-01
A known-plaintext attack on the double phase encryption scheme implemented with parallel hardware is presented. The double random phase encoding (DRPE) is one of the most representative optical cryptosystems developed in mid of 90's and derives quite a few variants since then. Although the DRPE encryption system has a strong power resisting to a brute-force attack, the inherent architecture of DRPE leaves a hidden trouble due to its linearity nature. Recently the real security strength of this opto-cryptosystem has been doubted and analyzed from the cryptanalysis point of view. In this presentation, we demonstrate that the optical cryptosystems based on DRPE architecture are vulnerable to known-plain text attack. With this attack the two encryption keys in the DRPE can be accessed with the help of the phase retrieval technique. In our approach, we adopt hybrid input-output algorithm (HIO) to recover the random phase key in the object domain and then infer the key in frequency domain. Only a plaintext-ciphertext pair is sufficient to create vulnerability. Moreover this attack does not need to select particular plaintext. The phase retrieval technique based on HIO is an iterative process performing Fourier transforms, so it fits very much into the hardware implementation of the digital signal processor (DSP). We make use of the high performance DSP to accomplish the known-plaintext attack. Compared with the software implementation, the speed of the hardware implementation is much fast. The performance of this DSP-based cryptanalysis system is also evaluated.
On grey levels in random CAPTCHA generation
NASA Astrophysics Data System (ADS)
Newton, Fraser; Kouritzin, Michael A.
2011-06-01
A CAPTCHA is an automatically generated test designed to distinguish between humans and computer programs; specifically, they are designed to be easy for humans but difficult for computer programs to pass in order to prevent the abuse of resources by automated bots. They are commonly seen guarding webmail registration forms, online auction sites, and preventing brute force attacks on passwords. In the following, we address the question: How does adding a grey level to random CAPTCHA generation affect the utility of the CAPTCHA? We treat the problem of generating the random CAPTCHA as one of random field simulation: An initial state of background noise is evolved over time using Gibbs sampling and an efficient algorithm for generating correlated random variables. This approach has already been found to yield highly-readable yet difficult-to-crack CAPTCHAs. We detail how the requisite parameters for introducing grey levels are estimated and how we generate the random CAPTCHA. The resulting CAPTCHA will be evaluated in terms of human readability as well as its resistance to automated attacks in the forms of character segmentation and optical character recognition.
Can genetic algorithms help virus writers reshape their creations and avoid detection?
NASA Astrophysics Data System (ADS)
Abu Doush, Iyad; Al-Saleh, Mohammed I.
2017-11-01
Different attack and defence techniques have been evolved over time as actions and reactions between black-hat and white-hat communities. Encryption, polymorphism, metamorphism and obfuscation are among the techniques used by the attackers to bypass security controls. On the other hand, pattern matching, algorithmic scanning, emulation and heuristic are used by the defence team. The Antivirus (AV) is a vital security control that is used against a variety of threats. The AV mainly scans data against its database of virus signatures. Basically, it claims a virus if a match is found. This paper seeks to find the minimal possible changes that can be made on the virus so that it will appear normal when scanned by the AV. Brute-force search through all possible changes can be a computationally expensive task. Alternatively, this paper tries to apply a Genetic Algorithm in solving such a problem. Our proposed algorithm is tested on seven different malware instances. The results show that in all the tested malware instances only a small change in each instance was good enough to bypass the AV.
NASA Astrophysics Data System (ADS)
Desnijder, Karel; Hanselaer, Peter; Meuret, Youri
2016-04-01
A key requirement to obtain a uniform luminance for a side-lit LED backlight is the optimised spatial pattern of structures on the light guide that extract the light. The generation of such a scatter pattern is usually performed by applying an iterative approach. In each iteration, the luminance distribution of the backlight with a particular scatter pattern is analysed. This is typically performed with a brute-force ray-tracing algorithm, although this approach results in a time-consuming optimisation process. In this study, the Adding-Doubling method is explored as an alternative way for evaluating the luminance of a backlight. Due to the similarities between light propagating in a backlight with extraction structures and light scattering in a cloud of light scatterers, the Adding-Doubling method which is used to model the latter could also be used to model the light distribution in a backlight. The backlight problem is translated to a form upon which the Adding-Doubling method is directly applicable. The calculated luminance for a simple uniform extraction pattern with the Adding-Doubling method matches the luminance generated by a commercial raytracer very well. Although successful, no clear computational advantage over ray tracers is realised. However, the dynamics of light propagation in a light guide as used the Adding-Doubling method, also allow to enhance the efficiency of brute-force ray-tracing algorithms. The performance of this enhanced ray-tracing approach for the simulation of backlights is also evaluated against a typical brute-force ray-tracing approach.
The Parallel Implementation of Algorithms for Finding the Reflection Symmetry of the Binary Images
NASA Astrophysics Data System (ADS)
Fedotova, S.; Seredin, O.; Kushnir, O.
2017-05-01
In this paper, we investigate the exact method of searching an axis of binary image symmetry, based on brute-force search among all potential symmetry axes. As a measure of symmetry, we use the set-theoretic Jaccard similarity applied to two subsets of pixels of the image which is divided by some axis. Brute-force search algorithm definitely finds the axis of approximate symmetry which could be considered as ground-truth, but it requires quite a lot of time to process each image. As a first step of our contribution we develop the parallel version of the brute-force algorithm. It allows us to process large image databases and obtain the desired axis of approximate symmetry for each shape in database. Experimental studies implemented on "Butterflies" and "Flavia" datasets have shown that the proposed algorithm takes several minutes per image to find a symmetry axis. However, in case of real-world applications we need computational efficiency which allows solving the task of symmetry axis search in real or quasi-real time. So, for the task of fast shape symmetry calculation on the common multicore PC we elaborated another parallel program, which based on the procedure suggested before in (Fedotova, 2016). That method takes as an initial axis the axis obtained by superfast comparison of two skeleton primitive sub-chains. This process takes about 0.5 sec on the common PC, it is considerably faster than any of the optimized brute-force methods including ones implemented in supercomputer. In our experiments for 70 percent of cases the found axis coincides with the ground-truth one absolutely, and for the rest of cases it is very close to the ground-truth.
NASA Astrophysics Data System (ADS)
Belazi, Akram; Abd El-Latif, Ahmed A.; Diaconu, Adrian-Viorel; Rhouma, Rhouma; Belghith, Safya
2017-01-01
In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform (LFT) is proposed. It encrypts only the requisite parts of the sensitive information in Lifting-Wavelet Transform (LWT) frequency domain based on hybrid of chaotic maps and a new S-box. In the proposed encryption scheme, the characteristics of confusion and diffusion are accomplished in three phases: block permutation, substitution, and diffusion. Then, we used dynamic keys instead of fixed keys used in other approaches, to control the encryption process and make any attack impossible. The new S-box was constructed by mixing of chaotic map and LFT to insure the high confidentiality in the inner encryption of the proposed approach. In addition, the hybrid compound of S-box and chaotic systems strengthened the whole encryption performance and enlarged the key space required to resist the brute force attacks. Extensive experiments were conducted to evaluate the security and efficiency of the proposed approach. In comparison with previous schemes, the proposed cryptosystem scheme showed high performances and great potential for prominent prevalence in cryptographic applications.
Simulation of linear mechanical systems
NASA Technical Reports Server (NTRS)
Sirlin, S. W.
1993-01-01
A dynamics and controls analyst is typically presented with a structural dynamics model and must perform various input/output tests and design control laws. The required time/frequency simulations need to be done many times as models change and control designs evolve. This paper examines some simple ways that open and closed loop frequency and time domain simulations can be done using the special structure of the system equations usually available. Routines were developed to run under Pro-Matlab in a mixture of the Pro-Matlab interpreter and FORTRAN (using the .mex facility). These routines are often orders of magnitude faster than trying the typical 'brute force' approach of using built-in Pro-Matlab routines such as bode. This makes the analyst's job easier since not only does an individual run take less time, but much larger models can be attacked, often allowing the whole model reduction step to be eliminated.
Remote-sensing image encryption in hybrid domains
NASA Astrophysics Data System (ADS)
Zhang, Xiaoqiang; Zhu, Guiliang; Ma, Shilong
2012-04-01
Remote-sensing technology plays an important role in military and industrial fields. Remote-sensing image is the main means of acquiring information from satellites, which always contain some confidential information. To securely transmit and store remote-sensing images, we propose a new image encryption algorithm in hybrid domains. This algorithm makes full use of the advantages of image encryption in both spatial domain and transform domain. First, the low-pass subband coefficients of image DWT (discrete wavelet transform) decomposition are sorted by a PWLCM system in transform domain. Second, the image after IDWT (inverse discrete wavelet transform) reconstruction is diffused with 2D (two-dimensional) Logistic map and XOR operation in spatial domain. The experiment results and algorithm analyses show that the new algorithm possesses a large key space and can resist brute-force, statistical and differential attacks. Meanwhile, the proposed algorithm has the desirable encryption efficiency to satisfy requirements in practice.
A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems
NASA Astrophysics Data System (ADS)
Wang, Xingyuan; Wang, Siwei; Zhang, Yingqian; Luo, Chao
2018-04-01
A novel image encryption algorithm is proposed that combines the SHA-3 hash function and two chaotic systems: the hyper-chaotic Lorenz and Chen systems. First, 384 bit keystream hash values are obtained by applying SHA-3 to plaintext. The sensitivity of the SHA-3 algorithm and chaotic systems ensures the effect of a one-time pad. Second, the color image is expanded into three-dimensional space. During permutation, it undergoes plane-plane displacements in the x, y and z dimensions. During diffusion, we use the adjacent pixel dataset and corresponding chaotic value to encrypt each pixel. Finally, the structure of alternating between permutation and diffusion is applied to enhance the level of security. Furthermore, we design techniques to improve the algorithm's encryption speed. Our experimental simulations show that the proposed cryptosystem achieves excellent encryption performance and can resist brute-force, statistical, and chosen-plaintext attacks.
Permeation profiles of Antibiotics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lopez Bautista, Cesar Augusto; Gnanakaran, Sandrasegaram
Presentation describes motivation: Combating bacterial inherent resistance; Drug development mainly uses brute force rather than rational design; Current experimental approaches lack molecular detail.
Strategy for reflector pattern calculation - Let the computer do the work
NASA Technical Reports Server (NTRS)
Lam, P. T.; Lee, S.-W.; Hung, C. C.; Acosta, R.
1986-01-01
Using high frequency approximations, the secondary pattern of a reflector antenna can be calculated by numerically evaluating a radiation integral I(u,v). In recent years, tremendous effort has been expended to reducing I(u,v) to Fourier integrals. These reduction schemes are invariably reflector geometry dependent. Hence, different analyses/computer software development must be carried out for different reflector shapes/boundaries. It is pointed out, that, as the computer power improves, these reduction schemes are no longer necessary. Comparable accuracy and computation time can be achieved by evaluating I(u,v) by a brute force FFT described in this note. Furthermore, there is virtually no restriction on the reflector geometry by using the brute force FFT.
Strategy for reflector pattern calculation: Let the computer do the work
NASA Technical Reports Server (NTRS)
Lam, P. T.; Lee, S. W.; Hung, C. C.; Acousta, R.
1985-01-01
Using high frequency approximations, the secondary pattern of a reflector antenna can be calculated by numerically evaluating a radiation integral I(u,v). In recent years, tremendous effort has been expended to reducing I(u,v) to Fourier integrals. These reduction schemes are invariably reflector geometry dependent. Hence, different analyses/computer software development must be carried out for different reflector shapes/boundaries. it is pointed out, that, as the computer power improves, these reduction schemes are no longer necessary. Comparable accuracy and computation time can be achieved by evaluating I(u,v) by a brute force FFT described in this note. Furthermore, there is virtually no restriction on the reflector geometry by using the brute force FFT.
Shipboard Fluid System Diagnostics Using Non-Intrusive Load Monitoring
2007-06-01
brute.s(3).data; tDPP = brute.s(3).time; FL = brute.s(4).data; tFL = brute.s(4).time; RM = brute.s(5).data; tRM = brute.s(5).time; DPF = brute.s...s’, max(tP1), files(n).name)); ylabel(’Power’); axis tight grid on; subplot(4,1,2); plot( tDPP , DPP, tDPF, DPF) ylabel(’DP Gauges’); axis
Dynamics of neural cryptography
NASA Astrophysics Data System (ADS)
Ruttor, Andreas; Kinzel, Wolfgang; Kanter, Ido
2007-05-01
Synchronization of neural networks has been used for public channel protocols in cryptography. In the case of tree parity machines the dynamics of both bidirectional synchronization and unidirectional learning is driven by attractive and repulsive stochastic forces. Thus it can be described well by a random walk model for the overlap between participating neural networks. For that purpose transition probabilities and scaling laws for the step sizes are derived analytically. Both these calculations as well as numerical simulations show that bidirectional interaction leads to full synchronization on average. In contrast, successful learning is only possible by means of fluctuations. Consequently, synchronization is much faster than learning, which is essential for the security of the neural key-exchange protocol. However, this qualitative difference between bidirectional and unidirectional interaction vanishes if tree parity machines with more than three hidden units are used, so that those neural networks are not suitable for neural cryptography. In addition, the effective number of keys which can be generated by the neural key-exchange protocol is calculated using the entropy of the weight distribution. As this quantity increases exponentially with the system size, brute-force attacks on neural cryptography can easily be made unfeasible.
Dynamics of neural cryptography.
Ruttor, Andreas; Kinzel, Wolfgang; Kanter, Ido
2007-05-01
Synchronization of neural networks has been used for public channel protocols in cryptography. In the case of tree parity machines the dynamics of both bidirectional synchronization and unidirectional learning is driven by attractive and repulsive stochastic forces. Thus it can be described well by a random walk model for the overlap between participating neural networks. For that purpose transition probabilities and scaling laws for the step sizes are derived analytically. Both these calculations as well as numerical simulations show that bidirectional interaction leads to full synchronization on average. In contrast, successful learning is only possible by means of fluctuations. Consequently, synchronization is much faster than learning, which is essential for the security of the neural key-exchange protocol. However, this qualitative difference between bidirectional and unidirectional interaction vanishes if tree parity machines with more than three hidden units are used, so that those neural networks are not suitable for neural cryptography. In addition, the effective number of keys which can be generated by the neural key-exchange protocol is calculated using the entropy of the weight distribution. As this quantity increases exponentially with the system size, brute-force attacks on neural cryptography can easily be made unfeasible.
Dynamics of neural cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ruttor, Andreas; Kinzel, Wolfgang; Kanter, Ido
2007-05-15
Synchronization of neural networks has been used for public channel protocols in cryptography. In the case of tree parity machines the dynamics of both bidirectional synchronization and unidirectional learning is driven by attractive and repulsive stochastic forces. Thus it can be described well by a random walk model for the overlap between participating neural networks. For that purpose transition probabilities and scaling laws for the step sizes are derived analytically. Both these calculations as well as numerical simulations show that bidirectional interaction leads to full synchronization on average. In contrast, successful learning is only possible by means of fluctuations. Consequently,more » synchronization is much faster than learning, which is essential for the security of the neural key-exchange protocol. However, this qualitative difference between bidirectional and unidirectional interaction vanishes if tree parity machines with more than three hidden units are used, so that those neural networks are not suitable for neural cryptography. In addition, the effective number of keys which can be generated by the neural key-exchange protocol is calculated using the entropy of the weight distribution. As this quantity increases exponentially with the system size, brute-force attacks on neural cryptography can easily be made unfeasible.« less
A chaotic cryptosystem for images based on Henon and Arnold cat map.
Soleymani, Ali; Nordin, Md Jan; Sundararajan, Elankovan
2014-01-01
The rapid evolution of imaging and communication technologies has transformed images into a widespread data type. Different types of data, such as personal medical information, official correspondence, or governmental and military documents, are saved and transmitted in the form of images over public networks. Hence, a fast and secure cryptosystem is needed for high-resolution images. In this paper, a novel encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. The scheme uses Arnold cat map for bit- and pixel-level permutations on plain and secret images, while Henon map creates secret images and specific parameters for the permutations. Both the encryption and decryption processes are explained, formulated, and graphically presented. The results of security analysis of five different images demonstrate the strength of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.
A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map
Sundararajan, Elankovan
2014-01-01
The rapid evolution of imaging and communication technologies has transformed images into a widespread data type. Different types of data, such as personal medical information, official correspondence, or governmental and military documents, are saved and transmitted in the form of images over public networks. Hence, a fast and secure cryptosystem is needed for high-resolution images. In this paper, a novel encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. The scheme uses Arnold cat map for bit- and pixel-level permutations on plain and secret images, while Henon map creates secret images and specific parameters for the permutations. Both the encryption and decryption processes are explained, formulated, and graphically presented. The results of security analysis of five different images demonstrate the strength of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications. PMID:25258724
Grover Search and the No-Signaling Principle
NASA Astrophysics Data System (ADS)
Bao, Ning; Bouland, Adam; Jordan, Stephen P.
2016-09-01
Two of the key properties of quantum physics are the no-signaling principle and the Grover search lower bound. That is, despite admitting stronger-than-classical correlations, quantum mechanics does not imply superluminal signaling, and despite a form of exponential parallelism, quantum mechanics does not imply polynomial-time brute force solution of NP-complete problems. Here, we investigate the degree to which these two properties are connected. We examine four classes of deviations from quantum mechanics, for which we draw inspiration from the literature on the black hole information paradox. We show that in these models, the physical resources required to send a superluminal signal scale polynomially with the resources needed to speed up Grover's algorithm. Hence the no-signaling principle is equivalent to the inability to solve NP-hard problems efficiently by brute force within the classes of theories analyzed.
Reconstructing the evolution of first-row transition metal minerals by GeoDeepDive
NASA Astrophysics Data System (ADS)
Liu, C.; Peters, S. E.; Ross, I.; Golden, J. J.; Downs, R. T.; Hazen, R. M.
2016-12-01
Terrestrial mineralogy evolves as a consequence of a range of physical, chemical, and biological processes [1]. Evolution of the first-row transition metal minerals could mirror the evolution of Earth's oxidation state and life, since these elements mostly are redox-sensitive and/or play critical roles in biology. The fundamental building blocks to reconstruct mineral evolution are the mineral species, locality, and age data, which are typically dispersed in sentences in scientific and technical publications. These data can be tracked down in a brute-force way, i.e., human retrieval, reading, and recording all relevant literature. Alternatively, they can be extracted automatically by GeoDeepDive. In GeoDeepDive, scientific and technical articles from publishers, including Elsevier, Wiley, USGS, SEPM, GSA and Canada Science Publishing, have been parsed into a Javascript database with NLP tags. Sentences containing data of mineral names, locations, and ages can be recognized and extracted by user-developed applications. In a preliminary search for cobalt mineral ages, we successfully extracted 678 citations with >1000 mentions of cobalt minerals, their locations, and ages. The extracted results are in agreement with brute-force search results. What is more, GeoDeepDive provides 40 additional data points that were not recovered by the brute-force approach. The extracted mineral locality-age data suggest that the evolution of Co minerals is controlled by global supercontinent cycles, i.e., more Co minerals form during episodes of supercontinent assembly. Mineral evolution of other first-row transition elements is being investigated through GeoDeepDive. References: [1] Hazen et al. (2008) Mineral evolution. American Mineralogist, 93, 1693-1720
Finding All Solutions to the Magic Hexagram
ERIC Educational Resources Information Center
Holland, Jason; Karabegov, Alexander
2008-01-01
In this article, a systematic approach is given for solving a magic star puzzle that usually is accomplished by trial and error or "brute force." A connection is made to the symmetries of a cube, thus the name Magic Hexahedron.
Probabilistic sampling of protein conformations: new hope for brute force?
Feldman, Howard J; Hogue, Christopher W V
2002-01-01
Protein structure prediction from sequence alone by "brute force" random methods is a computationally expensive problem. Estimates have suggested that it could take all the computers in the world longer than the age of the universe to compute the structure of a single 200-residue protein. Here we investigate the use of a faster version of our FOLDTRAJ probabilistic all-atom protein-structure-sampling algorithm. We have improved the method so that it is now over twenty times faster than originally reported, and capable of rapidly sampling conformational space without lattices. It uses geometrical constraints and a Leonard-Jones type potential for self-avoidance. We have also implemented a novel method to add secondary structure-prediction information to make protein-like amounts of secondary structure in sampled structures. In a set of 100,000 probabilistic conformers of 1VII, 1ENH, and 1PMC generated, the structures with smallest Calpha RMSD from native are 3.95, 5.12, and 5.95A, respectively. Expanding this test to a set of 17 distinct protein folds, we find that all-helical structures are "hit" by brute force more frequently than beta or mixed structures. For small helical proteins or very small non-helical ones, this approach should have a "hit" close enough to detect with a good scoring function in a pool of several million conformers. By fitting the distribution of RMSDs from the native state of each of the 17 sets of conformers to the extreme value distribution, we are able to estimate the size of conformational space for each. With a 0.5A RMSD cutoff, the number of conformers is roughly 2N where N is the number of residues in the protein. This is smaller than previous estimates, indicating an average of only two possible conformations per residue when sterics are accounted for. Our method reduces the effective number of conformations available at each residue by probabilistic bias, without requiring any particular discretization of residue conformational space, and is the fastest method of its kind. With computer speeds doubling every 18 months and parallel and distributed computing becoming more practical, the brute force approach to protein structure prediction may yet have some hope in the near future. Copyright 2001 Wiley-Liss, Inc.
Nakatsui, M; Horimoto, K; Lemaire, F; Ürgüplü, A; Sedoglavic, A; Boulier, F
2011-09-01
Recent remarkable advances in computer performance have enabled us to estimate parameter values by the huge power of numerical computation, the so-called 'Brute force', resulting in the high-speed simultaneous estimation of a large number of parameter values. However, these advancements have not been fully utilised to improve the accuracy of parameter estimation. Here the authors review a novel method for parameter estimation using symbolic computation power, 'Bruno force', named after Bruno Buchberger, who found the Gröbner base. In the method, the objective functions combining the symbolic computation techniques are formulated. First, the authors utilise a symbolic computation technique, differential elimination, which symbolically reduces an equivalent system of differential equations to a system in a given model. Second, since its equivalent system is frequently composed of large equations, the system is further simplified by another symbolic computation. The performance of the authors' method for parameter accuracy improvement is illustrated by two representative models in biology, a simple cascade model and a negative feedback model in comparison with the previous numerical methods. Finally, the limits and extensions of the authors' method are discussed, in terms of the possible power of 'Bruno force' for the development of a new horizon in parameter estimation.
A Novel Image Encryption Scheme Based on Intertwining Chaotic Maps and RC4 Stream Cipher
NASA Astrophysics Data System (ADS)
Kumari, Manju; Gupta, Shailender
2018-03-01
As the systems are enabling us to transmit large chunks of data, both in the form of texts and images, there is a need to explore algorithms which can provide a higher security without increasing the time complexity significantly. This paper proposes an image encryption scheme which uses intertwining chaotic maps and RC4 stream cipher to encrypt/decrypt the images. The scheme employs chaotic map for the confusion stage and for generation of key for the RC4 cipher. The RC4 cipher uses this key to generate random sequences which are used to implement an efficient diffusion process. The algorithm is implemented in MATLAB-2016b and various performance metrics are used to evaluate its efficacy. The proposed scheme provides highly scrambled encrypted images and can resist statistical, differential and brute-force search attacks. The peak signal-to-noise ratio values are quite similar to other schemes, the entropy values are close to ideal. In addition, the scheme is very much practical since having lowest time complexity then its counterparts.
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature
NASA Astrophysics Data System (ADS)
Panigrahy, Saroj Kumar; Jena, Debasish; Korra, Sathya Babu; Jena, Sanjay Kumar
Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the encrypted images are first decrypted, then the features are extracted, and used for identification or verification.
NASA Astrophysics Data System (ADS)
Ivanov, Mark V.; Lobas, Anna A.; Levitsky, Lev I.; Moshkovskii, Sergei A.; Gorshkov, Mikhail V.
2018-02-01
In a proteogenomic approach based on tandem mass spectrometry analysis of proteolytic peptide mixtures, customized exome or RNA-seq databases are employed for identifying protein sequence variants. However, the problem of variant peptide identification without personalized genomic data is important for a variety of applications. Following the recent proposal by Chick et al. (Nat. Biotechnol. 33, 743-749, 2015) on the feasibility of such variant peptide search, we evaluated two available approaches based on the previously suggested "open" search and the "brute-force" strategy. To improve the efficiency of these approaches, we propose an algorithm for exclusion of false variant identifications from the search results involving analysis of modifications mimicking single amino acid substitutions. Also, we propose a de novo based scoring scheme for assessment of identified point mutations. In the scheme, the search engine analyzes y-type fragment ions in MS/MS spectra to confirm the location of the mutation in the variant peptide sequence.
Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
Radwan, Ahmed G.; AbdElHaleem, Sherif H.; Abd-El-Hafiz, Salwa K.
2015-01-01
This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold’s cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper. PMID:26966561
Medical data sheet in safe havens - A tri-layer cryptic solution.
Praveenkumar, Padmapriya; Amirtharajan, Rengarajan; Thenmozhi, K; Balaguru Rayappan, John Bosco
2015-07-01
Secured sharing of the diagnostic reports and scan images of patients among doctors with complementary expertise for collaborative treatment will help to provide maximum care through faster and decisive decisions. In this context, a tri-layer cryptic solution has been proposed and implemented on Digital Imaging and Communications in Medicine (DICOM) images to establish a secured communication for effective referrals among peers without compromising the privacy of patients. In this approach, a blend of three cryptic schemes, namely Latin square image cipher (LSIC), discrete Gould transform (DGT) and Rubik׳s encryption, has been adopted. Among them, LSIC provides better substitution, confusion and shuffling of the image blocks; DGT incorporates tamper proofing with authentication; and Rubik renders a permutation of DICOM image pixels. The developed algorithm has been successfully implemented and tested in both the software (MATLAB 7) and hardware Universal Software Radio Peripheral (USRP) environments. Specifically, the encrypted data were tested by transmitting them through an additive white Gaussian noise (AWGN) channel model. Furthermore, the sternness of the implemented algorithm was validated by employing standard metrics such as the unified average changing intensity (UACI), number of pixels change rate (NPCR), correlation values and histograms. The estimated metrics have also been compared with the existing methods and dominate in terms of large key space to defy brute force attack, cropping attack, strong key sensitivity and uniform pixel value distribution on encryption. Copyright © 2015 Elsevier Ltd. All rights reserved.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-03-31
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-01-01
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572
Studies on a Spatialized Audio Interface for Sonar
2011-10-03
addition of spatialized audio to visual displays for sonar is much akin to the development of talking movies in the early days of cinema and can be...than using the brute-force approach. PCA is one among several techniques that share similarities with the computational architecture of a
Security and matching of partial fingerprint recognition systems
NASA Astrophysics Data System (ADS)
Jea, Tsai-Yang; Chavan, Viraj S.; Govindaraju, Venu; Schneider, John K.
2004-08-01
Despite advances in fingerprint identification techniques, matching incomplete or partial fingerprints still poses a difficult challenge. While the introduction of compact silicon chip-based sensors that capture only a part of the fingerprint area have made this problem important from a commercial perspective, there is also considerable interest on the topic for processing partial and latent fingerprints obtained at crime scenes. Attempts to match partial fingerprints using singular ridge structures-based alignment techniques fail when the partial print does not include such structures (e.g., core or delta). We present a multi-path fingerprint matching approach that utilizes localized secondary features derived using only the relative information of minutiae. Since the minutia-based fingerprint representation, is an ANSI-NIST standard, our approach has the advantage of being directly applicable to already existing databases. We also analyze the vulnerability of partial fingerprint identification systems to brute force attacks. The described matching approach has been tested on one of FVC2002"s DB1 database11. The experimental results show that our approach achieves an equal error rate of 1.25% and a total error rate of 1.8% (with FAR at 0.2% and FRR at 1.6%).
NASA Astrophysics Data System (ADS)
Tong, Xiaojun; Cui, Minggen; Wang, Zhu
2009-07-01
The design of the new compound two-dimensional chaotic function is presented by exploiting two one-dimensional chaotic functions which switch randomly, and the design is used as a chaotic sequence generator which is proved by Devaney's definition proof of chaos. The properties of compound chaotic functions are also proved rigorously. In order to improve the robustness against difference cryptanalysis and produce avalanche effect, a new feedback image encryption scheme is proposed using the new compound chaos by selecting one of the two one-dimensional chaotic functions randomly and a new image pixels method of permutation and substitution is designed in detail by array row and column random controlling based on the compound chaos. The results from entropy analysis, difference analysis, statistical analysis, sequence randomness analysis, cipher sensitivity analysis depending on key and plaintext have proven that the compound chaotic sequence cipher can resist cryptanalytic, statistical and brute-force attacks, and especially it accelerates encryption speed, and achieves higher level of security. By the dynamical compound chaos and perturbation technology, the paper solves the problem of computer low precision of one-dimensional chaotic function.
In regulatory assessments, there is a need for reliable estimates of the impacts of precursor emissions from individual sources on secondary PM2.5 (particulate matter with aerodynamic diameter less than 2.5 microns) and ozone. Three potential methods for estimating th...
The End of Flat Earth Economics & the Transition to Renewable Resource Societies.
ERIC Educational Resources Information Center
Henderson, Hazel
1978-01-01
A post-industrial revolution is predicted for the future with an accompanying shift of focus from simple, brute force technolgies, based on cheap, accessible resources and energy, to a second generation of more subtle, refined technologies grounded in a much deeper understanding of biological and ecological realities. (Author/BB)
Combining Multiobjective Optimization and Cluster Analysis to Study Vocal Fold Functional Morphology
Palaparthi, Anil; Riede, Tobias
2017-01-01
Morphological design and the relationship between form and function have great influence on the functionality of a biological organ. However, the simultaneous investigation of morphological diversity and function is difficult in complex natural systems. We have developed a multiobjective optimization (MOO) approach in association with cluster analysis to study the form-function relation in vocal folds. An evolutionary algorithm (NSGA-II) was used to integrate MOO with an existing finite element model of the laryngeal sound source. Vocal fold morphology parameters served as decision variables and acoustic requirements (fundamental frequency, sound pressure level) as objective functions. A two-layer and a three-layer vocal fold configuration were explored to produce the targeted acoustic requirements. The mutation and crossover parameters of the NSGA-II algorithm were chosen to maximize a hypervolume indicator. The results were expressed using cluster analysis and were validated against a brute force method. Results from the MOO and the brute force approaches were comparable. The MOO approach demonstrated greater resolution in the exploration of the morphological space. In association with cluster analysis, MOO can efficiently explore vocal fold functional morphology. PMID:24771563
Nuclear spin imaging with hyperpolarized nuclei created by brute force method
NASA Astrophysics Data System (ADS)
Tanaka, Masayoshi; Kunimatsu, Takayuki; Fujiwara, Mamoru; Kohri, Hideki; Ohta, Takeshi; Utsuro, Masahiko; Yosoi, Masaru; Ono, Satoshi; Fukuda, Kohji; Takamatsu, Kunihiko; Ueda, Kunihiro; Didelez, Jean-P.; Prossati, Giorgio; de Waard, Arlette
2011-05-01
We have been developing a polarized HD target for particle physics at the SPring-8 under the leadership of the RCNP, Osaka University for the past 5 years. Nuclear polarizaton is created by means of the brute force method which uses a high magnetic field (~17 T) and a low temperature (~ 10 mK). As one of the promising applications of the brute force method to life sciences we started a new project, "NSI" (Nuclear Spin Imaging), where hyperpolarized nuclei are used for the MRI (Magnetic Resonance Imaging). The candidate nuclei with spin ½hslash are 3He, 13C, 15N, 19F, 29Si, and 31P, which are important elements for the composition of the biomolecules. Since the NMR signals from these isotopes are enhanced by orders of magnitudes, the spacial resolution in the imaging would be much more improved compared to the practical MRI used so far. Another advantage of hyperpolarized MRI is that the MRI is basically free from the radiation, while the problems of radiation exposure caused by the X-ray CT or PET (Positron Emission Tomography) cannot be neglected. In fact, the risk of cancer for Japanese due to the radiation exposure through these diagnoses is exceptionally high among the advanced countries. As the first step of the NSI project, we are developing a system to produce hyperpolarized 3He gas for the diagnosis of serious lung diseases, for example, COPD (Chronic Obstructive Pulmonary Disease). The system employs the same 3He/4He dilution refrigerator and superconducting solenoidal coil as those used for the polarized HD target with some modification allowing the 3He Pomeranchuk cooling and the following rapid melting of the polarized solid 3He to avoid the depolarization. In this report, the present and future steps of our project will be outlined with some latest experimental results.
Bouda, Martin; Caplan, Joshua S.; Saiers, James E.
2016-01-01
Fractal dimension (FD), estimated by box-counting, is a metric used to characterize plant anatomical complexity or space-filling characteristic for a variety of purposes. The vast majority of published studies fail to evaluate the assumption of statistical self-similarity, which underpins the validity of the procedure. The box-counting procedure is also subject to error arising from arbitrary grid placement, known as quantization error (QE), which is strictly positive and varies as a function of scale, making it problematic for the procedure's slope estimation step. Previous studies either ignore QE or employ inefficient brute-force grid translations to reduce it. The goals of this study were to characterize the effect of QE due to translation and rotation on FD estimates, to provide an efficient method of reducing QE, and to evaluate the assumption of statistical self-similarity of coarse root datasets typical of those used in recent trait studies. Coarse root systems of 36 shrubs were digitized in 3D and subjected to box-counts. A pattern search algorithm was used to minimize QE by optimizing grid placement and its efficiency was compared to the brute force method. The degree of statistical self-similarity was evaluated using linear regression residuals and local slope estimates. QE, due to both grid position and orientation, was a significant source of error in FD estimates, but pattern search provided an efficient means of minimizing it. Pattern search had higher initial computational cost but converged on lower error values more efficiently than the commonly employed brute force method. Our representations of coarse root system digitizations did not exhibit details over a sufficient range of scales to be considered statistically self-similar and informatively approximated as fractals, suggesting a lack of sufficient ramification of the coarse root systems for reiteration to be thought of as a dominant force in their development. FD estimates did not characterize the scaling of our digitizations well: the scaling exponent was a function of scale. Our findings serve as a caution against applying FD under the assumption of statistical self-similarity without rigorously evaluating it first. PMID:26925073
Social Epistemology, the Reason of "Reason" and the Curriculum Studies
ERIC Educational Resources Information Center
Popkewitz, Thomas S.
2014-01-01
Not-with-standing the current topoi of the Knowledge Society, a particular "fact" of modernity is that power is exercised less through brute force and more through systems of reason that order and classify what is known and acted on. This article explored the system of reason that orders and classifies what is talked about, thought and…
Managing conflicts in systems development.
Barnett, E
1997-05-01
Conflict in systems development is nothing new. It can vary in intensity, but there will always be two possible outcomes--one constructive and the other destructive. The common approach to conflict management is to draw the battle lines and apply brute force. However, there are other ways to deal with conflict that are more effective and more people oriented.
Code White: A Signed Code Protection Mechanism for Smartphones
2010-09-01
analogous to computer security is the use of antivirus (AV) software . 12 AV software is a brute force approach to security. The software ...these users, numerous malicious programs have also surfaced. And while smartphones have desktop-like capabilities to execute software , they do not...11 2.3.1 Antivirus and Mobile Phones ............................................................... 11 2.3.2
Narayanan, Ram M; Pooler, Richard K; Martone, Anthony F; Gallagher, Kyle A; Sherbondy, Kelly D
2018-02-22
This paper describes a multichannel super-heterodyne signal analyzer, called the Spectrum Analysis Solution (SAS), which performs multi-purpose spectrum sensing to support spectrally adaptive and cognitive radar applications. The SAS operates from ultrahigh frequency (UHF) to the S-band and features a wideband channel with eight narrowband channels. The wideband channel acts as a monitoring channel that can be used to tune the instantaneous band of the narrowband channels to areas of interest in the spectrum. The data collected from the SAS has been utilized to develop spectrum sensing algorithms for the budding field of spectrum sharing (SS) radar. Bandwidth (BW), average total power, percent occupancy (PO), signal-to-interference-plus-noise ratio (SINR), and power spectral entropy (PSE) have been examined as metrics for the characterization of the spectrum. These metrics are utilized to determine a contiguous optimal sub-band (OSB) for a SS radar transmission in a given spectrum for different modalities. Three OSB algorithms are presented and evaluated: the spectrum sensing multi objective (SS-MO), the spectrum sensing with brute force PSE (SS-BFE), and the spectrum sensing multi-objective with brute force PSE (SS-MO-BFE).
Pooler, Richard K.; Martone, Anthony F.; Gallagher, Kyle A.; Sherbondy, Kelly D.
2018-01-01
This paper describes a multichannel super-heterodyne signal analyzer, called the Spectrum Analysis Solution (SAS), which performs multi-purpose spectrum sensing to support spectrally adaptive and cognitive radar applications. The SAS operates from ultrahigh frequency (UHF) to the S-band and features a wideband channel with eight narrowband channels. The wideband channel acts as a monitoring channel that can be used to tune the instantaneous band of the narrowband channels to areas of interest in the spectrum. The data collected from the SAS has been utilized to develop spectrum sensing algorithms for the budding field of spectrum sharing (SS) radar. Bandwidth (BW), average total power, percent occupancy (PO), signal-to-interference-plus-noise ratio (SINR), and power spectral entropy (PSE) have been examined as metrics for the characterization of the spectrum. These metrics are utilized to determine a contiguous optimal sub-band (OSB) for a SS radar transmission in a given spectrum for different modalities. Three OSB algorithms are presented and evaluated: the spectrum sensing multi objective (SS-MO), the spectrum sensing with brute force PSE (SS-BFE), and the spectrum sensing multi-objective with brute force PSE (SS-MO-BFE). PMID:29470448
1993-04-23
mechanisms that take into account this new reality. TERRORISM Lastly is the question of terrorism. There can be no two opinions on this most heinous crime ...the notion of an empire "essentially based on force" that had to be maintained, if necessary, "by brute force" see Suhash Chakravarty, The Raj Syndrome ...over power to the National League for Democracy (NLD) led by Aung San Suu Xyi , the daughter of Burma’s independence leader, Aung San. Since then, the
Security analysis and improvements to the PsychoPass method.
Brumen, Bostjan; Heričko, Marjan; Rozman, Ivan; Hölbl, Marko
2013-08-13
In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength.
Security Analysis and Improvements to the PsychoPass Method
2013-01-01
Background In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. Objective To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. Methods We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. Results The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. Conclusions The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength. PMID:23942458
Constraint Optimization Literature Review
2015-11-01
COPs. 15. SUBJECT TERMS high-performance computing, mobile ad hoc network, optimization, constraint, satisfaction 16. SECURITY CLASSIFICATION OF: 17...Optimization Problems 1 2.1 Constraint Satisfaction Problems 1 2.2 Constraint Optimization Problems 3 3. Constraint Optimization Algorithms 9 3.1...Constraint Satisfaction Algorithms 9 3.1.1 Brute-Force search 9 3.1.2 Constraint Propagation 10 3.1.3 Depth-First Search 13 3.1.4 Local Search 18
Strategic Studies Quarterly. Volume 9, Number 2. Summer 2015
2015-01-01
disrupting financial markets. Among other indicators, China’s already deployed and future Type 094 Jin -ciass nuclear ballistic missile submarines (SSBN...on agility instead of brute force re- inforces traditional Chinese military thinking. Since Sun Tzu, the acme of skill has been winning without... mechanical (both political and technical) nature of digital developments. Given this, the nature of system constraints under a dif- ferent future
Portable Language-Independent Adaptive Translation from OCR. Phase 1
2009-04-01
including brute-force k-Nearest Neighbors ( kNN ), fast approximate kNN using hashed k-d trees, classification and regression trees, and locality...achieved by refinements in ground-truthing protocols. Recent algorithmic improvements to our approximate kNN classifier using hashed k-D trees allows...recent years discriminative training has been shown to outperform phonetic HMMs estimated using ML for speech recognition. Standard ML estimation
ERIC Educational Resources Information Center
Van Name, Barry
2012-01-01
There is a battlefield where no quarter is given, no mercy shown, but not a single drop of blood is spilled. It is an arena that witnesses the bringing together of high-tech design and manufacture with the outpouring of brute force, under the remotely accessed command of some of today's brightest students. This is the world of battling robots, or…
Multiscale Anomaly Detection and Image Registration Algorithms for Airborne Landmine Detection
2008-05-01
with the sensed image. The two- dimensional correlation coefficient r for two matrices A and B both of size M ×N is given by r = ∑ m ∑ n (Amn...correlation based method by matching features in a high- dimensional feature- space . The current implementation of the SIFT algorithm uses a brute-force...by repeatedly convolving the image with a Guassian kernel. Each plane of the scale
1994-06-27
success . The key ideas behind the algorithm are: 1. Stopping when one alternative is clearly better than all the others, and 2. Focusing the search on...search algorithm has been implemented on the chess machine Hitech . En route we have developed effective techniques for: "* Dealing with independence of...report describes the implementation, and the results of tests including games played against brute- force programs. The data indicate that B* Hitech is a
Entropy-Based Search Algorithm for Experimental Design
NASA Astrophysics Data System (ADS)
Malakar, N. K.; Knuth, K. H.
2011-03-01
The scientific method relies on the iterated processes of inference and inquiry. The inference phase consists of selecting the most probable models based on the available data; whereas the inquiry phase consists of using what is known about the models to select the most relevant experiment. Optimizing inquiry involves searching the parameterized space of experiments to select the experiment that promises, on average, to be maximally informative. In the case where it is important to learn about each of the model parameters, the relevance of an experiment is quantified by Shannon entropy of the distribution of experimental outcomes predicted by a probable set of models. If the set of potential experiments is described by many parameters, we must search this high-dimensional entropy space. Brute force search methods will be slow and computationally expensive. We present an entropy-based search algorithm, called nested entropy sampling, to select the most informative experiment for efficient experimental design. This algorithm is inspired by Skilling's nested sampling algorithm used in inference and borrows the concept of a rising threshold while a set of experiment samples are maintained. We demonstrate that this algorithm not only selects highly relevant experiments, but also is more efficient than brute force search. Such entropic search techniques promise to greatly benefit autonomous experimental design.
2011-10-14
landscapes. It is motivated by statistical learning arguments and unifies the tasks of biasing the molecular dynamics to escape free energy wells and...statistical learning arguments and unifies the tasks of biasing the molecular dynamics to escape free energy wells and estimating the free energy...experimentally, to characterize global changes as well as investigate relative stabilities. In most applications, a brute- force computation based on
Sufi, Fahim; Khalil, Ibrahim
2009-04-01
With cardiovascular disease as the number one killer of modern era, Electrocardiogram (ECG) is collected, stored and transmitted in greater frequency than ever before. However, in reality, ECG is rarely transmitted and stored in a secured manner. Recent research shows that eavesdropper can reveal the identity and cardiovascular condition from an intercepted ECG. Therefore, ECG data must be anonymized before transmission over the network and also stored as such in medical repositories. To achieve this, first of all, this paper presents a new ECG feature detection mechanism, which was compared against existing cross correlation (CC) based template matching algorithms. Two types of CC methods were used for comparison. Compared to the CC based approaches, which had 40% and 53% misclassification rates, the proposed detection algorithm did not perform any single misclassification. Secondly, a new ECG obfuscation method was designed and implemented on 15 subjects using added noises corresponding to each of the ECG features. This obfuscated ECG can be freely distributed over the internet without the necessity of encryption, since the original features needed to identify personal information of the patient remain concealed. Only authorized personnel possessing a secret key will be able to reconstruct the original ECG from the obfuscated ECG. Distribution of the would appear as regular ECG without encryption. Therefore, traditional decryption techniques including powerful brute force attack are useless against this obfuscation.
2016-05-26
to Protect Sb. GRANT NUMBER Sc. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER MAJ Ashley E. Welte Se. TASK NUMBER Sf. WORK UNIT NUMBER...III, COL, IN Accepted this 26th day of May 2016 by: ___________________________________, Director, Graduate Degree Programs Robert F. Baumann, PhD The...copyright permission has been obtained for the inclusion of pictures, maps, graphics, and any other works incorporated into this manuscript. A work of the
NASA Technical Reports Server (NTRS)
Bar-Itzhack, I. Y.; Deutschmann, J.; Markley, F. L.
1991-01-01
This work introduces, examines and compares several quaternion normalization algorithms, which are shown to be an effective stage in the application of the additive extended Kalman filter to spacecraft attitude determination, which is based on vector measurements. Three new normalization schemes are introduced. They are compared with one another and with the known brute force normalization scheme, and their efficiency is examined. Simulated satellite data are used to demonstate the performance of all four schemes.
Source apportionment and sensitivity analysis: two methodologies with two different purposes
NASA Astrophysics Data System (ADS)
Clappier, Alain; Belis, Claudio A.; Pernigotti, Denise; Thunis, Philippe
2017-11-01
This work reviews the existing methodologies for source apportionment and sensitivity analysis to identify key differences and stress their implicit limitations. The emphasis is laid on the differences between source impacts
(sensitivity analysis) and contributions
(source apportionment) obtained by using four different methodologies: brute-force top-down, brute-force bottom-up, tagged species and decoupled direct method (DDM). A simple theoretical example to compare these approaches is used highlighting differences and potential implications for policy. When the relationships between concentration and emissions are linear, impacts and contributions are equivalent concepts. In this case, source apportionment and sensitivity analysis may be used indifferently for both air quality planning purposes and quantifying source contributions. However, this study demonstrates that when the relationship between emissions and concentrations is nonlinear, sensitivity approaches are not suitable to retrieve source contributions and source apportionment methods are not appropriate to evaluate the impact of abatement strategies. A quantification of the potential nonlinearities should therefore be the first step prior to source apportionment or planning applications, to prevent any limitations in their use. When nonlinearity is mild, these limitations may, however, be acceptable in the context of the other uncertainties inherent to complex models. Moreover, when using sensitivity analysis for planning, it is important to note that, under nonlinear circumstances, the calculated impacts will only provide information for the exact conditions (e.g. emission reduction share) that are simulated.
An Efficient, Hierarchical Viewpoint Planning Strategy for Terrestrial Laser Scanner Networks
NASA Astrophysics Data System (ADS)
Jia, F.; Lichti, D. D.
2018-05-01
Terrestrial laser scanner (TLS) techniques have been widely adopted in a variety of applications. However, unlike in geodesy or photogrammetry, insufficient attention has been paid to the optimal TLS network design. It is valuable to develop a complete design system that can automatically provide an optimal plan, especially for high-accuracy, large-volume scanning networks. To achieve this goal, one should look at the "optimality" of the solution as well as the computational complexity in reaching it. In this paper, a hierarchical TLS viewpoint planning strategy is developed to solve the optimal scanner placement problems. If one targeted object to be scanned is simplified as discretized wall segments, any possible viewpoint can be evaluated by a score table representing its visible segments under certain scanning geometry constraints. Thus, the design goal is to find a minimum number of viewpoints that achieves complete coverage of all wall segments. The efficiency is improved by densifying viewpoints hierarchically, instead of a "brute force" search within the entire workspace. The experiment environments in this paper were simulated from two buildings located on University of Calgary campus. Compared with the "brute force" strategy in terms of the quality of the solutions and the runtime, it is shown that the proposed strategy can provide a scanning network with a compatible quality but with more than a 70 % time saving.
Brute force absorption contrast microtomography
NASA Astrophysics Data System (ADS)
Davis, Graham R.; Mills, David
2014-09-01
In laboratory X-ray microtomography (XMT) systems, the signal-to-noise ratio (SNR) is typically determined by the X-ray exposure due to the low flux associated with microfocus X-ray tubes. As the exposure time is increased, the SNR improves up to a point where other sources of variability dominate, such as differences in the sensitivities of adjacent X-ray detector elements. Linear time-delay integration (TDI) readout averages out detector sensitivities on the critical horizontal direction and equiangular TDI also averages out the X-ray field. This allows the SNR to be increased further with increasing exposure. This has been used in dentistry to great effect, allowing subtle variations in dentine mineralisation to be visualised in 3 dimensions. It has also been used to detect ink in ancient parchments that are too damaged to physically unroll. If sufficient contrast between the ink and parchment exists, it is possible to virtually unroll the tomographic image of the scroll in order that the text can be read. Following on from this work, a feasibility test was carried out to determine if it might be possible to recover images from decaying film reels. A successful attempt was made to re-create a short film sequence from a rolled length of 16mm film using XMT. However, the "brute force" method of scaling this up to allow an entire film reel to be imaged presents a significant challenge.
Nonconservative dynamics in long atomic wires
NASA Astrophysics Data System (ADS)
Cunningham, Brian; Todorov, Tchavdar N.; Dundas, Daniel
2014-09-01
The effect of nonconservative current-induced forces on the ions in a defect-free metallic nanowire is investigated using both steady-state calculations and dynamical simulations. Nonconservative forces were found to have a major influence on the ion dynamics in these systems, but their role in increasing the kinetic energy of the ions decreases with increasing system length. The results illustrate the importance of nonconservative effects in short nanowires and the scaling of these effects with system size. The dependence on bias and ion mass can be understood with the help of a simple pen and paper model. This material highlights the benefit of simple preliminary steady-state calculations in anticipating aspects of brute-force dynamical simulations, and provides rule of thumb criteria for the design of stable quantum wires.
Temporal Correlations and Neural Spike Train Entropy
NASA Astrophysics Data System (ADS)
Schultz, Simon R.; Panzeri, Stefano
2001-06-01
Sampling considerations limit the experimental conditions under which information theoretic analyses of neurophysiological data yield reliable results. We develop a procedure for computing the full temporal entropy and information of ensembles of neural spike trains, which performs reliably for limited samples of data. This approach also yields insight to the role of correlations between spikes in temporal coding mechanisms. The method, when applied to recordings from complex cells of the monkey primary visual cortex, results in lower rms error information estimates in comparison to a ``brute force'' approach.
Making Classical Ground State Spin Computing Fault-Tolerant
2010-06-24
approaches to perebor (brute-force searches) algorithms,” IEEE Annals of the History of Computing, 6, 384–400 (1984). [24] D. Bacon and S . T. Flammia ...Adiabatic gate teleportation,” Phys. Rev. Lett., 103, 120504 (2009). [25] D. Bacon and S . T. Flammia , “Adiabatic cluster state quantum computing...v1 [ co nd -m at . s ta t- m ec h] 2 2 Ju n 20 10 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the
The role of the optimization process in illumination design
NASA Astrophysics Data System (ADS)
Gauvin, Michael A.; Jacobsen, David; Byrne, David J.
2015-07-01
This paper examines the role of the optimization process in illumination design. We will discuss why the starting point of the optimization process is crucial to a better design and why it is also important that the user understands the basic design problem and implements the correct merit function. Both a brute force method and the Downhill Simplex method will be used to demonstrate optimization methods with focus on using interactive design tools to create better starting points to streamline the optimization process.
TEAM: efficient two-locus epistasis tests in human genome-wide association study.
Zhang, Xiang; Huang, Shunping; Zou, Fei; Wang, Wei
2010-06-15
As a promising tool for identifying genetic markers underlying phenotypic differences, genome-wide association study (GWAS) has been extensively investigated in recent years. In GWAS, detecting epistasis (or gene-gene interaction) is preferable over single locus study since many diseases are known to be complex traits. A brute force search is infeasible for epistasis detection in the genome-wide scale because of the intensive computational burden. Existing epistasis detection algorithms are designed for dataset consisting of homozygous markers and small sample size. In human study, however, the genotype may be heterozygous, and number of individuals can be up to thousands. Thus, existing methods are not readily applicable to human datasets. In this article, we propose an efficient algorithm, TEAM, which significantly speeds up epistasis detection for human GWAS. Our algorithm is exhaustive, i.e. it does not ignore any epistatic interaction. Utilizing the minimum spanning tree structure, the algorithm incrementally updates the contingency tables for epistatic tests without scanning all individuals. Our algorithm has broader applicability and is more efficient than existing methods for large sample study. It supports any statistical test that is based on contingency tables, and enables both family-wise error rate and false discovery rate controlling. Extensive experiments show that our algorithm only needs to examine a small portion of the individuals to update the contingency tables, and it achieves at least an order of magnitude speed up over the brute force approach.
Human problem solving performance in a fault diagnosis task
NASA Technical Reports Server (NTRS)
Rouse, W. B.
1978-01-01
It is proposed that humans in automated systems will be asked to assume the role of troubleshooter or problem solver and that the problems which they will be asked to solve in such systems will not be amenable to rote solution. The design of visual displays for problem solving in such situations is considered, and the results of two experimental investigations of human problem solving performance in the diagnosis of faults in graphically displayed network problems are discussed. The effects of problem size, forced-pacing, computer aiding, and training are considered. Results indicate that human performance deviates from optimality as problem size increases. Forced-pacing appears to cause the human to adopt fairly brute force strategies, as compared to those adopted in self-paced situations. Computer aiding substantially lessens the number of mistaken diagnoses by performing the bookkeeping portions of the task.
The Trailwatcher: A Collection of Colonel Mike Malone’s Writings
1982-06-21
washtub-sized turtle is boat Stand reaches but more brute force. the six eases its noose ’s head and neck. As the noose , the , short on... nebulous term for who would that?" I saw a functions: was constrain them to work on what to be down here won’t like range cards that any told me...the process never ceases. me on now our factor: mot ion. What motivates a of books that have been written on motivation handle on this nebulous term
2000-09-21
Charles Street, Roger Scheidt and Robert ZiBerna, the Emergency Preparedness team at KSC, sit in the conference room inside the Mobile Command Center, a specially equipped vehicle. Nicknamed “The Brute,” it also features computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
2000-09-21
Charles Street, Roger Scheidt and Robert ZiBerna, the Emergency Preparedness team at KSC, sit in the conference room inside the Mobile Command Center, a specially equipped vehicle. Nicknamed “The Brute,” it also features computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
Sensitivity Analysis for Coupled Aero-structural Systems
NASA Technical Reports Server (NTRS)
Giunta, Anthony A.
1999-01-01
A novel method has been developed for calculating gradients of aerodynamic force and moment coefficients for an aeroelastic aircraft model. This method uses the Global Sensitivity Equations (GSE) to account for the aero-structural coupling, and a reduced-order modal analysis approach to condense the coupling bandwidth between the aerodynamic and structural models. Parallel computing is applied to reduce the computational expense of the numerous high fidelity aerodynamic analyses needed for the coupled aero-structural system. Good agreement is obtained between aerodynamic force and moment gradients computed with the GSE/modal analysis approach and the same quantities computed using brute-force, computationally expensive, finite difference approximations. A comparison between the computational expense of the GSE/modal analysis method and a pure finite difference approach is presented. These results show that the GSE/modal analysis approach is the more computationally efficient technique if sensitivity analysis is to be performed for two or more aircraft design parameters.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Canavan, G.H.
Attack allocation optimizations produce stability indices for unsymmetrical forces that indicate significant regions of both stability and instability and that have their minimum values roughly when the two sides have equal forces. This note derives combined stability indices for unsymmetrical offensive force configurations. The indices are based on optimal allocations of offensive missiles between vulnerable missiles and value based on the minimization of first strike cost, which is done analytically. Exchanges are modeled probabalistically and their results are converted into first and second strike costs through approximations to the damage to the value target sets held at risk. The stabilitymore » index is the product of the ratio of first to second strike costs seen by the two sides. Optimal allocations scale directly on the opponent`s vulnerable missiles, inversely on one`s own total weapons, and only logarithmically on the attacker`s damage preference, kill probability, and relative target set. The defender`s allocation scales in a similar manner on the attacker`s parameters. First and second strike magnitudes increase roughly linearly for the side with greater forces and decrease linearly for the side with fewer. Conversely, the first and second strike magnitudes decrease for the side with greater forces and increase for the side with fewer. These trends are derived and discussed analytically. The resulting stability indices exhibit a minimum where the two sides have roughly equal forces. If one side has much larger forces than the other, his costs drop to levels low enough that he is relatively insensitive to whether he strikes first or second. These calculations are performed with the analytic attack allocation appropriate for moderate forces, so some differences could be expected for the largest of the forces considered.« less
Poster - 32: Atlas Selection for Automated Segmentation of Pelvic CT for Prostate Radiotherapy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mallawi, Abrar; Farrell, TomTom; Diamond, Kevin-Ro
2016-08-15
Atlas based-segmentation has recently been evaluated for use in prostate radiotherapy. In a typical approach, the essential step is the selection of an atlas from a database that the best matches of the target image. This work proposes an atlas selection strategy and evaluate it impacts on final segmentation accuracy. Several anatomical parameters were measured to indicate the overall prostate and body shape, all of these measurements obtained on CT images. A brute force procedure was first performed for a training dataset of 20 patients using image registration to pair subject with similar contours; each subject was served as amore » target image to which all reaming 19 images were affinity registered. The overlap between the prostate and femoral heads was quantified for each pair using the Dice Similarity Coefficient (DSC). Finally, an atlas selection procedure was designed; relying on the computation of a similarity score defined as a weighted sum of differences between the target and atlas subject anatomical measurement. The algorithm ability to predict the most similar atlas was excellent, achieving mean DSCs of 0.78 ± 0.07 and 0.90 ± 0.02 for the CTV and either femoral head. The proposed atlas selection yielded 0.72 ± 0.11 and 0.87 ± 0.03 for CTV and either femoral head. The DSC obtained with the proposed selection method were slightly lower than the maximum established using brute force, but this does not include potential improvements expected with deformable registration. The proposed atlas selection method provides reasonable segmentation accuracy.« less
Performance analysis of a dual-tree algorithm for computing spatial distance histograms
Chen, Shaoping; Tu, Yi-Cheng; Xia, Yuni
2011-01-01
Many scientific and engineering fields produce large volume of spatiotemporal data. The storage, retrieval, and analysis of such data impose great challenges to database systems design. Analysis of scientific spatiotemporal data often involves computing functions of all point-to-point interactions. One such analytics, the Spatial Distance Histogram (SDH), is of vital importance to scientific discovery. Recently, algorithms for efficient SDH processing in large-scale scientific databases have been proposed. These algorithms adopt a recursive tree-traversing strategy to process point-to-point distances in the visited tree nodes in batches, thus require less time when compared to the brute-force approach where all pairwise distances have to be computed. Despite the promising experimental results, the complexity of such algorithms has not been thoroughly studied. In this paper, we present an analysis of such algorithms based on a geometric modeling approach. The main technique is to transform the analysis of point counts into a problem of quantifying the area of regions where pairwise distances can be processed in batches by the algorithm. From the analysis, we conclude that the number of pairwise distances that are left to be processed decreases exponentially with more levels of the tree visited. This leads to the proof of a time complexity lower than the quadratic time needed for a brute-force algorithm and builds the foundation for a constant-time approximate algorithm. Our model is also general in that it works for a wide range of point spatial distributions, histogram types, and space-partitioning options in building the tree. PMID:21804753
Comparison of Force and Moment Coefficients for the Same Test Article in Multiple Wind Tunnels
NASA Technical Reports Server (NTRS)
Deloach, Richard
2013-01-01
This paper compares the results of force and moment measurements made on the same test article and with the same balance in three transonic wind tunnels. Comparisons are made for the same combination of Reynolds number, Mach number, sideslip angle, control surface configuration, and angle of attack range. Between-tunnel force and moment differences are quantified. An analysis of variance was performed at four unique sites in the design space to assess the statistical significance of between-tunnel variation and any interaction with angle of attack. Tunnel to tunnel differences too large to attribute to random error were detected were observed for all forces and moments. In some cases these differences were independent of angle of attack and in other cases they changed with angle of attack.
Geradts, Z J; Bijhold, J; Hermsen, R; Murtagh, F
2001-06-01
On the market several systems exist for collecting spent ammunition data for forensic investigation. These databases store images of cartridge cases and the marks on them. Image matching is used to create hit lists that show which marks on a cartridge case are most similar to another cartridge case. The research in this paper is focused on the different methods of feature selection and pattern recognition that can be used for optimizing the results of image matching. The images are acquired by side light images for the breech face marks and by ring light for the firing pin impression. For these images a standard way of digitizing the images used. For the side light images and ring light images this means that the user has to position the cartridge case in the same position according to a protocol. The positioning is important for the sidelight, since the image that is obtained of a striation mark depends heavily on the angle of incidence of the light. In practice, it appears that the user positions the cartridge case with +/-10 degrees accuracy. We tested our algorithms using 49 cartridge cases of 19 different firearms, where the examiner determined that they were shot with the same firearm. For testing, these images were mixed with a database consisting of approximately 4900 images that were available from the Drugfire database of different calibers.In cases where the registration and the light conditions among those matching pairs was good, a simple computation of the standard deviation of the subtracted gray levels, delivered the best-matched images. For images that were rotated and shifted, we have implemented a "brute force" way of registration. The images are translated and rotated until the minimum of the standard deviation of the difference is found. This method did not result in all relevant matches in the top position. This is caused by the effect that shadows and highlights are compared in intensity. Since the angle of incidence of the light will give a different intensity profile, this method is not optimal. For this reason a preprocessing of the images was required. It appeared that the third scale of the "à trous" wavelet transform gives the best results in combination with brute force. Matching the contents of the images is less sensitive to the variation of the lighting. The problem with the brute force method is however that the time for calculation for 49 cartridge cases to compare between them, takes over 1 month of computing time on a Pentium II-computer with 333MHz. For this reason a faster approach is implemented: correlation in log polar coordinates. This gave similar results as the brute force calculation, however it was computed in 24h for a complete database with 4900 images.A fast pre-selection method based on signatures is carried out that is based on the Kanade Lucas Tomasi (KLT) equation. The positions of the points computed with this method are compared. In this way, 11 of the 49 images were in the top position in combination with the third scale of the à trous equation. It depends however on the light conditions and the prominence of the marks if correct matches are found in the top ranked position. All images were retrieved in the top 5% of the database. This method takes only a few minutes for the complete database if, and can be optimized for comparison in seconds if the location of points are stored in files. For further improvement, it is useful to have the refinement in which the user selects the areas that are relevant on the cartridge case for their marks. This is necessary if this cartridge case is damaged and other marks that are not from the firearm appear on it.
Password Cracking Using Sony Playstations
NASA Astrophysics Data System (ADS)
Kleinhans, Hugo; Butts, Jonathan; Shenoi, Sujeet
Law enforcement agencies frequently encounter encrypted digital evidence for which the cryptographic keys are unknown or unavailable. Password cracking - whether it employs brute force or sophisticated cryptanalytic techniques - requires massive computational resources. This paper evaluates the benefits of using the Sony PlayStation 3 (PS3) to crack passwords. The PS3 offers massive computational power at relatively low cost. Moreover, multiple PS3 systems can be introduced easily to expand parallel processing when additional power is needed. This paper also describes a distributed framework designed to enable law enforcement agents to crack encrypted archives and applications in an efficient and cost-effective manner.
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
Charles Street, Roger Scheidt and Robert ZiBerna, the Emergency Preparedness team at KSC, sit in the conference room inside the Mobile Command Center, a specially equipped vehicle. Nicknamed '''The Brute,''' it also features computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station.
Shortest path problem on a grid network with unordered intermediate points
NASA Astrophysics Data System (ADS)
Saw, Veekeong; Rahman, Amirah; Eng Ong, Wen
2017-10-01
We consider a shortest path problem with single cost factor on a grid network with unordered intermediate points. A two stage heuristic algorithm is proposed to find a feasible solution path within a reasonable amount of time. To evaluate the performance of the proposed algorithm, computational experiments are performed on grid maps of varying size and number of intermediate points. Preliminary results for the problem are reported. Numerical comparisons against brute forcing show that the proposed algorithm consistently yields solutions that are within 10% of the optimal solution and uses significantly less computation time.
NASA Technical Reports Server (NTRS)
Rainey, A Gerald
1957-01-01
The oscillating air forces on a two-dimensional wing oscillating in pitch about the midchord have been measured at various mean angles of attack and at Mach numbers of 0.35 and 0.7. The magnitudes of normal-force and pitching-moment coefficients were much higher at high angles of attack than at low angles of attack for some conditions. Large regions of negative damping in pitch were found, and it was shown that the effect of increasing the Mach number 0.35 to 0.7 was to decrease the initial angle of attack at which negative damping occurred. Measurements of the aerodynamic damping of a 10-percent-thick and of a 3-percent-thick finite-span wing oscillating in the first bending mode indicate no regions of negative damping for this type of motion over the range of variables covered. The damping measured at high angles of attack was generally larger than that at low angles of attack. (author)
Penn, Alexandra S
2016-01-01
Understanding and manipulating bacterial biofilms is crucial in medicine, ecology and agriculture and has potential applications in bioproduction, bioremediation and bioenergy. Biofilms often resist standard therapies and the need to develop new means of intervention provides an opportunity to fundamentally rethink our strategies. Conventional approaches to working with biological systems are, for the most part, "brute force", attempting to effect control in an input and effort intensive manner and are often insufficient when dealing with the inherent non-linearity and complexity of living systems. Biological systems, by their very nature, are dynamic, adaptive and resilient and require management tools that interact with dynamic processes rather than inert artefacts. I present an overview of a novel engineering philosophy which aims to exploit rather than fight those properties, and hence provide a more efficient and robust alternative. Based on a combination of evolutionary theory and whole-systems design, its essence is what I will call systems aikido; the basic principle of aikido being to interact with the momentum of an attacker and redirect it with minimal energy expenditure, using the opponent's energy rather than one's own. In more conventional terms, this translates to a philosophy of equilibrium engineering, manipulating systems' own self-organisation and evolution so that the evolutionarily or dynamically stable state corresponds to a function which we require. I illustrate these ideas with a description of a proposed manipulation of environmental conditions to alter the stability of co-operation in the context of Pseudomonas aeruginosa biofilm infection of the cystic fibrosis lung.
NASA Technical Reports Server (NTRS)
Keener, E. R.; Chapman, G. T.; Taleghani, J.; Cohen, L.
1977-01-01
An experimental investigation was conducted in the Ames 12-Foot Wind Tunnel to determine the subsonic aerodynamic characteristics of four forebodies at high angles of attack. The forebodies tested were a tangent ogive with fineness ratio of 5, a paraboloid with fineness ratio of 3.5, a 20 deg cone, and a tangent ogive with an elliptic cross section. The investigation included the effects of nose bluntness and boundary-layer trips. The tangent-ogive forebody was also tested in the presence of a short afterbody and with the afterbody attached. Static longitudinal and lateral/directional stability data were obtained. The investigation was conducted to investigate the existence of large side forces and yawing moments at high angles of attack and zero sideslip. It was found that all of the forebodies experience steady side forces that start at angles of attack of from 20 deg to 35 deg and exist to as high as 80 deg, depending on forebody shape. The side is as large as 1.6 times the normal force and is generally repeatable with increasing and decreasing angle of attack and, also, from test to test. The side force is very sensitive to the nature of the boundary layer, as indicated by large changes with boundary trips. The maximum side force caries considerably with Reynolds number and tends to decrease with increasing Mach number. The direction of the side force is sensitive to the body geometry near the nose. The angle of attack of onset of side force is not strongly influenced by Reynolds number or Mach number but varies with forebody shape. Maximum normal force often occurs at angles of attack near 60 deg. The effect of the elliptic cross section is to reduce the angle of onset by about 10 deg compared to that of an equivalent circular forebody with the same fineness ratio. The short afterbody reduces the angle of onset by about 5 deg.
"The Et Tu Brute Complex" Compulsive Self Betrayal
ERIC Educational Resources Information Center
Antus, Robert Lawrence
2006-01-01
In this article, the author discusses "The Et Tu Brute Complex." More specifically, this phenomenon occurs when a person, instead of supporting and befriending himself, orally condemns himself in front of other people and becomes his own worst enemy. This is a form of compulsive self-hatred. Most often, the victim of this complex is unaware of the…
Virtual ellipsometry on layered micro-facet surfaces.
Wang, Chi; Wilkie, Alexander; Harcuba, Petr; Novosad, Lukas
2017-09-18
Microfacet-based BRDF models are a common tool to describe light scattering from glossy surfaces. Apart from their wide-ranging applications in optics, such models also play a significant role in computer graphics for photorealistic rendering purposes. In this paper, we mainly investigate the computer graphics aspect of this technology, and present a polarisation-aware brute force simulation of light interaction with both single and multiple layered micro-facet surfaces. Such surface models are commonly used in computer graphics, but the resulting BRDF is ultimately often only approximated. Recently, there has been work to try to make these approximations more accurate, and to better understand the behaviour of existing analytical models. However, these brute force verification attempts still emitted the polarisation state of light and, as we found out, this renders them prone to mis-estimating the shape of the resulting BRDF lobe for some particular material types, such as smooth layered dielectric surfaces. For these materials, non-polarising computations can mis-estimate some areas of the resulting BRDF shape by up to 23%. But we also identified some other material types, such as dielectric layers over rough conductors, for which the difference turned out to be almost negligible. The main contribution of our work is to clearly demonstrate that the effect of polarisation is important for accurate simulation of certain material types, and that there are also other common materials for which it can apparently be ignored. As this required a BRDF simulator that we could rely on, a secondary contribution is that we went to considerable lengths to validate our software. We compare it against a state-of-art model from graphics, a library from optics, and also against ellipsometric measurements of real surface samples.
2016-09-01
asymmetric threat’s attack? C. SURVEY OF RECENT STUDIES A survey of extensive studies on countering small boat attacks from different perspectives... studies capability factors that were important in enhancing coastal defense for the Campeche Sound and Israeli coast, respectively. On better...countering small boat swarm attacks utilizing ASCMs. Previous studies focus solely on force protection effectiveness. This thesis addresses this gap. D
Command and Control of the U.S. Tenth Army During the Battle of Okinawa
2009-06-12
existing data sources , gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments...the supporting Allied naval force with massed kamikaze attacks, resulting in heavy casualties. Ultimately, Lt. Gen. Buckner committed both corps to a...force with massed kamikaze attacks, resulting in heavy casualties. Ultimately, Lt. Gen. Buckner committed both corps to a frontal attack on the
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
Charles Street, part of the Emergency Preparedness team at KSC, uses a phone on the specially equipped emergency response vehicle. The vehicle, nicknamed '''The Brute,''' serves as a mobile command center for emergency preparedness staff and other support personnel when needed. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station.
A nonperturbative approximation for the moderate Reynolds number Navier–Stokes equations
Roper, Marcus; Brenner, Michael P.
2009-01-01
The nonlinearity of the Navier–Stokes equations makes predicting the flow of fluid around rapidly moving small bodies highly resistant to all approaches save careful experiments or brute force computation. Here, we show how a linearization of the Navier–Stokes equations captures the drag-determining features of the flow and allows simplified or analytical computation of the drag on bodies up to Reynolds number of order 100. We illustrate the utility of this linearization in 2 practical problems that normally can only be tackled with sophisticated numerical methods: understanding flow separation in the flow around a bluff body and finding drag-minimizing shapes. PMID:19211800
A nonperturbative approximation for the moderate Reynolds number Navier-Stokes equations.
Roper, Marcus; Brenner, Michael P
2009-03-03
The nonlinearity of the Navier-Stokes equations makes predicting the flow of fluid around rapidly moving small bodies highly resistant to all approaches save careful experiments or brute force computation. Here, we show how a linearization of the Navier-Stokes equations captures the drag-determining features of the flow and allows simplified or analytical computation of the drag on bodies up to Reynolds number of order 100. We illustrate the utility of this linearization in 2 practical problems that normally can only be tackled with sophisticated numerical methods: understanding flow separation in the flow around a bluff body and finding drag-minimizing shapes.
2000-09-21
Charles Street, part of the Emergency Preparedness team at KSC, uses a phone on the specially equipped emergency response vehicle. The vehicle, nicknamed “The Brute,” serves as a mobile command center for emergency preparedness staff and other support personnel when needed. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
2000-09-21
Charles Street, part of the Emergency Preparedness team at KSC, uses a phone on the specially equipped emergency response vehicle. The vehicle, nicknamed “The Brute,” serves as a mobile command center for emergency preparedness staff and other support personnel when needed. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
A Massively Parallel Bayesian Approach to Planetary Protection Trajectory Analysis and Design
NASA Technical Reports Server (NTRS)
Wallace, Mark S.
2015-01-01
The NASA Planetary Protection Office has levied a requirement that the upper stage of future planetary launches have a less than 10(exp -4) chance of impacting Mars within 50 years after launch. A brute-force approach requires a decade of computer time to demonstrate compliance. By using a Bayesian approach and taking advantage of the demonstrated reliability of the upper stage, the required number of fifty-year propagations can be massively reduced. By spreading the remaining embarrassingly parallel Monte Carlo simulations across multiple computers, compliance can be demonstrated in a reasonable time frame. The method used is described here.
Single realization stochastic FDTD for weak scattering waves in biological random media.
Tan, Tengmeng; Taflove, Allen; Backman, Vadim
2013-02-01
This paper introduces an iterative scheme to overcome the unresolved issues presented in S-FDTD (stochastic finite-difference time-domain) for obtaining ensemble average field values recently reported by Smith and Furse in an attempt to replace the brute force multiple-realization also known as Monte-Carlo approach with a single-realization scheme. Our formulation is particularly useful for studying light interactions with biological cells and tissues having sub-wavelength scale features. Numerical results demonstrate that such a small scale variation can be effectively modeled with a random medium problem which when simulated with the proposed S-FDTD indeed produces a very accurate result.
Single realization stochastic FDTD for weak scattering waves in biological random media
Tan, Tengmeng; Taflove, Allen; Backman, Vadim
2015-01-01
This paper introduces an iterative scheme to overcome the unresolved issues presented in S-FDTD (stochastic finite-difference time-domain) for obtaining ensemble average field values recently reported by Smith and Furse in an attempt to replace the brute force multiple-realization also known as Monte-Carlo approach with a single-realization scheme. Our formulation is particularly useful for studying light interactions with biological cells and tissues having sub-wavelength scale features. Numerical results demonstrate that such a small scale variation can be effectively modeled with a random medium problem which when simulated with the proposed S-FDTD indeed produces a very accurate result. PMID:27158153
High angle-of-attack aerodynamic characteristics of crescent and elliptic wings
NASA Technical Reports Server (NTRS)
Vandam, C. P.
1989-01-01
Static longitudinal and lateral-directional forces and moments were measured for elliptic- and crescent-wing models at high angles-of-attack in the NASA Langley 14 by 22-Ft Subsonic Tunnel. The forces and moments were obtained for an angle-of-attack range including stall and post-stall conditions at a Reynolds number based on the average wing chord of about 1.8 million. Flow-visualization photographs using a mixture of oil and titanium-dioxide were also taken for several incidence angles. The force and moment data and the flow-visualization results indicated that the crescent wing model with its highly swept tips produced much better high angle-of-attack aerodynamic characteristics than the elliptic model. Leading-edge separation-induced vortex flow over the highly swept tips of the crescent wing is thought to produce this improved behavior at high angles-of-attack. The unique planform design could result in safer and more efficient low-speed airplanes.
Global sensitivity analysis in wind energy assessment
NASA Astrophysics Data System (ADS)
Tsvetkova, O.; Ouarda, T. B.
2012-12-01
Wind energy is one of the most promising renewable energy sources. Nevertheless, it is not yet a common source of energy, although there is enough wind potential to supply world's energy demand. One of the most prominent obstacles on the way of employing wind energy is the uncertainty associated with wind energy assessment. Global sensitivity analysis (SA) studies how the variation of input parameters in an abstract model effects the variation of the variable of interest or the output variable. It also provides ways to calculate explicit measures of importance of input variables (first order and total effect sensitivity indices) in regard to influence on the variation of the output variable. Two methods of determining the above mentioned indices were applied and compared: the brute force method and the best practice estimation procedure In this study a methodology for conducting global SA of wind energy assessment at a planning stage is proposed. Three sampling strategies which are a part of SA procedure were compared: sampling based on Sobol' sequences (SBSS), Latin hypercube sampling (LHS) and pseudo-random sampling (PRS). A case study of Masdar City, a showcase of sustainable living in the UAE, is used to exemplify application of the proposed methodology. Sources of uncertainty in wind energy assessment are very diverse. In the case study the following were identified as uncertain input parameters: the Weibull shape parameter, the Weibull scale parameter, availability of a wind turbine, lifetime of a turbine, air density, electrical losses, blade losses, ineffective time losses. Ineffective time losses are defined as losses during the time when the actual wind speed is lower than the cut-in speed or higher than the cut-out speed. The output variable in the case study is the lifetime energy production. Most influential factors for lifetime energy production are identified with the ranking of the total effect sensitivity indices. The results of the present research show that the brute force method is best for wind assessment purpose, SBSS outperforms other sampling strategies in the majority of cases. The results indicate that the Weibull scale parameter, turbine lifetime and Weibull shape parameter are the three most influential variables in the case study setting. The following conclusions can be drawn from these results: 1) SBSS should be recommended for use in Monte Carlo experiments, 2) The brute force method should be recommended for conducting sensitivity analysis in wind resource assessment, and 3) Little variation in the Weibull scale causes significant variation in energy production. The presence of the two distribution parameters in the top three influential variables (the Weibull shape and scale) emphasizes the importance of accuracy of (a) choosing the distribution to model wind regime at a site and (b) estimating probability distribution parameters. This can be labeled as the most important conclusion of this research because it opens a field for further research, which the authors see could change the wind energy field tremendously.
Forcing attacks of western pine beetles to test resistance of pines
Richard H. Smith
1967-01-01
Success--defined as oviposition or tree-killing--was obtained by attracting western pine beetles to groups of pines with natural attractants and by en-massed forced attacks on individual trees combined with either physical or biological stress. Preliminary results show considerable agreement with laboratory tests of vapor toxicity.
Bleetman, A; Watson, C H; Horsfall, I; Champion, S M
2003-12-01
Stab attacks generate high loads, and to defeat them, armour needs to be of a certain thickness and stiffness. Slash attacks produce much lower loads and armour designed to defeat them can be far lighter and more flexible. Phase 1: Human performance in slash attacks: 87 randomly selected students at the Royal Military College of Science were asked to make one slash attack with an instrumented blade on a vertically mounted target. No instructions on how to slash the target were given. The direction, contact forces and velocity of each attack were recorded. Phase 2: Clinical experience with edged weapon attacks: The location and severity of all penetrating injuries in patients attending the Glasgow Royal Infirmary between 1993 and 1996 were charted on anatomical figures. Phase 1: Two types of human slash behaviour were evident: a 'chop and drag' blow and a 'sweep motion' type of attack. 'Chop and drag' attacks had higher peak forces and velocities than sweep attacks. Shoulder to waist blows (diagonal) accounted for 82% of attacks, 71% of attackers used a long diagonal slash with an average cut length of 34 cm and 11% used short diagonal attacks with an average cut length of 25 cm. Only 18% of attackers slashed across the body (short horizontal); the average measured cut length of this type was 28 cm. The maximum peak force for the total sample population was 212 N; the maximum velocity was 14.88 m s(-1). The 95 percentile force for the total sample population was 181 N and the velocity was 9.89 m s(-1). Phase 2: 431 of the 500 patients had been wounded with edged weapons. The average number of wounds sustained by victims in knife assaults was 2.4. The distribution of wounds by frequency and severity are presented. Anti-slash protection is required for the arms, neck, shoulders, and thighs. The clinical experience of knife-attack victims provides information on the relative vulnerabilities of different regions of the body. It is anticipated that designing a tunic-type of Police uniform that is inherently stab and slash resistant will eventually replace the current obvious and often bulky extra protective vest. Attempts at making a combined garment will need to be guided by ergonomic considerations and field testing. A similar anatomical regional risk model might also be appropriate in the design of anti-ballistic armour and combined anti-ballistic and knife-resistant armour.
Stuxnet, Schmitt Analysis, and the Cyber Use-of-Force Debate
2012-01-01
demonstration during exercise Bold Alligator 2012 U . S . N av y (J os hu a J. W ah l) 46 JFQ / issue 67, 4 th quarter 2012 ndupress .ndu.edu...language; and Article 51’ s “armed attack ” threshold for self-defense actions. 18 Schmitt, “Computer Network Attack and the Use of Force,” 920. 19...sponsored cyber coercion. More importantly, the prospect of cyber attacks causing physical damage was largely theoretical.4 Beginning Stuxnet, Schmitt
NASA Astrophysics Data System (ADS)
Subagyo; Daryanto, Yanto; Risnawan, Novan
2018-04-01
The development of facilities for the testing of wide range angle of attack aircraft in the wind tunnel at subsonic regime has done and implemented. Development required to meet the test at an angle of attack from -20 ° to 40 °. Testing the wide range angle of attack aircraft with a wide variation of the angle of attack become important needs. This can be done simply by using the sting support-equipped by internal balance to measure the forces and moments component aerodynamics. The results of development and use on the wide range angle of attack aircraft testing are aerodynamics characteristics in the form of the coefficient three components forces and the three components of the moment. A series of test aircraft was successfully carried out and the results are shown in the form of graphs of characteristic of aerodynamics at wind speed 70 m/s.
Army Fixed-Wing Ground Attack Aircraft: A Historical Precedent and Contemporary Rationale
2015-06-12
platforms at the tactical level. Fielding such aircraft would free the Air Force to focus on its broader missions while enhancing the capabilities of...ground forces. In fact, an Army attack aircraft would reduce, but not eliminate, the requirement for USAF CAS, freeing the USAF to focus on its
The non-trusty clown attack on model-based speaker recognition systems
NASA Astrophysics Data System (ADS)
Farrokh Baroughi, Alireza; Craver, Scott
2015-03-01
Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.
1984-05-01
Conflict; US efforts to overcome these difficulties_ statistics concerning hostile attacks against air bases and the results thereof (8]; and, a...buses. During the period from through 1973 the threat to ,air bacses iontinued, as reflected in the air base attack statistics provided ,at...advantage of aI r base vulnerabi lities to gather detailed intelligenrci concerning the air bases. C1 48 -STANDOFF ATTACKS- Based upon the statistics in
Side-force alleviation on slender, pointed forebodies at high angles of attack
NASA Technical Reports Server (NTRS)
Rao, D. M.
1978-01-01
A new device was proposed for alleviating high angle-of-attack side force on slender, pointed forebodies. A symmetrical pair of separation strips in the form of helical ridges are applied to the forebody to disrupt the primary lee-side vortices and thereby avoid the instability that produces vortex asymmetry. Preliminary wind tunnel tests at Mach 0.3 and Reynolds no. 5,250,000 on a variety of forebody configurations and on a wing-body combination at angles of attack up to 56 degrees, demonstrated the effectiveness of the device.
Selectivity trend of gas separation through nanoporous graphene
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Hongjun; Chen, Zhongfang; Dai, Sheng
2014-01-29
We demonstrate that porous graphene can efficiently separate gases according to their molecular sizes using molecular dynamic (MD) simulations,. The flux sequence from the classical MD simulation is H 2>CO 2>>N 2>Ar>CH 4, which generally follows the trend in the kinetic diameters. Moreover, this trend is also confirmed from the fluxes based on the computed free energy barriers for gas permeation using the umbrella sampling method and kinetic theory of gases. Both brute-force MD simulations and free-energy calcualtions lead to the flux trend consistent with experiments. Case studies of two compositions of CO 2/N 2 mixtures further demonstrate the separationmore » capability of nanoporous graphene.« less
A Newton-Krylov solver for fast spin-up of online ocean tracers
NASA Astrophysics Data System (ADS)
Lindsay, Keith
2017-01-01
We present a Newton-Krylov based solver to efficiently spin up tracers in an online ocean model. We demonstrate that the solver converges, that tracer simulations initialized with the solution from the solver have small drift, and that the solver takes orders of magnitude less computational time than the brute force spin-up approach. To demonstrate the application of the solver, we use it to efficiently spin up the tracer ideal age with respect to the circulation from different time intervals in a long physics run. We then evaluate how the spun-up ideal age tracer depends on the duration of the physics run, i.e., on how equilibrated the circulation is.
Use of EPANET solver to manage water distribution in Smart City
NASA Astrophysics Data System (ADS)
Antonowicz, A.; Brodziak, R.; Bylka, J.; Mazurkiewicz, J.; Wojtecki, S.; Zakrzewski, P.
2018-02-01
Paper presents a method of using EPANET solver to support manage water distribution system in Smart City. The main task is to develop the application that allows remote access to the simulation model of the water distribution network developed in the EPANET environment. Application allows to perform both single and cyclic simulations with the specified step of changing the values of the selected process variables. In the paper the architecture of application was shown. The application supports the selection of the best device control algorithm using optimization methods. Optimization procedures are possible with following methods: brute force, SLSQP (Sequential Least SQuares Programming), Modified Powell Method. Article was supplemented by example of using developed computer tool.
Tinghög, Gustav; Andersson, David; Västfjäll, Daniel
2017-01-01
According to luck egalitarianism, inequalities should be deemed fair as long as they follow from individuals’ deliberate and fully informed choices (i.e., option luck) while inequalities should be deemed unfair if they follow from choices over which the individual has no control (i.e., brute luck). This study investigates if individuals’ fairness preferences correspond with the luck egalitarian fairness position. More specifically, in a laboratory experiment we test how individuals choose to redistribute gains and losses that stem from option luck compared to brute luck. A two-stage experimental design with real incentives was employed. We show that individuals (n = 226) change their action associated with re-allocation depending on the underlying conception of luck. Subjects in the brute luck treatment equalized outcomes to larger extent (p = 0.0069). Thus, subjects redistributed a larger amount to unlucky losers and a smaller amount to lucky winners compared to equivalent choices made in the option luck treatment. The effect is less pronounced when conducting the experiment with third-party dictators, indicating that there is some self-serving bias at play. We conclude that people have fairness preference not just for outcomes, but also for how those outcomes are reached. Our findings are potentially important for understanding the role citizens assign individual responsibility for life outcomes, i.e., health and wealth. PMID:28424641
Tinghög, Gustav; Andersson, David; Västfjäll, Daniel
2017-01-01
According to luck egalitarianism, inequalities should be deemed fair as long as they follow from individuals' deliberate and fully informed choices (i.e., option luck) while inequalities should be deemed unfair if they follow from choices over which the individual has no control (i.e., brute luck). This study investigates if individuals' fairness preferences correspond with the luck egalitarian fairness position. More specifically, in a laboratory experiment we test how individuals choose to redistribute gains and losses that stem from option luck compared to brute luck. A two-stage experimental design with real incentives was employed. We show that individuals ( n = 226) change their action associated with re-allocation depending on the underlying conception of luck. Subjects in the brute luck treatment equalized outcomes to larger extent ( p = 0.0069). Thus, subjects redistributed a larger amount to unlucky losers and a smaller amount to lucky winners compared to equivalent choices made in the option luck treatment. The effect is less pronounced when conducting the experiment with third-party dictators, indicating that there is some self-serving bias at play. We conclude that people have fairness preference not just for outcomes, but also for how those outcomes are reached. Our findings are potentially important for understanding the role citizens assign individual responsibility for life outcomes, i.e., health and wealth.
Racial Targeting of Sexual Violence in Darfur
Rymond-Richmond, Wenona; Palloni, Alberto
2009-01-01
Objectives. We used the Atrocities Documentation Survey to determine whether Sudanese government forces were involved in racially targeting sexual victimization toward ethnically African women in the Darfur region of western Sudan. Methods. The US State Department conducted the survey by interviewing a randomized multistage probability sample of 1136 Darfur refugees at 20 sites in Chad in 2004. For a subset of 932 respondents who had fled from village clusters that accounted for 15 or more respondents per cluster, we used hierarchical linear models to analyze village-level patterns of reported sexual violence. We statistically controlled for individual sexual victimization to remove bias. Results. Respondents reported being subjected to racial epithets associated with sexual victimization significantly more often during combined attacks by Sudanese government forces and Janjaweed militia forces than during separate attacks by either force. Conclusions. Combined attacks by Sudanese government forces and Janjaweed militia forces led to racial epithets being used more often during sexual victimization in Darfur. Our results suggest that the Sudanese government is participating in the use of sexual assault as a racially targeted weapon against ethnically African civilians. PMID:19542043
Racial targeting of sexual violence in Darfur.
Hagan, John; Rymond-Richmond, Wenona; Palloni, Alberto
2009-08-01
We used the Atrocities Documentation Survey to determine whether Sudanese government forces were involved in racially targeting sexual victimization toward ethnically African women in the Darfur region of western Sudan. The US State Department conducted the survey by interviewing a randomized multistage probability sample of 1136 Darfur refugees at 20 sites in Chad in 2004. For a subset of 932 respondents who had fled from village clusters that accounted for 15 or more respondents per cluster, we used hierarchical linear models to analyze village-level patterns of reported sexual violence. We statistically controlled for individual sexual victimization to remove bias. Respondents reported being subjected to racial epithets associated with sexual victimization significantly more often during combined attacks by Sudanese government forces and Janjaweed militia forces than during separate attacks by either force. Combined attacks by Sudanese government forces and Janjaweed militia forces led to racial epithets being used more often during sexual victimization in Darfur. Our results suggest that the Sudanese government is participating in the use of sexual assault as a racially targeted weapon against ethnically African civilians.
Flight Simulation of a 3 gram Autonomous Glider
2006-05-24
are referred to as S(t) and Sdot(t), respectively. The rotational direction is in a 4 element vector q(t), a quaternion that captures the 3 degrees... angles of attack from 30º to -30º, and the lift and drag forces were measured at each angle . Figure 3 shows the results of these measurements. As...expected, within a certain range the lift forces vary roughly linearly versus angle of attack. The drag forces increase more dramatically as one
Shoulder injuries from attacking motion
NASA Astrophysics Data System (ADS)
Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki
1997-03-01
Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.
Numerical investigation on properties of attack angle for an opposing jet thermal protection system
NASA Astrophysics Data System (ADS)
Lu, Hai-Bo; Liu, Wei-Qiang
2012-08-01
The three-dimensional Navier—Stokes equation and the k-in viscous model are used to simulate the attack angle characteristics of a hemisphere nose-tip with an opposing jet thermal protection system in supersonic flow conditions. The numerical method is validated by the relevant experiment. The flow field parameters, aerodynamic forces, and surface heat flux distributions for attack angles of 0°, 2°, 5°, 7°, and 10° are obtained. The detailed numerical results show that the cruise attack angle has a great influence on the flow field parameters, aerodynamic force, and surface heat flux distribution of the supersonic vehicle nose-tip with an opposing jet thermal protection system. When the attack angle reaches 10°, the heat flux on the windward generatrix is close to the maximal heat flux on the wall surface of the nose-tip without thermal protection system, thus the thermal protection has failed.
Aerodynamic surface distension system for high angle of attack forebody vortex control
NASA Technical Reports Server (NTRS)
Zell, Peter T. (Inventor)
1994-01-01
A deployable system is introduced for assisting flight control under certain flight conditions, such as at high angles of attack, whereby two inflatable membranes are located on the forebody portion of an aircraft on opposite sides thereof. The members form control surfaces for effecting lateral control forces if one is inflated and longitudinal control forces if both are inflated.
Force production and time-averaged flow structure around thin, non-slender delta wings
NASA Astrophysics Data System (ADS)
Tu, Han; Green, Melissa
2017-11-01
Experimental force measurement and time-averaged three dimensional flow visualization of low Reynolds number baseline cases have been carried out on a steady flat plate delta wing. Current data will serve as steady reference for future unsteady flow and actuation cases. The comprehensive study will compare force production in highly unsteady environments, which is necessary to consider in unmanned combat aerial vehicle (UCAV) control strategies. Force measurements are carried out at angles of attack 10, 15, 20, 25 and 30 degrees. The coefficient of drag increases with angle of attack, while the coefficient of lift reaches a maximum value at 20 degrees. Time-averaged flow visualization conducted at angles of attack of 20, 25 and 30 degrees shows vortices with larger magnitude that persist farther into wake are generated at higher angles of attack. These results compare analogously with similar steady baseline experiment results of high Reynolds number conducted by collaborators. This work was supported by the Office of Naval Research under ONR Award No. N00014-16-1-2732. We also acknowledge the collaborative support of Dr. David Rival and Mr. Matthew Marzanek at Queen's University.
2015-12-01
paramilitary methods with devastating results. This thesis examines the paramilitary terrorist attacks that occurred in Beslan in 2004 and in Mumbai in...paramilitary attack to be established. 14. SUBJECT TERMS paramilitary terrorism, North Hollywood shootout, Mumbai attack, Beslan school attack, posse...paramilitary terrorist attacks that occurred in Beslan in 2004 and in Mumbai in 2008 in an attempt to understand the threat and to establish the criteria for
Hantke, Simone; Weninger, Felix; Kurle, Richard; Ringeval, Fabien; Batliner, Anton; Mousa, Amr El-Desoky; Schuller, Björn
2016-01-01
We propose a new recognition task in the area of computational paralinguistics: automatic recognition of eating conditions in speech, i. e., whether people are eating while speaking, and what they are eating. To this end, we introduce the audio-visual iHEARu-EAT database featuring 1.6 k utterances of 30 subjects (mean age: 26.1 years, standard deviation: 2.66 years, gender balanced, German speakers), six types of food (Apple, Nectarine, Banana, Haribo Smurfs, Biscuit, and Crisps), and read as well as spontaneous speech, which is made publicly available for research purposes. We start with demonstrating that for automatic speech recognition (ASR), it pays off to know whether speakers are eating or not. We also propose automatic classification both by brute-forcing of low-level acoustic features as well as higher-level features related to intelligibility, obtained from an Automatic Speech Recogniser. Prediction of the eating condition was performed with a Support Vector Machine (SVM) classifier employed in a leave-one-speaker-out evaluation framework. Results show that the binary prediction of eating condition (i. e., eating or not eating) can be easily solved independently of the speaking condition; the obtained average recalls are all above 90%. Low-level acoustic features provide the best performance on spontaneous speech, which reaches up to 62.3% average recall for multi-way classification of the eating condition, i. e., discriminating the six types of food, as well as not eating. The early fusion of features related to intelligibility with the brute-forced acoustic feature set improves the performance on read speech, reaching a 66.4% average recall for the multi-way classification task. Analysing features and classifier errors leads to a suitable ordinal scale for eating conditions, on which automatic regression can be performed with up to 56.2% determination coefficient. PMID:27176486
An N-body Integrator for Planetary Rings
NASA Astrophysics Data System (ADS)
Hahn, Joseph M.
2011-04-01
A planetary ring that is disturbed by a satellite's resonant perturbation can respond in an organized way. When the resonance lies in the ring's interior, the ring responds via an m-armed spiral wave, while a ring whose edge is confined by the resonance exhibits an m-lobed scalloping along the ring-edge. The amplitude of these disturbances are sensitive to ring surface density and viscosity, so modelling these phenomena can provide estimates of the ring's properties. However a brute force attempt to simulate a ring's full azimuthal extent with an N-body code will likely fail because of the large number of particles needed to resolve the ring's behavior. Another impediment is the gravitational stirring that occurs among the simulated particles, which can wash out the ring's organized response. However it is possible to adapt an N-body integrator so that it can simulate a ring's collective response to resonant perturbations. The code developed here uses a few thousand massless particles to trace streamlines within the ring. Particles are close in a radial sense to these streamlines, which allows streamlines to be treated as straight wires of constant linear density. Consequently, gravity due to these streamline is a simple function of the particle's radial distance to all streamlines. And because particles are responding to smooth gravitating streamlines, rather than discrete particles, this method eliminates the stirring that ordinarily occurs in brute force N-body calculations. Note also that ring surface density is now a simple function of streamline separations, so effects due to ring pressure and viscosity are easily accounted for, too. A poster will describe this N-body method in greater detail. Simulations of spiral density waves and scalloped ring-edges are executed in typically ten minutes on a desktop PC, and results for Saturn's A and B rings will be presented at conference time.
Samson, M; Monnet, T; Bernard, A; Lacouture, P; David, L
2018-01-23
The propulsive forces generated by the hands and arms of swimmers have so far been determined essentially by quasi-steady approaches. This study aims to quantify the temporal dependence of the hydrodynamic forces for a simple translation movement: an impulsive start from rest. The study, carried out in unsteady numerical simulation, couples the calculation of the lift and the drag on an expert swimmer hand-forearm model with visualizations of the flow and flow vortex structure analysis. The results of these simulations show that the hand and forearm hydrodynamic forces should be studied from an unsteady approach because the quasi-steady model is inadequate. It also appears that the delayed stall effect generates higher circulatory forces during a short translation at high angle of attack than forces calculated under steady state conditions. During this phase the hand force coefficients are approximately twice as large as those of the forearm. The total force coefficients are highest for angles of attack between 40° and 60°. For the same angle of attack, the forces produced when the leading edge is the thumb side are slightly greater than those produced when the leading edge is the little finger side. Copyright © 2017 Elsevier Ltd. All rights reserved.
Estimation of additive forces and moments for supersonic inlets
NASA Technical Reports Server (NTRS)
Perkins, Stanley C., Jr.; Dillenius, Marnix F. E.
1991-01-01
A technique for estimating the additive forces and moments associated with supersonic, external compression inlets as a function of mass flow ratio has been developed. The technique makes use of a low order supersonic paneling method for calculating minimum additive forces at maximum mass flow conditions. A linear relationship between the minimum additive forces and the maximum values for fully blocked flow is employed to obtain the additive forces at a specified mass flow ratio. The method is applicable to two-dimensional inlets at zero or nonzero angle of attack, and to axisymmetric inlets at zero angle of attack. Comparisons with limited available additive drag data indicate fair to good agreement.
Bytes: Weapons of Mass Disruption
2002-04-01
advances compound the problems of protecting complex global infrastructures from attacks. How should the U.S. integrate the many disparate...deploy and sustain military forces.".16 According to the direst of information warfare theories , all computer systems are vulnerable to attack. The...Crisis Show of Force Punitive Strikes Armed Intervention Regional Conflict Regional War Global Conventional War Strategic Nuclear War IW & C2W area of
Naval War College. Volume 60, Number 2, Spring 2007
2007-01-01
attacks of grave conse- quences. The aspiration of this small-wars force element is to prevent even one nuclear, biological , or chemical weapon attack...153 Preventive Attack and Weapons of Mass...Default screen Bioethics and Armed Conflict: Moral Dilemmas of Medicine and War, by Michael L. Gross reviewed by Arthur M. Smith, MD
Galaxy Redshifts from Discrete Optimization of Correlation Functions
NASA Astrophysics Data System (ADS)
Lee, Benjamin C. G.; Budavári, Tamás; Basu, Amitabh; Rahman, Mubdi
2016-12-01
We propose a new method of constraining the redshifts of individual extragalactic sources based on celestial coordinates and their ensemble statistics. Techniques from integer linear programming (ILP) are utilized to optimize simultaneously for the angular two-point cross- and autocorrelation functions. Our novel formalism introduced here not only transforms the otherwise hopelessly expensive, brute-force combinatorial search into a linear system with integer constraints but also is readily implementable in off-the-shelf solvers. We adopt Gurobi, a commercial optimization solver, and use Python to build the cost function dynamically. The preliminary results on simulated data show potential for future applications to sky surveys by complementing and enhancing photometric redshift estimators. Our approach is the first application of ILP to astronomical analysis.
Quaternion normalization in additive EKF for spacecraft attitude determination
NASA Technical Reports Server (NTRS)
Bar-Itzhack, I. Y.; Deutschmann, J.; Markley, F. L.
1991-01-01
This work introduces, examines, and compares several quaternion normalization algorithms, which are shown to be an effective stage in the application of the additive extended Kalman filter (EKF) to spacecraft attitude determination, which is based on vector measurements. Two new normalization schemes are introduced. They are compared with one another and with the known brute force normalization scheme, and their efficiency is examined. Simulated satellite data are used to demonstrate the performance of all three schemes. A fourth scheme is suggested for future research. Although the schemes were tested for spacecraft attitude determination, the conclusions are general and hold for attitude determination of any three dimensional body when based on vector measurements, and use an additive EKF for estimation, and the quaternion for specifying the attitude.
Morphodynamic data assimilation used to understand changing coasts
Plant, Nathaniel G.; Long, Joseph W.
2015-01-01
Morphodynamic data assimilation blends observations with model predictions and comes in many forms, including linear regression, Kalman filter, brute-force parameter estimation, variational assimilation, and Bayesian analysis. Importantly, data assimilation can be used to identify sources of prediction errors that lead to improved fundamental understanding. Overall, models incorporating data assimilation yield better information to the people who must make decisions impacting safety and wellbeing in coastal regions that experience hazards due to storms, sea-level rise, and erosion. We present examples of data assimilation associated with morphologic change. We conclude that enough morphodynamic predictive capability is available now to be useful to people, and that we will increase our understanding and the level of detail of our predictions through assimilation of observations and numerical-statistical models.
Intelligent redundant actuation system requirements and preliminary system design
NASA Technical Reports Server (NTRS)
Defeo, P.; Geiger, L. J.; Harris, J.
1985-01-01
Several redundant actuation system configurations were designed and demonstrated to satisfy the stringent operational requirements of advanced flight control systems. However, this has been accomplished largely through brute force hardware redundancy, resulting in significantly increased computational requirements on the flight control computers which perform the failure analysis and reconfiguration management. Modern technology now provides powerful, low-cost microprocessors which are effective in performing failure isolation and configuration management at the local actuator level. One such concept, called an Intelligent Redundant Actuation System (IRAS), significantly reduces the flight control computer requirements and performs the local tasks more comprehensively than previously feasible. The requirements and preliminary design of an experimental laboratory system capable of demonstrating the concept and sufficiently flexible to explore a variety of configurations are discussed.
Dissipative particle dynamics: Systematic parametrization using water-octanol partition coefficients
NASA Astrophysics Data System (ADS)
Anderson, Richard L.; Bray, David J.; Ferrante, Andrea S.; Noro, Massimo G.; Stott, Ian P.; Warren, Patrick B.
2017-09-01
We present a systematic, top-down, thermodynamic parametrization scheme for dissipative particle dynamics (DPD) using water-octanol partition coefficients, supplemented by water-octanol phase equilibria and pure liquid phase density data. We demonstrate the feasibility of computing the required partition coefficients in DPD using brute-force simulation, within an adaptive semi-automatic staged optimization scheme. We test the methodology by fitting to experimental partition coefficient data for twenty one small molecules in five classes comprising alcohols and poly-alcohols, amines, ethers and simple aromatics, and alkanes (i.e., hexane). Finally, we illustrate the transferability of a subset of the determined parameters by calculating the critical micelle concentrations and mean aggregation numbers of selected alkyl ethoxylate surfactants, in good agreement with reported experimental values.
A Formal Algorithm for Routing Traces on a Printed Circuit Board
NASA Technical Reports Server (NTRS)
Hedgley, David R., Jr.
1996-01-01
This paper addresses the classical problem of printed circuit board routing: that is, the problem of automatic routing by a computer other than by brute force that causes the execution time to grow exponentially as a function of the complexity. Most of the present solutions are either inexpensive but not efficient and fast, or efficient and fast but very costly. Many solutions are proprietary, so not much is written or known about the actual algorithms upon which these solutions are based. This paper presents a formal algorithm for routing traces on a print- ed circuit board. The solution presented is very fast and efficient and for the first time speaks to the question eloquently by way of symbolic statements.
Zimmerman, M I; Bowman, G R
2016-01-01
Molecular dynamics (MD) simulations are a powerful tool for understanding enzymes' structures and functions with full atomistic detail. These physics-based simulations model the dynamics of a protein in solution and store snapshots of its atomic coordinates at discrete time intervals. Analysis of the snapshots from these trajectories provides thermodynamic and kinetic properties such as conformational free energies, binding free energies, and transition times. Unfortunately, simulating biologically relevant timescales with brute force MD simulations requires enormous computing resources. In this chapter we detail a goal-oriented sampling algorithm, called fluctuation amplification of specific traits, that quickly generates pertinent thermodynamic and kinetic information by using an iterative series of short MD simulations to explore the vast depths of conformational space. © 2016 Elsevier Inc. All rights reserved.
Low Speed Analysis of Mission Adaptive Flaps on a High Speed Civil Transport Configuration
NASA Technical Reports Server (NTRS)
Lessard, Victor R.
1999-01-01
Thin-layer Navier-Stokes analyses were done on a high speed civil transport configuration with mission adaptive leading-edge flaps. The flow conditions simulated were Mach = 0.22 and Reynolds number of 4.27 million for angles-of-attack ranging from 0 to 18 degrees. Two turbulence closure models were used. Analyses were done exclusively with the Baldwin-Lomax turbulence model at low angle-of-attack conditions. At high angles-of-attack where considerable flow separation and vortices occurred the Spalart-Allmaras turbulence model was also considered. The effects of flow transition were studied. Predicted aerodynamic forces, moment, and pressure are compared to experimental data obtained in the 14- by 22-Foot Subsonic Tunnel at NASA Langley. The forces and moments correlated well with experimental data in terms of trends. Drag and pitching moment were consistently underpredicted. Predicted surface pressures compared well with experiment at low angles-of-attack. Above 10 angle-of-attack the pressure comparisons were not as favorable. The two turbulent models affected the pressures on the flap considerably and neither produced correct results at the high angles-of-attack.
NASA Technical Reports Server (NTRS)
Dugan, Duane W.
1959-01-01
The possibility of obtaining useful estimates of the static longitudinal stability of aircraft flying at high supersonic Mach numbers at angles of attack between 0 and +/-180 deg is explored. Existing theories, empirical formulas, and graphical procedures are employed to estimate the normal-force and pitching-moment characteristics of an example airplane configuration consisting of an ogive-cylinder body, trapezoidal wing, and cruciform trapezoidal tail. Existing wind-tunnel data for this configuration at a Mach number of 6.86 provide an evaluation of the estimates up to an angle of attack of 35 deg. Evaluation at higher angles of attack is afforded by data obtained from wind-tunnel tests made with the same configuration at angles of attack between 30 and 150 deg at five Mach numbers between 2.5 and 3.55. Over the ranges of Mach numbers and angles of attack investigated, predictions of normal force and center-of-pressure locations for the configuration considered agree well with those obtained experimentally, particularly at the higher Mach numbers.
Arbitrary Symmetric Running Gait Generation for an Underactuated Biped Model.
Dadashzadeh, Behnam; Esmaeili, Mohammad; Macnab, Chris
2017-01-01
This paper investigates generating symmetric trajectories for an underactuated biped during the stance phase of running. We use a point mass biped (PMB) model for gait analysis that consists of a prismatic force actuator on a massless leg. The significance of this model is its ability to generate more general and versatile running gaits than the spring-loaded inverted pendulum (SLIP) model, making it more suitable as a template for real robots. The algorithm plans the necessary leg actuator force to cause the robot center of mass to undergo arbitrary trajectories in stance with any arbitrary attack angle and velocity angle. The necessary actuator forces follow from the inverse kinematics and dynamics. Then these calculated forces become the control input to the dynamic model. We compare various center-of-mass trajectories, including a circular arc and polynomials of the degrees 2, 4 and 6. The cost of transport and maximum leg force are calculated for various attack angles and velocity angles. The results show that choosing the velocity angle as small as possible is beneficial, but the angle of attack has an optimum value. We also find a new result: there exist biped running gaits with double-hump ground reaction force profiles which result in less maximum leg force than single-hump profiles.
Arbitrary Symmetric Running Gait Generation for an Underactuated Biped Model
Esmaeili, Mohammad; Macnab, Chris
2017-01-01
This paper investigates generating symmetric trajectories for an underactuated biped during the stance phase of running. We use a point mass biped (PMB) model for gait analysis that consists of a prismatic force actuator on a massless leg. The significance of this model is its ability to generate more general and versatile running gaits than the spring-loaded inverted pendulum (SLIP) model, making it more suitable as a template for real robots. The algorithm plans the necessary leg actuator force to cause the robot center of mass to undergo arbitrary trajectories in stance with any arbitrary attack angle and velocity angle. The necessary actuator forces follow from the inverse kinematics and dynamics. Then these calculated forces become the control input to the dynamic model. We compare various center-of-mass trajectories, including a circular arc and polynomials of the degrees 2, 4 and 6. The cost of transport and maximum leg force are calculated for various attack angles and velocity angles. The results show that choosing the velocity angle as small as possible is beneficial, but the angle of attack has an optimum value. We also find a new result: there exist biped running gaits with double-hump ground reaction force profiles which result in less maximum leg force than single-hump profiles. PMID:28118401
NASA Technical Reports Server (NTRS)
Capone, Francis J.; Ashbury, Scott C.; Deere, Karen A.
1996-01-01
An investigation was conducted in the Langley 16-Foot Transonic Tunnel to determine induced aerodynamic effects from jet reaction controls of an advanced air-to-air missile concept. The 75-percent scale model featured independently controlled reaction jets located near the nose and tail of the model. Aerodynamic control was provided by four fins located near the tail of the model. This investigation was conducted at Mach numbers of 0.35 and 0.60, at angles of attack up to 75 deg and at nozzle pressure ratios up to 90. Jet-reaction thrust forces were not measured by the force balance but jet-induced forces were. In addition, a multiblock three-dimensional Navier-Stokes method was used to calculate the flowfield of the missile at angles of attack up to 40 deg. Results indicate that large interference effects on pitching moment were induced from operating the nose jets with the the off. Excellent correlation between experimental and computational pressure distributions and pitching moment were obtained a a Mach number of 0.35 and at angles of attack up to 40 deg.
Kabaciński, Jarosław; Dworak, Lechosław Bogdan; Murawa, Michał; Rzepnicka, Agata
2016-01-01
Dynamic loads during landings determined by the ground reaction forces (GRFs) may elaborate internal loads and increase the risk of overload knee injuries as a result of performing volleyball jumps many times. The study dealt with a biomechanical assessment of dynamic load indicators in female volleyball players for the motion sequence of take-off-landing in blocks and attacks. Twelve professional female volleyball players participated in the study. Blocks and attacks were filmed by two cameras. GRFs vs. time graphs were recorded with the use of a force platform. Values of dynamic load indicators in terms of the relations of peak of vertical component of GRF, build-up index of this force (BIF), and power output (P) during landing to the vGRF, BIF and P during take-off (L/T) were calculated. The statistically significant ( p < 0.05) highest values of L/T indicators were found for back row attack spikes: 2.4 (vGRF), 12.2 (BIF) and 3.1 (P). In the case of blocks, slide attack spikes and attack line spikes, results of these variables were in range: 1.8÷2.1, 5.9÷7.6 and 2.1÷2.9, respectively. The reduction of GRFs during landings contributes to decreasing the level of the load indicators L/T which should minimize the incidence of anterior cruciate ligament and patellar tendon injuries in female volleyball players.
Soviet Non-Linear Combat: The Challenge of the 90s
1990-09-01
with powerful air and artillery fire strikes, will allow a combatanL to rapidly insert ground units, air-assault forces, and other specially-trained Q...dynamic and highly maneuverable, forcing subunits to change rapidly from attack to defense and back again, and to change frequently its combat formation...two. Team members rapidly coalesce into temporary attack or defensive groups and then disperse again. The Soviets see non-linear battle as one in which
Low-speed static and dynamic force tests of a generic supersonic cruise fighter configuration
NASA Technical Reports Server (NTRS)
Hahne, David E.
1989-01-01
Static and dynamic force tests of a generic fighter configuration designed for sustained supersonic flight were conducted in the Langley 30- by 60-foot tunnel. The baseline configuration had a 65 deg arrow wing, twin wing mounted vertical tails and a canard. Results showed that control was available up to C sub L,max (maximum lift coefficient) from aerodynamic controls about all axes but control in the pitch and yaw axes decreased rapidly in the post-stall angle-of-attack region. The baseline configuration showed stable lateral-directional characteristics at low angles of attack but directional stability occurred near alpha = 25 deg as the wing shielded the vertical tails. The configuration showed positive effective dihedral throughout the test angle-of-attack range. Forced oscillation tests indicated that the baseline configuration had stable damping characteristics about the lateral-directional axes.
Driving-forces model on individual behavior in scenarios considering moving threat agents
NASA Astrophysics Data System (ADS)
Li, Shuying; Zhuang, Jun; Shen, Shifei; Wang, Jia
2017-09-01
The individual behavior model is a contributory factor to improve the accuracy of agent-based simulation in different scenarios. However, few studies have considered moving threat agents, which often occur in terrorist attacks caused by attackers with close-range weapons (e.g., sword, stick). At the same time, many existing behavior models lack validation from cases or experiments. This paper builds a new individual behavior model based on seven behavioral hypotheses. The driving-forces model is an extension of the classical social force model considering scenarios including moving threat agents. An experiment was conducted to validate the key components of the model. Then the model is compared with an advanced Elliptical Specification II social force model, by calculating the fitting errors between the simulated and experimental trajectories, and being applied to simulate a specific circumstance. Our results show that the driving-forces model reduced the fitting error by an average of 33.9% and the standard deviation by an average of 44.5%, which indicates the accuracy and stability of the model in the studied situation. The new driving-forces model could be used to simulate individual behavior when analyzing the risk of specific scenarios using agent-based simulation methods, such as risk analysis of close-range terrorist attacks in public places.
Congress Investigates: Pearl Harbor and 9/11 Congressional Hearing Exhibits
ERIC Educational Resources Information Center
Blackerby, Christine
2011-01-01
On the morning of December 7, 1941, Japanese bombers staged a surprise attack on U.S. military forces at Pearl Harbor in Hawaii. Sixty years after the attack on Pearl Harbor, the United States was attacked again. On the morning of September 11, 2001, four commercial airplanes hijacked by 19 terrorists killed nearly 3,000 people when they crashed…
Free-Flight Evaluation of Forebody Blowing for Yaw Control at High Angels of Attack
NASA Technical Reports Server (NTRS)
Kiddy, Jason
1995-01-01
Forebody blowing is a concept developed to provide yaw control for aircraft flying at high angles of attack where a conventional rudder becomes ineffective. The basic concept is fairly simple. A small jet of air is forced out of the nose of the aircraft. This jet causes a repositioning of the forebody vortices in an asymmetrical fashion. The asymmetric forebody vortex flows develop a side force on the forebody which results in substantial yawing moments at high angles of attack. The purpose of this project was to demonstrate the use of forebody blowing as a control device through free-flight evaluation. This unique type of testing was performed at the NASA-Langley 30- by 60-foot tunnel. From these tests, it could then be shown that forebody blowing is an effective method of maintaining yaw control at high angles of attack.
Smiley, CalvinJohn; Fakunle, David
The synonymy of Blackness with criminality is not a new phenomenon in America. Documented historical accounts have shown how myths, stereotypes, and racist ideologies led to discriminatory policies and court rulings that fueled racial violence in a post-Reconstruction era and has culminated in the exponential increase of Black male incarceration today. Misconceptions and prejudices manufactured and disseminated through various channels such as the media included references to a " brute " image of Black males. In the 21 st century, this negative imagery of Black males has frequently utilized the negative connotation of the terminology " thug ." In recent years, law enforcement agencies have unreasonably used deadly force on Black males allegedly considered to be "suspects" or "persons of interest." The exploitation of these often-targeted victims' criminal records, physical appearances, or misperceived attributes has been used to justify their unlawful deaths. Despite the connection between disproportionate criminality and Black masculinity, little research has been done on how unarmed Black male victims, particularly but not exclusively at the hands of law enforcement, have been posthumously criminalized. This paper investigates the historical criminalization of Black males and its connection to contemporary unarmed victims of law enforcement. Action research methodology in the data collection process is utilized to interpret how Black male victims are portrayed by traditional mass media, particularly through the use of language, in ways that marginalize and de-victimize these individuals. This study also aims to elucidate a contemporary understanding of race relations, racism, and the plight of the Black male in a 21-century "post-racial" America.
Analysis of Special Operations Forces in Decision Aids: Recommendations,
1994-01-01
Soviet-made armored scout cars operated by Malaysian troops. By that time, the United States had lost 102 men-18 killed and 84 wounded. Somali leaders...designation of targets; attack by F-15E and F-16C using CBU-87, -89 Execution and GBU; attack by A-10 using Maverick and 30-mm cannon; attack by B-52 using...patrolling designated areas of the battlefield and attacking individual armored vehicles with precision-guided weapons such as Maverick . Discontinuity
NASA Technical Reports Server (NTRS)
Landrum, E. J.; Babb, C. D.
1979-01-01
Flow visualization and force data for a series of six bodies of revolution are presented without analysis. The data were obtained in the Langley Unitary Plan wind tunnel for angles of attack from -4 deg to 60 deg. The Reynolds number used for these tests was 6,600,000 per meter.
Magnus effects on spinning transonic missiles
NASA Technical Reports Server (NTRS)
Seginer, A.; Rosenwasser, I.
1983-01-01
Magnus forces and moments were measured on a basic-finner model spinning in transonic flow. Spin was induced by canted fins or by full-span or semi-span, outboard and inboard roll controls. Magnus force and moment reversals were caused by Mach number, reduced spin rate, and angle of attack variations. Magnus center of pressure was found to be independent of the angle of attack but varied with the Mach number and model configuration or reduced spin rate.
2016-09-01
between U.S. bases and the theater of operations. • Cyber Attack capabilities designed to disrupt U.S. command and control systems and critical...operational area. Key area-denial capabilities include: • Air forces and air defense systems, both fixed and mobile, designed to deny local U.S. air...Precision-guided rockets, artillery, missiles, and mortars (G-RAMM) designed to attack surface targets, including landing forces, with much greater accuracy
2016-11-01
Target Attack Radar System Objective We determined whether the Air Force made cost-effective purchases on the performance-based logistics contract to... contract to Northrop Grumman Corporation to provide Total System Support Responsibility services to sustain 16 E-8C JSTARS aircraft. These services...customer support. The Total System Support Responsibility contract is valued at $7 billion, with a 6-year base period and 16 annual contract option
Limited Investigation of Active Feel Control Stick System (Active Stick)
2009-06-01
contained no limit protection and was the baseline system. The second system was “F-16 like” and contained angle -of-attack and load factor limiting...system. The second system was “F-16 like” and contained angle of attack (AOA) and load factor limiting features built into the flight control system...Force PTI at VLO .......................... 13 Figure 9: Pitch Angle Response to 1.5 g Commanded Force PTI at VLO ........................ 14 Figure 10
Separation characteristics of generic stores from lee side of an inclined flat plate at Mach 6
NASA Technical Reports Server (NTRS)
Wilcox, Floyd J., Jr.
1995-01-01
An experimental investigation was conducted to determine the aerodynamic characteristics of a store as it was separated from the lee side of a flat plate inclined at 15 deg to the free-stream flow at Mach 6. Two store models were tested: a cone cylinder and a roof delta. Force and moment data were obtained for both stores as they were moved in 0.5-in. increments away from the flat plate lee-side separated flow region into the free-stream flow while the store angle of attack was held constant at either 0 deg or 15 deg. The results indicate that both stores had adverse separation characteristics (i.e., negative normal force and pitching moment) at an angle of attack of 0 deg, and the cone cylinder had favorable separation characteristics (i.e., positive normal force and pitching moment) at an angle of attack of 15 deg. At an angle of attack of 15 deg, the separation characteristics of the roof delta are indeterminate at small separation distances and favorable at greater separation distances. These characteristics are the result of the local flow inclination relative to the stores as they traversed through the flat plate lee-side flow field. In addition to plotted data, force and moment data are tabulated and schlieren photographs of the stores and flat plate are presented.
NASA Technical Reports Server (NTRS)
Arabian, Donald D.; Runckel, Jack F.; Reid, Charles F, Jr.
1961-01-01
Measurements of the normal force and chord force were made on the slats of a sting-mounted wing-fuselage model through a Mach number range of 0.60 to 1.03 and at angles of attack from 0 to 20 deg at subsonic speeds and from 0 to 8 deg at Mach number 1.03. The 20-percent-chord tapered leading-edge slats extended from 25 to 95 percent of the semispan and consisted of five segments. The model wing had 45 deg sweep, an aspect ratio of 3.56, a taper ratio of 0.3, and NACA 64(06)AO07 airfoil sections. Slat forces and moments were determined for the slats in the almost-closed and open positions for spanwise extents of 35 to 95 percent and 46 to 95 percent of the semispan. The results of the investigation showed little change in the slat maximum force and moment coefficients with Mach number. The coefficients for the open and almost-closed slat positions had similar variations with angle of attack. The loads on the individual slat segments were found to increase toward the tip for moderate angles of attack and decrease toward the tip for high angles of attack. An analysis of the opening and closing characteristics of aerodynamically operated slats opening on a circular-arc path is included.
Computational Aeroelastic Analysis of Ares Crew Launch Vehicle Bi-Modal Loading
NASA Technical Reports Server (NTRS)
Massey, Steven J.; Chwalowski, Pawel
2010-01-01
A Reynolds averaged Navier-Stokes analysis, with and without dynamic aeroelastic effects, is presented for the Ares I-X launch vehicle at transonic Mach numbers and flight Reynolds numbers for two grid resolutions and two angles of attack. The purpose of the study is to quantify the force and moment increment imparted by the sudden transition from fully separated flow around the crew module - service module junction to that of the bi-modal flow state in which only part of the flow reattaches. The bi-modal flow phenomenon is of interest to the guidance, navigation and control community because it causes a discontinuous jump in forces and moments. Computations with a rigid structure at zero zero angle of attack indicate significant increases in normal force and pitching moment. Dynamic aeroelastic computations indicate the bi-modal flow state is insensitive to vehicle flexibility due to the resulting deflections imparting only very small changes in local angle of attack. At an angle of attack of 2.5deg, the magnitude of the pitching moment increment resulting from the bi-modal state nearly triples, while occurring at a slightly lower Mach number. Significant grid induced variations between the solutions indicate that further grid refinement is warranted.
NASA Technical Reports Server (NTRS)
Jorgensen, L. H.; Nelson, E. R.
1974-01-01
An experimental investigation was conducted to determine the effect of forebody geometry, a grit ring around the nose, Reynolds number, Mach number, and angle of attack on the aerodynamic characteristics of a body of revolution. Aerodynamic force and moment characteristics were measured for a cylindrical body with tangent ogive noses of fineness ratio 2.5, 3.0, 3.5, and 5.0. The cylindrical body was tested with an ogive nose having a rounded tip and an ogive nose with two different nose strake arrangements. Aerodynamic configurations were tested at various Mach numbers, angles of attack, and Reynolds numbers. The data demonstrate that the aerodynamic characteristics for a body of revolution can be significantly affected by changes in nose fineness ratio, nose bluntness, Reynolds number, Mach number, and, of course, angle of attack. Nose strakes increased the normal forces but had little effect on the side forces that developed at subsonic Mach numbers for alpha greater than about 25. A grit ring around the nose had little or no effect on the aerodynamic characteristics.
Horsch, Martin; Vrabec, Jadran; Bernreuther, Martin; Grottel, Sebastian; Reina, Guido; Wix, Andrea; Schaber, Karlheinz; Hasse, Hans
2008-04-28
Molecular dynamics (MD) simulation is applied to the condensation process of supersaturated vapors of methane, ethane, and carbon dioxide. Simulations of systems with up to a 10(6) particles were conducted with a massively parallel MD program. This leads to reliable statistics and makes nucleation rates down to the order of 10(30) m(-3) s(-1) accessible to the direct simulation approach. Simulation results are compared to the classical nucleation theory (CNT) as well as the modification of Laaksonen, Ford, and Kulmala (LFK) which introduces a size dependence of the specific surface energy. CNT describes the nucleation of ethane and carbon dioxide excellently over the entire studied temperature range, whereas LFK provides a better approach to methane at low temperatures.
Vector Potential Generation for Numerical Relativity Simulations
NASA Astrophysics Data System (ADS)
Silberman, Zachary; Faber, Joshua; Adams, Thomas; Etienne, Zachariah; Ruchlin, Ian
2017-01-01
Many different numerical codes are employed in studies of highly relativistic magnetized accretion flows around black holes. Based on the formalisms each uses, some codes evolve the magnetic field vector B, while others evolve the magnetic vector potential A, the two being related by the curl: B=curl(A). Here, we discuss how to generate vector potentials corresponding to specified magnetic fields on staggered grids, a surprisingly difficult task on finite cubic domains. The code we have developed solves this problem in two ways: a brute-force method, whose scaling is nearly linear in the number of grid cells, and a direct linear algebra approach. We discuss the success both algorithms have in generating smooth vector potential configurations and how both may be extended to more complicated cases involving multiple mesh-refinement levels. NSF ACI-1550436
Dashti, Ali; Komarov, Ivan; D'Souza, Roshan M
2013-01-01
This paper presents an implementation of the brute-force exact k-Nearest Neighbor Graph (k-NNG) construction for ultra-large high-dimensional data cloud. The proposed method uses Graphics Processing Units (GPUs) and is scalable with multi-levels of parallelism (between nodes of a cluster, between different GPUs on a single node, and within a GPU). The method is applicable to homogeneous computing clusters with a varying number of nodes and GPUs per node. We achieve a 6-fold speedup in data processing as compared with an optimized method running on a cluster of CPUs and bring a hitherto impossible [Formula: see text]-NNG generation for a dataset of twenty million images with 15 k dimensionality into the realm of practical possibility.
The general 2-D moments via integral transform method for acoustic radiation and scattering
NASA Astrophysics Data System (ADS)
Smith, Jerry R.; Mirotznik, Mark S.
2004-05-01
The moments via integral transform method (MITM) is a technique to analytically reduce the 2-D method of moments (MoM) impedance double integrals into single integrals. By using a special integral representation of the Green's function, the impedance integral can be analytically simplified to a single integral in terms of transformed shape and weight functions. The reduced expression requires fewer computations and reduces the fill times of the MoM impedance matrix. Furthermore, the resulting integral is analytic for nearly arbitrary shape and weight function sets. The MITM technique is developed for mixed boundary conditions and predictions with basic shape and weight function sets are presented. Comparisons of accuracy and speed between MITM and brute force are presented. [Work sponsored by ONR and NSWCCD ILIR Board.
Combining Concepts: Operational Shock in Insurgencies
2013-05-23
individual insurgent put down his arms and walk away; rather its focus is on attacking the insurgency at the operational level. The past decade of... attacking insurgent networks. This section highlights the characteristics of an insurgent system in a state of shock and discusses methods the...command nodes, and rail networks, denying the enemy the ability to operationally maneuver his forces.4 This rapid maneuver, coupled with attacks
Soviet short-range nuclear forces: flexible response or flexible aggression. Student essay
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, T.R.
1987-03-23
This essay takes a critical look at Soviet short-range nuclear forces in an effort to identify Soviet capabilities to fight a limited nuclear war with NATO. From an analysis of Soviet military art, weapon-system capabilities and tactics, the author concludes that the Soviets have developed a viable limited-nuclear-attack option. Unless NATO reacts to this option, the limited nuclear attack may become favored Soviet option and result in the rapid defeat of NATO.
Kinematic control of aerodynamic forces on an inclined flapping wing with asymmetric strokes.
Park, Hyungmin; Choi, Haecheon
2012-03-01
In the present study, we conduct an experiment using a one-paired dynamically scaled model of an insect wing, to investigate how asymmetric strokes with different wing kinematic parameters are used to control the aerodynamics of a dragonfly-like inclined flapping wing in still fluid. The kinematic parameters considered are the angles of attack during the mid-downstroke (α(md)) and mid-upstroke (α(mu)), and the duration (Δτ) and time of initiation (τ(p)) of the pitching rotation. The present dragonfly-like inclined flapping wing has the aerodynamic mechanism of unsteady force generation similar to those of other insect wings in a horizontal stroke plane, but the detailed effect of the wing kinematics on the force control is different due to the asymmetric use of the angle of attack during the up- and downstrokes. For example, high α(md) and low α(mu) produces larger vertical force with less aerodynamic power, and low α(md) and high α(mu) is recommended for horizontal force (thrust) production. The pitching rotation also affects the aerodynamics of a flapping wing, but its dynamic rotational effect is much weaker than the effect from the kinematic change in the angle of attack caused by the pitching rotation. Thus, the influences of the duration and timing of pitching rotation for the present inclined flapping wing are found to be very different from those for a horizontal flapping wing. That is, for the inclined flapping motion, the advanced and delayed rotations produce smaller vertical forces than the symmetric one and the effect of pitching duration is very small. On the other hand, for a specific range of pitching rotation timing, delayed rotation requires less aerodynamic power than the symmetric rotation. As for the horizontal force, delayed rotation with low α(md) and high α(mu) is recommended for long-duration flight owing to its high efficiency, and advanced rotation should be employed for hovering flight for nearly zero horizontal force. The present study suggests that manipulating the angle of attack during a flapping cycle is the most effective way to control the aerodynamic forces and corresponding power expenditure for a dragonfly-like inclined flapping wing.
Time Critical Targeting Concept of Operations (CONOPS) Interactions
2011-05-01
range of topics in force development and employment. Carl has participated in projects examining the interdiction of armoured ground forces , long...Critical Targeting Concept of Operations (CONOPS) Interactions Executive Summary In 2003, RAND Project Air Force examined the...Attack. ____________________ ________________________________________________ Carl Rhodes Project Air Force , RAND Corporation Carl Rhodes is the
NASA Technical Reports Server (NTRS)
Blair, A. B., Jr.; Stallings, R. L., Jr.
1986-01-01
A wind-tunnel investigation has been conducted at Mach numbers of 1.50, 2.16, and 2.86 to obtain axial-force data on a metric rectangular-box cavity with various length-to-depth ratios. The model was tested at angles of attack from -4 deg to -2 deg. The results are summarized to show variations in cavity axial-force coefficient for deep- and shallow-cavity configurations with detached and attached cavity flow fields, respectively. The results of the investigation indicate that for a wide range of cavity lengths and depths, good correlations of the cavity axial-force coefficients (based on cavity rear-face area) are obtained when these coefficients are plotted as a function of cavity length-to-depth ratio. Abrupt increases in the cavity axial-force coefficients at an angle of attack of 0 deg. reflect the transition from an open (detached) cavity flow field to a closed (attached) cavity flow field. Cavity length-to-depth ratio is the dominant factor affecting the switching of the cavity flow field from one type to the other. The type of cavity flow field (open or closed) is not dependent on the test angles of attack except near the critical value of length-to-depth ratio.
Reentry vehicle aerodynamics and control at very high angle of attack
NASA Astrophysics Data System (ADS)
Merret, Jason Michael
In recent flight tests the X-38 reentry test vehicle spins during the deployment of the drogue parachute. An experimental aerodynamic study has been conducted at the University of Illinois using a scale model of the X-38 to explore the cause of this problem. A six-component sting balance was used to measure the forces and moments on the 4.7% wind tunnel model at angles of attack from -7° to 95°. In addition, surface pressure taps and flow visualization techniques were utilized to determine the forebody pressures and surface flowfield on the model. The effect of Reynolds number and boundary-layer state were also examined. The investigation suggests that the spinning under the drogue parachute was caused by asymmetric vortex formation. At angles of attack between 75° and 90° vortex asymmetry developed in all of the cases without separation geometrically fixed. This flow asymmetry produced large side forces and yawing moments. The Reynolds number effect and the effect of the boundary-layer state were noticeable, but did not greatly change the side force and yawing moment characteristics of the model. The micro-geometry of the model had a large effect on the side force generated by the vortex positioning. The effects of forced oscillations were also examined and it was determined that the side forces were still present during the oscillations. Control of the vortices and side forces was obtained by applying strakes to the side of the forebody of the model.
SIMBAD : a sequence-independent molecular-replacement pipeline
Simpkin, Adam J.; Simkovic, Felix; Thomas, Jens M. H.; ...
2018-06-08
The conventional approach to finding structurally similar search models for use in molecular replacement (MR) is to use the sequence of the target to search against those of a set of known structures. Sequence similarity often correlates with structure similarity. Given sufficient similarity, a known structure correctly positioned in the target cell by the MR process can provide an approximation to the unknown phases of the target. An alternative approach to identifying homologous structures suitable for MR is to exploit the measured data directly, comparing the lattice parameters or the experimentally derived structure-factor amplitudes with those of known structures. Here,more » SIMBAD , a new sequence-independent MR pipeline which implements these approaches, is presented. SIMBAD can identify cases of contaminant crystallization and other mishaps such as mistaken identity (swapped crystallization trays), as well as solving unsequenced targets and providing a brute-force approach where sequence-dependent search-model identification may be nontrivial, for example because of conformational diversity among identifiable homologues. The program implements a three-step pipeline to efficiently identify a suitable search model in a database of known structures. The first step performs a lattice-parameter search against the entire Protein Data Bank (PDB), rapidly determining whether or not a homologue exists in the same crystal form. The second step is designed to screen the target data for the presence of a crystallized contaminant, a not uncommon occurrence in macromolecular crystallography. Solving structures with MR in such cases can remain problematic for many years, since the search models, which are assumed to be similar to the structure of interest, are not necessarily related to the structures that have actually crystallized. To cater for this eventuality, SIMBAD rapidly screens the data against a database of known contaminant structures. Where the first two steps fail to yield a solution, a final step in SIMBAD can be invoked to perform a brute-force search of a nonredundant PDB database provided by the MoRDa MR software. Through early-access usage of SIMBAD , this approach has solved novel cases that have otherwise proved difficult to solve.« less
Low-field thermal mixing in [1-(13)C] pyruvic acid for brute-force hyperpolarization.
Peat, David T; Hirsch, Matthew L; Gadian, David G; Horsewill, Anthony J; Owers-Bradley, John R; Kempf, James G
2016-07-28
We detail the process of low-field thermal mixing (LFTM) between (1)H and (13)C nuclei in neat [1-(13)C] pyruvic acid at cryogenic temperatures (4-15 K). Using fast-field-cycling NMR, (1)H nuclei in the molecule were polarized at modest high field (2 T) and then equilibrated with (13)C nuclei by fast cycling (∼300-400 ms) to a low field (0-300 G) that activates thermal mixing. The (13)C NMR spectrum was recorded after fast cycling back to 2 T. The (13)C signal derives from (1)H polarization via LFTM, in which the polarized ('cold') proton bath contacts the unpolarised ('hot') (13)C bath at a field so low that Zeeman and dipolar interactions are similar-sized and fluctuations in the latter drive (1)H-(13)C equilibration. By varying mixing time (tmix) and field (Bmix), we determined field-dependent rates of polarization transfer (1/τ) and decay (1/T1m) during mixing. This defines conditions for effective mixing, as utilized in 'brute-force' hyperpolarization of low-γ nuclei like (13)C using Boltzmann polarization from nearby protons. For neat pyruvic acid, near-optimum mixing occurs for tmix∼ 100-300 ms and Bmix∼ 30-60 G. Three forms of frozen neat pyruvic acid were tested: two glassy samples, (one well-deoxygenated, the other O2-exposed) and one sample pre-treated by annealing (also well-deoxygenated). Both annealing and the presence of O2 are known to dramatically alter high-field longitudinal relaxation (T1) of (1)H and (13)C (up to 10(2)-10(3)-fold effects). Here, we found smaller, but still critical factors of ∼(2-5)× on both τ and T1m. Annealed, well-deoxygenated samples exhibit the longest time constants, e.g., τ∼ 30-70 ms and T1m∼ 1-20 s, each growing vs. Bmix. Mixing 'turns off' for Bmix > ∼100 G. That T1m≫τ is consistent with earlier success with polarization transfer from (1)H to (13)C by LFTM.
SIMBAD : a sequence-independent molecular-replacement pipeline
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simpkin, Adam J.; Simkovic, Felix; Thomas, Jens M. H.
The conventional approach to finding structurally similar search models for use in molecular replacement (MR) is to use the sequence of the target to search against those of a set of known structures. Sequence similarity often correlates with structure similarity. Given sufficient similarity, a known structure correctly positioned in the target cell by the MR process can provide an approximation to the unknown phases of the target. An alternative approach to identifying homologous structures suitable for MR is to exploit the measured data directly, comparing the lattice parameters or the experimentally derived structure-factor amplitudes with those of known structures. Here,more » SIMBAD , a new sequence-independent MR pipeline which implements these approaches, is presented. SIMBAD can identify cases of contaminant crystallization and other mishaps such as mistaken identity (swapped crystallization trays), as well as solving unsequenced targets and providing a brute-force approach where sequence-dependent search-model identification may be nontrivial, for example because of conformational diversity among identifiable homologues. The program implements a three-step pipeline to efficiently identify a suitable search model in a database of known structures. The first step performs a lattice-parameter search against the entire Protein Data Bank (PDB), rapidly determining whether or not a homologue exists in the same crystal form. The second step is designed to screen the target data for the presence of a crystallized contaminant, a not uncommon occurrence in macromolecular crystallography. Solving structures with MR in such cases can remain problematic for many years, since the search models, which are assumed to be similar to the structure of interest, are not necessarily related to the structures that have actually crystallized. To cater for this eventuality, SIMBAD rapidly screens the data against a database of known contaminant structures. Where the first two steps fail to yield a solution, a final step in SIMBAD can be invoked to perform a brute-force search of a nonredundant PDB database provided by the MoRDa MR software. Through early-access usage of SIMBAD , this approach has solved novel cases that have otherwise proved difficult to solve.« less
Faint Debris Detection by Particle Based Track-Before-Detect Method
NASA Astrophysics Data System (ADS)
Uetsuhara, M.; Ikoma, N.
2014-09-01
This study proposes a particle method to detect faint debris, which is hardly seen in single frame, from an image sequence based on the concept of track-before-detect (TBD). The most widely used detection method is detect-before-track (DBT), which firstly detects signals of targets from single frame by distinguishing difference of intensity between foreground and background then associate the signals for each target between frames. DBT is capable of tracking bright targets but limited. DBT is necessary to consider presence of false signals and is difficult to recover from false association. On the other hand, TBD methods try to track targets without explicitly detecting the signals followed by evaluation of goodness of each track and obtaining detection results. TBD has an advantage over DBT in detecting weak signals around background level in single frame. However, conventional TBD methods for debris detection apply brute-force search over candidate tracks then manually select true one from the candidates. To reduce those significant drawbacks of brute-force search and not-fully automated process, this study proposes a faint debris detection algorithm by a particle based TBD method consisting of sequential update of target state and heuristic search of initial state. The state consists of position, velocity direction and magnitude, and size of debris over the image at a single frame. The sequential update process is implemented by a particle filter (PF). PF is an optimal filtering technique that requires initial distribution of target state as a prior knowledge. An evolutional algorithm (EA) is utilized to search the initial distribution. The EA iteratively applies propagation and likelihood evaluation of particles for the same image sequences and resulting set of particles is used as an initial distribution of PF. This paper describes the algorithm of the proposed faint debris detection method. The algorithm demonstrates performance on image sequences acquired during observation campaigns dedicated to GEO breakup fragments, which would contain a sufficient number of faint debris images. The results indicate the proposed method is capable of tracking faint debris with moderate computational costs at operational level.
Aerodynamic effects of flexibility in flapping wings.
Zhao, Liang; Huang, Qingfeng; Deng, Xinyan; Sane, Sanjay P
2010-03-06
Recent work on the aerodynamics of flapping flight reveals fundamental differences in the mechanisms of aerodynamic force generation between fixed and flapping wings. When fixed wings translate at high angles of attack, they periodically generate and shed leading and trailing edge vortices as reflected in their fluctuating aerodynamic force traces and associated flow visualization. In contrast, wings flapping at high angles of attack generate stable leading edge vorticity, which persists throughout the duration of the stroke and enhances mean aerodynamic forces. Here, we show that aerodynamic forces can be controlled by altering the trailing edge flexibility of a flapping wing. We used a dynamically scaled mechanical model of flapping flight (Re approximately 2000) to measure the aerodynamic forces on flapping wings of variable flexural stiffness (EI). For low to medium angles of attack, as flexibility of the wing increases, its ability to generate aerodynamic forces decreases monotonically but its lift-to-drag ratios remain approximately constant. The instantaneous force traces reveal no major differences in the underlying modes of force generation for flexible and rigid wings, but the magnitude of force, the angle of net force vector and centre of pressure all vary systematically with wing flexibility. Even a rudimentary framework of wing veins is sufficient to restore the ability of flexible wings to generate forces at near-rigid values. Thus, the magnitude of force generation can be controlled by modulating the trailing edge flexibility and thereby controlling the magnitude of the leading edge vorticity. To characterize this, we have generated a detailed database of aerodynamic forces as a function of several variables including material properties, kinematics, aerodynamic forces and centre of pressure, which can also be used to help validate computational models of aeroelastic flapping wings. These experiments will also be useful for wing design for small robotic insects and, to a limited extent, in understanding the aerodynamics of flapping insect wings.
Aerodynamic effects of flexibility in flapping wings
Zhao, Liang; Huang, Qingfeng; Deng, Xinyan; Sane, Sanjay P.
2010-01-01
Recent work on the aerodynamics of flapping flight reveals fundamental differences in the mechanisms of aerodynamic force generation between fixed and flapping wings. When fixed wings translate at high angles of attack, they periodically generate and shed leading and trailing edge vortices as reflected in their fluctuating aerodynamic force traces and associated flow visualization. In contrast, wings flapping at high angles of attack generate stable leading edge vorticity, which persists throughout the duration of the stroke and enhances mean aerodynamic forces. Here, we show that aerodynamic forces can be controlled by altering the trailing edge flexibility of a flapping wing. We used a dynamically scaled mechanical model of flapping flight (Re ≈ 2000) to measure the aerodynamic forces on flapping wings of variable flexural stiffness (EI). For low to medium angles of attack, as flexibility of the wing increases, its ability to generate aerodynamic forces decreases monotonically but its lift-to-drag ratios remain approximately constant. The instantaneous force traces reveal no major differences in the underlying modes of force generation for flexible and rigid wings, but the magnitude of force, the angle of net force vector and centre of pressure all vary systematically with wing flexibility. Even a rudimentary framework of wing veins is sufficient to restore the ability of flexible wings to generate forces at near-rigid values. Thus, the magnitude of force generation can be controlled by modulating the trailing edge flexibility and thereby controlling the magnitude of the leading edge vorticity. To characterize this, we have generated a detailed database of aerodynamic forces as a function of several variables including material properties, kinematics, aerodynamic forces and centre of pressure, which can also be used to help validate computational models of aeroelastic flapping wings. These experiments will also be useful for wing design for small robotic insects and, to a limited extent, in understanding the aerodynamics of flapping insect wings. PMID:19692394
Future's operation areas: new-generation suppression enemy air defence (SEAD) elements
NASA Astrophysics Data System (ADS)
Hazinedar, Ä.°lker
2015-05-01
Since air vehicles took place in the theater of operations, they have become the indispensable elements and the strongest attack power of armed forces. In the following period, with technological development, supersonic aircrafts took place in the operation area and this increased effectiveness of air vehicles much more. Air forces have used these aircrafts during important missions like strategic attack and air defense operations. On the other hand, decision makers understood that it was not feasible to intercept fighter aircrafts by executing combat air patrol flight missions. Since there is not enough reaction time to intercept the high speed aircrafts, ground stationed Surface to Air Missiles (SAM) system requirement has emerged. Therefore, SAM systems took place in the operation scene as well. Due to the fact that SAM systems emerged against the attack power, the attack aircrafts are to keep away from the fire of the ground stationed SAM systems. Hence, the requirement of Suppression Enemy Air Defense (SEAD) arose. SEAD elements take under suppression the radar of the SAM systems. In this way, attack aircrafts are able to attack without the risk of SAM systems. The purpose of this study is to find new methods or concepts in order to protect friendly attack aircrafts against ground based surface to air missiles' fires. Modernization of SAM systems and new generation SAM system producing activities have proceeded with positive acceleration. So, current SEAD elements and concepts are not able to cover the requirements due to the increased SAM system ranges. According to the concepts, SEAD weapons` ranges must be longer than the SAM weapons' ranges to protect friendly aircrafts. In this study, new concept was offered to overcome the deficiencies of current SEAD concept. The elements of new concepts were put forward. Classic SEAD concept and new generation concepts were assessed by using SWOT analysis technique. As a result, this study has revealed that, air forces' effectiveness can be enhanced by using new generation SEAD concepts against enemy SAM systems.
... are now immunized that diphtheria was forced to change its plan of attack. The disease now targets adults who have not had the ... but attacks can happen anytime, especially in warmer climates. Criminal Record Years ago, diphtheria was a common disease among children. And, it was also a common ...
Asymmetric threat data mining and knowledge discovery
NASA Astrophysics Data System (ADS)
Gilmore, John F.; Pagels, Michael A.; Palk, Justin
2001-03-01
Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.
NASA Technical Reports Server (NTRS)
Hanson, R. L.; Obrien, R. G.; Oiye, M. Y.; Vanderleest, S.
1972-01-01
Experimental aerodynamic investigations were carried out in the Boeing transonic and supersonic wind tunnels on a 0.008899-scale model of a proposed pressure-fed ballistic recoverable booster (BRB) configuration. The purpose of the test program was to determine the stability and control effectiveness of the basic configuration at high and low angles of attack, and to conduct parametric studies of various engine shroud, fin, and drag petal configurations. Six-component force data and base pressure data were obtained over a Mach number range of 0.35 to 4.0 at angles of attack of -5 to 25 and 55 to 85 at zero degrees sideslip and over a sideslip range of -10 to +10 at angles of attack ranging from -10 to 72.5. Two-component force data were also obtained with a fin balance on selected runs.
NASA Technical Reports Server (NTRS)
Jorgensen, L. H.; Howell, M. H.
1976-01-01
An experimental investigation was conducted in the Ames 6-by-6-Foot Wind Tunnel to measure the static aerodynamic characteristics for bodies of circular and elliptic cross section with various thin flat-plate wings. Eighteen configuration combinations were tested at Mach numbers of 0.6, 0.9, 1.2, 1.5, and 2.0 at angles of attack from 0 deg to 58 deg. The data demonstrate that taper ratio and aspect ratio had only small effect on the aerodynamic characteristics, especially at the higher angles of attack. Undesirable side forces and yawing moments, which developed at angles of attack greater than about 25 deg, were generally no greater than those for the bodies tested alone. As for the bodies alone, the side forces and yawing moments increased as the nose fineness ratio increased and/or as the subsonic Mach number decreased.
NASA Technical Reports Server (NTRS)
Debevoise, J. M.; Mcginnis, R. F.
1972-01-01
The test was a conventional stability and control test except for two aspects. One was the very high angles of attack at which the delta wing configurations were tested (up to 60 degrees) at Mach numbers of 3 and 4.96. The other was the installation of the orbiter and twin boosters in a manner that caused the support system to induce normal forces and side forces on the aft portion of the boosters at all Mach numbers; i.e., the support and the booster bodies were close together, side by side.
Investigating the Self-Protective Potential of Immobility in Victims of Rape.
de Heer, Brooke A; Jones, Lynn C
2017-04-01
Using a nationwide sample of reported rape cases collected by the Federal Bureau of Investigation (FBI; 389 victims; 89% stranger rapes), this study investigates assumptions about self-protective behaviors for rape victims. Past research on victim resistance strategies often specifies active resistance as self-protective, inadvertently underestimating the potential for biologically based reactions, such as tonic immobility, to be self-protective as well. Results confirm that rape victims who were verbally and physically immobile during the attack were less likely to be injured and have force used against them. In addition, victims who were verbally immobile suffered a less severe attack. The results indicate that immobility may protect the victim from increased injury, force, and severity of the attack. Implications for the legal and public definition of consent are discussed.
OPERATION COBRA. Deliberate Attack, Exploitation
1984-05-25
to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light
A comparison of approaches for finding minimum identifying codes on graphs
NASA Astrophysics Data System (ADS)
Horan, Victoria; Adachi, Steve; Bak, Stanley
2016-05-01
In order to formulate mathematical conjectures likely to be true, a number of base cases must be determined. However, many combinatorial problems are NP-hard and the computational complexity makes this research approach difficult using a standard brute force approach on a typical computer. One sample problem explored is that of finding a minimum identifying code. To work around the computational issues, a variety of methods are explored and consist of a parallel computing approach using MATLAB, an adiabatic quantum optimization approach using a D-Wave quantum annealing processor, and lastly using satisfiability modulo theory (SMT) and corresponding SMT solvers. Each of these methods requires the problem to be formulated in a unique manner. In this paper, we address the challenges of computing solutions to this NP-hard problem with respect to each of these methods.
The Application of High Energy Resolution Green's Functions to Threat Scenario Simulation
NASA Astrophysics Data System (ADS)
Thoreson, Gregory G.; Schneider, Erich A.
2012-04-01
Radiation detectors installed at key interdiction points provide defense against nuclear smuggling attempts by scanning vehicles and traffic for illicit nuclear material. These hypothetical threat scenarios may be modeled using radiation transport simulations. However, high-fidelity models are computationally intensive. Furthermore, the range of smuggler attributes and detector technologies create a large problem space not easily overcome by brute-force methods. Previous research has demonstrated that decomposing the scenario into independently simulated components using Green's functions can simulate photon detector signals with coarse energy resolution. This paper extends this methodology by presenting physics enhancements and numerical treatments which allow for an arbitrary level of energy resolution for photon transport. As a result, spectroscopic detector signals produced from full forward transport simulations can be replicated while requiring multiple orders of magnitude less computation time.
Influence of temperature fluctuations on infrared limb radiance: a new simulation code
NASA Astrophysics Data System (ADS)
Rialland, Valérie; Chervet, Patrick
2006-08-01
Airborne infrared limb-viewing detectors may be used as surveillance sensors in order to detect dim military targets. These systems' performances are limited by the inhomogeneous background in the sensor field of view which impacts strongly on target detection probability. This background clutter, which results from small-scale fluctuations of temperature, density or pressure must therefore be analyzed and modeled. Few existing codes are able to model atmospheric structures and their impact on limb-observed radiance. SAMM-2 (SHARC-4 and MODTRAN4 Merged), the Air Force Research Laboratory (AFRL) background radiance code can be used to in order to predict the radiance fluctuation as a result of a normalized temperature fluctuation, as a function of the line-of-sight. Various realizations of cluttered backgrounds can then be computed, based on these transfer functions and on a stochastic temperature field. The existing SIG (SHARC Image Generator) code was designed to compute the cluttered background which would be observed from a space-based sensor. Unfortunately, this code was not able to compute accurate scenes as seen by an airborne sensor especially for lines-of-sight close to the horizon. Recently, we developed a new code called BRUTE3D and adapted to our configuration. This approach is based on a method originally developed in the SIG model. This BRUTE3D code makes use of a three-dimensional grid of temperature fluctuations and of the SAMM-2 transfer functions to synthesize an image of radiance fluctuations according to sensor characteristics. This paper details the working principles of the code and presents some output results. The effects of the small-scale temperature fluctuations on infrared limb radiance as seen by an airborne sensor are highlighted.
NASA Technical Reports Server (NTRS)
Agarwal, R.; Rakich, J. V.
1978-01-01
Computational results obtained with a parabolic Navier-Stokes marching code are presented for supersonic viscous flow past a pointed cone at angle of attack undergoing a combined spinning and coning motion. The code takes into account the asymmetries in the flow field resulting from the motion and computes the asymmetric shock shape, crossflow and streamwise shear, heat transfer, crossflow separation and vortex structure. The side force and moment are also computed. Reasonably good agreement is obtained with the side force measurements of Schiff and Tobak. Comparison is also made with the only available numerical inviscid analysis. It is found that the asymmetric pressure loads due to coning motion are much larger than all other viscous forces due to spin and coning, making viscous forces negligible in the combined motion.
Filament wound data base development, revision 1, appendix A
NASA Technical Reports Server (NTRS)
Sharp, R. Scott; Braddock, William F.
1985-01-01
Data are presented in tabular form for the High Performance Nozzle Increments, Filament Wound Case (FWC) Systems Tunnel Increments, Steel Case Systems Tunnel Increments, FWC Stiffener Rings Increments, Steel Case Stiffener Rings Increments, FWC External Tank (ET) Attach Ring Increments, Steel Case ET Attach Ring Increments, and Data Tape 8. The High Performance Nozzle are also presented in graphical form. The tabular data consist of six-component force and moment coefficients as they vary with angle of attack at a specific Mach number and roll angle. The six coefficients are normal force, pitching moment, side force, yawing moment, axial force, and rolling moment. The graphical data for the High Performance Nozzle Increments consist of a plot of a coefficient increment as a function of angle of attack at a specific Mach number and at a roll angle of 0 deg.
Humphrey, Caitlin; Kumaratilake, Jaliya; Henneberg, Maciej
2016-05-01
Knife attacks are commonly seen in Australia and other countries. During forensic investigations the force with which a wound was inflicted is often questioned. The ability to examine resultant trauma and particular weapons at different forces with an experimental device may lead to better interpretations of knife wounds. The objective of this study is to design, construct and test a device to analyse the characteristics and forces involved in knife attacks, particularly incised wounds. The mechanical variables (e.g. force, angle, knife geometry) involved in knife attacks have been considered to design and construct a suitable device which allows these variables to be systematically controlled and varied. A device was designed and constructed from mild steel. This included a pivoting arm and instrumented knife holder. The arm has adjustable angle and weight so that knives can be operated at different calculated forces. A device was successfully constructed and the repeatability of incised knife trauma and its characteristics in skeletal tissues were investigated. A device which allows reproducible and controlled experiments with knife wounds will be advantageous to forensic investigations. In particular, in determining forces and types of weapons associated with particular wounds, identifying or eliminating suspected weapons and more accurately answering the common question: How much force would be required to cause that particular wound. This could help to characterise the perpetrator. The device can be altered to be used in the future to investigate trauma caused by other weapons. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Cyber Attacks and the Legal Justification for an Armed Response
2017-05-25
conflict between military forces of any origin.ൟ The definition above applies only to Title 18, Chapter 113B “ Terrorism ,” and is not applicable...beyond the context of terrorism . Applying this definition to cyber attacks outside the context of terrorism will not provide legal justification for
Kabacinski, Jaroslae; Dworak, Lecholslaw B; Murawa, Michal; Ostarello, John; Rzepnicka, Agata; Maczynski, Jacek
2016-12-01
The purpose of the study was to compare the take-off dynamics in counter-movement jump (CMJ), volleyball block and spikes. Twelve professional female players, representing the highest volleyball league in Poland, participated in the laboratory tests. A force platform was used to record ground reaction force (GRF) during take-off phase in CMJ test, block from a run-up and spikes: front row attack, slide attack, back row attack. Vertical (v) GRF (peak: Rmax and integral mean: ) were analyzed. Significant differences (P<0.05) of values of the dynamic parameters (Rmax, ) were found between CMJ, block from a run-up and three different technique spikes. The highest values were recorded during take-off in the back row attack: peak vGRF (2.93±0.05 BW), integral mean vGRF (1.90±0.08 BW), impulse of vGRF (354±40 Ns), peak power (5320±918 W) and integral mean power (3604±683 W). Peak power (2608±217 W) and integral mean power (1417±94 W) were determined in CMJ test to evaluate the force-velocity capabilities of the players. In terms of GRF and the mechanical power, high level of dynamics in take-off influences positively the jumping height and significantly increases the effectiveness of attacks during spike of the ball over the block of the opponent.
2013-06-13
Hepburn Attack Force, commanded by Rear Admiral A. W. Johnson. The Navy force included the New York, Arkansas, Wyoming, Atares , Destroyer Squadron...force included the New York, Arkansas, Wyoming, Atares , Destroyer Squadron Ten (8 destroyers), Cruiser Division Eight, Destroyer Division Four, five
Fourier functional analysis for unsteady aerodynamic modeling
NASA Technical Reports Server (NTRS)
Lan, C. Edward; Chin, Suei
1991-01-01
A method based on Fourier analysis is developed to analyze the force and moment data obtained in large amplitude forced oscillation tests at high angles of attack. The aerodynamic models for normal force, lift, drag, and pitching moment coefficients are built up from a set of aerodynamic responses to harmonic motions at different frequencies. Based on the aerodynamic models of harmonic data, the indicial responses are formed. The final expressions for the models involve time integrals of the indicial type advocated by Tobak and Schiff. Results from linear two- and three-dimensional unsteady aerodynamic theories as well as test data for a 70-degree delta wing are used to verify the models. It is shown that the present modeling method is accurate in producing the aerodynamic responses to harmonic motions and the ramp type motions. The model also produces correct trend for a 70-degree delta wing in harmonic motion with different mean angles-of-attack. However, the current model cannot be used to extrapolate data to higher angles-of-attack than that of the harmonic motions which form the aerodynamic model. For linear ramp motions, a special method is used to calculate the corresponding frequency and phase angle at a given time. The calculated results from modeling show a higher lift peak for linear ramp motion than for harmonic ramp motion. The current model also shows reasonably good results for the lift responses at different angles of attack.
NASA Technical Reports Server (NTRS)
Iliff, Kenneth W.; Wang, Kon-Sheng Charles Wang
1996-01-01
The lateral-directional stability and control derivatives of the X-29A number 2 are extracted from flight data over an angle-of-attack range of 4 degrees to 53 degrees using a parameter identification algorithm. The algorithm uses the linearized aircraft equations of motion and a maximum likelihood estimator in the presence of state and measurement noise. State noise is used to model the uncommanded forcing function caused by unsteady aerodynamics over the aircraft at angles of attack above 15 degrees. The results supported the flight-envelope-expansion phase of the X-29A number 2 by helping to update the aerodynamic mathematical model, to improve the real-time simulator, and to revise flight control system laws. Effects of the aircraft high gain flight control system on maneuver quality and the estimated derivatives are also discussed. The derivatives are plotted as functions of angle of attack and compared with the predicted aerodynamic database. Agreement between predicted and flight values is quite good for some derivatives such as the lateral force due to sideslip, the lateral force due to rudder deflection, and the rolling moment due to roll rate. The results also show significant differences in several important derivatives such as the rolling moment due to sideslip, the yawing moment due to sideslip, the yawing moment due to aileron deflection, and the yawing moment due to rudder deflection.
Flight Dynamics of an Aeroshell Using an Attached Inflatable Aerodynamic Decelerator
NASA Technical Reports Server (NTRS)
Cruz, Juan R.; Schoenenberger, Mark; Axdahl, Erik; Wilhite, Alan
2009-01-01
An aeroelastic analysis of the behavior of an entry vehicle utilizing an attached inflatable aerodynamic decelerator during supersonic flight is presented. The analysis consists of a planar, four degree of freedom simulation. The aeroshell and the IAD are assumed to be separate, rigid bodies connected with a spring-damper at an interface point constraining the relative motion of the two bodies. Aerodynamic forces and moments are modeled using modified Newtonian aerodynamics. The analysis includes the contribution of static aerodynamic forces and moments as well as pitch damping. Two cases are considered in the analysis: constant velocity flight and planar free flight. For the constant velocity and free flight cases with neutral pitch damping, configurations with highly-stiff interfaces exhibit statically stable but dynamically unstable aeroshell angle of attack. Moderately stiff interfaces exhibit static and dynamic stability of aeroshell angle of attack due to damping induced by the pitch angle rate lag between the aeroshell and IAD. For the free-flight case, low values of both the interface stiffness and damping cause divergence of the aeroshell angle of attack due to the offset of the IAD drag force with respect to the aeroshell center of mass. The presence of dynamic aerodynamic moments was found to influence the stability characteristics of the vehicle. The effect of gravity on the aeroshell angle of attack stability characteristics was determined to be negligible for the cases investigated.
Cavitation on Hydrofoils with Leading Edge Protuberances
NASA Astrophysics Data System (ADS)
Custodio, Derrick; Henoch, Charles; Johari, Hamid; Office of Naval Research Collaboration
2012-11-01
The effects of spanwise-uniform sinusoidal leading edge protuberances on the flow characteristics and forces of finite-span hydrofoils under vaporous cavitation conditions were examined experimentally over angles of attack ranging from -9° α <= 27°. Two planforms were studied, rectangular and swept, at a Reynolds number of ~ 720,000. Two protuberance wavelengths, λ = 0.25 c and 0.50 c, and three amplitudes, A = 0.025 c, 0.05 c, and 0.12 c, were examined as they resemble the humpback whale flipper morphology. All hydrofoils retain a mean NACA 634-021 profile. The forces and moments were measured at a freestream velocity of 7.2 m/s, and high-speed digital photography was used to capture flow field images at several angles of attack. The cavitation number corresponding to incipient leading edge cavitation was also calculated. As far as forces and cavitation number are concerned, results show that the baseline hydrofoil tends to have nearly equal or improved performance over the modified hydrofoils at most angles of attack tested. Flow images reveal that it is possible that the extent of sheet and tip vortex cavitation can be reduced with the introduction of leading edge protuberances. The forces and cavitation characteristics will be presented. Sponsored by the ONR-ULI program.
Van Truong, Tien; Byun, Doyoung; Kim, Min Jun; Yoon, Kwang Joon; Park, Hoon Cheol
2013-09-01
The aim of this work is to provide an insight into the aerodynamic performance of the beetle during takeoff, which has been estimated in previous investigations. We employed a scaled-up electromechanical model flapping wing to measure the aerodynamic forces and the three-dimensional flow structures on the flapping wing. The ground effect on the unsteady forces and flow structures were also characterized. The dynamically scaled wing model could replicate the general stroke pattern of the beetle's hind wing kinematics during takeoff flight. Two wing kinematic models have been studied to examine the influences of wing kinematics on unsteady aerodynamic forces. In the first model, the angle of attack is asymmetric and varies during the translational motion, which is the flapping motion of the beetle's hind wing. In the second model, the angle of attack is constant during the translational motion. The instantaneous aerodynamic forces were measured for four strokes during the beetle's takeoff by the force sensor attached at the wing base. Flow visualization provided a general picture of the evolution of the three-dimensional leading edge vortex (LEV) on the beetle hind wing model. The LEV is stable during each stroke, and increases radically from the root to the tip, forming a leading-edge spiral vortex. The force measurement results show that the vertical force generated by the hind wing is large enough to lift the beetle. For the beetle hind wing kinematics, the total vertical force production increases 18.4% and 8.6% for the first and second strokes, respectively, due to the ground effect. However, for the model with a constant angle of attack during translation, the vertical force is reduced during the first stroke. During the third and fourth strokes, the ground effect is negligible for both wing kinematic patterns. This finding suggests that the beetle's flapping mechanism induces a ground effect that can efficiently lift its body from the ground during takeoff.
NASA Astrophysics Data System (ADS)
Coelho, Flavio Codeço; Carvalho, Luiz Max De
2015-12-01
Quantifying the attack ratio of disease is key to epidemiological inference and public health planning. For multi-serotype pathogens, however, different levels of serotype-specific immunity make it difficult to assess the population at risk. In this paper we propose a Bayesian method for estimation of the attack ratio of an epidemic and the initial fraction of susceptibles using aggregated incidence data. We derive the probability distribution of the effective reproductive number, Rt, and use MCMC to obtain posterior distributions of the parameters of a single-strain SIR transmission model with time-varying force of infection. Our method is showcased in a data set consisting of 18 years of dengue incidence in the city of Rio de Janeiro, Brazil. We demonstrate that it is possible to learn about the initial fraction of susceptibles and the attack ratio even in the absence of serotype specific data. On the other hand, the information provided by this approach is limited, stressing the need for detailed serological surveys to characterise the distribution of serotype-specific immunity in the population.
NASA Technical Reports Server (NTRS)
Perkins, Edward W; Jorgensen, Leland H
1956-01-01
Effects of Reynolds number and angle of attack on the pressure distribution and normal-force characteristics of a body of revolution consisting of a fineness ratio 3 ogival nose tangent to a cylindrical afterbody 7 diameters long have been determined. The test Mach number was 1.98 and the angle-of-attack range from 0 degree to 20 degrees. The Reynolds numbers, based on body diameter, were 0.15 x 10(6) and 0.45 x 10(6). The experimental results are compared with theory.
Effects of Mach Numbers on Side Force, Yawing Moment and Surface Pressure
NASA Astrophysics Data System (ADS)
Sohail, Muhammad Amjad; Muhammad, Zaka; Husain, Mukkarum; Younis, Muhammad Yamin
2011-09-01
In this research, CFD simulations are performed for air vehicle configuration to compute the side force effect and yawing moment coefficients variations at high angle of attack and Mach numbers. As the angle of attack is increased then lift and drag are increased for cylinder body configurations. But when roll angle is given to body then side force component is also appeared on the body which causes lateral forces on the body and yawing moment is also produced. Now due to advancement of CFD methods we are able to calculate these forces and moment even at supersonic and hypersonic speed. In this study modern CFD techniques are used to simulate the hypersonic flow to calculate the side force effects and yawing moment coefficient. Static pressure variations along the circumferential and along the length of the body are also calculated. The pressure coefficient and center of pressure may be accurately predicted and calculated. When roll angle and yaw angle is given to body then these forces becomes very high and cause the instability of the missile body with fin configurations. So it is very demanding and serious problem to accurately predict and simulate these forces for the stability of supersonic vehicles.
Instances of Use of United States Armed Forces Abroad, 1798-2010
2011-03-10
marines and sailors) to discourage piracy and the slave trade along the Ivory coast, and to punish attacks by the natives on American seamen and...Naval forces sought to stop seal poaching . 1891 Chile. August 28 to 30. U.S. forces protected the American consulate and the women and children who
A War Too Long: The USAF in Southeast Asia, 1961-1975
1996-01-01
thwarted a military coup in 1960 and siurvived a 1962 bombing attack on the presidential palace by dissident members of his air force, insisted on a de...196!3. Buckingham , William A., Jr. Operation Ranch Hand: The Air Force and Herbicides in Southeast Asia, 1961-1971. Washington: Air Force History
NASA Technical Reports Server (NTRS)
Knight, Montgomery; Wenzinger, Carl J
1930-01-01
This investigation covers force tests through a large range of angle of attack on a series of monoplane and biplane wing models. The tests were conducted in the atmospheric wind tunnel of the National Advisory Committee for Aeronautics. The models were arranged in such a manner as to make possible a determination of the effects of variations in tip shape, aspect ratio, flap setting, stagger, gap, decalage, sweep back, and airfoil profile. The arrangements represented most of the types of wing systems in use on modern airplanes. The effect of each variable is illustrated by means of groups of curves. In addition, there are included approximate autorotational characteristics in the form of calculated ranges of "rotary instability." a correction for blocking in this tunnel which applies to monoplanes at large angles of attack has been developed, and is given in an appendix. (author)
Crystal nucleation and metastable bcc phase in charged colloids: A molecular dynamics study
NASA Astrophysics Data System (ADS)
Ji, Xinqiang; Sun, Zhiwei; Ouyang, Wenze; Xu, Shenghua
2018-05-01
The dynamic process of homogenous nucleation in charged colloids is investigated by brute-force molecular dynamics simulation. To check if the liquid-solid transition will pass through metastable bcc, simulations are performed at the state points that definitely lie in the phase region of thermodynamically stable fcc. The simulation results confirm that, in all of these cases, the preordered precursors, acting as the seeds of nucleation, always have predominant bcc symmetry consistent with Ostwald's step rule and the Alexander-McTague mechanism. However, the polymorph selection is not straightforward because the crystal structures formed are not often determined by the symmetry of intermediate precursors but have different characters under different state points. The region of the state point where bcc crystal structures of large enough size are formed during crystallization is narrow, which gives a reasonable explanation as to why the metastable bcc phase in charged colloidal suspensions is rarely detected in macroscopic experiments.
NASA Astrophysics Data System (ADS)
Bass, Gideon; Tomlin, Casey; Kumar, Vaibhaw; Rihaczek, Pete; Dulny, Joseph, III
2018-04-01
NP-hard optimization problems scale very rapidly with problem size, becoming unsolvable with brute force methods, even with supercomputing resources. Typically, such problems have been approximated with heuristics. However, these methods still take a long time and are not guaranteed to find an optimal solution. Quantum computing offers the possibility of producing significant speed-up and improved solution quality. Current quantum annealing (QA) devices are designed to solve difficult optimization problems, but they are limited by hardware size and qubit connectivity restrictions. We present a novel heterogeneous computing stack that combines QA and classical machine learning, allowing the use of QA on problems larger than the hardware limits of the quantum device. These results represent experiments on a real-world problem represented by the weighted k-clique problem. Through this experiment, we provide insight into the state of quantum machine learning.
Ab Initio Effective Rovibrational Hamiltonians for Non-Rigid Molecules via Curvilinear VMP2
NASA Astrophysics Data System (ADS)
Changala, Bryan; Baraban, Joshua H.
2017-06-01
Accurate predictions of spectroscopic constants for non-rigid molecules are particularly challenging for ab initio theory. For all but the smallest systems, ``brute force'' diagonalization of the full rovibrational Hamiltonian is computationally prohibitive, leaving us at the mercy of perturbative approaches. However, standard perturbative techniques, such as second order vibrational perturbation theory (VPT2), are based on the approximation that a molecule makes small amplitude vibrations about a well defined equilibrium structure. Such assumptions are physically inappropriate for non-rigid systems. In this talk, we will describe extensions to curvilinear vibrational Møller-Plesset perturbation theory (VMP2) that account for rotational and rovibrational effects in the molecular Hamiltonian. Through several examples, we will show that this approach provides predictions to nearly microwave accuracy of molecular constants including rotational and centrifugal distortion parameters, Coriolis coupling constants, and anharmonic vibrational and tunneling frequencies.
NASA Astrophysics Data System (ADS)
Zhou, Xingyu; Zhuge, Qunbi; Qiu, Meng; Xiang, Meng; Zhang, Fangyuan; Wu, Baojian; Qiu, Kun; Plant, David V.
2018-02-01
We investigate the capacity improvement achieved by bandwidth variable transceivers (BVT) in meshed optical networks with cascaded ROADM filtering at fixed channel spacing, and then propose an artificial neural network (ANN)-aided provisioning scheme to select optimal symbol rate and modulation format for the BVTs in this scenario. Compared with a fixed symbol rate transceiver with standard QAMs, it is shown by both experiments and simulations that BVTs can increase the average capacity by more than 17%. The ANN-aided BVT provisioning method uses parameters monitored from a coherent receiver and then employs a trained ANN to transform these parameters into the desired configuration. It is verified by simulation that the BVT with the proposed provisioning method can approach the upper limit of the system capacity obtained by brute-force search under various degrees of flexibilities.
Chemical reaction mechanisms in solution from brute force computational Arrhenius plots.
Kazemi, Masoud; Åqvist, Johan
2015-06-01
Decomposition of activation free energies of chemical reactions, into enthalpic and entropic components, can provide invaluable signatures of mechanistic pathways both in solution and in enzymes. Owing to the large number of degrees of freedom involved in such condensed-phase reactions, the extensive configurational sampling needed for reliable entropy estimates is still beyond the scope of quantum chemical calculations. Here we show, for the hydrolytic deamination of cytidine and dihydrocytidine in water, how direct computer simulations of the temperature dependence of free energy profiles can be used to extract very accurate thermodynamic activation parameters. The simulations are based on empirical valence bond models, and we demonstrate that the energetics obtained is insensitive to whether these are calibrated by quantum mechanical calculations or experimental data. The thermodynamic activation parameters are in remarkable agreement with experiment results and allow discrimination among alternative mechanisms, as well as rationalization of their different activation enthalpies and entropies.
Chemical reaction mechanisms in solution from brute force computational Arrhenius plots
Kazemi, Masoud; Åqvist, Johan
2015-01-01
Decomposition of activation free energies of chemical reactions, into enthalpic and entropic components, can provide invaluable signatures of mechanistic pathways both in solution and in enzymes. Owing to the large number of degrees of freedom involved in such condensed-phase reactions, the extensive configurational sampling needed for reliable entropy estimates is still beyond the scope of quantum chemical calculations. Here we show, for the hydrolytic deamination of cytidine and dihydrocytidine in water, how direct computer simulations of the temperature dependence of free energy profiles can be used to extract very accurate thermodynamic activation parameters. The simulations are based on empirical valence bond models, and we demonstrate that the energetics obtained is insensitive to whether these are calibrated by quantum mechanical calculations or experimental data. The thermodynamic activation parameters are in remarkable agreement with experiment results and allow discrimination among alternative mechanisms, as well as rationalization of their different activation enthalpies and entropies. PMID:26028237
Unsteady flow sensing and optimal sensor placement using machine learning
NASA Astrophysics Data System (ADS)
Semaan, Richard
2016-11-01
Machine learning is used to estimate the flow state and to determine the optimal sensor placement over a two-dimensional (2D) airfoil equipped with a Coanda actuator. The analysis is based on flow field data obtained from 2D unsteady Reynolds averaged Navier-Stokes (uRANS) simulations with different jet blowing intensities and actuation frequencies, characterizing different flow separation states. This study shows how the "random forests" algorithm is utilized beyond its typical usage in fluid mechanics estimating the flow state to determine the optimal sensor placement. The results are compared against the current de-facto standard of maximum modal amplitude location and against a brute force approach that scans all possible sensor combinations. The results show that it is possible to simultaneously infer the state of flow and to determine the optimal sensor location without the need to perform proper orthogonal decomposition. Collaborative Research Center (CRC) 880, DFG.
Tag SNP selection via a genetic algorithm.
Mahdevar, Ghasem; Zahiri, Javad; Sadeghi, Mehdi; Nowzari-Dalini, Abbas; Ahrabian, Hayedeh
2010-10-01
Single Nucleotide Polymorphisms (SNPs) provide valuable information on human evolutionary history and may lead us to identify genetic variants responsible for human complex diseases. Unfortunately, molecular haplotyping methods are costly, laborious, and time consuming; therefore, algorithms for constructing full haplotype patterns from small available data through computational methods, Tag SNP selection problem, are convenient and attractive. This problem is proved to be an NP-hard problem, so heuristic methods may be useful. In this paper we present a heuristic method based on genetic algorithm to find reasonable solution within acceptable time. The algorithm was tested on a variety of simulated and experimental data. In comparison with the exact algorithm, based on brute force approach, results show that our method can obtain optimal solutions in almost all cases and runs much faster than exact algorithm when the number of SNP sites is large. Our software is available upon request to the corresponding author.
Decision and function problems based on boson sampling
NASA Astrophysics Data System (ADS)
Nikolopoulos, Georgios M.; Brougham, Thomas
2016-07-01
Boson sampling is a mathematical problem that is strongly believed to be intractable for classical computers, whereas passive linear interferometers can produce samples efficiently. So far, the problem remains a computational curiosity, and the possible usefulness of boson-sampling devices is mainly limited to the proof of quantum supremacy. The purpose of this work is to investigate whether boson sampling can be used as a resource of decision and function problems that are computationally hard, and may thus have cryptographic applications. After the definition of a rather general theoretical framework for the design of such problems, we discuss their solution by means of a brute-force numerical approach, as well as by means of nonboson samplers. Moreover, we estimate the sample sizes required for their solution by passive linear interferometers, and it is shown that they are independent of the size of the Hilbert space.
An investigation of school violence through Turkish children's drawings.
Yurtal, Filiz; Artut, Kazim
2010-01-01
This study investigates Turkish children's perception of violence in school as represented through drawings and narratives. In all, 66 students (12 to 13 years old) from the middle socioeconomic class participated. To elicit children's perception of violence, they were asked to draw a picture of a violent incident they had heard, experienced, or witnessed. Children mostly drew pictures of violent events among children (33 pictures). Also, there were pictures of violent incidents perpetrated by teachers and directors against children. It was observed that violence influenced children. Violence was mostly depicted in school gardens (38 pictures), but there were violent incidents everywhere, such as in classrooms, corridors, and school stores as well. Moreover, it was found that brute force was the most referred way of violence in the children's depictions (38 pictures). In conclusion, children clearly indicated that there was violence in schools and they were affected by it.
Advances in atmospheric light scattering theory and remote-sensing techniques
NASA Astrophysics Data System (ADS)
Videen, Gorden; Sun, Wenbo; Gong, Wei
2017-02-01
This issue focuses especially on characterizing particles in the Earth-atmosphere system. The significant role of aerosol particles in this system was recognized in the mid-1970s [1]. Since that time, our appreciation for the role they play has only increased. It has been and continues to be one of the greatest unknown factors in the Earth-atmosphere system as evidenced by the most recent Intergovernmental Panel on Climate Change (IPCC) assessments [2]. With increased computational capabilities, in terms of both advanced algorithms and in brute-force computational power, more researchers have the tools available to address different aspects of the role of aerosols in the atmosphere. In this issue, we focus on recent advances in this topical area, especially the role of light scattering and remote sensing. This issue follows on the heels of four previous topical issues on this subject matter that have graced the pages of this journal [3-6].
Competitive code-based fast palmprint identification using a set of cover trees
NASA Astrophysics Data System (ADS)
Yue, Feng; Zuo, Wangmeng; Zhang, David; Wang, Kuanquan
2009-06-01
A palmprint identification system recognizes a query palmprint image by searching for its nearest neighbor from among all the templates in a database. When applied on a large-scale identification system, it is often necessary to speed up the nearest-neighbor searching process. We use competitive code, which has very fast feature extraction and matching speed, for palmprint identification. To speed up the identification process, we extend the cover tree method and propose to use a set of cover trees to facilitate the fast and accurate nearest-neighbor searching. We can use the cover tree method because, as we show, the angular distance used in competitive code can be decomposed into a set of metrics. Using the Hong Kong PolyU palmprint database (version 2) and a large-scale palmprint database, our experimental results show that the proposed method searches for nearest neighbors faster than brute force searching.
Aspects of warped AdS3/CFT2 correspondence
NASA Astrophysics Data System (ADS)
Chen, Bin; Zhang, Jia-Ju; Zhang, Jian-Dong; Zhong, De-Liang
2013-04-01
In this paper we apply the thermodynamics method to investigate the holographic pictures for the BTZ black hole, the spacelike and the null warped black holes in three-dimensional topologically massive gravity (TMG) and new massive gravity (NMG). Even though there are higher derivative terms in these theories, the thermodynamics method is still effective. It gives consistent results with the ones obtained by using asymptotical symmetry group (ASG) analysis. In doing the ASG analysis we develop a brute-force realization of the Barnich-Brandt-Compere formalism with Mathematica code, which also allows us to calculate the masses and the angular momenta of the black holes. In particular, we propose the warped AdS3/CFT2 correspondence in the new massive gravity, which states that quantum gravity in the warped spacetime could holographically dual to a two-dimensional CFT with {c_R}={c_L}=24 /{Gm{β^2√{{2( {21-4{β^2}} )}}}}.
Brute-force mapmaking with compact interferometers: a MITEoR northern sky map from 128 to 175 MHz
NASA Astrophysics Data System (ADS)
Zheng, H.; Tegmark, M.; Dillon, J. S.; Liu, A.; Neben, A. R.; Tribiano, S. M.; Bradley, R. F.; Buza, V.; Ewall-Wice, A.; Gharibyan, H.; Hickish, J.; Kunz, E.; Losh, J.; Lutomirski, A.; Morgan, E.; Narayanan, S.; Perko, A.; Rosner, D.; Sanchez, N.; Schutz, K.; Valdez, M.; Villasenor, J.; Yang, H.; Zarb Adami, K.; Zelko, I.; Zheng, K.
2017-03-01
We present a new method for interferometric imaging that is ideal for the large fields of view and compact arrays common in 21 cm cosmology. We first demonstrate the method with the simulations for two very different low-frequency interferometers, the Murchison Widefield Array and the MIT Epoch of Reionization (MITEoR) experiment. We then apply the method to the MITEoR data set collected in 2013 July to obtain the first northern sky map from 128 to 175 MHz at ∼2° resolution and find an overall spectral index of -2.73 ± 0.11. The success of this imaging method bodes well for upcoming compact redundant low-frequency arrays such as Hydrogen Epoch of Reionization Array. Both the MITEoR interferometric data and the 150 MHz sky map are available at http://space.mit.edu/home/tegmark/omniscope.html.
Gaussian mass optimization for kernel PCA parameters
NASA Astrophysics Data System (ADS)
Liu, Yong; Wang, Zulin
2011-10-01
This paper proposes a novel kernel parameter optimization method based on Gaussian mass, which aims to overcome the current brute force parameter optimization method in a heuristic way. Generally speaking, the choice of kernel parameter should be tightly related to the target objects while the variance between the samples, the most commonly used kernel parameter, doesn't possess much features of the target, which gives birth to Gaussian mass. Gaussian mass defined in this paper has the property of the invariance of rotation and translation and is capable of depicting the edge, topology and shape information. Simulation results show that Gaussian mass leads a promising heuristic optimization boost up for kernel method. In MNIST handwriting database, the recognition rate improves by 1.6% compared with common kernel method without Gaussian mass optimization. Several promising other directions which Gaussian mass might help are also proposed at the end of the paper.
Selection of optimal sensors for predicting performance of polymer electrolyte membrane fuel cell
NASA Astrophysics Data System (ADS)
Mao, Lei; Jackson, Lisa
2016-10-01
In this paper, sensor selection algorithms are investigated based on a sensitivity analysis, and the capability of optimal sensors in predicting PEM fuel cell performance is also studied using test data. The fuel cell model is developed for generating the sensitivity matrix relating sensor measurements and fuel cell health parameters. From the sensitivity matrix, two sensor selection approaches, including the largest gap method, and exhaustive brute force searching technique, are applied to find the optimal sensors providing reliable predictions. Based on the results, a sensor selection approach considering both sensor sensitivity and noise resistance is proposed to find the optimal sensor set with minimum size. Furthermore, the performance of the optimal sensor set is studied to predict fuel cell performance using test data from a PEM fuel cell system. Results demonstrate that with optimal sensors, the performance of PEM fuel cell can be predicted with good quality.
Neural-network quantum state tomography
NASA Astrophysics Data System (ADS)
Torlai, Giacomo; Mazzola, Guglielmo; Carrasquilla, Juan; Troyer, Matthias; Melko, Roger; Carleo, Giuseppe
2018-05-01
The experimental realization of increasingly complex synthetic quantum systems calls for the development of general theoretical methods to validate and fully exploit quantum resources. Quantum state tomography (QST) aims to reconstruct the full quantum state from simple measurements, and therefore provides a key tool to obtain reliable analytics1-3. However, exact brute-force approaches to QST place a high demand on computational resources, making them unfeasible for anything except small systems4,5. Here we show how machine learning techniques can be used to perform QST of highly entangled states with more than a hundred qubits, to a high degree of accuracy. We demonstrate that machine learning allows one to reconstruct traditionally challenging many-body quantities—such as the entanglement entropy—from simple, experimentally accessible measurements. This approach can benefit existing and future generations of devices ranging from quantum computers to ultracold-atom quantum simulators6-8.
NASA Astrophysics Data System (ADS)
Uilhoorn, F. E.
2016-10-01
In this article, the stochastic modelling approach proposed by Box and Jenkins is treated as a mixed-integer nonlinear programming (MINLP) problem solved with a mesh adaptive direct search and a real-coded genetic class of algorithms. The aim is to estimate the real-valued parameters and non-negative integer, correlated structure of stationary autoregressive moving average (ARMA) processes. The maximum likelihood function of the stationary ARMA process is embedded in Akaike's information criterion and the Bayesian information criterion, whereas the estimation procedure is based on Kalman filter recursions. The constraints imposed on the objective function enforce stability and invertibility. The best ARMA model is regarded as the global minimum of the non-convex MINLP problem. The robustness and computational performance of the MINLP solvers are compared with brute-force enumeration. Numerical experiments are done for existing time series and one new data set.
A linear-RBF multikernel SVM to classify big text corpora.
Romero, R; Iglesias, E L; Borrajo, L
2015-01-01
Support vector machine (SVM) is a powerful technique for classification. However, SVM is not suitable for classification of large datasets or text corpora, because the training complexity of SVMs is highly dependent on the input size. Recent developments in the literature on the SVM and other kernel methods emphasize the need to consider multiple kernels or parameterizations of kernels because they provide greater flexibility. This paper shows a multikernel SVM to manage highly dimensional data, providing an automatic parameterization with low computational cost and improving results against SVMs parameterized under a brute-force search. The model consists in spreading the dataset into cohesive term slices (clusters) to construct a defined structure (multikernel). The new approach is tested on different text corpora. Experimental results show that the new classifier has good accuracy compared with the classic SVM, while the training is significantly faster than several other SVM classifiers.
High-order noise filtering in nontrivial quantum logic gates.
Green, Todd; Uys, Hermann; Biercuk, Michael J
2012-07-13
Treating the effects of a time-dependent classical dephasing environment during quantum logic operations poses a theoretical challenge, as the application of noncommuting control operations gives rise to both dephasing and depolarization errors that must be accounted for in order to understand total average error rates. We develop a treatment based on effective Hamiltonian theory that allows us to efficiently model the effect of classical noise on nontrivial single-bit quantum logic operations composed of arbitrary control sequences. We present a general method to calculate the ensemble-averaged entanglement fidelity to arbitrary order in terms of noise filter functions, and provide explicit expressions to fourth order in the noise strength. In the weak noise limit we derive explicit filter functions for a broad class of piecewise-constant control sequences, and use them to study the performance of dynamically corrected gates, yielding good agreement with brute-force numerics.
Zhou, Y.; Ojeda-May, P.; Nagaraju, M.; Pu, J.
2016-01-01
Adenosine triphosphate (ATP)-binding cassette (ABC) transporters are ubiquitous ATP-dependent membrane proteins involved in translocations of a wide variety of substrates across cellular membranes. To understand the chemomechanical coupling mechanism as well as functional asymmetry in these systems, a quantitative description of how ABC transporters hydrolyze ATP is needed. Complementary to experimental approaches, computer simulations based on combined quantum mechanical and molecular mechanical (QM/MM) potentials have provided new insights into the catalytic mechanism in ABC transporters. Quantitatively reliable determination of the free energy requirement for enzymatic ATP hydrolysis, however, requires substantial statistical sampling on QM/MM potential. A case study shows that brute force sampling of ab initio QM/MM (AI/MM) potential energy surfaces is computationally impractical for enzyme simulations of ABC transporters. On the other hand, existing semiempirical QM/MM (SE/MM) methods, although affordable for free energy sampling, are unreliable for studying ATP hydrolysis. To close this gap, a multiscale QM/MM approach named reaction path–force matching (RP–FM) has been developed. In RP–FM, specific reaction parameters for a selected SE method are optimized against AI reference data along reaction paths by employing the force matching technique. The feasibility of the method is demonstrated for a proton transfer reaction in the gas phase and in solution. The RP–FM method may offer a general tool for simulating complex enzyme systems such as ABC transporters. PMID:27498639
NASA Technical Reports Server (NTRS)
Jorgensen, L. H.; Nelson, E. R.
1975-01-01
An experimental investigation was conducted to measure the static aerodynamic characteristics for two bodies of elliptic cross section and for their equivalent body of revolution. The equivalent body of revolution had the same length and axial distribution of cross-sectional area as the elliptic bodies. It consisted of a tangent ogive nose of fineness ratio 3 followed by a cylinder with a fineness ratio of 7. All bodies were tested at Mach numbers of 0.6, 0.9, 1.2, 1.5, and 2.0 at angles of attack from 0 deg to 58 deg. The data demonstrate that the aerodynamic characteristics can be significantly altered by changing the body cross section from circular to elliptic and by rolling the body from 0 deg to 90 deg. For example, the first elliptic body (with a constant cross-sectional axis ratio of 2) developed at zero roll about twice the normal force developed by the equivalent body of revolution. At some angles of attack greater than about 25 deg, side forces and yawing moments were measured in spite of the fact that the bodies were tested at zero angle of sideslip. The side-force and yawing-moment coefficients decreased with an increase in Mach number and essentially disappeared for all the bodies at Mach numbers greater than 1.2. From the standpoint of reducing undesirable side forces at high angles of attack, it is best to have the flattest side of the nose of the elliptic bodies pitching against the stream crossflow. The effect of Reynolds number was also the least significant for both elliptic bodies when the flattest side of the nose was pitched against the stream crossflow.
Defense.gov Special Report: Remembering Sept. 11, 2001
Recruiters Recall Patriotism of Post-9/11 America WASHINGTON, Sept. 8, 2011 - Like so many Americans, Army Lessons Alive Show More» Former Air Force Surgeon Recalls Post-attack Response Responders Remember 9/11 Recalls Pentagon Post-attack Response Army Races to Honor 9/11 Casualties Chaplain Carries Tragic Memories
Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress
2011-04-12
Research Service 4 Figure 1. Virginia-Class Attack Submarine Source: U.S. Navy file photo accessed by CRS on January 11, 2011, at http...September 2001, p. 23. 42 Bryan Bender, “Navy Eyes Cutting Submarine Force,” Boston Globe, May 12, 2004, p. 1; Lolita C. Baldor, “Study Recommends
NASA Technical Reports Server (NTRS)
Guy, Lawrence D; Hadaway, William M
1955-01-01
Aerodynamic forces and moments have been obtained in the Langley 9- by 12-inch blowdown tunnel on an external store and on a 45 degree swept-back wing-body combination measured separately at Mach numbers from 0.70 to 1.96. The wing was cantilevered and had an aspect ratio of 4.0; the store was independently sting-mounted and had a Douglas Aircraft Co. (DAC) store shape. The angle of attack range was from -3 degrees to 12 degrees and the Reynolds number (based on wing mean aerodynamic chord) varied from 1.2 x10(6) to 1.7 x 10(6). Wing-body transonic forces and moments have been compared with data of a geometrically similar full-scale model tested in the Langley 16-foot and 8-foot transonic tunnels in order to aid in the evaluation of transonic-tunnel interference. The principal effect of the store, for the position tested, was that of delaying the wing-fuselage pitch-up tendency to higher angles of attack at Mach numbers from 0.70 to 0.90 in a manner similar to that of a wing chord extension. The most critical loading condition on the store was that due to side force, not only because the loads were of large magnitude but also because they were in the direction of least structural strength of the supporting pylon. These side loads were greatest at high angles of attack in the supersonic speed range. Removal of the supporting pylon (or increasing the gap between the store and wing) reduced the values of the variation of side-force coefficientwith angle of attack by about 50 percent at all test Mach numbers, indicating that important reductions in store side force may be realized by proper design or location of the necessary supporting pylon. A change of the store skew angle (nose inboard) was found to relieve the excessive store side loads throughout the Mach number range. It was also determined that the relative position of the fuselage nose to the store can appreciably affect the store side forces at supersonic speeds.
Component build-up method for engineering analysis of missiles at low-to-high angles of attack
NASA Technical Reports Server (NTRS)
Hemsch, Michael J.
1992-01-01
Methods are presented for estimating the component build-up terms, with the exception of zero-lift drag, for missile airframes in steady flow and at arbitrary angles of attack and bank. The underlying and unifying bases of all these efforts are slender-body theory and its nonlinear extensions through the equivalent angle-of-attack concept. Emphasis is placed on the forces and moments which act on each of the fins, so that control cross-coupling effects as well as longitudinal and lateral-directional effects can be determined.
Exploring Windows Domain-Level Defenses Against Authentication Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nichols, Jeff A.; Curtis, Laura
2016-01-01
We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary tomore » cause this response.« less
Parachute Aerodynamics From Video Data
NASA Technical Reports Server (NTRS)
Schoenenberger, Mark; Queen, Eric M.; Cruz, Juan R.
2005-01-01
A new data analysis technique for the identification of static and dynamic aerodynamic stability coefficients from wind tunnel test video data is presented. This new technique was applied to video data obtained during a parachute wind tunnel test program conducted in support of the Mars Exploration Rover Mission. Total angle-of-attack data obtained from video images were used to determine the static pitching moment curve of the parachute. During the original wind tunnel test program the static pitching moment curve had been determined by forcing the parachute to a specific total angle-of -attack and measuring the forces generated. It is shown with the new technique that this parachute, when free to rotate, trims at an angle-of-attack two degrees lower than was measured during the forced-angle tests. An attempt was also made to extract pitch damping information from the video data. Results suggest that the parachute is dynamically unstable at the static trim point and tends to become dynamically stable away from the trim point. These trends are in agreement with limit-cycle-like behavior observed in the video. However, the chaotic motion of the parachute produced results with large uncertainty bands.
Global Persistent Attack: A Systems Architecture, Process Modeling, and Risk Analysis Approach
2008-06-01
develop an analysis process for quantifying risk associated with the limitations presented by a fiscally constrained environment. The second step...previous independent analysis of each force structure provided information for quantifying risk associated with the given force presentations, the
Transport and imaging of brute-force 13C hyperpolarization
NASA Astrophysics Data System (ADS)
Hirsch, Matthew L.; Smith, Bryce A.; Mattingly, Mark; Goloshevsky, Artem G.; Rosay, Melanie; Kempf, James G.
2015-12-01
We demonstrate transport of hyperpolarized frozen 1-13C pyruvic acid from its site of production to a nearby facility, where a time series of 13C images was acquired from the aqueous dissolution product. Transportability is tied to the hyperpolarization (HP) method we employ, which omits radical electron species used in other approaches that would otherwise relax away the HP before reaching the imaging center. In particular, we attained 13C HP by 'brute-force', i.e., using only low temperature and high-field (e.g., T < ∼2 K and B ∼ 14 T) to pre-polarize protons to a large Boltzmann value (∼0.4% 1H polarization). After polarizing the neat, frozen sample, ejection quickly (<1 s) passed it through a low field (B < 100 G) to establish the 1H pre-polarization spin temperature on 13C via the process known as low-field thermal mixing (yielding ∼0.1% 13C polarization). By avoiding polarization agents (a.k.a. relaxation agents) that are needed to hyperpolarize by the competing method of dissolution dynamic nuclear polarization (d-DNP), the 13C relaxation time was sufficient to transport the sample for ∼10 min before finally dissolving in warm water and obtaining a 13C image of the hyperpolarized, dilute, aqueous product (∼0.01% 13C polarization, a >100-fold gain over thermal signals in the 1 T scanner). An annealing step, prior to polarizing the sample, was also key for increasing T1 ∼ 30-fold during transport. In that time, HP was maintained using only modest cryogenics and field (T ∼ 60 K and B = 1.3 T), for T1(13C) near 5 min. Much greater time and distance (with much smaller losses) may be covered using more-complete annealing and only slight improvements on transport conditions (e.g., yielding T1 ∼ 5 h at 30 K, 2 T), whereas even intercity transfer is possible (T1 > 20 h) at reasonable conditions of 6 K and 2 T. Finally, it is possible to increase the overall enhancement near d-DNP levels (i.e., 102-fold more) by polarizing below 100 mK, where nanoparticle agents are known to hasten T1 buildup by 100-fold, and to yield very little impact on T1 losses at temperatures relevant to transport.
Efficient Automated Inventories and Aggregations for Satellite Data Using OPeNDAP and THREDDS
NASA Astrophysics Data System (ADS)
Gallagher, J.; Cornillon, P. C.; Potter, N.; Jones, M.
2011-12-01
Organizing online data presents a number of challenges, among which is keeping their inventories current. It is preferable to have these descriptions built and maintained by automated systems because many online data sets are dynamic, changing as new data are added or moved and as computer resources are reallocated within an organization. Automated systems can make periodic checks and update records accordingly, tracking these conditions and providing up-to-date inventories and aggregations. In addition, automated systems can enforce a high degree of uniformity across a number of remote sites, something that is hard to achieve with inventories written by people. While building inventories for online data can be done using a brute-force algorithm to read information from each granule in the data set, that ignores some important aspects of these data sets, and discards some key opportunities for optimization. First, many data sets that consist of a large number of granules exhibit a high degree of similarity between granules, and second, the URLs that reference the individual granules typically contain metadata themselves. We present software that crawls servers for online data and builds inventories and aggregations automatically, using simple rules to organize the discrete URLs into logical groups that correspond to the data sets as a typical user would perceive. Special attention is paid to recognizing patterns in the collections of URLs and using these patterns to limit reading from the data granules themselves. To date the software has crawled over 4 million URLs that reference online data from approximately 10 data servers and has built approximately 400 inventories. When compared to brute-force techniques, the combination of targeted direct-reads from selected granules and analysis of the URLs results in improvements of several to many orders of magnitude, depending on the data set organization. We conclude the presentation with observations about the crawler and ways that the metadata sources it uses can be changed to improve its operation, including improved catalog organization at data sites and ways that the crawler can be bundled with data servers to improve efficiency. The crawler, written in Java, reads THREDDS catalogs and other metadata from OPeNDAP servers and is available from opendap.org as open-source software.
Environmental Assessment, Los Angeles AFB Parking Structure
2007-08-01
signed legislation that defined the Anti - Terrorism and Force Protection requirements for military installations. Based on these requirements, surface...11, 2001 terrorist attacks occurred. Following these attacks, Congress passed, and the President signed, legislation that defined the Anti Terrorism ...and to provide the necessary anti - terrorism security, LAAFB has initiated a project to consolidate the surface parking at the Raytheon site into a
NASA Technical Reports Server (NTRS)
Jorgensen, L. H.; Nelson, E. R.
1975-01-01
For a body of revolution with afterbody side strakes, an experimental investigation was conducted in the Ames 6- by 6-Foot Wind Tunnel to determine the effects on the aerodynamic characteristics of forebody geometry, nose strakes, body side strakes, Reynolds number, Mach number, and angle of attack. Aerodynamic force and moment characteristics were measured for the straked cylindrical afterbody (cylinder fineness ratio of 7) with tangent ogive noses of fineness ratio 2.5 to 5.0. In addition, the straked cylinder afterbody was tested with an ogive nose having a rounded tip and an ogive nose with two different nose strake arrangements. The data demonstrate that the aerodynamic characteristics for a body of revolution with side strakes can be significantly affected by changes in nose fineness ratio, nose bluntness, Reynolds number, Mach number, and, of course, angle of attack. Removing the strakes from the cylindrical aftersection greatly decreased the lift, but this removal hardly changed the maximum magnitudes of the undesirable side forces that developed at angles of attack greater than about 25 deg for subsonic Mach numbers.
Space shuttle (ATP configuration) abort staging investigation
NASA Technical Reports Server (NTRS)
Rampy, J. M.; Blackwell, K. L.; Allen, E. C., Jr.; Fossler, I.
1973-01-01
A wind tunnel test conducted in a 14-inch trisonic wind tunnel to determine the force and moment characteristics of the ATP Orbiter and modified ATP External Tank/SRB combination during abort staging conditions is discussed. Six component aerodynamic force and moment data were recorded for the orbiter and ET/SRB combination. Pitch polars were obtained for an angle of attack range from minus 10 to plus 10 degrees and orbiter incidence angles (orbiter relative to the ET/SRB combination) of 0 and 2 degrees. A limited amount of yaw data were obtained at 0 degree angle of attack and beta range from minus 10 to plus 10 degrees. In addition, orbiter pitch control effectiveness was determined at several grid points. These force and moment data were obtained for Mach numbers of 0.9, 1.2 and 2.0.
Fundamental aerodynamic characteristics of delta wings with leading-edge vortex flows
NASA Technical Reports Server (NTRS)
Wood, R. M.; Miller, D. S.
1985-01-01
An investigation of the aerodynamics of sharp leading-edge delta wings at supersonic speeds has been conducted. The supporting experimental data for this investigation were taken from published force, pressure, and flow-visualization data in which the Mach number normal to the wing leading edge is always less than 1.0. The individual upper- and lower-surface nonlinear characteristics for uncambered delta wings are determined and presented in three charts. The upper-surface data show that both the normal-force coefficient and minimum pressure coefficient increase nonlinearly with a decreasing slope with increasing angle of attack. The lower-surface normal-force coefficient was shown to be independent of Mach number and to increase nonlinearly, with an increasing slope, with increasing angle of attack. These charts are then used to define a wing-design space for sharp leading-edge delta wings.
Joint Force Quarterly. Issue 51, 4th Quarter, October 2008
2008-10-01
and Japanese forces to conduct operations in the event of a WMD attack, to include consequence management operations. Recent activities have...strategic challenges. As a supple- ment, we hosted regular professional devel- opment activities, such as Friday afternoon cinema presentations where a
Natural history and the formation of the human being: Kant on active forces.
Waldow, Anik
2016-08-01
In his 1785-review of the Ideen zur Philosophie der Geschichte der Menschheit, Kant objects to Herder's conception of nature as being imbued with active forces. This attack is usually evaluated against the background of Kant's critical project and his epistemological concern to caution against the "metaphysical excess" of attributing immanent properties to matter. In this paper I explore a slightly different reading by investigating Kant's pre-critical account of creation and generation. The aim of this is to show that Kant's struggle with the forces of matter has a long history and revolves around one central problem: that of how to distinguish between the non-purposive forces of nature and the intentional powers of the mind. Given this history, the epistemic stricture that Kant's critical project imposes on him no longer appears to be the primary reason for his attack on Herder. It merely aggravates a problem that Kant has been battling with since his earliest writings. Copyright © 2016 Elsevier Ltd. All rights reserved.
Forces and moments on a slender, cavitating body
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hailey, C.E.; Clark, E.L.; Buffington, R.J.
1988-01-01
Recently a numerical code has been developed at Sandia National Laboratories to predict the pitching moment, normal force, and axial force of a slender, supercavitating shape. The potential flow about the body and cavity is calculated using an axial distribution of source/sink elements. The cavity surface is assumed to be a constant pressure streamline, extending beyond the base of the model. Slender body approximation is used to model the crossflow for small angles of attack. A significant extension of previous work in cavitation flow is the inclusion of laminar and turbulent boundary layer solutions on the body. Predictions with thismore » code, for axial force at zero angle of attack, show good agreement with experiments. There are virtually no published data availble with which to benchmark the pitching moment and normal force predictions. An experiment was designed to measure forces and moments on a supercavitation shape. The primary reason for the test was to obtain much needed data to benchmark the hydrodynamic force and moment predictions. Since the numerical prediction is for super cavitating shapes at very small cavitation numbers, the experiment was designed to be a ventilated cavity test. This paper describes the experimental procedure used to measure the pitching moment, axial and normal forces, and base pressure on a slender body with a ventilated cavity. Limited results are presented for pitching moment and normal force. 5 refs., 7 figs.« less
Force Reconnaissance: A Key Enabler in the Marine Air Ground Task Force and Beyond
2012-03-13
round Task Force Advance Force Operations, Deep Reconnaissance, Military Free Fall (MFF), Marine Combatar t Diver ( MCD ), Joint Terminal Attack...Marine Division. These early years focused on developing the doctrine and insertion skills became legendary in the crucible of South East Asia , and...potential for regional powers to threaten critical U.S. interests. Areas of particular concern in the QDR are the Middle East and Asia .41 The United
Aerodynamic characteristics of cruciform missiles at high angles of attack
NASA Technical Reports Server (NTRS)
Lesieutre, Daniel J.; Mendenhall, Michael R.; Nazario, Susana M.; Hemsch, Michael J.
1987-01-01
An aerodynamic prediction method for missile aerodynamic performance and preliminary design has been developed to utilize a newly available systematic fin data base and an improved equivalent angle of attack methodology. The method predicts total aerodynamic loads and individual fin forces and moments for body-tail (wing-body) and canard-body-tail configurations with cruciform fin arrangements. The data base and the prediction method are valid for angles of attack up to 45 deg, arbitrary roll angles, fin deflection angles between -40 deg and 40 deg, Mach numbers between 0.6 and 4.5, and fin aspect ratios between 0.25 and 4.0. The equivalent angle of attack concept is employed to include the effects of vorticity and geometric scaling.
NASA Technical Reports Server (NTRS)
Burrows, Dale L; Newman, Ernest E
1954-01-01
An investigation at medium to high subsonic speeds has been conducted in the Langley low-turbulence pressure tunnel to determine the static stability and control characteristics and to measure the fin normal forces and moments for a model of a wingless fin-controlled missile. The data were obtained at Reynolds number of 2.1 x 10(6) based on the missile maximum diameter or 17.7 x 10(6) based on missile length; this Reynolds number was found to be large enough to avoid any large scale effects between the test and the expected flight Reynolds number. With the horizontal-fin deflection limited to a maximum of 6 degrees, longitudinally stable and trimmed flight could not be maintained beyond an angle of attack of 17 degrees for a Mach number of 0.88 and beyond 20 degrees for a Mach number of 0.50 for any center-of-gravity location without the use of some auxiliary stability or control device such as jet vanes. Mach number had no appreciable effect on the center-of-pressure positions and only a slight effect on neutral-point position. There was a shift in neutral-point position of about 1 caliber as the angle of attack was varied through the range for which the neutral point could be determined. Yawing the model to angles of sideslip up to 7 degrees had little effect on the longitudinal stability at angles of attack up to 15 degrees; however, above 15 degrees, the effect of sideslip was destabilizing. With the vertical fins at a plus-or-minus 6 degree roll deflection, the rolling moment caused by yawing the model at high angles of attack could be trimmed out up to angles of sideslip of 6.5 degrees and an angle of attack of 26 degrees for a Mach number of 0.50; this range of sideslip angles was reduced to 3 degrees at a Mach number of 0.88. The data indicated that, at lower angles of attack, the trim range extended to higher angles of sideslip. The total normal-force and hinge-moment coefficients for both horizontal fins were slightly nonlinear with both angle-of-attack and fin deflection. The effect of Mach number was to reduce the slopes of the hinge-moment coefficient with angle of attack and deflection angle. In general, the effort of increasing the sideslip angle was to reduce the values of the fin normal-force and hinge-moment coefficients.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, James J.; Cook, Kristin A.
2005-05-09
Motivation Our country faces profound challenges that must be addressed in order to ensure our continued freedom and security. As the September 11, 2001, attacks on the Pentagon and World Trade Center illustrate, threats to the United States are present within our borders. On that day, after at least 20 months of planning and preparation, nineteen terrorists hijacked four airliners at three different airports in a coordinated attack. The hijackers crashed two planes into the World Trade Center’s twin towers and one plane into the Pentagon. The fourth plane, intended to attack another U.S. landmark, crashed in a field inmore » Pennsylvania. 2973 people lost their lives as a result of this attack. As the attack unfolded, government agencies and emergency response personnel had to respond in real time to situations for which policies and procedures did not exist. They were forced to assess situations and make decisions under extreme pressure, often without having critical information that would help them save additional lives. [National Commission on Terrorist Attacks, 2004]« less
Kang, Chang-kwon; Shyy, Wei
2014-01-01
In the analysis of flexible flapping wings of insects, the aerodynamic outcome depends on the combined structural dynamics and unsteady fluid physics. Because the wing shape and hence the resulting effective angle of attack are a priori unknown, predicting aerodynamic performance is challenging. Here, we show that a coupled aerodynamics/structural dynamics model can be established for hovering, based on a linear beam equation with the Morison equation to account for both added mass and aerodynamic damping effects. Lift strongly depends on the instantaneous angle of attack, resulting from passive pitch associated with wing deformation. We show that both instantaneous wing deformation and lift can be predicted in a much simplified framework. Moreover, our analysis suggests that resulting wing kinematics can be explained by the interplay between acceleration-related and aerodynamic damping forces. Interestingly, while both forces combine to create a high angle of attack resulting in high lift around the midstroke, they offset each other for phase control at the end of the stroke. PMID:25297319
NASA Technical Reports Server (NTRS)
Weick, Fred E; Noyes, Richard W
1933-01-01
Three model wings, two with typical slotted ailerons and one with typical frise ailerons, have been tested as part of a general investigation on lateral control devices with particular reference to their effectiveness at high angles of attack, in the 7 by 10 foot wind tunnel of the National Advisory Committee for Aeronautics. Force tests, free-autorotation tests, and forced-rotation tests were made which show the effect of the various ailerons on the general performance of the wing, on the lateral controllability, and on the lateral stability, in general, rolling control at 20 degree angle of attack to plain ailerons of the same size. The adverse yawing moments obtained with the slotted and frise ailerons were, in most cases, slightly smaller than those obtained with plain ailerons of the same size and deflection. However, this improvement was small as compared to the improvement obtainable by the use of suitable differential movements with any of the ailerons, including the plain.
Department of Defense Dictionary of Military and Associated Terms
2005-08-31
A committee set up to determine the priorities of passengers and cargo . air raid reporting control ship — (*) A ship ...also damage estimation. attack cargo ship — A naval ship designed or converted to transport combat-loaded cargo in an assault landing. Capabilities as...of comparable cargo ship types. Designated as LKA. attack group — (*) A subordinate task organization of the navy forces of an amphibious
Tokyo terror and chemical arms control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keeny, S.M. Jr.
The nerve gas attack in the Tokyo subway underscores the extreme vulnerability of urban society to terrorist attacks. The best defense is improved intelligence of potential terrorists and domestic laws permitting pre-emptive action when there is probable cause. If the 1993 Chemical Weapons Convention (CWC) were in force, all 159 signatories would be required to have such laws. The author examies the threat and provides some political insights.
Magnus effects at high angles of attack and critical Reynolds numbers
NASA Technical Reports Server (NTRS)
Seginer, A.; Ringel, M.
1983-01-01
The Magnus force and moment experienced by a yawed, spinning cylinder were studied experimentally in low speed and subsonic flows at high angles of attack and critical Reynolds numbers. Flow-field visualization aided in describing a flow model that divides the Magnus phenomenon into a subcritical region, where reverse Magnus loads are experienced, and a supercritical region where these loads are not encountered. The roles of the spin rate, angle of attack, and crossflow Reynolds number in determining the boundaries of the subcritical region and the variations of the Magnus loads were studied.
NASA Technical Reports Server (NTRS)
Michal, David H.
1950-01-01
An investigation of the static and dynamic longitudinal stability characteristics of 1/3.7 scale rocket-powered model of the Bell MX-776A has been made for a Mach number range from 0.8 to 1.6. Two models were tested with all control surfaces at 0 degree deflection and centers of gravity located 1/4 and 1/2 body diameters, respectively, ahead of the equivalent design location. Both models were stable about the trim conditions but did not trim at 0 degree angle of attack because of slight constructional asymmetries. The results indicated that the variation of lift and pitching moment was not linear with angle of attack. Both lift-curve slope and pitching-moment-curve slope were of the smallest magnitude near 0 degree angle of attack. In general, an increase in angle of attack was accompanied by a rearward movement of the aerodynamic center as the rear wing moved out of the downwash from the forward surfaces. This characteristic was more pronounced in the transonic region. The dynamic stability in the form of total damping factor varied with normal-force coefficient but was greatest for both models at a Mach number of approximately 1.25. The damping factor was greater at the lower trim normal-force coefficients except at a Mach number of 1.0. At that speed the damping factor was of about the same magnitude for both models. The drag coefficient increased with trim normal-force coefficient and was largest in the transonic region.
Claassen, Cynthia A; Carmody, Thomas; Stewart, Sunita M; Bossarte, Robert M; Larkin, Gregory L; Woodward, Wayne A; Trivedi, Madhukar H
2010-05-01
The terrorist attacks in the USA on 11 September 2001 affected suicide rates in two European countries, whereas overall US rates remained stable. The effect on attack site rates, however, has not been studied. To examine post-attack suicide rates in areas surrounding the three airline crash sites. Daily mortality rates were modelled using time series techniques. Where rate change was significant, both duration and geographic scope were analysed. Around the World Trade Center, post-attack 180-day rates dropped significantly (t = 2.4, P = 0.0046), whereas comparison condition rates remained stable. No change was observed for Pentagon or Flight 93 crash sites. The differential effect by site suggests that proximity may be less important that other event characteristics. Both temporal and geographic aspects of rate fluctuation after sentinel events appear measurable and further analyses may contribute valuable knowledge about how sociological forces affect these rates.
The dangerous flat spin and the factors affecting it
NASA Technical Reports Server (NTRS)
Fuchs, Richard; Schmidt, Wilhelm
1931-01-01
This report deals first with the fundamental data required for the investigation. These are chiefly the aerodynamic forces and moments acting on an airplane in a flat spin. It is shown that these forces and moments depend principally on the angle of attack and on the rotation about the path axis, and can therefore either be measured in a wind tunnel or calculated from wind-tunnel measurements of lift, drag and moment about the leading edge of the wing of an airplane model at rest. The lift, drag and moments about the span axis are so greatly altered by the rapid rotation in a flat spin, that they can no longer be regarded as independent of rotation. No substantial change in the angles of attack and glide occurring in a flat spin is involved. The cross-wind force, as compared with the lift and drag, can be disregarded in a flat spin.
NASA Technical Reports Server (NTRS)
White, E. R.
1982-01-01
Exploratory tests have been conducted in the NASA-Langley Research Center's 12-Foot Low-Speed wind Tunnel to evaluate the application of wing-leading-edge devices on the stall-departure and spin resistance characteristics of a 1/6-scale model of a T-tail general-aviation aircraft. The model was force tested with an internal strain-gauge balance to obtain aerodynamic data on the complete configuration and with a separate wing balance to obtain aerodynamic data on the outer portion of the wing. The addition of the outboard leading-edge droop eliminated the abrupt stall of the windtip and maintained or increased the resultant-force coefficient up to about alpha = 32 degrees. This change in slope of the resultant-force coefficient curve with angle of attack has been shown to be important for eliminating autorotation and for providing spin resistance.
1989-05-01
ADORESS (City, .,n Zip Co4k) 10. SOURCE OF FUNDING NUMBERS PROGRAM ELEMENT PROJECT NO.1 TASK NO. ACCESSION NO. WORK UNIT 11. TITLE (Includ. Securily ...gaining military advantage, had insisted on reciprocal (albeit asymmetrical if necessary) force reductions. But Gorbachev, perceiving the growing need...fortifications backed up by mobile counter-attack forces--appears identical in the forward region. The existence of rapidly mobilizable second-echelon forces in
Displaced Pride: Attacking Cynicism at the United States Air Force Academy
2009-04-01
or civilian life. I for one am very cynical when it comes to our political leadership...their attempts to solve the current financial crisis...cadet shenanigans might doom your Air Force career with UCMJ action. Fear was the only motivator, unless you held on to your own intrinsic
Fiscal Year 2012 United States Air Force Agency Financial Report
2012-01-01
Air Force Research Laboratory (AFRL) and Lawrence Livermore National Laboratory (LLNL) aggressively designed and tested an advanced warhead to...Reaper procurement & RPA capabilities, Light Attack Armed Reconnaissance buys, Joint Strike Fighter, satellites). Research , Development, Test and...Military Personnel Operations, Readiness & Support Procurement Research , Development, Test & Evaluation
Morality in Modern Aerial Warfare
2000-04-01
expenditure of life, time, and physical resources (also referred to as the principle of unnecessary suffering).6 This forces the attacker to use the best...Watch: Short’s View of the Air Campaign,” Air Force Magazine, September 99, on-line, www.afa.org., 13 April, 2000. 43. Air Operations Coursebook
Executive Power in an Age of Terror
ERIC Educational Resources Information Center
Landman, James H.
2006-01-01
One week after the terrorist attacks of September 11, 2001, the Congress passed an Authorization for the Use of Military Force (The Authorization) that authorized the president--"... to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist…
Huerta, M; Urzúa, Z; Trujillo, X; González-Sánchez, R; Trujillo-Hernández, B
2010-01-01
This single-blind study compared the efficacy of oral forskolin versus inhaled beclomethasone for mild or moderately persistent adult asthma. Patients were randomly assigned to receive forskolin (one 10-mg capsule orally per day; n = 30) or beclomethasone (two 50 microg inhalations every 12 h; n = 30) for 2 months. No statistically significant improvement occurred in any lung function parameter in the forskolin-treated patients. Subjects in the beclomethasone-treated group presented a slight but statistically significant improvement in percentage forced expiratory volume in 1 s (FEV(1)), percentage forced expiratory flow in the middle (25 - 75%) expiratory phase (FEF(25 - 75%)) and percentage forced vital capacity (FVC) after 2 months of treatment, though the improvement in absolute values for FEV(1), FEF(25 - 75%), FVC and FEV(1):FVC did not reach statistical significance. There was no statistically significant difference between the forskolin and beclomethasone treatment groups for any lung function parameter at baseline or after treatment. None of the beclomethasone-treated patients had an asthma attack and one forskolin-treated patient had a mild asthma attack during the 2-month study period. More studies are needed in adult asthma patients to confirm whether forskolin may be a useful preventive treatment for mild or moderately persistent adult asthma.
Effect of Reynolds number variation on aerodynamics of a hydrogen-fueled transport concept at Mach 6
NASA Technical Reports Server (NTRS)
Penland, Jim A.; Marcum, Don C., Jr.
1987-01-01
Two separate tests have been made on the same blended wing-body hydrogen-fueled transport model at a Mach number of about 6 and a range of Reynolds number (based on theoretical body length) of 1.577 to 55.36 X 10 to the 6th power. The results of these tests, made in a conventional hypersonic blowdown tunnel and a hypersonic shock tunnel, are presented through a range of angle of attack from -1 to 8 deg, with an extended study at a constant angle of attack of 3 deg. The model boundary layer flow appeared to be predominately turbulent except for the low Reynolds number shock tunnel tests. Model wall temperatures varied considerably; the blowdown tunnel varied from about 255 F to 340 F, whereas the shock tunnel had a constant 70 F model wall temperature. The experimental normal-force coefficients were essentially independent of Reynolds number. A current theoretical computer program was used to study the effect of Reynolds number. Theoretical predictions of normal-force coefficients were good, particularly at anticipated cruise angles of attack, that is 2 to 5 deg. Axial-force coefficients were generally underestimated for the turbulent skin friction conditions, and pitching-moment coefficients could not be predicted reliably.
Aerodynamic-structural model of offwind yacht sails
NASA Astrophysics Data System (ADS)
Mairs, Christopher M.
An aerodynamic-structural model of offwind yacht sails was created that is useful in predicting sail forces. Two sails were examined experimentally and computationally at several wind angles to explore a variety of flow regimes. The accuracy of the numerical solutions was measured by comparing to experimental results. The two sails examined were a Code 0 and a reaching asymmetric spinnaker. During experiment, balance, wake, and sail shape data were recorded for both sails in various configurations. Two computational steps were used to evaluate the computational model. First, an aerodynamic flow model that includes viscosity effects was used to examine the experimental flying shapes that were recorded. Second, the aerodynamic model was combined with a nonlinear, structural, finite element analysis (FEA) model. The aerodynamic and structural models were used iteratively to predict final flying shapes of offwind sails, starting with the design shapes. The Code 0 has relatively low camber and is used at small angles of attack. It was examined experimentally and computationally at a single angle of attack in two trim configurations, a baseline and overtrimmed setting. Experimentally, the Code 0 was stable and maintained large flow attachment regions. The digitized flying shapes from experiment were examined in the aerodynamic model. Force area predictions matched experimental results well. When the aerodynamic-structural tool was employed, the predictive capability was slightly worse. The reaching asymmetric spinnaker has higher camber and operates at higher angles of attack than the Code 0. Experimentally and computationally, it was examined at two angles of attack. Like the Code 0, at each wind angle, baseline and overtrimmed settings were examined. Experimentally, sail oscillations and large flow detachment regions were encountered. The computational analysis began by examining the experimental flying shapes in the aerodynamic model. In the baseline setting, the computational force predictions were fair at both wind angles examined. Force predictions were much improved in the overtrimmed setting when the sail was highly stalled and more stable. The same trends in force prediction were seen when employing the aerodynamic-structural model. Predictions were good to fair in the baseline setting but improved in the overtrimmed configuration.
X-29 in Protective Cover Being Transported by Truck to Dryden
NASA Technical Reports Server (NTRS)
1988-01-01
In a stark juxtaposition of nature and technology, the second X-29 forward-swept-wing research aircraft is shown here passing by one of the classic, spiny Joshua trees that populate the Mojave desert while being transported by truck to NASA's Ames-Dryden Flight Research Facility (later the Dryden Flight Research Center), Edwards, California, on November 7, 1988. The aircraft, with its protective covering, traveled by ship from the manufacturer's plant on Long Island through the Panama Canal to Port Hueneme and then was trucked to Dryden. X-29 No. 2 was used in a high angle-of-attack research program which began in spring 1989. Two X-29 aircraft, featuring one of the most unusual designs in aviation history, flew at the Ames-Dryden Flight Research Facility (now the Dryden Flight Research Center, Edwards, California) from 1984 to 1992. The fighter-sized X-29 technology demonstrators explored several concepts and technologies including: the use of advanced composites in aircraft construction; variable-camber wing surfaces; a unique forward- swept wing and its thin supercritical airfoil; strakes; close-coupled canards; and a computerized fly-by-wire flight control system used to maintain control of the otherwise unstable aircraft. Research results showed that the configuration of forward-swept wings, coupled with movable canards, gave pilots excellent control response at angles of attack of up to 45 degrees. During its flight history, the X-29 aircraft flew 422 research missions and a total of 436 missions. Sixty of the research flights were part of the X-29 follow-on 'vortex control' phase. The forward-swept wing of the X-29 resulted in reverse airflow, toward the fuselage rather than away from it, as occurs on the usual aft-swept wing. Consequently, on the forward-swept wing, the ailerons remained unstalled at high angles of attack. This provided better airflow over the ailerons and prevented stalling (loss of lift) at high angles of attack. Introduction of composite materials in the 1970s opened a new field of aircraft construction. It also made possible the construction of the X-29's thin supercritical wing. State-of-the-art composites allowed aeroelastic tailoring which, in turn, allowed the wing some bending but limited twisting and eliminated structural divergence within the flight envelope (i.e. deformation of the wing or the wing breaking off in flight). Additionally, composite materials allowed the wing to be sufficiently rigid for safe flight without adding an unacceptable weight penalty. The X-29 project consisted of two phases plus the follow-on vortex-control phase. Phase 1 demonstrated that the forward sweep of the X-29 wings kept the wing tips unstalled at the moderate angles of attack flown in that phase (a maximum of 21 degrees). Phase I also demonstrated that the aeroelastic tailored wing prevented structural divergence of the wing within the flight envelope, and that the control laws and control-surface effectiveness were adequate to provide artificial stability for an otherwise unstable aircraft. Phase 1 further demonstrated that the X-29 configuration could fly safely and reliably, even in tight turns. During Phase 2 of the project, the X-29, flying at an angle of attack of up to 67 degrees, demonstrated much better control and maneuvering qualities than computational methods and simulation models had predicted . During 120 research flights in this phase, NASA, Air Force, and Grumman project pilots reported the X-29 aircraft had excellent control response to an angle of attack of 45 degrees and still had limited controllability at a 67-degree angle of attack. This controllability at high angles of attack can be attributed to the aircraft's unique forward-swept wing- canard design. The NASA/Air Force-designed high-gain flight control laws also contributed to the good flying qualities. During the Air Force-initiated vortex-control phase, the X-29 successfully demonstrated vortex flow control (VFC). This VFC was more effective than expected in generating yaw forces, especially in high angles of attack where the rudder is less effective. VFC was less effective in providing control when sideslip (wind pushing on the side of the aircraft) was present, and it did little to decrease rocking oscillation of the aircraft. The X-29 vehicle was a single-engine aircraft, 48.1 feet long with a wing span of 27.2 feet. Each aircraft was powered by a General Electric F404-GE-400 engine producing 16,000 pounds of thrust. The program was a joint effort of the Department of Defense's Defense Advanced Research Projects Agency (DARPA), the U.S. Air Force, the Ames-Dryden Flight Research Facility, the Air Force Flight Test Center, and the Grumman Corporation. The program was managed by the Air Force's Wright Laboratory, Wright Patterson Air Force Base, Ohio.
NASA Technical Reports Server (NTRS)
Weick, Fred E; Noyes, Richard W
1933-01-01
Results are given of a series of systemic tests comparing lateral control devices with particular reference to their effectiveness at high angles of attack. These tests were made with two sizes of ordinary ailerons and different sizes of spoilers on a Clark Y wing model having a narrow auxiliary airfoil fixed ahead and above the leading edge, the chords of the main and auxiliary airfoils being parallel. In addition, the auxiliary airfoil itself was given angular deflection. The purpose was to provide rolling moments for lateral control. The tests were made in a 7 by 10 foot wind tunnel. They included both force and rotation tests to show the effect of the devices on the lift and drag characteristics of the wing and on the lateral stability characteristics, as well as lateral control. They showed that none of the aileron arrangements tried would give rolling control of an assumed satisfactory value at all angles of attack up to the stall. However, they would give satisfactory values, but at the expense of abnormally high deflections and very heavy hinge moments. The most effective combination of ailerons and spoilers gave satisfactory values of rolling moment at angles of attack below the stall, and the values did not fall off as rapidly above the stall as with ailerons alone. With an arrangement of this type having the proper relative proportions and linkage, it should be possible to obtain reasonably satisfactory yawing moments and control forces. Deflecting one-half of the auxiliary airfoil downward for the purpose of control gave strong favorable yawing moments at all angles of attack, but gave very small rolling moments at the low angles of attack.
Fragility and State-Society Relations in South Sudan
2013-09-01
competition over resources (land, water, and cattle ), others arise from legacies of political competition between southern leaders during the war or...displacing more than 100,000, and stealing 100,000 head of cattle .6 The as- sault is part of a downward spiral of Lou Nuer-Murle attacks and reprisals...subjected to forced displacement, slavery, and cattle raiding by northern militias. The LRA in northern Uganda conducted regular attacks and kidnappings
Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases
2015-12-01
however, additional sensors utilizing modern technology and a self -forming, as well as self - healing , network could further diminish attacks against...Space SSDF Ship’s Self -Defense Force UAV Unmanned Aerial Vehicle UGS Unattended Ground Sensor USB Universal Serial Bus USMC United States Marine...conditions may delay their reaction resulting in the attacking surface craft entering into a critically close position. The Ship’s Self -Defense
Joint Center for Operational Analysis Quarterly Bulletin. Volume 8, Issue 3, September 2006
2006-09-01
Kuwait drove planning for Operation Desert Storm. The Dayton Peace Accord included an agreement by warring factions not to attack coalition forces as they...informants.29 Pinpointing the insurgent strongholds substantially helps the military shape its plan of attack. The government prepares the political...campaign plan . The use of informants, sting operations, and undercover internal affairs officers to name the most salient means, is effective in
Extended Deterrence and Allied Assurance: Key Concepts and Current Challenges for U.S. Policy
2013-09-01
include adversary nuclear forces and stockpiles) in the pre- satellite era required a strategy using large numbers of bombers, large numbers of...radar and sensor capabilities related to TMD, activities Canberra considered important to “bolstering 59 the [U.S.-Australia] alliance.” 146 In...external attack; with potential adversaries developing anti- satellite 90 capabilities, and conducting cyber incursions and attacks against U.S. and
Medical Surveillance Monthly Report (MSMR). Volume 15, Number 5, June 2008
2008-06-01
attacks, the severity of symptoms during attacks, the impacts on military operational performance, and health care costs. However, the management of...health status as reported on deployment health assesment forms, U.S. Armed Forces, June 2007-May 2008 (Figure 2). For example, prior to...transmitted Environmental Lyme disease Malaria Chlamydia Gonorrhea Syphilis‡ Urethritis§ Cold Heat 2007 2008 2007 2008 2007 2008 2007 2008 2007 2008 2007
ART OF THE POSSIBLE: SECURING AIR FORCE SPACE COMMAND MISSION SYSTEMS FOR THE WARFIGHTER
2016-10-23
Initiation (Adversarial)…….…17 Table 2. Assessment Scale-Likelihood of Threat Event Occurrence ( Non -Adversarial).17 Table 3. Assessment Scale...action to thwart the attacks from adversarial nation states and non -state actors alike. While there are numerous cybersecurity concerns, or non ...compliant cybersecurity controls across all weapon systems, not all non -compliant controls contribute equally to the cyber-attack surface and overall
Defend Science: The Attack on Scientific Thinking and What Must Be Done
NASA Astrophysics Data System (ADS)
Curtis, Jason
2006-03-01
``In the United States today science, as science, is under attack as never before (Defend Science, defendscience.org).'' Beyond, and underlying, the many particular attacks and outrages in different spheres and policy areas is the question of the scientific method and whether it is going to be upheld and applied, or whether -- even in the realm of science itself -- that method is going to be replaced by something antagonistically opposed to the scientific method. These attacks are increasingly coming from powerful forces, in and out of the Bush administration, with an extreme right-wing political agenda, a Biblical-literalist ideological agenda, and theocratic aspirations for society. Individual scientists may be atheists, agnostics, or may hold various religious beliefs, but if religious and theistic elements are forced into the definition of science, then the scientific process is undermined and science cannot really be practiced. We can and must develop a society wide battle, initiated by scientists, but involving ever growing masses of people to defend science and scientific thinking. Scientists from various fields must be mobilized to issue a public call to millions with this urgent message as the beginning of this effort. I will discuss the necessity, possibility, and some initial efforts toward developing this kind of societal movement in defense of science.
Defend Science: The Attack on Scientific Thinking and What Must Be Done
NASA Astrophysics Data System (ADS)
Curtis, Jason
2006-04-01
``In the United States today science, as science, is under attack as never before (Defend Science, defendscience.org).'' Beyond, and underlying, the many particular attacks and outrages in different spheres and policy areas is the question of the scientific method and whether it is going to be upheld and applied, or whether -- even in the realm of science itself -- that method is going to be replaced by something antagonistically opposed to the scientific method. These attacks are increasingly coming from powerful forces, in and out of the Bush administration, with an extreme right-wing political agenda, a Biblical-literalist ideological agenda, and theocratic aspirations for society. Individual scientists may be atheists, agnostics, or may hold various religious beliefs, but if religious and theistic elements are forced into the definition of science, then the scientific process is undermined and science cannot really be practiced. We can and must develop a society wide battle, initiated by scientists, but involving ever growing masses of people to defend science and scientific thinking. Scientists from various fields must be mobilized to issue a public call to millions with this urgent message as the beginning of this effort. I will discuss the necessity, possibility, and some initial efforts toward developing this kind of societal movement in defense of science.
X-29 Research Pilot Rogers Smith
NASA Technical Reports Server (NTRS)
1988-01-01
Rogers Smith, a NASA research pilot, is seen here at the cockpit of the X-29 forward-swept-wing technology demonstrator at NASA's Ames-Dryden Flight Research Facility (later the Dryden Flight Research Center), Edwards, California, in 1988. The X-29 explored the use of advanced composites in aircraft construction; variable camber wing surfaces; the unique forward-swept-wing and its thin supercritical airfoil; strake flaps; and a computerized fly-by-wire flight control system that overcame the aircraft's instability. Grumman Aircraft Corporation built two X-29s. They were flight tested at Dryden from 1984 to 1992 in a joint NASA, DARPA (Defense Advanced Research Projects Agency) and U.S. Air Force program. Two X-29 aircraft, featuring one of the most unusual designs in aviation history, flew at the Ames-Dryden Flight Research Facility (now the Dryden Flight Research Center, Edwards, California) from 1984 to 1992. The fighter-sized X-29 technology demonstrators explored several concepts and technologies including: the use of advanced composites in aircraft construction; variable-camber wing surfaces; a unique forward- swept wing and its thin supercritical airfoil; strakes; close-coupled canards; and a computerized fly-by-wire flight control system used to maintain control of the otherwise unstable aircraft. Research results showed that the configuration of forward-swept wings, coupled with movable canards, gave pilots excellent control response at angles of attack of up to 45 degrees. During its flight history, the X-29 aircraft flew 422 research missions and a total of 436 missions. Sixty of the research flights were part of the X-29 follow-on 'vortex control' phase. The forward-swept wing of the X-29 resulted in reverse airflow, toward the fuselage rather than away from it, as occurs on the usual aft-swept wing. Consequently, on the forward-swept wing, the ailerons remained unstalled at high angles of attack. This provided better airflow over the ailerons and prevented stalling (loss of lift) at high angles of attack. Introduction of composite materials in the 1970s opened a new field of aircraft construction. It also made possible the construction of the X-29's thin supercritical wing. State-of-the-art composites allowed aeroelastic tailoring which, in turn, allowed the wing some bending but limited twisting and eliminated structural divergence within the flight envelope (i.e. deformation of the wing or the wing breaking off in flight). Additionally, composite materials allowed the wing to be sufficiently rigid for safe flight without adding an unacceptable weight penalty. The X-29 project consisted of two phases plus the follow-on vortex-control phase. Phase 1 demonstrated that the forward sweep of the X-29 wings kept the wing tips unstalled at the moderate angles of attack flown in that phase (a maximum of 21 degrees). Phase I also demonstrated that the aeroelastic tailored wing prevented structural divergence of the wing within the flight envelope, and that the control laws and control-surface effectiveness were adequate to provide artificial stability for an otherwise unstable aircraft. Phase 1 further demonstrated that the X-29 configuration could fly safely and reliably, even in tight turns. During Phase 2 of the project, the X-29, flying at an angle of attack of up to 67 degrees, demonstrated much better control and maneuvering qualities than computational methods and simulation models had predicted . During 120 research flights in this phase, NASA, Air Force, and Grumman project pilots reported the X-29 aircraft had excellent control response to an angle of attack of 45 degrees and still had limited controllability at a 67-degree angle of attack. This controllability at high angles of attack can be attributed to the aircraft's unique forward-swept wing- canard design. The NASA/Air Force-designed high-gain flight control laws also contributed to the good flying qualities. During the Air Force-initiated vortex-control phase, the X-29 successfully demonstrated vortex flow control (VFC). This VFC was more effective than expected in generating yaw forces, especially in high angles of attack where the rudder is less effective. VFC was less effective in providing control when sideslip (wind pushing on the side of the aircraft) was present, and it did little to decrease rocking oscillation of the aircraft. The X-29 vehicle was a single-engine aircraft, 48.1 feet long with a wing span of 27.2 feet. Each aircraft was powered by a General Electric F404-GE-400 engine producing 16,000 pounds of thrust. The program was a joint effort of the Department of Defense's Defense Advanced Research Projects Agency (DARPA), the U.S. Air Force, the Ames-Dryden Flight Research Facility, the Air Force Flight Test Center, and the Grumman Corporation. The program was managed by the Air Force's Wright Laboratory, Wright Patterson Air Force Base, Ohio.
1988-01-01
by the United States Air Force under Contract F49620-86-C-0008. Further information may be obtained from the Long Range Planning and Doctrine Division...published simultaneously with this Note. The work was performed under the Project AIR FORCE project entitled "Concept Development and Project Formulation...warfare aircraft, and 130 ground attack fighters. Norway can field a total armed force of about 366,500 men under a system of universal conscription and
NASA Technical Reports Server (NTRS)
Kramer, Max
1932-01-01
Wind-tunnel tests are described, in which the angle of attack of a wing model was suddenly increased (producing the effect of a vertical gust) and the resulting forces were measured. It was found that the maximum lift coefficient increases in proportion to the rate of increase in the angle of attack. This fact is important for the determination of the gust stresses of airplanes with low wing loading. The results of the calculation of the corrective factor are given for a high-performance glider and a light sport plane of conventional type.
Large-scale wind tunnel tests of a sting-supported V/STOL fighter model at high angles of attack
NASA Technical Reports Server (NTRS)
Stoll, F.; Minter, E. A.
1981-01-01
A new sting model support has been developed for the NASA/Ames 40- by 80-Foot Wind Tunnel. This addition to the facility permits testing of relatively large models to large angles of attack or angles of yaw depending on model orientation. An initial test on the sting is described. This test used a 0.4-scale powered V/STOL model designed for testing at angles of attack to 90 deg and greater. A method for correcting wake blockage was developed and applied to the force and moment data. Samples of this data and results of surface-pressure measurements are presented.
NASA Technical Reports Server (NTRS)
Hemsch, M. J.; Nielsen, J. N.
1982-01-01
A method has been developed for estimating the nonlinear aerodynamic characteristics of missile wing and control surfaces. The method is based on the following assumption: if a fin on a body has the same normal-force coefficient as a wing alone composed of two of the same fins joined together at their root chords, then the other force and moment coefficients of the fin and the wing alone are the same including the nonlinearities. The method can be used for deflected fins at arbitrary bank angles and at high angles of attack. In the paper, a full derivation of the method is given, its accuracy demonstrated and its use in extending missile data bases is shown.
Instances of Use of United States Armed Forces Abroad, 1798-2001
2002-02-05
various parties (one of 200 marines and sailors) to discourage piracy and the slave trade along the Ivory coast, and to punish attacks by the natives...sought to protect American lives and property on Navassa Island. 1891— Bering Strait. July 2 to October 5. Naval forces sought to stop seal poaching
Instances of Use of United States Armed Forces Abroad, 1798-2007
2008-01-14
parties (one of 200 marines and sailors) to discourage piracy and the slave trade along the Ivory coast, and to punish attacks by the natives on...seal poaching . 1891 Chile. August 28 to 30. U.S. forces protected the American consulate and the women and children who had taken refuge in it
Strategy for Aircraft Maintenance in the Pacific
1988-04-01
attacks on Japanese soil were very unlikely, the view that Kadena was a "safe haven" was not widely disputed. The preponder- ance of Soviet force in East...Frank S. "Thunderbolts, Eggshells , and Tethers." Air Force Journal of Logistics, Summer 1986, 2-5. 24. Handy, Captain Gurnie H., Jr. and Captain Ronald
Afghanistan: Post-War Governance, Security, and U.S. Policy
2008-09-29
hundred Taliban captives were freed, as part of an emptying of the 1,200 inmates there); (7) the reported 40% rise in attacks (over 2007 figures) in...forces, and that the force is ethnically integrated in each unit. The naming of a Pashtun, Abdul Rahim Wardak, as Defense Minister in December 2004
Afghanistan: Post-War Governance, Security, and U.S. Policy
2008-11-26
hundred Taliban captives were freed, as part of an emptying of the 1,200 inmates there); (7) a reported 40% rise in attacks (over 2007 figures) in the...forces, and that the force is ethnically integrated in each unit. The naming of a Pashtun, Abdul Rahim Wardak, as Defense Minister in December 2004
Design and Flight Evaluation of a New Force-Based Flow Angle Probe
NASA Technical Reports Server (NTRS)
Corda, Stephen; Vachon, Michael Jacob
2006-01-01
A novel force-based flow angle probe was designed and flight tested on the NASA F-15B Research Testbed aircraft at NASA Dryden Flight Research Center. The prototype flow angle probe is a small, aerodynamic fin that has no moving parts. Forces on the prototype flow angle probe are measured with strain gages and correlated with the local flow angle. The flow angle probe may provide greater simplicity, greater robustness, and better access to flow measurements in confined areas relative to conventional moving vane-type flow angle probes. Flight test data were obtained at subsonic, transonic, and supersonic Mach numbers to a maximum of Mach 1.70. Flight conditions included takeoff, landing, straight and level flight, flight at higher aircraft angles of attack, and flight at elevated g-loadings. Flight test maneuvers included angle-of-attack and angle-of-sideslip sweeps. The flow angle probe-derived flow angles are compared with those obtained with a conventional moving vane probe. The flight tests validated the feasibility of a force-based flow angle measurement system.
NASA Technical Reports Server (NTRS)
Johnson, Joseph L.
1954-01-01
An investigation has been conducted to determine the static stability and control and damping in roll and yaw of a 0.13-scale model of the Convair XFY-1 airplane with propellers off from 0 deg to 90 deg angle of attack. The tests showed that a slightly unstable pitch-up tendency occurred simultaneously with a break in the normal-force curve in the angle-of-attack range from about 27 deg to 36 deg. The top vertical tail contributed positive values of static directional stability and effective dihedral up to an angle of attack of about 35 deg. The bottom tail contributed positive values of static directional stability but negative values of effective dihedral throughout the angle-of-attack range. Effectiveness of the control surfaces decreased to very low values at the high angles of attack, The model had positive damping in yaw and damping in roll about the body axes over the angle-of-attack range but the damping in yaw decreased to about zero at 90 deg angle of attack.
NASA Technical Reports Server (NTRS)
Stoliker, Patrick C.; Bosworth, John T.
1996-01-01
The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright-Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level 1/Level 2 performance. Lateral gross-acquisition testing results in Level 1/Level 2 ratings below 45 deg angle of attack, degrading into Level 3 as angle of attack increases. The fine-tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal-Smith, bandwidth, Smith-Geddes, and military specifications.
NASA Technical Reports Server (NTRS)
Stoliker, Patrick C.; Bosworth, John T.
1997-01-01
The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg. and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level l/Level 2 performance. Lateral gross-acquisition testing results in Level l/Level 2 ratings below 45 deg. angle of attack, degrading into Level 3 as angle of attack increases. The fine tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg. angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal Smith, bandwidth, Smith-Geddes, and military specifications.
Numerical investigation of the early flight phase in ski-jumping.
Gardan, N; Schneider, A; Polidori, G; Trenchard, H; Seigneur, J M; Beaumont, F; Fourchet, F; Taiar, R
2017-07-05
The purpose of this study is to develop a numerical methodology based on real data from wind tunnel experiments to investigate the effect of the ski jumper's posture and speed on aerodynamic forces in a wide range of angles of attack. To improve our knowledge of the aerodynamic behavior of the ski jumper and his equipment during the early flight phase of the ski jump, we applied CFD methodology to evaluate the influence of angle of attack (α=14°, 21.5°, 29°, 36.5° and 44°) and speed (u=23, 26 and 29m/s) on aerodynamic forces in the situation of stable attitude of the ski jumper's body and skis. The standard k-ω turbulence model was used to investigate both the influence of the ski jumper's posture and speed on aerodynamic performance during the early flight phase. Numerical results show that the ski jumper's speed has very little impact on the lift and drag coefficients. Conversely, the lift and drag forces acting on the ski jumper's body during the early flight phase of the jump are strongly influenced by the variations of the angle of attack. The present results suggest that the greater the ski jumper's angle of inclination, with respect to the relative flow, the greater the pressure difference between the lower and upper parts of the skier. Further studies will focus on the dependency of the parameters with both the angle of attack α and the body-ski angle β as control variables. It will be possible to test and optimize different ski jumping styles in different ski jumping hills and investigate different environmental conditions such as temperature, altitude or crosswinds. Copyright © 2017 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Nemoto, Takahiro; Alexakis, Alexandros
2018-02-01
The fluctuations of turbulence intensity in a pipe flow around the critical Reynolds number is difficult to study but important because they are related to turbulent-laminar transitions. We here propose a rare-event sampling method to study such fluctuations in order to measure the time scale of the transition efficiently. The method is composed of two parts: (i) the measurement of typical fluctuations (the bulk part of an accumulative probability function) and (ii) the measurement of rare fluctuations (the tail part of the probability function) by employing dynamics where a feedback control of the Reynolds number is implemented. We apply this method to a chaotic model of turbulent puffs proposed by Barkley and confirm that the time scale of turbulence decay increases super exponentially even for high Reynolds numbers up to Re =2500 , where getting enough statistics by brute-force calculations is difficult. The method uses a simple procedure of changing Reynolds number that can be applied even to experiments.
Diagnosing the decline in pharmaceutical R&D efficiency.
Scannell, Jack W; Blanckley, Alex; Boldon, Helen; Warrington, Brian
2012-03-01
The past 60 years have seen huge advances in many of the scientific, technological and managerial factors that should tend to raise the efficiency of commercial drug research and development (RD). Yet the number of new drugs approved per billion US dollars spent on RD has halved roughly every 9 years since 1950, falling around 80-fold in inflation-adjusted terms. There have been many proposed solutions to the problem of declining RD efficiency. However, their apparent lack of impact so far and the contrast between improving inputs and declining output in terms of the number of new drugs make it sensible to ask whether the underlying problems have been correctly diagnosed. Here, we discuss four factors that we consider to be primary causes, which we call the 'better than the Beatles' problem; the 'cautious regulator' problem; the 'throw money at it' tendency; and the 'basic research-brute force' bias. Our aim is to provoke a more systematic analysis of the causes of the decline in RD efficiency.
Mollica, Luca; Theret, Isabelle; Antoine, Mathias; Perron-Sierra, Françoise; Charton, Yves; Fourquez, Jean-Marie; Wierzbicki, Michel; Boutin, Jean A; Ferry, Gilles; Decherchi, Sergio; Bottegoni, Giovanni; Ducrot, Pierre; Cavalli, Andrea
2016-08-11
Ligand-target residence time is emerging as a key drug discovery parameter because it can reliably predict drug efficacy in vivo. Experimental approaches to binding and unbinding kinetics are nowadays available, but we still lack reliable computational tools for predicting kinetics and residence time. Most attempts have been based on brute-force molecular dynamics (MD) simulations, which are CPU-demanding and not yet particularly accurate. We recently reported a new scaled-MD-based protocol, which showed potential for residence time prediction in drug discovery. Here, we further challenged our procedure's predictive ability by applying our methodology to a series of glucokinase activators that could be useful for treating type 2 diabetes mellitus. We combined scaled MD with experimental kinetics measurements and X-ray crystallography, promptly checking the protocol's reliability by directly comparing computational predictions and experimental measures. The good agreement highlights the potential of our scaled-MD-based approach as an innovative method for computationally estimating and predicting drug residence times.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Justin Matthew
These are the slides for a graduate presentation at Mississippi State University. It covers the following: the BRL Shaped-Charge Geometry in PAGOSA, mesh refinement study, surrogate modeling using a radial basis function network (RBFN), ruling out parameters using sensitivity analysis (equation of state study), uncertainty quantification (UQ) methodology, and sensitivity analysis (SA) methodology. In summary, a mesh convergence study was used to ensure that solutions were numerically stable by comparing PDV data between simulations. A Design of Experiments (DOE) method was used to reduce the simulation space to study the effects of the Jones-Wilkins-Lee (JWL) Parameters for the Composition Bmore » main charge. Uncertainty was quantified by computing the 95% data range about the median of simulation output using a brute force Monte Carlo (MC) random sampling method. Parameter sensitivities were quantified using the Fourier Amplitude Sensitivity Test (FAST) spectral analysis method where it was determined that detonation velocity, initial density, C1, and B1 controlled jet tip velocity.« less
Artificial consciousness and the consciousness-attention dissociation.
Haladjian, Harry Haroutioun; Montemayor, Carlos
2016-10-01
Artificial Intelligence is at a turning point, with a substantial increase in projects aiming to implement sophisticated forms of human intelligence in machines. This research attempts to model specific forms of intelligence through brute-force search heuristics and also reproduce features of human perception and cognition, including emotions. Such goals have implications for artificial consciousness, with some arguing that it will be achievable once we overcome short-term engineering challenges. We believe, however, that phenomenal consciousness cannot be implemented in machines. This becomes clear when considering emotions and examining the dissociation between consciousness and attention in humans. While we may be able to program ethical behavior based on rules and machine learning, we will never be able to reproduce emotions or empathy by programming such control systems-these will be merely simulations. Arguments in favor of this claim include considerations about evolution, the neuropsychological aspects of emotions, and the dissociation between attention and consciousness found in humans. Ultimately, we are far from achieving artificial consciousness. Copyright © 2016 Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Leinhardt, Zoë M.; Richardson, Derek C.
2005-08-01
We present a new code ( companion) that identifies bound systems of particles in O(NlogN) time. Simple binaries consisting of pairs of mutually bound particles and complex hierarchies consisting of collections of mutually bound particles are identifiable with this code. In comparison, brute force binary search methods scale as O(N) while full hierarchy searches can be as expensive as O(N), making analysis highly inefficient for multiple data sets with N≳10. A simple test case is provided to illustrate the method. Timing tests demonstrating O(NlogN) scaling with the new code on real data are presented. We apply our method to data from asteroid satellite simulations [Durda et al., 2004. Icarus 167, 382-396; Erratum: Icarus 170, 242; reprinted article: Icarus 170, 243-257] and note interesting multi-particle configurations. The code is available at http://www.astro.umd.edu/zoe/companion/ and is distributed under the terms and conditions of the GNU Public License.
Verification Test of Automated Robotic Assembly of Space Truss Structures
NASA Technical Reports Server (NTRS)
Rhodes, Marvin D.; Will, Ralph W.; Quach, Cuong C.
1995-01-01
A multidisciplinary program has been conducted at the Langley Research Center to develop operational procedures for supervised autonomous assembly of truss structures suitable for large-aperture antennas. The hardware and operations required to assemble a 102-member tetrahedral truss and attach 12 hexagonal panels were developed and evaluated. A brute-force automation approach was used to develop baseline assembly hardware and software techniques. However, as the system matured and operations were proven, upgrades were incorporated and assessed against the baseline test results. These upgrades included the use of distributed microprocessors to control dedicated end-effector operations, machine vision guidance for strut installation, and the use of an expert system-based executive-control program. This paper summarizes the developmental phases of the program, the results of several assembly tests, and a series of proposed enhancements. No problems that would preclude automated in-space assembly or truss structures have been encountered. The test system was developed at a breadboard level and continued development at an enhanced level is warranted.
Development and verification testing of automation and robotics for assembly of space structures
NASA Technical Reports Server (NTRS)
Rhodes, Marvin D.; Will, Ralph W.; Quach, Cuong C.
1993-01-01
A program was initiated within the past several years to develop operational procedures for automated assembly of truss structures suitable for large-aperture antennas. The assembly operations require the use of a robotic manipulator and are based on the principle of supervised autonomy to minimize crew resources. A hardware testbed was established to support development and evaluation testing. A brute-force automation approach was used to develop the baseline assembly hardware and software techniques. As the system matured and an operation was proven, upgrades were incorprated and assessed against the baseline test results. This paper summarizes the developmental phases of the program, the results of several assembly tests, the current status, and a series of proposed developments for additional hardware and software control capability. No problems that would preclude automated in-space assembly of truss structures have been encountered. The current system was developed at a breadboard level and continued development at an enhanced level is warranted.
NASA Astrophysics Data System (ADS)
Millour, Florentin A.; Vannier, Martin; Meilland, Anthony
2012-07-01
We present here three recipes for getting better images with optical interferometers. Two of them, Low- Frequencies Filling and Brute-Force Monte Carlo were used in our participation to the Interferometry Beauty Contest this year and can be applied to classical imaging using V2 and closure phases. These two addition to image reconstruction provide a way of having more reliable images. The last recipe is similar in its principle as the self-calibration technique used in radio-interferometry. We call it also self-calibration, but it uses the wavelength-differential phase as a proxy of the object phase to build-up a full-featured complex visibility set of the observed object. This technique needs a first image-reconstruction run with an available software, using closure-phases and squared visibilities only. We used it for two scientific papers with great success. We discuss here the pros and cons of such imaging technique.
Load Balancing Strategies for Multiphase Flows on Structured Grids
NASA Astrophysics Data System (ADS)
Olshefski, Kristopher; Owkes, Mark
2017-11-01
The computation time required to perform large simulations of complex systems is currently one of the leading bottlenecks of computational research. Parallelization allows multiple processing cores to perform calculations simultaneously and reduces computational times. However, load imbalances between processors waste computing resources as processors wait for others to complete imbalanced tasks. In multiphase flows, these imbalances arise due to the additional computational effort required at the gas-liquid interface. However, many current load balancing schemes are only designed for unstructured grid applications. The purpose of this research is to develop a load balancing strategy while maintaining the simplicity of a structured grid. Several approaches are investigated including brute force oversubscription, node oversubscription through Message Passing Interface (MPI) commands, and shared memory load balancing using OpenMP. Each of these strategies are tested with a simple one-dimensional model prior to implementation into the three-dimensional NGA code. Current results show load balancing will reduce computational time by at least 30%.
Rational reduction of periodic propagators for off-period observations.
Blanton, Wyndham B; Logan, John W; Pines, Alexander
2004-02-01
Many common solid-state nuclear magnetic resonance problems take advantage of the periodicity of the underlying Hamiltonian to simplify the computation of an observation. Most of the time-domain methods used, however, require the time step between observations to be some integer or reciprocal-integer multiple of the period, thereby restricting the observation bandwidth. Calculations of off-period observations are usually reduced to brute force direct methods resulting in many demanding matrix multiplications. For large spin systems, the matrix multiplication becomes the limiting step. A simple method that can dramatically reduce the number of matrix multiplications required to calculate the time evolution when the observation time step is some rational fraction of the period of the Hamiltonian is presented. The algorithm implements two different optimization routines. One uses pattern matching and additional memory storage, while the other recursively generates the propagators via time shifting. The net result is a significant speed improvement for some types of time-domain calculations.
Computational exploration of neuron and neural network models in neurobiology.
Prinz, Astrid A
2007-01-01
The electrical activity of individual neurons and neuronal networks is shaped by the complex interplay of a large number of non-linear processes, including the voltage-dependent gating of ion channels and the activation of synaptic receptors. These complex dynamics make it difficult to understand how individual neuron or network parameters-such as the number of ion channels of a given type in a neuron's membrane or the strength of a particular synapse-influence neural system function. Systematic exploration of cellular or network model parameter spaces by computational brute force can overcome this difficulty and generate comprehensive data sets that contain information about neuron or network behavior for many different combinations of parameters. Searching such data sets for parameter combinations that produce functional neuron or network output provides insights into how narrowly different neural system parameters have to be tuned to produce a desired behavior. This chapter describes the construction and analysis of databases of neuron or neuronal network models and describes some of the advantages and downsides of such exploration methods.
Astrophysical Supercomputing with GPUs: Critical Decisions for Early Adopters
NASA Astrophysics Data System (ADS)
Fluke, Christopher J.; Barnes, David G.; Barsdell, Benjamin R.; Hassan, Amr H.
2011-01-01
General-purpose computing on graphics processing units (GPGPU) is dramatically changing the landscape of high performance computing in astronomy. In this paper, we identify and investigate several key decision areas, with a goal of simplifying the early adoption of GPGPU in astronomy. We consider the merits of OpenCL as an open standard in order to reduce risks associated with coding in a native, vendor-specific programming environment, and present a GPU programming philosophy based on using brute force solutions. We assert that effective use of new GPU-based supercomputing facilities will require a change in approach from astronomers. This will likely include improved programming training, an increased need for software development best practice through the use of profiling and related optimisation tools, and a greater reliance on third-party code libraries. As with any new technology, those willing to take the risks and make the investment of time and effort to become early adopters of GPGPU in astronomy, stand to reap great benefits.
Zerze, Gül H; Miller, Cayla M; Granata, Daniele; Mittal, Jeetain
2015-06-09
Intrinsically disordered proteins (IDPs), which are expected to be largely unstructured under physiological conditions, make up a large fraction of eukaryotic proteins. Molecular dynamics simulations have been utilized to probe structural characteristics of these proteins, which are not always easily accessible to experiments. However, exploration of the conformational space by brute force molecular dynamics simulations is often limited by short time scales. Present literature provides a number of enhanced sampling methods to explore protein conformational space in molecular simulations more efficiently. In this work, we present a comparison of two enhanced sampling methods: temperature replica exchange molecular dynamics and bias exchange metadynamics. By investigating both the free energy landscape as a function of pertinent order parameters and the per-residue secondary structures of an IDP, namely, human islet amyloid polypeptide, we found that the two methods yield similar results as expected. We also highlight the practical difference between the two methods by describing the path that we followed to obtain both sets of data.
NASA Technical Reports Server (NTRS)
Coe, P. L., Jr.; Newsom, W. A., Jr.
1974-01-01
An investigation was conducted to determine the low-speed yawing stability derivatives of a twin-jet fighter airplane model at high angles of attack. Tests were performed in a low-speed tunnel utilizing variable-curvature walls to simulate pure yawing motion. The results of the study showed that at angles of attack below the stall the yawing derivatives were essentially independent of the yawing velocity and sideslip angle. However, at angles of attack above the stall some nonlinear variations were present and the derivatives were strongly dependent upon sideslip angle. The results also showed that the rolling moment due to yawing was primarily due to the wing-fuselage combination, and that at angles of attack below the stall both the vertical and horizontal tails produced significant contributions to the damping in yaw. Additionally, the tests showed that the use of the forced-oscillation data to represent the yawing stability derivatives is questionable, at high angles of attack, due to large effects arising from the acceleration in sideslip derivatives.
East Europe Report, Political, Sociological and Military Affairs
1984-10-09
those of a probing attack. The object of this article was to call attention to the many opportunities of the Warsaw Pact ground forces to form combat... attention has been paid to middle-aged men, the group most vulnerable to health problems, their mortality rate has risen. Infant mortality, while lower than...up areas: The unit was divided into reconnaissance, attack, and security troops. The security group took up a position, a couple of reconnaissance
Bypass Ratio: The US Air Force and Light-Attack Aviation
2013-06-01
for making recommendations which optimize base activity and its impact on the environment. Local and state politics can keep a base open even if it is...for the region, and this conduct can affect global commerce. Such disruption and destabilization in turn can have large impacts on the US diplomatic... IFR ) operations, emergency procedures, low-level flight and two-ship formation flight by this stage. Once track selection occurs, the light-attack
The American Experience with Pacification in Vietnam. Volume 2: Elements of Pacification
1972-03-01
Regiment elmnts conducted coordinated mortar /ground attacks throughout Dai Loc district--recently an area of CAP concern. At the time of the attack...essentially they should be very light infantry forces equipped with automatic weapons, light mortars , grenade launchers, and rugged but light com...it lasted, a signifi- cant part of USOMI- effort was channeled toward its direct support. Piai:ers and commodities, such as fertilizer and cement
Prediction of Flows about Forebodies at High-Angle-of-Attack Dynamic Conditions
NASA Technical Reports Server (NTRS)
Fremaux, C. M.; vanDam, C. P.; Saephan, S.; DalBello, T.
2003-01-01
A Reynolds-average Navier Stokes method developed for rotorcraft type of flow problems is applied for predicting the forces and moments of forebody models at high-angle-of-attack dynamic conditions and for providing insight into the flow characteristics at these conditions. Wind-tunnel results from rotary testing on generic forebody models conducted by NASA Langley and DERA are used for comparison. This paper focuses on the steady-state flow problem.
A Compilation of Necessary Elements for a Local Government Continuity of Operations Plan
2006-09-01
Community Resilience in the World Trade Center Attack (Newark: Univ. of Delaware, 2003), 4. 11 Subsequently, New York City developed a COOP after... Community Resilience , 4. 27 New York City Emergency Response Task Force, Enhancing New York City’s Emergency Preparedness A Report to Mayor Michael R...Elements of Community Resilience in the World Trade Center Attack. Disaster Research Center, Univ. of Delaware, Newark, DE, 2004. Walton, Matt S
Assessment of dual-point drag reduction for an executive-jet modified airfoil section
NASA Technical Reports Server (NTRS)
Allison, Dennis O.; Mineck, Raymond E.
1996-01-01
This paper presents aerodynamic characteristics and pressure distributions for an executive-jet modified airfoil and discusses drag reduction relative to a baseline airfoil for two cruise design points. A modified airfoil was tested in the adaptive-wall test section of the NASA Langley 0.3-Meter Transonic Cryogenic Tunnel (0.3-m TCT) for Mach numbers ranging from 0.250 to 0.780 and chord Reynolds numbers ranging from 3.0 x 10(exp 6) to 18.0 x 10(exp 6). The angle of attack was varied from minus 2 degrees to almost 10 degrees. Boundary-layer transition was fixed at 5 percent of chord on both the upper and lower surfaces of the model for most of the test. The two design Mach numbers were 0.654 and 0.735, chord Reynolds numbers were 4.5 x 10(exp 6) and 8.9 x 10(exp 6), and normal-force coefficients were 0.98 and 0.51. Test data are presented graphically as integrated force and moment coefficients and chordwise pressure distributions. The maximum normal-force coefficient decreases with increasing Mach number. At a constant normal-force coefficient in the linear region, as Mach number increases an increase occurs in the slope of normal-force coefficient versus angle of attack, negative pitching-moment coefficient, and drag coefficient. With increasing Reynolds number at a constant normal-force coefficient, the pitching-moment coefficient becomes more negative and the drag coefficient decreases. The pressure distributions reveal that when present, separation begins at the trailing edge as angle of attack is increased. The modified airfoil, which is designed with pitching moment and geometric constraints relative to the baseline airfoil, achieved drag reductions for both design points (12 and 22 counts). The drag reductions are associated with stronger suction pressures in the first 10 percent of the upper surface and weakened shock waves.
Kang, Chang-kwon; Shyy, Wei
2014-12-06
In the analysis of flexible flapping wings of insects, the aerodynamic outcome depends on the combined structural dynamics and unsteady fluid physics. Because the wing shape and hence the resulting effective angle of attack are a priori unknown, predicting aerodynamic performance is challenging. Here, we show that a coupled aerodynamics/structural dynamics model can be established for hovering, based on a linear beam equation with the Morison equation to account for both added mass and aerodynamic damping effects. Lift strongly depends on the instantaneous angle of attack, resulting from passive pitch associated with wing deformation. We show that both instantaneous wing deformation and lift can be predicted in a much simplified framework. Moreover, our analysis suggests that resulting wing kinematics can be explained by the interplay between acceleration-related and aerodynamic damping forces. Interestingly, while both forces combine to create a high angle of attack resulting in high lift around the midstroke, they offset each other for phase control at the end of the stroke. © 2014 The Author(s) Published by the Royal Society. All rights reserved.
NASA Technical Reports Server (NTRS)
Prabhu, Ramadas K.; Sutton, Kenneth (Technical Monitor)
2001-01-01
This report documents the results of a computational study done to compute the inviscid longitudinal aerodynamic characteristics of the Space Shuttle Orbiter for Mach numbers 10 and 15 at angles of attack of 40, 50, 55, and 60 degrees. These computations were done to provide limited aerodynamic data in support of the Orbiter contingency abort task. The Orbiter had all the control surfaces in the undeflected position. The unstructured grid software FELISA was used for these computations with the equilibrium air option. Normal and axial force coefficients and pitching moment coefficients were computed. The hinge moment coefficients of the body flap and the inboard and outboard elevons were also computed. These results were compared with Orbiter Air Data Book (OADB) data and those computed using GASP. The comparison with the GASP results showed very good agreement in Cm and Ca at all the points. The computed axial force coefficients were smaller than those computed by GASP. There were noticeable differences between the present results and those in the OADB at angles of attack greater than 50 degrees.
Yang, Xiuping; Min, Lequan; Wang, Xue
2015-05-01
This paper sets up a chaos criterion theorem on a kind of cubic polynomial discrete maps. Using this theorem, Zhou-Song's chaos criterion theorem on quadratic polynomial discrete maps and generalized synchronization (GS) theorem construct an eight-dimensional chaotic GS system. Numerical simulations have been carried out to verify the effectiveness of theoretical results. The chaotic GS system is used to design a chaos-based pseudorandom number generator (CPRNG). Using FIPS 140-2 test suit/Generalized FIPS 140-2, test suit tests the randomness of two 1000 key streams consisting of 20 000 bits generated by the CPRNG, respectively. The results show that there are 99.9%/98.5% key streams to have passed the FIPS 140-2 test suit/Generalized FIPS 140-2 test. Numerical simulations show that the different keystreams have an average 50.001% same codes. The key space of the CPRNG is larger than 2(1345). As an application of the CPRNG, this study gives an image encryption example. Experimental results show that the linear coefficients between the plaintext and the ciphertext and the decrypted ciphertexts via the 100 key streams with perturbed keys are less than 0.00428. The result suggests that the decrypted texts via the keystreams generated via perturbed keys of the CPRNG are almost completely independent on the original image text, and brute attacks are needed to break the cryptographic system.
NASA Astrophysics Data System (ADS)
Yang, Xiuping; Min, Lequan; Wang, Xue
2015-05-01
This paper sets up a chaos criterion theorem on a kind of cubic polynomial discrete maps. Using this theorem, Zhou-Song's chaos criterion theorem on quadratic polynomial discrete maps and generalized synchronization (GS) theorem construct an eight-dimensional chaotic GS system. Numerical simulations have been carried out to verify the effectiveness of theoretical results. The chaotic GS system is used to design a chaos-based pseudorandom number generator (CPRNG). Using FIPS 140-2 test suit/Generalized FIPS 140-2, test suit tests the randomness of two 1000 key streams consisting of 20 000 bits generated by the CPRNG, respectively. The results show that there are 99.9%/98.5% key streams to have passed the FIPS 140-2 test suit/Generalized FIPS 140-2 test. Numerical simulations show that the different keystreams have an average 50.001% same codes. The key space of the CPRNG is larger than 21345. As an application of the CPRNG, this study gives an image encryption example. Experimental results show that the linear coefficients between the plaintext and the ciphertext and the decrypted ciphertexts via the 100 key streams with perturbed keys are less than 0.00428. The result suggests that the decrypted texts via the keystreams generated via perturbed keys of the CPRNG are almost completely independent on the original image text, and brute attacks are needed to break the cryptographic system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Xiuping, E-mail: yangxiuping-1990@163.com; Min, Lequan, E-mail: minlequan@sina.com; Wang, Xue, E-mail: wangxue-20130818@163.com
This paper sets up a chaos criterion theorem on a kind of cubic polynomial discrete maps. Using this theorem, Zhou-Song's chaos criterion theorem on quadratic polynomial discrete maps and generalized synchronization (GS) theorem construct an eight-dimensional chaotic GS system. Numerical simulations have been carried out to verify the effectiveness of theoretical results. The chaotic GS system is used to design a chaos-based pseudorandom number generator (CPRNG). Using FIPS 140-2 test suit/Generalized FIPS 140-2, test suit tests the randomness of two 1000 key streams consisting of 20 000 bits generated by the CPRNG, respectively. The results show that there are 99.9%/98.5% keymore » streams to have passed the FIPS 140-2 test suit/Generalized FIPS 140-2 test. Numerical simulations show that the different keystreams have an average 50.001% same codes. The key space of the CPRNG is larger than 2{sup 1345}. As an application of the CPRNG, this study gives an image encryption example. Experimental results show that the linear coefficients between the plaintext and the ciphertext and the decrypted ciphertexts via the 100 key streams with perturbed keys are less than 0.00428. The result suggests that the decrypted texts via the keystreams generated via perturbed keys of the CPRNG are almost completely independent on the original image text, and brute attacks are needed to break the cryptographic system.« less
Exploitable Vulnerabilities of Iran’s Islamic Revolutionary Guard Corps
2011-10-12
former IRGC Qods ( Jerusalem ) Force commander, He is also the subject of an Interpol Red Notice for his role in the 1994 attacks on Israeli and Jewish...maintain a capability to take the conflict outside its borders through unconventional tactics and asymmetric warfare. The Pasdaran’s Qods ( Jerusalem ...Force is its primary tool in that endeavor. The Jerusalem Force will be addressed separately in subsequent discussion of the IRGC’s influence
Impact-Actuated Digging Tool for Lunar Excavation
NASA Technical Reports Server (NTRS)
Wilson, Jak; Chu, Philip; Craft, Jack; Zacny, Kris; Santoro, Chris
2013-01-01
NASA s plans for a lunar outpost require extensive excavation. The Lunar Surface Systems Project Office projects that thousands of tons of lunar soil will need to be moved. Conventional excavators dig through soil by brute force, and depend upon their substantial weight to react to the forces generated. This approach will not be feasible on the Moon for two reasons: (1) gravity is 1/6th that on Earth, which means that a kg on the Moon will supply 1/6 the down force that it does on Earth, and (2) transportation costs (at the time of this reporting) of $50K to $100K per kg make massive excavators economically unattractive. A percussive excavation system was developed for use in vacuum or nearvacuum environments. It reduces the down force needed for excavation by an order of magnitude by using percussion to assist in soil penetration and digging. The novelty of this excavator is that it incorporates a percussive mechanism suited to sustained operation in a vacuum environment. A percussive digger breadboard was designed, built, and successfully tested under both ambient and vacuum conditions. The breadboard was run in vacuum to more than 2..times the lifetime of the Apollo Lunar Surface Drill, throughout which the mechanism performed and held up well. The percussive digger was demonstrated to reduce the force necessary for digging in lunar soil simulant by an order of magnitude, providing reductions as high as 45:1. This is an enabling technology for lunar site preparation and ISRU (In Situ Resource Utilization) mining activities. At transportation costs of $50K to $100K per kg, reducing digging forces by an order of magnitude translates into billions of dollars saved by not launching heavier systems to accomplish excavation tasks necessary to the establishment of a lunar outpost. Applications on the lunar surface include excavation for habitats, construction of roads, landing pads, berms, foundations, habitat shielding, and ISRU.
NASA Technical Reports Server (NTRS)
Perkins, Edward W; Kuehn, Donald M
1953-01-01
Pressure distributions and force characteristics have been determined for a body of revolution consisting of a fineness ratio 5.75, circular-arc, ogival nose tangent to a cylindrical afterbody for an angle-of-attack range of 0 degrees to 35.5 degrees. The free-stream Mach number was 1.98 and the free-stream Reynolds number was approximately 0.5 x 10 sup 6, based on body diameter. Comparison of the theoretical and experimental pressure distributions shows that for zero lift, either slender-body theory or higher-order theories yield results which are in good agreement with experiment. For the lifting case, good agreement with theory is found only for low angles of attack and for the region in which the body cross-sectional area is increasing in the downstream direction. Because of the effects of cross-flow separation and the effects of compressibility due to the high cross-flow Mach numbers at large angles of attack, the experimental pressure distributions differ from those predicted by potential theory. Although the flow about the inclined body was, in general, similar to that assumed as the basis for Allen's method of estimating the forces resulting from viscous effects (NACA RM A91I26), the distribution of the forces was significantly different from that assumed. Nevertheless, the lift and pitching-moment characteristics were in fair agreement with the estimated value.
Integrated Field-Screening for Rapid Sediment Characterization
2000-09-30
Station Naval Submarine Naval Shipyard Hickam Air Force Base Pearl Harbor Naval Base Ford Island (US Navy) Waipio Peninsula (US Navy) McGrew Point...December 1941, the Japanese Imperial Navy launched a surprise air attack on the U.S. Fleet in Pearl Harbor from a task force of 32 vessels, including 6...18 3.2.1 Naval Air Station Alameda
Instances of Use of United States Armed Forces Abroad, 1798-2007
2007-09-12
one of 200 marines and sailors) to discourage piracy and the slave trade along the Ivory coast, and to punish attacks by the natives on American... poaching . 1891 Chile. August 28 to 30. U.S. forces protected the American consulate and the women and children who had taken refuge in it during a
Reservists prep first responders for Pope's visit > Air Force Reserve
-area first responders on how to respond in the event of a nuclear or radiological terrorist attack Nuclear Incident Response course, July 7-8, at the Montgomery County Fire Academy, in advance of Pope mass. The course is offered through the Defense Nuclear Weapons School, Kirtland Air Force Base, New
Exploring Collaboration System Effectiveness at the United States Army Brigade Echelon
ERIC Educational Resources Information Center
Herring, Terry W.
2012-01-01
Since the attacks on September 11, 2001, a major transformation of the United States Army began to create a modular, scalable, and modernized military force. This effort was the most significant restructuring of military forces in the last 80 years. However, after 6 years of sustained combat operations in the Middle East many of the collaboration…
NASA Technical Reports Server (NTRS)
Bencze, D. P.
1976-01-01
Detailed interference force and pressure data were obtained on a representative wing-body nacelle combination at Mach numbers of 0.9 to 1.4. The model consisted of a delta wing-body aerodynamic force model with four independently supported nacelles located beneath the wing-body combination. The primary variables examined included Mach number, angle of attack, nacelle position, and nacelle mass flow ratio. Four different configurations were tested to identify various interference forces and pressures on each component; these included tests of the isolated nacelle, the isolated wing-body combination, the four nacelles as a unit, and the total wing-body-nacelle combination. Nacelle axial location, relative to both the wing-body combination and to each other, was the most important variable in determining the net interference among the components. The overall interference effects were found to be essentially constant over the operating angle-of-attack range of the configuration, and nearly independent of nacelle mass flow ratio.
Battles between an insurgent army and an advanced army - focus on strategy
NASA Astrophysics Data System (ADS)
Sen, Surajit; Shanahan, Linda
2008-03-01
Detailed and aggregate analyses of the outcome of past battles focusing on rates of troop losses or on the ratios of forces on each side is at the heart of present knowledge about battles. Here we present non-equilibrium statistical mechanics based studies of possible outcomes of well matched strategic battles by a ``blue'' army against insurgency based attacks by well matched opponents in a ``red'' army in red territory. We assume that the red army attacks with randomly varying force levels to potentially confuse and drive the blue's strategies. The temporal evolution of the model battles incorporate randomness in the deployment of the reds and hence possess attendant history dependence. Our results reveal that while unpredictable events play a major role in battles, a balance between risk of exposure in a battlefield and the use of short range intelligence is needed in determining whether one side can decimate the other, and hence force a battle to end.
Lift and drag forces on an inclined plow moving over a granular surface.
Percier, Baptiste; Manneville, Sebastien; McElwaine, Jim N; Morris, Stephen W; Taberlet, Nicolas
2011-11-01
We studied the drag and lift forces acting on an inclined plate while it is dragged on the surface of a granular media, both in experiment and in numerical simulation. In particular, we investigated the influence of the horizontal velocity of the plate and its angle of attack. We show that a steady wedge of grains is moved in front of the plow and that the lift and drag forces are proportional to the weight of this wedge. These constants of proportionality vary with the angle of attack but not (or only weakly) on the velocity. We found a universal effective friction law that accounts for the dependence on all the above-mentioned parameters. The stress and velocity fields are calculated from the numerical simulations and show the existence of a shear band under the wedge and that the pressure is nonhydrostatic. The strongest gradients in stress and shear occur at the base of the plow where the dissipation rate is therefore highest.
2013-02-14
L acts to “provided resources for national and joint kinetic attack requirements.”24 Additionally, the Marine Corps Force Structure Review Group...for unusual system activity and searching for signs of known malware, unlike what is depicted in movies such as Hackers, where opposing cyber...never admitted involvement but the attacks originated in Russia. The FBI code name for the inquiry was Moonlight Maze. 29. Jeffrey Carr, Inside Cyber
Enhancing Domestic Response: The Implementation of the Homeland Response Force
2011-03-24
investigation was conducted. Five Americans were killed and 17 were sickened in what became the worst modern era biological attacks in U.S. history...Russia than directly after the breakup; but how much is still unaccounted for? What about the motivation of terrorists that have attacked the American...exile twice as many and wound and cripple hundreds of thousands.‖ As he explains, this is what justice requires to balance the scales for casualties
Prospective Contributions of Amphibious Operations to AirSea Battle
2013-05-02
Midway, Wake as well as Johnston and Palmyra atolls . This was necessary to support scouting and screening operations to the west of Hawaii in defense of...decisive battle with Japanese forces. To accomplish this, the Japanese plan was to attack and seize the Midway Atoll at the extreme northwest end of...Japanese messages allowing them to prepare for the upcoming attack on the Midway atoll . The US responded by dispatching TF 16 and TF 17 consisting of
The Coast Artillery Journal. Volume 74, Number 6, September-October 1931
1931-10-01
Towns with the Primary Mission of Denying Such Towns to the Bandits This form of occupation became necessary in Nicar- agua in the summer and fall of 1927...such never materialized. Surprise Attacks on Bandit Camps Our first successful attack of this nature in Nicar- agua occurred in the first part of...complete reorganization of her military forces. Com- pulsory training is abolished. How difficult her situ - ation has become may be realized from the
The Importance of Enduring Partnership Between the US and Pakistan in Combating Terrorism
2008-01-01
Hundreds of Pakistanis including armed forces members have so far been killed in these terrorist attacks. The most high profile personality that has so...far been killed in such attacks was Mrs Benazir Bhutto, Pakistan’s ex Prime Minister. Pakistan has so far provided following assistance to the US: a...Pakistan Army conducted operation in South Waziristan in 2004, during which 302 militants were killed while 656 were detained. Some 80% of these
Gen Otto P. Weyland: Close Air Support in the Korean War
2007-03-01
man- power nor the equipment to significantly change the nature of the struggle, American forces were left to adjust. Thomas H. Greer remembers that...defense?”19 In The Development of Air Doctrine in the Army Air Arm, 1917– 1941, Thomas Greer observes that differences in the relative importance of...exception was Capt George C. Kenney. Kenney, considered the most influential attack instructor at ACTS, wrote a textbook on attack aviation and
Medical preparation for terrorism in Australia. Is luck running out for "the lucky country?
Caldicott, David G E; Edwards, Nicholas A
2003-01-01
Recent world events have forced Australia to re-examine its role on the world stage and its susceptibility to terrorist attacks. The authors examine the brief historical exposure of Australia to the phenomenon of terrorism, and review the geopolitical climate and features that may render it more susceptible to attack in the future. Australia's emergency management structure is outlined, and its current state of medical preparedness for a terrorist incident is critically reviewed.
NASA Technical Reports Server (NTRS)
Hamilton, T.
1972-01-01
Experimental aerodynamic investigations were conducted in the 14-inch trisonic wind tunnel during early February 1972 on a 0.00340 scale model of the 33-foot diameter space shuttle pump fed booster configuration. The basic configuration tested was a 40-deg cone/cylinder. Six component aerodynamic force and moment data were recorded over a Mach number range from 0.6 to 5.0, angles-of-attack from 50 to 90 deg at 0 deg sideslip and over a sideslip range from -10 to +10 deg at 60 and 80 deg angles-of-attack. Primary configuration variables were fin area and body cutout size.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lewis, G.N.; Postol, T.A.
Long-range nuclear-armed cruise missiles are highly accurate and are capable of reaching most targets within the United States and the Commonwealth of Independent States (CIS) from launch points beyond their borders. Neither the United States nor the CIS has air surveillance systems capable of providing reliable warning against cruise missiles. Thus it is possible that a small-scale cruise missile attack could go entirely undetected until the nuclear weapons arrived over their targets. Such an attack could destroy the other country's entire strategic bomber force on the ground and severely damage its strategic command and control system, perhaps to the pointmore » of endangering the ability of its ICBM force to be launched on warning. This capability makes long-range nuclear cruise missiles potentially one of the most destabilizing of all nuclear weapons.« less
What Are You Worth? The Value of a Human Life and Its Impact on Personnel Recovery
2014-06-01
Grier, “Call From The Desert,” (Air Force Magazine , February 2011), 82-86. 97 http://militaryhistory.about.com/od/battleswars1900s/tp/The-Gulf...2008, 4. Peter Grier, “Call From The Desert,” (Air Force Magazine , February 2011), 82-86. 47 to begin the counter-attack on Iraqi forces.101...dunlap_01 Accessed 22 Mar 14. 112 Peter Grier, “Call From The Desert,” (Air Force Magazine , February 2011), 82-86. http://www.military.com/Content
1978-02-01
i< AEROSPACE MEDICAL RESEARCH LABORATORY AEROSPACE MEDICAL DIVISION AIR FORCE SYSTEMS COMMAND WRIGHT-PATTERSON AIR FORCE BASE, OHIO 45433...in any way be related thereto. Please do not request copies of this report from Aerospace Medical Research Laboratory. Additional copies may be...34Guide for the Care and Use of Laboratory Animals," Institute of Laboratory Animal Resources, National Research Council. The voluntary informed
2008-12-01
after the September 11, 2001 attacks and a number of Special Forces operational detachments trained and advised the Afghan Northern Alliance troops... Cara Wong, “Citizenship for Service: Substitution, Commutation, and “Green Card Troops,” Paper presented at the University of California, Berkeley...law.cornell.edu/uscode/8/1440.html (accessed December 2008). 49 James B. Jacobs, and Leslie Anne Hayes, Aliens in the U.S. Armed Forces (New York: Oxford
The Objective Force Soldier/Soldier Team. Volume III - Background and Context
2001-11-01
last 20 years, was used by RAND to analyze operations in complex terrain (i.e., a treeline ). Since it is limited to simulation in two dimensions, it...the Blue force is inserted through Albania, fights its way into Kosovo, and must evict Serb forces from locations in treelines and cover. Additional...infantry in the treelines were no t countered well by the mounted attack. In addition, a special Blue dismount excursion with current generation equipment
Public health foundations and the tobacco industry: lessons from Minnesota
Ibrahim, J; Tsoukalas, T; Glantz, S
2004-01-01
Objective: To investigate whether private foundations can be created in a way that will insulate them from attacks by the tobacco industry, using the Minnesota Partnership for Action Against Tobacco (MPAAT) as a case study. Design: Information was collected from internal tobacco industry documents, court documents, newspapers, and interviews with health advocates and elected officials. Results: The creation of MPAAT as an independent foundation did not insulate it from attacks by tobacco industry allies. During 2001–2002, MPAAT was repeatedly attacked by Attorney General Mike Hatch and major media, using standard tobacco industry rhetoric. This strategy of attack and demands for information were reminiscent of previous attacks on Minnesota's Plan for Nonsmoking and Health and the American Stop Smoking Intervention Study (ASSIST). MPAAT was ultimately forced to restructure its programme to abandon effective community norm change interventions around smoke-free policies and replace them with less effective individual cessation interventions. Neither MPAAT nor other health advocates mounted an effective public response to these attacks, instead relying on the insider strategy of responding in court. Conclusion: It is not possible to avoid attacks by the tobacco industry or its political allies. Like programmes administered by government agencies, tobacco control foundations must be prepared for these attacks, including a proactive plan to educate the public about the principles of community based tobacco control. Public health advocates also need to be willing to take prompt action to defend these programmes and hold public officials who attack tobacco control programmes accountable for their actions. PMID:15333877
Three tenets for secure cyber-physical system design and assessment
NASA Astrophysics Data System (ADS)
Hughes, Jeff; Cybenko, George
2014-06-01
This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.
The Legal Limitations on Defending the National Information Infrastructure Against a Cyber Attack
1999-05-27
has a wider significance .... Kelsen has asserted that ’use of force’ in Article 2, paragraph 4, of the Charter includes both the use of arms and a...or United Nations practice that it bears the meaning suggested by Kelsen . Indeed, in view of the predominant view of aggression and the use of force
Using the Force: "Star Wars" in the Classroom
ERIC Educational Resources Information Center
Chartier, Timothy P.
2007-01-01
When the character Yoda first appeared on the silver screen, his movements were due to the efforts of famed muppeteer Frank Oz. In "Star Wars Episode II: Attack of the Clones," Yoda returned to the movies but this time the character was not a puppet but a digital image within a computer. This paper discusses the role, or, more aptly, the force, of…
Coordinating Military Response to Disasters
2016-01-22
of two noted natural disasters . Section four analyzes the two options of the affected area National Guard forces and the tailored regional located...recommendations and conclusions. Title Coordinating Military Response to Disasters Thesis Military response to natural disasters is a critical aspect...National Guard forces in response to natural disasters and man-made emergencies such as riots or terrorist attacks.13 The third role is federal
Measurement of circulation around wing-tip vortices and estimation of lift forces using stereo PIV
NASA Astrophysics Data System (ADS)
Asano, Shinichiro; Sato, Haru; Sakakibara, Jun
2017-11-01
Applying the flapping flight to the development of an aircraft as Mars space probe and a small aircraft called MAV (Micro Air Vehicle) is considered. This is because Reynolds number assumed as the condition of these aircrafts is low and similar to of insects and small birds flapping on the earth. However, it is difficult to measure the flow around the airfoil in flapping flight directly because of its three-dimensional and unsteady characteristics. Hence, there is an attempt to estimate the flow field and aerodynamics by measuring the wake of the airfoil using PIV, for example the lift estimation method based on a wing-tip vortex. In this study, at the angle of attack including the angle after stall, we measured the wing-tip vortex of a NACA 0015 cross-sectional and rectangular planform airfoil using stereo PIV. The circulation of the wing-tip vortex was calculated from the obtained velocity field, and the lift force was estimated based on Kutta-Joukowski theorem. Then, the validity of this estimation method was examined by comparing the estimated lift force and the force balance data at various angles of attack. The experiment results are going to be presented in the conference.
NASA Technical Reports Server (NTRS)
Keener, E. R.; Taleghani, J.
1975-01-01
Five forebody models of various shapes were tested in the Ames 6- by 6-Foot Wind Tunnel to determine the aerodynamic characteristics at Mach numbers from 0.25 to 2 at a Reynolds number of 800000. At a Mach number of 0.6 the Reynolds number was varied from 0.4 to 1.8 mil. Angle of attack was varied from -2 deg to 88 deg at zero sideslip. The purpose of the investigation was to determine the effect of Mach number of the side force that develops at low speeds and zero sideslip for all of these forebody models when the nose is pointed. Test results show that with increasing Mach number the maximum side forces decrease to zero between Mach numbers of 0.8 and 1.5, depending on the nose angle; the smaller the nose angle of the higher the Mach number at which the side force exists. At a Mach number of 0.6 there is some variation of side force with Reynolds number, the variation being the largest for the more slender tangent ogive.
Physical Fitness as a Moderator of Cognitive Degradation During Sleep Deprivation
1983-06-03
PROGRAM ELEMENT, PROJECT, TASK AREA & WORK UNIT NUMBERS 11. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE HQ TRADOC, ATTN: ATCS-D, Fort Monroe, 3...June 83 VA235 23651 13. NUMBER OF PAGES 164 14. MONITORING AGENCY NAME & ADDRESS(iI different from Controlling Office) 1S. SECURITY CLASS. (of this...with troops. b. An attack designed to produce an overwhelming and sustained rate of advance by using two or more echelons in the attacking force. These
Snakes in the Eagle’s Nest: A History of Ground Attacks on Air Bases,
1995-01-01
CRETE The New Zealand Division (7,700 personnel) was deployed in the Maleme-Canea-Suda Bay area. Although its 5th Brigade was re- sponsible for the...forces. In contrast, the New Zealand defense of Maleme was hampered by their obsession with the seaborne threat to Suda Bay . The New Zealand ...attack on Crete. • New Zealand ground commanders on Crete failed to devote suf- ficient resources to the defense of Maleme Airfield. • German
The US Army in Kirkuk: Governance Operations on the Fault Lines of Iraqi Society, 2003-2009
2011-12-01
Woodward, Plan of Attack, (New York: Simon & Schuster, 2004), 109-118, 139-142. 4. Jamie McIntyre, “Pentagon Officials: Special Forces in Northern Iraq...Mayville, 20. 32. Mayville, 15. 33. Ken Dilanian, “In Kirkuk, US Soldiers Living Among Iraqis See Less Violence, Fewer Attacks,” Knight Ridder Newspapers...Brigade Serves as Ambassadors as well as Soldiers,” IdahoStatesman.com, 3 Jan- uary 2006, 1. 85. Phillips, 1. 86. Michael Knights , “Kirkuk in Transition
The US Army in Kirkuk: Governance Operations on the Fault Lines of Iraqi Society, 2003-2009
2011-11-01
Plan of Attack, (New York: Simon & Schuster, 2004), 109-118, 139-142. 4. Jamie McIntyre, “Pentagon Officials: Special Forces in Northern Iraq...Mayville, 20. 32. Mayville, 15. 33. Ken Dilanian, “In Kirkuk, US Soldiers Living Among Iraqis See Less Violence, Fewer Attacks,” Knight Ridder Newspapers...Serves as Ambassadors as well as Soldiers,” IdahoStatesman.com, 3 Jan- uary 2006, 1. 85. Phillips, 1. 86. Michael Knights , “Kirkuk in Transition
Stochastic Residual-Error Analysis For Estimating Hydrologic Model Predictive Uncertainty
A hybrid time series-nonparametric sampling approach, referred to herein as semiparametric, is presented for the estimation of model predictive uncertainty. The methodology is a two-step procedure whereby a distributed hydrologic model is first calibrated, then followed by brute ...
NASA Technical Reports Server (NTRS)
Jorgensen, L. H.
1977-01-01
An engineering-type method is presented for computing normal-force and pitching-moment coefficients for slender bodies of circular and noncircular cross section alone and with lifting surfaces. In this method, a semi-empirical term representing viscous-separation crossflow is added to a term representing potential-theory crossflow. For many bodies of revolution, computed aerodynamic characteristics are shown to agree with measured results for investigated free-stream Mach numbers from 0.6 to 2.9. The angles of attack extend from 0 deg to 180 deg for M = 2.9 from 0 deg to 60 deg for M = 0.6 to 2.0. For several bodies of elliptic cross section, measured results are also predicted reasonably well over the investigated Mach number range from 0.6 to 2.0 and at angles of attack from 0 deg to 60 deg. As for the bodies of revolution, the predictions are best for supersonic Mach numbers. For body-wing and body-wing-tail configurations with wings of aspect ratios 3 and 4, measured normal-force coefficients and centers are predicted reasonably well at the upper test Mach number of 2.0. Vapor-screen and oil-flow pictures are shown for many body, body-wing and body-wing-tail configurations. When spearation and vortex patterns are asymmetric, undesirable side forces are measured for the models even at zero sideslip angle. Generally, the side-force coefficients decrease or vanish with the following: increase in Mach number, decrease in nose fineness ratio, change from sharp to blunt nose, and flattening of body cross section (particularly the body nose).
Mills, Robin; Hildenbrandt, Hanno; Taylor, Graham K; Hemelrijk, Charlotte K
2018-04-01
The peregrine falcon Falco peregrinus is renowned for attacking its prey from high altitude in a fast controlled dive called a stoop. Many other raptors employ a similar mode of attack, but the functional benefits of stooping remain obscure. Here we investigate whether, when, and why stooping promotes catch success, using a three-dimensional, agent-based modeling approach to simulate attacks of falcons on aerial prey. We simulate avian flapping and gliding flight using an analytical quasi-steady model of the aerodynamic forces and moments, parametrized by empirical measurements of flight morphology. The model-birds' flight control inputs are commanded by their guidance system, comprising a phenomenological model of its vision, guidance, and control. To intercept its prey, model-falcons use the same guidance law as missiles (pure proportional navigation); this assumption is corroborated by empirical data on peregrine falcons hunting lures. We parametrically vary the falcon's starting position relative to its prey, together with the feedback gain of its guidance loop, under differing assumptions regarding its errors and delay in vision and control, and for three different patterns of prey motion. We find that, when the prey maneuvers erratically, high-altitude stoops increase catch success compared to low-altitude attacks, but only if the falcon's guidance law is appropriately tuned, and only given a high degree of precision in vision and control. Remarkably, the optimal tuning of the guidance law in our simulations coincides closely with what has been observed empirically in peregrines. High-altitude stoops are shown to be beneficial because their high airspeed enables production of higher aerodynamic forces for maneuvering, and facilitates higher roll agility as the wings are tucked, each of which is essential to catching maneuvering prey at realistic response delays.
Influence of the Reynolds number on normal forces of slender bodies of revolution
NASA Technical Reports Server (NTRS)
Hartmann, K.
1982-01-01
Comprehensive force, moment, and pressure distribution measurements as well as flow visualization experiments were carried out to determine the influence of the Reynolds number on nonlinear normal forces of slender bodies of revolution. Experiments were performed in transonic wind tunnels at angles of attack up to 90 deg in the Mach number range 0.5 to 2.2 at variable Reynolds numbers. The results were analysed theoretically and an empirical theory was developed which describes the test results satisfactory.
2000-02-01
approximately 3 to 30.5 m (10 to 100 ft) above MSL, and the surface slopes south toward Hickam Air Force Base and Honolulu International Airport. A.3.1.2...PHNC drains across the Honolulu International Airport, Hickam Air Force Base , and Fort Kamehameha Military Reservation before entering the Pacific...Navy launched a surprise air attack on the U.S. Fleet in Pearl Harbor from a task force of 32 vessels, including 6 aircraft carriers with 350
2015-11-09
missile warning, weather and intelligence warfighting support. AFSPC operates sensors that provide direct attack warning and assessment to U.S...toughness combinations. AFRL conducted low-speed wind tunnel tests of 9%-scale model completed at NASA Langley Research Center (LaRC); data validated... wireless mobile monitoring capability designed for dismounted Pararescue Jumpers (PJ) called United States Air Force 89 Battlefield Airmen Trauma
2004-06-09
KENNEDY SPACE CENTER, FLA. - At Cape Canaveral Air Force Station, KSC Firefighter Chris Maupin (left) watches as Lt. Keith Abell practices maneuvering apparatus on top of the firefighting vehicle with which they are able to direct the hoses to attack fires from above and below. The firefighters teamed up with task forces from Satellite Beach, Malabar, Melbourne, Palm Bay, Patrick Air Force Base and Brevard County to help fight wildfires in the Palm Bay and Malabar areas that threatened homes and property during the Memorial Day holiday weekend.
Ishihara, D; Yamashita, Y; Horie, T; Yoshida, S; Niho, T
2009-12-01
We have studied the passive maintenance of high angle of attack and its lift generation during the crane fly's flapping translation using a dynamically scaled model. Since the wing and the surrounding fluid interact with each other, the dynamic similarity between the model flight and actual insect flight was measured using not only the non-dimensional numbers for the fluid (the Reynolds and Strouhal numbers) but also those for the fluid-structure interaction (the mass and Cauchy numbers). A difference was observed between the mass number of the model and that of the actual insect because of the limitation of available solid materials. However, the dynamic similarity during the flapping translation was not much affected by the mass number since the inertial force during the flapping translation is not dominant because of the small acceleration. In our model flight, a high angle of attack of the wing was maintained passively during the flapping translation and the wing generated sufficient lift force to support the insect weight. The mechanism of the maintenance is the equilibrium between the elastic reaction force resulting from the wing torsion and the fluid dynamic pressure. Our model wing rotated quickly at the stroke reversal in spite of the reduced inertial effect of the wing mass compared with that of the actual insect. This result could be explained by the added mass from the surrounding fluid. Our results suggest that the pitching motion can be passive in the crane fly's flapping flight.
Computational analysis of forebody tangential slot blowing on the high alpha research vehicle
NASA Technical Reports Server (NTRS)
Gee, Ken
1994-01-01
Current and future fighter aircraft can maneuver in the high-angle-of-attack flight regime while flying at low subsonic and transonic freestream Mach numbers. However, at any flight speed, the ability of the vertical tails to generate yawing moment is limited in high-angle-of-attack flight. Thus, any system designed to provide the pilot with additional side force and yawing moment must work in both low subsonic and transonic flight. However, previous investigations of the effectiveness of forebody tangential slot blowing in generating the desired control forces and moments have been limited to the low subsonic freestream flow regime. In order to investigate the effectiveness of tangential slot blowing in transonic flight, a computational fluid dynamics analysis was carried out during the grant period. Computational solutions were obtained at three different freestream Mach numbers and at various jet mass flow ratios. All results were obtained using the isolated F/A-18 forebody grid geometry at 30.3 degrees angle of attack. One goal of the research was to determine the effect of freestream Mach number on the effectiveness of forebody tangential slot blowing in generating yawing moment. The second part of the research studied the force onset time lag associated with blowing. The time required for the yawing moment to reach a steady-state value from the onset of blowing may have an impact on the implementation of a pneumatic system on a flight vehicle.
Wing-Fixed PIV and force measurements of a large transverse gust encounter
NASA Astrophysics Data System (ADS)
Perrotta, Gino
2015-11-01
The unsteady aerodynamics of an aspect ratio 4 flat plate wing encountering a large-amplitude transverse gust were investigated using PIV in the wing-fixed reference frame and direct unsteady force measurements. Using a new experimental facility at the University of Maryland, the wing was towed at Reynolds number 20,000 through a 7m-long tank of nominally quiescent water containing a single cross-stream planar jet with velocity equal to the wing's towed velocity - a transverse gust ratio equal to one. The planar jet was created by pumping water through 30 cylindrical nozzles arranged in a single row. PIV confirms that the individual jets converge into a single, narrow, planar gust with a streamwise velocity profile resembling a canonical cosine-squared gust. Forces and fluid velocities of this wing-gust interaction will be presented for two pre-gust conditions: attached flow on the wing and stalled flow over the wing. In both cases, the gust encounter results in a momentary spike in lift coefficient. The peak lift coefficient was measured between 3 and 6 and varies with angle of attack. At low angle of attack, the attached flow wing produces less lift before the gust and much more (non-circulatory) lift during the gust than the stalled wing. Although the flow over the wing at low angle of attack separates during the gust and reattaches afterwards, the recovery time is similar to that of the high angle case, on the order of 10 chord lengths travelled.
Information on and Comments Concerning Suicide Plane Attacks
1945-06-25
8217 TBE ALERT FOR’ SU. ; ATTACKS AT ALL .TIMWES %. EN EIEM!Y AIR ATTACK I-S 1REA0ASLY POSJ SIL Aw ?) MUST tNOT BE DISTRACTED FRi OWN S3ETOR OF RESPON1L...A:UTF-LD TO A D :INfl E.:I.ATE F: IR ING Ok iWt; AI PCRAFT BY EN T. iA’l Y TI:’CER F!-NGE~. X OH:E’ER: PLME ’OT FOLLOWI O - ,APPPOA-, PR CE.RE...COMMUNICATION SERVICE l C.SIFICATION AMPHIBIOUS FORCES, PACIFIC PRECEDENC ’ 8"A8iS ’,F’’ IT’i.GN, aNiR ATON8 O F PERSONN EL , AND) EXAMIATiON OF:Xeti~ss
NASA Technical Reports Server (NTRS)
Allen, J L; Beke, Andrew
1953-01-01
Force and pressure-recovery characteristics of a nacelle-type conical-spike inlet with a fixed-area bypass located in the top or bottom of the diffuser are presented for flight Mach numbers of 1.6, 1.8, and 2.0 for angles of attack from 0 degrees to 9 degrees. Top or bottom location of the bypass did not have significant effects on diffuser pressure-recovery, bypass mass-flow ratio, or drag coefficient over the range of angles of attack, flight Mach numbers, and stable engine mass-flow ratios investigated. A larger stable subcritical operating range was obtained with the bypass on the bottom at angles of attack from 3 degrees to 9 degrees at a flight Mach number of 2.0. At a flight Mach number of 2.0, the discharge of 14 percent of the critical mass flow of the inlet by means of a bypass increased the drag only one-fifth of the additive drag that would result for equivalent spillage behind an inlet normal shock without significant reductions in diffuser pressure recovery.
Lee-side flow over delta wings at supersonic speeds
NASA Technical Reports Server (NTRS)
Miller, D. S.; Wood, R. M.
1985-01-01
An experimental investigation of the lee-side flow on sharp leading-edge delta wings at supersonic speeds has been conducted. Pressure data were obtained at Mach numbers from 1.5 to 2.8, and three types of flow-visualization data (oil-flow, tuft, and vapor-screen) were obtained at Mach numbers from 1.7 to 2.8 for wing leading-edge sweep angles from 52.5 deg to 75 deg. From the flow-visualization data, the lee-side flows were classified into seven distinct types and a chart was developed that defines the flow mechanism as a function of the conditions normal to the wing leading edge, specifically, angle of attack and Mach number. Pressure data obtained experimentally and by a semiempirical prediction method were employed to investigate the effects of angle of attack, leading-edge sweep, and Mach number on vortex strength and vortex position. In general, the predicted and measured values of vortex-induced normal force and vortex position obtained from experimental data have the same trends with angle of attack, Mach number, and leading-edge sweep; however, the vortex-induced normal force is underpredicted by 15 to 30 percent, and the vortex spanwise location is overpredicted by approximately 15 percent.
Forced Oscillation Wind Tunnel Testing for FASER Flight Research Aircraft
NASA Technical Reports Server (NTRS)
Hoe, Garrison; Owens, Donald B.; Denham, Casey
2012-01-01
As unmanned air vehicles (UAVs) continue to expand their flight envelopes into areas of high angular rate and high angle of attack, modeling the complex unsteady aerodynamics for simulation in these regimes has become more difficult using traditional methods. The goal of this experiment was to improve the current six degree-of-freedom aerodynamic model of a small UAV by replacing the analytically derived damping derivatives with experimentally derived values. The UAV is named the Free-flying Aircraft for Sub-scale Experimental Research, FASER, and was tested in the NASA Langley Research Center 12- Foot Low-Speed Tunnel. The forced oscillation wind tunnel test technique was used to measure damping in the roll and yaw axes. By imparting a variety of sinusoidal motions, the effects of non-dimensional angular rate and reduced frequency were examined over a large range of angle of attack and side-slip combinations. Tests were performed at angles of attack from -5 to 40 degrees, sideslip angles of -30 to 30 degrees, oscillation amplitudes from 5 to 30 degrees, and reduced frequencies from 0.010 to 0.133. Additionally, the effect of aileron or elevator deflection on the damping coefficients was examined. Comparisons are made of two different data reduction methods used to obtain the damping derivatives. The results show that the damping derivatives are mainly a function of angle of attack and have dependence on the non-dimensional rate and reduced frequency only in the stall/post-stall regime
NASA Technical Reports Server (NTRS)
Paulson, John W.; Shanks, Robert E.
1961-01-01
An investigation of the low-subsonic flight characteristics of a thick 70 deg delta reentry configuration having a diamond cross section has been made in the Langley full-scale tunnel over an angle-of-attack range from 20 to 45 deg. Flight tests were also made at angles of attack near maximum lift (alpha = 40 deg) with a radio-controlled model dropped from a helicopter. Static and dynamic force tests were made over an angle-of-attack range from 0 to 90 deg. The longitudinal stability and control characteristics were considered satisfactory when the model had positive static longitudinal stability. It was possible to fly the model with a small amount of static instability, but the longitudinal characteristics were considered unsatisfactory in this condition. At angles of attack above the stall the model developed a large, constant-amplitude pitching oscillation. The lateral stability characteristics were considered to be only fair at angles of attack from about 20 to 35 deg because of a lightly damped Dutch roll oscillation. At higher angles of attack the oscillation was well damped and the lateral stability was generally satisfactory. The Dutch roll damping at the lower angles of attack was increased to satisfactory values by means of a simple rate-type roll damper. The lateral control characteristics were generally satisfactory throughout the angle- of-attack range, but there was some deterioration in aileron effectiveness in the high angle-of-attack range due mainly to a large increase in damping in roll.
Panic attacks and panic disorder in a population-based sample of active Canadian military personnel.
Kinley, D Jolene; Walker, John R; Mackenzie, Corey S; Sareen, Jitender
2011-01-01
The factors contributing to psychiatric problems among military personnel, particularly for panic, are unclear. The objective of this study was to examine the prevalence and correlates of panic disorder and panic attacks in the Canadian military. Statistics Canada and the Department of National Defense conducted the Canadian Community Health Survey-Canadian Forces Supplement in 2002 (May to December) with a representative sample of active Canadian military personnel (aged 16-54 years; N = 8,441; response rate, 81.5%). Comparisons were made between respondents with no past-year panic attacks, panic attacks without panic disorder, and panic disorder on measures of DSM-IV mental disorders, as well as validated measures of disability, distress, suicidal ideation, perceived need for mental health treatment, and mental health service use. Lifetime exposure to combat operations, witnessing of atrocities, and deployments were also assessed. Panic disorder and panic attacks were common in the military population, with past-year prevalence estimates of 1.8% and 7.0%, respectively. Both panic disorder and panic attacks were associated with increased odds of all mental disorders assessed, suicidal ideation, 2-week disability, and distress. Perceived need for mental health treatment and service use were common in individuals with panic attacks and panic disorder (perceived need: 46.3% for panic attacks, 89.6% for panic disorder; service use: 32.5% for panic attacks, 74.5% for panic disorder). Panic attacks and panic disorder in the military are associated with outcomes that could be detrimental to well-being and work performance, and early detection of panic in this population could help reduce these negative outcomes. © Copyright 2011 Physicians Postgraduate Press, Inc.
Exhaustively sampling peptide adsorption with metadynamics.
Deighan, Michael; Pfaendtner, Jim
2013-06-25
Simulating the adsorption of a peptide or protein and obtaining quantitative estimates of thermodynamic observables remains challenging for many reasons. One reason is the dearth of molecular scale experimental data available for validating such computational models. We also lack simulation methodologies that effectively address the dual challenges of simulating protein adsorption: overcoming strong surface binding and sampling conformational changes. Unbiased classical simulations do not address either of these challenges. Previous attempts that apply enhanced sampling generally focus on only one of the two issues, leaving the other to chance or brute force computing. To improve our ability to accurately resolve adsorbed protein orientation and conformational states, we have applied the Parallel Tempering Metadynamics in the Well-Tempered Ensemble (PTMetaD-WTE) method to several explicitly solvated protein/surface systems. We simulated the adsorption behavior of two peptides, LKα14 and LKβ15, onto two self-assembled monolayer (SAM) surfaces with carboxyl and methyl terminal functionalities. PTMetaD-WTE proved effective at achieving rapid convergence of the simulations, whose results elucidated different aspects of peptide adsorption including: binding free energies, side chain orientations, and preferred conformations. We investigated how specific molecular features of the surface/protein interface change the shape of the multidimensional peptide binding free energy landscape. Additionally, we compared our enhanced sampling technique with umbrella sampling and also evaluated three commonly used molecular dynamics force fields.
1985-10-01
excluded, the success rate of elite forces declines to 33 percent. Nevertheless, commando and commando-type warfare possesses a number of advantages: * It...operations took place. When these two operations are excluded, the rate of success of elite forces declines significantly (to 33 percent). Commando units...102-103. 1°. -53- (68) Operation Aztec : attack on Jorge do Limpopo, Mapai, and Madulo Pan, Mozambique, May/June 1977: Cross-border operation
Afghanistan: Key Oversight Issues
2013-02-01
2012. Afghan Security : Renewed Sharing of Biometric Data Could Strengthen U.S. Efforts to Protect U.S. Personnel from Afghan Security Force Attacks...SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 59 19a. NAME OF RESPONSIBLE PERSON...Afghanistan’s Security Environment 17 Enclosure II Transition of Lead Security to Afghan Security Forces 19 Enclosure III Future Cost and
Effects of the Boko Haram Insurgency Group in West and Central Africa
2016-06-10
Programme predicted people would eventually run out of 98 Fessy. 99 Yahoo News, “Boko Haram...000-pupils-niger-195800803.html?ref=gs. 100 Ibid. 101 Fessy. 102 Yahoo News, “Boko Haram attacks force 12,000 pupils from Niger schools: UN...Lake Chad.136 135 Yahoo News, “Cameroon Pledges 2,500 Troops for Regional Boko Haram Force,” 14
1987-01-01
its force targets, with 12 Army divi- sions, 15 naval squadrons, 10 air force wings, and two Nike antiaircraft battalions. -7 Equipping the Bundeswehr...replacement of nuclear- armed Nike r-,issiles with conventional Patriot and Roland Air Defen;e Systems that have no offensive capability whatsoever...that would intercept and destroy attacking aircraft penetrating NATO’s air defense missile belts. By 1980, the Nike high-altitude component of the NATO
NASA Technical Reports Server (NTRS)
Johnson, J. L., Jr.; Newsom, W. A.; Satran, D. R.
1980-01-01
The paper presents the results of a recent investigation to determine the effects of wing leading-edge modifications on the high angle-of-attack aerodynamic characteristics of a low-wing general aviation airplane in the Langley Full-Scale Wind Tunnel. The investigation was conducted to provide aerodynamic information for correlation and analysis of flight-test results obtained for the configuration. The wind-tunnel investigation consisted of force and moment measurements, wing pressure measurements, flow surveys, and flow visualization studies utilizing a tuft grid, smoke and nonintrusive mini-tufts which were illuminated by ultra-violet light. In addition to the tunnel scale system which measured overall forces and moments, the model was equipped with an auxiliary strain-gage balance within the left wing panel to measure lift and drag forces on the outer wing panel independent of the tunnel scale system. The leading-edge modifications studied included partial- and full-span leading-edge droop arrangements as well as leading-edge slats.
Unmanned Aerial Vehicles (UAVs): a new tool in counterterrorism operations?
NASA Astrophysics Data System (ADS)
Dörtbudak, Mehmet F.
2015-05-01
Terrorism is not a new phenomenon to the world, yet it remains difficult to define and counter. Countering terrorism requires several measures that must be taken simultaneously; however, counterterrorism strategies of many countries mostly depend on military measures. In the aftermath of the 2001 terrorist attack on the Twin Towers of the World Trade Center, the United States (U.S.) has started and led the campaign of Global War on Terrorism. They have invaded Afghanistan and Iraq and have encountered insurgencies run by terrorist organizations, such as al-Qaeda and its affiliates. The U.S. made the utilization of Air and Space Power very intensively during these operations. In order to implement operations; Intelligence, Surveillance, and Reconnaissance (ISR) assets were used to collect the necessary information. Before the successful insertion of a small number of U.S. Special Operation Force (SOF) teams into Afghanistan, the U.S. Air Force attacked al-Qaeda and Taliban's targets such as infrastructure, airfields, ground forces, command-control facilities etc. As soon as the U.S. troops got on the ground and started to marshal to Kabul, the Air Force supported them by attacking jointly determined targets. The Air Force continued to carry out the missions and played a significant role to achieve the objective of operation during all the time. This is not the only example of utilization of Air and Space Power in counterterrorism and counterinsurgency operations. All around the world, many countries have also made the utilization of Air Power in different missions ranging from ISR to attacking. Thinking that terrorism has a psychological dimension and losing a pilot during operations may result in decreasing the population support to operations, Unmanned Aerial Vehicles (UAVs) started to be used by practitioners and took priority over other assets. Although UAVs have been on the theatre for a long time used for ISR mission in conventional conflicts, with the advent of drones, UAVs have also started to be used for attack missions in counterterrorism operations. In this study, it is aimed to determine whether UAVs are appropriate assets that can be used in counterterrorism operations. The study starts by examining the term terrorism and counterterrorism and discusses the role of the Air and Space Power in counterterrorism operations. After proposing that UAVs are appropriate assets for counterterrorism operations, it continues by explaining types and common usage concepts of UAVs. The advantages and disadvantages of UAVs are put forward from the counterterrorism operations' perspectives. It finally examines the utilization of UAVs in counterterrorism operations. In this context, as much as obtained from open sources, countries' roadmaps, usage concepts, experience, and current structure are examined to determine whether UAVs are appropriate assets in counterterrorism operations. When the advantages of UAVs and the disadvantages of manned systems are analyzed, other findings of our survey will show us that UAVs will be increasingly used in counterterrorism operations
Western Aeronautical Test Range (WATR) Mission Control Gold Room During X-29 Flight
NASA Technical Reports Server (NTRS)
1989-01-01
The mission control Gold room is seen here during a research flight of the X-29 at the Dryden Flight Research Center, Edwards, California. All aspects of a research mission are monitored from one of two of these control rooms at Dryden. Dryden and its control rooms are part of the Western Aeronautical Test Range (WATR). The WATR consists of a highly automated complex of computer controlled tracking, telemetry, and communications systems and control room complexes that are capable of supporting any type of mission ranging from system and component testing, to sub-scale and full-scale flight tests of new aircraft and reentry systems. Designated areas are assigned for spin/dive tests; corridors are provided for low, medium, and high-altitude supersonic flight; and special STOL/VSTOL facilities are available at Ames Moffett and Crows Landing. Special use airspace, available at Edwards, covers approximately twelve thousand square miles of mostly desert area. The southern boundary lies to the south of Rogers Dry Lake, the western boundary lies midway between Mojave and Bakersfield, the northern boundary passes just south of Bishop, and the eastern boundary follows about 25 miles west of the Nevada border except in the northern areas where it crosses into Nevada. Two X-29 aircraft, featuring one of the most unusual designs in aviation history, flew at the Ames-Dryden Flight Research Facility (now the Dryden Flight Research Center, Edwards, California) from 1984 to 1992. The fighter-sized X-29 technology demonstrators explored several concepts and technologies including: the use of advanced composites in aircraft construction; variable-camber wing surfaces; a unique forward- swept wing and its thin supercritical airfoil; strakes; close-coupled canards; and a computerized fly-by-wire flight control system used to maintain control of the otherwise unstable aircraft. Research results showed that the configuration of forward-swept wings, coupled with movable canards, gave pilots excellent control response at angles of attack of up to 45 degrees. During its flight history, the X-29 aircraft flew 422 research missions and a total of 436 missions. Sixty of the research flights were part of the X-29 follow-on 'vortex control' phase. The forward-swept wing of the X-29 resulted in reverse airflow, toward the fuselage rather than away from it, as occurs on the usual aft-swept wing. Consequently, on the forward-swept wing, the ailerons remained unstalled at high angles of attack. This provided better airflow over the ailerons and prevented stalling (loss of lift) at high angles of attack. Introduction of composite materials in the 1970s opened a new field of aircraft construction. It also made possible the construction of the X-29's thin supercritical wing. State-of-the-art composites allowed aeroelastic tailoring which, in turn, allowed the wing some bending but limited twisting and eliminated structural divergence within the flight envelope (i.e. deformation of the wing or the wing breaking off in flight). Additionally, composite materials allowed the wing to be sufficiently rigid for safe flight without adding an unacceptable weight penalty. The X-29 project consisted of two phases plus the follow-on vortex-control phase. Phase 1 demonstrated that the forward sweep of the X-29 wings kept the wing tips unstalled at the moderate angles of attack flown in that phase (a maximum of 21 degrees). Phase I also demonstrated that the aeroelastic tailored wing prevented structural divergence of the wing within the flight envelope, and that the control laws and control-surface effectiveness were adequate to provide artificial stability for an otherwise unstable aircraft. Phase 1 further demonstrated that the X-29 configuration could fly safely and reliably, even in tight turns. During Phase 2 of the project, the X-29, flying at an angle of attack of up to 67 degrees, demonstrated much better control and maneuvering qualities than computational methods and simulation models had predicted . During 120 research flights in this phase, NASA, Air Force, and Grumman project pilots reported the X-29 aircraft had excellent control response to an angle of attack of 45 degrees and still had limited controllability at a 67-degree angle of attack. This controllability at high angles of attack can be attributed to the aircraft's unique forward-swept wing- canard design. The NASA/Air Force-designed high-gain flight control laws also contributed to the good flying qualities. During the Air Force-initiated vortex-control phase, the X-29 successfully demonstrated vortex flow control (VFC). This VFC was more effective than expected in generating yaw forces, especially in high angles of attack where the rudder is less effective. VFC was less effective in providing control when sideslip (wind pushing on the side of the aircraft) was present, and it did little to decrease rocking oscillation of the aircraft. The X-29 vehicle was a single-engine aircraft, 48.1 feet long with a wing span of 27.2 feet. Each aircraft was powered by a General Electric F404-GE-400 engine producing 16,000 pounds of thrust. The program was a joint effort of the Department of Defense's Defense Advanced Research Projects Agency (DARPA), the U.S. Air Force, the Ames-Dryden Flight Research Facility, the Air Force Flight Test Center, and the Grumman Corporation. The program was managed by the Air Force's Wright Laboratory, Wright Patterson Air Force Base, Ohio.
1976-12-01
corrosive attack by both acids and alkali and, in addition, is provided with a special Dynel veil for protection against fluoride attack. 3.1.4...throat region, namely , the entrance, center, and exit. In addition, at each station, the diameters were determined at two angular positions 90° apart. The...characterization test matrix. 3.2.1.1 Rocket Motor Environments Rocket motor environments were based on three advanced MX propellants, namely , * XLDB * HTPB * PEG
2003-12-01
normally develops a very thick skin working in a fighter squadron. The ability of a pilot to give someone grief for stupid remarks or actions is...artillery, and soft- skinned vehicles) as we could find. As AFACs, Dirt and I were to locate, identify, and attack these mobile targets. The entire package...ground. This made them lethal weapons against the soft- skinned vehicles we were attacking, as well as any troops within 100 yards of the im- pact area
Aerodynamic Analysis of Morphing Blades
NASA Astrophysics Data System (ADS)
Harris, Caleb; Macphee, David; Carlisle, Madeline
2016-11-01
Interest in morphing blades has grown with applications for wind turbines and other aerodynamic blades. This passive control method has advantages over active control methods such as lower manufacturing and upkeep costs. This study has investigated the lift and drag forces on individual blades with experimental and computational analysis. The goal has been to show that these blades delay stall and provide larger lift-to-drag ratios at various angles of attack. Rigid and flexible airfoils were cast from polyurethane and silicone respectively, then lift and drag forces were collected from a load cell during 2-D testing in a wind tunnel. Experimental data was used to validate computational models in OpenFOAM. A finite volume fluid-structure-interaction solver was used to model the flexible blade in fluid flow. Preliminary results indicate delay in stall and larger lift-to-drag ratios by maintaining more optimal angles of attack when flexing. Funding from NSF REU site Grant EEC 1358991 is greatly appreciated.
Cyber Friendly Fire: Research Challenges for Security Informatics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.
This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a system’s topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components thatmore » comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF— including both training concepts and suggestions for decision aids and visualization approaches—are discussed.« less
NASA Technical Reports Server (NTRS)
Allen, E. C.; Hamilton, T.
1974-01-01
Experimental aerodynamic investigations were conducted on a .004 scale model (34-OTS) orbiter, external tank, and solid rocket booster combined as an integrated vehicle in the NASA/MSFC 14 x 14 inch trisonic wind tunnel. The primary test objective was to determine the effect of a full length orbiter/external tank fairing on axial force. Secondary objectives were to define the static stability characteristics of the mated vehicle configuration with fairings over a Mach number range of 0.6 thru 4.96. Six component aerodynamic force and moment data were recorded over an angle of attack range from -10 deg to 10 deg at 0 deg sideslip angle and from -10 deg to 10 deg sideslip range at 0 deg and 5 deg angle of attack. Plotted and tabular results are presented herein.
Nonoffensive defense is overrated
DOE Office of Scientific and Technical Information (OSTI.GOV)
Flanagan, S.J.
1988-09-01
Some Western analysts argue that European security would stabilize if nations shifted to forces and doctrines that left them structurally incapable of conducting offensive military actions. Some, including American scholar Gene Sharp, have even called for replacing traditional military forces with plans for civilian-based resistance. Purely defensive postures would be reassuring to neighboring states, all of these theorists say, but such defenses would still be strong enough to defeat an attack if deterrence failed. This defensive-only stance, according to its advocates, is a purer form of deterrence by denial than now exists, since it removes even the possibility of inflictingmore » punishment in retaliation for an attack: it deters only be denying victory. But Mr. Flanagan questions whether such defense actually would serve as a credible deterrent. In addition, the various proposed schemes share some serious weaknesses, which he proceeds to discuss. 5 refs.« less
NASA Astrophysics Data System (ADS)
Portegies Zwart, Simon; Boekholt, Tjarda
2014-04-01
The conservation of energy, linear momentum, and angular momentum are important drivers of our physical understanding of the evolution of the universe. These quantities are also conserved in Newton's laws of motion under gravity. Numerical integration of the associated equations of motion is extremely challenging, in particular due to the steady growth of numerical errors (by round-off and discrete time-stepping and the exponential divergence between two nearby solutions. As a result, numerical solutions to the general N-body problem are intrinsically questionable. Using brute force integrations to arbitrary numerical precision we demonstrate empirically that ensembles of different realizations of resonant three-body interactions produce statistically indistinguishable results. Although individual solutions using common integration methods are notoriously unreliable, we conjecture that an ensemble of approximate three-body solutions accurately represents an ensemble of true solutions, so long as the energy during integration is conserved to better than 1/10. We therefore provide an independent confirmation that previous work on self-gravitating systems can actually be trusted, irrespective of the intrinsically chaotic nature of the N-body problem.
Automatic Design of Digital Synthetic Gene Circuits
Marchisio, Mario A.; Stelling, Jörg
2011-01-01
De novo computational design of synthetic gene circuits that achieve well-defined target functions is a hard task. Existing, brute-force approaches run optimization algorithms on the structure and on the kinetic parameter values of the network. However, more direct rational methods for automatic circuit design are lacking. Focusing on digital synthetic gene circuits, we developed a methodology and a corresponding tool for in silico automatic design. For a given truth table that specifies a circuit's input–output relations, our algorithm generates and ranks several possible circuit schemes without the need for any optimization. Logic behavior is reproduced by the action of regulatory factors and chemicals on the promoters and on the ribosome binding sites of biological Boolean gates. Simulations of circuits with up to four inputs show a faithful and unequivocal truth table representation, even under parametric perturbations and stochastic noise. A comparison with already implemented circuits, in addition, reveals the potential for simpler designs with the same function. Therefore, we expect the method to help both in devising new circuits and in simplifying existing solutions. PMID:21399700
NASA Astrophysics Data System (ADS)
Gómez-Bombarelli, Rafael; Aguilera-Iparraguirre, Jorge; Hirzel, Timothy D.; Ha, Dong-Gwang; Einzinger, Markus; Wu, Tony; Baldo, Marc A.; Aspuru-Guzik, Alán.
2016-09-01
Discovering new OLED emitters requires many experiments to synthesize candidates and test performance in devices. Large scale computer simulation can greatly speed this search process but the problem remains challenging enough that brute force application of massive computing power is not enough to successfully identify novel structures. We report a successful High Throughput Virtual Screening study that leveraged a range of methods to optimize the search process. The generation of candidate structures was constrained to contain combinatorial explosion. Simulations were tuned to the specific problem and calibrated with experimental results. Experimentalists and theorists actively collaborated such that experimental feedback was regularly utilized to update and shape the computational search. Supervised machine learning methods prioritized candidate structures prior to quantum chemistry simulation to prevent wasting compute on likely poor performers. With this combination of techniques, each multiplying the strength of the search, this effort managed to navigate an area of molecular space and identify hundreds of promising OLED candidate structures. An experimentally validated selection of this set shows emitters with external quantum efficiencies as high as 22%.
NASA Astrophysics Data System (ADS)
Müller, Rolf
2011-10-01
Bats have evolved one of the most capable and at the same time parsimonious sensory systems found in nature. Using active and passive biosonar as a major - and often sufficient - far sense, different bat species are able to master a wide variety of sensory tasks under very dissimilar sets of constraints. Given the limited computational resources of the bat's brain, this performance is unlikely to be explained as the result of brute-force, black-box-style computations. Instead, the animals must rely heavily on in-built physics knowledge in order to ensure that all required information is encoded reliably into the acoustic signals received at the ear drum. To this end, bats can manipulate the emitted and received signals in the physical domain: By diffracting the outgoing and incoming ultrasonic waves with intricate baffle shapes (i.e., noseleaves and outer ears), the animals can generate selectivity filters that are joint functions of space and frequency. To achieve this, bats employ structural features such as resonance cavities and diffracting ridges. In addition, some bat species can dynamically adjust the shape of their selectivity filters through muscular actuation.
Proteinortho: detection of (co-)orthologs in large-scale analysis.
Lechner, Marcus; Findeiss, Sven; Steiner, Lydia; Marz, Manja; Stadler, Peter F; Prohaska, Sonja J
2011-04-28
Orthology analysis is an important part of data analysis in many areas of bioinformatics such as comparative genomics and molecular phylogenetics. The ever-increasing flood of sequence data, and hence the rapidly increasing number of genomes that can be compared simultaneously, calls for efficient software tools as brute-force approaches with quadratic memory requirements become infeasible in practise. The rapid pace at which new data become available, furthermore, makes it desirable to compute genome-wide orthology relations for a given dataset rather than relying on relations listed in databases. The program Proteinortho described here is a stand-alone tool that is geared towards large datasets and makes use of distributed computing techniques when run on multi-core hardware. It implements an extended version of the reciprocal best alignment heuristic. We apply Proteinortho to compute orthologous proteins in the complete set of all 717 eubacterial genomes available at NCBI at the beginning of 2009. We identified thirty proteins present in 99% of all bacterial proteomes. Proteinortho significantly reduces the required amount of memory for orthology analysis compared to existing tools, allowing such computations to be performed on off-the-shelf hardware.
Uncovering molecular processes in crystal nucleation and growth by using molecular simulation.
Anwar, Jamshed; Zahn, Dirk
2011-02-25
Exploring nucleation processes by molecular simulation provides a mechanistic understanding at the atomic level and also enables kinetic and thermodynamic quantities to be estimated. However, whilst the potential for modeling crystal nucleation and growth processes is immense, there are specific technical challenges to modeling. In general, rare events, such as nucleation cannot be simulated using a direct "brute force" molecular dynamics approach. The limited time and length scales that are accessible by conventional molecular dynamics simulations have inspired a number of advances to tackle problems that were considered outside the scope of molecular simulation. While general insights and features could be explored from efficient generic models, new methods paved the way to realistic crystal nucleation scenarios. The association of single ions in solvent environments, the mechanisms of motif formation, ripening reactions, and the self-organization of nanocrystals can now be investigated at the molecular level. The analysis of interactions with growth-controlling additives gives a new understanding of functionalized nanocrystals and the precipitation of composite materials. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Clustering biomolecular complexes by residue contacts similarity.
Rodrigues, João P G L M; Trellet, Mikaël; Schmitz, Christophe; Kastritis, Panagiotis; Karaca, Ezgi; Melquiond, Adrien S J; Bonvin, Alexandre M J J
2012-07-01
Inaccuracies in computational molecular modeling methods are often counterweighed by brute-force generation of a plethora of putative solutions. These are then typically sieved via structural clustering based on similarity measures such as the root mean square deviation (RMSD) of atomic positions. Albeit widely used, these measures suffer from several theoretical and technical limitations (e.g., choice of regions for fitting) that impair their application in multicomponent systems (N > 2), large-scale studies (e.g., interactomes), and other time-critical scenarios. We present here a simple similarity measure for structural clustering based on atomic contacts--the fraction of common contacts--and compare it with the most used similarity measure of the protein docking community--interface backbone RMSD. We show that this method produces very compact clusters in remarkably short time when applied to a collection of binary and multicomponent protein-protein and protein-DNA complexes. Furthermore, it allows easy clustering of similar conformations of multicomponent symmetrical assemblies in which chain permutations can occur. Simple contact-based metrics should be applicable to other structural biology clustering problems, in particular for time-critical or large-scale endeavors. Copyright © 2012 Wiley Periodicals, Inc.
DOE Office of Scientific and Technical Information (OSTI.GOV)
von Lilienfeld-Toal, Otto Anatole
2010-11-01
The design of new materials with specific physical, chemical, or biological properties is a central goal of much research in materials and medicinal sciences. Except for the simplest and most restricted cases brute-force computational screening of all possible compounds for interesting properties is beyond any current capacity due to the combinatorial nature of chemical compound space (set of stoichiometries and configurations). Consequently, when it comes to computationally optimizing more complex systems, reliable optimization algorithms must not only trade-off sufficient accuracy and computational speed of the models involved, they must also aim for rapid convergence in terms of number of compoundsmore » 'visited'. I will give an overview on recent progress on alchemical first principles paths and gradients in compound space that appear to be promising ingredients for more efficient property optimizations. Specifically, based on molecular grand canonical density functional theory an approach will be presented for the construction of high-dimensional yet analytical property gradients in chemical compound space. Thereafter, applications to molecular HOMO eigenvalues, catalyst design, and other problems and systems shall be discussed.« less
Enhanced optical alignment of a digital micro mirror device through Bayesian adaptive exploration
NASA Astrophysics Data System (ADS)
Wynne, Kevin B.; Knuth, Kevin H.; Petruccelli, Jonathan
2017-12-01
As the use of Digital Micro Mirror Devices (DMDs) becomes more prevalent in optics research, the ability to precisely locate the Fourier "footprint" of an image beam at the Fourier plane becomes a pressing need. In this approach, Bayesian adaptive exploration techniques were employed to characterize the size and position of the beam on a DMD located at the Fourier plane. It couples a Bayesian inference engine with an inquiry engine to implement the search. The inquiry engine explores the DMD by engaging mirrors and recording light intensity values based on the maximization of the expected information gain. Using the data collected from this exploration, the Bayesian inference engine updates the posterior probability describing the beam's characteristics. The process is iterated until the beam is located to within the desired precision. This methodology not only locates the center and radius of the beam with remarkable precision but accomplishes the task in far less time than a brute force search. The employed approach has applications to system alignment for both Fourier processing and coded aperture design.
NASA Technical Reports Server (NTRS)
Kuchemann, Dietrich; Weber, Johanna
1952-01-01
The dependence of the maximum incremental velocities and air forces on a circular cowling on the mass flow and the angle of attack of the oblique flow is determined with the aid of pressure-distribution measurements. The particular cowling tested had been partially investigated in NACA TM 1327.
The DTIC Review, Urban Warfare. Volume 4, Number 4
1999-08-01
International Committee of the Red Cross (ICRC), Handbook on the Law of War for Armed Forces, by Frederic de Mulinen (Geneva: International Committee of the Red...or developing logistical stabilizing force within a volatile region - or as Cupporfornatng oravopng logistica demonstration of US political...attack. It can be described as an in combat formations. After seizing the objec- arrow or dagger thrust into the enemy de -in ombt frmaion
Training and Advising Foreign Militaries: We’ve Done This Before
2010-05-10
by Mao Tse -tung, Chinese Nationalist forces needed arms, equipment and training. Following the attack on Pearl Harbor, Roosevelt moved quickly to...Nationalist forces against the Japanese invaders. Simultaneously, Chaing was involved in a civil war with Mao Tse -tung’s Communist Army. Although...1931, the Communist established a 54 Ibid., 8-10. 16 Government with Mao Tse -tung as its Chairman. This began the internal struggles between
Space Theory and Strategy: War From the High Ground Down
2016-06-01
offset to the American Vietnam experience culminating in the American Apollo 11 moon- landing mission in 1969. The Space Race to the Moon paved a...satellite would indicate a clear escalation in violence based on contextual tensions. A blinding laser or radio frequency jamming attack on a...Down 51 characterize, geolocate, and report radio frequency interference is another version of prepositioning space forces.10 Show of force
NASA Technical Reports Server (NTRS)
Abdrashitov, G.
1943-01-01
An approximate theory of buffeting is here presented, based on the assumption of harmonic disturbing forces. Two cases of buffeting are considered: namely, for a tail angle of attack greater and less than the stalling angle, respectively. On the basis of the tests conducted and the results of foreign investigators, a general analysis is given of the nature of the forced vibrations the possible load limits on the tail, and the methods of elimination of buffeting.
Air and Space Power Journal. Volume 29, Number 4. July-August 2015
2015-08-01
Afghanistan, and Pakistan. It is incredibly difficult to prevent these attacks when the most explicit strategies are reactive ex post facto military...Editor, Strategic Studies Quarterly Air Force Research Institute Dr. Grant T. Hammond USAF Center for Strategy and Technology Dr. Dale L. Hayden Air Force...of War Studies at King’s College London, researches nonproliferation, terrorism, and US security policy. He observes that deterrence strategies
Journal of Special Operations Medicine. Volume 11, Edition 1, Winter 2011
2011-01-01
encephalitis, Japanese encephalitis (in Asia) or encephalitis from other herpes viruses. Meningitis, especially if caused by tubercu- losis, may have a...recovering from economic depression. He avoided pre-war hype. Following the attack of Japanese forces against U.S. forces at Pearl Harbor, he...radio, and in literature and cinema . The focal point of understanding presented by the au- thor offers contemporary readers insight into wartime
Efficient Web Vulnerability Detection Tool for Sleeping Giant-Cross Site Request Forgery
NASA Astrophysics Data System (ADS)
Parimala, G.; Sangeetha, M.; AndalPriyadharsini, R.
2018-04-01
Now day’s web applications are very high in the rate of usage due to their user friendly environment and getting any information via internet but these web applications are affected by lot of threats. CSRF attack is one of the serious threats to web applications which is based on the vulnerabilities present in the normal web request and response of HTTP protocol. It is hard to detect but hence still it is present in most of the existing web applications. In CSRF attack, without user knowledge the unwanted actions on a reliable websites are forced to happen. So it is placed in OWASP’s top 10 Web Application attacks list. My proposed work is to do a real time scan of CSRF vulnerability attack in given URL of the web applications as well as local host address for any organization using python language. Client side detection of CSRF is depended on Form count which is presented in that given web site.
An attack aimed at active phase compensation in one-way phase-encoded QKD systems
NASA Astrophysics Data System (ADS)
Dong, Zhao-Yue; Yu, Ning-Na; Wei, Zheng-Jun; Wang, Jin-Dong; Zhang, Zhi-Ming
2014-08-01
Phase drift is an inherent problem in one-way phase-encoded quantum key distribution (QKD) systems. Although combining passive with active phase compensation (APC) processes can effectively compensate for the phase drift, the security problems brought about by these processes are rarely considered. In this paper, we point out a security hole in the APC process and put forward a corresponding attack scheme. Under our proposed attack, the quantum bit error rate (QBER) of the QKD can be close to zero for some conditions. However, under the same conditions the ratio r of the key "0" and the key "1" which Bob (the legal communicators Alice and Bob) gets is no longer 1:1 but 2:1, which may expose Eve (the eavesdropper). In order to solve this problem, we modify the resend strategy of the attack scheme, which can force r to reach 1 and the QBER to be lower than the tolerable QBER.
NASA Technical Reports Server (NTRS)
Capone, Francis J.; Bare, E. Ann
1987-01-01
The aeropropulsive characteristics of an advanced twin-engine fighter aircraft designed for supersonic cruise have been studied in the Langley 16-Foot Tansonic Tunnel and the Lewis 10- by 10-Foot Supersonic Tunnel. The objective was to determine multiaxis control-power characteristics from thrust vectoring. A two-dimensional convergent-divergent nozzle was designed to provide yaw vector angles of 0, -10, and -20 deg combined with geometric pitch vector angles of 0 and 15 deg. Yaw thrust vectoring was provided by yaw flaps located in the nozzle sidewalls. Roll control was obtained from differential pitch vectoring. This investigation was conducted at Mach numbers from 0.20 to 2.47. Angle of attack was varied from 0 to about 19 deg, and nozzle pressure ratio was varied from about 1 (jet off) to 28, depending on Mach number. Increments in force or moment coefficient that result from pitch or yaw thrust vectoring remain essentially constant over the entire angle-of-attack range of all Mach numbers tested. There was no effect of pitch vectoring on the lateral aerodynamic forces and moments and only very small effects of yaw vectoring on the longitudinal aerodynamic forces and moments. This result indicates little cross-coupling of control forces and moments for combined pitch-yaw vectoring.
Ground reaction force characteristics of Tai Chi push hand.
Chang, Yao-Ting; Chang, Jia-Hao; Huang, Chen-Fu
2014-01-01
Push Hand is an advanced training technique for the Yang-style old frame 108 forms Tai Chi Chuan. It is performed by two practitioners. To clarify how people use forces during Push Hand training, it is important to review the ground reaction force (GRF). Here, we quantify the characteristics of the GRF during Push Hand training. Kinematic data and GRF data from 10 Tai Chi Chuan practitioners (29.9 ± 7.87 years) were synchronously recorded using a three-dimensional motion analysis system (200 frames · s(-1)) and three-dimensional force plates (1000 Hz). The resultant GRF for both feet for the 0%, 50% and 100% phases of attack and defence were compared to body weight using a paired-samples t-test. The differences in the resultant GRF between the 0%, 50% and 100% phases of attack and defence were tested by one-way repeated-measures ANOVA. The significance level was set to 0.05. The total resultant GRF was almost equal to the participant's body weight in push hand. This result was consistent throughout the entire push hand process. Our results revealed that the GRF was comparable to the body weight, implying that practitioners do not push or resist their opponents during the push hand process.
NASA Technical Reports Server (NTRS)
Curry, R. E.; Sim, A. G.
1984-01-01
A low-speed flight investigation has provided total force and moment coefficients and aeroelastic effects for the AD-1 oblique-wing research airplane. The results were interpreted and compared with predictions that were based on wind tunnel data. An assessment has been made of the aeroelastic wing bending design criteria. Lateral-directional trim requirements caused by asymmetry were determined. At angles of attack near stall, flow visualization indicated viscous flow separation and spanwise vortex flow. These effects were also apparent in the force and moment data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martín-Alcántara, A.; Fernandez-Feria, R.; Sanmiguel-Rojas, E.
The thrust efficiency of a two-dimensional heaving airfoil is studied computationally for a low Reynolds number using a vortex force decomposition. The auxiliary potentials that separate the total vortex force into lift and drag (or thrust) are obtained analytically by using an elliptic airfoil. With these auxiliary potentials, the added-mass components of the lift and drag (or thrust) coefficients are also obtained analytically for any heaving motion of the airfoil and for any value of the mean angle of attack α. The contributions of the leading- and trailing-edge vortices to the thrust during their down- and up-stroke evolutions are computedmore » quantitatively with this formulation for different dimensionless frequencies and heave amplitudes (St{sub c} and St{sub a}) and for several values of α. Very different types of flows, periodic, quasi-periodic, and chaotic described as St{sub c}, St{sub a}, and α, are varied. The optimum values of these parameters for maximum thrust efficiency are obtained and explained in terms of the interactions between the vortices and the forces exerted by them on the airfoil. As in previous numerical and experimental studies on flapping flight at low Reynolds numbers, the optimum thrust efficiency is reached for intermediate frequencies (St{sub c} slightly smaller than one) and a heave amplitude corresponding to an advance ratio close to unity. The optimal mean angle of attack found is zero. The corresponding flow is periodic, but it becomes chaotic and with smaller average thrust efficiency as |α| becomes slightly different from zero.« less
ERIC Educational Resources Information Center
Vocke, David E.; Foran, James V.
2017-01-01
With the teaching profession under attack from political, social, and economic forces, what is attracting individuals to seek out careers in education? Sort out the facts from the biases with evidence to guide your informed, thoughtful decision about teaching as a viable career option.
Defense.gov Special Report: Travels with Panetta - May 2012
Pakistan on Safe Havens The United States is reaching the limits of its patience with Pakistan serving as a safe haven for terrorists attacking American forces in Afghanistan, U.S. Defense Secretary Leon E
Wheel climb derailment criteria for evaluation of rail vehicle safety
DOT National Transportation Integrated Search
1984-01-01
Criteria for evaluating safety of rail vehicles with respect to wheel climb derailment are reviewed. The relationship between flanging wheel lateral to veritical force ratio at impending derailment and angle of attack, lateral velocity and longitudin...
Influence of polymer additive on flow past a hydrofoil: A numerical study
NASA Astrophysics Data System (ADS)
Xiong, Yongliang; Peng, Sai; Yang, Dan; Duan, Juan; Wang, Limin
2018-01-01
Flows of dilute polymer solutions past a hydrofoil (NACA0012) are examined by direct numerical simulation to investigate the modification of the wake pattern due to the addition of polymer. The influence of polymer additive is modeled by the FENE-P model in order to simulate a non-linear modulus of elasticity and a finite extendibility of the polymer macromolecules. Simulations were carried out at a Reynolds number of 1000 with the angle of attack varying from 0° to 20°. The results show that the influence of polymer on the flow behavior of the flow past a hydrofoil exhibits different flow regimes. In general, the addition of polymer modifies the wake patterns for all angles of attack in this study. Consequently, both drag and lift forces are changed as the Weissenberg number increases while the drag of the hydrofoil is enhanced at small angles of attack and reduced at large angles of attack. As the Weissenberg number increases, two attached recirculation bubbles or two columns of shedding vortices downstream tend to be symmetric, and the polymer tends to make the flow less sensitive to the variation of the angle of attack.
Risk assessment for physical and cyber attacks on critical infrastructures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.
2005-08-01
Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results ofmore » a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.« less
Shuttle Orbiter Contingency Abort Aerodynamics: Real-Gas Effects and High Angles of Attack
NASA Technical Reports Server (NTRS)
Prabhu, Dinesh K.; Papadopoulos, Periklis E.; Davies, Carol B.; Wright, Michael J.; McDaniel, Ryan D.; Venkatapathy, Ethiraj; Wercinski, Paul F.
2005-01-01
An important element of the Space Shuttle Orbiter safety improvement plan is the improved understanding of its aerodynamic performance so as to minimize the "black zones" in the contingency abort trajectories [1]. These zones are regions in the launch trajectory where it is predicted that, due to vehicle limitations, the Orbiter will be unable to return to the launch site in a two or three engine-out scenario. Reduction of these zones requires accurate knowledge of the aerodynamic forces and moments to better assess the structural capability of the vehicle. An interesting aspect of the contingency abort trajectories is that the Orbiter would need to achieve angles of attack as high as 60deg. Such steep attitudes are much higher than those for a nominal flight trajectory. The Orbiter is currently flight certified only up to an angle of attack of 44deg at high Mach numbers and has never flown at angles of attack larger than this limit. Contingency abort trajectories are generated using the data in the Space Shuttle Operational Aerodynamic Data Book (OADB) [2]. The OADB, a detailed document of the aerodynamic environment of the current Orbiter, is primarily based on wind-tunnel measurements (over a wide Mach number and angle-of-attack range) extrapolated to flight conditions using available theories and correlations, and updated with flight data where available. For nominal flight conditions, i.e., angles of attack of less than 45deg, the fidelity of the OADB is excellent due to the availability of flight data. However, at the off-nominal conditions, such as would be encountered on contingency abort trajectories, the fidelity of the OADB is less certain. The primary aims of a recent collaborative effort (completed in the year 2001) between NASA and Boeing were to determine: 1) accurate distributions of pressure and shear loads on the Orbiter at select points in the contingency abort trajectory space; and 2) integrated aerodynamic forces and moments for the entire vehicle and the control surfaces (body flap, speed brake, and elevons). The latter served the useful purpose of verification of the aerodynamic characteristics that went into the generation of the abort trajectories.
Department of Defense Annual Report to Congress on Defense Acquisition Challenge Program for FY 2006
2007-06-01
Synthetic Instrument Measurement and Stimulus System – Improves aircraft avionics and electronic attack pod testing to expedite repair of critical...integration into CIWS • Navy requirement Cancelled / Not procured Air Force (4 Projects) • Quiet Eyes • On Aircraft (B-2) Laser Additive...System • Met Requirement/Rolled into FY07 Cost Effective Light Aircraft Missile Protect DAC for Army, Navy and Air Force helicopters • Did Not
Aerodynamic side-force alleviator means
NASA Technical Reports Server (NTRS)
Rao, D. M. (Inventor)
1980-01-01
An apparatus for alleviating high angle of attack side force on slender pointed cylindrical forebodies such as fighter aircraft, missiles and the like is described. A symmetrical pair of helical separation trips was employed to disrupt the leeside vortices normally attained. The symmetrical pair of trips starts at either a common point or at space points on the upper surface of the forebody and extends along separate helical paths along the circumference of the forebody.
Operations Odyssey Dawn and Unified Protector: Another Win for Warden s Theory
2014-12-04
Gortney’s response was clear, “they were mechanized positions and they were advancing on Benghazi. And so to protect the Libyan people we took them under ...them under attack.” Targeting the fielded forces played a primary role in protecting the Libyan people. Coalition fighter aircraft targeted... protection of civilians, with the major limitation of prohibiting foreign ground forces from the operations. Because of this limitation, airpower was the
The Battle of Attu and the Aleutian Island Campaign
2014-05-22
minutes. The Americans, however, had quickly relocated to high ground above Holtz Bay. Colonel Hartl called for a barrage of naval gunfire from the...destroyer Phelps followed by close air support from the aircraft carrier Nassau. Hartl pushed Northern Force uphill through heavy gunfire attacking the...Northern Force was able to drive the enemy back. Hartl sent a message to General Brown stating, “Have captured last high ground before West Arm of
Aeroelastic Tailoring with Composites Applied to Forward Swept Wings
1981-11-01
M AIR FORCE SYSTEMS COMMAND J 9 1982 , S- WRIGHT-PATTERSON AIR FORCE BASE, OHIO 45433 K 82 06 09 036 NOTICE When Govervomnant drawing, specifications...orients these materials in optimum directions. In a paper presented at the 1975 AIAA Aircraft Systems and Technology Meeting, Krone analytically...ith slope of load versus angle of attack lines 0 fiber angle (usually angle under study) viii SECTION I INTRODUCTION "When a weapon system is compared
Joint Force Quarterly. Number 30, Spring 2002
2002-05-01
Armed Forces COL Timothy S. Heinemann, USA ■ U.S. Army Command and General Staff College CAPT Chester E. Helms, USN ■ Naval War College COL Paul...have dramatically improved the way U.S. Central Command has been able to fight the war, includ- ing the shortening of sensor-to- shooter decision...When revealed, slowness in the sensor-controller- shooter sequence often gave them enough time to relocate [and hide] before attacks began.” With
Technology Strategy in Irregular Warfare: High-Tech Versus Right-Tech
2015-12-01
ny-countys-confiscated-gun-policy/. 88 newest AH-64E. It has upgraded engines and rotor blades that enable the attack helicopter to have a quicker...was the extent of their defensive operations. Aircraft, helicopter gunships, armored vehicles, and artillery were directly used by Soviet forces...it into raw numbers, the Soviet Air Force had approximately 6,894 fixed-wing aircraft, and 3,320 helicopters .126 The Soviet Army had five times
From Fog to Friction: The Impact of Network-Enabled Command and Control on Operational Leadership
2012-05-04
Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC...decision-making of operational commanders, affecting their ability to manage the operational level of war. An increasing reliance on NEC2 has...picture (COP) provides the operational commander the ability to coordinate and manage a truly joint force. During OIF, ground forces under attack had
Predicting climate change: Uncertainties and prospects for surmounting them
NASA Astrophysics Data System (ADS)
Ghil, Michael
2008-03-01
General circulation models (GCMs) are among the most detailed and sophisticated models of natural phenomena in existence. Still, the lack of robust and efficient subgrid-scale parametrizations for GCMs, along with the inherent sensitivity to initial data and the complex nonlinearities involved, present a major and persistent obstacle to narrowing the range of estimates for end-of-century warming. Estimating future changes in the distribution of climatic extrema is even more difficult. Brute-force tuning the large number of GCM parameters does not appear to help reduce the uncertainties. Andronov and Pontryagin (1937) proposed structural stability as a way to evaluate model robustness. Unfortunately, many real-world systems proved to be structurally unstable. We illustrate these concepts with a very simple model for the El Niño--Southern Oscillation (ENSO). Our model is governed by a differential delay equation with a single delay and periodic (seasonal) forcing. Like many of its more or less detailed and realistic precursors, this model exhibits a Devil's staircase. We study the model's structural stability, describe the mechanisms of the observed instabilities, and connect our findings to ENSO phenomenology. In the model's phase-parameter space, regions of smooth dependence on parameters alternate with rough, fractal ones. We then apply the tools of random dynamical systems and stochastic structural stability to the circle map and a torus map. The effect of noise with compact support on these maps is fairly intuitive: it is the most robust structures in phase-parameter space that survive the smoothing introduced by the noise. The nature of the stochastic forcing matters, thus suggesting that certain types of stochastic parametrizations might be better than others in achieving GCM robustness. This talk represents joint work with M. Chekroun, E. Simonnet and I. Zaliapin.
Chemical reactions induced by oscillating external fields in weak thermal environments
NASA Astrophysics Data System (ADS)
Craven, Galen T.; Bartsch, Thomas; Hernandez, Rigoberto
2015-02-01
Chemical reaction rates must increasingly be determined in systems that evolve under the control of external stimuli. In these systems, when a reactant population is induced to cross an energy barrier through forcing from a temporally varying external field, the transition state that the reaction must pass through during the transformation from reactant to product is no longer a fixed geometric structure, but is instead time-dependent. For a periodically forced model reaction, we develop a recrossing-free dividing surface that is attached to a transition state trajectory [T. Bartsch, R. Hernandez, and T. Uzer, Phys. Rev. Lett. 95, 058301 (2005)]. We have previously shown that for single-mode sinusoidal driving, the stability of the time-varying transition state directly determines the reaction rate [G. T. Craven, T. Bartsch, and R. Hernandez, J. Chem. Phys. 141, 041106 (2014)]. Here, we extend our previous work to the case of multi-mode driving waveforms. Excellent agreement is observed between the rates predicted by stability analysis and rates obtained through numerical calculation of the reactive flux. We also show that the optimal dividing surface and the resulting reaction rate for a reactive system driven by weak thermal noise can be approximated well using the transition state geometry of the underlying deterministic system. This agreement persists as long as the thermal driving strength is less than the order of that of the periodic driving. The power of this result is its simplicity. The surprising accuracy of the time-dependent noise-free geometry for obtaining transition state theory rates in chemical reactions driven by periodic fields reveals the dynamics without requiring the cost of brute-force calculations.
Hildenbrandt, Hanno
2018-01-01
The peregrine falcon Falco peregrinus is renowned for attacking its prey from high altitude in a fast controlled dive called a stoop. Many other raptors employ a similar mode of attack, but the functional benefits of stooping remain obscure. Here we investigate whether, when, and why stooping promotes catch success, using a three-dimensional, agent-based modeling approach to simulate attacks of falcons on aerial prey. We simulate avian flapping and gliding flight using an analytical quasi-steady model of the aerodynamic forces and moments, parametrized by empirical measurements of flight morphology. The model-birds’ flight control inputs are commanded by their guidance system, comprising a phenomenological model of its vision, guidance, and control. To intercept its prey, model-falcons use the same guidance law as missiles (pure proportional navigation); this assumption is corroborated by empirical data on peregrine falcons hunting lures. We parametrically vary the falcon’s starting position relative to its prey, together with the feedback gain of its guidance loop, under differing assumptions regarding its errors and delay in vision and control, and for three different patterns of prey motion. We find that, when the prey maneuvers erratically, high-altitude stoops increase catch success compared to low-altitude attacks, but only if the falcon’s guidance law is appropriately tuned, and only given a high degree of precision in vision and control. Remarkably, the optimal tuning of the guidance law in our simulations coincides closely with what has been observed empirically in peregrines. High-altitude stoops are shown to be beneficial because their high airspeed enables production of higher aerodynamic forces for maneuvering, and facilitates higher roll agility as the wings are tucked, each of which is essential to catching maneuvering prey at realistic response delays. PMID:29649207
Enhancing U.S. Defenses Against Terrorist Air Attacks
2004-01-01
effort between military and civilian organizations. The U.S. Air Force, law enforcement authorities, the Federal Aviation Administration, airport ... security personnel, and many other agencies share responsibility for closing gaps in our national air defenses and for preventing and foiling future
NASA Technical Reports Server (NTRS)
Lee-Rausch, Elizabeth M.; Batina, John T.
1993-01-01
A conical Euler code was developed to study unsteady vortex-dominated flows about rolling, highly swept delta wings undergoing either forced motions or free-to-roll motions that include active roll suppression. The flow solver of the code involves a multistage, Runge-Kutta time-stepping scheme that uses a cell-centered, finite-volume, spatial discretization of the Euler equations on an unstructured grid of triangles. The code allows for the additional analysis of the free to-roll case by simultaneously integrating in time the rigid-body equation of motion with the governing flow equations. Results are presented for a delta wing with a 75 deg swept, sharp leading edge at a free-stream Mach number of 1.2 and at 10 deg, 20 deg, and 30 deg angle of attack alpha. At the lower angles of attack (10 and 20 deg), forced-harmonic analyses indicate that the rolling-moment coefficients provide a positive damping, which is verified by free-to-roll calculations. In contrast, at the higher angle of attack (30 deg), a forced-harmonic analysis indicates that the rolling-moment coefficient provides negative damping at the small roll amplitudes. A free-to-roll calculation for this case produces an initially divergent response, but as the amplitude of motion grows with time, the response transitions to a wing-rock type of limit cycle oscillation, which is characteristic of highly swept delta wings. This limit cycle oscillation may be actively suppressed through the use of a rate-feedback control law and antisymmetrically deflected leading-edge flaps. Descriptions of the conical Euler flow solver and the free-to roll analysis are included in this report. Results are presented that demonstrate how the systematic analysis of the forced response of the delta wing can be used to predict the stable, neutrally stable, and unstable free response of the delta wing. These results also give insight into the flow physics associated with unsteady vortical flows about delta wings undergoing forced motions and free-to-roll motions, including the active suppression of the wing-rock type phenomenon. The conical Euler methodology developed is directly extend able to three-dimensional calculations.
Rotary Balance Wind Tunnel Testing for the FASER Flight Research Aircraft
NASA Technical Reports Server (NTRS)
Denham, Casey; Owens, D. Bruce
2016-01-01
Flight dynamics research was conducted to collect and analyze rotary balance wind tunnel test data in order to improve the aerodynamic simulation and modeling of a low-cost small unmanned aircraft called FASER (Free-flying Aircraft for Sub-scale Experimental Research). The impetus for using FASER was to provide risk and cost reduction for flight testing of more expensive aircraft and assist in the improvement of wind tunnel and flight test techniques, and control laws. The FASER research aircraft has the benefit of allowing wind tunnel and flight tests to be conducted on the same model, improving correlation between wind tunnel, flight, and simulation data. Prior wind tunnel tests include a static force and moment test, including power effects, and a roll and yaw damping forced oscillation test. Rotary balance testing allows for the calculation of aircraft rotary derivatives and the prediction of steady-state spins. The rotary balance wind tunnel test was conducted in the NASA Langley Research Center (LaRC) 20-Foot Vertical Spin Tunnel (VST). Rotary balance testing includes runs for a set of given angular rotation rates at a range of angles of attack and sideslip angles in order to fully characterize the aircraft rotary dynamics. Tests were performed at angles of attack from 0 to 50 degrees, sideslip angles of -5 to 10 degrees, and non-dimensional spin rates from -0.5 to 0.5. The effects of pro-spin elevator and rudder deflection and pro- and anti-spin elevator, rudder, and aileron deflection were examined. The data are presented to illustrate the functional dependence of the forces and moments on angle of attack, sideslip angle, and angular rate for the rotary contributions to the forces and moments. Further investigation is necessary to fully characterize the control effectors. The data were also used with a steady state spin prediction tool that did not predict an equilibrium spin mode.
ERIC Educational Resources Information Center
Meier, Deborah
2009-01-01
In this article, the author talks about Ted Sizer and describes him as a "schoolman," a Mr. Chips figure with all the romance that surrounded that image. Accustomed to models of brute power, parents, teachers, bureaucrats, and even politicians were attracted to his message of common decency. There's a way of talking about, and to, school people…
Individual Choice and Unequal Participation in Higher Education
ERIC Educational Resources Information Center
Voigt, Kristin
2007-01-01
Does the unequal participation of non-traditional students in higher education indicate social injustice, even if it can be traced back to individuals' choices? Drawing on luck egalitarian approaches,this article suggests that an answer to this question must take into account the effects of unequal brute luck on educational choices. I use a…
NASA Technical Reports Server (NTRS)
Hall, Robert M.; Erickson, Gary E.; Fox, Charles H., Jr.; Banks, Daniel W.; Fisher, David F.
1998-01-01
A subsonic study of high-angle-of-attack gritting strategies was undertaken with a 0.06-scale model of the F/A-18, which was assumed to be typical of airplanes with smooth-sided forebodies. This study was conducted in the Langley 7- by 10-Foot High-Speed Tunnel and was intended to more accurately simulate flight boundary layer characteristics on the model in the wind tunnel than would be possible by using classical, low-angle-of-attack gritting on the fuselage. Six-component force and moment data were taken with an internally mounted strain-gauge balance, while pressure data were acquired by using electronically scanned pressure transducers. Data were taken at zero sideslip over an angle-of-attack range from 0 deg to 40 deg and, at selected angles of attack, over sideslip angles from -10 deg to 10 deg. Free-stream Mach number was fixed at 0.30, which resulted in a Reynolds number, based on mean aerodynamic chord, of 1.4 x 10(exp 6). Pressure data measured over the forebody and leading-edge extensions are compared to similar pressure data taken by a related NASA flight research program by using a specially instrumented F/A-18, the High-Alpha Research Vehicle (HARV). Preliminary guidelines for high-angle-of-attack gritting strategies are given.
A method for estimating the rolling moment due to spin rate for arbitrary planform wings
NASA Technical Reports Server (NTRS)
Poppen, W. A., Jr.
1985-01-01
The application of aerodynamic theory for estimating the force and moments acting upon spinning airplanes is of interest. For example, strip theory has been used to generate estimates of the aerodynamic characteristics as a function of spin rate for wing-dominated configurations for angles of attack up to 90 degrees. This work, which had been limited to constant chord wings, is extended here to wings comprised of tapered segments. Comparison of the analytical predictions with rotary balance wind tunnel results shows that large discrepancies remain, particularly for those angles-of-attack greater than 40 degrees.
Metz: Offensive, Deliberate Attack, MOUT (Military Operations on Urbanized Terrain)
1984-05-23
OPPOSING FORCES: US: 3d Army 377th Inf XX Corps 378th Inf 5th Inf Div 379th Inf 90th Inf Div 320th Eng Cbt Bn 95th Inf Div 10th Inf 10th Armored Div 11th...Panzer Bde SYNOPSIS: US XX Corps encircled and reduced Metz as a preliminary for continued attack east by 3d US Army. Excellent example of a Corps...crossings in the north. The 3d Cavalry Regiment also played a major role in combat and in the Corps& deception schemes prior to the battle. The XII
NASA Technical Reports Server (NTRS)
Runckel, Jack F.; Hieser, Gerald
1961-01-01
An investigation has been conducted at the Langley 16-foot transonic tunnel to determine the loading characteristics of flap-type ailerons located at inboard, midspan, and outboard positions on a 45 deg. sweptback-wing-body combination. Aileron normal-force and hinge-moment data have been obtained at Mach numbers from 0.80 t o 1.03, at angles of attack up to about 27 deg., and at aileron deflections between approximately -15 deg. and 15 deg. Results of the investigation indicate that the loading over the ailerons was established by the wing-flow characteristics, and the loading shapes were irregular in the transonic speed range. The spanwise location of the aileron had little effect on the values of the slope of the curves of hinge-moment coefficient against aileron deflection, but the inboard aileron had the greatest value of the slope of the curves of hinge-moment coefficient against angle of attack and the outboard aileron had the least. Hinge-moment and aileron normal-force data taken with strain-gage instrumentation are compared with data obtained with pressure measurements.
NASA Technical Reports Server (NTRS)
Pinier, Jeremy T.; Erickson, Gary E.; Paulson, John W.; Tomek, William G.; Bennett, David W.; Blevins, John A.
2015-01-01
A 1.75% scale force and moment model of the Space Launch System was tested in the NASA Langley Research Center 14- by 22-Foot Subsonic Wind Tunnel to quantify the aerodynamic forces that will be experienced by the launch vehicle during its liftoff and transition to ascent flight. The test consisted of two parts: the first was dedicated to measuring forces and moments for the entire range of angles of attack (0deg to 90deg) and roll angles (0 deg. to 360 deg.). The second was designed to measure the aerodynamic effects of the liftoff tower on the launch vehicle for ground winds from all azimuthal directions (0 deg. to 360 deg.), and vehicle liftoff height ratios from 0 to 0.94. This wind tunnel model also included a set of 154 surface static pressure ports. Details on the experimental setup, and results from both parts of testing are presented, along with a description of how the wind tunnel data was analyzed and post-processed in order to develop an aerodynamic database. Finally, lessons learned from experiencing significant dynamics in the mid-range angles of attack due to steady asymmetric vortex shedding are presented.
Vibrational analysis of vertical axis wind turbine blades
NASA Astrophysics Data System (ADS)
Kapucu, Onur
The goal of this research is to derive a vibration model for a vertical axis wind turbine blade. This model accommodates the affects of varying relative flow angle caused by rotating the blade in the flow field, uses a simple aerodynamic model that assumes constant wind speed and constant rotation rate, and neglects the disturbance of wind due to upstream blade or post. The blade is modeled as elastic Euler-Bernoulli beam under transverse bending and twist deflections. Kinetic and potential energy equations for a rotating blade under deflections are obtained, expressed in terms of assumed modal coordinates and then plugged into Lagrangian equations where the non-conservative forces are the lift and drag forces and moments. An aeroelastic model for lift and drag forces, approximated with third degree polynomials, on the blade are obtained assuming an airfoil under variable angle of attack and airflow magnitudes. A simplified quasi-static airfoil theory is used, in which the lift and drag coefficients are not dependent on the history of the changing angle of attack. Linear terms on the resulting equations of motion will be used to conduct a numerical analysis and simulation, where numeric specifications are modified from the Sandia-17m Darrieus wind turbine by Sandia Laboratories.
[A five-year-old girl with epilepsy showing forced normalization due to zonisamide].
Hirose, Mieko; Yokoyama, Hiroyuki; Haginoya, Kazuhiro; Iinuma, Kazuie
2003-05-01
A case of forced normalization in childhood is presented. When zonisamide was administered to a five-year-old girl with intractable epilepsy, disappearance of seizures was accompanied by severe psychotic episodes such as communication disturbance, personal relationship failure, and stereotyped behavior, which continued after the withdrawal of zonisamide. These symptoms gradually improved by administration of fluvoxamine, however epileptic attacks reappeared. Although most patients with forced normalization are adult and teenager, attention should be paid to this phenomenon as adverse psychotic effects of zonisamide even in young children. Fluvoxamine may be effective for the symptoms.
1988-01-01
principle of introducing an international force, he had to discuss it with Maj. Gen. Tran Van Minh and Maj. Gen. Nguyen Van Thieu of the Armed Forces...from it within 2 days. Another attack in August on the camp at Duc Co was beaten back, largely by 280 tactical strike sorties. The final major enemy... Duc Co CORPS Nha Trang [3 CORPS Cam Ranh Bay Loc Ninh - 0 operation )’ Elp 4’Wng Vl pTo _fongN Ar0 ofPrloqe Cnfonat AttleMlbaroorroourdr ar Bate 138
Adaptive accelerated ReaxFF reactive dynamics with validation from simulating hydrogen combustion.
Cheng, Tao; Jaramillo-Botero, Andrés; Goddard, William A; Sun, Huai
2014-07-02
We develop here the methodology for dramatically accelerating the ReaxFF reactive force field based reactive molecular dynamics (RMD) simulations through use of the bond boost concept (BB), which we validate here for describing hydrogen combustion. The bond order, undercoordination, and overcoordination concepts of ReaxFF ensure that the BB correctly adapts to the instantaneous configurations in the reactive system to automatically identify the reactions appropriate to receive the bond boost. We refer to this as adaptive Accelerated ReaxFF Reactive Dynamics or aARRDyn. To validate the aARRDyn methodology, we determined the detailed sequence of reactions for hydrogen combustion with and without the BB. We validate that the kinetics and reaction mechanisms (that is the detailed sequences of reactive intermediates and their subsequent transformation to others) for H2 oxidation obtained from aARRDyn agrees well with the brute force reactive molecular dynamics (BF-RMD) at 2498 K. Using aARRDyn, we then extend our simulations to the whole range of combustion temperatures from ignition (798 K) to flame temperature (2998K), and demonstrate that, over this full temperature range, the reaction rates predicted by aARRDyn agree well with the BF-RMD values, extrapolated to lower temperatures. For the aARRDyn simulation at 798 K we find that the time period for half the H2 to form H2O product is ∼538 s, whereas the computational cost was just 1289 ps, a speed increase of ∼0.42 trillion (10(12)) over BF-RMD. In carrying out these RMD simulations we found that the ReaxFF-COH2008 version of the ReaxFF force field was not accurate for such intermediates as H3O. Consequently we reoptimized the fit to a quantum mechanics (QM) level, leading to the ReaxFF-OH2014 force field that was used in the simulations.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Villarreal, Oscar D.; Yu, Lili; Department of Laboratory Medicine, Yancheng Vocational Institute of Health Sciences, Yancheng, Jiangsu 224006
Computing the ligand-protein binding affinity (or the Gibbs free energy) with chemical accuracy has long been a challenge for which many methods/approaches have been developed and refined with various successful applications. False positives and, even more harmful, false negatives have been and still are a common occurrence in practical applications. Inevitable in all approaches are the errors in the force field parameters we obtain from quantum mechanical computation and/or empirical fittings for the intra- and inter-molecular interactions. These errors propagate to the final results of the computed binding affinities even if we were able to perfectly implement the statistical mechanicsmore » of all the processes relevant to a given problem. And they are actually amplified to various degrees even in the mature, sophisticated computational approaches. In particular, the free energy perturbation (alchemical) approaches amplify the errors in the force field parameters because they rely on extracting the small differences between similarly large numbers. In this paper, we develop a hybrid steered molecular dynamics (hSMD) approach to the difficult binding problems of a ligand buried deep inside a protein. Sampling the transition along a physical (not alchemical) dissociation path of opening up the binding cavity- -pulling out the ligand- -closing back the cavity, we can avoid the problem of error amplifications by not relying on small differences between similar numbers. We tested this new form of hSMD on retinol inside cellular retinol-binding protein 1 and three cases of a ligand (a benzylacetate, a 2-nitrothiophene, and a benzene) inside a T4 lysozyme L99A/M102Q(H) double mutant. In all cases, we obtained binding free energies in close agreement with the experimentally measured values. This indicates that the force field parameters we employed are accurate and that hSMD (a brute force, unsophisticated approach) is free from the problem of error amplification suffered by many sophisticated approaches in the literature.« less
ERIC Educational Resources Information Center
Berland, Jody
2009-01-01
Chronic fatigue syndrome/myalgic encephalomyelitis (CFE/ME) is an invisible disability that forces researchers to delineate new boundaries between illness and impairment, and between medical knowledge and patients' experience. As a neurological impairment, this condition attacks memory and cognition, which paradoxically become the focus of…
Joint Transformation and the Decision to Use Force
2007-03-09
and visitors necessary for detecting terrorists. Business interests would oppose the cost increases associated with restricting the international...Channels: The Inteligence Community; Drug Plant Attack on Target, Says CIA Chief,” The Washington Post, 21 October 1999 [database on-line]; available from
31 CFR Appendix A to Part 558 - Executive Order 13664
Code of Federal Regulations, 2014 CFR
2014-07-01
... any civilians through the commission of acts of violence (including killing, maiming, torture, or rape or other sexual violence), abduction, forced displacement, or attacks on schools, hospitals... stability of South Sudan and the surrounding region, including widespread violence and atrocities, human...
Independent Assessment of the Afghan National Security Forces
2014-02-01
of operational objectives for the ANSF that support the U.S. policy goal in Afghanistan through 2018 ; con- ducted a troop-to-task analysis of ANSF...stability in the 2015– 2018 timeframe than it is now. The insurgency has been considerably weakened since the surge of U.S. and NATO forces in 2009, but...conduct high-profile attacks in Kabul and other urban areas, and gain leverage for reconciliation negotiations. In 2016– 2018 , once the insurgency has
The Vulnerabilities of Unmanned Aircraft System Common Data Links to Electronic Attack
2010-06-11
jamming, radar acquisition, and radar tracking (US Joint Forces Command 2009b, 101). Electromagnetic Interference ( EMI ). Any electromagnetic...has a range of up to 125 kilometers, and can remain airborne for up to 6 hours (see figure 6). The Shadow 200 is launched using a trailer mounted...disruption by EMI and friendly EW jamming systems. Second, FM 3-04.115 is the only publication that addresses counter-UAS threats and how enemy forces may
Neural cryptography with feedback.
Ruttor, Andreas; Kinzel, Wolfgang; Shacham, Lanir; Kanter, Ido
2004-04-01
Neural cryptography is based on a competition between attractive and repulsive stochastic forces. A feedback mechanism is added to neural cryptography which increases the repulsive forces. Using numerical simulations and an analytic approach, the probability of a successful attack is calculated for different model parameters. Scaling laws are derived which show that feedback improves the security of the system. In addition, a network with feedback generates a pseudorandom bit sequence which can be used to encrypt and decrypt a secret message.
Air Warfare and Air Base Defense 1914-1973
1988-01-01
ground commanders diluted German efforts. Rommel described the prob- lem in organizational terms: " One thing that worked very seriously against us was...exerted severe pressure on the Marines. Japanese attempts at reinforcing their garri - son were constant and could be defeated only by air attacks on the...and in many cases pure chance that favors one side over the other. In response to a request by the Air Force Director of Plans, the Office of Air Force
Biplanes and Bombsights, British Bombing in World War I
1999-05-01
each started at 1.35 and 10.40 a.m. respectively to bomb the Chemical Works at LUDWIGSHAFEN (MANNHEIM). One machine was forced to return to its...teams and German officials, material results were incommensurate with effort. Nor did material results at German munitions and chemical works entirely...city do not include the 41st Wing day mission of 14 January 1918.159 Newall’s force attacked enemy munitions and chemical tar- gets on four occasions
NASA Astrophysics Data System (ADS)
Zamuraev, V. P.; Kalinina, A. P.
2017-10-01
Forced high-frequency vibrations of the airfoil surface part with the amplitude almost equal to the sound velocity can change significantly the lift force of the symmetric profile streamlined at zero angle of attack. The oscillation consists of two harmonics. The ratio of harmonics frequencies values is equal to 2. The present work shows that the aerodynamic properties depend significantly on the specific energy contribution of each frequency.
Mechanotransduction, asthma, and airway smooth muscle
Fabry, Ben; Fredberg, Jeffrey J.
2008-01-01
Excessive force generation by airway smooth muscle is the main culprit in excessive airway narrowing during an asthma attack. The maximum force the airway smooth muscle can generate is exquisitely sensitive to muscle length fluctuations during breathing, and is governed by complex mechanotransduction events that can best be studied by a hybrid approach in which the airway wall is modeled in silico so as to set a dynamic muscle load comparable to that experienced in vivo. PMID:18836522
Jemaah Islamiyah: Reevaluating the Most Dangerous Terrorist Threat in Southeast Asia
2010-12-01
why some terrorist groups last longer than others, namely “ideological motivation , economic conditions, regime type, the size of groups, and/or the...States Air Force, RAND Corporation and Project Air Force (U.S.), The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a...in 2003 and 2004, then shifted tactics from car bombs to backpack bombs for their 2005 and 2009 attacks.58 Their operatives received safe haven and
2008-05-28
OVERWORKED , YOUNG, HOMOGENOUS, & MACHO TO FULFILL THE UNCONVENTIONAL DEMANDS OF THE LONG WAR? SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR...U.S. Joint Special Operations Forces: Two Few, Overworked , Young, Homogenous & Macho to Fulfill the Unconventional Demands of the Long War? 5a...to be the targets of nearly daily mortar, improvised explosive devices (IEDs), and occasional suicide vehicle-borne IED (SVBIED) attacks. It
Combat Pair: The Evolution of Air Force-Navy Integration in Strike Warfare
2007-01-01
Rear Admiral David Buss , USN, at the time Commanding Officer of USS John C. Stennis, for freely sharing his time during our three-day visit despite...These points were further affirmed by the combined force mari - time component commander (CFMCC) in Enduring Freedom, Vice Admiral Charles Moore, Jr...attack, the Navy’s Arleigh Burke -class destroyer USS Higgins on station in the North Arabian Gulf served as a tactical ballistic missile early
The Validity of Conventional Assumptions Concerning Flexible Response
1989-01-01
could hold until reinforcements arrive. A Soviet attack on NATO would be met by a NATO covering force, consisting largely of armoured cavalry forma...inter- diction of the follow-on forces. Air Defense Under [.resent NATO operational concepts, most aircraft capa- ble of fighting alr-to-air will be...existing Nike and Hercules units by 1990--two years early to save money. The result is critical gaps in defense of English Channel ports. (29:36) Follow-on
Bolster Ground Force Capabilities in the Asia-Pacific Region
2016-05-12
territory in Asia. As Sun Tzu stated, “Thus, what is of supreme importance in war is to attack the enemy’s strategy.” 25 Bolstered USPACOM ground force...THOUGHTS As Sun Tzu observed, the pinnacle of military strategy is to subdue the enemy and win without fighting. 54 China appears to be applying...Concept, Offshore Control, and Deterrence by Denial,” 40. 25. Sun Tzu , Art of War, trans. Samuel B. Griffith (Oxford, UK: Oxford University Press
Seizing the Lodgment: Forcible Entry Lessons from Panama and the Falklands
2016-05-10
combat power long before the initiation of hostilities. The Army began deployment of additional troops in early 1989 as part of Operation Nimrod ...Dancer, an effort to bolster existing US forces in Panama in response to instability. As part of Nimrod Dancer, the Army deployed an additional brigade...90 1) Task Force Atlantic. 7th Infantry Division elements stationed in Panama as part of Operation Nimrod Dancer. Attacked H-hour targets north of
Numerical Simulation of Forced and Free-to-Roll Delta-Wing Motions
NASA Technical Reports Server (NTRS)
Chaderjian, Neal M.; Schiff, Lewis B.
1996-01-01
The three-dimensional, Reynolds-averaged, Navier-Stokes (RANS) equations are used to numerically simulate nonsteady vortical flow about a 65-deg sweep delta wing at 30-deg angle of attack. Two large-amplitude, high-rate, forced-roll motions, and a damped free-to-roll motion are presented. The free-to-roll motion is computed by coupling the time-dependent RANS equations to the flight dynamic equation of motion. The computed results are in good agreement with the forces, moments, and roll-angle time histories. Vortex breakdown is present in each case. Significant time lags in the vortex breakdown motions relative to the body motions strongly influence the dynamic forces and moments.
Unsteady aerodynamics of a pitching-flapping-perturbed revolving wing at low Reynolds number
NASA Astrophysics Data System (ADS)
Chen, Long; Wu, Jianghao; Zhou, Chao; Hsu, Shih-Jung; Cheng, Bo
2018-05-01
Due to adverse viscous effects, revolving wings suffer universally from low efficiency at low Reynolds number (Re). By reciprocating wing revolving motion, natural flyers flying at low Re successfully exploit unsteady effects to augment force production and efficiency. Here we investigate the aerodynamics of an alternative, i.e., a revolving wing with concomitant unsteady pitching and vertical flapping perturbations (a pitching-flapping-perturbed revolving wing). The current work builds upon a previous study on flapping-perturbed revolving wings (FP-RWs) and focuses on combined effects of pitching-flapping perturbation on force generation and vortex behaviors. The results show that, compared with a FR-RW, pitching motion further (1) reduces the external driving torque for rotating at 0° angle of attack (α0) and (2) enhances lift and leads to a self-rotating equilibrium at α0 = 20°. The power loading of a revolving wing at α0 = 20° can be improved using pitching-flapping perturbations with large pitching amplitude but small Strouhal number. Additionally, an advanced pitching improves the reduction of external driving torque, whereas a delayed pitching weakens both the lift enhancement and the reduction of external driving torque. Further analysis shows that pitching effects can be mainly decomposed into the Leading-Edge-Vortex (LEV)-mediated pressure component and geometric projection component, together they determine the force performance. LEV circulation is found to be determined by the instantaneous effective angle of attack but could be affected asymmetrically between upstroke and downstroke depending on the nominal angle of attack. Pitching-flapping perturbation thus can potentially inspire novel mechanisms to improve the aerodynamic performance of rotary wing micro air vehicles.
Analysis of Physical Collisions in Elite National Rugby League Match Play.
Cummins, Cloe; Orr, Rhonda
2015-09-01
To investigate the impact forces of collision events during both attack and defense in elite rugby league match play and to compare the collision profiles between playing positions. 26 elite rugby league players. Player collisions were recorded using an integrated accelerometer in global positioning system units (SPI-Pro X, GPSports). Impact forces of collisions in attack (hit-ups) and defense (tackles) were analyzed from 359 files from outside backs (n = 78), adjustables (n = 97), wide-running forwards (n = 136), and hit-up forwards (n = 48) over 1 National Rugby League season. Hit-up forwards were involved in 0.8 collisions/min, significantly more than all other positional groups (wide-running forwards P = .050, adjustables P = .042, and outside backs P = .000). Outside backs experienced 25% fewer collisions per minute than hit-up forwards. Hit-up forwards experienced a collision within the 2 highest classifications of force (≥ 10 g) every 2.5 min of match play compared with 1 every 5 and 9 min for adjustables and outside backs, respectively. Hit-up forwards performed 0.5 tackles per minute of match play, 5 times that of outside backs (ES = 1.90; 95% CI [0.26,3.16]), and 0.2 hit-ups per minute of match play, twice as many as adjustables. During a rugby league match, players are exposed to a significant number of collision events. Positional differences exist, with hit-up and wide-running forwards experiencing greater collision events than adjustables and outside backs. Although these results may be unique to the individual team's defensive- and attacking-play strategies, they are indicative of the significant collision profiles in professional rugby league.
Conical Euler simulation and active suppression of delta wing rocking motion
NASA Technical Reports Server (NTRS)
Lee, Elizabeth M.; Batina, John T.
1990-01-01
A conical Euler code was developed to study unsteady vortex-dominated flows about rolling highly-swept delta wings, undergoing either forced or free-to-roll motions including active roll suppression. The flow solver of the code involves a multistage Runge-Kutta time-stepping scheme which uses a finite volume spatial discretization of the Euler equations on an unstructured grid of triangles. The code allows for the additional analysis of the free-to-roll case, by including the rigid-body equation of motion for its simultaneous time integration with the governing flow equations. Results are presented for a 75 deg swept sharp leading edge delta wing at a freestream Mach number of 1.2 and at alpha equal to 10 and 30 deg angle of attack. A forced harmonic analysis indicates that the rolling moment coefficient provides: (1) a positive damping at the lower angle of attack equal to 10 deg, which is verified in a free-to-roll calculation; (2) a negative damping at the higher angle of attack equal to 30 deg at the small roll amplitudes. A free-to-roll calculation for the latter case produces an initially divergent response, but as the amplitude of motion grows with time, the response transitions to a wing-rock type of limit cycle oscillation. The wing rocking motion may be actively suppressed, however, through the use of a rate-feedback control law and antisymmetrically deflected leading edge flaps. The descriptions of the conical Euler flow solver and the free-to-roll analysis are presented. Results are also presented which give insight into the flow physics associated with unsteady vortical flows about forced and free-to-roll delta wings, including the active roll suppression of this wing-rock phenomenon.
NASA Technical Reports Server (NTRS)
Bradley, D.; Ellis, R. R.
1972-01-01
A 0.00227-scale parametric model of an LMSC/MSFC water recoverable booster was tested in the MSFC 14 x 14-inch trisonic wind tunnel. The purpose of the test was to obtain high angle of attack force and static stability data which could be used by MSFC in preliminary design and aerodynamic trade studies. These data were obtained using six-component internal strain gauge balances. One hundred forty-four different geometrical combinations were possible as all model parts were interchangeable (three nose cones, three cylinder lengths, four flare sections and three sets of fins, plus a no-fin case in combination with the other components). However, due to tunnel occupancy limitations, only the most representative combinations were tested. All configurations investigated were tested at Mach 1.96, 2.74 and 4.96 with data obtained at angles of attack from 50 degrees to 90 degrees and at angles of sideslip from -10 degrees to +10 degrees (at an angle of attack of 60 degrees).
NASA Astrophysics Data System (ADS)
Levchuk, Georgiy
2016-05-01
The cyber spaces are increasingly becoming the battlefields between friendly and adversary forces, with normal users caught in the middle. Accordingly, planners of enterprise defensive policies and offensive cyber missions alike have an essential goal to minimize the impact of their own actions and adversaries' attacks on normal operations of the commercial and government networks. To do this, the cyber analysis need accurate "cyber battle maps", where the functions, roles, and activities of individual and groups of devices and users are accurately identified. Most of the research in cyber exploitation has focused on the identification of attacks, attackers, and their devices. Many tools exist for device profiling, malware identification, user attribution, and attack analysis. However, most of the tools are intrusive, sensitive to data obfuscation, or provide anomaly flagging and not able to correctly classify the semantics and causes of network activities. In this paper, we review existing solutions that can identify functional and social roles of entities in cyberspace, discuss their weaknesses, and propose an approach for developing functional and social layers of cyber battle maps.
An experimental investigation of the internal methane pressure in hydrogen attack
NASA Technical Reports Server (NTRS)
Natan, M.; Johnson, H. H.
1983-01-01
An experimental investigation of the internal methane pressure that is the driving force for bubble growth in hydrogen attack (HA) was done on pure iron (204 ppm C) and on two low carbon steels of slightly different compositions. The methane content N (c.c gas/g. material) in attacked specimens was measured by a vacuum extraction technique. The total void volume V (c.c) was determined from density measurements before and after HA exposure. The two values, N and V, were then used in an equation of state to calculate an average methane pressure P for the attack stages beyond a density loss (d.l.) greater than 0.05 pct. It was determined that N and P depend on hydrogen exposure conditions and the presence of traces of strong carbide forming alloying elements (in steel). They are independent of specimen size and grain size over a limited range. P varies as the bubble volume increases, showing a generally decreasing trend which brings it to values lower than calculated equilibrium pressures, although well within the same order of magnitude. Possible reasons for this behavior are discussed.
NASA Astrophysics Data System (ADS)
Lubarsky, Gennady V.; Lemoine, Patrick; Meenan, Brian J.; Deb, Sanjukta; Mutreja, Isha; Carolan, Patrick; Petkov, Nikolay
2014-04-01
A hydrazine deproteination process was used to investigate the role of enamel proteins in the acid erosion of mature human dental enamel. Bright field high resolution transmission electron micrographs and x-ray diffraction analysis show no crystallographic changes after the hydrazine treatment with similar nanoscale hydroxyapatite crystallite size and orientation for sound and de-proteinated enamel. However, the presence of enamel proteins reduces the erosion depth, the loss of hardness and the loss of structural order in enamel, following exposure to citric acid. Nanoindentation creep is larger for sound enamel than for deproteinated enamel but it reduces in sound enamel after acid attack. These novel results are consistent with calcium ion-mediated visco-elasticty in enamel matrix proteins as described previously for nacre, bone and dental proteins. They are also in good agreement with a previous double layer force spectroscopy study by the authors which found that the proteins electrochemically buffer enamel against acid attack. Finally, this suggests that acid attack, and more specifically dental erosion, is influenced by ionic permeation through the enamel layer and that it is mitigated by the enamel protein matrix.
NASA Technical Reports Server (NTRS)
Debevoise, J. M.; Mcginnis, R. F.
1972-01-01
Force tests on a 0.0035-scale model of the General Dynamics/Convair space shuttle B-15B-1 booster were conducted in the MSFC trisonic wind tunnel during February and March 1971. Longitudinal and lateral characteristics were obtained at Mach numbers from 0.6 to 4.96. The configuration tested had a low delta wing, all-movable canard controls of delta planform, and a single vertical tail. Most of the test was devoted to obtaining data relevant to the transition from atmospheric reentry to subsonic cruise. In that portion of the test the angles of attack ranged from 6 degrees to 60 degrees, and yaw runs were made at angles of attack of 15 and 35 degrees. The rest of the test was devoted to obtaining booster-alone buildup data relevant to the launch phase. For the launch phase, the Mach number range was from 0.6 to 2.0, the angles of attack were from -10 to +10 degrees, and yaw runs were made at zero angle of attack.
Testbed-based Performance Evaluation of Attack Resilient Control for AGC
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Sridhar, Siddharth; McKinnon, Archibald D.
The modern electric power grid is a complex cyber-physical system whose reliable operation is enabled by a wide-area monitoring and control infrastructure. This infrastructure, supported by an extensive communication backbone, enables several control applications functioning at multiple time scales to ensure the grid is maintained within stable operating limits. Recent events have shown that vulnerabilities in this infrastructure may be exploited to manipulate the data being exchanged. Such a scenario could cause the associated control application to mis-operate, potentially causing system-wide instabilities. There is a growing emphasis on looking beyond traditional cybersecurity solutions to mitigate such threats. In this papermore » we perform a testbed-based validation of one such solution - Attack Resilient Control (ARC) - on Iowa State University's \\textit{PowerCyber} testbed. ARC is a cyber-physical security solution that combines domain-specific anomaly detection and model-based mitigation to detect stealthy attacks on Automatic Generation Control (AGC). In this paper, we first describe the implementation architecture of the experiment on the testbed. Next, we demonstrate the capability of stealthy attack templates to cause forced under-frequency load shedding in a 3-area test system. We then validate the performance of ARC by measuring its ability to detect and mitigate these attacks. Our results reveal that ARC is efficient in detecting stealthy attacks and enables AGC to maintain system operating frequency close to its nominal value during an attack. Our studies also highlight the importance of testbed-based experimentation for evaluating the performance of cyber-physical security and control applications.« less
Establishing a Cyber Warrior Force
2004-09-01
Cyber Warfare is widely touted to be the next generation of warfare. As America’s reliance on automated systems and information technology increases...so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare . Historically
Report of the Defense Science Board Task Force On Information Warfare - Defense (IW-D)
1996-11-01
pathogens. Partnerships NCID provides epidemiological, microbiologic , and consultative services to federal agencies, state and local health departments...FOR DETECTING LOCAL OR LARGE-SCALE ATTACKS, AND FOR ADAPTATION TO SUPPORT GRACEFUL DEGRADATION * TESi •BEDS AND SIMULATION-BASED MECHANISMS FOR
Experimental Verification of the Theory of Oscillating Airfoils
NASA Technical Reports Server (NTRS)
Silverstein, Abe; Joyner, Upshur T
1939-01-01
Measurements have been made of the lift on an airfoil in pitching oscillation with a continuous-recording, instantaneous-force balance. The experimental values for the phase difference between the angle of attack and the lift are shown to be in close agreement with theory.
The Megabyte Will Always Get Through
2012-05-17
Curry , the commander of the Army Air Forces Tactical School, wanted the school at Maxwell Field to be a “clearing house where tactical ideas can flow...intelligence, spy satellites, drone aircraft, and manned bombers, could identify the target. This cyber attack once more demonstrated “the
Reforming the Madrassah System of Education in Pakistan
ERIC Educational Resources Information Center
Inamullah, Hafiz Muhammad; Hifazatullah, Hafiz; Sarwar, Muhammad; Khan, Naeemullah; Sultan, Khalid
2010-01-01
The unfortunate attacks of 9/11 forced the government to reform madrassah education programs. The aim of this article is to discuss the reform and its results and points of view, as well as the reaction of the Islamic seminaries toward these madrassah reforms.
Confronting the Neo-Liberal Brute: Reflections of a Higher Education Middle-Level Manager
ERIC Educational Resources Information Center
Maistry, S. M.
2012-01-01
The higher education scenario in South Africa is fraught with tensions and contradictions. Publicly funded Higher Education Institutions (HEIs) face a particular dilemma. They are expected to fulfill a social mandate which requires a considered response to the needs of the communities in which they are located while simultaneously aspiring for…
Analysis of simple 2-D and 3-D metal structures subjected to fragment impact
NASA Technical Reports Server (NTRS)
Witmer, E. A.; Stagliano, T. R.; Spilker, R. L.; Rodal, J. J. A.
1977-01-01
Theoretical methods were developed for predicting the large-deflection elastic-plastic transient structural responses of metal containment or deflector (C/D) structures to cope with rotor burst fragment impact attack. For two-dimensional C/D structures both, finite element and finite difference analysis methods were employed to analyze structural response produced by either prescribed transient loads or fragment impact. For the latter category, two time-wise step-by-step analysis procedures were devised to predict the structural responses resulting from a succession of fragment impacts: the collision force method (CFM) which utilizes an approximate prediction of the force applied to the attacked structure during fragment impact, and the collision imparted velocity method (CIVM) in which the impact-induced velocity increment acquired by a region of the impacted structure near the impact point is computed. The merits and limitations of these approaches are discussed. For the analysis of 3-d responses of C/D structures, only the CIVM approach was investigated.
Tests of a 1/7-Scale Semispan Model of the XB-35 Airplane in the Langley 19-Foot Pressure Tunnel
NASA Technical Reports Server (NTRS)
Teplitz, Jerome; Kayten, Gerald G.; Cancro, Patrick A.
1946-01-01
A 1/7 scale semispan model of the XB-35 airplane was tested in the Langley 10 foot pressure tunnel, primarily for the purpose of investigating the effectiveness of a leading-edge slot for alleviation of stick-fixed longitudinal instability at high angles of attack caused by early tip stalling and a device for relief of stick-free instability caused by elevon up-floating tendencies at high angles of attack. Results indicated that the slot was not adequate to provide the desired improvement in stick-fixed stability. The tab-flipper device provided improvement in stick-free stability abd two of the linkage combinations tested gave satisfactory variations of control force with airspeed for all conditions except that in which the wing-tip "pitch-control" flap was fully deflected. However, the improvement in control force characteristics was accompanied by a detrimental effect on stick-fixed stability because of the pitching moments produced by the elevon tab deflection.
NASA Technical Reports Server (NTRS)
Bradley, D.
1972-01-01
A 0.015-scale model of a modified version of the MDAC space shuttle booster was tested to obtain force, static stability, and control effectiveness data. The objective of this test was the reduction of cruise (M = 0.4) base drag by the use of base flaps, base vents, elevon deflection and base flow from a plenum mounted forward of the base heat shield. Transonic data were also obtained to determine the aerodynamic characteristics of the new base shape. Six component aerodynamic force and moment data were recorded over an angle of attack range from 4 deg to 20 deg at 0 deg sideslip and over a sideslip range from -6 deg to 6 deg at 0 deg, 6 deg and 15 deg angle of attack. Mach number varied from 0.4 to 1.10 at a constant R of 2 million per unit length.
Numerical analysis of tangential slot blowing on a generic chined forebody
NASA Technical Reports Server (NTRS)
Agosta, Roxana M.
1994-01-01
A numerical study is performed to investigate the effects of tangential slot blowing on a generic chined forebody. The Reynolds-averaged, thin-layer, Navier-Stokes equations are solved to obtain the high-angle-of-attack viscous flow field about a generic chined forebody. Tangential slot blowing is investigated as a means of forebody flow control to generate side force and yawing moment on the forebody. The effects of jet mass flow ratios, angle of attack, and blowing slot location in the axial and circumferential directions are studied. The computed results are compared with available wind tunnel experimental data. The solutions with and without blowing are also analyzed using helicity density contours, surface flow patterns, and off-surface instantaneous streamlines. The results of this analysis provide details of the flow field about the generic chined forebody, as well as show that tangential slot blowing can be used as a means of forebody flow control to generate side force and yawing moment.
NASA Technical Reports Server (NTRS)
Iversen, J.; Moghadam, M.
1981-01-01
Forty-six different fins, which were members of twelve plan-form families, were tested. A two dimensional Boeing single element airfoil at an angle of attack of eight degrees and a sweepback angle of thirty-two was used to simulate a portion of the wing of a generator aircraft. Various free stream velocities were used to test any individual fin at its particular angle of attack. While the fin itself was mounted on the upper surface of the generator model, the angle of attack of each fin was varied until stall was reached and/or passed. The relative fin vortex strengths were measured in two ways. First, the maximum angular velocity of a four blade rotor placed in the fin vortex center was measured with the use of a stroboscope. Second, the maximum rolling moment on a following wing model placed in the fin vortex center was measured by a force balance.
NASA Astrophysics Data System (ADS)
Varshney, Kapil; Chang, Song; Wang, Z. Jane
2013-05-01
Falling parallelograms exhibit coupled motion of autogyration and tumbling, similar to the motion of falling tulip seeds, unlike maple seeds which autogyrate but do not tumble, or rectangular cards which tumble but do not gyrate. This coupled tumbling and autogyrating motion are robust, when card parameters, such as aspect ratio, internal angle, and mass density, are varied. We measure the three-dimensional (3D) falling kinematics of the parallelograms and quantify their descending speed, azimuthal rotation, tumbling rotation, and cone angle in each falling. The cone angle is insensitive to the variation of the card parameters, and the card tumbling axis does not overlap with but is close to the diagonal axis. In addition to this connection to the dynamics of falling seeds, these trajectories provide an ideal set of data to analyze 3D aerodynamic force and torque at an intermediate range of Reynolds numbers, and the results will be useful for constructing 3D aerodynamic force and torque models. Tracking these free falling trajectories gives us a nonintrusive method for deducing instantaneous aerodynamic forces. We determine the 3D aerodynamic forces and torques based on Newton-Euler equations. The dynamical analysis reveals that, although the angle of attack changes dramatically during tumbling, the aerodynamic forces have a weak dependence on the angle of attack. The aerodynamic lift is dominated by the coupling of translational and rotational velocities. The aerodynamic torque has an unexpectedly large component perpendicular to the card. The analysis of the Euler equation suggests that this large torque is related to the deviation of the tumbling axis from the principle axis of the card.
Varshney, Kapil; Chang, Song; Wang, Z Jane
2013-05-01
Falling parallelograms exhibit coupled motion of autogyration and tumbling, similar to the motion of falling tulip seeds, unlike maple seeds which autogyrate but do not tumble, or rectangular cards which tumble but do not gyrate. This coupled tumbling and autogyrating motion are robust, when card parameters, such as aspect ratio, internal angle, and mass density, are varied. We measure the three-dimensional (3D) falling kinematics of the parallelograms and quantify their descending speed, azimuthal rotation, tumbling rotation, and cone angle in each falling. The cone angle is insensitive to the variation of the card parameters, and the card tumbling axis does not overlap with but is close to the diagonal axis. In addition to this connection to the dynamics of falling seeds, these trajectories provide an ideal set of data to analyze 3D aerodynamic force and torque at an intermediate range of Reynolds numbers, and the results will be useful for constructing 3D aerodynamic force and torque models. Tracking these free falling trajectories gives us a nonintrusive method for deducing instantaneous aerodynamic forces. We determine the 3D aerodynamic forces and torques based on Newton-Euler equations. The dynamical analysis reveals that, although the angle of attack changes dramatically during tumbling, the aerodynamic forces have a weak dependence on the angle of attack. The aerodynamic lift is dominated by the coupling of translational and rotational velocities. The aerodynamic torque has an unexpectedly large component perpendicular to the card. The analysis of the Euler equation suggests that this large torque is related to the deviation of the tumbling axis from the principle axis of the card.
NASA Technical Reports Server (NTRS)
Nugent, Jack; Pendergraft, Odis C., Jr.
1987-01-01
Afterbody and nozzle pressures measured on a 1/12-scale model and in flight on a twin-jet fighter aircraft were compared as Mach number varied from 0.6 to 1.2, Reynolds number from 17.5 million to 302.5 million, and angle of attack from 1 to 7 deg. At Mach 0.6 and 0.8, nozzle pressure coefficient distributions and nozzle axial force coefficients agreed and showed good recompression. At Mach 0.9 and 1.2, flow complexity caused a loss in recompression for both flight and wind tunnel nozzle data. The flight data exhibited less negative values of pressure coefficient and lower axial force coefficients than did the wind tunnel data. Reynolds number effects were noted only at these Mach numbers. Jet temperature and mass flux ratio did not affect the comparisons of nozzle axial flow coefficient. At subsonic speeds, the levels of pressure coefficient distributions on the upper fuselage and lower nacelle surfaces for flight were less negative than those for the model. The model boundary layer thickness at the aft rake station exceeded that for the forward rake station and increased with increasing angle of attack. The flight boundary layer thickness at the aft rake station was less than that for the forward rake station and decreased with increasing angle of attack.
Testing of the Crew Exploration Vehicle in NASA Langley's Unitary Plan Wind Tunnel
NASA Technical Reports Server (NTRS)
Murphy, Kelly J.; Borg, Stephen E.; Watkins, Anthony N.; Cole, Daniel R.; Schwartz, Richard J.
2007-01-01
As part of a strategic, multi-facility test program, subscale testing of NASA s Crew Exploration Vehicle was conducted in both legs of NASA Langley s Unitary Plan Wind Tunnel. The objectives of these tests were to generate aerodynamic and surface pressure data over a range of supersonic Mach numbers and reentry angles of attack for experimental and computational validation and aerodynamic database development. To provide initial information on boundary layer transition at supersonic test conditions, transition studies were conducted using temperature sensitive paint and infrared thermography optical techniques. To support implementation of these optical diagnostics in the Unitary Wind Tunnel, the experiment was first modeled using the Virtual Diagnostics Interface software. For reentry orientations of 140 to 170 degrees (heat shield forward), windward surface flow was entirely laminar for freestream unit Reynolds numbers equal to or less than 3 million per foot. Optical techniques showed qualitative evidence of forced transition on the windward heat shield with application of both distributed grit and discreet trip dots. Longitudinal static force and moment data showed the largest differences with Mach number and angle of attack variations. Differences associated with Reynolds number variation and/or laminar versus turbulent flow on the heat shield were very small. Static surface pressure data supported the aforementioned trends with Mach number, Reynolds number, and angle of attack.
A New Chief of Staff, a Golden Opportunity: Building the Right Force over the Next Decade
2013-01-01
acquire both light attack and light mobility aircraft that would further its efforts in building partnership capacity ( BPC ). In light of the...contributions to the department’s efforts in both BPC and IW. The document refers to this type of warfare as a struggle for legitimacy and influence...are designed to improve the Air Force’s capabilities in IW and BPC . The Gaps Sections of Headquarters Air Force have outlined excellent plans to
Operational Design: Distilling Clarity from Complexity for Decisive Action
2012-08-01
forces came within six miles of Richmond, the Chickahominy River overflowed its banks and split the Union forces before they could attack. The...key vulnerabilities. The system, controlled by four sector operation centers, consisted of a number of diverse radar systems with limited repair...ec tio n Su st ai nm en t Interdiction Package C4 IIS R Co m ba t Po w er Fo rc e Pr ot ec tio n Su st ai nm en t Maneuver Package C4
Fighting blind: why US Army Divisions Need a Dedicated Reconnaissance and Security Force
2017-05-25
dedicated reconnaissance and security force. By the 2003 invasion of Iraq, 3d Infantry Division employed a division cavalry squadron that integrated...26 1 Introduction 3-7 Cavalry conducted reconnaissance and security tasks ahead of and on the flank of 3d Infantry Division as the...division led Vth Corp’s attack from Kuwait to Baghdad in 2003. 3-7 Cavalry’s movements confused the enemy about 3d Infantry Division’s location and intent
2015-11-09
and intelligence warfighting support. AFSPC operates sensors that provide direct attack warning and assessment to U.S. Strategic Command and North...combinations. AFRL conducted low-speed wind tunnel tests of 9%-scale model completed at NASA Langley Research Center (LaRC); data validated analytical...by $2M across JTAC platforms and expanding mobile device operation usage by 95 hours. The BATMAN-II team also delivered a new wireless mobile
2012-08-16
designed for sophisticated air-to- ground attack capabilities and air-to-air superiority missions, using two crewmembers, a pilot and a weapon systems ...was added to the area of potential ground disturbance. This area comprises a total of 14.08 acres for all projects. As yet undefined infrastructure...upgrades, such as connecting new facilities to water and power systems would also add to the affected areas/ potential area of ground disturbance on
Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
1999-06-01
U.S. and its allies on the battlefield, but a credible threat to employ chemical or biological weapons in pursuit of national objectives would give...injury. 18 Instrumentalities that produce them are weapons. There is little debate about whether the use of chemicals or biologicals falls...282. 50 For an interesting projection of factors likely to affect the use of force in the future, see Anthony D’Amato, Megatrends in the Use of
Lucrative Targets: The U.S. Air Force in the Kuwaiti Theater of Operations
2001-01-01
led initially by Brig. Gen. Frederic N. Buckingham and, after November 11, by Brig. Gen. Edwin E. Tenoso—had the same responsibility for MAC/Commander...117s destroying vital C2 centers and the Navy’s Tomahawk Land Attack Missiles (TLAMs) hitting electrical powerplants, the presidential palace , the Ba‘ath...By the opening of the Iran-Iraq War in September 1980, the Iraqi dictator had increased his elite force to two brigades of palace guards, and during
Navy Force Structure and Shipbuilding Plans: Background and Issues for Congress
2014-08-01
submarines (SSBNs) 12b 12-14b 12b 12b 14 14 14 14 14 Cruise missile submarines (SSGNs) 0c 0-4c 4c 0c 4 4 4 4 2 or 4d Attack submarines ( SSNs ...aircraft carrier 1 1 Virginia ( SSN -774) class attack submarine 2 2 2 2 2 10 Arleigh Burke (DDG-51) class destroyer 2 2 2 2 2 10 Littoral Combat Ship...shows the Navy’s FY2015 30-year (FY2015-FY2044) shipbuilding plan. Table 3. Navy FY2015 30-Year (FY2015-FY2044) Shipbuilding Plan FY CVN LSC SSC SSN
Self-enforcing Private Inference Control
NASA Astrophysics Data System (ADS)
Yang, Yanjiang; Li, Yingjiu; Weng, Jian; Zhou, Jianying; Bao, Feng
Private inference control enables simultaneous enforcement of inference control and protection of users' query privacy. Private inference control is a useful tool for database applications, especially when users are increasingly concerned about individual privacy nowadays. However, protection of query privacy on top of inference control is a double-edged sword: without letting the database server know the content of user queries, users can easily launch DoS attacks. To assuage DoS attacks in private inference control, we propose the concept of self-enforcing private inference control, whose intuition is to force users to only make inference-free queries by enforcing inference control themselves; otherwise, penalty will inflict upon the violating users.
Hypersonic aerothermal characteristics of a manned low finenes ratio shuttle booster
NASA Technical Reports Server (NTRS)
Bernot, P. T.; Throckmorton, D. A.
1972-01-01
An investigation of a winged booster model having canards and an ascent configuration comprised of the booster mounted in tandem with an orbiter model has been conducted at Mach 10.2 in the continuous flow hypersonic tunnel. Longitudinal and lateral directional force characteristics were obtained over angle of attack ranges of -12 deg to 60 deg for the booster and -11 deg to 11 deg for the ascent configuration. Interference heating effects on the booster using the phase-change coating technique were determined at 0 deg angle of attack. Some oil flow photographs of the isolated booster and orbiter and ascent configuration are also presented.
NASA Technical Reports Server (NTRS)
Abbott, Ira H; Sherman, Albert
1938-01-01
A preliminary investigation of the stalling processes of four typical airfoil sections was made over the critical range of the Reynolds Number. Motion pictures were taken of the movements of small silk tufts on the airfoil surface as the angle of attack increased through a range of angles including the stall. The boundary-layer flow also at certain angles of attack was indicated by the patterns formed by a suspension of lampblack in oil brushed onto the airfoil surface. These observations were analyzed together with corresponding force-test measurements to derive a picture of the stalling processes of airfoils.
Parametric Analysis of Airland Combat Model in High Resolution
1988-09-01
continue Fprint MOE, UTILITY matrix figure 10. Flow chart of the advanced model 22 WAVE2 = numeric value (1. 2. or 12) which is supposed to be given by the...model user" if WAVE2 = 1. it will bc a BATTLE I case. and all Red forccs on Av’enue-2 attack to nodc-2S ; if \\VAVE2= 2. it will also be a BATTLE I case...but all Red forces on Aenue-2 attack to node-27 ; if WAVE2 = 12. it will be a BATTLE2 case. These outputs will be analyzed in more detail in the next
78 FR 70540 - Meeting of the National Commission on the Structure of the Air Force
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-26
... information. Agenda: The updated agenda items were: --The role of airpower in the post-Afghanistan national... Superiority, Air Mobility, Global Precision Attack, Nuclear Deterrence Operations, Command and Control... such as modernization readiness, procurement, manpower, research development test and evaluation...
The Vulnerability of the United States Railroad System to Terrorist Attacks
2015-06-12
can also assist during special political and sporting events, and provide humanitarian assistance after major weather events...essential to economic growth―not just for travel and tourism , but also for the mobility of the labor force.253 Many of Russia’s natural resources
Intellectual Freedom: The Censorship War Continues.
ERIC Educational Resources Information Center
Spicola, Rose; Stephens, Carolyn
1989-01-01
Censorship efforts are taking place throughout the country in spite of greater activism among anticensorship forces. One of the alarming trends is that many of the censors are now attacking the curriculum of the schools, challenging textbooks in reading, literature, history, science, health, and social studies. The International Reading…
X-31 Unloading Returning from Paris Air Show
NASA Technical Reports Server (NTRS)
1995-01-01
After being flown in the Paris Air Show in June 1995, the X-31 Enhanced Fighter Maneuverability Technology Demonstrator Aircraft, based at the NASA Dryden Flight Research Center, Edwards Air Force Base, California, is off-loaded from an Air Force Reserve C-5 transport after the ferry flight back to Edwards. At the air show, the X-31 demonstrated the value of using thrust vectoring (directing engine exhaust flow) coupled with advanced flight control systems to provide controlled flight at very high angles of attack. The X-31 Enhanced Fighter Maneuverability (EFM) demonstrator flew at the Ames- Dryden Flight Research Facility, Edwards, California (redesignated the Dryden Flight Research Center in 1994) from February 1992 until 1995 and before that at the Air Force's Plant 42 in Palmdale, California. The goal of the project was to provide design information for the next generation of highly maneuverable fighter aircraft. This program demonstrated the value of using thrust vectoring (directing engine exhaust flow) coupled with an advanced flight control system to provide controlled flight to very high angles of attack. The result was a significant advantage over most conventional fighters in close-in combat situations. The X-31 flight program focused on agile flight within the post-stall regime, producing technical data to give aircraft designers a better understanding of aerodynamics, effectiveness of flight controls and thrust vectoring, and airflow phenomena at high angles of attack. Stall is a condition of an airplane or an airfoil in which lift decreases and drag increases due to the separation of airflow. Thrust vectoring compensates for the loss of control through normal aerodynamic surfaces that occurs during a stall. Post-stall refers to flying beyond the normal stall angle of attack, which in the X-31 was at a 30-degree angle of attack. During Dryden flight testing, the X-31 aircraft established several milestones. On November 6, 1992, the X-31 achieved controlled flight at a 70-degree angle of attack. On April 29, 1993, the second X-31 successfully executed a rapid minimum-radius, 180-degree turn using a post-stall maneuver, flying well beyond the aerodynamic limits of any conventional aircraft. This revolutionary maneuver has been called the 'Herbst Maneuver' after Wolfgang Herbst, a German proponent of using post-stall flight in air-to-air combat. It is also called a 'J Turn' when flown to an arbitrary heading change. The aircraft was flown in tactical maneuvers against an F/A-18 and other tactical aircraft as part of the test flight program. During November and December 1993, the X-31 reached a supersonic speed of Mach 1.28. In 1994, the X-31 program installed software to demonstrate quasi-tailless operation. The X-31 flight test program was conducted by an international test organization (ITO) managed by the Advanced Research Projects Office (ARPA), known as the Defense Advanced Research Projects Office (DARPA) before March 1993. The ITO included the U.S. Navy and U.S. Air Force, Rockwell Aerospace, the Federal Republic of Germany, Daimler-Benz (formerly Messerschmitt-Bolkow-Blohm and Deutsche Aerospace), and NASA. Gary Trippensee was the ITO director and NASA Project Manager. Pilots came from participating organizations. The X-31 was 43.33 feet long with a wingspan of 23.83 feet. It was powered by a single General Electric P404-GE-400 turbofan engine that produced 16,000 pounds of thrust in afterburner.
2004-06-09
KENNEDY SPACE CENTER, FLA. - At Cape Canaveral Air Force Station, Firefighter Chris Maupin (left) and Lt. Keith Abell demonstrate how the special aircraft firefighting vehicle (known as ARF) was used at the site of a recent fire in Brevard County, Fla. The firefighters sit inside the vehicle with a "driver" in the middle. They are able to direct the hoses to attack fires from above and below. The firefighters teamed up with task forces from Satellite Beach, Malabar, Melbourne, Palm Bay, Patrick Air Force Base and Brevard County to help fight wildfires in the Palm Bay and Malabar areas that threatened homes and property during the Memorial Day holiday weekend.
PLATSIM: An efficient linear simulation and analysis package for large-order flexible systems
NASA Technical Reports Server (NTRS)
Maghami, Periman; Kenny, Sean P.; Giesy, Daniel P.
1995-01-01
PLATSIM is a software package designed to provide efficient time and frequency domain analysis of large-order generic space platforms implemented with any linear time-invariant control system. Time domain analysis provides simulations of the overall spacecraft response levels due to either onboard or external disturbances. The time domain results can then be processed by the jitter analysis module to assess the spacecraft's pointing performance in a computationally efficient manner. The resulting jitter analysis algorithms have produced an increase in speed of several orders of magnitude over the brute force approach of sweeping minima and maxima. Frequency domain analysis produces frequency response functions for uncontrolled and controlled platform configurations. The latter represents an enabling technology for large-order flexible systems. PLATSIM uses a sparse matrix formulation for the spacecraft dynamics model which makes both the time and frequency domain operations quite efficient, particularly when a large number of modes are required to capture the true dynamics of the spacecraft. The package is written in MATLAB script language. A graphical user interface (GUI) is included in the PLATSIM software package. This GUI uses MATLAB's Handle graphics to provide a convenient way for setting simulation and analysis parameters.