Sample records for stealth computer code

  1. Multi-bit wavelength coding phase-shift-keying optical steganography based on amplified spontaneous emission noise

    NASA Astrophysics Data System (ADS)

    Wang, Cheng; Wang, Hongxiang; Ji, Yuefeng

    2018-01-01

    In this paper, a multi-bit wavelength coding phase-shift-keying (PSK) optical steganography method is proposed based on amplified spontaneous emission noise and wavelength selection switch. In this scheme, the assignment codes and the delay length differences provide a large two-dimensional key space. A 2-bit wavelength coding PSK system is simulated to show the efficiency of our proposed method. The simulated results demonstrate that the stealth signal after encoded and modulated is well-hidden in both time and spectral domains, under the public channel and noise existing in the system. Besides, even the principle of this scheme and the existence of stealth channel are known to the eavesdropper, the probability of recovering the stealth data is less than 0.02 if the key is unknown. Thus it can protect the security of stealth channel more effectively. Furthermore, the stealth channel will results in 0.48 dB power penalty to the public channel at 1 × 10-9 bit error rate, and the public channel will have no influence on the receiving of the stealth channel.

  2. Temporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise.

    PubMed

    Wu, Ben; Wang, Zhenxing; Shastri, Bhavin J; Chang, Matthew P; Frost, Nicholas A; Prucnal, Paul R

    2014-01-13

    A temporal phase mask encryption method is proposed and experimentally demonstrated to improve the security of the stealth channel in an optical steganography system. The stealth channel is protected in two levels. In the first level, the data is carried by amplified spontaneous emission (ASE) noise, which cannot be detected in either the time domain or spectral domain. In the second level, even if the eavesdropper suspects the existence of the stealth channel, each data bit is covered by a fast changing phase mask. The phase mask code is always combined with the wide band noise from ASE. Without knowing the right phase mask code to recover the stealth data, the eavesdropper can only receive the noise like signal with randomized phase.

  3. Parametric bicubic spline and CAD tools for complex targets shape modelling in physical optics radar cross section prediction

    NASA Astrophysics Data System (ADS)

    Delogu, A.; Furini, F.

    1991-09-01

    Increasing interest in radar cross section (RCS) reduction is placing new demands on theoretical, computation, and graphic techniques for calculating scattering properties of complex targets. In particular, computer codes capable of predicting the RCS of an entire aircraft at high frequency and of achieving RCS control with modest structural changes, are becoming of paramount importance in stealth design. A computer code, evaluating the RCS of arbitrary shaped metallic objects that are computer aided design (CAD) generated, and its validation with measurements carried out using ALENIA RCS test facilities are presented. The code, based on the physical optics method, is characterized by an efficient integration algorithm with error control, in order to contain the computer time within acceptable limits, and by an accurate parametric representation of the target surface in terms of bicubic splines.

  4. Computational strategy for the solution of large strain nonlinear problems using the Wilkins explicit finite-difference approach

    NASA Technical Reports Server (NTRS)

    Hofmann, R.

    1980-01-01

    The STEALTH code system, which solves large strain, nonlinear continuum mechanics problems, was rigorously structured in both overall design and programming standards. The design is based on the theoretical elements of analysis while the programming standards attempt to establish a parallelism between physical theory, programming structure, and documentation. These features have made it easy to maintain, modify, and transport the codes. It has also guaranteed users a high level of quality control and quality assurance.

  5. High-frequency CAD-based scattering model: SERMAT

    NASA Astrophysics Data System (ADS)

    Goupil, D.; Boutillier, M.

    1991-09-01

    Specifications for an industrial radar cross section (RCS) calculation code are given: it must be able to exchange data with many computer aided design (CAD) systems, it must be fast, and it must have powerful graphic tools. Classical physical optics (PO) and equivalent currents (EC) techniques have proven their efficiency on simple objects for a long time. Difficult geometric problems occur when objects with very complex shapes have to be computed. Only a specific geometric code can solve these problems. We have established that, once these problems have been solved: (1) PO and EC give good results on complex objects of large size compared to wavelength; and (2) the implementation of these objects in a software package (SERMAT) allows fast and sufficiently precise domain RCS calculations to meet industry requirements in the domain of stealth.

  6. Radar Versus Stealth: Passive Radar and the Future of U.S. Military Power

    DTIC Science & Technology

    2009-01-01

    minimizing, if not nul- lifying , the advantages of the defensive.”3 Douhet did not envision the many sur- face-to-air threats that would evolve over the...is emerging, enabled by advances in networked computing and passive radar technology. Because of their potential to counter stealth-based airpower...waveforms include FM and AM radio, television, digital audio/video broadcast, and cellular phone networks .38 Today, passive radar is often configured as a

  7. Research of laser stealth performance test technology

    NASA Astrophysics Data System (ADS)

    Chen, Zhen-xing; Shi, Sheng-bing; Han, Fu-li; Wu, Yan-lin; Song, Chun-yan

    2014-09-01

    Laser stealth is an important way of photoelectric stealth weapons systems. According to operational principle of laser range finder, we actively explore and study the stealth performance approval testing technology of laser stealth materials, and bring forward and establish the stealth performance field test methods of stealth efficiency evaluation. Through contrastive test of two kinds of materials, the method is correct and effective.

  8. The use of computerized image guidance in lumbar disk arthroplasty.

    PubMed

    Smith, Harvey E; Vaccaro, Alexander R; Yuan, Philip S; Papadopoulos, Stephen; Sasso, Rick

    2006-02-01

    Surgical navigation systems have been increasingly studied and applied in the application of spinal instrumentation. Successful disk arthroplasty requires accurate midline and rotational positioning for optimal function and longevity. A surgical simulation study in human cadaver specimens was done to evaluate and compare the accuracy of standard fluoroscopy, computer-assisted fluoroscopic image guidance, and Iso-C3D image guidance in the placement of lumbar intervertebral disk replacements. Lumbar intervertebral disk prostheses were placed using three different image guidance techniques in three human cadaver spine specimens at multiple levels. Postinstrumentation accuracy was assessed with thin-cut computed tomography scans. Intervertebral disk replacements placed using the StealthStation with Iso-C3D were more accurately centered than those placed using the StealthStation with FluoroNav and standard fluoroscopy. Intervertebral disk replacements placed with Iso-C3D and FluoroNav had improved rotational divergence compared with standard fluoroscopy. Iso-C3D and FluoroNav had a smaller interprocedure variance than standard fluoroscopy. These results did not approach statistical significance. Relative to both virtual and standard fluoroscopy, use of the StealthStation with Iso-C3D resulted in improved accuracy in centering the lumbar disk prosthesis in the coronal midline. The StealthStation with FluoroNav appears to be at least equivalent to standard fluoroscopy and may offer improved accuracy with rotational alignment while minimizing radiation exposure to the surgeon. Surgical guidance systems may offer improved accuracy and less interprocedure variation in the placement of intervertebral disk replacements than standard fluoroscopy. Further study regarding surgical navigation systems for intervertebral disk replacement is warranted.

  9. Spacetimes dressed with stealth electromagnetic fields

    NASA Astrophysics Data System (ADS)

    Smolić, Ivica

    2018-04-01

    Stealth field configurations by definition have a vanishing energy-momentum tensor, and thus do not contribute to the gravitational field equations. While only trivial fields can be stealth in Maxwell's electrodynamics, nontrivial stealth fields appear in some nonlinear models of electromagnetism. We find the necessary and sufficient conditions for the electromagnetic fields to be stealth and analyze which models admit such configurations. Furthermore, we present some concrete exact solutions, featuring a class of black holes dressed with the stealth electromagnetic hair, closely related to force-free solutions. Stealth hair does not alter the generalized Smarr formula, but may contribute to the Komar charges.

  10. Experimental demonstration of optical stealth transmission over wavelength-division multiplexing network.

    PubMed

    Zhu, Huatao; Wang, Rong; Pu, Tao; Fang, Tao; Xiang, Peng; Zheng, Jilin; Tang, Yeteng; Chen, Dalei

    2016-08-10

    We propose and experimentally demonstrate an optical stealth transmission system over a 200 GHz-grid wavelength-division multiplexing (WDM) network. The stealth signal is processed by spectral broadening, temporal spreading, and power equalizing. The public signal is suppressed by multiband notch filtering at the stealth channel receiver. The interaction between the public and stealth channels is investigated in terms of public-signal-to-stealth-signal ratio, data rate, notch-filter bandwidth, and public channel number. The stealth signal can transmit over 80 km single-mode fiber with no error. Our experimental results verify the feasibility of optical steganography used over the existing WDM-based optical network.

  11. Secret Shoppers: The Stealth Applicant Search for Higher Education

    ERIC Educational Resources Information Center

    Dupaul, Stephanie; Harris, Michael S.

    2012-01-01

    Stealth applicants who do not flow through the traditional admission funnel now represent nearly one-third of the national applicant pool. This study employs a consumer behavior framework to examine the behaviors of stealth applicants at a private university. The findings provide a rich illustration of how stealth applicants search for college.…

  12. Determination of Stability and Control Derivatives using Computational Fluid Dynamics and Automatic Differentiation

    NASA Technical Reports Server (NTRS)

    Park, Michael A.; Green, Lawrence L.; Montgomery, Raymond C.; Raney, David L.

    1999-01-01

    With the recent interest in novel control effectors there is a need to determine the stability and control derivatives of new aircraft configurations early in the design process. These derivatives are central to most control law design methods and would allow the determination of closed-loop control performance of the vehicle. Early determination of the static and dynamic behavior of an aircraft may permit significant improvement in configuration weight, cost, stealth, and performance through multidisciplinary design. The classical method of determining static stability and control derivatives - constructing and testing wind tunnel models - is expensive and requires a long lead time for the resultant data. Wind tunnel tests are also limited to the preselected control effectors of the model. To overcome these shortcomings, computational fluid dynamics (CFD) solvers are augmented via automatic differentiation, to directly calculate the stability and control derivatives. The CFD forces and moments are differentiated with respect to angle of attack, angle of sideslip, and aircraft shape parameters to form these derivatives. A subset of static stability and control derivatives of a tailless aircraft concept have been computed by two differentiated inviscid CFD codes and verified for accuracy with central finite-difference approximations and favorable comparisons to a simulation database.

  13. Absorptive coding metasurface for further radar cross section reduction

    NASA Astrophysics Data System (ADS)

    Sui, Sai; Ma, Hua; Wang, Jiafu; Pang, Yongqiang; Feng, Mingde; Xu, Zhuo; Qu, Shaobo

    2018-02-01

    Lossless coding metasurfaces and metamaterial absorbers have been widely used for radar cross section (RCS) reduction and stealth applications, which merely depend on redirecting electromagnetic wave energy into various oblique angles or absorbing electromagnetic energy, respectively. Here, an absorptive coding metasurface capable of both the flexible manipulation of backward scattering and further wideband bistatic RCS reduction is proposed. The original idea is carried out by utilizing absorptive elements, such as metamaterial absorbers, to establish a coding metasurface. We establish an analytical connection between an arbitrary absorptive coding metasurface arrangement of both the amplitude and phase and its far-field pattern. Then, as an example, an absorptive coding metasurface is demonstrated as a nonperiodic metamaterial absorber, which indicates an expected better performance of RCS reduction than the traditional lossless coding metasurface and periodic metamaterial-absorber. Both theoretical analysis and full-wave simulation results show good accordance with the experiment.

  14. The preparation and infrared radar stealth performance test of a new paraffin-based phase transition microcapsule

    NASA Astrophysics Data System (ADS)

    Chen, Yingming; Zhang, Honghong; Gao, Weiting; Chen, Yingmin; Wang, Yifan

    2018-04-01

    For the problems that the phase change material apply to infrared stealth exists easy to broken, hard to control temperature, narrow infrared channel and based on the basic principles of infrared stealth technology, this paper proposed a scheme of thermal infrared composite invisibility multi-layer wrapping, which based on two sides, one is to control the material surface temperature, another is to reduce its infrared emissivity and combine with visible light pigment and electromagnetic wave absorbing material, to realize the materials' wide band compatible stealth. First, choose urea formaldehyde resin and paraffin to prepare multiphase-change microcapsules, and then combine it with the ferroferric oxide absorbing material, zinc oxide visible light pigment, to make the stealth material of wide band. The experimental results show that the new phase change capsule can realize the function of temperature control and infrared stealth in a special temperature range.

  15. Simulation on change of generic satellite radar cross section via artificially created plasma sprays

    NASA Astrophysics Data System (ADS)

    Chung, Shen Shou Max; Chuang, Yu-Chou

    2016-06-01

    Recent advancements in antisatellite missile technologies have proven the effectiveness of such attacks, and the vulnerability of satellites in such exercises inspires a new paradigm in RF Stealth techniques suitable for satellites. In this paper we examine the possibility of using artificially created plasma sprays on the surface of the satellite’s main body to alter its radar cross section (RCS). First, we briefly review past research related to RF Stealth using plasma. Next, we discuss the physics between electromagnetic waves and plasma, and the RCS number game in RF Stealth design. A comparison of RCS in a generic satellite and a more complicated model is made to illustrate the effect of the RCS number game, and its meaning for a simulation model. We also run a comparison between finite-difference-time-domain (FDTD) and multilevel fast multipole method (MLFMM) codes, and find the RCS results are very close. We then compare the RCS of the generic satellite and the plasma-covered satellite. The incident radar wave is a differentiated Gaussian monopulse, with 3 dB bandwidth between 1.2 GHz and 4 GHz, and we simulate three kinds of plasma density, with a characteristic plasma frequency ω P  =  0.1, 1, and 10 GHz. The electron-neutral collision frequency ν en is set at 0.01 GHz. We found the RCS of plasma-covered satellite is not necessarily smaller than the originally satellite. When ω P is 0.1 GHz, the plasma spray behaves like a dielectric, and there is minor reduction in the RCS. When ω P is 1 GHz, the X-Y cut RCS increases. When ω P is 10 GHz, the plasma behaves more like a metal to the radar wave, and stronger RCS dependency to frequency appears. Therefore, to use plasma as an RCS adjustment tool requires careful fine-tuning of plasma density and shape, in order to achieve the so-called plasma stealth effect.

  16. Factorial design studies of antiretroviral drug-loaded stealth liposomal injectable: PEGylation, lyophilization and pharmacokinetic studies

    NASA Astrophysics Data System (ADS)

    Sudhakar, Beeravelli; Krishna, Mylangam Chaitanya; Murthy, Kolapalli Venkata Ramana

    2016-01-01

    The aim of the present study was to formulate and evaluate the ritonavir-loaded stealth liposomes by using 32 factorial design and intended to delivered by parenteral delivery. Liposomes were prepared by ethanol injection method using 32 factorial designs and characterized for various physicochemical parameters such as drug content, size, zeta potential, entrapment efficiency and in vitro drug release. The optimization process was carried out using desirability and overlay plots. The selected formulation was subjected to PEGylation using 10 % PEG-10000 solution. Stealth liposomes were characterized for the above-mentioned parameters along with surface morphology, Fourier transform infrared spectrophotometer, differential scanning calorimeter, stability and in vivo pharmacokinetic studies in rats. Stealth liposomes showed better result compared to conventional liposomes due to effect of PEG-10000. The in vivo studies revealed that stealth liposomes showed better residence time compared to conventional liposomes and pure drug solution. The conventional liposomes and pure drug showed dose-dependent pharmacokinetics, whereas stealth liposomes showed long circulation half-life compared to conventional liposomes and pure ritonavir solution. The results of statistical analysis showed significance difference as the p value is (<0.05) by one-way ANOVA. The result of the present study revealed that stealth liposomes are promising tool in antiretroviral therapy.

  17. Expansion of Enterprise Requirements and Acquisition Model

    DTIC Science & Technology

    2012-06-04

    upgrades in technology that made it more lethal with a smaller force. Computer technology, GPS, and stealth are just a few examples that allowed...The facility consists of banks of networked computers , large displays all built around a centralized workspace. It can be seen in Figure 3. The...first was to meet a gap in UHF satellite communciations for the Navy. This was satisfied as a Tier-1 program by purchasing additional bandwidth

  18. RF Stealth (Or Low Observable) and Counter- RF Stealth Technologies: Implications of Counter- RF Stealth Solutions for Turkish Air Force

    DTIC Science & Technology

    2009-03-01

    Robotics Coating Facility for Low Observable Material Applications...aircraft. After separation, it would fly to around 78,000 ft altitude and self navigate with its internal Doppler guidance system. If desired, it...lossy magnetic material, with 2 cm of soft rubber , were utilized for purposes of absorbing radar energy and reducing IR signature. Moreover, some tail

  19. 6-mercaptopurine (6-MP) entrapped stealth liposomes for improvement of leukemic treatment without hepatotoxicity and nephrotoxicity.

    PubMed

    Umrethia, Manish; Ghosh, Pradip Kumar; Majithya, Rita; Murthy, R S R

    2007-03-01

    6-mercaptopurine (6-MP) is a purine analogue used in childhood leukemia. Because of the oral bioavailability of 6-MP is low and highly variable, the aim of this study was to develop a new parenteral formulation that can prolong the biological half-life of the drug, improve its therapeutic efficacy, and its associated reduce side effects. Conventional and stealth 6-MP liposomes were prepared by a thin film hydration technique followed by a high-pressure homogenization process and characterized for percent entrapment efficiency (%EE), particle size, and stability in human plasma. Pharmacokinetic, tissue distribution, and biochemical analysis were performed after intravenous (IV) administration of all formulations of 6-MP on rats. The conventional liposomes were found less stable than stealth liposomes in human plasma at 37 degrees C. Stealth liposomes exhibited high peak plasma concentration (C(max)), and long circulating capacity in blood and biological half-life. The uptake of stealth liposomes by the liver and spleen and accumulation in the kidney were significantly less than that of conventional liposomes and the free drug. Serum urea, creatinine, GOT (Glutamic Oxaloacetic Transaminase), and GPT (Glutamic Pyruvic Transaminase) increased significantly in rats given an IV injection of conventional liposomes and the free drug, but not in those administered with the same dose of stealth liposomes. Stealth liposomes may help to increase therapeutic efficacy of 6-MP and to reduce total amount of dose as well as frequency of the dose. It also may reduce the possibility of the risk of toxicity to the liver and kidney generally associated with free 6-MP.

  20. Optical stealth transmission based on super-continuum generation in highly nonlinear fiber over WDM network.

    PubMed

    Zhu, Huatao; Wang, Rong; Pu, Tao; Fang, Tao; Xiang, Peng; Zheng, Jilin; Chen, Dalei

    2015-06-01

    In this Letter, the optical stealth transmission carried by super-continuum spectrum optical pulses generated in highly nonlinear fiber is proposed and experimentally demonstrated. In the proposed transmission scheme, super-continuum signals are reshaped in the spectral domain through a wavelength-selective switch and are temporally spread by a chromatic dispersion device to achieve the same noise-like characteristic as the noise in optical networks, so that in both the time domain and the spectral domain, the stealth signals are hidden in public channel. Our experimental results show that compared with existing schemes where stealth channels are carried by amplified spontaneous emission noise, super-continuum signal can increase the transmission performance and robustness.

  1. Stealth and Natural Disasters: Science, Policy and Human Behavior

    NASA Astrophysics Data System (ADS)

    Kieffer, S. W.

    2008-12-01

    Geophysicists, earth scientists, and other natural scientists play a key role in studying disasters, and are challenged to convey the science to the public and policy makers (including government and business). I have found it useful to introduce the concept of two general types of disasters to these audiences: natural and stealth. Natural disasters are geological phenomena over which we humans have some, but relatively little, control. Earthquakes, tsunamis, floods and volcanic eruptions are the most familiar examples, but exogenous events such as meteorite impacts, solar flares, and supernovae are also possibly disruptive. Natural disasters typically have an abrupt onset, cause immediate major change, are familiar from the historic record, and get much media and public attention. They cannot be prevented, but preplanning can ameliorate their effects. Natural disasters are increasingly amplified by us (humans), and we are increasingly affected by them due to our expanding presence on the planet. Less familiar disasters are unfolding in the near-term, but they are not happening in the minds of most people. They are approaching us stealthily, and for this reason I propose that we call them stealth disasters. They differ from natural disasters in several important ways: stealth disasters are primarily caused by, or driven by, the interaction of humans with complex cycles of processes on the planet. Examples are: fresh water shortages and contamination, soil degradation and loss, climate changes, ocean degradation. The onset of stealth disasters is incremental rather than abrupt. They may not unfold significantly during the course of one term of political office, but they are unfolding in our lifetime. We as individuals may or may not escape their consequences, but they will affect our children and grandchildren. If humans are familiar with stealth disasters at all, it is from a relatively local experience, e.g., flooding of the Mississippi or the Dust Bowl in the U.S., or their counterparts in other places globally. Knowledge of stealth disasters is not universal at the scale now required for global attention. Pre-planning can allay the impacts of stealth disasters, or possibly even prevent them. It is imperative that a new Congress and new Administration be informed of the need to respond to both the near-term natural disasters, and to immediately institute thoughtful planning to ally or prevent the stealth disasters.

  2. Improved pharmacokinetics and reduced toxicity of brucine after encapsulation into stealth liposomes: role of phosphatidylcholine

    PubMed Central

    Chen, Jun; Yan, Guo-jun; Hu, Rong-rong; Gu, Qian-wen; Chen, Ming-lei; Gu, Wei; Chen, Zhi-peng; Cai, Bao-chang

    2012-01-01

    Objective: Brucine was encapsulated into stealth liposomes using the ammonium sulfate gradient method to improve therapeutic index. Materials and methods: Four brucine stealth liposomal formulations were prepared, which were made from different phosphatidylcholines (PCs) with different phase transition temperatures (Tm). The PCs used were soy phosphatidylcholine (SPC), dipalmitoyl phosphatidylcholine (DPPC), hydrogenated soy phosphatidylcholine (HSPC), and distearoyl phosphatidylcholine (DSPC). The stabilities, pharmacokinetics, and toxicities of these liposomal formulations were evaluated and compared. Results: Size, zeta potential, and entrapment efficiency of brucine-loaded stealth liposomes (BSL) were not influenced by PC composition. In vitro release studies revealed that drug release rate increased with decreased Tm of PCs, especially with the presence of rat plasma. After intravenous administration, the area under the curve (AUC) values of BSL-SPC, BSL-DPPC, BSL-HSPC, and BSL-DSPC in plasma were 7.71, 9.24, 53.83, and 56.83-fold as large as that of free brucine, respectively. The LD50 values of brucine solution, BSL-SPC, BSL-DPPC, BSL-HSPC, and BSL-DSPC following intravenous injection were 13.17, 37.30, 37.69, 51.18, and 52.86 mg/kg, respectively. It was found in calcein retention experiments that the order of calcein retention in rat plasma was SPC < DPPC << HSPC < DSPC stealth liposomes. Conclusion: PC composition could exert significant influence on the stabilities, pharmacokinetics, and toxicities of brucine-loaded stealth liposomes. DSPC or HSPC with Tm above 50°C should be used to prepare the stealth liposomal formulation for the intravenous delivery of brucine. However, it was found in the present paper that the pharmacokinetics and toxicity of BSL were not influenced by the PC composition when the Tm of the PC was in the range of −20°C to 41°C. PMID:22904620

  3. Papering Over Corrosion

    NASA Technical Reports Server (NTRS)

    2000-01-01

    Kennedy Space Center's battle against corrosion led to a new coating that was licensed to GeoTech and is commercially sold as Catize. The coating uses ligno sulfonic acid doped polyaniline (Ligno-Pani), also known as synthetic metal. Ligno-Pani can be used to extend the operating lives of steel bridges as one example of its applications. future applications include computers, televisions, cellular phones, conductive inks, and stealth technology.

  4. CNT Nanobombs for Specific Eradication of Cancer Cells: A New Concept in Cancer Theranostics.

    PubMed

    Omidi, Yadollah

    2011-01-01

    Whole extermination of cancerous cells/tissue seems no longer to be a dream. Exploiting advanced photoactive nanomaterials such as functionalized fullerenes and carbon nano-tubes (CNTs) can act as CNT nanobombs (CNT-NBs) when exposed to the near infrared (NIR) radiation. PEGylated CNTs tagged with an antibody/aptamer can target cancer cells. Once attached to cancer cells, the NIR emission (700-1100 nm), in which body tissues are mostly transparent, can be applied to CNT-NBs which can absorb the light and get heated up. The resultant enhanced temperature can abolish the cancer. Once stealth CNT-NBs are tagged with imaging moieties, it would be a matter of computer gaming for physician who can inject it for real time visualization and destruction of cancer by activation of the NIR laser. While, many nanosystems (NSs) are still in waiting list for clinical translation, our dreams may come true by applying stealth CNT-NBs against cancer.

  5. Simulation of effect of anti-radar stealth principle

    NASA Astrophysics Data System (ADS)

    Zhao, Borao; Xing, Shuchen; Li, Chunyi

    1988-02-01

    The paper presents simulation methods and results of the anti-radar stealth principle, proving that anti-radar stealth aircraft can drastically reduce the combat efficiency of an air defense radar system. In particular, when anti-radar stealth aircraft are coordinated with jamming as a self-defense soft weapon, the discovery probability, response time and hit rate of the air defense radar system are much lower, with extensive reduction in jamming power and maximum exposure distance of self-defense and long-range support. The paper describes an assumed combat situation and construction of a calculation model for the aircraft survival rate, as well as simulation results and analysis. Four figures show an enemy bomber attacking an airfield, as well as the effects of the radar effective reflecting surface on discovery probability, guidance radius, aircraft survival and exposure distance (for long-range support and jamming).

  6. High Strain Rate Material Behavior

    DTIC Science & Technology

    1985-12-01

    data. iii Mr. Dennis Paisely conducted the single plate impact test. Mr. Danny Yaziv is responsible for developing the double flyer plate technique and...neck developed . The sharp rise in the flow stress is due to the increased strain-rates during necking. The maximum observed value of effective stress...for the material modeling. Computer programs and special purpose subroutines were developed to use the Bodner-Partom model in the STEALTH finite

  7. Monostatic Radar Cross Section Estimation of Missile Shaped Object Using Physical Optics Method

    NASA Astrophysics Data System (ADS)

    Sasi Bhushana Rao, G.; Nambari, Swathi; Kota, Srikanth; Ranga Rao, K. S.

    2017-08-01

    Stealth Technology manages many signatures for a target in which most radar systems use radar cross section (RCS) for discriminating targets and classifying them with regard to Stealth. During a war target’s RCS has to be very small to make target invisible to enemy radar. In this study, Radar Cross Section of perfectly conducting objects like cylinder, truncated cone (frustum) and circular flat plate is estimated with respect to parameters like size, frequency and aspect angle. Due to the difficulties in exactly predicting the RCS, approximate methods become the alternative. Majority of approximate methods are valid in optical region and where optical region has its own strengths and weaknesses. Therefore, the analysis given in this study is purely based on far field monostatic RCS measurements in the optical region. Computation is done using Physical Optics (PO) method for determining RCS of simple models. In this study not only the RCS of simple models but also missile shaped and rocket shaped models obtained from the cascaded objects with backscatter has been computed using Matlab simulation. Rectangular plots are obtained for RCS in dbsm versus aspect angle for simple and missile shaped objects using Matlab simulation. Treatment of RCS, in this study is based on Narrow Band.

  8. Future Jet Technologies, Part C

    NASA Astrophysics Data System (ADS)

    Gal-Or, Benjamin

    2013-06-01

    This updated, PART C REVIEW, covers the dangerous global spread of JS-stealth, drone technology [1-91], canard-free, stealth, new agile drones and the highly debated, 480 billion F-35 International Program as reported on March 13, 2013 to the U.S. Congress [92]. Due to serious design issues, spiraling high costs and years in delays, alternatives are analyzed here, depicted and proposed, mainly from the propulsion-design point of view. These include fleets of low-cost, stealth, jet-steered-drones mixed with non-stealthy, low-cost, ready-to-be-delivered, U.S. or European or Russian fighter aircraft. Can a few F-35s win against large fleets of stealth agile drones? To understand the dangers and critical issues involved, the author's own, past classified information is partly disclosed, while resorting to images in Figs. 2(a) and 2(b) taken from his book [2] and from Wikipedia, the "Free Encyclopedia", in all other images.

  9. Design and characterization of one-dimensional photonic crystals based on ZnS/Ge for infrared-visible compatible stealth applications

    NASA Astrophysics Data System (ADS)

    Qi, Dong; Wang, Xian; Cheng, Yongzhi; Gong, Rongzhou; Li, Bowen

    2016-12-01

    One-dimensional photonic crystals (1DPCs) based on ZnS/Ge for compatible stealth of infrared and visible were firstly proposed theoretically and investigated experimentally. Owing to the equal inclination interference, the designed 1DPCs structure can be fabricated with a certain color corresponding to the different responded wavelength. In addition, the average emissivity of the proposed structure can reach as low as 0.054 at infrared atmosphere window of 3-5 μm. The as-prepared structure indicates that it is feasible for 1DPC to achieve infrared-visible compatible stealth.

  10. How Low Can You Go? Low Densities of Poly(ethylene glycol) Surfactants Attract Stealth Proteins.

    PubMed

    Seneca, Senne; Simon, Johanna; Weber, Claudia; Ghazaryan, Arthur; Ethirajan, Anitha; Mailaender, Volker; Morsbach, Svenja; Landfester, Katharina

    2018-06-25

    It is now well-established that the surface chemistry and "stealth" surface functionalities such as poly(ethylene glycol) (PEG) chains of nanocarriers play an important role to decrease unspecific protein adsorption of opsonizing proteins, to increase the enrichment of specific stealth proteins, and to prolong the circulation times of the nanocarriers. At the same time, PEG chains are used to provide colloidal stability for the nanoparticles. However, it is not clear how the chain length and density influence the unspecific and specific protein adsorption keeping at the same time the stability of the nanoparticles in a biological environment. Therefore, this study aims at characterizing the protein adsorption patterns depending on PEG chain length and density to define limits for the amount of PEG needed for a stealth effect by selective protein adsorption as well as colloidal stability during cell experiments. PEG chains are introduced using the PEGylated Lutensol AT surfactants, which allow easy modification of the nanoparticle surface. These findings indicate that a specific enrichment of stealth proteins already occurs at low PEG concentrations; for the decrease of unspecific protein adsorption and finally the colloidal stability a full surface coverage is advised. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Goldstone/VLA 3.5cm Mars Radar Observations - "Stealths" and South Polar Regions

    NASA Astrophysics Data System (ADS)

    Butler, Bryan; Chizek, M. R.; Slade, M. A.; Haldemann, A. F.; Muhleman, D. O.; Mao, T. F.

    2006-09-01

    The opposition of Mars in 2003 provided a fantastic opportunity to use the combined Goldstone/VLA radar to probe the surface with the highest resolution ever obtained on Mars with that instrument (as good as 70 km). Observations were made on August 11, 19, 28, and September 8. Details of data reduction and analysis of the radar echoes from the volcanic regions of the planet are presented in a companion paper in these proceedings (Chizek et al.). We will present results related to "Stealth" (and other radar-dark regions of the planet, including the Argyre and Hellas Planitiae, and a region to the west of the Elysium Mons caldera), and the south polar residual and seasonal ice caps. The size, shape, and reflectivity characteristics of Stealth and "mega-Stealth" (Edgett et al. 1997) are reaffirmed, with a better viewing geometry of the western extent of the feature than had been obtained previously. It had been speculated previously that Hellas Planitia should also be radar dark - this is confirmed by our imaging, though the reflectivity is not as low as for Stealth. We find a new radar dark area to the west of Elysium Mons, which is likely an ash fall from that volcano (similar to the relationship between Stealth and the Tharsis volcanoes). The south polar residual ice cap is a very bright reflector, as seen previously, but we now also see a very bright reflection from the seasonal cap, not seen previously. The cap is not uniformly bright, however, and the extent of the bright reflection does not correspond to that expected from the retreat of the cap as measured either from albedo or thermal emission characteristics. The NRAO is a facility of the National Science Foundation, operated under cooperative agreement by Associated Universities, Inc.

  12. Cryo-electron tomography investigation of serum albumin-camouflaged tobacco mosaic virus nanoparticles.

    PubMed

    Gulati, Neetu M; Pitek, Andrzej S; Steinmetz, Nicole F; Stewart, Phoebe L

    2017-03-09

    Nanoparticles offer great potential in drug delivery and imaging, but shielding strategies are necessary to increase circulation time and performance. Structure-function studies are required to define the design rules to achieve effective shielding. With several formulations reaching clinical testing and approval, the ability to assess and detail nanoparticle formulations at the single particle level is becoming increasingly important. To address this need, we use cryo-electron tomography (cryo-ET) to investigate stealth-coated nanoparticles. As a model system, we studied the soft matter nanotubes formed by tobacco mosaic virus (TMV) coated with human serum albumin (SA) stealth proteins. Cryo-ET and subtomogram averaging allow for visualization of individual SA molecules and determination of their orientations relative to the TMV surface, and also for measurement of the surface coverage provided by added stealth proteins. This information fills a critical gap in the understanding of the structural morphology of stealth-coated nanoparticles, and therefore cryo-ET may play an important role in guiding the development of future nanoparticle-based therapeutics.

  13. Measuring Problem Solving Skills in "Portal 2"

    ERIC Educational Resources Information Center

    Shute, Valerie J.; Wang, Lubin

    2013-01-01

    This paper examines possible improvement to problem solving skills as a function of playing the video game "Portal 2." Stealth assessment is used in the game to evaluate students' problem solving abilities--specifically basic and flexible rule application. The stealth assessment measures will be validated against commonly accepted…

  14. Stealth Aircraft Technology. (Latest Citations from the Aerospace Database)

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The bibliography contains citations concerning design, manufacture, and history of aircraft incorporating stealth technology. Citations focus on construction materials, testing, aircraft performance, and technology assessment. Fighter aircraft, bombers, missiles, and helicopters represent coverage. (Contains 50-250 citations and includes a subject term index and title list.)

  15. Applied Computational Electromagnetics Society Journal, volume 9, number 1, March 1994

    NASA Astrophysics Data System (ADS)

    1994-03-01

    The partial contents of this document include the following: On the Use of Bivariate Spline Interpolation of Slot Data in the Design of Slotted Waveguide Arrays; A Technique for Determining Non-Integer Eigenvalues for Solutions of Ordinary Differential Equations; Antenna Modeling and Characterization of a VLF Airborne Dual Trailing Wire Antenna System; Electromagnetic Scattering from Two-Dimensional Composite Objects; and Use of a Stealth Boundary with Finite Difference Frequency Domain Simulations of Simple Antenna Problems.

  16. Stealth Biocompatible Si-Based Nanoparticles for Biomedical Applications

    PubMed Central

    Chaix, Arnaud; Gary-Bobo, Magali; Angeletti, Bernard; Masion, Armand; Da Silva, Afitz; Daurat, Morgane; Lichon, Laure; Garcia, Marcel; Morère, Alain; El Cheikh, Khaled; Durand, Jean-Olivier; Cunin, Frédérique; Auffan, Mélanie

    2017-01-01

    A challenge regarding the design of nanocarriers for drug delivery is to prevent their recognition by the immune system. To improve the blood residence time and prevent their capture by organs, nanoparticles can be designed with stealth properties using polymeric coating. In this study, we focused on the influence of surface modification with polyethylene glycol and/or mannose on the stealth behavior of porous silicon nanoparticles (pSiNP, ~200 nm). In vivo biodistribution of pSiNPs formulations were evaluated in mice 5 h after intravenous injection. Results indicated that the distribution in the organs was surface functionalization-dependent. Pristine pSiNPs and PEGylated pSiNPs were distributed mainly in the liver and spleen, while mannose-functionalized pSiNPs escaped capture by the spleen, and had higher blood retention. The most efficient stealth behavior was observed with PEGylated pSiNPs anchored with mannose that were the most excreted in urine at 5 h. The biodegradation kinetics evaluated in vitro were in agreement with these in vivo observations. The biocompatibility of the pristine and functionalized pSiNPs was confirmed in vitro on human cell lines and in vivo by cytotoxic and systemic inflammation investigations, respectively. With their biocompatibility, biodegradability, and stealth properties, the pSiNPs functionalized with mannose and PEG show promising potential for biomedical applications. PMID:28946628

  17. Development of an inverse distance weighted active infrared stealth scheme using the repulsive particle swarm optimization algorithm.

    PubMed

    Han, Kuk-Il; Kim, Do-Hwi; Choi, Jun-Hyuk; Kim, Tae-Kuk

    2018-04-20

    Treatments for detection by infrared (IR) signals are higher than for other signals such as radar or sonar because an object detected by the IR sensor cannot easily recognize its detection status. Recently, research for actively reducing IR signal has been conducted to control the IR signal by adjusting the surface temperature of the object. In this paper, we propose an active IR stealth algorithm to synchronize IR signals from the object and the background around the object. The proposed method includes the repulsive particle swarm optimization statistical optimization algorithm to estimate the IR stealth surface temperature, which will result in a synchronization between the IR signals from the object and the surrounding background by setting the inverse distance weighted contrast radiant intensity (CRI) equal to zero. We tested the IR stealth performance in mid wavelength infrared (MWIR) and long wavelength infrared (LWIR) bands for a test plate located at three different positions on a forest scene to verify the proposed method. Our results show that the inverse distance weighted active IR stealth technique proposed in this study is proved to be an effective method for reducing the contrast radiant intensity between the object and background up to 32% as compared to the previous method using the CRI determined as the simple signal difference between the object and the background.

  18. Taking the Steam off Pressure Groups.

    ERIC Educational Resources Information Center

    Ledell, Marjorie A.

    1993-01-01

    School administrators must speak out when single-issue or "stealth" groups threaten to take over a school board. Administrators can help ensure that election campaigns stimulate community debate, discussion, and consensus about educational directions. They must know how to remove the cover from stealth candidates, respond to the public,…

  19. Comparison of Scientific Calipers and Computer-Enabled CT Review for the Measurement of Skull Base and Craniomaxillofacial Dimensions

    PubMed Central

    Citardi, Martin J.; Herrmann, Brian; Hollenbeak, Chris S.; Stack, Brendan C.; Cooper, Margaret; Bucholz, Richard D.

    2001-01-01

    Traditionally, cadaveric studies and plain-film cephalometrics provided information about craniomaxillofacial proportions and measurements; however, advances in computer technology now permit software-based review of computed tomography (CT)-based models. Distances between standardized anatomic points were measured on five dried human skulls with standard scientific calipers (Geneva Gauge, Albany, NY) and through computer workstation (StealthStation 2.6.4, Medtronic Surgical Navigation Technology, Louisville, CO) review of corresponding CT scans. Differences in measurements between the caliper and CT model were not statistically significant for each parameter. Measurements obtained by computer workstation CT review of the cranial skull base are an accurate representation of actual bony anatomy. Such information has important implications for surgical planning and clinical research. ImagesFigure 1Figure 2Figure 3 PMID:17167599

  20. Treponema pallidum, the syphilis spirochete: making a living as a stealth pathogen

    PubMed Central

    Radolf, Justin D.; Deka, Ranjit K.; Anand, Arvind; Šmajs, David; Norgard, Michael V.; Yang, X. Frank

    2016-01-01

    The last two decades have seen a worldwide resurgence in infections caused by Treponema pallidum subsp. pallidum, the syphilis spirochete. The syphilis spirochete’s well-recognized capacity for early dissemination and immune evasion has earned it the designation ‘the stealth pathogen’. Despite the many hurdles to studying syphilis pathogenesis, most notably the inability to culture and to genetically manipulate T. pallidum, in recent years, considerable progress has been made in elucidating the structural, physiologic, and regulatory facets of stealth pathogenicity. In this Review, we integrate this eclectic body of information to garner fresh insights into the highly successful parasitic lifestyles of the syphilis spirochete and related pathogenic treponemes. PMID:27721440

  1. Embedding Quantitative Methods by Stealth in Political Science: Developing a Pedagogy for Psephology

    ERIC Educational Resources Information Center

    Gunn, Andrew

    2017-01-01

    Student evaluations of quantitative methods courses in political science often reveal they are characterised by aversion, alienation and anxiety. As a solution to this problem, this paper describes a pedagogic research project with the aim of embedding quantitative methods by stealth into the first-year undergraduate curriculum. This paper…

  2. Search for stealth supersymmetry in events with jets, either photons or leptons, and low missing transverse momentum in pp collisions at 8 TeV

    NASA Astrophysics Data System (ADS)

    Khachatryan, V.; Sirunyan, A. M.; Tumasyan, A.; Adam, W.; Bergauer, T.; Dragicevic, M.; Erö, J.; Friedl, M.; Frühwirth, R.; Ghete, V. M.; Hartl, C.; Hörmann, N.; Hrubec, J.; Jeitler, M.; Kiesenhofer, W.; Knünz, V.; Krammer, M.; Krätschmer, I.; Liko, D.; Mikulec, I.; Rabady, D.; Rahbaran, B.; Rohringer, H.; Schöfbeck, R.; Strauss, J.; Treberer-Treberspurg, W.; Waltenberger, W.; Wulz, C.-E.; Mossolov, V.; Shumeiko, N.; Suarez Gonzalez, J.; Alderweireldt, S.; Bansal, S.; Cornelis, T.; De Wolf, E. A.; Janssen, X.; Knutsson, A.; Lauwers, J.; Luyckx, S.; Ochesanu, S.; Rougny, R.; Van De Klundert, M.; Van Haevermaet, H.; Van Mechelen, P.; Van Remortel, N.; Van Spilbeeck, A.; Blekman, F.; Blyweert, S.; D'Hondt, J.; Daci, N.; Heracleous, N.; Keaveney, J.; Lowette, S.; Maes, M.; Olbrechts, A.; Python, Q.; Strom, D.; Tavernier, S.; Van Doninck, W.; Van Mulders, P.; Van Onsem, G. P.; Villella, I.; Caillol, C.; Clerbaux, B.; De Lentdecker, G.; Dobur, D.; Favart, L.; Gay, A. P. R.; Grebenyuk, A.; Léonard, A.; Mohammadi, A.; Perniè, L.; Randle-conde, A.; Reis, T.; Seva, T.; Thomas, L.; Vander Velde, C.; Vanlaer, P.; Wang, J.; Zenoni, F.; Adler, V.; Beernaert, K.; Benucci, L.; Cimmino, A.; Costantini, S.; Crucy, S.; Dildick, S.; Fagot, A.; Garcia, G.; Mccartin, J.; Ocampo Rios, A. A.; Poyraz, D.; Ryckbosch, D.; Salva Diblen, S.; Sigamani, M.; Strobbe, N.; Thyssen, F.; Tytgat, M.; Yazgan, E.; Zaganidis, N.; Basegmez, S.; Beluffi, C.; Bruno, G.; Castello, R.; Caudron, A.; Ceard, L.; Da Silveira, G. G.; Delaere, C.; du Pree, T.; Favart, D.; Forthomme, L.; Giammanco, A.; Hollar, J.; Jafari, A.; Jez, P.; Komm, M.; Lemaitre, V.; Nuttens, C.; Perrini, L.; Pin, A.; Piotrzkowski, K.; Popov, A.; Quertenmont, L.; Selvaggi, M.; Vidal Marono, M.; Vizan Garcia, J. M.; Beliy, N.; Caebergs, T.; Daubie, E.; Hammad, G. H.; Aldá Júnior, W. L.; Alves, G. A.; Brito, L.; Correa Martins Junior, M.; Dos Reis Martins, T.; Molina, J.; Mora Herrera, C.; Pol, M. E.; Rebello Teles, P.; Carvalho, W.; Chinellato, J.; Custódio, A.; Da Costa, E. M.; De Jesus Damiao, D.; De Oliveira Martins, C.; Fonseca De Souza, S.; Malbouisson, H.; Matos Figueiredo, D.; Mundim, L.; Nogima, H.; Prado Da Silva, W. L.; Santaolalla, J.; Santoro, A.; Sznajder, A.; Tonelli Manganote, E. J.; Vilela Pereira, A.; Bernardes, C. A.; Dogra, S.; Fernandez Perez Tomei, T. R.; Gregores, E. M.; Mercadante, P. G.; Novaes, S. F.; Padula, Sandra S.; Aleksandrov, A.; Genchev, V.; Hadjiiska, R.; Iaydjiev, P.; Marinov, A.; Piperov, S.; Rodozov, M.; Stoykova, S.; Sultanov, G.; Vutova, M.; Dimitrov, A.; Glushkov, I.; Litov, L.; Pavlov, B.; Petkov, P.; Bian, J. G.; Chen, G. M.; Chen, H. S.; Chen, M.; Cheng, T.; Du, R.; Jiang, C. H.; Plestina, R.; Romeo, F.; Tao, J.; Wang, Z.; Asawatangtrakuldee, C.; Ban, Y.; Li, Q.; Liu, S.; Mao, Y.; Qian, S. J.; Wang, D.; Xu, Z.; Zou, W.; Avila, C.; Cabrera, A.; Chaparro Sierra, L. F.; Florez, C.; Gomez, J. P.; Gomez Moreno, B.; Sanabria, J. C.; Godinovic, N.; Lelas, D.; Polic, D.; Puljak, I.; Antunovic, Z.; Kovac, M.; Brigljevic, V.; Kadija, K.; Luetic, J.; Mekterovic, D.; Sudic, L.; Attikis, A.; Mavromanolakis, G.; Mousa, J.; Nicolaou, C.; Ptochos, F.; Razis, P. A.; Bodlak, M.; Finger, M.; Finger, M.; Assran, Y.; Ellithi Kamel, A.; Mahmoud, M. A.; Radi, A.; Kadastik, M.; Murumaa, M.; Raidal, M.; Tiko, A.; Eerola, P.; Voutilainen, M.; Härkönen, J.; Karimäki, V.; Kinnunen, R.; Kortelainen, M. J.; Lampén, T.; Lassila-Perini, K.; Lehti, S.; Lindén, T.; Luukka, P.; Mäenpää, T.; Peltola, T.; Tuominen, E.; Tuominiemi, J.; Tuovinen, E.; Wendland, L.; Talvitie, J.; Tuuva, T.; Besancon, M.; Couderc, F.; Dejardin, M.; Denegri, D.; Fabbro, B.; Faure, J. L.; Favaro, C.; Ferri, F.; Ganjour, S.; Givernaud, A.; Gras, P.; Hamel de Monchenault, G.; Jarry, P.; Locci, E.; Malcles, J.; Rander, J.; Rosowsky, A.; Titov, M.; Baffioni, S.; Beaudette, F.; Busson, P.; Chapon, E.; Charlot, C.; Dahms, T.; Dalchenko, M.; Dobrzynski, L.; Filipovic, N.; Florent, A.; Granier de Cassagnac, R.; Mastrolorenzo, L.; Miné, P.; Naranjo, I. N.; Nguyen, M.; Ochando, C.; Ortona, G.; Paganini, P.; Regnard, S.; Salerno, R.; Sauvan, J. B.; Sirois, Y.; Veelken, C.; Yilmaz, Y.; Zabi, A.; Agram, J.-L.; Andrea, J.; Aubin, A.; Bloch, D.; Brom, J.-M.; Chabert, E. C.; Collard, C.; Conte, E.; Fontaine, J.-C.; Gelé, D.; Goerlach, U.; Goetzmann, C.; Le Bihan, A.-C.; Skovpen, K.; Van Hove, P.; Gadrat, S.; Beauceron, S.; Beaupere, N.; Bernet, C.; Boudoul, G.; Bouvier, E.; Brochet, S.; Carrillo Montoya, C. A.; Chasserat, J.; Chierici, R.; Contardo, D.; Depasse, P.; El Mamouni, H.; Fan, J.; Fay, J.; Gascon, S.; Gouzevitch, M.; Ille, B.; Kurca, T.; Lethuillier, M.; Mirabito, L.; Perries, S.; Ruiz Alvarez, J. D.; Sabes, D.; Sgandurra, L.; Sordini, V.; Vander Donckt, M.; Verdier, P.; Viret, S.; Xiao, H.; Tsamalaidze, Z.; Autermann, C.; Beranek, S.; Bontenackels, M.; Edelhoff, M.; Feld, L.; Heister, A.; Klein, K.; Lipinski, M.; Ostapchuk, A.; Preuten, M.; Raupach, F.; Sammet, J.; Schael, S.; Schulte, J. F.; Weber, H.; Wittmer, B.; Zhukov, V.; Ata, M.; Brodski, M.; Dietz-Laursonn, E.; Duchardt, D.; Erdmann, M.; Fischer, R.; Güth, A.; Hebbeker, T.; Heidemann, C.; Hoepfner, K.; Klingebiel, D.; Knutzen, S.; Kreuzer, P.; Merschmeyer, M.; Meyer, A.; Millet, P.; Olschewski, M.; Padeken, K.; Papacz, P.; Reithler, H.; Schmitz, S. A.; Sonnenschein, L.; Teyssier, D.; Thüer, S.; Weber, M.; Cherepanov, V.; Erdogan, Y.; Flügge, G.; Geenen, H.; Geisler, M.; Haj Ahmad, W.; Hoehle, F.; Kargoll, B.; Kress, T.; Kuessel, Y.; Künsken, A.; Lingemann, J.; Nowack, A.; Nugent, I. M.; Pooth, O.; Stahl, A.; Aldaya Martin, M.; Asin, I.; Bartosik, N.; Behr, J.; Behrens, U.; Bell, A. J.; Bethani, A.; Borras, K.; Burgmeier, A.; Cakir, A.; Calligaris, L.; Campbell, A.; Choudhury, S.; Costanza, F.; Diez Pardos, C.; Dolinska, G.; Dooling, S.; Dorland, T.; Eckerlin, G.; Eckstein, D.; Eichhorn, T.; Flucke, G.; Garay Garcia, J.; Geiser, A.; Gizhko, A.; Gunnellini, P.; Hauk, J.; Hempel, M.; Jung, H.; Kalogeropoulos, A.; Kasemann, M.; Katsas, P.; Kieseler, J.; Kleinwort, C.; Korol, I.; Krücker, D.; Lange, W.; Leonard, J.; Lipka, K.; Lobanov, A.; Lohmann, W.; Lutz, B.; Mankel, R.; Marfin, I.; Melzer-Pellmann, I.-A.; Meyer, A. B.; Mittag, G.; Mnich, J.; Mussgiller, A.; Naumann-Emme, S.; Nayak, A.; Ntomari, E.; Perrey, H.; Pitzl, D.; Placakyte, R.; Raspereza, A.; Ribeiro Cipriano, P. M.; Roland, B.; Ron, E.; Sahin, M. Ö.; Salfeld-Nebgen, J.; Saxena, P.; Schoerner-Sadenius, T.; Schröder, M.; Seitz, C.; Spannagel, S.; Vargas Trevino, A. D. R.; Walsh, R.; Wissing, C.; Blobel, V.; Centis Vignali, M.; Draeger, A. R.; Erfle, J.; Garutti, E.; Goebel, K.; Görner, M.; Haller, J.; Hoffmann, M.; Höing, R. S.; Junkes, A.; Kirschenmann, H.; Klanner, R.; Kogler, R.; Lange, J.; Lapsien, T.; Lenz, T.; Marchesini, I.; Ott, J.; Peiffer, T.; Perieanu, A.; Pietsch, N.; Poehlsen, J.; Poehlsen, T.; Rathjens, D.; Sander, C.; Schettler, H.; Schleper, P.; Schlieckau, E.; Schmidt, A.; Seidel, M.; Sola, V.; Stadie, H.; Steinbrück, G.; Troendle, D.; Usai, E.; Vanelderen, L.; Vanhoefer, A.; Barth, C.; Baus, C.; Berger, J.; Böser, C.; Butz, E.; Chwalek, T.; De Boer, W.; Descroix, A.; Dierlamm, A.; Feindt, M.; Frensch, F.; Giffels, M.; Gilbert, A.; Hartmann, F.; Hauth, T.; Husemann, U.; Katkov, I.; Kornmayer, A.; Lobelle Pardo, P.; Mozer, M. U.; Müller, T.; Müller, Th.; Nürnberg, A.; Quast, G.; Rabbertz, K.; Röcker, S.; Simonis, H. J.; Stober, F. M.; Ulrich, R.; Wagner-Kuhr, J.; Wayand, S.; Weiler, T.; Wolf, R.; Anagnostou, G.; Daskalakis, G.; Geralis, T.; Giakoumopoulou, V. A.; Kyriakis, A.; Loukas, D.; Markou, A.; Markou, C.; Psallidas, A.; Topsis-Giotis, I.; Agapitos, A.; Kesisoglou, S.; Panagiotou, A.; Saoulidou, N.; Stiliaris, E.; Aslanoglou, X.; Evangelou, I.; Flouris, G.; Foudas, C.; Kokkas, P.; Manthos, N.; Papadopoulos, I.; Paradas, E.; Strologas, J.; Bencze, G.; Hajdu, C.; Hidas, P.; Horvath, D.; Sikler, F.; Veszpremi, V.; Vesztergombi, G.; Zsigmond, A. J.; Beni, N.; Czellar, S.; Karancsi, J.; Molnar, J.; Palinkas, J.; Szillasi, Z.; Makovec, A.; Raics, P.; Trocsanyi, Z. L.; Ujvari, B.; Swain, S. K.; Beri, S. B.; Bhatnagar, V.; Gupta, R.; Bhawandeep, U.; Kalsi, A. K.; Kaur, M.; Kumar, R.; Mittal, M.; Nishu, N.; Singh, J. B.; Kumar, Ashok; Kumar, Arun; Ahuja, S.; Bhardwaj, A.; Choudhary, B. C.; Kumar, A.; Malhotra, S.; Naimuddin, M.; Ranjan, K.; Sharma, V.; Banerjee, S.; Bhattacharya, S.; Chatterjee, K.; Dutta, S.; Gomber, B.; Jain, Sa.; Jain, Sh.; Khurana, R.; Modak, A.; Mukherjee, S.; Roy, D.; Sarkar, S.; Sharan, M.; Abdulsalam, A.; Dutta, D.; Kumar, V.; Mohanty, A. K.; Pant, L. M.; Shukla, P.; Topkar, A.; Aziz, T.; Banerjee, S.; Bhowmik, S.; Chatterjee, R. M.; Dewanjee, R. K.; Dugad, S.; Ganguly, S.; Ghosh, S.; Guchait, M.; Gurtu, A.; Kole, G.; Kumar, S.; Maity, M.; Majumder, G.; Mazumdar, K.; Mohanty, G. B.; Parida, B.; Sudhakar, K.; Wickramage, N.; Bakhshiansohi, H.; Behnamian, H.; Etesami, S. M.; Fahim, A.; Goldouzian, R.; Khakzad, M.; Mohammadi Najafabadi, M.; Naseri, M.; Paktinat Mehdiabadi, S.; Rezaei Hosseinabadi, F.; Safarzadeh, B.; Zeinali, M.; Felcini, M.; Grunewald, M.; Abbrescia, M.; Calabria, C.; Chhibra, S. S.; Colaleo, A.; Creanza, D.; De Filippis, N.; De Palma, M.; Fiore, L.; Iaselli, G.; Maggi, G.; Maggi, M.; My, S.; Nuzzo, S.; Pompili, A.; Pugliese, G.; Radogna, R.; Selvaggi, G.; Sharma, A.; Silvestris, L.; Venditti, R.; Verwilligen, P.; Abbiendi, G.; Benvenuti, A. C.; Bonacorsi, D.; Braibant-Giacomelli, S.; Brigliadori, L.; Campanini, R.; Capiluppi, P.; Castro, A.; Cavallo, F. R.; Codispoti, G.; Cuffiani, M.; Dallavalle, G. M.; Fabbri, F.; Fanfani, A.; Fasanella, D.; Giacomelli, P.; Grandi, C.; Guiducci, L.; Marcellini, S.; Masetti, G.; Montanari, A.; Navarria, F. L.; Perrotta, A.; Rossi, A. M.; Rovelli, T.; Siroli, G. P.; Tosi, N.; Travaglini, R.; Albergo, S.; Cappello, G.; Chiorboli, M.; Costa, S.; Giordano, F.; Potenza, R.; Tricomi, A.; Tuve, C.; Barbagli, G.; Ciulli, V.; Civinini, C.; D'Alessandro, R.; Focardi, E.; Gallo, E.; Gonzi, S.; Gori, V.; Lenzi, P.; Meschini, M.; Paoletti, S.; Sguazzoni, G.; Tropiano, A.; Benussi, L.; Bianco, S.; Fabbri, F.; Piccolo, D.; Ferretti, R.; Ferro, F.; Lo Vetere, M.; Robutti, E.; Tosi, S.; Dinardo, M. E.; Fiorendi, S.; Gennai, S.; Gerosa, R.; Ghezzi, A.; Govoni, P.; Lucchini, M. T.; Malvezzi, S.; Manzoni, R. A.; Martelli, A.; Marzocchi, B.; Menasce, D.; Moroni, L.; Paganoni, M.; Pedrini, D.; Ragazzi, S.; Redaelli, N.; Tabarelli de Fatis, T.; Buontempo, S.; Cavallo, N.; Di Guida, S.; Fabozzi, F.; Iorio, A. O. M.; Lista, L.; Meola, S.; Merola, M.; Paolucci, P.; Azzi, P.; Bacchetta, N.; Bisello, D.; Carlin, R.; Checchia, P.; Dall'Osso, M.; Dorigo, T.; Galanti, M.; Gasparini, F.; Gasparini, U.; Gozzelino, A.; Lacaprara, S.; Margoni, M.; Meneguzzo, A. T.; Montecassiano, F.; Passaseo, M.; Pazzini, J.; Pegoraro, M.; Pozzobon, N.; Ronchese, P.; Simonetto, F.; Torassa, E.; Tosi, M.; Zotto, P.; Zucchetta, A.; Zumerle, G.; Gabusi, M.; Ratti, S. P.; Re, V.; Riccardi, C.; Salvini, P.; Vitulo, P.; Biasini, M.; Bilei, G. M.; Ciangottini, D.; Fanò, L.; Lariccia, P.; Mantovani, G.; Menichelli, M.; Saha, A.; Santocchia, A.; Spiezia, A.; Androsov, K.; Azzurri, P.; Bagliesi, G.; Bernardini, J.; Boccali, T.; Broccolo, G.; Castaldi, R.; Ciocci, M. A.; Dell'Orso, R.; Donato, S.; Fedi, G.; Fiori, F.; Foà, L.; Giassi, A.; Grippo, M. T.; Ligabue, F.; Lomtadze, T.; Martini, L.; Messineo, A.; Moon, C. S.; Palla, F.; Rizzi, A.; Savoy-Navarro, A.; Serban, A. T.; Spagnolo, P.; Squillacioti, P.; Tenchini, R.; Tonelli, G.; Venturi, A.; Verdini, P. G.; Vernieri, C.; Barone, L.; Cavallari, F.; D'imperio, G.; Del Re, D.; Diemoz, M.; Jorda, C.; Longo, E.; Margaroli, F.; Meridiani, P.; Micheli, F.; Organtini, G.; Paramatti, R.; Rahatlou, S.; Rovelli, C.; Santanastasio, F.; Soffi, L.; Traczyk, P.; Amapane, N.; Arcidiacono, R.; Argiro, S.; Arneodo, M.; Bellan, R.; Biino, C.; Cartiglia, N.; Casasso, S.; Costa, M.; Covarelli, R.; Degano, A.; Demaria, N.; Finco, L.; Mariotti, C.; Maselli, S.; Migliore, E.; Monaco, V.; Musich, M.; Obertino, M. M.; Pacher, L.; Pastrone, N.; Pelliccioni, M.; Pinna Angioni, G. L.; Potenza, A.; Romero, A.; Ruspa, M.; Sacchi, R.; Solano, A.; Staiano, A.; Tamponi, U.; Belforte, S.; Candelise, V.; Casarsa, M.; Cossutti, F.; Della Ricca, G.; Gobbo, B.; La Licata, C.; Marone, M.; Schizzi, A.; Umer, T.; Zanetti, A.; Chang, S.; Kropivnitskaya, A.; Nam, S. K.; Kim, D. H.; Kim, G. N.; Kim, M. S.; Kong, D. J.; Lee, S.; Oh, Y. D.; Park, H.; Sakharov, A.; Son, D. C.; Kim, T. J.; Ryu, M. S.; Kim, J. Y.; Moon, D. H.; Song, S.; Choi, S.; Gyun, D.; Hong, B.; Jo, M.; Kim, H.; Kim, Y.; Lee, B.; Lee, K. S.; Park, S. K.; Roh, Y.; Yoo, H. D.; Choi, M.; Kim, J. H.; Park, I. C.; Ryu, G.; Choi, Y.; Choi, Y. K.; Goh, J.; Kim, D.; Kwon, E.; Lee, J.; Yu, I.; Juodagalvis, A.; Komaragiri, J. R.; Md Ali, M. A. B.; Casimiro Linares, E.; Castilla-Valdez, H.; De La Cruz-Burelo, E.; Heredia-de La Cruz, I.; Hernandez-Almada, A.; Lopez-Fernandez, R.; Sanchez-Hernandez, A.; Carrillo Moreno, S.; Vazquez Valencia, F.; Pedraza, I.; Salazar Ibarguen, H. A.; Morelos Pineda, A.; Krofcheck, D.; Butler, P. H.; Reucroft, S.; Ahmad, A.; Ahmad, M.; Hassan, Q.; Hoorani, H. R.; Khan, W. A.; Khurshid, T.; Shoaib, M.; Bialkowska, H.; Bluj, M.; Boimska, B.; Frueboes, T.; Górski, M.; Kazana, M.; Nawrocki, K.; Romanowska-Rybinska, K.; Szleper, M.; Zalewski, P.; Brona, G.; Bunkowski, K.; Cwiok, M.; Dominik, W.; Doroba, K.; Kalinowski, A.; Konecki, M.; Krolikowski, J.; Misiura, M.; Olszewski, M.; Bargassa, P.; Beirão Da Cruz E Silva, C.; Faccioli, P.; Ferreira Parracho, P. G.; Gallinaro, M.; Lloret Iglesias, L.; Nguyen, F.; Rodrigues Antunes, J.; Seixas, J.; Varela, J.; Vischia, P.; Afanasiev, S.; Bunin, P.; Gavrilenko, M.; Golutvin, I.; Gorbunov, I.; Kamenev, A.; Karjavin, V.; Konoplyanikov, V.; Lanev, A.; Malakhov, A.; Matveev, V.; Moisenz, P.; Palichik, V.; Perelygin, V.; Shmatov, S.; Skatchkov, N.; Smirnov, V.; Zarubin, A.; Golovtsov, V.; Ivanov, Y.; Kim, V.; Kuznetsova, E.; Levchenko, P.; Murzin, V.; Oreshkin, V.; Smirnov, I.; Sulimov, V.; Uvarov, L.; Vavilov, S.; Vorobyev, A.; Vorobyev, An.; Andreev, Yu.; Dermenev, A.; Gninenko, S.; Golubev, N.; Kirsanov, M.; Krasnikov, N.; Pashenkov, A.; Tlisov, D.; Toropin, A.; Epshteyn, V.; Gavrilov, V.; Lychkovskaya, N.; Popov, V.; Pozdnyakov, I.; Safronov, G.; Semenov, S.; Spiridonov, A.; Stolin, V.; Vlasov, E.; Zhokin, A.; Andreev, V.; Azarkin, M.; Dremin, I.; Kirakosyan, M.; Leonidov, A.; Mesyats, G.; Rusakov, S. V.; Vinogradov, A.; Belyaev, A.; Boos, E.; Dubinin, M.; Dudko, L.; Ershov, A.; Gribushin, A.; Klyukhin, V.; Kodolova, O.; Lokhtin, I.; Obraztsov, S.; Petrushanko, S.; Savrin, V.; Snigirev, A.; Azhgirey, I.; Bayshev, I.; Bitioukov, S.; Kachanov, V.; Kalinin, A.; Konstantinov, D.; Krychkine, V.; Petrov, V.; Ryutin, R.; Sobol, A.; Tourtchanovitch, L.; Troshin, S.; Tyurin, N.; Uzunian, A.; Volkov, A.; Adzic, P.; Ekmedzic, M.; Milosevic, J.; Rekovic, V.; Alcaraz Maestre, J.; Battilana, C.; Calvo, E.; Cerrada, M.; Chamizo Llatas, M.; Colino, N.; De La Cruz, B.; Delgado Peris, A.; Domínguez Vázquez, D.; Escalante Del Valle, A.; Fernandez Bedoya, C.; Fernández Ramos, J. P.; Flix, J.; Fouz, M. C.; Garcia-Abia, P.; Gonzalez Lopez, O.; Goy Lopez, S.; Hernandez, J. M.; Josa, M. I.; Navarro De Martino, E.; Pérez-Calero Yzquierdo, A.; Puerta Pelayo, J.; Quintario Olmeda, A.; Redondo, I.; Romero, L.; Soares, M. S.; Albajar, C.; de Trocóniz, J. F.; Missiroli, M.; Moran, D.; Brun, H.; Cuevas, J.; Fernandez Menendez, J.; Folgueras, S.; Gonzalez Caballero, I.; Brochero Cifuentes, J. A.; Cabrillo, I. J.; Calderon, A.; Duarte Campderros, J.; Fernandez, M.; Gomez, G.; Graziano, A.; Lopez Virto, A.; Marco, J.; Marco, R.; Martinez Rivero, C.; Matorras, F.; Munoz Sanchez, F. J.; Piedra Gomez, J.; Rodrigo, T.; Rodríguez-Marrero, A. Y.; Ruiz-Jimeno, A.; Scodellaro, L.; Vila, I.; Vilar Cortabitarte, R.; Abbaneo, D.; Auffray, E.; Auzinger, G.; Bachtis, M.; Baillon, P.; Ball, A. H.; Barney, D.; Benaglia, A.; Bendavid, J.; Benhabib, L.; Benitez, J. F.; Bloch, P.; Bocci, A.; Bonato, A.; Bondu, O.; Botta, C.; Breuker, H.; Camporesi, T.; Cerminara, G.; Colafranceschi, S.; D'Alfonso, M.; d'Enterria, D.; Dabrowski, A.; David, A.; De Guio, F.; De Roeck, A.; De Visscher, S.; Di Marco, E.; Dobson, M.; Dordevic, M.; Dorney, B.; Dupont-Sagorin, N.; Elliott-Peisert, A.; Franzoni, G.; Funk, W.; Gigi, D.; Gill, K.; Giordano, D.; Girone, M.; Glege, F.; Guida, R.; Gundacker, S.; Guthoff, M.; Hammer, J.; Hansen, M.; Harris, P.; Hegeman, J.; Innocente, V.; Janot, P.; Kousouris, K.; Krajczar, K.; Lecoq, P.; Lourenço, C.; Magini, N.; Malgeri, L.; Mannelli, M.; Marrouche, J.; Masetti, L.; Meijers, F.; Mersi, S.; Meschi, E.; Moortgat, F.; Morovic, S.; Mulders, M.; Orsini, L.; Pape, L.; Perez, E.; Petrilli, A.; Petrucciani, G.; Pfeiffer, A.; Pimiä, M.; Piparo, D.; Plagge, M.; Racz, A.; Rolandi, G.; Rovere, M.; Sakulin, H.; Schäfer, C.; Schwick, C.; Sharma, A.; Siegrist, P.; Silva, P.; Simon, M.; Sphicas, P.; Spiga, D.; Steggemann, J.; Stieger, B.; Stoye, M.; Takahashi, Y.; Treille, D.; Tsirou, A.; Veres, G. I.; Wardle, N.; Wöhri, H. K.; Wollny, H.; Zeuner, W. D.; Bertl, W.; Deiters, K.; Erdmann, W.; Horisberger, R.; Ingram, Q.; Kaestli, H. C.; Kotlinski, D.; Langenegger, U.; Renker, D.; Rohe, T.; Bachmair, F.; Bäni, L.; Bianchini, L.; Buchmann, M. A.; Casal, B.; Chanon, N.; Dissertori, G.; Dittmar, M.; Donegà, M.; Dünser, M.; Eller, P.; Grab, C.; Hits, D.; Hoss, J.; Lustermann, W.; Mangano, B.; Marini, A. C.; Marionneau, M.; Martinez Ruiz del Arbol, P.; Masciovecchio, M.; Meister, D.; Mohr, N.; Musella, P.; Nägeli, C.; Nessi-Tedaldi, F.; Pandolfi, F.; Pauss, F.; Perrozzi, L.; Peruzzi, M.; Quittnat, M.; Rebane, L.; Rossini, M.; Starodumov, A.; Takahashi, M.; Theofilatos, K.; Wallny, R.; Weber, H. A.; Amsler, C.; Canelli, M. F.; Chiochia, V.; De Cosa, A.; Hinzmann, A.; Hreus, T.; Kilminster, B.; Lange, C.; Millan Mejias, B.; Ngadiuba, J.; Pinna, D.; Robmann, P.; Ronga, F. J.; Taroni, S.; Verzetti, M.; Yang, Y.; Cardaci, M.; Chen, K. H.; Ferro, C.; Kuo, C. M.; Lin, W.; Lu, Y. J.; Volpe, R.; Yu, S. S.; Chang, P.; Chang, Y. H.; Chao, Y.; Chen, K. F.; Chen, P. H.; Dietz, C.; Grundler, U.; Hou, W.-S.; Liu, Y. F.; Lu, R.-S.; Petrakou, E.; Tzeng, Y. M.; Wilken, R.; Asavapibhop, B.; Singh, G.; Srimanobhas, N.; Suwonjandee, N.; Adiguzel, A.; Bakirci, M. N.; Cerci, S.; Dozen, C.; Dumanoglu, I.; Eskut, E.; Girgis, S.; Gokbulut, G.; Guler, Y.; Gurpinar, E.; Hos, I.; Kangal, E. E.; Kayis Topaksu, A.; Onengut, G.; Ozdemir, K.; Ozturk, S.; Polatoz, A.; Sunar Cerci, D.; Tali, B.; Topakli, H.; Vergili, M.; Zorbilmez, C.; Akin, I. V.; Bilin, B.; Bilmis, S.; Gamsizkan, H.; Isildak, B.; Karapinar, G.; Ocalan, K.; Sekmen, S.; Surat, U. E.; Yalvac, M.; Zeyrek, M.; Albayrak, E. A.; Gülmez, E.; Kaya, M.; Kaya, O.; Yetkin, T.; Cankocak, K.; Vardarlı, F. I.; Levchuk, L.; Sorokin, P.; Brooke, J. J.; Clement, E.; Cussans, D.; Flacher, H.; Goldstein, J.; Grimes, M.; Heath, G. P.; Heath, H. F.; Jacob, J.; Kreczko, L.; Lucas, C.; Meng, Z.; Newbold, D. M.; Paramesvaran, S.; Poll, A.; Sakuma, T.; Seif El Nasr-storey, S.; Senkin, S.; Smith, V. J.; Bell, K. W.; Belyaev, A.; Brew, C.; Brown, R. M.; Cockerill, D. J. A.; Coughlan, J. A.; Harder, K.; Harper, S.; Olaiya, E.; Petyt, D.; Shepherd-Themistocleous, C. H.; Thea, A.; Tomalin, I. R.; Williams, T.; Womersley, W. J.; Worm, S. D.; Baber, M.; Bainbridge, R.; Buchmuller, O.; Burton, D.; Colling, D.; Cripps, N.; Dauncey, P.; Davies, G.; Della Negra, M.; Dunne, P.; Elwood, A.; Ferguson, W.; Fulcher, J.; Futyan, D.; Hall, G.; Iles, G.; Jarvis, M.; Karapostoli, G.; Kenzie, M.; Lane, R.; Lucas, R.; Lyons, L.; Magnan, A.-M.; Malik, S.; Mathias, B.; Nash, J.; Nikitenko, A.; Pela, J.; Pesaresi, M.; Petridis, K.; Raymond, D. M.; Rogerson, S.; Rose, A.; Seez, C.; Sharp, P.; Tapper, A.; Vazquez Acosta, M.; Virdee, T.; Zenz, S. C.; Cole, J. E.; Hobson, P. R.; Khan, A.; Kyberd, P.; Leggat, D.; Leslie, D.; Reid, I. D.; Symonds, P.; Teodorescu, L.; Turner, M.; Dittmann, J.; Hatakeyama, K.; Kasmi, A.; Liu, H.; Scarborough, T.; Wu, Z.; Charaf, O.; Cooper, S. I.; Henderson, C.; Rumerio, P.; Avetisyan, A.; Bose, T.; Fantasia, C.; Lawson, P.; Richardson, C.; Rohlf, J.; St. John, J.; Sulak, L.; Alimena, J.; Berry, E.; Bhattacharya, S.; Christopher, G.; Cutts, D.; Demiragli, Z.; Dhingra, N.; Ferapontov, A.; Garabedian, A.; Heintz, U.; Kukartsev, G.; Laird, E.; Landsberg, G.; Luk, M.; Narain, M.; Segala, M.; Sinthuprasith, T.; Speer, T.; Swanson, J.; Breedon, R.; Breto, G.; Calderon De La Barca Sanchez, M.; Chauhan, S.; Chertok, M.; Conway, J.; Conway, R.; Cox, P. T.; Erbacher, R.; Gardner, M.; Ko, W.; Lander, R.; Mulhearn, M.; Pellett, D.; Pilot, J.; Ricci-Tam, F.; Shalhout, S.; Smith, J.; Squires, M.; Stolp, D.; Tripathi, M.; Wilbur, S.; Yohay, R.; Cousins, R.; Everaerts, P.; Farrell, C.; Hauser, J.; Ignatenko, M.; Rakness, G.; Takasugi, E.; Valuev, V.; Weber, M.; Burt, K.; Clare, R.; Ellison, J.; Gary, J. W.; Hanson, G.; Heilman, J.; Ivova Rikova, M.; Jandir, P.; Kennedy, E.; Lacroix, F.; Long, O. R.; Luthra, A.; Malberti, M.; Olmedo Negrete, M.; Shrinivas, A.; Sumowidagdo, S.; Wimpenny, S.; Branson, J. G.; Cerati, G. B.; Cittolin, S.; D'Agnolo, R. T.; Holzner, A.; Kelley, R.; Klein, D.; Letts, J.; Macneill, I.; Olivito, D.; Padhi, S.; Palmer, C.; Pieri, M.; Sani, M.; Sharma, V.; Simon, S.; Tadel, M.; Tu, Y.; Vartak, A.; Welke, C.; Würthwein, F.; Yagil, A.; Zevi Della Porta, G.; Barge, D.; Bradmiller-Feld, J.; Campagnari, C.; Danielson, T.; Dishaw, A.; Dutta, V.; Flowers, K.; Franco Sevilla, M.; Geffert, P.; George, C.; Golf, F.; Gouskos, L.; Incandela, J.; Justus, C.; Mccoll, N.; Mullin, S. D.; Richman, J.; Stuart, D.; To, W.; West, C.; Yoo, J.; Apresyan, A.; Bornheim, A.; Bunn, J.; Chen, Y.; Duarte, J.; Mott, A.; Newman, H. B.; Pena, C.; Pierini, M.; Spiropulu, M.; Vlimant, J. R.; Wilkinson, R.; Xie, S.; Zhu, R. Y.; Azzolini, V.; Calamba, A.; Carlson, B.; Ferguson, T.; Iiyama, Y.; Paulini, M.; Russ, J.; Vogel, H.; Vorobiev, I.; Cumalat, J. P.; Ford, W. T.; Gaz, A.; Krohn, M.; Luiggi Lopez, E.; Nauenberg, U.; Smith, J. G.; Stenson, K.; Wagner, S. R.; Alexander, J.; Chatterjee, A.; Chaves, J.; Chu, J.; Dittmer, S.; Eggert, N.; Mirman, N.; Nicolas Kaufman, G.; Patterson, J. R.; Ryd, A.; Salvati, E.; Skinnari, L.; Sun, W.; Teo, W. D.; Thom, J.; Thompson, J.; Tucker, J.; Weng, Y.; Winstrom, L.; Wittich, P.; Winn, D.; Abdullin, S.; Albrow, M.; Anderson, J.; Apollinari, G.; Bauerdick, L. A. T.; Beretvas, A.; Berryhill, J.; Bhat, P. C.; Bolla, G.; Burkett, K.; Butler, J. N.; Cheung, H. W. K.; Chlebana, F.; Cihangir, S.; Elvira, V. D.; Fisk, I.; Freeman, J.; Gottschalk, E.; Gray, L.; Green, D.; Grünendahl, S.; Gutsche, O.; Hanlon, J.; Hare, D.; Harris, R. M.; Hirschauer, J.; Hooberman, B.; Jindariani, S.; Johnson, M.; Joshi, U.; Klima, B.; Kreis, B.; Kwan, S.; Linacre, J.; Lincoln, D.; Lipton, R.; Liu, T.; Lykken, J.; Maeshima, K.; Marraffino, J. M.; Martinez Outschoorn, V. I.; Maruyama, S.; Mason, D.; McBride, P.; Merkel, P.; Mishra, K.; Mrenna, S.; Nahn, S.; Newman-Holmes, C.; O'Dell, V.; Prokofyev, O.; Sexton-Kennedy, E.; Sharma, S.; Soha, A.; Spalding, W. J.; Spiegel, L.; Taylor, L.; Tkaczyk, S.; Tran, N. V.; Uplegger, L.; Vaandering, E. W.; Vidal, R.; Whitbeck, A.; Whitmore, J.; Yang, F.; Acosta, D.; Avery, P.; Bortignon, P.; Bourilkov, D.; Carver, M.; Curry, D.; Das, S.; De Gruttola, M.; Di Giovanni, G. P.; Field, R. D.; Fisher, M.; Furic, I. K.; Hugon, J.; Konigsberg, J.; Korytov, A.; Kypreos, T.; Low, J. F.; Matchev, K.; Mei, H.; Milenovic, P.; Mitselmakher, G.; Muniz, L.; Rinkevicius, A.; Shchutska, L.; Snowball, M.; Sperka, D.; Yelton, J.; Zakaria, M.; Hewamanage, S.; Linn, S.; Markowitz, P.; Martinez, G.; Rodriguez, J. L.; Adams, J. R.; Adams, T.; Askew, A.; Bochenek, J.; Diamond, B.; Haas, J.; Hagopian, S.; Hagopian, V.; Johnson, K. F.; Prosper, H.; Veeraraghavan, V.; Weinberg, M.; Baarmand, M. M.; Hohlmann, M.; Kalakhety, H.; Yumiceva, F.; Adams, M. R.; Apanasevich, L.; Berry, D.; Betts, R. R.; Bucinskaite, I.; Cavanaugh, R.; Evdokimov, O.; Gauthier, L.; Gerber, C. E.; Hofman, D. J.; Kurt, P.; O'Brien, C.; Sandoval Gonzalez, I. D.; Silkworth, C.; Turner, P.; Varelas, N.; Bilki, B.; Clarida, W.; Dilsiz, K.; Haytmyradov, M.; Merlo, J.-P.; Mermerkaya, H.; Mestvirishvili, A.; Moeller, A.; Nachtman, J.; Ogul, H.; Onel, Y.; Ozok, F.; Penzo, A.; Rahmat, R.; Sen, S.; Tan, P.; Tiras, E.; Wetzel, J.; Yi, K.; Anderson, I.; Barnett, B. A.; Blumenfeld, B.; Bolognesi, S.; Fehling, D.; Gritsan, A. V.; Maksimovic, P.; Martin, C.; Swartz, M.; Baringer, P.; Bean, A.; Benelli, G.; Bruner, C.; Gray, J.; Kenny, R. P., III; Majumder, D.; Malek, M.; Murray, M.; Noonan, D.; Sanders, S.; Sekaric, J.; Stringer, R.; Wang, Q.; Wood, J. S.; Chakaberia, I.; Ivanov, A.; Kaadze, K.; Khalil, S.; Makouski, M.; Maravin, Y.; Saini, L. K.; Skhirtladze, N.; Svintradze, I.; Gronberg, J.; Lange, D.; Rebassoo, F.; Wright, D.; Baden, A.; Belloni, A.; Calvert, B.; Eno, S. C.; Gomez, J. A.; Hadley, N. J.; Jabeen, S.; Kellogg, R. G.; Kolberg, T.; Lu, Y.; Mignerey, A. C.; Pedro, K.; Skuja, A.; Tonjes, M. B.; Tonwar, S. C.; Apyan, A.; Barbieri, R.; Busza, W.; Cali, I. A.; Di Matteo, L.; Gomez Ceballos, G.; Goncharov, M.; Gulhan, D.; Klute, M.; Lai, Y. S.; Lee, Y.-J.; Levin, A.; Luckey, P. D.; Paus, C.; Ralph, D.; Roland, C.; Roland, G.; Stephans, G. S. F.; Sumorok, K.; Velicanu, D.; Veverka, J.; Wyslouch, B.; Yang, M.; Zanetti, M.; Zhukova, V.; Dahmes, B.; Gude, A.; Kao, S. C.; Klapoetke, K.; Kubota, Y.; Mans, J.; Nourbakhsh, S.; Pastika, N.; Rusack, R.; Singovsky, A.; Tambe, N.; Turkewitz, J.; Acosta, J. G.; Oliveros, S.; Avdeeva, E.; Bloom, K.; Bose, S.; Claes, D. R.; Dominguez, A.; Gonzalez Suarez, R.; Keller, J.; Knowlton, D.; Kravchenko, I.; Lazo-Flores, J.; Meier, F.; Ratnikov, F.; Snow, G. R.; Zvada, M.; Dolen, J.; Godshalk, A.; Iashvili, I.; Kharchilava, A.; Kumar, A.; Rappoccio, S.; Alverson, G.; Barberis, E.; Baumgartel, D.; Chasco, M.; Massironi, A.; Morse, D. M.; Nash, D.; Orimoto, T.; Trocino, D.; Wang, R.-J.; Wood, D.; Zhang, J.; Hahn, K. A.; Kubik, A.; Mucia, N.; Odell, N.; Pollack, B.; Pozdnyakov, A.; Schmitt, M.; Stoynev, S.; Sung, K.; Velasco, M.; Won, S.; Brinkerhoff, A.; Chan, K. M.; Drozdetskiy, A.; Hildreth, M.; Jessop, C.; Karmgard, D. J.; Kellams, N.; Lannon, K.; Lynch, S.; Marinelli, N.; Musienko, Y.; Pearson, T.; Planer, M.; Ruchti, R.; Smith, G.; Valls, N.; Wayne, M.; Wolf, M.; Woodard, A.; Antonelli, L.; Brinson, J.; Bylsma, B.; Durkin, L. S.; Flowers, S.; Hart, A.; Hill, C.; Hughes, R.; Kotov, K.; Ling, T. Y.; Luo, W.; Puigh, D.; Rodenburg, M.; Winer, B. L.; Wolfe, H.; Wulsin, H. W.; Driga, O.; Elmer, P.; Hardenbrook, J.; Hebda, P.; Koay, S. A.; Lujan, P.; Marlow, D.; Medvedeva, T.; Mooney, M.; Olsen, J.; Piroué, P.; Quan, X.; Saka, H.; Stickland, D.; Tully, C.; Werner, J. S.; Zuranski, A.; Brownson, E.; Malik, S.; Mendez, H.; Ramirez Vargas, J. E.; Barnes, V. E.; Benedetti, D.; Bortoletto, D.; De Mattia, M.; Gutay, L.; Hu, Z.; Jha, M. K.; Jones, M.; Jung, K.; Kress, M.; Leonardo, N.; Miller, D. H.; Neumeister, N.; Primavera, F.; Radburn-Smith, B. C.; Shi, X.; Shipsey, I.; Silvers, D.; Svyatkovskiy, A.; Wang, F.; Xie, W.; Xu, L.; Zablocki, J.; Parashar, N.; Stupak, J.; Adair, A.; Akgun, B.; Ecklund, K. M.; Geurts, F. J. M.; Li, W.; Michlin, B.; Padley, B. P.; Redjimi, R.; Roberts, J.; Zabel, J.; Betchart, B.; Bodek, A.; de Barbaro, P.; Demina, R.; Eshaq, Y.; Ferbel, T.; Garcia-Bellido, A.; Goldenzweig, P.; Han, J.; Harel, A.; Hindrichs, O.; Khukhunaishvili, A.; Korjenevski, S.; Petrillo, G.; Vishnevskiy, D.; Ciesielski, R.; Demortier, L.; Goulianos, K.; Mesropian, C.; Arora, S.; Barker, A.; Chou, J. P.; Contreras-Campana, C.; Contreras-Campana, E.; Duggan, D.; Ferencek, D.; Gershtein, Y.; Gray, R.; Halkiadakis, E.; Hidas, D.; Kaplan, S.; Lath, A.; Panwalkar, S.; Park, M.; Patel, R.; Salur, S.; Schnetzer, S.; Sheffield, D.; Somalwar, S.; Stone, R.; Thomas, S.; Thomassen, P.; Walker, M.; Rose, K.; Spanier, S.; York, A.; Bouhali, O.; Castaneda Hernandez, A.; Eusebi, R.; Flanagan, W.; Gilmore, J.; Kamon, T.; Khotilovich, V.; Krutelyov, V.; Montalvo, R.; Osipenkov, I.; Pakhotin, Y.; Perloff, A.; Roe, J.; Rose, A.; Safonov, A.; Suarez, I.; Tatarinov, A.; Ulmer, K. A.; Akchurin, N.; Cowden, C.; Damgov, J.; Dragoiu, C.; Dudero, P. R.; Faulkner, J.; Kovitanggoon, K.; Kunori, S.; Lee, S. W.; Libeiro, T.; Volobouev, I.; Appelt, E.; Delannoy, A. G.; Greene, S.; Gurrola, A.; Johns, W.; Maguire, C.; Mao, Y.; Melo, A.; Sharma, M.; Sheldon, P.; Snook, B.; Tuo, S.; Velkovska, J.; Arenton, M. W.; Boutle, S.; Cox, B.; Francis, B.; Goodell, J.; Hirosky, R.; Ledovskoy, A.; Li, H.; Lin, C.; Neu, C.; Wood, J.; Clarke, C.; Harr, R.; Karchin, P. E.; Kottachchi Kankanamge Don, C.; Lamichhane, P.; Sturdy, J.; Belknap, D. A.; Carlsmith, D.; Cepeda, M.; Dasu, S.; Dodd, L.; Duric, S.; Friis, E.; Hall-Wilton, R.; Herndon, M.; Hervé, A.; Klabbers, P.; Lanaro, A.; Lazaridis, C.; Levine, A.; Loveless, R.; Mohapatra, A.; Ojalvo, I.; Perry, T.; Pierro, G. A.; Polese, G.; Ross, I.; Sarangi, T.; Savin, A.; Smith, W. H.; Taylor, D.; Vuosalo, C.; Woods, N.

    2015-04-01

    The results of a search for new physics in final states with jets, either photons or leptons, and low missing transverse momentum are reported. The study is based on a sample of proton-proton collisions collected at a center-of-mass energy √{ s} = 8 TeV with the CMS detector in 2012. The integrated luminosity of the sample is 19.7 fb-1. Many models of new physics predict the production of events with jets, electroweak gauge bosons, and little or no missing transverse momentum. Examples include stealth models of supersymmetry (SUSY), which predict a hidden sector at the electroweak energy scale in which SUSY is approximately conserved. The data are used to search for stealth SUSY signatures in final states with either two photons or an oppositely charged electron and muon. No excess is observed with respect to the standard model expectation, and the results are used to set limits on squark pair production in the stealth SUSY framework.

  3. Infrared radiation and stealth characteristics prediction for supersonic aircraft with uncertainty

    NASA Astrophysics Data System (ADS)

    Pan, Xiaoying; Wang, Xiaojun; Wang, Ruixing; Wang, Lei

    2015-11-01

    The infrared radiation (IR) intensity is generally used to embody the stealth characteristics of a supersonic aircraft, which directly affects its survivability in warfare. Under such circumstances, the research on IR signature as an important branch of stealth technology is significant to overcome this threat for survivability enhancement. Considering the existence of uncertainties in material and environment, the IR intensity is indeed a range rather than a specific value. In this paper, subjected to the properties of the IR, an analytic process containing the uncertainty propagation and the reliability evaluation is investigated when taking into account that the temperature of object, the atmospheric transmittance and the spectral emissivity of materials are all regarded as uncertain parameters. For one thing, the vertex method is used to analyze and estimate the dispersion of IR intensity; for another, the safety assessment of the stealth performance for aircraft is conducted by non-probabilistic reliability analysis. For the purpose of the comparison and verification, the Monte Carlo simulation is discussed as well. The validity, usage, and efficiency of the developed methodology are demonstrated by two application examples eventually.

  4. Search for stealth supersymmetry in events with jets, either photons or leptons, and low missing transverse momentum in pp collisions at 8 TeV

    DOE PAGES

    Khachatryan, Vardan

    2015-03-10

    The results of a search for new physics in final states with jets, either photons or leptons, and low missing transverse momentum are reported. The study is based on a sample of proton–proton collisions collected at a center-of-mass energy View the MathML source with the CMS detector in 2012. The integrated luminosity of the sample is 19.7 fb –1. Many models of new physics predict the production of events with jets, electroweak gauge bosons, and little or no missing transverse momentum. Examples include stealth models of supersymmetry (SUSY), which predict a hidden sector at the electroweak energy scale in whichmore » SUSY is approximately conserved. Furthermore, the data are used to search for stealth SUSY signatures in final states with either two photons or an oppositely charged electron and muon. No excess is observed with respect to the standard model expectation, and the results are used to set limits on squark pair production in the stealth SUSY framework.« less

  5. Stealth Dark Matter: Dark scalar baryons through the Higgs portal

    DOE PAGES

    Appelquist, T.; Brower, R. C.; Buchoff, M. I.; ...

    2015-10-23

    We present a new model of "Stealth Dark Matter": a composite baryonic scalar of an SU(N D) strongly coupled theory with even N D ≥ 4. All mass scales are technically natural, and dark matter stability is automatic without imposing an additional discrete or global symmetry. Constituent fermions transform in vectorlike representations of the electroweak group that permit both electroweak-breaking and electroweak-preserving mass terms. This gives a tunable coupling of stealth dark matter to the Higgs boson independent of the dark matter mass itself. We specialize to SU(4), and investigate the constraints on the model from dark meson decay, electroweakmore » precision measurements, basic collider limits, and spin-independent direct detection scattering through Higgs exchange. We exploit our earlier lattice simulations that determined the composite spectrum as well as the effective Higgs coupling of stealth dark matter in order to place bounds from direct detection, excluding constituent fermions with dominantly electroweak-breaking masses. A lower bound on the dark baryon mass m B ≳ 300 GeV is obtained from the indirect requirement that the lightest dark meson not be observable at LEP II. Furthermore, we briefly survey some intriguing properties of stealth dark matter that are worthy of future study, including collider studies of dark meson production and decay; indirect detection signals from annihilation; relic abundance estimates for both symmetric and asymmetric mechanisms; and direct detection through electromagnetic polarizability, a detailed study of which will appear in a companion paper.« less

  6. Mars Express Bistatic Radar Explores Stealth

    NASA Astrophysics Data System (ADS)

    Simpson, Richard A.; Tyler, G. L.; Nolan, M. C.; Pätzold, M.; Häusler, B.

    2006-09-01

    `Stealth' is an area of approximately 2000 x 500 km (E-W by N-S), straddling Mars' equator west of Tharsis and originally mapped at λ=3.5 cm by Muhleman et al. (Science, 253, 1508-1513, 1991). The name 'Stealth' was given because of its low radar backscatter cross section in the 1991 observations. Using transmissions from Mars Express and reception at 70-m antennas of the NASA Deep Space Network (DSN), we have obtained five 'spot' measurements of oblique-incidence forward scattering from Stealth at fixed incidence angles 32°

  7. Targeted drug delivery and enhanced intracellular release using functionalized liposomes

    NASA Astrophysics Data System (ADS)

    Garg, Ashish

    The ability to target cancer cells using an appropriate drug delivery system can significantly reduce the associated side effects from cancer therapies and can help in improving the overall quality of life, post cancer survival. Integrin alpha5beta1 is expressed on several types of cancer cells, including colon cancer and plays an important role in tumor growth and metastasis. Thus, the ability to target the integrin alpha 5beta1 using an appropriate drug delivery nano-vector can significantly help in inhibiting tumor growth and reducing tumor metastasis. The work in this thesis focuses on designing and optimizing, functionalized stealth liposomes (liposomes covered with polyethylene glycol (PEG)) that specifically target the integrin alpha5beta1. The PEG provides a steric barrier allowing the liposomes to circulate in the blood for longer duration and the functionalizing moiety, PR_b peptide specifically recognizes and binds to integrin alpha5beta1 expressing cells. The work demonstrates that by optimizing the amount of PEG and PR_b on the liposomal interface, nano-vectors can be engineered that bind to CT26.WT colon cancer cells in a specific manner and internalize through alpha 5beta1-mediated endocytosis. To further improve the efficacy of the system, PR_b functionalized pH-sensitive stealth liposomes that exhibit triggered release under mild acidic conditions present in endocytotic vesicles were designed. The study showed that PR_b functionalized pH-sensitive stealth liposomes, undergo destabilization under mildly acidic conditions and incorporation of the PR_b peptide does not significantly affect the pH-sensitivity of the liposomes. PR_b functionalized pH-sensitive stealth liposomes bind to CT26.WT colon carcinoma cells that express integrin alpha5beta 1, undergo cellular internalization, and release their load intracellularly in a short period of time as compared to other formulations. PR_b-targeted pH-sensitive stealth liposomes encapsulating 5-fluorouracil (5-FU) show significantly higher cytotoxicity than the PR_b-targeted inert stealth liposomes and the non-targeted stealth liposomes (both pH-sensitive and inert). The studies demonstrated that optimized PR_b functionalized pH sensitive liposomes have the potential to deliver a payload, such as chemotherapeutic agents, directly to colon cancer cells in an efficient and specific manner.

  8. Taking Control: Stealth Assessment of Deterministic Behaviors within a Game-Based System

    ERIC Educational Resources Information Center

    Snow, Erica L.; Likens, Aaron D.; Allen, Laura K.; McNamara, Danielle S.

    2016-01-01

    Game-based environments frequently afford students the opportunity to exert agency over their learning paths by making various choices within the environment. The combination of log data from these systems and dynamic methodologies may serve as a stealth means to assess how students behave (i.e., deterministic or random) within these learning…

  9. Taking Control: Stealth Assessment of Deterministic Behaviors within a Game-Based System

    ERIC Educational Resources Information Center

    Snow, Erica L.; Likens, Aaron D.; Allen, Laura K.; McNamara, Danielle S.

    2015-01-01

    Game-based environments frequently afford students the opportunity to exert agency over their learning paths by making various choices within the environment. The combination of log data from these systems and dynamic methodologies may serve as a stealth means to assess how students behave (i.e., deterministic or random) within these learning…

  10. A Statistical Study of Solar Sources of Wide Coronal Mass Ejections in 2011

    NASA Astrophysics Data System (ADS)

    Akiyama, S.; Yashiro, S.; Gopalswamy, N.; Makela, P. A.; Xie, H.; Olmedo, O. A.

    2013-12-01

    Solar surface signatures of coronal mass ejections (CMEs) are flares, filament eruptions/disappearances, EUVI waves, dimmings, and post-eruption arcades. After the SDO launch we have an excellent opportunity to investigate the solar sources of CMEs because of the high spatial- and temporal-resolution images from SDO/AIA and multiple views from SOHO, SDO, and STEREO-A/B. We examined the solar sources of all wide CMEs (width ≥ 60°) observed by either SOHO/LASCO or STEREO/SECCHI in 2011. Out of the 597 wide CMEs identified, 322 (54%) were associated with active region flares (FLs) and 164 (27%) with eruptive quiescent prominences (EPs). In 88 cases (15%) only EUV dimmings (DIMs) were observed. For the remaining 23 (4%) CMEs we were not able to identify the solar sources (UNK), i.e. they were stealth CMEs. The average speed and width of the CMEs are, 481 km/s and 115° for FLs, 349 km/s and 90° for EPs, 270 km/s and 78° for DIMs, and 171 km/s and 90° for UNKs, respectively. According to Ma et al. (2010), one third of CMEs observed by STEREO-A/B from 2009 Jan. 1 to Aug. 31 was categorized as stealth CMEs. Our study shows that the rate of stealth CMEs is much smaller for wide CMEs. We also compared the average appearance latitude of CMEs between the stealth and all wide CMEs and found that the stealth CMEs appeared from higher latitude (48°) than the general population (35°). Reference: Ma et al. (2010) ApJ, 722, 289

  11. Detecting Stealth Dark Matter Directly through Electromagnetic Polarizability.

    PubMed

    Appelquist, T; Berkowitz, E; Brower, R C; Buchoff, M I; Fleming, G T; Jin, X-Y; Kiskis, J; Kribs, G D; Neil, E T; Osborn, J C; Rebbi, C; Rinaldi, E; Schaich, D; Schroeder, C; Syritsyn, S; Vranas, P; Weinberg, E; Witzel, O

    2015-10-23

    We calculate the spin-independent scattering cross section for direct detection that results from the electromagnetic polarizability of a composite scalar "stealth baryon" dark matter candidate, arising from a dark SU(4) confining gauge theory-"stealth dark matter." In the nonrelativistic limit, electromagnetic polarizability proceeds through a dimension-7 interaction leading to a very small scattering cross section for dark matter with weak-scale masses. This represents a lower bound on the scattering cross section for composite dark matter theories with electromagnetically charged constituents. We carry out lattice calculations of the polarizability for the lightest "baryon" states in SU(3) and SU(4) gauge theories using the background field method on quenched configurations. We find the polarizabilities of SU(3) and SU(4) to be comparable (within about 50%) normalized to the stealth baryon mass, which is suggestive for extensions to larger SU(N) groups. The resulting scattering cross sections with a xenon target are shown to be potentially detectable in the dark matter mass range of about 200-700 GeV, where the lower bound is from the existing LUX constraint while the upper bound is the coherent neutrino background. Significant uncertainties in the cross section remain due to the more complicated interaction of the polarizablity operator with nuclear structure; however, the steep dependence on the dark matter mass, 1/m(B)(6), suggests the observable dark matter mass range is not appreciably modified. We briefly highlight collider searches for the mesons in the theory as well as the indirect astrophysical effects that may also provide excellent probes of stealth dark matter.

  12. Bistatic and Multistatic Radar: Surveillance, Countermeasures, and Radar Cross Sections. (Latest citations from the Aerospace Database)

    NASA Technical Reports Server (NTRS)

    1998-01-01

    The bibliography contains citations concerning the design, development, testing, and evaluation of bistatic and multistatic radar used in surveillance and countermeasure technology. Citations discuss radar cross sections, target recognition and characteristics, ghost recognition, motion image compensation, and wavelet analysis. Stealth aircraft design, stealth target tracking, synthetic aperture radar, and space applications are examined.

  13. Bistatic and Multistatic Radar: Surveillance, Countermeasures, and Radar Cross Sections. (Latest Citations from the Aerospace Database)

    NASA Technical Reports Server (NTRS)

    1997-01-01

    The bibliography contains citations concerning the design, development, testing, and evaluation of bistatic and multistatic radar used in surveillance and countermeasure technology. Citations discuss radar cross sections, target recognition and characteristics, ghost recognition, motion image compensation, and wavelet analysis. Stealth aircraft design, stealth target tracking, synthetic aperture radar, and space applications are examined.

  14. Stealth life detection instruments aboard Curiosity

    NASA Astrophysics Data System (ADS)

    Levin, Gilbert V.

    2012-10-01

    NASA has often stated (e.g. MSL Science Corner1) that it's Mars Science Laboratory (MSL), "Curiosity," Mission to Mars carries no life detection experiments. This is in keeping with NASA's 36-year explicit ban on such, imposed immediately after the 1976 Viking Mission to Mars. The space agency attributes the ban to the "ambiguity" of that Mission's Labeled Release (LR) life detection experiment, fearing an adverse effect on the space program should a similar "inconclusive" result come from a new robotic quest. Yet, despite the NASA ban, this author, the Viking LR Experimenter, contends there are "stealth life detection instruments" aboard Curiosity. These are life detection instruments in the sense that they can free the Viking LR from the pall of ambiguity that has held it prisoner so long. Curiosity's stealth instruments are those seeking organic compounds, and the mission's high-resolution camera system. Results from any or all of these devices, coupled with the Viking LR data, can confirm the LR's life detection claim. In one possible scenario, Curiosity can, of itself, completely corroborate the finding of life on Mars. MSL has just successfully landed on Mars. Hopefully, its stealth confirmations of life will be reported shortly.

  15. Integrating Stealth

    DTIC Science & Technology

    2015-12-01

    Over the past two decades the United States has revolutionized the war fighting industry with advancements in Low Observable ( LO ) technology and...precision strike capability. Advanced LO weapon systems such as the F-35, F-22 and the B-2 have been developed and portrayed as stealth aircraft. In...Because LO technology is in a physical form, methods can and have been developed to exploit the inherent weaknesses. Additionally, the technological

  16. Clusterin in the protein corona plays a key role in the stealth effect of nanoparticles against phagocytes.

    PubMed

    Aoyama, Michihiko; Hata, Katsutomo; Higashisaka, Kazuma; Nagano, Kazuya; Yoshioka, Yasuo; Tsutsumi, Yasuo

    2016-11-25

    In biological fluids, nanoparticles interact with biological components such as proteins, and a layer called the "protein corona" forms around the nanoparticles. It is believed that the composition of the protein corona affects the cellular uptake and in vivo biodistribution of nanoparticles; however, the key proteins of the protein corona that control the biological fate of nanoparticles remain unclear. Recently, it was reported that clusterin binding to pegylated nanoparticles is important for the stealth effect of pegylated nanoparticles in phagocytes. However, the effect of clusterin on non-pegylated nanoparticles is unknown, although it is known that clusterin is present in the protein corona of non-pegylated nanoparticles. Here, we assessed the stealth effect of clusterin in the corona of non-pegylated silver nanoparticles and silica nanoparticles. We found that serum- and plasma-protein corona inhibited the cellular uptake of silver nanoparticles and silica nanoparticles in phagocytes and that the plasma-protein corona showed a greater stealth effect compared with the serum-protein corona. Clusterin was present in both the serum- and plasma-protein corona, but was present at a higher level in the plasma-protein corona than in the serum-protein corona. Clusterin binding to silver nanoparticles and silica nanoparticles suppressed the cellular uptake of nanoparticles in human macrophage-like cells (THP-1 cells). Although further studies are required to determine how clusterin suppresses non-specific cellular uptake in phagocytes, our data suggest that clusterin plays a key role in the stealth effect of not only pegylated nanoparticles but also non-pegylated nanoparticles. Copyright © 2016 Elsevier Inc. All rights reserved.

  17. Detecting Stealth Dark Matter Directly through Electromagnetic Polarizability

    DOE PAGES

    Appelquist, T.; Berkowitz, E.; Brower, R. C.; ...

    2015-10-23

    We calculate the spin-independent scattering cross section for direct detection that results from the electromagnetic polarizability of a composite scalar “stealth baryon” dark matter candidate, arising from a dark SU(4) confining gauge theory—“stealth dark matter.” In the nonrelativistic limit, electromagnetic polarizability proceeds through a dimension-7 interaction leading to a very small scattering cross section for dark matter with weak-scale masses. This represents a lower bound on the scattering cross section for composite dark matter theories with electromagnetically charged constituents. We carry out lattice calculations of the polarizability for the lightest “baryon” states in SU(3) and SU(4) gauge theories using themore » background field method on quenched configurations. We find the polarizabilities of SU(3) and SU(4) to be comparable (within about 50%) normalized to the stealth baryon mass, which is suggestive for extensions to larger SU(N) groups. The resulting scattering cross sections with a xenon target are shown to be possibly detectable in the dark matter mass range of about 200–700 GeV, where the lower bound is from the existing LUX constraint while the upper bound is the coherent neutrino background. Significant uncertainties in the cross section remain due to the more complicated interaction of the polarizablity operator with nuclear structure; however, the steep dependence on the dark matter mass, 1/m 6 B, suggests the observable dark matter mass range is not appreciably modified. We highlight collider searches for the mesons in the theory as well as the indirect astrophysical effects that may also provide excellent probes of stealth dark matter.« less

  18. JPRS Report, Science & Technology. China: Stealth/Counter-Stealth Research.

    DTIC Science & Technology

    1992-11-19

    Frequency-Selective Surfaces 92FE0801F Beijing DIANZIXUEBAO [ACTA ELECTRONICA SINICA] in Chinese Vol 20 No 6, Jun 92 pp 85-88 [Article by Shen...microwave devices and electromag- netic scattering. Motion Compensation Method in ISAR Imaging 92FE0801A Beijing DIANZIXUEBAO [ACTA ELECTRONICA ...Chinese Society of Electronics and an editor of DIANZI XUEBAO [ACTA ELECTRONICA SINICA]. Deng Wenbiao Born in February 1961, he graduated from the

  19. A Stealth Intervention: The GLAMA (Girls! Lead! Achieve! Mentor! Activate!) and BLAST (Boys! Lead! Activate! Succeed Together!) School Connectedness, Peer Leadership and Physical Activity Transition Program

    ERIC Educational Resources Information Center

    Jenkinson, Kate A.; Naughton, Geraldine; Benson, Amanda C.

    2018-01-01

    This study investigated the effects of the GLAMA (Girls! Lead! Achieve! Mentor! Activate!) and BLAST (Boys! Lead! Activate! Succeed Together!) controlled 8-week peer-led stealth intervention on school connectedness and physical activity self-efficacy (PASE). The GLAMA and BLAST sessions were conducted during curriculum time in an Australian state…

  20. Stealth liposomes: review of the basic science, rationale, and clinical applications, existing and potential

    PubMed Central

    Immordino, Maria Laura; Dosio, Franco; Cattel, Luigi

    2006-01-01

    Among several promising new drug-delivery systems, liposomes represent an advanced technology to deliver active molecules to the site of action, and at present several formulations are in clinical use. Research on liposome technology has progressed from conventional vesicles (“first-generation liposomes”) to “second-generation liposomes”, in which long-circulating liposomes are obtained by modulating the lipid composition, size, and charge of the vesicle. Liposomes with modified surfaces have also been developed using several molecules, such as glycolipids or sialic acid. A significant step in the development of long-circulating liposomes came with inclusion of the synthetic polymer poly-(ethylene glycol) (PEG) in liposome composition. The presence of PEG on the surface of the liposomal carrier has been shown to extend blood-circulation time while reducing mononuclear phagocyte system uptake (stealth liposomes). This technology has resulted in a large number of liposome formulations encapsulating active molecules, with high target efficiency and activity. Further, by synthetic modification of the terminal PEG molecule, stealth liposomes can be actively targeted with monoclonal antibodies or ligands. This review focuses on stealth technology and summarizes pre-clinical and clinical data relating to the principal liposome formulations; it also discusses emerging trends of this promising technology. PMID:17717971

  1. Broadband Polarization Conversion Metasurface Based on Metal Cut-Wire Structure for Radar Cross Section Reduction.

    PubMed

    Yang, Jia Ji; Cheng, Yong Zhi; Ge, Chen Chen; Gong, Rong Zhou

    2018-04-19

    A class of linear polarization conversion coding metasurfaces (MSs) based on a metal cut-wire structure is proposed, which can be applied to the reduction properties of radar cross section (RCS). We firstly present a hypothesis based on the principle of planar array theory, and then verify the RCS reduction characteristics using linear polarization conversion coding MSs by simulations and experiments. The simulated results show that in the frequency range of 6⁻14 GHz, the linear polarization conversion ratio reaches a maximum value of 90%, which is in good agreement with the theoretical predictions. For normal incident x - and y -polarized waves, RCS reduction of designed coding MSs 01/01 and 01/10 is essentially more than 10 dB in the above-mentioned frequency range. We prepare and measure the 01/10 coding MS sample, and find that the experimental results in terms of reflectance and RCS reduction are in good agreement with the simulated ones under normal incidence. In addition, under oblique incidence, RCS reduction is suppressed as the angle of incidence increases, but still exhibits RCS reduction effects in a certain frequency range. The designed MS is expected to have valuable potential in applications for stealth field technology.

  2. The Soviet Stealth Fighter: Check or Checkmate

    DTIC Science & Technology

    1988-04-01

    pp. 20-31. 25 11. Bussert, Jim and Paul Beaver. "Soviet Submarine Hull Coatings," Defense Electronics (August 1987), pp. 26-27. 12. Canan , James W...Aircraft (January 1987), pp. 50-59. 34. Vorobyov, Ivan , Major-General. "Formula for Victory," Soviet Military Review (November 1986), pp. 14-15. 35...34Stealth Somber Taking Shape," International Combat Aircraft (September 1987), pp. 27-31. Vozobyov, Ivan , Major-General. "New Weapons Require Sound

  3. Optimization of the fabrication of novel stealth PLA-based nanoparticles by dispersion polymerization using D-optimal mixture design

    PubMed Central

    Adesina, Simeon K.; Wight, Scott A.; Akala, Emmanuel O.

    2015-01-01

    Purpose Nanoparticle size is important in drug delivery. Clearance of nanoparticles by cells of the reticuloendothelial system has been reported to increase with increase in particle size. Further, nanoparticles should be small enough to avoid lung or spleen filtering effects. Endocytosis and accumulation in tumor tissue by the enhanced permeability and retention effect are also processes that are influenced by particle size. We present the results of studies designed to optimize crosslinked biodegradable stealth polymeric nanoparticles fabricated by dispersion polymerization. Methods Nanoparticles were fabricated using different amounts of macromonomer, initiators, crosslinking agent and stabilizer in a dioxane/DMSO/water solvent system. Confirmation of nanoparticle formation was by scanning electron microscopy (SEM). Particle size was measured by dynamic light scattering (DLS). D-optimal mixture statistical experimental design was used for the experimental runs, followed by model generation (Scheffe polynomial) and optimization with the aid of a computer software. Model verification was done by comparing particle size data of some suggested solutions to the predicted particle sizes. Results and Conclusion Data showed that average particle sizes follow the same trend as predicted by the model. Negative terms in the model corresponding to the crosslinking agent and stabilizer indicate the important factors for minimizing particle size. PMID:24059281

  4. Optimization of the fabrication of novel stealth PLA-based nanoparticles by dispersion polymerization using D-optimal mixture design.

    PubMed

    Adesina, Simeon K; Wight, Scott A; Akala, Emmanuel O

    2014-11-01

    Nanoparticle size is important in drug delivery. Clearance of nanoparticles by cells of the reticuloendothelial system has been reported to increase with increase in particle size. Further, nanoparticles should be small enough to avoid lung or spleen filtering effects. Endocytosis and accumulation in tumor tissue by the enhanced permeability and retention effect are also processes that are influenced by particle size. We present the results of studies designed to optimize cross-linked biodegradable stealth polymeric nanoparticles fabricated by dispersion polymerization. Nanoparticles were fabricated using different amounts of macromonomer, initiators, crosslinking agent and stabilizer in a dioxane/DMSO/water solvent system. Confirmation of nanoparticle formation was by scanning electron microscopy (SEM). Particle size was measured by dynamic light scattering (DLS). D-optimal mixture statistical experimental design was used for the experimental runs, followed by model generation (Scheffe polynomial) and optimization with the aid of a computer software. Model verification was done by comparing particle size data of some suggested solutions to the predicted particle sizes. Data showed that average particle sizes follow the same trend as predicted by the model. Negative terms in the model corresponding to the cross-linking agent and stabilizer indicate the important factors for minimizing particle size.

  5. Design on compatible stealth photonic crystal of nearmiddle infrared and 1.06 μm laser

    NASA Astrophysics Data System (ADS)

    Zhang, Ji-kui; Wang, Jia-Chun; Wang, Qi-Chao

    2016-01-01

    In the near and middle infrared atmospheric window, infrared stealth material require a low absorptivity (which means a low emissivity according to Kirchhoff's law of black body), at the same time, it also requires high absorptivity so as to decrease the reflectance at military laser wavelength of 1.06μm. Under this circumstances, compatible stealth of infrared and laser is an urgent demand, but the demand is ambivalent for conventional materials. Photonic crystal (PC), as a new type of artificial periodic structure function material, can realize broadband thermal infrared stealth based on its high-reflection photon forbidden band(also called photonic band gap). The high-reflection photon forbidden band of PC can be adjusted to near and middle infrared wave band through some rational methods. When a defect was added into the periodic structure of PC, a "hole-digging" reflection spectrum, which is high absorption at military laser wavelength of 1.06μm, can be achieved, so compatible stealth of near and middle infrared and military laser wavelength of 1.06μm can be achieved too. In this paper, we selected near and middle infrared-transparent materials, Te and MgF2 , as high refractive index and low refractive index material respectively, and designed a one-dimensional one-defect-mode PC whose photon forbidden band was broadened to 1-5μm by constructing two photonic crystals into one. The optical property of the PC was calculated by Transfer matrix method(TMM) of thin-film optical theory, and the results shows that the as-designed PC has a high spectral reflectance in the near and middle infrared band, among which the reflectivity in 1.68μm 5.26μm band reached more than 90%, and the 2.48 5.07μm band even reached 99.99%. The result also shows that between the band gap of 1-5μm, there are one defect mode locating in the wavelength of 1.06μm, whose reflectance is below 0.70%, which means its spectral absorptivity is greater than 99.30%. All the above we have discussed proved that this "hole-digging spectrum" PC can realize the compatible stealth of near and middle infrared and 1.06μm military laser.

  6. The Prediction of Unsteady Aerodynamic Loading in High Aspect Ratio Wall Bounded Jets

    NASA Astrophysics Data System (ADS)

    Lurie, Michael B.

    Stealth aircraft are becoming more and more prevalent in the aircraft industry. One of the features of many stealth aircraft is an integrated engine that is mounted above the aircraft fuselage. The engine nozzle is often rectangular with a high aspect ratio, and exhausts onto a jet deck formed by the aircraft fuselage. This configuration allows the aircraft fuselage to shield the noise and other detectable features caused by the engine from the ground. The Northrop Grumman B2 Bomber is perhaps the most well-known example of this configuration. Additionally, stealth technology combined with unmanned aerial vehicles (UAV's) has led to the Joint Unmanned Combat System project, or J-UCAS. Both of the aircraft in development in this project use a wall-bounded high aspect ratio nozzle for stealth purposes. While these engine configurations provide a low radar profile and reduce the noise levels on the ground, they do introduce additional considerations. Since the engine is mounted above the aircraft, the nozzle jet is wall bounded by the fuselage of the aircraft. This is known as the flight deck. The jet stream exiting the nozzle can travel at supersonic speeds and potentially generates shock or expansion waves that impinge on the surface of the deck. The oscillations of these shockwaves on the deck produce localized unsteady forces acting on the aircraft. In addition, the interaction between the high speed jet stream and the slower ambient air causes a shear layer to form from the trailing edge of the nozzle. Turbulent eddies form and increase in size as they move downstream. The interactions of the shear layer with the flight deck produce additional unsteady forces on the aircraft. This thesis presents a study to predict the forces on a flight deck caused by a high aspect ratio wall bounded nozzle using both experimental methods and numerical simulations. The experiments performed were conducted on two different nozzles with aspect ratios of 4-1 and 8-1. Several different run conditions, including subsonic, overexpanded, on-design, and under-expanded, are included to study the effects of Mach number on the unsteady pressure. An aluminum flat plate is used to represent the aft deck. The plate is instrumented with Endevco pressure transducers to capture the fluctuating pressure on the aft deck. A spectral analysis performed on the individual sensors shows that the primary sources of fluctuating pressure are the shear layer along with shock-boundary layer interaction. Additional scaling with the nozzle heights is also presented. The numerical simulations were performed using a fully viscous, hybrid RANS/ LES model. They matched the nozzle characteristics and run conditions performed in the experiment. A detailed comparison between the unsteady pressures predicted by the computational simulations and those measured by the experiment is presented. Several discrepancies between the experimental and numerical results are the result of numerical error caused by the time marching scheme used in the simulations. A proper orthogonal decomposition (POD) method is introduced to further analyze the computational simulations and provide a filtering method to obtain more accurate results.

  7. Placement of iliosacral screws using 3D image-guided (O-Arm) technology and Stealth Navigation: comparison with traditional fluoroscopy.

    PubMed

    Theologis, A A; Burch, S; Pekmezci, M

    2016-05-01

    We compared the accuracy, operating time and radiation exposure of the introduction of iliosacral screws using O-arm/Stealth Navigation and standard fluoroscopy. Iliosacral screws were introduced percutaneously into the first sacral body (S1) of ten human cadavers, four men and six women. The mean age was 77 years (58 to 85). Screws were introduced using a standard technique into the left side of S1 using C-Arm fluoroscopy and then into the right side using O-Arm/Stealth Navigation. The radiation was measured on the surgeon by dosimeters placed under a lead thyroid shield and apron, on a finger, a hat and on the cadavers. There were no neuroforaminal breaches in either group. The set-up time for the O-Arm was significantly longer than for the C-Arm, while total time for placement of the screws was significantly shorter for the O-Arm than for the C-Arm (p = 0.001). The mean absorbed radiation dose during fluoroscopy was 1063 mRad (432.5 mRad to 4150 mRad). No radiation was detected on the surgeon during fluoroscopy, or when he left the room during the use of the O-Arm. The mean radiation detected on the cadavers was significantly higher in the O-Arm group (2710 mRem standard deviation (sd) 1922) than during fluoroscopy (11.9 mRem sd 14.8) (p < 0.01). O-Arm/Stealth Navigation allows for faster percutaneous placement of iliosacral screws in a radiation-free environment for surgeons, albeit with the same accuracy and significantly more radiation exposure to cadavers, when compared with standard fluoroscopy. Placement of iliosacral screws with O-Arm/Stealth Navigation can be performed safely and effectively. Cite this article: Bone Joint J 2016;98-B:696-702. ©2016 The British Editorial Society of Bone & Joint Surgery.

  8. Intrabilayer 64Cu Labeling of Photoactivatable, Doxorubicin-Loaded Stealth Liposomes.

    PubMed

    Luo, Dandan; Goel, Shreya; Liu, Hai-Jun; Carter, Kevin A; Jiang, Dawei; Geng, Jumin; Kutyreff, Christopher J; Engle, Jonathan W; Huang, Wei-Chiao; Shao, Shuai; Fang, Chao; Cai, Weibo; Lovell, Jonathan F

    2017-12-26

    Doxorubicin (Dox)-loaded stealth liposomes (similar to those in clinical use) can incorporate small amounts of porphyrin-phospholipid (PoP) to enable chemophototherapy (CPT). PoP is also an intrinsic and intrabilayer 64 Cu chelator, although how radiolabeling impacts drug delivery has not yet been assessed. Here, we show that 64 Cu can radiolabel the stable bilayer of preformed Dox-loaded PoP liposomes with inclusion of 1% ethanol without inducing drug leakage. Dox-PoP liposomes labeled with intrabilayer copper behaved nearly identically to unlabeled ones in vitro and in vivo with respect to physical parameters, pharmacokinetics, and CPT efficacy. Positron emission tomography and near-infrared fluorescence imaging visualized orthotopic mammary tumors in mice with passive liposome accumulation following administration. A single CPT treatment with 665 nm light (200 J/cm 2 ) strongly inhibited primary tumor growth. Liposomes accumulated in lung metastases, based on NIR imaging. These results establish the feasibility of CPT interventions guided by intrinsic multimodal imaging of Dox-loaded stealth PoP liposomes.

  9. Investigation of terahertz waves propagating through far infrared/CO2 laser stealth-compatible coating based on one-dimensional photonic crystal

    NASA Astrophysics Data System (ADS)

    Wang, Qichao; Wang, Jiachun; Zhao, Dapeng; Zhang, Jikui; Li, Zhigang; Chen, Zongsheng; Zeng, Jie; Miao, Lei; Shi, Jiaming

    2016-11-01

    We propose a new method to disclose the camouflaged targets coated with far infrared/CO2 laser stealth-compatible coating by utilizing terahertz (THz) radar. A coating based on one-dimensional photonic crystal (1DPC) with a defect mode is specially designed and successfully prepared, which possesses a high reflectivity in 8-14 μm waveband and a low reflectivity at 10.6 μm, by alternating thin films of Ge, ZnSe and Si. The propagation characteristic of 0.3-2 THz wave at incident angle from 0° to 80° in such PC coating is investigated theoretically based on characteristic matrix method. The maximal transmittance is up to 92%, and the absorptivity keeps lower than 0.5% over the whole band. The results are verified by experiments, which demonstrate the feasibility of using THz radar to detect the targets covered with such stealth-compatible coatings.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khachatryan, Vardan

    The results of a search for new physics in final states with jets, either photons or leptons, and low missing transverse momentum are reported. The study is based on a sample of proton–proton collisions collected at a center-of-mass energy View the MathML source with the CMS detector in 2012. The integrated luminosity of the sample is 19.7 fb –1. Many models of new physics predict the production of events with jets, electroweak gauge bosons, and little or no missing transverse momentum. Examples include stealth models of supersymmetry (SUSY), which predict a hidden sector at the electroweak energy scale in whichmore » SUSY is approximately conserved. Furthermore, the data are used to search for stealth SUSY signatures in final states with either two photons or an oppositely charged electron and muon. No excess is observed with respect to the standard model expectation, and the results are used to set limits on squark pair production in the stealth SUSY framework.« less

  11. Antibody derivatization and conjugation strategies: application in preparation of stealth immunoliposome to target chemotherapeutics to tumor.

    PubMed

    Manjappa, Arehalli S; Chaudhari, Kiran R; Venkataraju, Makam P; Dantuluri, Prudhviraju; Nanda, Biswarup; Sidda, Chennakesavulu; Sawant, Krutika K; Murthy, Rayasa S Ramachandra

    2011-02-28

    A great deal of effort has been made over the years to develop liposomes that have targeting vectors (oligosaccharides, peptides, proteins and vitamins) attached to the bilayer surface. Most studies have focused on antibody conjugates since procedures for producing highly specific monoclonal antibodies are well established. Antibody conjugated liposomes have recently attracted a great deal of interest, principally because of their potential use as targeted drug delivery systems and in diagnostic applications. A number of methods have been reported for coupling antibodies to the surface of stealth liposomes. The objective of this review is to enumerate various strategies which are employed in the modification and conjugation of antibodies to the surface of stealth liposomes. This review also describes various derivatization techniques of lipids prior and after their use in the preparation of liposomes. The use of single chain variable fragments and affibodies as targeting ligands in the preparation of immunoliposomes is also discussed. Copyright © 2010 Elsevier B.V. All rights reserved.

  12. Editorial on Future Jet Technologies

    NASA Astrophysics Data System (ADS)

    Gal-Or, Benjamin

    2014-08-01

    Advanced jet engines do not operate in an application vacuum. Their optimal use in advanced military applications drives much of their basic innovative research and development, especially when new needs arise in the rapidly changing domains of stealth-agile, fighter aircraft and tailless-stealth, Jet-Steered, Unmanned Air Vehicles (JS-UAV). For these reasons we periodically update this Journal with new trends that affect, and sometimes control, research and development of future jet-engines. One relevant example is the recently unmasked RQ-180 stealth-tailless drone, which is an improved version of the smaller, RQ-170 captured by Iran. Most important, with the new X-47B/C tailless-stealth JS-UAV, it is to dominate future uses of fuel-efficient jet-engines, especially for operating in dusty environments. The RQ-180 has been secretly designed and funded since 2008. It is based on a classified, 1986, parent Israeli Patents 78402, which protect hundreds design and testing trade secrets taken from 1986 to 1997 by the United States Government (USG) via classified contracts with USG-Contractors Boeing, Lockheed, General Dynamics and General Electric, as revealed by a December 6, 2013 Aviation Week [1-3] and U.S. Court of Appeals for the Federal Circuit, Case 2014-5028, Docket 12 [4]. The new RQ-180 design explains the recent U.S. Air Force ISR shift away from "permissive" environments - such as Iraq and Afghanistan, where non-stealthy Global Hawk and General Atomics' Reaper operate - toward new missions in highly "contested" or strongly "denied" enemy airspaces.

  13. Accuracy of screw fixation using the O-arm® and StealthStation® navigation system for unstable pelvic ring fractures.

    PubMed

    Takeba, Jun; Umakoshi, Kensuke; Kikuchi, Satoshi; Matsumoto, Hironori; Annen, Suguru; Moriyama, Naoki; Nakabayashi, Yuki; Sato, Norio; Aibiki, Mayuki

    2018-04-01

    Screw fixation for unstable pelvic ring fractures is generally performed using the C-arm. However, some studies reported erroneous piercing with screws, nerve injuries, and vessel injuries. Recent studies have reported the efficacy of screw fixations using navigation systems. The purpose of this retrospective study was to investigate the accuracy of screw fixation using the O-arm ® imaging system and StealthStation ® navigation system for unstable pelvic ring fractures. The participants were 10 patients with unstable pelvic ring fractures, who underwent screw fixations using the O-arm StealthStation navigation system (nine cases with iliosacral screw and one case with lateral compression screw). We investigated operation duration, bleeding during operation, the presence of complications during operation, and the presence of cortical bone perforation by the screws based on postoperative CT scan images. We also measured the difference in screw tip positions between intraoperative navigation screen shot images and postoperative CT scan images. The average operation duration was 71 min, average bleeding was 12 ml, and there were no nerve or vessel injuries during the operation. There was no cortical bone perforation by the screws. The average difference between intraoperative navigation images and postoperative CT images was 2.5 ± 0.9 mm, for all 18 screws used in this study. Our results suggest that the O-arm StealthStation navigation system provides accurate screw fixation for unstable pelvic ring fractures.

  14. The Stealth Biplane: a Proposal in Response to a Low Reynolds Number Station Keeping Mission

    NASA Technical Reports Server (NTRS)

    Walsh, Timothy E.; Flynn, Kevin T.; Donovan, Steven; Paul, Chris; Pangilinan, Harold; Padgett, John; Twomey, Daniel

    1990-01-01

    The Stealth Biplane is conceived and constructed to serve as a remotely piloted vehicle designed to navigate a low-level figure-eight course at a target Reynolds number of 100,000. This flight vehicle will combine the latest in lightweight radio controlled hardware in conjunction with current low Reynolds number aerodynamic research to demonstrate feasible operation in a variety of applications. These potential low Reynolds number applications include high altitude atmospheric sampling, search and rescue, and even law enforcement. Design specs and fabrication technique are discussed.

  15. Managing the technological edge: the UNESCO International Computation Centre and the limits to the transfer of computer technology, 1946-61.

    PubMed

    Nofre, David

    2014-07-01

    The spread of the modern computer is assumed to have been a smooth process of technology transfer. This view relies on an assessment of the open circulation of knowledge ensured by the US and British governments in the early post-war years. This article presents new historical evidence that question this view. At the centre of the article lies the ill-fated establishment of the UNESCO International Computation Centre. The project was initially conceived in 1946 to provide advanced computation capabilities to scientists of all nations. It soon became a prize sought by Western European countries like The Netherlands and Italy seeking to speed up their own national research programs. Nonetheless, as the article explains, the US government's limitations on the research function of the future centre resulted in the withdrawal of European support for the project. These limitations illustrate the extent to which US foreign science policy could operate as (stealth) industrial policy to secure a competitive technological advantage and the prospects of US manufacturers in a future European market.

  16. Evaluation of blood-brain barrier-stealth nanocomposites for in situ glioblastoma theranostics applications

    NASA Astrophysics Data System (ADS)

    Su, Chia-Hao; Tsai, Ching-Yi; Tomanek, Boguslaw; Chen, Wei-Yu; Cheng, Fong-Yu

    2016-04-01

    The blood-brain barrier (BBB) is a physiological structure of the blood vessels in the brain. The BBB efficiently traps most therapeutic drugs in the blood vessels and stops them from entering the brain tissue, resulting in a decreased therapeutic efficiency. In this study, we developed BBB-stealth nanocomposites composed of iron oxide (Fe3O4) nanoparticles (NPs) as a safe nanocarrier for glioblastoma therapy. We showed the antitumor activity of Dox/alg-Fe3O4 NPs using in vitro and in vivo tests. We demonstrated that G23-alg-Fe3O4 NPs crossed the BBB and entered the brain. In situ glioblastoma tumor-bearing mice were used to successfully evaluate the antitumor activity of G23-Dox/alg-Fe3O4 NPs. Magnetic resonance imaging (MRI) and bioluminescence imaging (BLI) confirmed the BBB crossing. The BBB-stealth nanocomposites show great potential for a proof-of-concept clinical trial as a theranostics platform for human brain tumor therapy.The blood-brain barrier (BBB) is a physiological structure of the blood vessels in the brain. The BBB efficiently traps most therapeutic drugs in the blood vessels and stops them from entering the brain tissue, resulting in a decreased therapeutic efficiency. In this study, we developed BBB-stealth nanocomposites composed of iron oxide (Fe3O4) nanoparticles (NPs) as a safe nanocarrier for glioblastoma therapy. We showed the antitumor activity of Dox/alg-Fe3O4 NPs using in vitro and in vivo tests. We demonstrated that G23-alg-Fe3O4 NPs crossed the BBB and entered the brain. In situ glioblastoma tumor-bearing mice were used to successfully evaluate the antitumor activity of G23-Dox/alg-Fe3O4 NPs. Magnetic resonance imaging (MRI) and bioluminescence imaging (BLI) confirmed the BBB crossing. The BBB-stealth nanocomposites show great potential for a proof-of-concept clinical trial as a theranostics platform for human brain tumor therapy. Electronic supplementary information (ESI) available: Experimental details. See DOI: 10.1039/c6nr00280c

  17. Generationing, Stealthing, and Gift Giving: The Intentional Transmission of HIV by HIV-Positive Men to their HIV-Negative Sex Partners.

    PubMed

    Klein, Hugh

    2014-11-06

    Gift giving is the process by which an HIV-positive person purposely infects an HIV-negative person with HIV, usually with that person's knowledge and consent. Little has been written about this HIV transmission practice. In this paper, two specific types of gift giving - generationing and stealthing - are explained and introduced to the scientific literature. Generationing is a type of gift giving in which one gift giver successfully infects a previously-uninfected man with HIV, and then the two men collaborate in an effort to seroconvert another man, and so forth. Stealthing is another type of gift giving in which an HIV-positive man actively tries to infect an HIV-negative man with HIV, without the latter's knowledge or consent. The present study reports on the prevalence of gift giving (4.6%) in a population of men who use the Internet specifically to identify partners for unprotected sex. The research is based on a national random sample of 332 men who have sex with men, identified from 16 websites. Data were collected via telephone interviews conducted between January 2008 and May 2009. The paper concludes with a discussion of the implications of these findings for HIV prevention and intervention efforts. Most notably, to the extent that generationing, stealthing, and gift giving occur among MSM, they represent a very high risk of HIV transmission. More work needs to be done to understand these behaviors, the factors that underlie them, and to determine how prevalent they are in the bare-backing population of MSM.

  18. Generationing, Stealthing, and Gift Giving: The Intentional Transmission of HIV by HIV-Positive Men to their HIV-Negative Sex Partners

    PubMed Central

    Klein, Hugh

    2014-01-01

    Gift giving is the process by which an HIV-positive person purposely infects an HIV-negative person with HIV, usually with that person’s knowledge and consent. Little has been written about this HIV transmission practice. In this paper, two specific types of gift giving – generationing and stealthing – are explained and introduced to the scientific literature. Generationing is a type of gift giving in which one gift giver successfully infects a previously-uninfected man with HIV, and then the two men collaborate in an effort to seroconvert another man, and so forth. Stealthing is another type of gift giving in which an HIV-positive man actively tries to infect an HIV-negative man with HIV, without the latter’s knowledge or consent. The present study reports on the prevalence of gift giving (4.6%) in a population of men who use the Internet specifically to identify partners for unprotected sex. The research is based on a national random sample of 332 men who have sex with men, identified from 16 websites. Data were collected via telephone interviews conducted between January 2008 and May 2009. The paper concludes with a discussion of the implications of these findings for HIV prevention and intervention efforts. Most notably, to the extent that generationing, stealthing, and gift giving occur among MSM, they represent a very high risk of HIV transmission. More work needs to be done to understand these behaviors, the factors that underlie them, and to determine how prevalent they are in the bare-backing population of MSM. PMID:26973945

  19. Different effect of hydrogelation on anti-fouling and circulation properties of dextran–iron oxide nanoparticles

    PubMed Central

    Karmali, Priya Prakash; Chao, Ying; Park, Ji-Ho (Joe); Sailor, Michael J.; Ruoslahti, Erkki; Esener, Sadik C.; Simberg, Dmitri

    2012-01-01

    Premature recognition and clearance of nanoparticulate imaging and therapeutic agents by macrophages in the tissues can dramatically reduce both the nanoparticle half-life and delivery to the diseased tissue. Grafting nanoparticles with hydrogels prevents nanoparticulate recognition by liver and spleen macrophages and greatly prolongs circulation times in vivo. Understanding the mechanisms by which hydrogels achieve this “stealth” effect has implications for the design of long-circulating nanoparticles. Thus, the role of plasma protein absorption in the hydrogel effect is not yet understood. Short-circulating dextran-coated iron oxide nanoparticles could be converted into stealth hydrogel nanoparticles by crosslinking with 1-chloro-2,3-epoxypropane. We show that hydrogelation did not affect the size, shape and zeta potential, but completely prevented the recognition and clearance by liver macrophages in vivo. Hydrogelation decreased the number of hydroxyl groups on the nanoparticle surface and reduced the binding of the anti-dextran antibody. At the same time, hydrogelation did not reduce the absorption of cationic proteins on the nanoparticle surface. Specifically, there was no effect on the binding of kininogen, histidine-rich glycoprotein, and protamine sulfate to the anionic nanoparticle surface. In addition, hydrogelation did not prevent activation of plasma kallikrein on the metal oxide surface. These data suggest that: (a) a stealth hydrogel coating does not mask charge interactions with iron oxide surface and (b) the total blockade of plasma protein absorption is not required for maintaining iron oxide nanoparticles’ long-circulating stealth properties. These data illustrate a novel, clinically promising property of long-circulating stealth nanoparticles. PMID:22243419

  20. Nuclear delivery of a therapeutic peptide by long circulating pH-sensitive liposomes: benefits over classical vesicles.

    PubMed

    Ducat, E; Deprez, J; Gillet, A; Noël, A; Evrard, B; Peulen, O; Piel, G

    2011-11-28

    The purpose of this study is to propose a suitable vector combining increased circulation lifetime and intracellular delivery capacities for a therapeutic peptide. Long circulating classical liposomes [SPC:CHOL:PEG-750-DSPE (47:47:6 molar% ratio)] or pH-sensitive stealth liposomes [DOPE:CHEMS:CHOL:PEG(750)-DSPE (43:21:30:6 molar% ratio)] were used to deliver a therapeutic peptide to its nuclear site of action. The benefit of using stealth pH-sensitive liposomes was investigated and formulations were compared to classical liposomes in terms of size, shape, charge, encapsulation efficiency, stability and, most importantly, in terms of cellular uptake. Confocal microscopy and flow cytometry were used to evaluate the intracellular fate of liposomes themselves and of their hydrophilic encapsulated material. Cellular uptake of peptide-loaded liposomes was also investigated in three cell lines: Hs578t human epithelial cells from breast carcinoma, MDA-MB-231 human breast carcinoma cells and WI-26 human diploid lung fibroblast cells. The difference between formulations in terms of peptide delivery from the endosome to the cytoplasm and even to the nucleus was investigated as a function of time. Characterization studies showed that both formulations possess acceptable size, shape and encapsulation efficiency but cellular uptake studies showed the important benefit of the pH-sensitive formulation over the classical one, in spite of liposome PEGylation. Indeed, stealth pH-sensitive liposomes were able to deliver hydrophilic materials strongly to the cytoplasm. Most importantly, when encapsulated in pH-sensitive stealth liposomes, the peptide was able to reach the nucleus of tumorigenic and non tumorigenic breast cancer cells. Copyright © 2011 Elsevier B.V. All rights reserved.

  1. Reconstructed imaging of acoustic cloak using time-lapse reversal method

    NASA Astrophysics Data System (ADS)

    Zhou, Chen; Cheng, Ying; Xu, Jian-yi; Li, Bo; Liu, Xiao-jun

    2014-08-01

    We proposed and investigated a solution to the inverse acoustic cloak problem, an anti-stealth technology to make cloaks visible, using the time-lapse reversal (TLR) method. The TLR method reconstructs the image of an unknown acoustic cloak by utilizing scattered acoustic waves. Compared to previous anti-stealth methods, the TLR method can determine not only the existence of a cloak but also its exact geometric information like definite shape, size, and position. Here, we present the process for TLR reconstruction based on time reversal invariance. This technology may have potential applications in detecting various types of cloaks with different geometric parameters.

  2. On symmetry inheritance of nonminimally coupled scalar fields

    NASA Astrophysics Data System (ADS)

    Barjašić, Irena; Smolić, Ivica

    2018-04-01

    We present the first symmetry inheritance analysis of fields non-minimally coupled to gravity. In this work we are focused on the real scalar field ϕ with nonminimal coupling of the form ξφ2 R . Possible cases of symmetry noninheriting fields are constrained by the properties of the Ricci tensor and the scalar potential. Examples of such spacetimes can be found among those which are ‘dressed’ with the stealth scalar field, a nontrivial scalar field configuration with the vanishing energy–momentum tensor. We classify the scalar field potentials which allow symmetry noninheriting stealth field configurations on top of the exact solutions of the Einstein’s gravitational field equation with the cosmological constant.

  3. ET AAS evaluation of the stability and pH-sensitivity of, pH-sensitive stealth liposomes containing cisplatin in mouse plasma.

    PubMed

    Vieira, F P; Mesquita, T L; Lara, P C P; Ramaldes, G A; Beinner, M A; Silva, J B B; Oliveira, M C; Silveira, J N

    2013-10-01

    In this work, stability and the pH-sensitivity of pH-sensitive stealth liposomes containing cisplatin exposed to plasma medium and their subsequent responses to pH modifications were evaluated. A method to determine platin in mouse plasma by electrothermal atomic absorption spectroscopy (ET AAS) was developed and validated. At first, a comparative study of sample preparation treatments with basic, acidic, and acidic added with Triton X-100 as a modifier was done. The best treatment was obtained with HCl 3% (v/v). The ET AAS method with acid treatment presented linearity at a range of 10-160 ng Pt/mL. The limits of detection (LOD) was 3.1 ng/mL Pt for acid treatment, while the limit quantification (LOQ) was 10 ng/mL Pt. The acid treatment presented good repeatability (VC<15.0%) and recovery close to 100%. This treatment was chosen for subsequent studies due to its best value of repeatability, recovery, LOD and lowest cost. pH-sensitive stealth liposomes, containing cisplatin, demonstrated low stability and poor response to pH variation after plasma incubation. These findings suggest that further studies are needed to improve liposome formulation i.e., to reduce its size. Copyright © 2013 Elsevier B.V. All rights reserved.

  4. Biodistribution and pharmacokinetics of In-111-labeled Stealth{reg_sign} liposomes in patients with solid tumours

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harrington, K.J.; Peters, A.M.; Mohammadtaghi, S.

    1996-05-01

    The use of liposomal doxorubicin yields response rates of up to 70-80% in patients with AIDS-related Kaposi`s sarcoma with favourable alteration of the toxicity profile of the drug. Liposomal delivery of therapy in patients with solid cancers is currently under investigation. Our aim is to determine the biodistribution and pharmacokinetics of In-111-labeled Stealth{reg_sign} liposomes (SEQUUS{trademark}) liposomes (SEQUUS{trademark} Pharmaceuticals Inc., Menlo Park, USA) in patients with advanced solid malignant tumours. Ten patients (4 male, 6 female) with a median age of 59 (range 43 - 75) received 100 MBq of In-111-labeled Stealth{reg_sign} liposomes. Four had breast cancer, 3 head and neckmore » tumours, 2 lung and 1 cervical cancer. Blood samples and whole body gamma camera images were obtained at 0.5, 4, 24, 48, 72, 96 and 240 hours after injection and sequential 24 hour urine collections were performed for the first 96 h. SPECT imaging was performed when indicated. High definition images of tumours were obtained in 9 patients (3/4 breast, 3/3 head and neck, 2/2 lung and 1/1 cervix cancers). One patient (breast cancer) had negative images. The median cumulative urinary excretion of In-111 over the first 96 h was 17.8 (range 3.5-21.3) % of the injected dose. The uptake of liposomes in various tissues was estimated from regions of interest on the whole body images. Prominent uptake was seen in the liver (10-15% of injected dose), lungs (4-9%) and spleen (2-8%). Tumour uptake in the first 96 h varied form 0.5-4% of the injected dose. This is approximately 10 fold higher than might be expected from experience with other targeting methods (eg monoclonal antibodies). These data confirm that Stealth liposomes have a prolonged circulation half-life and localise to solid tumour tissue.« less

  5. Lights on: Dye dequenching reveals polymersome fusion with polymer, lipid and stealth lipid vesicles

    DOE PAGES

    Henderson, Ian M.; Collins, Aaron M.; Quintana, Hope A.; ...

    2015-12-13

    In this study, we develop a quantitative dye dequenching technique for the measurement of polymersome fusion, using it to characterize the salt mediated, mechanically-induced fusion of polymersomes with polymer, lipid, and so-called stealth lipid vesicles. While dye dequenching has been used to quantitatively explore liposome fusion in the past, this is the first use of dye dequenching to measure polymersome fusion of which we are aware. In addition to providing quantitative results, dye dequenching is ideal for detecting fusion in instances where DLS results would be ambiguous, such as low yield levels and size ranges outside the capabilities of DLS.more » The dye chosen for this study was a cyanine derivative, 1,1'-dioctadecyl-3,3,3',3'-tetramethylindotricarbocyanine iodide (DiR), which proved to provide excellent data on the extent of polymersome fusion. Using this technique, we have shown the limited fusion capabilities of polymersome/liposome heterofusion, notably DOPC vesicles fusing with polymersomes at half the efficiency of polymersome homofusion and DPPC vesicles showing virtually no fusion. In addition to these key heterofusion experiments, we determined the broad applicability of dye dequenching in measuring kinetic rates of polymersome fusion; and showed that even at elevated temperatures or over multiple weeks' time, no polymersome fusion occurred without agitation. Stealth liposomes formed from DPPC and PEO-functionalized lipid, however, fused with polymersomes and stealth liposomes with relatively high efficiency, lending support to our hypothesis that the response of the PEO corona to salt is a key factor in the fusion process. This last finding suggests that although the conjugation of PEO to lipids increases vesicle biocompatibility and enables their longer circulation times, it also renders the vesicles subject to destabilization under high salt and shear (e.g. in the circulatory system) that may lead to, in this case, fusion.« less

  6. Planet Earth: Its Past, Our Present, A Future (?)

    NASA Astrophysics Data System (ADS)

    Kieffer, S. W.

    2012-04-01

    We who have lived through the second half of the 20th century into the 21st century have witnessed a profound transition in the biological and physical relationship between humans and the rest of the planet. In the middle of the last century, our planet still had undeveloped islands: there were frontiers that held new lands, mysteries, adventures, cultures, and resources. However, these islands have merged into a relatively seamless planet by a mobile and expanding population, science and technology, and global communication. We are subject to stealth as well as natural disasters. Natural disasters result from the ongoing geological and meteorological processes on our planet, increasingly exacerbated by human presence and behavior. Stealth disasters, on the other hand, are caused by humans, but involve the natural systems that support us. Examples of stealth disasters are climate change, loss of soils, acidification of the oceans, desertification, and loss of groundwater resources. Civilization is a complex system. It has emergent properties, and a tuning parameter--a parameter that is "tuned" until the unexpected happens. The tuning parameter for populations is the number of members relative to the capacities that support them. Because of our sheer numbers, we are driving the stealth disasters, and we will be affected more severely by natural disasters than we have been in the past on a less densely populated planet. To guide our thinking about geoethical issues, we propose a (hypothetical) world organization modeled after the Centers for Disease Control (CDC) in the U.S., and call it the Center for Disaster Control for Planet Earth (CDCPE). This center would have a scientific body to provide impartial facts and uncertainties, an engineering body to propose and implement technical solutions, a negotiating body to balance the realities of political, economic, religious and cultural values, and an enforcement body that is responsive to all of the inputs. How shall we start?

  7. Stealth Disasters and Geoethics

    NASA Astrophysics Data System (ADS)

    Kieffer, Susan W.

    2013-04-01

    Natural processes of the earth unleash energy in ways that are sometimes harmful or, at best, inconvenient, for humans: earthquakes, volcanic eruptions, hurricanes, landslides, floods. Ignoring the biological component of the geosphere, we have historically called such events "natural disasters." They are typically characterized by a sudden onset and relatively immediate consequences. There are many historical examples and our human societies have evolved various ways of coping with them logistically, economically, and psychologically. Preparation, co-existence, recovery, and remediation are possible, at least to some extent, even in the largest of events. Geoethical questions exist in each stage, but the limited local extent of these disasters allows the possibility of discussion and resolution. There are other disasters that involve the natural systems that support us. Rather than being driven primarily by natural non-biological processes, these are driven by human behavior. Examples are climate change, desertification, acidification of the oceans, and compaction and erosion of fertile soils. They typically have more gradual onsets than natural disasters and, because of this, I refer to these as "stealth disasters." Although they are unfolding unnoticed or ignored by many, they are having near-term consequences. At a global scale they are new to human experience. Our efforts at preparation, co-existence, recovery, and remediation lag far behind those that we have in place for natural disasters. Furthermore, these four stages in stealth disaster situations involve many ethical questions that typically must be solved in the context of much larger cultural and social differences than encountered in natural disaster settings. Four core ethical principles may provide guidelines—autonomy, non-maleficence, beneficence, and justice (e.g., Jamais Cascio). Geoscientists can contribute to the solutions in many ways. We can work to ensure that as people take responsibility for their own lives (autonomy), they have relevant information in useable form. To minimize harm to others and the environment (non-maleficence), we can design and implement sustainable ways to extract resources and dispose of waste. To advance the welfare of humankind (beneficence), we can work with engineers on innovative uses for commodities that are easily-obtained, and on replacements for rare ones. And, we can strive toward social justice by recognizing that social, ethical, legal and political issues regarding resource use may be far more difficult than the geotechnical ones, and work within the (sometimes frustrating) framework for resolution of those issues. Referring back to the four stages of co-existence with natural disasters (preparation, co-existence, recovery, and remediation), the global scope of stealth disasters raises far more geoethical issues than we have encountered with natural disasters. Just as we have learned (e.g., Hurricanes Katrina and Sandy in the U.S.) that inter-agency response is crucial to successful management of natural disasters, we can expect that global cooperation in management and governance will be essential to the management of stealth disasters. It is imperative that research and education of current and future geoscientists in universities recognize the newly developing role of the geosciences in stealth disasters and that we train our students for a future within this context.

  8. Design of "Eye Closure" system for the stealth of photo-electric equipments

    NASA Astrophysics Data System (ADS)

    Zhang, Y.; Hua, W. S.; Li, G.

    2012-10-01

    Based on the optical activity of liquid crystal, a new approach for the stealth of "cat's eye" targets is proposed in this paper. It imitates the physiological close reaction of human eyes when strong light irradiates eyes. With this approach, the "cat's eye" effect will vanish, which is applied in restricting photo-electric equipments being detected and located by active laser detection system. The structure and working principle of the design are presented. The drive circuit is given to control the optical switch automatically. Feasibility of this design is demonstrated by experimental method. The measured data illustrate that the proposed approach is effective to eliminate the "cat's eye" effect, so as to enhancing the viability of photo-electric equipments on the battlefield.

  9. 2016 SPD: Day 2

    NASA Astrophysics Data System (ADS)

    Kohler, Susanna

    2016-06-01

    Editors note:This week were in Boulder, Colorado at the 47th meeting of the AAS Solar Physics Division (SPD). Follow along to catch some of the latest news from the field of solar physics!Todays press conference provided an excellent overview of some of the highlights of this weeks SPD meeting. Four speakers provided their views on some of the hottest topics in solar physics at the moment, including stealth coronal mass ejections (CMEs), sunspot formation, long-term solar-activity trends, and the largest solar telescope ever built.Stealth CMEsSolar and Heliospheric Observatory (SOHO) composite image of a coronal mass ejection. [ESA/NASA/SOHO]First up, Nathalia Alzate (Aberystwyth University) talked about recent success in solving the mystery of so-called stealth CMEs, massive solar storms that dont exhibit the usual clues to their origin. Most CMEs have low-coronal signatures like flares, filament eruptions, jets, etc. that reveal the origin of the CME at the Sun. But stealth CMEs appear without warning, and seem to have no evidence of low-coronal signatures.But are these signatures not there? Or could we just be missing them? Alzate and her collaborator Huw Morgan used advanced image processing techniques to search for low-coronal signatures associated with 40 CMEs that have been classified as stealth CMEs. Their techniques enhance the observed structure down to fine spatial scales, and help reveal very faint dynamic events.Sure enough, these processing techniques consistently revealed low-coronal signatures for every single supposed stealth CME they examined. This suggests that all CMEs exhibit some signatures in the low corona its only a matter of being able to process the images well enough to detect them!Spectacular Sunspot SimulationsStill image from a simulation studying sunspot formation. Compare to the cover image of sunspot observations! [Feng Chen, Matthias Rempel, Yuhong Fan]Next up, Feng Chen (High Altitude Observatory) described recent computational advances in simulating sunspot formation. He and his collaborators have used high-performance computing to build a model that successfully reproduces many of the key properties of sunspots that are observed.In particular, these simulations track the motions of the magnetic field starting within the interior of the Sun (8000 km below the surface!). The magnetic field is generated and intensified by convection deep within the solar interior. Bundles of magnetic field then rise through the convection zone, eventually breaking through the solar surface and giving rise to sunspots.This process of tracking the flow as it travels from the convective layer all the way through the solar surface has resulted in what may be some of the highest fidelity simulations of sunspots thus far. The structures produced in these simulations compares very favorably with actual observations of sunspots including the asymmetry seen in most sunspots.Counting Spots on the SunContinuing the discussion of sunspots, Leif Svalgaard (Stanford University) next took us on a historical journey from the 1600s through the present. For the last 400 years starting with Galileo people have kept records of the number of sunspots visible on the Suns disk.One of Galileos drawings of his sunspot observations from 1612. [The Galileo Project]This turns out to be a very useful practice! Total solar irradiance, a measure used as input into climate models, is reconstructed from sunspot numbers. Therefore, the historical record of sunspots over the last 400 years impacts our estimates of the long-term trends in solar activity.Based on raw sunspot counts, studies have argued that solar activity has been steadily increasing over time. But could this be a misinterpretation resulting from the fact that our technology and therefore our ability to detect sunspots has improved over time? Svalgaard believes so.By studying and reconstructing 18th century telescopes, he demonstrates that modern-day sunspot counts are able to detect three times as many sunspots as would have been possible with historical technology. When you normalize for this effect, the data shows that there has therefore not been a steady increase long-term in sunspot numbers.Worlds Largest Solar TelescopeThe final speaker of the press conference was Joe McMullen (National Solar Observatory), who updated us on the status of the Daniel K. Inouye Solar Telescope (DKIST). This 4-meter telescope will be the worlds largest solar telescope, and the first new solar facility that the US has had in several decades.The state of the DKIST telescope site as of July 2015. [NSO/AURA/NSF/Brett Simison]The technology involved in this spectacular telescope is impressive. Its thin, enormous mirror is polished to within an error of nearly 1/10,000th of a human hair! Underlying the telescope is the most complex solar adaptive optics systems ever created, with 1600 different actuators controlling the system real-time to within an error of 4 nanometers. In addition, the entire facility is designed to deal with a tremendous heat load (which can severely limit the quality of observations).DKISTs construction on Haleakala in Hawaii has been underway since 2012, and is making solid progress. The majority of the structures have now been completed, as have most of the major telescope subsystems. The primary hurdle that remains is to integrate all the of components and make sure that they can perform together no small feat!DKIST is expected to begin science operations in 2020, with ~10-20 TB of data being produced each day. This data will be freely and immediately accessible to both researchers and the public.

  10. Distinct polymer architecture mediates switching of complement activation pathways at the nanosphere-serum interface: implications for stealth nanoparticle engineering.

    PubMed

    Hamad, Islam; Al-Hanbali, Othman; Hunter, A Christy; Rutt, Kenneth J; Andresen, Thomas L; Moghimi, S Moein

    2010-11-23

    Nanoparticles with surface projected polyethyleneoxide (PEO) chains in "mushroom-brush" and "brush" configurations display stealth properties in systemic circulation and have numerous applications in site-specific targeting for controlled drug delivery and release as well as diagnostic imaging. We report on the "structure-activity" relationship pertaining to surface-immobilized PEO of various configurations on model nanoparticles, and the initiation of complement cascade, which is the most ancient component of innate human immunity, and its activation may induce clinically significant adverse reactions in some individuals. Conformational states of surface-projected PEO chains, arising from the block copolymer poloxamine 908 adsorption, on polystyrene nanoparticles trigger complement activation differently. Alteration of copolymer architecture on nanospheres from mushroom to brush configuration not only switches complement activation from C1q-dependent classical to lectin pathway but also reduces the level of generated complement activation products C4d, Bb, C5a, and SC5b-9. Also, changes in adsorbed polymer configuration trigger alternative pathway activation differently and through different initiators. Notably, the role for properdin-mediated activation of alternative pathway was only restricted to particles displaying PEO chains in a transition mushroom-brush configuration. Since nanoparticle-mediated complement activation is of clinical concern, our findings provide a rational basis for improved surface engineering and design of immunologically safer stealth and targetable nanosystems with polymers for use in clinical medicine.

  11. Bayesian-MCMC-based parameter estimation of stealth aircraft RCS models

    NASA Astrophysics Data System (ADS)

    Xia, Wei; Dai, Xiao-Xia; Feng, Yuan

    2015-12-01

    When modeling a stealth aircraft with low RCS (Radar Cross Section), conventional parameter estimation methods may cause a deviation from the actual distribution, owing to the fact that the characteristic parameters are estimated via directly calculating the statistics of RCS. The Bayesian-Markov Chain Monte Carlo (Bayesian-MCMC) method is introduced herein to estimate the parameters so as to improve the fitting accuracies of fluctuation models. The parameter estimations of the lognormal and the Legendre polynomial models are reformulated in the Bayesian framework. The MCMC algorithm is then adopted to calculate the parameter estimates. Numerical results show that the distribution curves obtained by the proposed method exhibit improved consistence with the actual ones, compared with those fitted by the conventional method. The fitting accuracy could be improved by no less than 25% for both fluctuation models, which implies that the Bayesian-MCMC method might be a good candidate among the optimal parameter estimation methods for stealth aircraft RCS models. Project supported by the National Natural Science Foundation of China (Grant No. 61101173), the National Basic Research Program of China (Grant No. 613206), the National High Technology Research and Development Program of China (Grant No. 2012AA01A308), the State Scholarship Fund by the China Scholarship Council (CSC), and the Oversea Academic Training Funds, and University of Electronic Science and Technology of China (UESTC).

  12. The EDIT-COMGEOM Code

    DTIC Science & Technology

    1975-09-01

    This report assumes a familiarity with the GIFT and MAGIC computer codes. The EDIT-COMGEOM code is a FORTRAN computer code. The EDIT-COMGEOM code...converts the target description data which was used in the MAGIC computer code to the target description data which can be used in the GIFT computer code

  13. Expanded R&D by Jet-engine-steering Revolution

    NASA Astrophysics Data System (ADS)

    Gal-Or, Benjamin

    2017-11-01

    Since 1987 [1,2,3,4,5] the global jet engine community is facing the historical fact that jet engine steering is gradually replacing canards and the common, often dangerous and obsolete, aerodynamic-only flight control - a fact that (i) has already affected the defense-industrial complex in the US, Russia, China, Japan, S-Korea and India, (ii) has integrated the traditional jet-engine components R&D with advanced aero-electro-physics, stealth technology, thrust vectoring aerodynamics and material science. Moreover, this military revolution is historically due to expand into the civil transport jets domain, [6,7,8,9]. The historical aim of the JES-Revolution remains the same: Replace the common, stall-spin sensitive canards [6] and Aerodynamic-Only-Obsolete-Flight Control ("AOOF Control"). Invented about 100 years ago for propeller-driven air vehicles, it has already been partially replaced for failure to function in WVR-combat post-stall domain, and for the following reasons: In comparison with complete Tail-Less, Canard-Less, Stealth-JES (Figure 5 and References [1,2,3,4,5,6]), the common AOOF Control increases drag, weight, fuel consumption, complexity, cost, and reduces flight safety, stealth, [Low Detectability] and provides zero post-stall, WVR air combat capability while its CANARDS KILL LD & REDUCE JES. Examples of stealth fighter aircraft that have already replaced canards and AOOF-Control where JES provides at least 64 to 0 KILL-RATIO advantage over AOOF-Controlled conventional fighter aircraft: The U.S. JES F-22 and, apparently, the Russian JES-Su-T-50 & 35S, China 2016-J-31, Indian HAL AMCA & FGFA, Japanese JES IHHI ATD-X, S-Korean JES KF-X. Cf. X-44 in Figure 5. Consequently, the jet engine is no longer defined as providing only brute force forward. Instead, it successfully competes with and wins over the wrong, dominating AOOF-Control, at least as a backup flight control whose sole factual domain is currently a well-established, primary flight controller RE any post-stall, super-agility, [2,3,4,5,6,7,8,9].

  14. Simulated ventriculostomy training with conventional neuronavigational equipment used clinically in the operating room: prospective validation study.

    PubMed

    Kirkman, Matthew A; Muirhead, William; Sevdalis, Nick; Nandi, Dipankar

    2015-01-01

    Simulation is gaining increasing interest as a method of delivering high-quality, time-effective, and safe training to neurosurgical residents. However, most current simulators are purpose-built for simulation, being relatively expensive and inaccessible to many residents. The purpose of this study was to provide the first comprehensive validity assessment of ventriculostomy performance metrics from the Medtronic StealthStation S7 Surgical Navigation System, a neuronavigational tool widely used in the clinical setting, as a training tool for simulated ventriculostomy while concomitantly reporting on stress measures. A prospective study where participants performed 6 simulated ventriculostomy attempts on a model head with StealthStation-coregistered imaging. The performance measures included distance of the ventricular catheter tip to the foramen of Monro and presence of the catheter tip in the ventricle. Data on objective and self-reported stress and workload measures were also collected. The operating rooms of the National Hospital for Neurology and Neurosurgery, Queen Square, London. A total of 31 individuals with varying levels of prior ventriculostomy experience, varying in seniority from medical student to senior resident. Performance at simulated ventriculostomy improved significantly over subsequent attempts, irrespective of previous ventriculostomy experience. Performance improved whether or not the StealthStation display monitor was used for real-time visual feedback, but performance was optimal when it was. Further, performance was inversely correlated with both objective and self-reported measures of stress (traditionally referred to as concurrent validity). Stress and workload measures were well-correlated with each other, and they also correlated with technical performance. These initial data support the use of the StealthStation as a training tool for simulated ventriculostomy, providing a safe environment for repeated practice with immediate feedback. Although the potential implications are profound for neurosurgical education and training, further research following this proof-of-concept study is required on a larger scale for full validation and proof that training translates into improved long-term simulated and patient outcomes. Copyright © 2015 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  15. Advancing Global Health - The Need for (Better) Social Science Comment on "Navigating Between Stealth Advocacy and Unconscious Dogmatism: The Challenge of Researching the Norms, Politics and Power of Global Health".

    PubMed

    Hanefeld, Johanna

    2016-02-06

    In his perspective "Navigating between stealth advocacy and unconscious dogmatism: the challenge of researching the norms, politics and power of global health," Ooms argues that actions taken in the field of global health are dependent not only on available resources, but on the normative premise that guides how these resources are spent. This comment sets out how the application of a predominately biomedical positivist research tradition in global health, has potentially limited understanding of the value judgements underlying decisions in the field. To redress this critical social science, including health policy analysis has much to offer, to the field of global health including on questions of governance. © 2016 by Kerman University of Medical Sciences.

  16. Cancer Self-Defense: An Immune Stealth.

    PubMed

    Nakajima, Kosei; Nangia-Makker, Pratima; Hogan, Victor; Raz, Avraham

    2017-10-15

    The hurdles in realizing successful cancer immunotherapy stem from the fact that cancer patients are either refractory to immune response and/or develop resistance. Here, we propose that these phenomena are due, in part, to the deployment/secretion of a "decoy flare," for example, anomalous cancer-associated antigens by the tumor cells. The cancer secretome, which resembles the parent cell make-up, is composed of soluble macromolecules (proteins, glycans, lipids, DNAs, RNAs, etc.) and insoluble vesicles (exosomes), thus hindering cancer detection/recognition by immunotherapeutic agents, resulting in a "cancer-stealth" effect. Immunotherapy, or any treatment that relies on antigens' expression/function, could be improved by the understanding of the properties of the cancer secretome, as its clinical evaluation may change the therapeutic landscape. Cancer Res; 77(20); 5441-4. ©2017 AACR . ©2017 American Association for Cancer Research.

  17. Bartonella and Brucella—Weapons and Strategies for Stealth Attack

    PubMed Central

    Ben-Tekaya, Houchaima; Gorvel, Jean-Pierre; Dehio, Christoph

    2013-01-01

    Bartonella spp. and Brucella spp. are closely related α-proteobacterial pathogens that by distinct stealth-attack strategies cause chronic infections in mammals including humans. Human infections manifest by a broad spectrum of clinical symptoms, ranging from mild to fatal disease. Both pathogens establish intracellular replication niches and subvert diverse pathways of the host’s immune system. Several virulence factors allow them to adhere to, invade, proliferate, and persist within various host-cell types. In particular, type IV secretion systems (T4SS) represent essential virulence factors that transfer effector proteins tailored to recruit host components and modulate cellular processes to the benefit of the bacterial intruders. This article puts the remarkable features of these two pathogens into perspective, highlighting the mechanisms they use to hijack signaling and trafficking pathways of the host as the basis for their stealthy infection strategies. PMID:23906880

  18. Identification of Low Coronal Sources of “Stealth” Coronal Mass Ejections Using New Image Processing Techniques

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alzate, Nathalia; Morgan, Huw, E-mail: naa19@aber.ac.uk

    Coronal mass ejections (CMEs) are generally associated with low coronal signatures (LCSs), such as flares, filament eruptions, extreme ultraviolet (EUV) waves, or jets. A number of recent studies have reported the existence of stealth CMEs as events without LCSs, possibly due to observational limitations. Our study focuses on a set of 40 stealth CMEs identified from a study by D’Huys et al. New image processing techniques are applied to high-cadence, multi-instrument sets of images spanning the onset and propagation time of each of these CMEs to search for possible LCSs. Twenty-three of these events are identified as small, low-mass, unstructuredmore » blobs or puffs, often occurring in the aftermath of a large CME, but associated with LCSs such as small flares, jets, or filament eruptions. Of the larger CMEs, seven are associated with jets and eight with filament eruptions. Several of these filament eruptions are different from the standard model of an erupting filament/flux tube in that they are eruptions of large, faint flux tubes that seem to exist at large heights for a long time prior to their slow eruption. For two of these events, we see an eruption in Large Angle Spectrometric Coronagraph C2 images and the consequent changes at the bottom edge of the eruption in EUV images. All 40 events in our study are associated with some form of LCS. We conclude that stealth CMEs arise from observational and processing limitations.« less

  19. Stealth properties of poly(ethylene oxide)-based triblock copolymer micelles: a prerequisite for a pH-triggered targeting system.

    PubMed

    Van Butsele, K; Morille, M; Passirani, C; Legras, P; Benoit, J P; Varshney, S K; Jérôme, R; Jérôme, C

    2011-10-01

    Evaluation of the biocompatibility of pH-triggered targeting micelles was performed with the goal of studying the effect of a poly(ethylene oxide) (PEO) coating on micelle stealth properties. Upon protonation under acidic conditions, pH-sensitive poly(2-vinylpyridine) (P2VP) blocks were stretched, exhibiting positive charges at the periphery of the micelles as well as being a model targeting unit. The polymer micelles were based on two different macromolecular architectures, an ABC miktoarm star terpolymer and an ABC linear triblock copolymer, which combined three different polymer blocks, i.e. hydrophobic poly(ε-caprolactone), PEO and P2VP. Neutral polymer micelles were formed at physiological pH. These systems were tested for their ability to avoid macrophage uptake, their complement activation and their pharmacological behavior after systemic injection in mice, as a function of their conformation (neutral or protonated). After protonation, complement activation and macrophage uptake were up to twofold higher than for neutral systems. By contrast, when P2VP blocks and the targeting unit were buried by the PEO shell at physiological pH, micelle stealth properties were improved, allowing their future systemic injection with an expected long circulation in blood. Smart systems responsive to pH were thus developed which therefore hold great promise for targeted drug delivery to an acidic tumoral environment. Copyright © 2011 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.

  20. A DHS Skunkworks Project: Defining and Addressing Homeland Security Grand Challenges

    DTIC Science & Technology

    2016-12-01

    Peter Diamandis, Ansari XPRIZE, market failure, technology, stealth technologies, Pasteur’s quadrant, Heilmeier Catechism, Homeland Security Advanced...Judging and Scoring ....................................................................27 D. OPTIMIZING FOR AN EMERGING MARKET ...37 Figure 3. Market /Technology Chart

  1. Water-injected all-dielectric ultra-wideband and prominent oblique incidence metamaterial absorber in microwave regime

    NASA Astrophysics Data System (ADS)

    Huang, Xiaojun; Yang, Helin; Shen, Zhaoyang; Chen, Jiao; Lin, Hail; Yu, Zetai

    2017-09-01

    We present a water-injected all-dielectric metamaterial that can offer an extremely wide bandwidth of electromagnetic absorption and prominent wide incident angle range. Different from conventional metal-dielectric based metamaterial absorbers, the absorption mechanism of the proposed all-dielectric metamaterial absorber is to take advantage of the dispersion of water, rather than electric or/and magnetic resonance, which thoroughly overcomes the defects of narrow bandwidth and oblique incidence from metal-dielectric based metamaterial absorber. The simulated absorption was over 90% in 8.1-22.9 GHz with the relative bandwidth of 95.5% when the incident angle reaches 60°, and the corresponding microwave experiment is performed to support the simulations. The obtained excellent absorption performance reveals a possible application of the proposed absorber, which can be exploited for electromagnetic stealth purposes, especially for electromagnetic stealth of sea targets.

  2. Time-of-Flight Microwave Camera.

    PubMed

    Charvat, Gregory; Temme, Andrew; Feigin, Micha; Raskar, Ramesh

    2015-10-05

    Microwaves can penetrate many obstructions that are opaque at visible wavelengths, however microwave imaging is challenging due to resolution limits associated with relatively small apertures and unrecoverable "stealth" regions due to the specularity of most objects at microwave frequencies. We demonstrate a multispectral time-of-flight microwave imaging system which overcomes these challenges with a large passive aperture to improve lateral resolution, multiple illumination points with a data fusion method to reduce stealth regions, and a frequency modulated continuous wave (FMCW) receiver to achieve depth resolution. The camera captures images with a resolution of 1.5 degrees, multispectral images across the X frequency band (8 GHz-12 GHz), and a time resolution of 200 ps (6 cm optical path in free space). Images are taken of objects in free space as well as behind drywall and plywood. This architecture allows "camera-like" behavior from a microwave imaging system and is practical for imaging everyday objects in the microwave spectrum.

  3. Results of comparative RBMK neutron computation using VNIIEF codes (cell computation, 3D statics, 3D kinetics). Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grebennikov, A.N.; Zhitnik, A.K.; Zvenigorodskaya, O.A.

    1995-12-31

    In conformity with the protocol of the Workshop under Contract {open_quotes}Assessment of RBMK reactor safety using modern Western Codes{close_quotes} VNIIEF performed a neutronics computation series to compare western and VNIIEF codes and assess whether VNIIEF codes are suitable for RBMK type reactor safety assessment computation. The work was carried out in close collaboration with M.I. Rozhdestvensky and L.M. Podlazov, NIKIET employees. The effort involved: (1) cell computations with the WIMS, EKRAN codes (improved modification of the LOMA code) and the S-90 code (VNIIEF Monte Carlo). Cell, polycell, burnup computation; (2) 3D computation of static states with the KORAT-3D and NEUmore » codes and comparison with results of computation with the NESTLE code (USA). The computations were performed in the geometry and using the neutron constants presented by the American party; (3) 3D computation of neutron kinetics with the KORAT-3D and NEU codes. These computations were performed in two formulations, both being developed in collaboration with NIKIET. Formulation of the first problem maximally possibly agrees with one of NESTLE problems and imitates gas bubble travel through a core. The second problem is a model of the RBMK as a whole with imitation of control and protection system controls (CPS) movement in a core.« less

  4. 'Stealth' nanoparticles evade neural immune cells but also evade major brain cell populations: Implications for PEG-based neurotherapeutics.

    PubMed

    Jenkins, Stuart I; Weinberg, Daniel; Al-Shakli, Arwa F; Fernandes, Alinda R; Yiu, Humphrey H P; Telling, Neil D; Roach, Paul; Chari, Divya M

    2016-02-28

    Surface engineering to control cell behavior is of high interest across the chemical engineering, drug delivery and biomaterial communities. Defined chemical strategies are necessary to tailor nanoscale protein interactions/adsorption, enabling control of cell behaviors for development of novel therapeutic strategies. Nanoparticle-based therapies benefit from such strategies but particle targeting to sites of neurological injury remains challenging due to circulatory immune clearance. As a strategy to overcome this barrier, the use of stealth coatings can reduce immune clearance and prolong circulatory times, thereby enhancing therapeutic capacity. Polyethylene glycol (PEG) is the most widely-used stealth coating and facilitates particle accumulation in the brain. However, once within the brain, the mode of handling of PEGylated particles by the resident immune cells of the brain itself (the 'microglia') is unknown. This is a critical question as it is well established that microglia avidly sequester nanoparticles, limiting their bioavailability and posing a major translational barrier. If PEGylation can be proved to promote evasion of microglia, then this information will be of high value in developing tailored nanoparticle-based therapies for neurological applications. Here, we have conducted the first comparative study of uptake of PEGylated particles by all the major (immune and non-immune) brain cell types. We prove for the first time that PEGylated nanoparticles evade major brain cell populations - a phenomenon which will enhance extracellular bioavailability. We demonstrate changes in protein coronas around these particles within biological media, and discuss how surface chemistry presentation may affect this process and subsequent cellular interactions. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Balancing stealth and echogenic properties in an ultrasound contrast agent with drug delivery potential.

    PubMed

    Jablonowski, Lauren J; Alfego, David; Andorko, James I; Eisenbrey, John R; Teraphongphom, Nutte; Wheatley, Margaret A

    2016-10-01

    Contrast agents are currently being modified to combine diagnostic and therapeutic capabilities. For ultrasound (US) imaging with polymeric contrast agents, it is necessary to modify the shell to create "stealth" microbubbles but without these modifications sacrificing the agent's ability to interact with the focused US beam. We hypothesize that addition of the classic immune shielding molecule polyethylene glycol (PEG) to a polylactide (PLA) microbubble shell will affect the acoustic and physical properties of the resulting agents. In an effort to determine the best formulation to achieve a balance between stealth and acoustic activity, we compared two PEGylation techniques; addition of increasing amounts of PEG-PLA copolymer and employing incorporation of a PEG lipid (LipidPEG) into the shell. Loss of acoustic enhancement occurred in a dose-dependent manner for both types of PEGylated agents (loss of signal occurred at >5 wt% PEG-PLA and >1 wt% LipidPEG), while immune activation was also reduced in a dose-dependent manner for the PEG-PLA agents. This study shows that the balance between acoustic behavior and improved immune avoidance was scalable and successful to different degrees with both PEGylation methods, and was best achieved using for PEG-PLA at 5 wt% and for LipidPEG at 1 wt%. Studies are ongoing to evaluate the best method for the targeting and drug delivery capabilities of these agents for applications in cancer treatment. This study represents the basis for understanding the consequences of making modifications to the native polymeric shell. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. The Other Intelligences (Oy Vey!).

    ERIC Educational Resources Information Center

    Chase, Kim

    1998-01-01

    A middle-school teacher humorously observes seven other intelligences of students: random thinking; virtual memory void (erasing entire sections of personal memory); antigravity (balancing on two chair legs); intravacancy (achieving perfect, effortless aplomb); inter-Origami (intricate note-folding); stealth-kinesthetic (peashooting spitballs…

  7. Research for new UAV capabilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Canavan, G.H.; Leadabrand, R.

    1996-07-01

    This paper discusses research for new Unmanned Aerial Vehicles (UAV) capabilities. Findings indicate that UAV performance could be greatly enhanced by modest research. Improved sensors and communications enhance near term cost effectiveness. Improved engines, platforms, and stealth improve long term effectiveness.

  8. Novel Targeting Approach for Breast Cancer Gene Therapy

    DTIC Science & Technology

    2009-09-30

    specificity of sigma receptor ligands ( haloperidol and ibogaine)- conjugated polyamidoamine (PAMAM) dendrimers 1. Synthesis, purification and...Heparanase promoter. Cancer Lett., 2006, 240, 114-122. 5. Mukherjee A, Prasad TK, Rao NM, Banerjee R. Haloperidol associated stealth liposomes: A

  9. Development and application of the GIM code for the Cyber 203 computer

    NASA Technical Reports Server (NTRS)

    Stainaker, J. F.; Robinson, M. A.; Rawlinson, E. G.; Anderson, P. G.; Mayne, A. W.; Spradley, L. W.

    1982-01-01

    The GIM computer code for fluid dynamics research was developed. Enhancement of the computer code, implicit algorithm development, turbulence model implementation, chemistry model development, interactive input module coding and wing/body flowfield computation are described. The GIM quasi-parabolic code development was completed, and the code used to compute a number of example cases. Turbulence models, algebraic and differential equations, were added to the basic viscous code. An equilibrium reacting chemistry model and implicit finite difference scheme were also added. Development was completed on the interactive module for generating the input data for GIM. Solutions for inviscid hypersonic flow over a wing/body configuration are also presented.

  10. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  11. Quantum-secure covert communication on bosonic channels.

    PubMed

    Bash, Boulat A; Gheorghe, Andrei H; Patel, Monika; Habif, Jonathan L; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-10-19

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.

  12. Chaos-Based Simultaneous Compression and Encryption for Hadoop.

    PubMed

    Usama, Muhammad; Zakaria, Nordin

    2017-01-01

    Data compression and encryption are key components of commonly deployed platforms such as Hadoop. Numerous data compression and encryption tools are presently available on such platforms and the tools are characteristically applied in sequence, i.e., compression followed by encryption or encryption followed by compression. This paper focuses on the open-source Hadoop framework and proposes a data storage method that efficiently couples data compression with encryption. A simultaneous compression and encryption scheme is introduced that addresses an important implementation issue of source coding based on Tent Map and Piece-wise Linear Chaotic Map (PWLM), which is the infinite precision of real numbers that result from their long products. The approach proposed here solves the implementation issue by removing fractional components that are generated by the long products of real numbers. Moreover, it incorporates a stealth key that performs a cyclic shift in PWLM without compromising compression capabilities. In addition, the proposed approach implements a masking pseudorandom keystream that enhances encryption quality. The proposed algorithm demonstrated a congruent fit within the Hadoop framework, providing robust encryption security and compression.

  13. Chaos-Based Simultaneous Compression and Encryption for Hadoop

    PubMed Central

    Zakaria, Nordin

    2017-01-01

    Data compression and encryption are key components of commonly deployed platforms such as Hadoop. Numerous data compression and encryption tools are presently available on such platforms and the tools are characteristically applied in sequence, i.e., compression followed by encryption or encryption followed by compression. This paper focuses on the open-source Hadoop framework and proposes a data storage method that efficiently couples data compression with encryption. A simultaneous compression and encryption scheme is introduced that addresses an important implementation issue of source coding based on Tent Map and Piece-wise Linear Chaotic Map (PWLM), which is the infinite precision of real numbers that result from their long products. The approach proposed here solves the implementation issue by removing fractional components that are generated by the long products of real numbers. Moreover, it incorporates a stealth key that performs a cyclic shift in PWLM without compromising compression capabilities. In addition, the proposed approach implements a masking pseudorandom keystream that enhances encryption quality. The proposed algorithm demonstrated a congruent fit within the Hadoop framework, providing robust encryption security and compression. PMID:28072850

  14. Summary of ongoing TARDEC Work in Metamaterials Relevant to NATO SET-181

    DTIC Science & Technology

    2013-08-21

    Meitzler, T., Bankowski, E., Tiberkevich, T., and Slavin, A., Book Chapter on Spin-Torque Microwave Detectors, Magnonics - From Fundamentals to...harvesting - spintronic metamaterials; Non-reciprocity without magnetic field – magnonic metamaterials; Stealth and cloaking – optical metamaterials.

  15. Novel Targeting Approach for Breast Cancer Gene Therapy

    DTIC Science & Technology

    2010-09-01

    haloperidol and ibogaine)- conjugated polyamidoamine (PAMAM) dendrimers Poly(amidoamine) (PAMAM) dendrimers of 3.5 generation with carboxylate surface...Mukherjee A, Prasad TK, Rao NM, Banerjee R. Haloperidol associated stealth liposomes. A potent carrier for delivering genes to human breast cancer cells

  16. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth performance...

  17. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth performance...

  18. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth performance...

  19. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth performance...

  20. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth performance...

  1. Implementation of a 3D mixing layer code on parallel computers

    NASA Technical Reports Server (NTRS)

    Roe, K.; Thakur, R.; Dang, T.; Bogucz, E.

    1995-01-01

    This paper summarizes our progress and experience in the development of a Computational-Fluid-Dynamics code on parallel computers to simulate three-dimensional spatially-developing mixing layers. In this initial study, the three-dimensional time-dependent Euler equations are solved using a finite-volume explicit time-marching algorithm. The code was first programmed in Fortran 77 for sequential computers. The code was then converted for use on parallel computers using the conventional message-passing technique, while we have not been able to compile the code with the present version of HPF compilers.

  2. Anti-Semitism in American Caricature.

    ERIC Educational Resources Information Center

    Appel, John; Appel, Selma

    1986-01-01

    Caricatures produced between the end of the Civil War and World War II--cartoons in humor and satire weeklies, newspaper comics, posters, advertising, book illustrations, etc.--sanctioned ethnic and racial slurs. Jews were presented as negative stereotypes, characterized most often by stealth and derision. (LHW)

  3. 40 CFR 194.23 - Models and computer codes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false Models and computer codes. 194.23... General Requirements § 194.23 Models and computer codes. (a) Any compliance application shall include: (1... obtain stable solutions; (iv) Computer models accurately implement the numerical models; i.e., computer...

  4. 40 CFR 194.23 - Models and computer codes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true Models and computer codes. 194.23... General Requirements § 194.23 Models and computer codes. (a) Any compliance application shall include: (1... obtain stable solutions; (iv) Computer models accurately implement the numerical models; i.e., computer...

  5. 40 CFR 194.23 - Models and computer codes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false Models and computer codes. 194.23... General Requirements § 194.23 Models and computer codes. (a) Any compliance application shall include: (1... obtain stable solutions; (iv) Computer models accurately implement the numerical models; i.e., computer...

  6. 40 CFR 194.23 - Models and computer codes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Models and computer codes. 194.23... General Requirements § 194.23 Models and computer codes. (a) Any compliance application shall include: (1... obtain stable solutions; (iv) Computer models accurately implement the numerical models; i.e., computer...

  7. 40 CFR 194.23 - Models and computer codes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Models and computer codes. 194.23... General Requirements § 194.23 Models and computer codes. (a) Any compliance application shall include: (1... obtain stable solutions; (iv) Computer models accurately implement the numerical models; i.e., computer...

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Henderson, Ian M.; Collins, Aaron M.; Quintana, Hope A.

    In this study, we develop a quantitative dye dequenching technique for the measurement of polymersome fusion, using it to characterize the salt mediated, mechanically-induced fusion of polymersomes with polymer, lipid, and so-called stealth lipid vesicles. While dye dequenching has been used to quantitatively explore liposome fusion in the past, this is the first use of dye dequenching to measure polymersome fusion of which we are aware. In addition to providing quantitative results, dye dequenching is ideal for detecting fusion in instances where DLS results would be ambiguous, such as low yield levels and size ranges outside the capabilities of DLS.more » The dye chosen for this study was a cyanine derivative, 1,1'-dioctadecyl-3,3,3',3'-tetramethylindotricarbocyanine iodide (DiR), which proved to provide excellent data on the extent of polymersome fusion. Using this technique, we have shown the limited fusion capabilities of polymersome/liposome heterofusion, notably DOPC vesicles fusing with polymersomes at half the efficiency of polymersome homofusion and DPPC vesicles showing virtually no fusion. In addition to these key heterofusion experiments, we determined the broad applicability of dye dequenching in measuring kinetic rates of polymersome fusion; and showed that even at elevated temperatures or over multiple weeks' time, no polymersome fusion occurred without agitation. Stealth liposomes formed from DPPC and PEO-functionalized lipid, however, fused with polymersomes and stealth liposomes with relatively high efficiency, lending support to our hypothesis that the response of the PEO corona to salt is a key factor in the fusion process. This last finding suggests that although the conjugation of PEO to lipids increases vesicle biocompatibility and enables their longer circulation times, it also renders the vesicles subject to destabilization under high salt and shear (e.g. in the circulatory system) that may lead to, in this case, fusion.« less

  9. Active electromagnetic invisibility cloaking and radiation force cancellation

    NASA Astrophysics Data System (ADS)

    Mitri, F. G.

    2018-03-01

    This investigation shows that an active emitting electromagnetic (EM) Dirichlet source (i.e., with axial polarization of the electric field) in a homogeneous non-dissipative/non-absorptive medium placed near a perfectly conducting boundary can render total invisibility (i.e. zero extinction cross-section or efficiency) in addition to a radiation force cancellation on its surface. Based upon the Poynting theorem, the mathematical expression for the extinction, radiation and amplification cross-sections (or efficiencies) are derived using the partial-wave series expansion method in cylindrical coordinates. Moreover, the analysis is extended to compute the self-induced EM radiation force on the active source, resulting from the waves reflected by the boundary. The numerical results predict the generation of a zero extinction efficiency, achieving total invisibility, in addition to a radiation force cancellation which depend on the source size, the distance from the boundary and the associated EM mode order of the active source. Furthermore, an attractive EM pushing force on the active source directed toward the boundary or a repulsive pulling one pointing away from it can arise accordingly. The numerical predictions and computational results find potential applications in the design and development of EM cloaking devices, invisibility and stealth technologies.

  10. The design of broadband radar absorbing surfaces

    NASA Astrophysics Data System (ADS)

    Suk, Go H.

    1990-09-01

    There has been a growing and widespread interest in radar absorbing material technology. As the name implies, radar absorbing materials or RAM's are coatings whose electric and magnetic properties have been selected to allow the absorption of microwave energy at discrete or broadband frequencies. In military applications low radar cross section (RCS) of a vehicle may be required in order to escape detection while a covert mission is being carried on. These requirements have led to the very low observable or stealth technology that reduces the probability of detection of an aircraft. The design of radar absorbing materials is limited by constraints on the allowable volume and weight of the surface coating, and it is difficult to design a broadband radar absorbing structure in limited volume. This thesis investigates the use of lossy dielectric materials of high dielectric permittivity in multilayer composites for the production of low radar cross section (RCS). The analysis is done by computing the plane wave reflection coefficient at the exterior surface of the composite coating by means of a computer program which selects layer parameters which determine low reflection coefficients for electromagnetic radiation under constraint of limited layer thickness as well as maximum frequency bandwidth.

  11. Computer image-guided surgery for total maxillectomy.

    PubMed

    Homma, Akihiro; Saheki, Masahiko; Suzuki, Fumiyuki; Fukuda, Satoshi

    2008-12-01

    In total maxillectomy, the entire upper jaw including the tumor is removed en bloc from the facial skeleton. An intraoperative computed tomographic guidance system (ICTGS) can improve orientation during surgical procedures. However, its efficacy in head and neck surgery remains controversial. This study evaluated the use of an ICTGS in total maxillectomy. Five patients with maxillary sinus neoplasms underwent surgery using a StealthStation ICTGS. The headset was used for anatomic registration during the preoperative CT scan and surgical procedure. The average accuracy was 0.95 mm. The ICTGS provided satisfactory accuracy until the end of resection in all cases, and helped the surgeon to confirm the anatomical location and decide upon the extent of removal in real time. It was particularly useful when the zygoma, maxillary frontal process, orbital floor, and pterygoid process were divided. All patients remained alive and disease free during short-term follow-up. The ICTGS played a supplementary role in total maxillectomy, helping the surgeon to recognize target points accurately in real time, to determine the minimum accurate bone-resection line, and to use the most direct route to reach the lesion. It could also reduce the extent of the skin incision and removal, thus maintaining oncological safety.

  12. Mycosphaerella comparative genomics reveals chromosome dynamics, genome evolution and stealth pathogenesis

    USDA-ARS?s Scientific Manuscript database

    Mycosphaerella graminicola causes septoria tritici blotch, one of the most important diseases of wheat worldwide. Previous analyses showed that populations of this species are extremely variable and that polymorphisms for chromosome length and number can be generated during meiosis. To better unders...

  13. Running bumps from stealth bosons

    NASA Astrophysics Data System (ADS)

    Aguilar-Saavedra, J. A.

    2018-03-01

    For the `stealth bosons' S, light boosted particles with a decay S → A A → q \\bar{q} q \\bar{q} into four quarks and reconstructed as a single fat jet, the groomed jet mass has a strong correlation with groomed jet substructure variables. Consequently, the jet mass distribution is strongly affected by the jet substructure selection cuts when applied on the groomed jet. We illustrate this fact by recasting a CMS search for low-mass dijet resonances and show a few representative examples. The mass distributions exhibit narrow and wide bumps at several locations in the 100-300 GeV range, between the masses of the daughter particles A and the parent particle S, depending on the jet substructure selection. This striking observation introduces several caveats when interpreting and comparing experimental results, for the case of non-standard signatures. The possibility that a single boosted particle decaying hadronically produces multiple bumps, at quite different jet masses, and depending on the event selection, brings the anomaly chasing game to the next level.

  14. [Spectral investigation of atmospheric pressure plasma column].

    PubMed

    Li, Xue-Chen; Chang, Yuan-Yuan; Xu, Long-Fei

    2012-07-01

    Atmospheric pressure plasma column has many important applications in plasma stealth for aircraft. In the present paper, a plasma column with a length of 65 cm was generated in argon at atmospheric pressure by using dielectric barrier discharge device with water electrodes in coaxial configurations. The discharge mechanism of the plasma column was studied by optical method and the result indicates that a moving layer of light emission propagates in the upstream region. The propagation velocity of the plasma bullet is about 0.6 x 10(5) m x s(-1) through optical measurement. Spectral intensity ratios as functions of the applied voltage and driving frequency were also investigated by spectroscopic method. The variation in spectral intensity ratio implies a change in the averaged electron energy. Results show that the averaged electron energy increases with the increase in the applied voltage and the driving frequency. These results have significant values for industrial applications of the atmospheric pressure discharge and have extensive application potentials in stealth for military aircraft.

  15. Accurate Analysis of Target Characteristic in Bistatic SAR Images: A Dihedral Corner Reflectors Case.

    PubMed

    Ao, Dongyang; Li, Yuanhao; Hu, Cheng; Tian, Weiming

    2017-12-22

    The dihedral corner reflectors are the basic geometric structure of many targets and are the main contributions of radar cross section (RCS) in the synthetic aperture radar (SAR) images. In stealth technologies, the elaborate design of the dihedral corners with different opening angles is a useful approach to reduce the high RCS generated by multiple reflections. As bistatic synthetic aperture sensors have flexible geometric configurations and are sensitive to the dihedral corners with different opening angles, they specially fit for the stealth target detections. In this paper, the scattering characteristic of dihedral corner reflectors is accurately analyzed in bistatic synthetic aperture images. The variation of RCS with the changing opening angle is formulated and the method to design a proper bistatic radar for maximizing the detection capability is provided. Both the results of the theoretical analysis and the experiments show the bistatic SAR could detect the dihedral corners, under a certain bistatic angle which is related to the geometry of target structures.

  16. Spatially and spectrally engineered spin-orbit interaction for achromatic virtual shaping

    PubMed Central

    Pu, Mingbo; Zhao, Zeyu; Wang, Yanqin; Li, Xiong; Ma, Xiaoliang; Hu, Chenggang; Wang, Changtao; Huang, Cheng; Luo, Xiangang

    2015-01-01

    The geometries of objects are deterministic in electromagnetic phenomena in all aspects of our world, ranging from imaging with spherical eyes to stealth aircraft with bizarre shapes. Nevertheless, shaping the physical geometry is often undesired owing to other physical constraints such as aero- and hydro-dynamics in the stealth technology. Here we demonstrate that it is possible to change the traditional law of reflection as well as the electromagnetic characters without altering the physical shape, by utilizing the achromatic phase shift stemming from spin-orbit interaction in ultrathin space-variant and spectrally engineered metasurfaces. The proposal is validated by full-wave simulations and experimental characterization in optical wavelengths ranging from 600 nm to 2800 nm and microwave frequencies in 8-16 GHz, with echo reflectance less than 10% in the whole range. The virtual shaping as well as the revised law of reflection may serve as a versatile tool in many realms, including broadband and conformal camouflage and Kinoform holography, to name just a few. PMID:25959663

  17. Accurate Analysis of Target Characteristic in Bistatic SAR Images: A Dihedral Corner Reflectors Case

    PubMed Central

    Ao, Dongyang; Hu, Cheng; Tian, Weiming

    2017-01-01

    The dihedral corner reflectors are the basic geometric structure of many targets and are the main contributions of radar cross section (RCS) in the synthetic aperture radar (SAR) images. In stealth technologies, the elaborate design of the dihedral corners with different opening angles is a useful approach to reduce the high RCS generated by multiple reflections. As bistatic synthetic aperture sensors have flexible geometric configurations and are sensitive to the dihedral corners with different opening angles, they specially fit for the stealth target detections. In this paper, the scattering characteristic of dihedral corner reflectors is accurately analyzed in bistatic synthetic aperture images. The variation of RCS with the changing opening angle is formulated and the method to design a proper bistatic radar for maximizing the detection capability is provided. Both the results of the theoretical analysis and the experiments show the bistatic SAR could detect the dihedral corners, under a certain bistatic angle which is related to the geometry of target structures. PMID:29271917

  18. Coating nanoparticles with tunable surfactants facilitates control over the protein corona.

    PubMed

    Müller, J; Bauer, K N; Prozeller, D; Simon, J; Mailänder, V; Wurm, F R; Winzen, S; Landfester, K

    2017-01-01

    Nanoparticles with long blood circulation time are a prerequisite for targeted drug delivery. To make the nanoparticles invisible for phagocytizing cells, functional moieties on the particle surface are believed to be necessary to attract specific so-called 'stealth' proteins forming a protein 'corona'. Currently, covalent attachment of those moieties represents the only way to achieve that attraction. However, that approach requires a high synthetic effort and is difficult to control. Therefore, we present the coating of model nanoparticles with biodegradable polymeric surfactants as an alternative method. The thermodynamic parameters of the coating process can be tuned by adjusting the surfactants' block lengths and hydrophilicity. Consequently, the unspecific protein adsorption and aggregation tendency of the particles can be controlled, and stealth proteins inhibiting cell uptake are enriched on their surface. This non-covalent approach could be applied to any particle type and thus facilitates tuning the protein corona and its biological impact. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Computer Description of Black Hawk Helicopter

    DTIC Science & Technology

    1979-06-01

    Model Combinatorial Geometry Models Black Hawk Helicopter Helicopter GIFT Computer Code Geometric Description of Targets 20. ABSTRACT...description was made using the technique of combinatorial geometry (COM-GEOM) and will be used as input to the GIFT computer code which generates Tliic...rnHp The data used bv the COVART comtmter code was eenerated bv the Geometric Information for Targets ( GIFT )Z computer code. This report documents

  20. User manual for semi-circular compact range reflector code: Version 2

    NASA Technical Reports Server (NTRS)

    Gupta, Inder J.; Burnside, Walter D.

    1987-01-01

    A computer code has been developed at the Ohio State University ElectroScience Laboratory to analyze a semi-circular paraboloidal reflector with or without a rolled edge at the top and a skirt at the bottom. The code can be used to compute the total near field of the reflector or its individual components at a given distance from the center of the paraboloid. The code computes the fields along a radial, horizontal, vertical or axial cut at that distance. Thus, it is very effective in computing the size of the sweet spot for a semi-circular compact range reflector. This report describes the operation of the code. Various input and output statements are explained. Some results obtained using the computer code are presented to illustrate the code's capability as well as being samples of input/output sets.

  1. Hanford meteorological station computer codes: Volume 9, The quality assurance computer codes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burk, K.W.; Andrews, G.L.

    1989-02-01

    The Hanford Meteorological Station (HMS) was established in 1944 on the Hanford Site to collect and archive meteorological data and provide weather forecasts and related services for Hanford Site approximately 1/2 mile east of the 200 West Area and is operated by PNL for the US Department of Energy. Meteorological data are collected from various sensors and equipment located on and off the Hanford Site. These data are stored in data bases on the Digital Equipment Corporation (DEC) VAX 11/750 at the HMS (hereafter referred to as the HMS computer). Files from those data bases are routinely transferred to themore » Emergency Management System (EMS) computer at the Unified Dose Assessment Center (UDAC). To ensure the quality and integrity of the HMS data, a set of Quality Assurance (QA) computer codes has been written. The codes will be routinely used by the HMS system manager or the data base custodian. The QA codes provide detailed output files that will be used in correcting erroneous data. The following sections in this volume describe the implementation and operation of QA computer codes. The appendices contain detailed descriptions, flow charts, and source code listings of each computer code. 2 refs.« less

  2. Mint Viruses: Beauty, Stealth and Disease

    USDA-ARS?s Scientific Manuscript database

    Mint has been cultivated for thousands of years for the unique fragrances produced by its volatile oils. The major areas of production include India, the United States, China, and Brazil. Mint is a vegetatively propagated crop and world-wide sharing of plant material along with repeated clonal propa...

  3. Development of Specialized Advanced Materials Curriculum.

    ERIC Educational Resources Information Center

    Malmgren, Thomas; And Others

    This course is intended to give students a comprehensive experience in current and future manufacturing materials and processes. It familiarizes students with: (1) base of composite materials; (2) composites--a very light, strong material used in spacecraft and stealth aircraft; (3) laminates; (4) advanced materials--especially aluminum alloys;…

  4. Owning the Environment: Stealth Soldier - Research Outline

    DTIC Science & Technology

    2012-05-01

    animals during mating season or beating of the chest by dancers during some tribal rituals of war are the natural displays of deception. Some...Journal of the Acoustical Society of America 1996, 100 (3), 1584–1593. Kirkeby, O.; Nelson, P. A.; Hamada, H. The Stereo Dipole: Binaural

  5. The Cheshire Jet: Harnessing Metamaterials to Achieve an Optical Stealth Capability

    DTIC Science & Technology

    2010-07-01

    Prometheus Books, 2005. Hamilton, Dave. Address. 23rd Annual National Test and Evaluation Conference, Hilton Head Island, SC, 15 March 2007. http...ment 2008: Challenges and Implications for the Future Joint Force. Norfolk, VA: Center for Joint Futures, 25 November 2008. Valentine, Jason , Shuang

  6. From conventional to stealth liposomes: a new frontier in cancer chemotherapy.

    PubMed

    Cattel, Luigi; Ceruti, Maurizio; Dosio, Franco

    2003-01-01

    Many attempts have been made to achieve good selectivity to targeted tumor cells by preparing specialized carrier agents that are therapeutically profitable for anticancer therapy. Among these, liposomes are the most studied colloidal particles thus far applied in medicine and in particular in antitumor therapy. Although they were first described in the 1960s, only at the beginning of 1990s did the first therapeutic liposomes appear on the market. The first-generation liposomes (conventional liposomes) comprised a liposome-containing amphotericin B, Ambisome (Nexstar, Boulder, CO, USA), used as an antifungal drug, and Myocet (Elan Pharma Int, Princeton, NJ, USA), a doxorubicin-containing liposome, used in clinical trials to treat metastatic breast cancer. The second-generation liposomes ("pure lipid approach") were long-circulating liposomes, such as Daunoxome, a daunorubicin-containing liposome approved in the US and Europe to treat AIDS-related Kaposi's sarcoma. The third-generation liposomes were surface-modified liposomes with gangliosides or sialic acid, which can evade the immune system responsible for removing liposomes from circulation. The fourth-generation liposomes, pegylated liposomal doxorubicin, were called "stealth liposomes" because of their ability to evade interception by the immune system, in the same way as the stealth bomber was able to evade radar. Actually, the only stealth liposome on the market is Caelyx/Doxil (Schering-Plough, Madison NJ, USA), used to cure AIDS-related Kaposi's sarcoma, resistant ovarian cancer and metastatic breast cancer. Pegylated liposomal doxorubicin is characterized by a very long-circulation half-life, favorable pharmacokinetic behavior and specific accumulation in tumor tissues. These features account for the much lower toxicity shown by Caelyx in comparison to free doxorubicin, in terms of cardiotoxicity, vesicant effects, nausea, vomiting and alopecia. Pegylated liposomal doxorubicin also appeared to be less myelotoxic than doxorubicin. Typical forms of toxicity associated to it are acute infusion reaction, mucositis and palmar plantar erythrodysesthesia, which occur especially at high doses or short dosing intervals. Active and cell targeted liposomes can be obtained by attaching some antigen-directed monoclonal antibodies (Moab or Moab fragments) or small proteins and molecules (folate, epidermal growth factor, transferrin) to the distal end of polyethylene glycol in pegylated liposomal doxorubicin. The most promising therapeutic application of liposomes is as non-viral vector agents in gene therapy, characterized by the use of cationic phospholipids complexed with the negatively charged DNA plasmid. The use of liposome formulations in local-regional anticancer therapy is also discussed. Finally, pegylated liposomal doxorubicin containing radionuclides are used in clinical trials as tumor-imaging agents or in positron emission tomography.

  7. User's manual for semi-circular compact range reflector code

    NASA Technical Reports Server (NTRS)

    Gupta, Inder J.; Burnside, Walter D.

    1986-01-01

    A computer code was developed to analyze a semi-circular paraboloidal reflector antenna with a rolled edge at the top and a skirt at the bottom. The code can be used to compute the total near field of the antenna or its individual components at a given distance from the center of the paraboloid. Thus, it is very effective in computing the size of the sweet spot for RCS or antenna measurement. The operation of the code is described. Various input and output statements are explained. Some results obtained using the computer code are presented to illustrate the code's capability as well as being samples of input/output sets.

  8. Highly fault-tolerant parallel computation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Spielman, D.A.

    We re-introduce the coded model of fault-tolerant computation in which the input and output of a computational device are treated as words in an error-correcting code. A computational device correctly computes a function in the coded model if its input and output, once decoded, are a valid input and output of the function. In the coded model, it is reasonable to hope to simulate all computational devices by devices whose size is greater by a constant factor but which are exponentially reliable even if each of their components can fail with some constant probability. We consider fine-grained parallel computations inmore » which each processor has a constant probability of producing the wrong output at each time step. We show that any parallel computation that runs for time t on w processors can be performed reliably on a faulty machine in the coded model using w log{sup O(l)} w processors and time t log{sup O(l)} w. The failure probability of the computation will be at most t {center_dot} exp(-w{sup 1/4}). The codes used to communicate with our fault-tolerant machines are generalized Reed-Solomon codes and can thus be encoded and decoded in O(n log{sup O(1)} n) sequential time and are independent of the machine they are used to communicate with. We also show how coded computation can be used to self-correct many linear functions in parallel with arbitrarily small overhead.« less

  9. An emulator for minimizing computer resources for finite element analysis

    NASA Technical Reports Server (NTRS)

    Melosh, R.; Utku, S.; Islam, M.; Salama, M.

    1984-01-01

    A computer code, SCOPE, has been developed for predicting the computer resources required for a given analysis code, computer hardware, and structural problem. The cost of running the code is a small fraction (about 3 percent) of the cost of performing the actual analysis. However, its accuracy in predicting the CPU and I/O resources depends intrinsically on the accuracy of calibration data that must be developed once for the computer hardware and the finite element analysis code of interest. Testing of the SCOPE code on the AMDAHL 470 V/8 computer and the ELAS finite element analysis program indicated small I/O errors (3.2 percent), larger CPU errors (17.8 percent), and negligible total errors (1.5 percent).

  10. A generalized one-dimensional computer code for turbomachinery cooling passage flow calculations

    NASA Technical Reports Server (NTRS)

    Kumar, Ganesh N.; Roelke, Richard J.; Meitner, Peter L.

    1989-01-01

    A generalized one-dimensional computer code for analyzing the flow and heat transfer in the turbomachinery cooling passages was developed. This code is capable of handling rotating cooling passages with turbulators, 180 degree turns, pin fins, finned passages, by-pass flows, tip cap impingement flows, and flow branching. The code is an extension of a one-dimensional code developed by P. Meitner. In the subject code, correlations for both heat transfer coefficient and pressure loss computations were developed to model each of the above mentioned type of coolant passages. The code has the capability of independently computing the friction factor and heat transfer coefficient on each side of a rectangular passage. Either the mass flow at the inlet to the channel or the exit plane pressure can be specified. For a specified inlet total temperature, inlet total pressure, and exit static pressure, the code computers the flow rates through the main branch and the subbranches, flow through tip cap for impingement cooling, in addition to computing the coolant pressure, temperature, and heat transfer coefficient distribution in each coolant flow branch. Predictions from the subject code for both nonrotating and rotating passages agree well with experimental data. The code was used to analyze the cooling passage of a research cooled radial rotor.

  11. Efficient Proximity Computation Techniques Using ZIP Code Data for Smart Cities †

    PubMed Central

    Murdani, Muhammad Harist; Hong, Bonghee

    2018-01-01

    In this paper, we are interested in computing ZIP code proximity from two perspectives, proximity between two ZIP codes (Ad-Hoc) and neighborhood proximity (Top-K). Such a computation can be used for ZIP code-based target marketing as one of the smart city applications. A naïve approach to this computation is the usage of the distance between ZIP codes. We redefine a distance metric combining the centroid distance with the intersecting road network between ZIP codes by using a weighted sum method. Furthermore, we prove that the results of our combined approach conform to the characteristics of distance measurement. We have proposed a general and heuristic approach for computing Ad-Hoc proximity, while for computing Top-K proximity, we have proposed a general approach only. Our experimental results indicate that our approaches are verifiable and effective in reducing the execution time and search space. PMID:29587366

  12. Efficient Proximity Computation Techniques Using ZIP Code Data for Smart Cities †.

    PubMed

    Murdani, Muhammad Harist; Kwon, Joonho; Choi, Yoon-Ho; Hong, Bonghee

    2018-03-24

    In this paper, we are interested in computing ZIP code proximity from two perspectives, proximity between two ZIP codes ( Ad-Hoc ) and neighborhood proximity ( Top-K ). Such a computation can be used for ZIP code-based target marketing as one of the smart city applications. A naïve approach to this computation is the usage of the distance between ZIP codes. We redefine a distance metric combining the centroid distance with the intersecting road network between ZIP codes by using a weighted sum method. Furthermore, we prove that the results of our combined approach conform to the characteristics of distance measurement. We have proposed a general and heuristic approach for computing Ad-Hoc proximity, while for computing Top-K proximity, we have proposed a general approach only. Our experimental results indicate that our approaches are verifiable and effective in reducing the execution time and search space.

  13. Volume accumulator design analysis computer codes

    NASA Technical Reports Server (NTRS)

    Whitaker, W. D.; Shimazaki, T. T.

    1973-01-01

    The computer codes, VANEP and VANES, were written and used to aid in the design and performance calculation of the volume accumulator units (VAU) for the 5-kwe reactor thermoelectric system. VANEP computes the VAU design which meets the primary coolant loop VAU volume and pressure performance requirements. VANES computes the performance of the VAU design, determined from the VANEP code, at the conditions of the secondary coolant loop. The codes can also compute the performance characteristics of the VAU's under conditions of possible modes of failure which still permit continued system operation.

  14. "Hour of Code": Can It Change Students' Attitudes toward Programming?

    ERIC Educational Resources Information Center

    Du, Jie; Wimmer, Hayden; Rada, Roy

    2016-01-01

    The Hour of Code is a one-hour introduction to computer science organized by Code.org, a non-profit dedicated to expanding participation in computer science. This study investigated the impact of the Hour of Code on students' attitudes towards computer programming and their knowledge of programming. A sample of undergraduate students from two…

  15. Talking about Code: Integrating Pedagogical Code Reviews into Early Computing Courses

    ERIC Educational Resources Information Center

    Hundhausen, Christopher D.; Agrawal, Anukrati; Agarwal, Pawan

    2013-01-01

    Given the increasing importance of soft skills in the computing profession, there is good reason to provide students withmore opportunities to learn and practice those skills in undergraduate computing courses. Toward that end, we have developed an active learning approach for computing education called the "Pedagogical Code Review"…

  16. Finished genome of the fungal wheat pathogen Mycosphaerella graminicola reveals dispensome structure, chromosome plasticity and stealth pathogenesis

    USDA-ARS?s Scientific Manuscript database

    A finished genome was obtained for Mycosphaerella graminicola, the fungal cause of septoria tritici blotch and a global threat to wheat production, containing thirteen core and eight dispensable chromosomes. The latter, called collectively the dispensome, were dynamic in field and progeny isolates. ...

  17. The Complexity-Adaptability Paradox: Issues for Combat Aircraft Development

    DTIC Science & Technology

    2011-02-16

    to Darwin in many sources, including being engraved in stone on the floor of the California Academy of Science, it is most widely attributed to...showing laser -guided bombs guiding down elevator shafts. Observers have described this combination of precision and stealth as having a ―revolutionary

  18. A Study of Rootkit Stealth Techniques and Associated Detection Methods

    DTIC Science & Technology

    2007-03-01

    Manual . . . . . . . 20 3.1. Rootkit Technology Picture . . . . . . . . . . . . . . . . . . . . 23 3.2. Temporal ordering of a detoured function ...3.12. Detection Classification 3 . . . . . . . . . . . . . . . . . . . . . 43 3.13. Trampoline Function with Modification . . . . . . . . . . . . . 46...63 x List of Tables Table Page 2.1. Incident Categories (AFI 33-138) . . . . . . . . . . . . . . . . . 12 3.1. Inline Function Hook

  19. The Stealth Curriculum: Manipulating America's History Teachers

    ERIC Educational Resources Information Center

    Stotsky, Sandra

    2004-01-01

    The purpose of this report is: (1) To point out the features of a number of manipulative supplemental resources for history and social studies teachers; and (2) to show how similarly manipulative professional development workshops propagate the distorted content and recommended teaching practices of such materials to teachers and their…

  20. Proposed activities to prepare for testing advanced/stealth weapons systems

    NASA Astrophysics Data System (ADS)

    Bishop, Harold T.

    1989-08-01

    The B-2 brings new challenges for Electromagnetic Pulse (EMP) Testing. This paper discusses the unique characteristics of the B-2 and develops a time line of activities that need to be completed by the AF Weapons Laboratory before EMP testing of the B-2 begins.

  1. Stealth Learning: Unexpected Learning Opportunities through Games

    ERIC Educational Resources Information Center

    Sharp, Laura A.

    2012-01-01

    Educators across the country struggle to create engaging, motivating learning environments for their Net Gen students. These learners expect instant gratification that traditional lectures do not provide. This leaves educators searching for innovative ways to engage students in order to encourage learning. One solution is for educators to use…

  2. Guidelines for developing vectorizable computer programs

    NASA Technical Reports Server (NTRS)

    Miner, E. W.

    1982-01-01

    Some fundamental principles for developing computer programs which are compatible with array-oriented computers are presented. The emphasis is on basic techniques for structuring computer codes which are applicable in FORTRAN and do not require a special programming language or exact a significant penalty on a scalar computer. Researchers who are using numerical techniques to solve problems in engineering can apply these basic principles and thus develop transportable computer programs (in FORTRAN) which contain much vectorizable code. The vector architecture of the ASC is discussed so that the requirements of array processing can be better appreciated. The "vectorization" of a finite-difference viscous shock-layer code is used as an example to illustrate the benefits and some of the difficulties involved. Increases in computing speed with vectorization are illustrated with results from the viscous shock-layer code and from a finite-element shock tube code. The applicability of these principles was substantiated through running programs on other computers with array-associated computing characteristics, such as the Hewlett-Packard (H-P) 1000-F.

  3. The Helicopter Antenna Radiation Prediction Code (HARP)

    NASA Technical Reports Server (NTRS)

    Klevenow, F. T.; Lynch, B. G.; Newman, E. H.; Rojas, R. G.; Scheick, J. T.; Shamansky, H. T.; Sze, K. Y.

    1990-01-01

    The first nine months effort in the development of a user oriented computer code, referred to as the HARP code, for analyzing the radiation from helicopter antennas is described. The HARP code uses modern computer graphics to aid in the description and display of the helicopter geometry. At low frequencies the helicopter is modeled by polygonal plates, and the method of moments is used to compute the desired patterns. At high frequencies the helicopter is modeled by a composite ellipsoid and flat plates, and computations are made using the geometrical theory of diffraction. The HARP code will provide a user friendly interface, employing modern computer graphics, to aid the user to describe the helicopter geometry, select the method of computation, construct the desired high or low frequency model, and display the results.

  4. Enhanced fault-tolerant quantum computing in d-level systems.

    PubMed

    Campbell, Earl T

    2014-12-05

    Error-correcting codes protect quantum information and form the basis of fault-tolerant quantum computing. Leading proposals for fault-tolerant quantum computation require codes with an exceedingly rare property, a transversal non-Clifford gate. Codes with the desired property are presented for d-level qudit systems with prime d. The codes use n=d-1 qudits and can detect up to ∼d/3 errors. We quantify the performance of these codes for one approach to quantum computation known as magic-state distillation. Unlike prior work, we find performance is always enhanced by increasing d.

  5. Convergence acceleration of the Proteus computer code with multigrid methods

    NASA Technical Reports Server (NTRS)

    Demuren, A. O.; Ibraheem, S. O.

    1992-01-01

    Presented here is the first part of a study to implement convergence acceleration techniques based on the multigrid concept in the Proteus computer code. A review is given of previous studies on the implementation of multigrid methods in computer codes for compressible flow analysis. Also presented is a detailed stability analysis of upwind and central-difference based numerical schemes for solving the Euler and Navier-Stokes equations. Results are given of a convergence study of the Proteus code on computational grids of different sizes. The results presented here form the foundation for the implementation of multigrid methods in the Proteus code.

  6. Implementation of radiation shielding calculation methods. Volume 1: Synopsis of methods and summary of results

    NASA Technical Reports Server (NTRS)

    Capo, M. A.; Disney, R. K.

    1971-01-01

    The work performed in the following areas is summarized: (1) Analysis of Realistic nuclear-propelled vehicle was analyzed using the Marshall Space Flight Center computer code package. This code package includes one and two dimensional discrete ordinate transport, point kernel, and single scatter techniques, as well as cross section preparation and data processing codes, (2) Techniques were developed to improve the automated data transfer in the coupled computation method of the computer code package and improve the utilization of this code package on the Univac-1108 computer system. (3) The MSFC master data libraries were updated.

  7. Nonuniform code concatenation for universal fault-tolerant quantum computing

    NASA Astrophysics Data System (ADS)

    Nikahd, Eesa; Sedighi, Mehdi; Saheb Zamani, Morteza

    2017-09-01

    Using transversal gates is a straightforward and efficient technique for fault-tolerant quantum computing. Since transversal gates alone cannot be computationally universal, they must be combined with other approaches such as magic state distillation, code switching, or code concatenation to achieve universality. In this paper we propose an alternative approach for universal fault-tolerant quantum computing, mainly based on the code concatenation approach proposed in [T. Jochym-O'Connor and R. Laflamme, Phys. Rev. Lett. 112, 010505 (2014), 10.1103/PhysRevLett.112.010505], but in a nonuniform fashion. The proposed approach is described based on nonuniform concatenation of the 7-qubit Steane code with the 15-qubit Reed-Muller code, as well as the 5-qubit code with the 15-qubit Reed-Muller code, which lead to two 49-qubit and 47-qubit codes, respectively. These codes can correct any arbitrary single physical error with the ability to perform a universal set of fault-tolerant gates, without using magic state distillation.

  8. Green's function methods in heavy ion shielding

    NASA Technical Reports Server (NTRS)

    Wilson, John W.; Costen, Robert C.; Shinn, Judy L.; Badavi, Francis F.

    1993-01-01

    An analytic solution to the heavy ion transport in terms of Green's function is used to generate a highly efficient computer code for space applications. The efficiency of the computer code is accomplished by a nonperturbative technique extending Green's function over the solution domain. The computer code can also be applied to accelerator boundary conditions to allow code validation in laboratory experiments.

  9. Analytical modeling of operating characteristics of premixing-prevaporizing fuel-air mixing passages. Volume 2: User's manual

    NASA Technical Reports Server (NTRS)

    Anderson, O. L.; Chiappetta, L. M.; Edwards, D. E.; Mcvey, J. B.

    1982-01-01

    A user's manual describing the operation of three computer codes (ADD code, PTRAK code, and VAPDIF code) is presented. The general features of the computer codes, the input/output formats, run streams, and sample input cases are described.

  10. Automated apparatus and method of generating native code for a stitching machine

    NASA Technical Reports Server (NTRS)

    Miller, Jeffrey L. (Inventor)

    2000-01-01

    A computer system automatically generates CNC code for a stitching machine. The computer determines the locations of a present stitching point and a next stitching point. If a constraint is not found between the present stitching point and the next stitching point, the computer generates code for making a stitch at the next stitching point. If a constraint is found, the computer generates code for changing a condition (e.g., direction) of the stitching machine's stitching head.

  11. Computer codes developed and under development at Lewis

    NASA Technical Reports Server (NTRS)

    Chamis, Christos C.

    1992-01-01

    The objective of this summary is to provide a brief description of: (1) codes developed or under development at LeRC; and (2) the development status of IPACS with some typical early results. The computer codes that have been developed and/or are under development at LeRC are listed in the accompanying charts. This list includes: (1) the code acronym; (2) select physics descriptors; (3) current enhancements; and (4) present (9/91) code status with respect to its availability and documentation. The computer codes list is grouped by related functions such as: (1) composite mechanics; (2) composite structures; (3) integrated and 3-D analysis; (4) structural tailoring; and (5) probabilistic structural analysis. These codes provide a broad computational simulation infrastructure (technology base-readiness) for assessing the structural integrity/durability/reliability of propulsion systems. These codes serve two other very important functions: they provide an effective means of technology transfer; and they constitute a depository of corporate memory.

  12. Broadband diffuse terahertz wave scattering by flexible metasurface with randomized phase distribution

    PubMed Central

    Zhang, Yin; Liang, Lanju; Yang, Jing; Feng, Yijun; Zhu, Bo; Zhao, Junming; Jiang, Tian; Jin, Biaobing; Liu, Weiwei

    2016-01-01

    Suppressing specular electromagnetic wave reflection or backward radar cross section is important and of broad interests in practical electromagnetic engineering. Here, we present a scheme to achieve broadband backward scattering reduction through diffuse terahertz wave reflection by a flexible metasurface. The diffuse scattering of terahertz wave is caused by the randomized reflection phase distribution on the metasurface, which consists of meta-particles of differently sized metallic patches arranged on top of a grounded polyimide substrate simply through a certain computer generated pseudorandom sequence. Both numerical simulations and experimental results demonstrate the ultralow specular reflection over a broad frequency band and wide angle of incidence due to the re-distribution of the incident energy into various directions. The diffuse scattering property is also polarization insensitive and can be well preserved when the flexible metasurface is conformably wrapped on a curved reflective object. The proposed design opens up a new route for specular reflection suppression, and may be applicable in stealth and other technology in the terahertz spectrum. PMID:27225031

  13. Broadband diffuse terahertz wave scattering by flexible metasurface with randomized phase distribution.

    PubMed

    Zhang, Yin; Liang, Lanju; Yang, Jing; Feng, Yijun; Zhu, Bo; Zhao, Junming; Jiang, Tian; Jin, Biaobing; Liu, Weiwei

    2016-05-26

    Suppressing specular electromagnetic wave reflection or backward radar cross section is important and of broad interests in practical electromagnetic engineering. Here, we present a scheme to achieve broadband backward scattering reduction through diffuse terahertz wave reflection by a flexible metasurface. The diffuse scattering of terahertz wave is caused by the randomized reflection phase distribution on the metasurface, which consists of meta-particles of differently sized metallic patches arranged on top of a grounded polyimide substrate simply through a certain computer generated pseudorandom sequence. Both numerical simulations and experimental results demonstrate the ultralow specular reflection over a broad frequency band and wide angle of incidence due to the re-distribution of the incident energy into various directions. The diffuse scattering property is also polarization insensitive and can be well preserved when the flexible metasurface is conformably wrapped on a curved reflective object. The proposed design opens up a new route for specular reflection suppression, and may be applicable in stealth and other technology in the terahertz spectrum.

  14. Reactivity effects in VVER-1000 of the third unit of the kalinin nuclear power plant at physical start-up. Computations in ShIPR intellectual code system with library of two-group cross sections generated by UNK code

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zizin, M. N.; Zimin, V. G.; Zizina, S. N., E-mail: zizin@adis.vver.kiae.ru

    2010-12-15

    The ShIPR intellectual code system for mathematical simulation of nuclear reactors includes a set of computing modules implementing the preparation of macro cross sections on the basis of the two-group library of neutron-physics cross sections obtained for the SKETCH-N nodal code. This library is created by using the UNK code for 3D diffusion computation of first VVER-1000 fuel loadings. Computation of neutron fields in the ShIPR system is performed using the DP3 code in the two-group diffusion approximation in 3D triangular geometry. The efficiency of all groups of control rods for the first fuel loading of the third unit ofmore » the Kalinin Nuclear Power Plant is computed. The temperature, barometric, and density effects of reactivity as well as the reactivity coefficient due to the concentration of boric acid in the reactor were computed additionally. Results of computations are compared with the experiment.« less

  15. Reactivity effects in VVER-1000 of the third unit of the kalinin nuclear power plant at physical start-up. Computations in ShIPR intellectual code system with library of two-group cross sections generated by UNK code

    NASA Astrophysics Data System (ADS)

    Zizin, M. N.; Zimin, V. G.; Zizina, S. N.; Kryakvin, L. V.; Pitilimov, V. A.; Tereshonok, V. A.

    2010-12-01

    The ShIPR intellectual code system for mathematical simulation of nuclear reactors includes a set of computing modules implementing the preparation of macro cross sections on the basis of the two-group library of neutron-physics cross sections obtained for the SKETCH-N nodal code. This library is created by using the UNK code for 3D diffusion computation of first VVER-1000 fuel loadings. Computation of neutron fields in the ShIPR system is performed using the DP3 code in the two-group diffusion approximation in 3D triangular geometry. The efficiency of all groups of control rods for the first fuel loading of the third unit of the Kalinin Nuclear Power Plant is computed. The temperature, barometric, and density effects of reactivity as well as the reactivity coefficient due to the concentration of boric acid in the reactor were computed additionally. Results of computations are compared with the experiment.

  16. Users manual and modeling improvements for axial turbine design and performance computer code TD2-2

    NASA Technical Reports Server (NTRS)

    Glassman, Arthur J.

    1992-01-01

    Computer code TD2 computes design point velocity diagrams and performance for multistage, multishaft, cooled or uncooled, axial flow turbines. This streamline analysis code was recently modified to upgrade modeling related to turbine cooling and to the internal loss correlation. These modifications are presented in this report along with descriptions of the code's expanded input and output. This report serves as the users manual for the upgraded code, which is named TD2-2.

  17. An Object-Oriented Approach to Writing Computational Electromagnetics Codes

    NASA Technical Reports Server (NTRS)

    Zimmerman, Martin; Mallasch, Paul G.

    1996-01-01

    Presently, most computer software development in the Computational Electromagnetics (CEM) community employs the structured programming paradigm, particularly using the Fortran language. Other segments of the software community began switching to an Object-Oriented Programming (OOP) paradigm in recent years to help ease design and development of highly complex codes. This paper examines design of a time-domain numerical analysis CEM code using the OOP paradigm, comparing OOP code and structured programming code in terms of software maintenance, portability, flexibility, and speed.

  18. Computer Description of the Field Artillery Ammunition Supply Vehicle

    DTIC Science & Technology

    1983-04-01

    Combinatorial Geometry (COM-GEOM) GIFT Computer Code Computer Target Description 2& AfTNACT (Cmne M feerve shb N ,neemssalyan ify by block number) A...input to the GIFT computer code to generate target vulnerability data. F.a- 4 ono OF I NOV 5S OLETE UNCLASSIFIED SECUOITY CLASSIFICATION OF THIS PAGE...Combinatorial Geometry (COM-GEOM) desrription. The "Geometric Information for Tarqets" ( GIFT ) computer code accepts the CO!-GEOM description and

  19. 48 CFR 252.227-7013 - Rights in technical data-Noncommercial items.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... causing a computer to perform a specific operation or series of operations. (3) Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms... or will be developed exclusively with Government funds; (ii) Studies, analyses, test data, or similar...

  20. 48 CFR 252.227-7013 - Rights in technical data-Noncommercial items.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... causing a computer to perform a specific operation or series of operations. (3) Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms... or will be developed exclusively with Government funds; (ii) Studies, analyses, test data, or similar...

  1. 48 CFR 252.227-7013 - Rights in technical data-Noncommercial items.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... causing a computer to perform a specific operation or series of operations. (3) Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms... or will be developed exclusively with Government funds; (ii) Studies, analyses, test data, or similar...

  2. 48 CFR 252.227-7013 - Rights in technical data-Noncommercial items.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... causing a computer to perform a specific operation or series of operations. (3) Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms... developed exclusively with Government funds; (ii) Studies, analyses, test data, or similar data produced for...

  3. Antenna pattern study, task 2

    NASA Technical Reports Server (NTRS)

    Harper, Warren

    1989-01-01

    Two electromagnetic scattering codes, NEC-BSC and ESP3, were delivered and installed on a NASA VAX computer for use by Marshall Space Flight Center antenna design personnel. The existing codes and certain supplementary software were updated, the codes installed on a computer that will be delivered to the customer, to provide capability for graphic display of the data to be computed by the use of the codes and to assist the customer in the solution of specific problems that demonstrate the use of the codes. With the exception of one code revision, all of these tasks were performed.

  4. Understanding the Behaviors of Stealth Applicants in the College Search Process

    ERIC Educational Resources Information Center

    Dupaul, Stephanie

    2010-01-01

    Successful enrollment management uses predictive modeling to achieve specific goals for admission rates, yield rates, and class size. Many of these models rely on evaluating an applicant's interest in the institution through measures of pre-application engagement. Recent increases in the number of applicants who do not visibly interact with…

  5. Army Sustainment. Volume 44, Issue 3. May-June 2012

    DTIC Science & Technology

    2012-06-01

    Slaughter said. “We have to look for ways to buy the most nutritious products, like brown rice or whole-grain pastas . With creativity and production, we...nutrition in a stealth way,” Captain Brooks said. “Maybe adding whole-wheat pasta or whole-grain rice to dishes (in place of) regular white pasta

  6. “Stealth dissemination” of macrophage-tumor cell fusions cultured from blood of patients with pancreatic ductal adenocarcinoma

    USDA-ARS?s Scientific Manuscript database

    Circulating tumor cells (CTCs) appear to be involved in early dissemination of many cancers, although which characteristics are important in metastatic spread are not clear. Here we describe isolation and characterization of macrophage-tumor cell fusions (MTFs) from the blood of pancreatic ductal a...

  7. Measuring Problem Solving Skills in Plants vs. Zombies 2

    ERIC Educational Resources Information Center

    Shute, Valerie J.; Moore, Gregory R.; Wang, Lubin

    2015-01-01

    We are using stealth assessment, embedded in "Plants vs. Zombies 2," to measure middle-school students' problem solving skills. This project started by developing a problem solving competency model based on a thorough review of the literature. Next, we identified relevant in-game indicators that would provide evidence about students'…

  8. A Stealth Drug Recall: Who Protects Consumers and Shareholders?

    ERIC Educational Resources Information Center

    Monseau, Susanna; Lasher, Nancy

    2015-01-01

    In September 2010, William Weldon, chief executive officer (CEO) and chairman of Johnson & Johnson (J&J), was called to testify in front of the Committee on Oversight and Government Reform to explain the largest product recall in the 125-year history of the well-known pharmaceutical and consumer products company. This article presents a…

  9. Health by Stealth--Exploring the Sociocultural Dimensions of Salutogenesis for Sport, Health and Physical Education Research

    ERIC Educational Resources Information Center

    McCuaig, Louise; Quennerstedt, Mikael

    2018-01-01

    Sport, health and physical education (SHPE) researchers have increasingly embraced the salutogenic model of health devised by Aaron Antonvosky, to re-understand and problematise the relation between movement, physical activity or physical education on one hand, and health on the other. However, contemporary research employing Antonovsky's theories…

  10. Stealth Evangelism and the Public Schools

    ERIC Educational Resources Information Center

    Boston, Bob

    2010-01-01

    United Methodist minister David Jenkins was meeting with fellow clergy last year in the small Kansas community of Sharon Springs when one of the pastors made what sounded like a routine request. He noted that the Todd Becker Foundation was coming to town, and the evangelical Christian organization, which purports to warn youngsters about the…

  11. Search for long-lived, weakly interacting particles that decay to displaced hadronic jets in proton-proton collisions at s = 8 TeV with the ATLAS detector

    DOE PAGES

    Aad, G.; Abbott, B.; Abdallah, J.; ...

    2015-07-17

    A search for the decay of neutral, weakly interacting, long-lived particles using data collected by the ATLAS detector at the LHC is presented. This analysis uses the full data set recorded in 2012: 20.3 fb –1 of proton-proton collision data at √s = 8 TeV. The search employs techniques for reconstructing decay vertices of long-lived particles decaying to jets in the inner tracking detector and muon spectrometer. Signal events require at least two reconstructed vertices. No significant excess of events over the expected background is found, and limits as a function of proper lifetime are reported for the decay ofmore » the Higgs boson and other scalar bosons to long-lived particles and for Hidden Valley Z' and Stealth SUSY benchmark models. The first search results for displaced decays in Z' and Stealth SUSY models are presented. The upper bounds of the excluded proper lifetimes are the most stringent to date.« less

  12. Stealth configurations in vector-tensor theories of gravity

    NASA Astrophysics Data System (ADS)

    Chagoya, Javier; Tasinato, Gianmassimo

    2018-01-01

    Studying the physics of compact objects in modified theories of gravity is important for understanding how future observations can test alternatives to General Relativity. We consider a subset of vector-tensor Galileon theories of gravity characterized by new symmetries, which can prevent the propagation of the vector longitudinal polarization, even in absence of Abelian gauge invariance. We investigate new spherically symmetric and slowly rotating solutions for these systems, including an arbitrary matter Lagrangian. We show that, under certain conditions, there always exist stealth configurations whose geometry coincides with solutions of Einstein gravity coupled with the additional matter. Such solutions have a non-trivial profile for the vector field, characterized by independent integration constants, which extends to asymptotic infinity. We interpret our findings in terms of the symmetries and features of the original vector-tensor action, and on the number of degrees of freedom that it propagates. These results are important to eventually describe gravitationally bound configurations in modified theories of gravity, such as black holes and neutron stars, including realistic matter fields forming or surrounding the object.

  13. Search for supersymmetry in events with photons and low missing transverse energy in pp collisions at s = 7   TeV

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chatrchyan, S.; Khachatryan, V.; Sirunyan, A. M.

    Many models of new physics, including versions of supersymmetry (SUSY), predict production of events with low missing transverse energy, electroweak gauge bosons, and many energetic final-state particles. The stealth SUSY model yields this signature while conserving R-parity by means of a new hidden sector in which SUSY is approximately conserved. The results of a general search for new physics, with no requirement on missing transverse energy, in events with two photons and four or more hadronic jets are reported. The study is based on a sample of proton-proton collisions at sqrt(s) = 7 TeV corresponding to 4.96 inverse femtobarns ofmore » integrated luminosity collected with the CMS detector in 2011. Based on good agreement between the data and the standard model expectation, the data are used to determine model-independent cross-section limits and a limit on the squark mass in the framework of stealth SUSY. With this first study of its kind, squark masses less than 1430 GeV are excluded at the 95% confidence level.« less

  14. 48 CFR 252.227-7013 - Rights in technical data-Noncommercial items.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... causing a computer to perform a specific operation or series of operations. (3) Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms... funds; (ii) Studies, analyses, test data, or similar data produced for this contract, when the study...

  15. Parallel Computation of the Jacobian Matrix for Nonlinear Equation Solvers Using MATLAB

    NASA Technical Reports Server (NTRS)

    Rose, Geoffrey K.; Nguyen, Duc T.; Newman, Brett A.

    2017-01-01

    Demonstrating speedup for parallel code on a multicore shared memory PC can be challenging in MATLAB due to underlying parallel operations that are often opaque to the user. This can limit potential for improvement of serial code even for the so-called embarrassingly parallel applications. One such application is the computation of the Jacobian matrix inherent to most nonlinear equation solvers. Computation of this matrix represents the primary bottleneck in nonlinear solver speed such that commercial finite element (FE) and multi-body-dynamic (MBD) codes attempt to minimize computations. A timing study using MATLAB's Parallel Computing Toolbox was performed for numerical computation of the Jacobian. Several approaches for implementing parallel code were investigated while only the single program multiple data (spmd) method using composite objects provided positive results. Parallel code speedup is demonstrated but the goal of linear speedup through the addition of processors was not achieved due to PC architecture.

  16. User Instructions for the Systems Assessment Capability, Rev. 1, Computer Codes Volume 3: Utility Codes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eslinger, Paul W.; Aaberg, Rosanne L.; Lopresti, Charles A.

    2004-09-14

    This document contains detailed user instructions for a suite of utility codes developed for Rev. 1 of the Systems Assessment Capability. The suite of computer codes for Rev. 1 of Systems Assessment Capability performs many functions.

  17. Development of a model and computer code to describe solar grade silicon production processes

    NASA Technical Reports Server (NTRS)

    Gould, R. K.; Srivastava, R.

    1979-01-01

    Two computer codes were developed for describing flow reactors in which high purity, solar grade silicon is produced via reduction of gaseous silicon halides. The first is the CHEMPART code, an axisymmetric, marching code which treats two phase flows with models describing detailed gas-phase chemical kinetics, particle formation, and particle growth. It can be used to described flow reactors in which reactants, mix, react, and form a particulate phase. Detailed radial gas-phase composition, temperature, velocity, and particle size distribution profiles are computed. Also, deposition of heat, momentum, and mass (either particulate or vapor) on reactor walls is described. The second code is a modified version of the GENMIX boundary layer code which is used to compute rates of heat, momentum, and mass transfer to the reactor walls. This code lacks the detailed chemical kinetics and particle handling features of the CHEMPART code but has the virtue of running much more rapidly than CHEMPART, while treating the phenomena occurring in the boundary layer in more detail.

  18. Investigation of nano lipid vesicles of methotrexate for anti-rheumatoid activity

    PubMed Central

    Prabhu, Prabhakara; Shetty, Rakshith; Koland, Marina; Vijayanarayana, K; Vijayalakshmi, KK; Nairy, M Harish; Nisha, GS

    2012-01-01

    Background The purpose of this study was to formulate and evaluate nano lipid vesicles of methotrexate (MTX) for its anti-rheumatoid activity. Methods In this study the principle of both active as well as passive targeting using MTX-loaded stealth liposomes as per the magic gun approach was followed. Stealth liposomes of MTX were prepared by thin-film hydration method using a PEGylated phospholipid-like DSPE-MPEG 2000. Similarly, conventional liposomes were prepared using phospholipids like DPPC and DSPC. Conventional liposomes were coated with a hydrophilic biocompatible polymer like chitosan. They were investigated for their physical properties and in vitro release profile. Further, in vivo screening of the formulations for their anti-rheumatoid efficacy was carried out in rats. Rheumatoid arthritis was induced in male Wistar-Lewis rats using complete Freund’s adjuvant (1 mg/mL Mycobacterium tuberculosis, heat killed in mineral oil). Results It was found that chitosan coating of the conventional liposomes increased the physical stability of the liposomal suspension as well as its entrapment efficiency. The size of the unsonicated lipid vesicles was found to be in the range of 8–10 μm, and the sonicated lipid vesicles in the range of 210–260 nm, with good polydispersity index. Further, chitosan-coated conventional liposomes and the PEGylated liposomes released the drug for a prolonged period of time, compared to the uncoated conventional liposomes. It was found that there was a significant reduction in edema volume in the rat group administered with the test stealth liposomal formulations and chitosan-coated conventional liposomes (PEGylated and chitosan-coated conventional) compared to that of the control and standard (administered with free MTX) group of rats. PEGylated liposomes showed almost equal efficacy as that of the chitosan-coated conventional liposomes. Conclusion Lipid nano vesicles of MTX can be administered by intravenous route, whereby the drug selectively reaches the target site with reduced toxicity to other organs. PMID:22275833

  19. SU-F-P-42: “To Navigate, Or Not to Navigate: HDR BT in Recurrent Spine Lesions”

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Voros, L; Cohen, G; Zaider, M

    Purpose: We compare the accuracy of HDR catheter placement for paraspinal lesions using O-arm CBCT imaging combined with StealthStation navigation and traditional fluoroscopically guided catheter placement. Methods: CT and MRI scans were acquired pre-treatment to outline the lesions and design treatment plans (pre-plans) to meet dosimetric constrains. The pre-planned catheter trajectories were transferred into the StealthStation Navigation system prior to the surgery. The StealthStation is an infra red (IR) optical navigation system used for guidance of surgical instruments. An intraoperative CBCT scan (O-arm) was acquired with reference IR optical fiducials anchored onto the patient and registered with the preplan imagemore » study to guide surgical instruments in relation to the patients’ anatomy and to place the brachytherapy catheters along the pre-planned trajectories. The final treatment plan was generated based on a 2nd intraoperative CBCT scan reflecting achieved implant geometry. The 2nd CBCT was later registered with the initial CT scan to compare the preplanned dwell positions with actual dwell positions (catheter placements). Similar workflow was used in placement of 8 catheters (1 patient) without navigation, but under fluoroscopy guidance in an interventional radiology suite. Results: A total of 18 catheters (3 patients) were placed using navigation assisted surgery. Average displacement of 0.66 cm (STD=0.37cm) was observed between the pre-plan source positions and actual source positions in the 3 dimensional space. This translates into an average 0.38 cm positioning error in one direction including registration errors, digitization errors, and the surgeons ability to follow the planned trajectory. In comparison, average displacement of non-navigated catheters was 0.50 cm (STD=0.22cm). Conclusion: Spinal lesion HDR brachytherapy planning is a difficult task. Catheter placement has a direct impact on target coverage and dose to critical structures. While limited to a handful of patients, our experience shows navigation and fluoroscopy guided placement yield similar results.« less

  20. Performance evaluation of three on-site adulterant detection devices for urine specimens.

    PubMed

    Peace, Michelle R; Tarnai, Lisa D

    2002-10-01

    The performance of three on-site adulterant detection devices that assess the integrity of urine specimens collected for drug-of-abuse testing was evaluated: the Intect 7, MASK Ultra Screen, and Adultacheck 4. Intect 7 simultaneously tests creatinine, nitrite, glutaraldehyde, pH, specific gravity, and the presence of bleach and pyridinium chlorochromate (PCC). Mask Ultra Screen tests creatinine, nitrite, pH, specific gravity, and oxidants, and Adultacheck 4 tests creatinine, nitrite, glutaraldehyde, and pH. Urine specimens were prepared with the Substance Abuse and Mental Health Administration regulated analytes at 50% above the cut-off concentrations. Stealth, Urine Luck, Instant Clean ADD-IT-ive, and KLEAR were added individually to the drug-added urine specimens so that their concentrations reflected the "optimum" usage reported in their package inserts and 25% above and below that optimum. Stealth is reported to be peroxidase; Urine Luck is believed to be PCC; Instant Clean ADD-it-ive reportedly contains glutaraldehyde, and Klear is a nitrite. The following diluents/adulterants were added at 25%, 33%, and 50% of the volume of drug-added urine: distilled water, bleach, ammonia, and vinegar. Of the devices tested, Intect 7 proved to be the most sensitive, and it correctly indicated the presence of adulterant or diluent in all samples tested. In order to do so, all indication pads had to be assessed in concert. Adultacheck 4 specifically assesses four characteristics of urine integrity and is therefore very limited in detecting the use of several popular adulterants that are commercially available. Although it correctly assessed the four characteristics, it did not detect the use of Stealth, Urine Luck, or Instant Clean ADD-it-ive. Mask Ultra Screen can potentially detect a broader range of adulterants than Adultacheck 4. However, in practice, it only detected them at levels well above their optimum usage, making it less efficacious than Intect 7. Clearly, the specific identification of an adulterant is a trade-off for sensitive detection of several adulterants.

  1. Buried Craters In Isidis Planitia, Mars

    NASA Astrophysics Data System (ADS)

    Seabrook, A. M.; Rothery, D. A.; Wallis, D.; Bridges, J. C.; Wright, I. P.

    We have produced a topographic map of Isidis Planitia, which includes the Beagle 2 landing site, using interpolated Mars Orbiter Laser Altimeter (MOLA) data from the Mars Global Surveyor (MGS) spacecraft currently orbiting Mars. MOLA data have a vertical precision of 37.5 cm, a footprint size of 130 m, an along-track shot spacing of 330 m, and an across-track spacing that is variable and may be several kilometres. This has revealed subtle topographic detail within the relatively smooth basin of Isidis Planitia. Analysis of this map shows apparent wrinkle ridges that could be the volcanic basement to the basin and also several circular depressions with diameters of several to tens of kilometres which we interpreted as buried impact craters, comparable to the so-called stealth craters recognised elsewhere in the northern lowlands of Mars[1]. Stealth craters are considered to be impact craters subjected to erosion and/or burial. Some of these features in Isidis have depressions that are on the order of tens metres lower than their rims and are very smooth, and so are often not visible in MGS Mars Orbiter Camera (MOC) or Viking images of the basin. The Isidis stealth craters are not restricted to the Hesperian Vastitas Borealis formations like those detected elsewhere in the northern lowlands by Kreslavsky and Head [1], but are also found in a younger Amazonian smooth plains unit. It is generally believed that Isidis Planitia has undergone one or more episodes of sedi- ment deposition, and so these buried craters most likely lie on an earlier surface, which could be the postulated volcanic basement to the basin. Analysis of the buried craters may give some understanding of the thickness, frequencies and ages of sedimentation episodes within the basin. This information will be important in developing a context in which information from the Beagle 2 lander can be analysed when it arrives on Mars in December 2003. [1] Kreslavsky M. A. and Head J. W. (2001) LPS XXXII

  2. Finished Genome of the Fungal Wheat Pathogen Mycosphaerella graminicola Reveals Dispensome Structure, Chromosome Plasticity, and Stealth Pathogenesis

    PubMed Central

    Ben M'Barek, Sarrah; Dhillon, Braham; Wittenberg, Alexander H. J.; Crane, Charles F.; Hane, James K.; Foster, Andrew J.; Van der Lee, Theo A. J.; Grimwood, Jane; Aerts, Andrea; Antoniw, John; Bailey, Andy; Bluhm, Burt; Bowler, Judith; Bristow, Jim; van der Burgt, Ate; Canto-Canché, Blondy; Churchill, Alice C. L.; Conde-Ferràez, Laura; Cools, Hans J.; Coutinho, Pedro M.; Csukai, Michael; Dehal, Paramvir; De Wit, Pierre; Donzelli, Bruno; van de Geest, Henri C.; van Ham, Roeland C. H. J.; Hammond-Kosack, Kim E.; Henrissat, Bernard; Kilian, Andrzej; Kobayashi, Adilson K.; Koopmann, Edda; Kourmpetis, Yiannis; Kuzniar, Arnold; Lindquist, Erika; Lombard, Vincent; Maliepaard, Chris; Martins, Natalia; Mehrabi, Rahim; Nap, Jan P. H.; Ponomarenko, Alisa; Rudd, Jason J.; Salamov, Asaf; Schmutz, Jeremy; Schouten, Henk J.; Shapiro, Harris; Stergiopoulos, Ioannis; Torriani, Stefano F. F.; Tu, Hank; de Vries, Ronald P.; Waalwijk, Cees; Ware, Sarah B.; Wiebenga, Ad; Zwiers, Lute-Harm; Oliver, Richard P.

    2011-01-01

    The plant-pathogenic fungus Mycosphaerella graminicola (asexual stage: Septoria tritici) causes septoria tritici blotch, a disease that greatly reduces the yield and quality of wheat. This disease is economically important in most wheat-growing areas worldwide and threatens global food production. Control of the disease has been hampered by a limited understanding of the genetic and biochemical bases of pathogenicity, including mechanisms of infection and of resistance in the host. Unlike most other plant pathogens, M. graminicola has a long latent period during which it evades host defenses. Although this type of stealth pathogenicity occurs commonly in Mycosphaerella and other Dothideomycetes, the largest class of plant-pathogenic fungi, its genetic basis is not known. To address this problem, the genome of M. graminicola was sequenced completely. The finished genome contains 21 chromosomes, eight of which could be lost with no visible effect on the fungus and thus are dispensable. This eight-chromosome dispensome is dynamic in field and progeny isolates, is different from the core genome in gene and repeat content, and appears to have originated by ancient horizontal transfer from an unknown donor. Synteny plots of the M. graminicola chromosomes versus those of the only other sequenced Dothideomycete, Stagonospora nodorum, revealed conservation of gene content but not order or orientation, suggesting a high rate of intra-chromosomal rearrangement in one or both species. This observed “mesosynteny” is very different from synteny seen between other organisms. A surprising feature of the M. graminicola genome compared to other sequenced plant pathogens was that it contained very few genes for enzymes that break down plant cell walls, which was more similar to endophytes than to pathogens. The stealth pathogenesis of M. graminicola probably involves degradation of proteins rather than carbohydrates to evade host defenses during the biotrophic stage of infection and may have evolved from endophytic ancestors. PMID:21695235

  3. Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading.

    PubMed

    Van Hout, Marie Claire; Bingham, Tim

    2014-03-01

    Silk Road is located on the Deep Web and provides an anonymous transacting infrastructure for the retail of drugs and pharmaceuticals. Members are attracted to the site due to protection of identity by screen pseudonyms, variety and quality of product listings, selection of vendors based on reviews, reduced personal risks, stealth of product delivery, development of personal connections with vendors in stealth modes and forum activity. The study aimed to explore vendor accounts of Silk Road as retail infrastructure. A single and holistic case study with embedded units approach (Yin, 2003) was chosen to explore the accounts of vendor subunits situated within the Silk Road marketplace. Vendors (n=10) completed an online interview via the direct message facility and via Tor mail. Vendors described themselves as 'intelligent and responsible' consumers of drugs. Decisions to commence vending operations on the site centred on simplicity in setting up vendor accounts, and opportunity to operate within a low risk, high traffic, high mark-up, secure and anonymous Deep Web infrastructure. The embedded online culture of harm reduction ethos appealed to them in terms of the responsible vending and use of personally tested high quality products. The professional approach to running their Silk Road businesses and dedication to providing a quality service was characterised by professional advertising of quality products, professional communication and visibility on forum pages, speedy dispatch of slightly overweight products, competitive pricing, good stealth techniques and efforts to avoid customer disputes. Vendors appeared content with a fairly constant buyer demand and described a relatively competitive market between small and big time market players. Concerns were evident with regard to Bitcoin instability. The greatest threat to Silk Road and other sites operating on the Deep Web is not law enforcement or market dynamics, it is technology itself. Copyright © 2013 Elsevier B.V. All rights reserved.

  4. Comparison of two computer codes for crack growth analysis: NASCRAC Versus NASA/FLAGRO

    NASA Technical Reports Server (NTRS)

    Stallworth, R.; Meyers, C. A.; Stinson, H. C.

    1989-01-01

    Results are presented from the comparison study of two computer codes for crack growth analysis - NASCRAC and NASA/FLAGRO. The two computer codes gave compatible conservative results when the part through crack analysis solutions were analyzed versus experimental test data. Results showed good correlation between the codes for the through crack at a lug solution. For the through crack at a lug solution, NASA/FLAGRO gave the most conservative results.

  5. Computational Predictions of the Performance Wright 'Bent End' Propellers

    NASA Technical Reports Server (NTRS)

    Wang, Xiang-Yu; Ash, Robert L.; Bobbitt, Percy J.; Prior, Edwin (Technical Monitor)

    2002-01-01

    Computational analysis of two 1911 Wright brothers 'Bent End' wooden propeller reproductions have been performed and compared with experimental test results from the Langley Full Scale Wind Tunnel. The purpose of the analysis was to check the consistency of the experimental results and to validate the reliability of the tests. This report is one part of the project on the propeller performance research of the Wright 'Bent End' propellers, intend to document the Wright brothers' pioneering propeller design contributions. Two computer codes were used in the computational predictions. The FLO-MG Navier-Stokes code is a CFD (Computational Fluid Dynamics) code based on the Navier-Stokes Equations. It is mainly used to compute the lift coefficient and the drag coefficient at specified angles of attack at different radii. Those calculated data are the intermediate results of the computation and a part of the necessary input for the Propeller Design Analysis Code (based on Adkins and Libeck method), which is a propeller design code used to compute the propeller thrust coefficient, the propeller power coefficient and the propeller propulsive efficiency.

  6. Proceduracy: Computer Code Writing in the Continuum of Literacy

    ERIC Educational Resources Information Center

    Vee, Annette

    2010-01-01

    This dissertation looks at computer programming through the lens of literacy studies, building from the concept of code as a written text with expressive and rhetorical power. I focus on the intersecting technological and social factors of computer code writing as a literacy--a practice I call "proceduracy". Like literacy, proceduracy is a human…

  7. Computer Code Aids Design Of Wings

    NASA Technical Reports Server (NTRS)

    Carlson, Harry W.; Darden, Christine M.

    1993-01-01

    AERO2S computer code developed to aid design engineers in selection and evaluation of aerodynamically efficient wing/canard and wing/horizontal-tail configurations that includes simple hinged-flap systems. Code rapidly estimates longitudinal aerodynamic characteristics of conceptual airplane lifting-surface arrangements. Developed in FORTRAN V on CDC 6000 computer system, and ported to MS-DOS environment.

  8. Cloud Computing for Complex Performance Codes.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Appel, Gordon John; Hadgu, Teklu; Klein, Brandon Thorin

    This report describes the use of cloud computing services for running complex public domain performance assessment problems. The work consisted of two phases: Phase 1 was to demonstrate complex codes, on several differently configured servers, could run and compute trivial small scale problems in a commercial cloud infrastructure. Phase 2 focused on proving non-trivial large scale problems could be computed in the commercial cloud environment. The cloud computing effort was successfully applied using codes of interest to the geohydrology and nuclear waste disposal modeling community.

  9. APC: A New Code for Atmospheric Polarization Computations

    NASA Technical Reports Server (NTRS)

    Korkin, Sergey V.; Lyapustin, Alexei I.; Rozanov, Vladimir V.

    2014-01-01

    A new polarized radiative transfer code Atmospheric Polarization Computations (APC) is described. The code is based on separation of the diffuse light field into anisotropic and smooth (regular) parts. The anisotropic part is computed analytically. The smooth regular part is computed numerically using the discrete ordinates method. Vertical stratification of the atmosphere, common types of bidirectional surface reflection and scattering by spherical particles or spheroids are included. A particular consideration is given to computation of the bidirectional polarization distribution function (BPDF) of the waved ocean surface.

  10. Hypercube matrix computation task

    NASA Technical Reports Server (NTRS)

    Calalo, Ruel H.; Imbriale, William A.; Jacobi, Nathan; Liewer, Paulett C.; Lockhart, Thomas G.; Lyzenga, Gregory A.; Lyons, James R.; Manshadi, Farzin; Patterson, Jean E.

    1988-01-01

    A major objective of the Hypercube Matrix Computation effort at the Jet Propulsion Laboratory (JPL) is to investigate the applicability of a parallel computing architecture to the solution of large-scale electromagnetic scattering problems. Three scattering analysis codes are being implemented and assessed on a JPL/California Institute of Technology (Caltech) Mark 3 Hypercube. The codes, which utilize different underlying algorithms, give a means of evaluating the general applicability of this parallel architecture. The three analysis codes being implemented are a frequency domain method of moments code, a time domain finite difference code, and a frequency domain finite elements code. These analysis capabilities are being integrated into an electromagnetics interactive analysis workstation which can serve as a design tool for the construction of antennas and other radiating or scattering structures. The first two years of work on the Hypercube Matrix Computation effort is summarized. It includes both new developments and results as well as work previously reported in the Hypercube Matrix Computation Task: Final Report for 1986 to 1987 (JPL Publication 87-18).

  11. Calculation of Water Drop Trajectories to and About Arbitrary Three-Dimensional Bodies in Potential Airflow

    NASA Technical Reports Server (NTRS)

    Norment, H. G.

    1980-01-01

    Calculations can be performed for any atmospheric conditions and for all water drop sizes, from the smallest cloud droplet to large raindrops. Any subsonic, external, non-lifting flow can be accommodated; flow into, but not through, inlets also can be simulated. Experimental water drop drag relations are used in the water drop equations of motion and effects of gravity settling are included. Seven codes are described: (1) a code used to debug and plot body surface description data; (2) a code that processes the body surface data to yield the potential flow field; (3) a code that computes flow velocities at arrays of points in space; (4) a code that computes water drop trajectories from an array of points in space; (5) a code that computes water drop trajectories and fluxes to arbitrary target points; (6) a code that computes water drop trajectories tangent to the body; and (7) a code that produces stereo pair plots which include both the body and trajectories. Code descriptions include operating instructions, card inputs and printouts for example problems, and listing of the FORTRAN codes. Accuracy of the calculations is discussed, and trajectory calculation results are compared with prior calculations and with experimental data.

  12. Utilizing GPUs to Accelerate Turbomachinery CFD Codes

    NASA Technical Reports Server (NTRS)

    MacCalla, Weylin; Kulkarni, Sameer

    2016-01-01

    GPU computing has established itself as a way to accelerate parallel codes in the high performance computing world. This work focuses on speeding up APNASA, a legacy CFD code used at NASA Glenn Research Center, while also drawing conclusions about the nature of GPU computing and the requirements to make GPGPU worthwhile on legacy codes. Rewriting and restructuring of the source code was avoided to limit the introduction of new bugs. The code was profiled and investigated for parallelization potential, then OpenACC directives were used to indicate parallel parts of the code. The use of OpenACC directives was not able to reduce the runtime of APNASA on either the NVIDIA Tesla discrete graphics card, or the AMD accelerated processing unit. Additionally, it was found that in order to justify the use of GPGPU, the amount of parallel work being done within a kernel would have to greatly exceed the work being done by any one portion of the APNASA code. It was determined that in order for an application like APNASA to be accelerated on the GPU, it should not be modular in nature, and the parallel portions of the code must contain a large portion of the code's computation time.

  13. PASCO: Structural panel analysis and sizing code: Users manual - Revised

    NASA Technical Reports Server (NTRS)

    Anderson, M. S.; Stroud, W. J.; Durling, B. J.; Hennessy, K. W.

    1981-01-01

    A computer code denoted PASCO is described for analyzing and sizing uniaxially stiffened composite panels. Buckling and vibration analyses are carried out with a linked plate analysis computer code denoted VIPASA, which is included in PASCO. Sizing is based on nonlinear mathematical programming techniques and employs a computer code denoted CONMIN, also included in PASCO. Design requirements considered are initial buckling, material strength, stiffness and vibration frequency. A user's manual for PASCO is presented.

  14. Computation of Reacting Flows in Combustion Processes

    NASA Technical Reports Server (NTRS)

    Keith, Theo G., Jr.; Chen, Kuo-Huey

    1997-01-01

    The main objective of this research was to develop an efficient three-dimensional computer code for chemically reacting flows. The main computer code developed is ALLSPD-3D. The ALLSPD-3D computer program is developed for the calculation of three-dimensional, chemically reacting flows with sprays. The ALL-SPD code employs a coupled, strongly implicit solution procedure for turbulent spray combustion flows. A stochastic droplet model and an efficient method for treatment of the spray source terms in the gas-phase equations are used to calculate the evaporating liquid sprays. The chemistry treatment in the code is general enough that an arbitrary number of reaction and species can be defined by the users. Also, it is written in generalized curvilinear coordinates with both multi-block and flexible internal blockage capabilities to handle complex geometries. In addition, for general industrial combustion applications, the code provides both dilution and transpiration cooling capabilities. The ALLSPD algorithm, which employs the preconditioning and eigenvalue rescaling techniques, is capable of providing efficient solution for flows with a wide range of Mach numbers. Although written for three-dimensional flows in general, the code can be used for two-dimensional and axisymmetric flow computations as well. The code is written in such a way that it can be run in various computer platforms (supercomputers, workstations and parallel processors) and the GUI (Graphical User Interface) should provide a user-friendly tool in setting up and running the code.

  15. NASA Rotor 37 CFD Code Validation: Glenn-HT Code

    NASA Technical Reports Server (NTRS)

    Ameri, Ali A.

    2010-01-01

    In order to advance the goals of NASA aeronautics programs, it is necessary to continuously evaluate and improve the computational tools used for research and design at NASA. One such code is the Glenn-HT code which is used at NASA Glenn Research Center (GRC) for turbomachinery computations. Although the code has been thoroughly validated for turbine heat transfer computations, it has not been utilized for compressors. In this work, Glenn-HT was used to compute the flow in a transonic compressor and comparisons were made to experimental data. The results presented here are in good agreement with this data. Most of the measures of performance are well within the measurement uncertainties and the exit profiles of interest agree with the experimental measurements.

  16. Final report for the Tera Computer TTI CRADA

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davidson, G.S.; Pavlakos, C.; Silva, C.

    1997-01-01

    Tera Computer and Sandia National Laboratories have completed a CRADA, which examined the Tera Multi-Threaded Architecture (MTA) for use with large codes of importance to industry and DOE. The MTA is an innovative architecture that uses parallelism to mask latency between memories and processors. The physical implementation is a parallel computer with high cross-section bandwidth and GaAs processors designed by Tera, which support many small computation threads and fast, lightweight context switches between them. When any thread blocks while waiting for memory accesses to complete, another thread immediately begins execution so that high CPU utilization is maintained. The Tera MTAmore » parallel computer has a single, global address space, which is appealing when porting existing applications to a parallel computer. This ease of porting is further enabled by compiler technology that helps break computations into parallel threads. DOE and Sandia National Laboratories were interested in working with Tera to further develop this computing concept. While Tera Computer would continue the hardware development and compiler research, Sandia National Laboratories would work with Tera to ensure that their compilers worked well with important Sandia codes, most particularly CTH, a shock physics code used for weapon safety computations. In addition to that important code, Sandia National Laboratories would complete research on a robotic path planning code, SANDROS, which is important in manufacturing applications, and would evaluate the MTA performance on this code. Finally, Sandia would work directly with Tera to develop 3D visualization codes, which would be appropriate for use with the MTA. Each of these tasks has been completed to the extent possible, given that Tera has just completed the MTA hardware. All of the CRADA work had to be done on simulators.« less

  17. Operations analysis (study 2.1). Program listing for the LOVES computer code

    NASA Technical Reports Server (NTRS)

    Wray, S. T., Jr.

    1974-01-01

    A listing of the LOVES computer program is presented. The program is coded partially in SIMSCRIPT and FORTRAN. This version of LOVES is compatible with both the CDC 7600 and the UNIVAC 1108 computers. The code has been compiled, loaded, and executed successfully on the EXEC 8 system for the UNIVAC 1108.

  18. Analysis of the Length of Braille Texts in English Braille American Edition, the Nemeth Code, and Computer Braille Code versus the Unified English Braille Code

    ERIC Educational Resources Information Center

    Knowlton, Marie; Wetzel, Robin

    2006-01-01

    This study compared the length of text in English Braille American Edition, the Nemeth code, and the computer braille code with the Unified English Braille Code (UEBC)--also known as Unified English Braille (UEB). The findings indicate that differences in the length of text are dependent on the type of material that is transcribed and the grade…

  19. A MATLAB based 3D modeling and inversion code for MT data

    NASA Astrophysics Data System (ADS)

    Singh, Arun; Dehiya, Rahul; Gupta, Pravin K.; Israil, M.

    2017-07-01

    The development of a MATLAB based computer code, AP3DMT, for modeling and inversion of 3D Magnetotelluric (MT) data is presented. The code comprises two independent components: grid generator code and modeling/inversion code. The grid generator code performs model discretization and acts as an interface by generating various I/O files. The inversion code performs core computations in modular form - forward modeling, data functionals, sensitivity computations and regularization. These modules can be readily extended to other similar inverse problems like Controlled-Source EM (CSEM). The modular structure of the code provides a framework useful for implementation of new applications and inversion algorithms. The use of MATLAB and its libraries makes it more compact and user friendly. The code has been validated on several published models. To demonstrate its versatility and capabilities the results of inversion for two complex models are presented.

  20. Unique Stealth Unmanned Aerial Vehicle (UAV) Houck Aircraft Design Program. Volume 2: Prototype Report

    DTIC Science & Technology

    2008-11-01

    Configuration ................................ 23 Figure 18: Wake at 15 MPH for AOA = 6, 20 degrees...27 Figure 19: Wake at 35 MPH for AOA = 6, 20 degrees ............................................................... 28 Figure 20: Wake ...several different manners beginning with alpha (angle of attack) sweeps, then Q (velocity) sweeps, and finally randomized testing. Solid and wake

  1. Detectability of high power aircraft

    NASA Astrophysics Data System (ADS)

    Dettmar, Klaus Uwe; Kruse, Juergen; Loebert, Gerhard

    1992-05-01

    In addition to the measures aiming at improving the probability of survival for an aircraft, including aircraft performance, flight profile selection, efficient electronic warfare equipment, and self protection weapons, it is shown that an efficient measure consists of reducing aircraft signature (radar, infrared, acoustic, visual) in connection with the use of signature avionics. The American 'stealth' aircrafts are described as examples.

  2. You Are Your Words: Modeling Students' Vocabulary Knowledge with Natural Language Processing Tools

    ERIC Educational Resources Information Center

    Allen, Laura K.; McNamara, Danielle S.

    2015-01-01

    The current study investigates the degree to which the lexical properties of students' essays can inform stealth assessments of their vocabulary knowledge. In particular, we used indices calculated with the natural language processing tool, TAALES, to predict students' performance on a measure of vocabulary knowledge. To this end, two corpora were…

  3. Crash Test Kids: Stealth Learning at Its Best

    ERIC Educational Resources Information Center

    Marshall, Kirk

    2011-01-01

    Building a human-powered flying craft can be much more complicated than one would first imagine. There are no "premade" plans available for this type of craft. In addition, the crafts needed to be built with some "style," or in other words, they should represent something other than a flying machine. The concept of launching a…

  4. Defense.gov Special Report: Travels With Hagel

    Science.gov Websites

    institution in ways that we've never had to." Story Hagel Discusses Transitions at Marine Corps Base Base Defense Secretary Chuck Hagel opened his final domestic trip with a stop at Whiteman Air Force Base, home of the 509th Bomb Wing -- the world's only B-2 Spirit stealth bomber unit, where he told

  5. Applications of automatic differentiation in computational fluid dynamics

    NASA Technical Reports Server (NTRS)

    Green, Lawrence L.; Carle, A.; Bischof, C.; Haigler, Kara J.; Newman, Perry A.

    1994-01-01

    Automatic differentiation (AD) is a powerful computational method that provides for computing exact sensitivity derivatives (SD) from existing computer programs for multidisciplinary design optimization (MDO) or in sensitivity analysis. A pre-compiler AD tool for FORTRAN programs called ADIFOR has been developed. The ADIFOR tool has been easily and quickly applied by NASA Langley researchers to assess the feasibility and computational impact of AD in MDO with several different FORTRAN programs. These include a state-of-the-art three dimensional multigrid Navier-Stokes flow solver for wings or aircraft configurations in transonic turbulent flow. With ADIFOR the user specifies sets of independent and dependent variables with an existing computer code. ADIFOR then traces the dependency path throughout the code, applies the chain rule to formulate derivative expressions, and generates new code to compute the required SD matrix. The resulting codes have been verified to compute exact non-geometric and geometric SD for a variety of cases. in less time than is required to compute the SD matrix using centered divided differences.

  6. Fundamentals, current state of the development of, and prospects for further improvement of the new-generation thermal-hydraulic computational HYDRA-IBRAE/LM code for simulation of fast reactor systems

    NASA Astrophysics Data System (ADS)

    Alipchenkov, V. M.; Anfimov, A. M.; Afremov, D. A.; Gorbunov, V. S.; Zeigarnik, Yu. A.; Kudryavtsev, A. V.; Osipov, S. L.; Mosunova, N. A.; Strizhov, V. F.; Usov, E. V.

    2016-02-01

    The conceptual fundamentals of the development of the new-generation system thermal-hydraulic computational HYDRA-IBRAE/LM code are presented. The code is intended to simulate the thermalhydraulic processes that take place in the loops and the heat-exchange equipment of liquid-metal cooled fast reactor systems under normal operation and anticipated operational occurrences and during accidents. The paper provides a brief overview of Russian and foreign system thermal-hydraulic codes for modeling liquid-metal coolants and gives grounds for the necessity of development of a new-generation HYDRA-IBRAE/LM code. Considering the specific engineering features of the nuclear power plants (NPPs) equipped with the BN-1200 and the BREST-OD-300 reactors, the processes and the phenomena are singled out that require a detailed analysis and development of the models to be correctly described by the system thermal-hydraulic code in question. Information on the functionality of the computational code is provided, viz., the thermalhydraulic two-phase model, the properties of the sodium and the lead coolants, the closing equations for simulation of the heat-mass exchange processes, the models to describe the processes that take place during the steam-generator tube rupture, etc. The article gives a brief overview of the usability of the computational code, including a description of the support documentation and the supply package, as well as possibilities of taking advantages of the modern computer technologies, such as parallel computations. The paper shows the current state of verification and validation of the computational code; it also presents information on the principles of constructing of and populating the verification matrices for the BREST-OD-300 and the BN-1200 reactor systems. The prospects are outlined for further development of the HYDRA-IBRAE/LM code, introduction of new models into it, and enhancement of its usability. It is shown that the program of development and practical application of the code will allow carrying out in the nearest future the computations to analyze the safety of potential NPP projects at a qualitatively higher level.

  7. Performance assessment of KORAT-3D on the ANL IBM-SP computer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alexeyev, A.V.; Zvenigorodskaya, O.A.; Shagaliev, R.M.

    1999-09-01

    The TENAR code is currently being developed at the Russian Federal Nuclear Center (VNIIEF) as a coupled dynamics code for the simulation of transients in VVER and RBMK systems and other nuclear systems. The neutronic module in this code system is KORAT-3D. This module is also one of the most computationally intensive components of the code system. A parallel version of KORAT-3D has been implemented to achieve the goal of obtaining transient solutions in reasonable computational time, particularly for RBMK calculations that involve the application of >100,000 nodes. An evaluation of the KORAT-3D code performance was recently undertaken on themore » Argonne National Laboratory (ANL) IBM ScalablePower (SP) parallel computer located in the Mathematics and Computer Science Division of ANL. At the time of the study, the ANL IBM-SP computer had 80 processors. This study was conducted under the auspices of a technical staff exchange program sponsored by the International Nuclear Safety Center (INSC).« less

  8. Profugus

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, Thomas; Hamilton, Steven; Slattery, Stuart

    Profugus is an open-source mini-application (mini-app) for radiation transport and reactor applications. It contains the fundamental computational kernels used in the Exnihilo code suite from Oak Ridge National Laboratory. However, Exnihilo is production code with a substantial user base. Furthermore, Exnihilo is export controlled. This makes collaboration with computer scientists and computer engineers difficult. Profugus is designed to bridge that gap. By encapsulating the core numerical algorithms in an abbreviated code base that is open-source, computer scientists can analyze the algorithms and easily make code-architectural changes to test performance without compromising the production code values of Exnihilo. Profugus is notmore » meant to be production software with respect to problem analysis. The computational kernels in Profugus are designed to analyze performance, not correctness. Nonetheless, users of Profugus can setup and run problems with enough real-world features to be useful as proof-of-concept for actual production work.« less

  9. Fast H.264/AVC FRExt intra coding using belief propagation.

    PubMed

    Milani, Simone

    2011-01-01

    In the H.264/AVC FRExt coder, the coding performance of Intra coding significantly overcomes the previous still image coding standards, like JPEG2000, thanks to a massive use of spatial prediction. Unfortunately, the adoption of an extensive set of predictors induces a significant increase of the computational complexity required by the rate-distortion optimization routine. The paper presents a complexity reduction strategy that aims at reducing the computational load of the Intra coding with a small loss in the compression performance. The proposed algorithm relies on selecting a reduced set of prediction modes according to their probabilities, which are estimated adopting a belief-propagation procedure. Experimental results show that the proposed method permits saving up to 60 % of the coding time required by an exhaustive rate-distortion optimization method with a negligible loss in performance. Moreover, it permits an accurate control of the computational complexity unlike other methods where the computational complexity depends upon the coded sequence.

  10. 2,445 Hours of Code: What I Learned from Facilitating Hour of Code Events in High School Libraries

    ERIC Educational Resources Information Center

    Colby, Jennifer

    2015-01-01

    This article describes a school librarian's experience with initiating an Hour of Code event for her school's student body. Hadi Partovi of Code.org conceived the Hour of Code "to get ten million students to try one hour of computer science" (Partovi, 2013a), which is implemented during Computer Science Education Week with a goal of…

  11. Numerical algorithm comparison for the accurate and efficient computation of high-incidence vortical flow

    NASA Technical Reports Server (NTRS)

    Chaderjian, Neal M.

    1991-01-01

    Computations from two Navier-Stokes codes, NSS and F3D, are presented for a tangent-ogive-cylinder body at high angle of attack. Features of this steady flow include a pair of primary vortices on the leeward side of the body as well as secondary vortices. The topological and physical plausibility of this vortical structure is discussed. The accuracy of these codes are assessed by comparison of the numerical solutions with experimental data. The effects of turbulence model, numerical dissipation, and grid refinement are presented. The overall efficiency of these codes are also assessed by examining their convergence rates, computational time per time step, and maximum allowable time step for time-accurate computations. Overall, the numerical results from both codes compared equally well with experimental data, however, the NSS code was found to be significantly more efficient than the F3D code.

  12. User's Manual for FEMOM3DR. Version 1.0

    NASA Technical Reports Server (NTRS)

    Reddy, C. J.

    1998-01-01

    FEMoM3DR is a computer code written in FORTRAN 77 to compute radiation characteristics of antennas on 3D body using combined Finite Element Method (FEM)/Method of Moments (MoM) technique. The code is written to handle different feeding structures like coaxial line, rectangular waveguide, and circular waveguide. This code uses the tetrahedral elements, with vector edge basis functions for FEM and triangular elements with roof-top basis functions for MoM. By virtue of FEM, this code can handle any arbitrary shaped three dimensional bodies with inhomogeneous lossy materials; and due to MoM the computational domain can be terminated in any arbitrary shape. The User's Manual is written to make the user acquainted with the operation of the code. The user is assumed to be familiar with the FORTRAN 77 language and the operating environment of the computers on which the code is intended to run.

  13. Selection of a computer code for Hanford low-level waste engineered-system performance assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McGrail, B.P.; Mahoney, L.A.

    Planned performance assessments for the proposed disposal of low-level waste (LLW) glass produced from remediation of wastes stored in underground tanks at Hanford, Washington will require calculations of radionuclide release rates from the subsurface disposal facility. These calculations will be done with the aid of computer codes. Currently available computer codes were ranked in terms of the feature sets implemented in the code that match a set of physical, chemical, numerical, and functional capabilities needed to assess release rates from the engineered system. The needed capabilities were identified from an analysis of the important physical and chemical process expected tomore » affect LLW glass corrosion and the mobility of radionuclides. The highest ranked computer code was found to be the ARES-CT code developed at PNL for the US Department of Energy for evaluation of and land disposal sites.« less

  14. User's manual for a material transport code on the Octopus Computer Network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Naymik, T.G.; Mendez, G.D.

    1978-09-15

    A code to simulate material transport through porous media was developed at Oak Ridge National Laboratory. This code has been modified and adapted for use at Lawrence Livermore Laboratory. This manual, in conjunction with report ORNL-4928, explains the input, output, and execution of the code on the Octopus Computer Network.

  15. Performance analysis of three dimensional integral equation computations on a massively parallel computer. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Logan, Terry G.

    1994-01-01

    The purpose of this study is to investigate the performance of the integral equation computations using numerical source field-panel method in a massively parallel processing (MPP) environment. A comparative study of computational performance of the MPP CM-5 computer and conventional Cray-YMP supercomputer for a three-dimensional flow problem is made. A serial FORTRAN code is converted into a parallel CM-FORTRAN code. Some performance results are obtained on CM-5 with 32, 62, 128 nodes along with those on Cray-YMP with a single processor. The comparison of the performance indicates that the parallel CM-FORTRAN code near or out-performs the equivalent serial FORTRAN code for some cases.

  16. Computer Description of the M561 Utility Truck

    DTIC Science & Technology

    1984-10-01

    GIFT Computer Code Sustainabi1ity Predictions for Army Spare Components Requirements for Combat (SPARC) 20. ABSTRACT (Caotfmia «a NWM eitim ft...used as input to the GIFT computer code to generate target vulnerability data. DO FORM V JAM 73 1473 EDITION OF I NOV 65 IS OBSOLETE Unclass i f ied...anaLyiis requires input from the Geometric Information for Targets ( GIFT ) ’ computer code. This report documents the combina- torial geometry (Com-Geom

  17. TEMPEST: A three-dimensional time-dependent computer program for hydrothermal analysis: Volume 2, Assessment and verification results

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eyler, L L; Trent, D S; Budden, M J

    During the course of the TEMPEST computer code development a concurrent effort was conducted to assess the code's performance and the validity of computed results. The results of this work are presented in this document. The principal objective of this effort was to assure the code's computational correctness for a wide range of hydrothermal phenomena typical of fast breeder reactor application. 47 refs., 94 figs., 6 tabs.

  18. The influence of commenting validity, placement, and style on perceptions of computer code trustworthiness: A heuristic-systematic processing approach.

    PubMed

    Alarcon, Gene M; Gamble, Rose F; Ryan, Tyler J; Walter, Charles; Jessup, Sarah A; Wood, David W; Capiola, August

    2018-07-01

    Computer programs are a ubiquitous part of modern society, yet little is known about the psychological processes that underlie reviewing code. We applied the heuristic-systematic model (HSM) to investigate the influence of computer code comments on perceptions of code trustworthiness. The study explored the influence of validity, placement, and style of comments in code on trustworthiness perceptions and time spent on code. Results indicated valid comments led to higher trust assessments and more time spent on the code. Properly placed comments led to lower trust assessments and had a marginal effect on time spent on code; however, the effect was no longer significant after controlling for effects of the source code. Low style comments led to marginally higher trustworthiness assessments, but high style comments led to longer time spent on the code. Several interactions were also found. Our findings suggest the relationship between code comments and perceptions of code trustworthiness is not as straightforward as previously thought. Additionally, the current paper extends the HSM to the programming literature. Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. Adiabatic topological quantum computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cesare, Chris; Landahl, Andrew J.; Bacon, Dave

    Topological quantum computing promises error-resistant quantum computation without active error correction. However, there is a worry that during the process of executing quantum gates by braiding anyons around each other, extra anyonic excitations will be created that will disorder the encoded quantum information. Here, we explore this question in detail by studying adiabatic code deformations on Hamiltonians based on topological codes, notably Kitaev’s surface codes and the more recently discovered color codes. We develop protocols that enable universal quantum computing by adiabatic evolution in a way that keeps the energy gap of the system constant with respect to the computationmore » size and introduces only simple local Hamiltonian interactions. This allows one to perform holonomic quantum computing with these topological quantum computing systems. The tools we develop allow one to go beyond numerical simulations and understand these processes analytically.« less

  20. Adiabatic topological quantum computing

    DOE PAGES

    Cesare, Chris; Landahl, Andrew J.; Bacon, Dave; ...

    2015-07-31

    Topological quantum computing promises error-resistant quantum computation without active error correction. However, there is a worry that during the process of executing quantum gates by braiding anyons around each other, extra anyonic excitations will be created that will disorder the encoded quantum information. Here, we explore this question in detail by studying adiabatic code deformations on Hamiltonians based on topological codes, notably Kitaev’s surface codes and the more recently discovered color codes. We develop protocols that enable universal quantum computing by adiabatic evolution in a way that keeps the energy gap of the system constant with respect to the computationmore » size and introduces only simple local Hamiltonian interactions. This allows one to perform holonomic quantum computing with these topological quantum computing systems. The tools we develop allow one to go beyond numerical simulations and understand these processes analytically.« less

  1. Fast Computation of the Two-Point Correlation Function in the Age of Big Data

    NASA Astrophysics Data System (ADS)

    Pellegrino, Andrew; Timlin, John

    2018-01-01

    We present a new code which quickly computes the two-point correlation function for large sets of astronomical data. This code combines the ease of use of Python with the speed of parallel shared libraries written in C. We include the capability to compute the auto- and cross-correlation statistics, and allow the user to calculate the three-dimensional and angular correlation functions. Additionally, the code automatically divides the user-provided sky masks into contiguous subsamples of similar size, using the HEALPix pixelization scheme, for the purpose of resampling. Errors are computed using jackknife and bootstrap resampling in a way that adds negligible extra runtime, even with many subsamples. We demonstrate comparable speed with other clustering codes, and code accuracy compared to known and analytic results.

  2. Design of convolutional tornado code

    NASA Astrophysics Data System (ADS)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  3. Three-dimensional turbopump flowfield analysis

    NASA Technical Reports Server (NTRS)

    Sharma, O. P.; Belford, K. A.; Ni, R. H.

    1992-01-01

    A program was conducted to develop a flow prediction method applicable to rocket turbopumps. The complex nature of a flowfield in turbopumps is described and examples of flowfields are discussed to illustrate that physics based models and analytical calculation procedures based on computational fluid dynamics (CFD) are needed to develop reliable design procedures for turbopumps. A CFD code developed at NASA ARC was used as the base code. The turbulence model and boundary conditions in the base code were modified, respectively, to: (1) compute transitional flows and account for extra rates of strain, e.g., rotation; and (2) compute surface heat transfer coefficients and allow computation through multistage turbomachines. Benchmark quality data from two and three-dimensional cascades were used to verify the code. The predictive capabilities of the present CFD code were demonstrated by computing the flow through a radial impeller and a multistage axial flow turbine. Results of the program indicate that the present code operated in a two-dimensional mode is a cost effective alternative to full three-dimensional calculations, and that it permits realistic predictions of unsteady loadings and losses for multistage machines.

  4. High altitude chemically reacting gas particle mixtures. Volume 3: Computer code user's and applications manual. [rocket nozzle and orbital plume flow fields

    NASA Technical Reports Server (NTRS)

    Smith, S. D.

    1984-01-01

    A users manual for the RAMP2 computer code is provided. The RAMP2 code can be used to model the dominant phenomena which affect the prediction of liquid and solid rocket nozzle and orbital plume flow fields. The general structure and operation of RAMP2 are discussed. A user input/output guide for the modified TRAN72 computer code and the RAMP2F code is given. The application and use of the BLIMPJ module are considered. Sample problems involving the space shuttle main engine and motor are included.

  5. Development of numerical methods for overset grids with applications for the integrated Space Shuttle vehicle

    NASA Technical Reports Server (NTRS)

    Chan, William M.

    1995-01-01

    Algorithms and computer code developments were performed for the overset grid approach to solving computational fluid dynamics problems. The techniques developed are applicable to compressible Navier-Stokes flow for any general complex configurations. The computer codes developed were tested on different complex configurations with the Space Shuttle launch vehicle configuration as the primary test bed. General, efficient and user-friendly codes were produced for grid generation, flow solution and force and moment computation.

  6. Research in Computational Aeroscience Applications Implemented on Advanced Parallel Computing Systems

    NASA Technical Reports Server (NTRS)

    Wigton, Larry

    1996-01-01

    Improving the numerical linear algebra routines for use in new Navier-Stokes codes, specifically Tim Barth's unstructured grid code, with spin-offs to TRANAIR is reported. A fast distance calculation routine for Navier-Stokes codes using the new one-equation turbulence models is written. The primary focus of this work was devoted to improving matrix-iterative methods. New algorithms have been developed which activate the full potential of classical Cray-class computers as well as distributed-memory parallel computers.

  7. ISSYS: An integrated synergistic Synthesis System

    NASA Technical Reports Server (NTRS)

    Dovi, A. R.

    1980-01-01

    Integrated Synergistic Synthesis System (ISSYS), an integrated system of computer codes in which the sequence of program execution and data flow is controlled by the user, is discussed. The commands available to exert such control, the ISSYS major function and rules, and the computer codes currently available in the system are described. Computational sequences frequently used in the aircraft structural analysis and synthesis are defined. External computer codes utilized by the ISSYS system are documented. A bibliography on the programs is included.

  8. User's manual for a two-dimensional, ground-water flow code on the Octopus computer network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Naymik, T.G.

    1978-08-30

    A ground-water hydrology computer code, programmed by R.L. Taylor (in Proc. American Society of Civil Engineers, Journal of Hydraulics Division, 93(HY2), pp. 25-33 (1967)), has been adapted to the Octopus computer system at Lawrence Livermore Laboratory. Using an example problem, this manual details the input, output, and execution options of the code.

  9. Interactive Synthesis of Code Level Security Rules

    DTIC Science & Technology

    2017-04-01

    Interactive Synthesis of Code-Level Security Rules A Thesis Presented by Leo St. Amour to The Department of Computer Science in partial fulfillment...of the requirements for the degree of Master of Science in Computer Science Northeastern University Boston, Massachusetts April 2017 DISTRIBUTION...Abstract of the Thesis Interactive Synthesis of Code-Level Security Rules by Leo St. Amour Master of Science in Computer Science Northeastern University

  10. Agricultural Spraying

    NASA Technical Reports Server (NTRS)

    1986-01-01

    AGDISP, a computer code written for Langley by Continuum Dynamics, Inc., aids crop dusting airplanes in targeting pesticides. The code is commercially available and can be run on a personal computer by an inexperienced operator. Called SWA+H, it is used by the Forest Service, FAA, DuPont, etc. DuPont uses the code to "test" equipment on the computer using a laser system to measure particle characteristics of various spray compounds.

  11. The adaption and use of research codes for performance assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liebetrau, A.M.

    1987-05-01

    Models of real-world phenomena are developed for many reasons. The models are usually, if not always, implemented in the form of a computer code. The characteristics of a code are determined largely by its intended use. Realizations or implementations of detailed mathematical models of complex physical and/or chemical processes are often referred to as research or scientific (RS) codes. Research codes typically require large amounts of computing time. One example of an RS code is a finite-element code for solving complex systems of differential equations that describe mass transfer through some geologic medium. Considerable computing time is required because computationsmore » are done at many points in time and/or space. Codes used to evaluate the overall performance of real-world physical systems are called performance assessment (PA) codes. Performance assessment codes are used to conduct simulated experiments involving systems that cannot be directly observed. Thus, PA codes usually involve repeated simulations of system performance in situations that preclude the use of conventional experimental and statistical methods. 3 figs.« less

  12. Topological color codes on Union Jack lattices: a stable implementation of the whole Clifford group

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Katzgraber, Helmut G.; Theoretische Physik, ETH Zurich, CH-8093 Zurich; Bombin, H.

    We study the error threshold of topological color codes on Union Jack lattices that allow for the full implementation of the whole Clifford group of quantum gates. After mapping the error-correction process onto a statistical mechanical random three-body Ising model on a Union Jack lattice, we compute its phase diagram in the temperature-disorder plane using Monte Carlo simulations. Surprisingly, topological color codes on Union Jack lattices have a similar error stability to color codes on triangular lattices, as well as to the Kitaev toric code. The enhanced computational capabilities of the topological color codes on Union Jack lattices with respectmore » to triangular lattices and the toric code combined with the inherent robustness of this implementation show good prospects for future stable quantum computer implementations.« less

  13. Accurate Modeling of Ionospheric Electromagnetic Fields Generated by a Low-Altitude VLF Transmitter

    DTIC Science & Technology

    2007-08-31

    latitude) for 3 different grid spacings. 14 8. Low-altitude fields produced by a 10-kHz source computed using the FD and TD codes. The agreement is...excellent, validating the new FD code. 16 9. High-altitude fields produced by a 10-kHz source computed using the FD and TD codes. The agreement is...again excellent. 17 10. Low-altitude fields produced by a 20-k.Hz source computed using the FD and TD codes. 17 11. High-altitude fields produced

  14. Naval Surface Warfare Center Carderock Division, Technical Digest

    DTIC Science & Technology

    2001-12-01

    Survivability Systems: An Overview Fred J. Fisch 139 Modeling and Simulation of Weapons Effects on Ships Robert R. Wunderlick 143 Intelligent Networks ...communications capability of forces afloat to support emerging network -centric warfare doc- trines. Stealth, for our next generation of warships...fully-inte- grated, fully- networked electronic countermeasures system, developed in parallel and in close coordination with sister systems. An

  15. Improving Product Performance Through New Equipment Training (NET) Techniques

    DTIC Science & Technology

    2008-12-01

    communication equipment with gloves, acquire targets while wearing helmet and protective eyewear , and stealth movement to contact the enemy and...to be utilized in the literature review. We found that the industry and academic information we retrieved was relevant and transferable to the...chapter summarized industry and academic research relevant to enhancing Marines abilities to better notice and correctly utilize Infantry Combat

  16. An aerial-hawking bat uses stealth echolocation to counter moth hearing.

    PubMed

    Goerlitz, Holger R; ter Hofstede, Hannah M; Zeale, Matt R K; Jones, Gareth; Holderied, Marc W

    2010-09-14

    Ears evolved in many nocturnal insects, including some moths, to detect bat echolocation calls and evade capture [1, 2]. Although there is evidence that some bats emit echolocation calls that are inconspicuous to eared moths, it is difficult to determine whether this was an adaptation to moth hearing or originally evolved for a different purpose [2, 3]. Aerial-hawking bats generally emit high-amplitude echolocation calls to maximize detection range [4, 5]. Here we present the first example of an echolocation counterstrategy to overcome prey hearing at the cost of reduced detection distance. We combined comparative bat flight-path tracking and moth neurophysiology with fecal DNA analysis to show that the barbastelle, Barbastella barbastellus, emits calls that are 10 to 100 times lower in amplitude than those of other aerial-hawking bats, remains undetected by moths until close, and captures mainly eared moths. Model calculations demonstrate that only bats emitting such low-amplitude calls hear moth echoes before their calls are conspicuous to moths. This stealth echolocation allows the barbastelle to exploit food resources that are difficult to catch for other aerial-hawking bats emitting calls of greater amplitude. Copyright © 2010 Elsevier Ltd. All rights reserved.

  17. RCS Diversity of Electromagnetic Wave Carrying Orbital Angular Momentum.

    PubMed

    Zhang, Chao; Chen, Dong; Jiang, Xuefeng

    2017-11-13

    An electromagnetic (EM) wave with orbital angular momentum (OAM) has a helical wave front, which is different from that of the plane wave. The phase gradient can be found perpendicular to the direction of propagation and proportional to the number of OAM modes. Herein, we study the backscattering property of the EM wave with different OAM modes, i.e., the radar cross section (RCS) of the target is measured and evaluated with different OAM waves. As indicated by the experimental results, different OAM waves have the same RCS fluctuation for the simple target, e.g., a small metal ball as the target. However, for complicated targets, e.g., two transverse-deployed small metal balls, different RCSs can be identified from the same incident angle. This valuable fact helps to obtain RCS diversity, e.g., equal gain or selective combining of different OAM wave scattering. The majority of the targets are complicated targets or expanded targets; the RCS diversity can be utilized to detect a weak target traditionally measured by the plane wave, which is very helpful for anti-stealth radar to detect the traditional stealth target by increasing the RCS with OAM waves.

  18. Re-Educating Jet-Engine-Researchers to Stay Relevant

    NASA Astrophysics Data System (ADS)

    Gal-Or, Benjamin

    2016-06-01

    To stay relevantly supported, jet-engine researchers, designers and operators should follow changing uses of small and large jet engines, especially those anticipated to be used by/in the next generation, JET-ENGINE-STEERED ("JES") fleets of jet drones but fewer, JES-Stealth-Fighter/Strike Aircraft. In addition, some diminishing returns from isolated, non-integrating, jet-engine component studies, vs. relevant, supersonic, shock waves control in fluidic-JES-side-effects on compressor stall dynamics within Integrated Propulsion Flight Control ("IPFC"), and/or mechanical JES, constitute key relevant methods that currently move to China, India, South Korea and Japan. The central roles of the jet engine as primary or backup flight controller also constitute key relevant issues, especially under post stall conditions involving induced engine-stress while participating in crash prevention or minimal path-time maneuvers to target. And when proper instructors are absent, self-study of the JES-STVS REVOLUTION is an updating must, where STVS stands for wing-engine-airframe-integrated, embedded stealthy-jet-engine-inlets, restructured engines inside Stealth, Tailless, canard-less, Thrust Vectoring IFPC Systems. Anti-terror and Airliners Super-Flight-Safety are anticipated to overcome US legislation red-tape that obstructs JES-add-on-emergency-kits-use.

  19. Buying time-the immune system determinants of the incubation period to respiratory viruses.

    PubMed

    Hermesh, Tamar; Moltedo, Bruno; López, Carolina B; Moran, Thomas M

    2010-11-01

    Respiratory viruses cause disease in humans characterized by an abrupt onset of symptoms. Studies in humans and animal models have shown that symptoms are not immediate and appear days or even weeks after infection. Since the initial symptoms are a manifestation of virus recognition by elements of the innate immune response, early virus replication must go largely undetected. The interval between infection and the emergence of symptoms is called the incubation period and is widely used as a clinical score. While incubation periods have been described for many virus infections the underlying mechanism for this asymptomatic phase has not been comprehensively documented. Here we review studies of the interaction between human pathogenic respiratory RNA viruses and the host with a particular emphasis on the mechanisms used by viruses to inhibit immunity. We discuss the concept of the "stealth phase", defined as the time between infection and the earliest detectable inflammatory response. We propose that the "stealth phase" phenomenon is primarily responsible for the suppression of symptoms during the incubation period and results from viral antagonism that inhibits major pathways of the innate immune system allowing an extended time of unhindered virus replication.

  20. Multidisciplinary High-Fidelity Analysis and Optimization of Aerospace Vehicles. Part 1; Formulation

    NASA Technical Reports Server (NTRS)

    Walsh, J. L.; Townsend, J. C.; Salas, A. O.; Samareh, J. A.; Mukhopadhyay, V.; Barthelemy, J.-F.

    2000-01-01

    An objective of the High Performance Computing and Communication Program at the NASA Langley Research Center is to demonstrate multidisciplinary shape and sizing optimization of a complete aerospace vehicle configuration by using high-fidelity, finite element structural analysis and computational fluid dynamics aerodynamic analysis in a distributed, heterogeneous computing environment that includes high performance parallel computing. A software system has been designed and implemented to integrate a set of existing discipline analysis codes, some of them computationally intensive, into a distributed computational environment for the design of a highspeed civil transport configuration. The paper describes the engineering aspects of formulating the optimization by integrating these analysis codes and associated interface codes into the system. The discipline codes are integrated by using the Java programming language and a Common Object Request Broker Architecture (CORBA) compliant software product. A companion paper presents currently available results.

  1. Analysis of airborne antenna systems using geometrical theory of diffraction and moment method computer codes

    NASA Technical Reports Server (NTRS)

    Hartenstein, Richard G., Jr.

    1985-01-01

    Computer codes have been developed to analyze antennas on aircraft and in the presence of scatterers. The purpose of this study is to use these codes to develop accurate computer models of various aircraft and antenna systems. The antenna systems analyzed are a P-3B L-Band antenna, an A-7E UHF relay pod antenna, and traffic advisory antenna system installed on a Bell Long Ranger helicopter. Computer results are compared to measured ones with good agreement. These codes can be used in the design stage of an antenna system to determine the optimum antenna location and save valuable time and costly flight hours.

  2. THC-MP: High performance numerical simulation of reactive transport and multiphase flow in porous media

    NASA Astrophysics Data System (ADS)

    Wei, Xiaohui; Li, Weishan; Tian, Hailong; Li, Hongliang; Xu, Haixiao; Xu, Tianfu

    2015-07-01

    The numerical simulation of multiphase flow and reactive transport in the porous media on complex subsurface problem is a computationally intensive application. To meet the increasingly computational requirements, this paper presents a parallel computing method and architecture. Derived from TOUGHREACT that is a well-established code for simulating subsurface multi-phase flow and reactive transport problems, we developed a high performance computing THC-MP based on massive parallel computer, which extends greatly on the computational capability for the original code. The domain decomposition method was applied to the coupled numerical computing procedure in the THC-MP. We designed the distributed data structure, implemented the data initialization and exchange between the computing nodes and the core solving module using the hybrid parallel iterative and direct solver. Numerical accuracy of the THC-MP was verified through a CO2 injection-induced reactive transport problem by comparing the results obtained from the parallel computing and sequential computing (original code). Execution efficiency and code scalability were examined through field scale carbon sequestration applications on the multicore cluster. The results demonstrate successfully the enhanced performance using the THC-MP on parallel computing facilities.

  3. Code of Ethical Conduct for Computer-Using Educators: An ICCE Policy Statement.

    ERIC Educational Resources Information Center

    Computing Teacher, 1987

    1987-01-01

    Prepared by the International Council for Computers in Education's Ethics and Equity Committee, this code of ethics for educators using computers covers nine main areas: curriculum issues, issues relating to computer access, privacy/confidentiality issues, teacher-related issues, student issues, the community, school organizational issues,…

  4. Embedding Secure Coding Instruction into the IDE: Complementing Early and Intermediate CS Courses with ESIDE

    ERIC Educational Resources Information Center

    Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler

    2018-01-01

    Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…

  5. Calculation of water drop trajectories to and about arbitrary three-dimensional lifting and nonlifting bodies in potential airflow

    NASA Technical Reports Server (NTRS)

    Norment, H. G.

    1985-01-01

    Subsonic, external flow about nonlifting bodies, lifting bodies or combinations of lifting and nonlifting bodies is calculated by a modified version of the Hess lifting code. Trajectory calculations can be performed for any atmospheric conditions and for all water drop sizes, from the smallest cloud droplet to large raindrops. Experimental water drop drag relations are used in the water drop equations of motion and effects of gravity settling are included. Inlet flow can be accommodated, and high Mach number compressibility effects are corrected for approximately. Seven codes are described: (1) a code used to debug and plot body surface description data; (2) a code that processes the body surface data to yield the potential flow field; (3) a code that computes flow velocities at arrays of points in space; (4) a code that computes water drop trajectories from an array of points in space; (5) a code that computes water drop trajectories and fluxes to arbitrary target points; (6) a code that computes water drop trajectories tangent to the body; and (7) a code that produces stereo pair plots which include both the body and trajectories. Accuracy of the calculations is discussed, and trajectory calculation results are compared with prior calculations and with experimental data.

  6. Debugging Techniques Used by Experienced Programmers to Debug Their Own Code.

    DTIC Science & Technology

    1990-09-01

    IS. NUMBER OF PAGES code debugging 62 computer programmers 16. PRICE CODE debug programming 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 119...Davis, and Schultz (1987) also compared experts and novices, but focused on the way a computer program is represented cognitively and how that...of theories in the emerging computer programming domain (Fisher, 1987). In protocol analysis, subjects are asked to talk/think aloud as they solve

  7. A COTS-Based Replacement Strategy for Aging Avionics Computers

    DTIC Science & Technology

    2001-12-01

    Communication Control Unit. A COTS-Based Replacement Strategy for Aging Avionics Computers COTS Microprocessor Real Time Operating System New Native Code...Native Code Objec ts Native Code Thread Real - Time Operating System Legacy Function x Virtual Component Environment Context Switch Thunk Add-in Replace

  8. PARAVT: Parallel Voronoi tessellation code

    NASA Astrophysics Data System (ADS)

    González, R. E.

    2016-10-01

    In this study, we present a new open source code for massive parallel computation of Voronoi tessellations (VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition takes into account consistent boundary computation between tasks, and includes periodic conditions. In addition, the code computes neighbors list, Voronoi density, Voronoi cell volume, density gradient for each particle, and densities on a regular grid. Code implementation and user guide are publicly available at https://github.com/regonzar/paravt.

  9. The STAGS computer code

    NASA Technical Reports Server (NTRS)

    Almroth, B. O.; Brogan, F. A.

    1978-01-01

    Basic information about the computer code STAGS (Structural Analysis of General Shells) is presented to describe to potential users the scope of the code and the solution procedures that are incorporated. Primarily, STAGS is intended for analysis of shell structures, although it has been extended to more complex shell configurations through the inclusion of springs and beam elements. The formulation is based on a variational approach in combination with local two dimensional power series representations of the displacement components. The computer code includes options for analysis of linear or nonlinear static stress, stability, vibrations, and transient response. Material as well as geometric nonlinearities are included. A few examples of applications of the code are presented for further illustration of its scope.

  10. Holonomic surface codes for fault-tolerant quantum computation

    NASA Astrophysics Data System (ADS)

    Zhang, Jiang; Devitt, Simon J.; You, J. Q.; Nori, Franco

    2018-02-01

    Surface codes can protect quantum information stored in qubits from local errors as long as the per-operation error rate is below a certain threshold. Here we propose holonomic surface codes by harnessing the quantum holonomy of the system. In our scheme, the holonomic gates are built via auxiliary qubits rather than the auxiliary levels in multilevel systems used in conventional holonomic quantum computation. The key advantage of our approach is that the auxiliary qubits are in their ground state before and after each gate operation, so they are not involved in the operation cycles of surface codes. This provides an advantageous way to implement surface codes for fault-tolerant quantum computation.

  11. Comparison of two- and three-dimensional flow computations with laser anemometer measurements in a transonic compressor rotor

    NASA Technical Reports Server (NTRS)

    Chima, R. V.; Strazisar, A. J.

    1982-01-01

    Two and three dimensional inviscid solutions for the flow in a transonic axial compressor rotor at design speed are compared with probe and laser anemometers measurements at near-stall and maximum-flow operating points. Experimental details of the laser anemometer system and computational details of the two dimensional axisymmetric code and three dimensional Euler code are described. Comparisons are made between relative Mach number and flow angle contours, shock location, and shock strength. A procedure for using an efficient axisymmetric code to generate downstream pressure input for computationally expensive Euler codes is discussed. A film supplement shows the calculations of the two operating points with the time-marching Euler code.

  12. Development of MCNPX-ESUT computer code for simulation of neutron/gamma pulse height distribution

    NASA Astrophysics Data System (ADS)

    Abolfazl Hosseini, Seyed; Vosoughi, Naser; Zangian, Mehdi

    2015-05-01

    In this paper, the development of the MCNPX-ESUT (MCNPX-Energy Engineering of Sharif University of Technology) computer code for simulation of neutron/gamma pulse height distribution is reported. Since liquid organic scintillators like NE-213 are well suited and routinely used for spectrometry in mixed neutron/gamma fields, this type of detectors is selected for simulation in the present study. The proposed algorithm for simulation includes four main steps. The first step is the modeling of the neutron/gamma particle transport and their interactions with the materials in the environment and detector volume. In the second step, the number of scintillation photons due to charged particles such as electrons, alphas, protons and carbon nuclei in the scintillator material is calculated. In the third step, the transport of scintillation photons in the scintillator and lightguide is simulated. Finally, the resolution corresponding to the experiment is considered in the last step of the simulation. Unlike the similar computer codes like SCINFUL, NRESP7 and PHRESP, the developed computer code is applicable to both neutron and gamma sources. Hence, the discrimination of neutron and gamma in the mixed fields may be performed using the MCNPX-ESUT computer code. The main feature of MCNPX-ESUT computer code is that the neutron/gamma pulse height simulation may be performed without needing any sort of post processing. In the present study, the pulse height distributions due to a monoenergetic neutron/gamma source in NE-213 detector using MCNPX-ESUT computer code is simulated. The simulated neutron pulse height distributions are validated through comparing with experimental data (Gohil et al. Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, 664 (2012) 304-309.) and the results obtained from similar computer codes like SCINFUL, NRESP7 and Geant4. The simulated gamma pulse height distribution for a 137Cs source is also compared with the experimental data.

  13. EAC: A program for the error analysis of STAGS results for plates

    NASA Technical Reports Server (NTRS)

    Sistla, Rajaram; Thurston, Gaylen A.; Bains, Nancy Jane C.

    1989-01-01

    A computer code is now available for estimating the error in results from the STAGS finite element code for a shell unit consisting of a rectangular orthotropic plate. This memorandum contains basic information about the computer code EAC (Error Analysis and Correction) and describes the connection between the input data for the STAGS shell units and the input data necessary to run the error analysis code. The STAGS code returns a set of nodal displacements and a discrete set of stress resultants; the EAC code returns a continuous solution for displacements and stress resultants. The continuous solution is defined by a set of generalized coordinates computed in EAC. The theory and the assumptions that determine the continuous solution are also outlined in this memorandum. An example of application of the code is presented and instructions on its usage on the Cyber and the VAX machines have been provided.

  14. CFD Modeling of Free-Piston Stirling Engines

    NASA Technical Reports Server (NTRS)

    Ibrahim, Mounir B.; Zhang, Zhi-Guo; Tew, Roy C., Jr.; Gedeon, David; Simon, Terrence W.

    2001-01-01

    NASA Glenn Research Center (GRC) is funding Cleveland State University (CSU) to develop a reliable Computational Fluid Dynamics (CFD) code that can predict engine performance with the goal of significant improvements in accuracy when compared to one-dimensional (1-D) design code predictions. The funding also includes conducting code validation experiments at both the University of Minnesota (UMN) and CSU. In this paper a brief description of the work-in-progress is provided in the two areas (CFD and Experiments). Also, previous test results are compared with computational data obtained using (1) a 2-D CFD code obtained from Dr. Georg Scheuerer and further developed at CSU and (2) a multidimensional commercial code CFD-ACE+. The test data and computational results are for (1) a gas spring and (2) a single piston/cylinder with attached annular heat exchanger. The comparisons among the codes are discussed. The paper also discusses plans for conducting code validation experiments at CSU and UMN.

  15. On the error statistics of Viterbi decoding and the performance of concatenated codes

    NASA Technical Reports Server (NTRS)

    Miller, R. L.; Deutsch, L. J.; Butman, S. A.

    1981-01-01

    Computer simulation results are presented on the performance of convolutional codes of constraint lengths 7 and 10 concatenated with the (255, 223) Reed-Solomon code (a proposed NASA standard). These results indicate that as much as 0.8 dB can be gained by concatenating this Reed-Solomon code with a (10, 1/3) convolutional code, instead of the (7, 1/2) code currently used by the DSN. A mathematical model of Viterbi decoder burst-error statistics is developed and is validated through additional computer simulations.

  16. New double-byte error-correcting codes for memory systems

    NASA Technical Reports Server (NTRS)

    Feng, Gui-Liang; Wu, Xinen; Rao, T. R. N.

    1996-01-01

    Error-correcting or error-detecting codes have been used in the computer industry to increase reliability, reduce service costs, and maintain data integrity. The single-byte error-correcting and double-byte error-detecting (SbEC-DbED) codes have been successfully used in computer memory subsystems. There are many methods to construct double-byte error-correcting (DBEC) codes. In the present paper we construct a class of double-byte error-correcting codes, which are more efficient than those known to be optimum, and a decoding procedure for our codes is also considered.

  17. SOURCELESS STARTUP. A MACHINE CODE FOR COMPUTING LOW-SOURCE REACTOR STARTUPS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacMillan, D.B.

    1960-06-01

    >A revision to the sourceless start-up code is presented. The code solves a system of differential equations encountered in computing the probability distribution of activity at an observed power level during reactor start-up from a very low source level. (J.R.D.)

  18. Computer-assisted coding and clinical documentation: first things first.

    PubMed

    Tully, Melinda; Carmichael, Angela

    2012-10-01

    Computer-assisted coding tools have the potential to drive improvements in seven areas: Transparency of coding. Productivity (generally by 20 to 25 percent for inpatient claims). Accuracy (by improving specificity of documentation). Cost containment (by reducing overtime expenses, audit fees, and denials). Compliance. Efficiency. Consistency.

  19. Minehunting sonar system research and development

    NASA Astrophysics Data System (ADS)

    Ferguson, Brian

    2002-05-01

    Sea mines have the potential to threaten the freedom of the seas by disrupting maritime trade and restricting the freedom of maneuver of navies. The acoustic detection, localization, and classification of sea mines involves a sequence of operations starting with the transmission of a sonar pulse and ending with an operator interpreting the information on a sonar display. A recent improvement to the process stems from the application of neural networks to the computed aided detection of sea mines. The advent of ultrawideband sonar transducers together with pulse compression techniques offers a thousandfold increase in the bandwidth-time product of conventional minehunting sonar transmissions enabling stealth mines to be detected at longer ranges. These wideband signals also enable mines to be imaged at safe standoff distances by applying tomographic image reconstruction techniques. The coupling of wideband transducer technology with synthetic aperture processing enhances the resolution of side scan sonars in both the cross-track and along-track directions. The principles on which conventional and advanced minehunting sonars are based are reviewed and the results of applying novel sonar signal processing algorithms to high-frequency sonar data collected in Australian waters are presented.

  20. Developing and evaluating a target-background similarity metric for camouflage detection.

    PubMed

    Lin, Chiuhsiang Joe; Chang, Chi-Chan; Liu, Bor-Shong

    2014-01-01

    Measurement of camouflage performance is of fundamental importance for military stealth applications. The goal of camouflage assessment algorithms is to automatically assess the effect of camouflage in agreement with human detection responses. In a previous study, we found that the Universal Image Quality Index (UIQI) correlated well with the psychophysical measures, and it could be a potentially camouflage assessment tool. In this study, we want to quantify the camouflage similarity index and psychophysical results. We compare several image quality indexes for computational evaluation of camouflage effectiveness, and present the results of an extensive human visual experiment conducted to evaluate the performance of several camouflage assessment algorithms and analyze the strengths and weaknesses of these algorithms. The experimental data demonstrates the effectiveness of the approach, and the correlation coefficient result of the UIQI was higher than those of other methods. This approach was highly correlated with the human target-searching results. It also showed that this method is an objective and effective camouflage performance evaluation method because it considers the human visual system and image structure, which makes it consistent with the subjective evaluation results.

  1. Hypercube matrix computation task

    NASA Technical Reports Server (NTRS)

    Calalo, R.; Imbriale, W.; Liewer, P.; Lyons, J.; Manshadi, F.; Patterson, J.

    1987-01-01

    The Hypercube Matrix Computation (Year 1986-1987) task investigated the applicability of a parallel computing architecture to the solution of large scale electromagnetic scattering problems. Two existing electromagnetic scattering codes were selected for conversion to the Mark III Hypercube concurrent computing environment. They were selected so that the underlying numerical algorithms utilized would be different thereby providing a more thorough evaluation of the appropriateness of the parallel environment for these types of problems. The first code was a frequency domain method of moments solution, NEC-2, developed at Lawrence Livermore National Laboratory. The second code was a time domain finite difference solution of Maxwell's equations to solve for the scattered fields. Once the codes were implemented on the hypercube and verified to obtain correct solutions by comparing the results with those from sequential runs, several measures were used to evaluate the performance of the two codes. First, a comparison was provided of the problem size possible on the hypercube with 128 megabytes of memory for a 32-node configuration with that available in a typical sequential user environment of 4 to 8 megabytes. Then, the performance of the codes was anlyzed for the computational speedup attained by the parallel architecture.

  2. Bistatic radar cross section of a perfectly conducting rhombus-shaped flat plate

    NASA Astrophysics Data System (ADS)

    Fenn, Alan J.

    1990-05-01

    The bistatic radar cross section of a perfectly conducting flat plate that has a rhombus shape (equilateral parallelogram) is investigated. The Ohio State University electromagnetic surface patch code (ESP version 4) is used to compute the theoretical bistatic radar cross section of a 35- x 27-in rhombus plate at 1.3 GHz over the bistatic angles 15 deg to 142 deg. The ESP-4 computer code is a method of moments FORTRAN-77 program which can analyze general configurations of plates and wires. This code has been installed and modified at Lincoln Laboratory on a SUN 3 computer network. Details of the code modifications are described. Comparisons of the method of moments simulations and measurements of the rhombus plate are made. It is shown that the ESP-4 computer code provides a high degree of accuracy in the calculation of copolarized and cross-polarized bistatic radar cross section patterns.

  3. ASR4: A computer code for fitting and processing 4-gage anelastic strain recovery data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warpinski, N.R.

    A computer code for analyzing four-gage Anelastic Strain Recovery (ASR) data has been modified for use on a personal computer. This code fits the viscoelastic model of Warpinski and Teufel to measured ASR data, calculates the stress orientation directly, and computes stress magnitudes if sufficient input data are available. The code also calculates the stress orientation using strain-rosette equations, and its calculates stress magnitudes using Blanton's approach, assuming sufficient input data are available. The program is written in FORTRAN, compiled with Ryan-McFarland Version 2.4. Graphics use PLOT88 software by Plotworks, Inc., but the graphics software must be obtained by themore » user because of licensing restrictions. A version without graphics can also be run. This code is available through the National Energy Software Center (NESC), operated by Argonne National Laboratory. 5 refs., 3 figs.« less

  4. Navier-Stokes Simulation of Homogeneous Turbulence on the CYBER 205

    NASA Technical Reports Server (NTRS)

    Wu, C. T.; Ferziger, J. H.; Chapman, D. R.; Rogallo, R. S.

    1984-01-01

    A computer code which solves the Navier-Stokes equations for three dimensional, time-dependent, homogenous turbulence has been written for the CYBER 205. The code has options for both 64-bit and 32-bit arithmetic. With 32-bit computation, mesh sizes up to 64 (3) are contained within core of a 2 million 64-bit word memory. Computer speed timing runs were made for various vector lengths up to 6144. With this code, speeds a little over 100 Mflops have been achieved on a 2-pipe CYBER 205. Several problems encountered in the coding are discussed.

  5. The investigation of tethered satellite system dynamics

    NASA Technical Reports Server (NTRS)

    Lorenzini, E.

    1985-01-01

    The tether control law to retrieve the satellite was modified in order to have a smooth retrieval trajectory of the satellite that minimizes the thruster activation. The satellite thrusters were added to the rotational dynamics computer code and a preliminary control logic was implemented to simulate them during the retrieval maneuver. The high resolution computer code for modelling the three dimensional dynamics of untensioned tether, SLACK3, was made fully operative and a set of computer simulations of possible tether breakages was run. The distribution of the electric field around an electrodynamic tether in vacuo severed at some length from the shuttle was computed with a three dimensional electrodynamic computer code.

  6. Experimental and computational surface and flow-field results for an all-body hypersonic aircraft

    NASA Technical Reports Server (NTRS)

    Lockman, William K.; Lawrence, Scott L.; Cleary, Joseph W.

    1990-01-01

    The objective of the present investigation is to establish a benchmark experimental data base for a generic hypersonic vehicle shape for validation and/or calibration of advanced computational fluid dynamics computer codes. This paper includes results from the comprehensive test program conducted in the NASA/Ames 3.5-foot Hypersonic Wind Tunnel for a generic all-body hypersonic aircraft model. Experimental and computational results on flow visualization, surface pressures, surface convective heat transfer, and pitot-pressure flow-field surveys are presented. Comparisons of the experimental results with computational results from an upwind parabolized Navier-Stokes code developed at Ames demonstrate the capabilities of this code.

  7. Computer search for binary cyclic UEP codes of odd length up to 65

    NASA Technical Reports Server (NTRS)

    Lin, Mao-Chao; Lin, Chi-Chang; Lin, Shu

    1990-01-01

    Using an exhaustive computation, the unequal error protection capabilities of all binary cyclic codes of odd length up to 65 that have minimum distances at least 3 are found. For those codes that can only have upper bounds on their unequal error protection capabilities computed, an analytic method developed by Dynkin and Togonidze (1976) is used to show that the upper bounds meet the exact unequal error protection capabilities.

  8. A Combinatorial Geometry Computer Description of the MEP-021A Generator Set

    DTIC Science & Technology

    1979-02-01

    Generator Computer Description Gasoline Generator GIFT MEP-021A 20. ABSTRACT fCbntteu* an rararaa eta* ft namamwaay anal Identify by block number) This... GIFT code is also stored on magnetic tape for future vulnerability analysis. 00,] 󈧚*7,1473 EDITION OF • NOV 65 IS OBSOLETE UNCLASSIFIED SECURITY...the Geometric Information for Targets ( GIFT ) computer code. The GIFT code traces shotlines through a COM-GEOM description from any specified attack

  9. Optimizing a liquid propellant rocket engine with an automated combustor design code (AUTOCOM)

    NASA Technical Reports Server (NTRS)

    Hague, D. S.; Reichel, R. H.; Jones, R. T.; Glatt, C. R.

    1972-01-01

    A procedure for automatically designing a liquid propellant rocket engine combustion chamber in an optimal fashion is outlined. The procedure is contained in a digital computer code, AUTOCOM. The code is applied to an existing engine, and design modifications are generated which provide a substantial potential payload improvement over the existing design. Computer time requirements for this payload improvement were small, approximately four minutes in the CDC 6600 computer.

  10. Unaligned instruction relocation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bertolli, Carlo; O'Brien, John K.; Sallenave, Olivier H.

    In one embodiment, a computer-implemented method includes receiving source code to be compiled into an executable file for an unaligned instruction set architecture (ISA). Aligned assembled code is generated, by a computer processor. The aligned assembled code complies with an aligned ISA and includes aligned processor code for a processor and aligned accelerator code for an accelerator. A first linking pass is performed on the aligned assembled code, including relocating a first relocation target in the aligned accelerator code that refers to a first object outside the aligned accelerator code. Unaligned assembled code is generated in accordance with the unalignedmore » ISA and includes unaligned accelerator code for the accelerator and unaligned processor code for the processor. A second linking pass is performed on the unaligned assembled code, including relocating a second relocation target outside the unaligned accelerator code that refers to an object in the unaligned accelerator code.« less

  11. Unaligned instruction relocation

    DOEpatents

    Bertolli, Carlo; O'Brien, John K.; Sallenave, Olivier H.; Sura, Zehra N.

    2018-01-23

    In one embodiment, a computer-implemented method includes receiving source code to be compiled into an executable file for an unaligned instruction set architecture (ISA). Aligned assembled code is generated, by a computer processor. The aligned assembled code complies with an aligned ISA and includes aligned processor code for a processor and aligned accelerator code for an accelerator. A first linking pass is performed on the aligned assembled code, including relocating a first relocation target in the aligned accelerator code that refers to a first object outside the aligned accelerator code. Unaligned assembled code is generated in accordance with the unaligned ISA and includes unaligned accelerator code for the accelerator and unaligned processor code for the processor. A second linking pass is performed on the unaligned assembled code, including relocating a second relocation target outside the unaligned accelerator code that refers to an object in the unaligned accelerator code.

  12. Computer algorithm for coding gain

    NASA Technical Reports Server (NTRS)

    Dodd, E. E.

    1974-01-01

    Development of a computer algorithm for coding gain for use in an automated communications link design system. Using an empirical formula which defines coding gain as used in space communications engineering, an algorithm is constructed on the basis of available performance data for nonsystematic convolutional encoding with soft-decision (eight-level) Viterbi decoding.

  13. Australia’s Submarine Design Capabilities and Capacities: Challenges and Options for the Future Submarine

    DTIC Science & Technology

    2011-01-01

    stealth features requiring specialised noise and vibra- tion skills and propulsion plants requiring other unique skill sets. Personnel with these...analysis Acoustic, wake , thermal, electromagnetic, and other signature analysis Combat systems and ship control Combat system integration, combat system...to-diagnose flow-induced radiated noise Own-sensor performance degradation Note: Risks can be reduced for given designs using scale models

  14. State Actor Threats in 2025

    DTIC Science & Technology

    2007-04-01

    not target tracking (Richardson, Stealth Warplanes, 175.). 51 David A. Fulghum, "New Radars Peel Veil from Hidden Targets," Aviation Week & Space...without meeting any resistance. The world banana population is currently facing such a crisis; bananas are essentially genetic copies of one another...and currently a virus is spreading worldwide, threatening to make the banana , as we know it, extinct.10 In a similar manner, forcing all the

  15. The Stealth Inequities of School Funding: How State and Local School Finance Systems Perpetuate Inequitable Student Spending

    ERIC Educational Resources Information Center

    Baker, Bruce D.; Corcoran, Sean P.

    2012-01-01

    In the education world, the existence of funding inequities has long been a known fact, but the sources of these inequities have not always been obvious. Typically, local property tax variation has been blamed as the sole, or at least primary, cause of inequalities and called for greater state funding as the solution. In practice, however, it is…

  16. Performance Characterization of Polyimide-Carbon Fiber Composites for Future Hypersonic Vehicles

    DTIC Science & Technology

    2010-08-01

    already being processed for leading edge primary structures and engine components for present and future stealth aircraft. In addition to describing our...The form of entry is the last name, first name, middle initial, and additional qualifiers separated by commas, e.g. Smith, Richard, Jr. 7...availability or distribution limitations of the report. If additional limitations/restrictions or special markings are indicated, follow agency

  17. Perspective: The Stealth of Implicit Bias in Chemical Engineering Education, Its Threat to Diversity, and What Professors Can Do to Promote an Inclusive Future

    ERIC Educational Resources Information Center

    Farrell, Stephanie; Minerick, Adrienne R.

    2018-01-01

    Many educators hold fairness and egalitarianism as core values that they strive to uphold in their professional work and personal lives, and they hope that they evaluate and support students based strictly on student potential and achievement. However, everyone holds unconscious beliefs about social and identity groups. This implicit (unconscious)…

  18. Neuroprotection and Anti-Epileptogenesis with Mitochondria-Targeted Antioxidant

    DTIC Science & Technology

    2016-06-01

    antioxidant, SS-31 in the pilocarpine (PILO) model of status epilepticus (SE), the kindling seizure model and the tetanus toxin (Tx) model of epilepsy...neuroprotective and antiepileptogenic agent in three experimental models of epilepsy. The pilocarpine-induced model of status epilepticus (PILO) was...neuroprotection, seizures, status epilepticus OVERALL PROJECT SUMMARY: SS-31 was created by Dr. Szeto but the rights to the drug are controlled by Stealth

  19. Innovative Strategic Aircraft Design Study (ISADS) Phase 1

    DTIC Science & Technology

    1978-06-01

    will be be applicable to virtually all high-technology aircraft. TECHNICAL APPROACH (U) Required research for the implementation of active controls is...Applicable technologies were assessed In areas of aerodynamics, propulsion, struictures, controls , and stealth, and were found to offer up to SO...15 Nonplanar Wings Variable Camber 17 Laminar Flow 17 Jet Flaps 18 Wing Boundary Layer Control 19 Ground Effect 20 Aeroelastic Tailoring 20 Propulsion

  20. On the Use of Statistics in Design and the Implications for Deterministic Computer Experiments

    NASA Technical Reports Server (NTRS)

    Simpson, Timothy W.; Peplinski, Jesse; Koch, Patrick N.; Allen, Janet K.

    1997-01-01

    Perhaps the most prevalent use of statistics in engineering design is through Taguchi's parameter and robust design -- using orthogonal arrays to compute signal-to-noise ratios in a process of design improvement. In our view, however, there is an equally exciting use of statistics in design that could become just as prevalent: it is the concept of metamodeling whereby statistical models are built to approximate detailed computer analysis codes. Although computers continue to get faster, analysis codes always seem to keep pace so that their computational time remains non-trivial. Through metamodeling, approximations of these codes are built that are orders of magnitude cheaper to run. These metamodels can then be linked to optimization routines for fast analysis, or they can serve as a bridge for integrating analysis codes across different domains. In this paper we first review metamodeling techniques that encompass design of experiments, response surface methodology, Taguchi methods, neural networks, inductive learning, and kriging. We discuss their existing applications in engineering design and then address the dangers of applying traditional statistical techniques to approximate deterministic computer analysis codes. We conclude with recommendations for the appropriate use of metamodeling techniques in given situations and how common pitfalls can be avoided.

  1. Design and optimization of a portable LQCD Monte Carlo code using OpenACC

    NASA Astrophysics Data System (ADS)

    Bonati, Claudio; Coscetti, Simone; D'Elia, Massimo; Mesiti, Michele; Negro, Francesco; Calore, Enrico; Schifano, Sebastiano Fabio; Silvi, Giorgio; Tripiccione, Raffaele

    The present panorama of HPC architectures is extremely heterogeneous, ranging from traditional multi-core CPU processors, supporting a wide class of applications but delivering moderate computing performance, to many-core Graphics Processor Units (GPUs), exploiting aggressive data-parallelism and delivering higher performances for streaming computing applications. In this scenario, code portability (and performance portability) become necessary for easy maintainability of applications; this is very relevant in scientific computing where code changes are very frequent, making it tedious and prone to error to keep different code versions aligned. In this work, we present the design and optimization of a state-of-the-art production-level LQCD Monte Carlo application, using the directive-based OpenACC programming model. OpenACC abstracts parallel programming to a descriptive level, relieving programmers from specifying how codes should be mapped onto the target architecture. We describe the implementation of a code fully written in OpenAcc, and show that we are able to target several different architectures, including state-of-the-art traditional CPUs and GPUs, with the same code. We also measure performance, evaluating the computing efficiency of our OpenACC code on several architectures, comparing with GPU-specific implementations and showing that a good level of performance-portability can be reached.

  2. Development of a thermal and structural analysis procedure for cooled radial turbines

    NASA Technical Reports Server (NTRS)

    Kumar, Ganesh N.; Deanna, Russell G.

    1988-01-01

    A procedure for computing the rotor temperature and stress distributions in a cooled radial turbine is considered. Existing codes for modeling the external mainstream flow and the internal cooling flow are used to compute boundary conditions for the heat transfer and stress analyses. An inviscid, quasi three-dimensional code computes the external free stream velocity. The external velocity is then used in a boundary layer analysis to compute the external heat transfer coefficients. Coolant temperatures are computed by a viscous one-dimensional internal flow code for the momentum and energy equation. These boundary conditions are input to a three-dimensional heat conduction code for calculation of rotor temperatures. The rotor stress distribution may be determined for the given thermal, pressure and centrifugal loading. The procedure is applied to a cooled radial turbine which will be tested at the NASA Lewis Research Center. Representative results from this case are included.

  3. COMPUTATION OF GLOBAL PHOTOCHEMISTRY WITH SMVGEAR II (R823186)

    EPA Science Inventory

    A computer model was developed to simulate global gas-phase photochemistry. The model solves chemical equations with SMVGEAR II, a sparse-matrix, vectorized Gear-type code. To obtain SMVGEAR II, the original SMVGEAR code was modified to allow computation of different sets of chem...

  4. Computational strategies for three-dimensional flow simulations on distributed computer systems. Ph.D. Thesis Semiannual Status Report, 15 Aug. 1993 - 15 Feb. 1994

    NASA Technical Reports Server (NTRS)

    Weed, Richard Allen; Sankar, L. N.

    1994-01-01

    An increasing amount of research activity in computational fluid dynamics has been devoted to the development of efficient algorithms for parallel computing systems. The increasing performance to price ratio of engineering workstations has led to research to development procedures for implementing a parallel computing system composed of distributed workstations. This thesis proposal outlines an ongoing research program to develop efficient strategies for performing three-dimensional flow analysis on distributed computing systems. The PVM parallel programming interface was used to modify an existing three-dimensional flow solver, the TEAM code developed by Lockheed for the Air Force, to function as a parallel flow solver on clusters of workstations. Steady flow solutions were generated for three different wing and body geometries to validate the code and evaluate code performance. The proposed research will extend the parallel code development to determine the most efficient strategies for unsteady flow simulations.

  5. Computerized systems analysis and optimization of aircraft engine performance, weight, and life cycle costs

    NASA Technical Reports Server (NTRS)

    Fishbach, L. H.

    1979-01-01

    The computational techniques utilized to determine the optimum propulsion systems for future aircraft applications and to identify system tradeoffs and technology requirements are described. The characteristics and use of the following computer codes are discussed: (1) NNEP - a very general cycle analysis code that can assemble an arbitrary matrix fans, turbines, ducts, shafts, etc., into a complete gas turbine engine and compute on- and off-design thermodynamic performance; (2) WATE - a preliminary design procedure for calculating engine weight using the component characteristics determined by NNEP; (3) POD DRG - a table look-up program to calculate wave and friction drag of nacelles; (4) LIFCYC - a computer code developed to calculate life cycle costs of engines based on the output from WATE; and (5) INSTAL - a computer code developed to calculate installation effects, inlet performance and inlet weight. Examples are given to illustrate how these computer techniques can be applied to analyze and optimize propulsion system fuel consumption, weight, and cost for representative types of aircraft and missions.

  6. A Combinatorial Geometry Computer Description of the M9 ACE (Armored Combat Earthmover) Vehicle

    DTIC Science & Technology

    1984-12-01

    program requires as input the M9 target descriptions as processed by the Geometric Information for Targets ( GIFT ) ’ computer code. The first step is...model of the target. This COM-GEOM target description is used as input to the Geometric Information For Targets ( GIFT ) computer code. Among other...things, the GIFT code traces shotlines through a COM-GEOM description from any specified aspect, listing pertinent information about each component hit

  7. Characterizing the Properties of a Woven SiC/SiC Composite Using W-CEMCAN Computer Code

    NASA Technical Reports Server (NTRS)

    Murthy, Pappu L. N.; Mital, Subodh K.; DiCarlo, James A.

    1999-01-01

    A micromechanics based computer code to predict the thermal and mechanical properties of woven ceramic matrix composites (CMC) is developed. This computer code, W-CEMCAN (Woven CEramic Matrix Composites ANalyzer), predicts the properties of two-dimensional woven CMC at any temperature and takes into account various constituent geometries and volume fractions. This computer code is used to predict the thermal and mechanical properties of an advanced CMC composed of 0/90 five-harness (5 HS) Sylramic fiber which had been chemically vapor infiltrated (CVI) with boron nitride (BN) and SiC interphase coatings and melt-infiltrated (MI) with SiC. The predictions, based on the bulk constituent properties from the literature, are compared with measured experimental data. Based on the comparison. improved or calibrated properties for the constituent materials are then developed for use by material developers/designers. The computer code is then used to predict the properties of a composite with the same constituents but with different fiber volume fractions. The predictions are compared with measured data and a good agreement is achieved.

  8. Fault tolerant computing: A preamble for assuring viability of large computer systems

    NASA Technical Reports Server (NTRS)

    Lim, R. S.

    1977-01-01

    The need for fault-tolerant computing is addressed from the viewpoints of (1) why it is needed, (2) how to apply it in the current state of technology, and (3) what it means in the context of the Phoenix computer system and other related systems. To this end, the value of concurrent error detection and correction is described. User protection, program retry, and repair are among the factors considered. The technology of algebraic codes to protect memory systems and arithmetic codes to protect memory systems and arithmetic codes to protect arithmetic operations is discussed.

  9. The Advanced Software Development and Commercialization Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gallopoulos, E.; Canfield, T.R.; Minkoff, M.

    1990-09-01

    This is the first of a series of reports pertaining to progress in the Advanced Software Development and Commercialization Project, a joint collaborative effort between the Center for Supercomputing Research and Development of the University of Illinois and the Computing and Telecommunications Division of Argonne National Laboratory. The purpose of this work is to apply techniques of parallel computing that were pioneered by University of Illinois researchers to mature computational fluid dynamics (CFD) and structural dynamics (SD) computer codes developed at Argonne. The collaboration in this project will bring this unique combination of expertise to bear, for the first time,more » on industrially important problems. By so doing, it will expose the strengths and weaknesses of existing techniques for parallelizing programs and will identify those problems that need to be solved in order to enable wide spread production use of parallel computers. Secondly, the increased efficiency of the CFD and SD codes themselves will enable the simulation of larger, more accurate engineering models that involve fluid and structural dynamics. In order to realize the above two goals, we are considering two production codes that have been developed at ANL and are widely used by both industry and Universities. These are COMMIX and WHAMS-3D. The first is a computational fluid dynamics code that is used for both nuclear reactor design and safety and as a design tool for the casting industry. The second is a three-dimensional structural dynamics code used in nuclear reactor safety as well as crashworthiness studies. These codes are currently available for both sequential and vector computers only. Our main goal is to port and optimize these two codes on shared memory multiprocessors. In so doing, we shall establish a process that can be followed in optimizing other sequential or vector engineering codes for parallel processors.« less

  10. Source Code Plagiarism--A Student Perspective

    ERIC Educational Resources Information Center

    Joy, M.; Cosma, G.; Yau, J. Y.-K.; Sinclair, J.

    2011-01-01

    This paper considers the problem of source code plagiarism by students within the computing disciplines and reports the results of a survey of students in Computing departments in 18 institutions in the U.K. This survey was designed to investigate how well students understand the concept of source code plagiarism and to discover what, if any,…

  11. Poetry in Programs: A Brief Examination of Software Aesthetics, Including Observations on the History of Programming Styles and Speculations on Post-object Programming

    NASA Technical Reports Server (NTRS)

    Filman, Robert E.

    2004-01-01

    This viewgraph presentation provides samples of computer code which have characteristics of poetic verse, and addresses the theoretical underpinnings of artistic coding, as well as how computer language influences software style, and the possible style of future coding.

  12. Solution of the lossy nonlinear Tricomi equation with application to sonic boom focusing

    NASA Astrophysics Data System (ADS)

    Salamone, Joseph A., III

    Sonic boom focusing theory has been augmented with new terms that account for mean flow effects in the direction of propagation and also for atmospheric absorption/dispersion due to molecular relaxation due to oxygen and nitrogen. The newly derived model equation was numerically implemented using a computer code. The computer code was numerically validated using a spectral solution for nonlinear propagation of a sinusoid through a lossy homogeneous medium. An additional numerical check was performed to verify the linear diffraction component of the code calculations. The computer code was experimentally validated using measured sonic boom focusing data from the NASA sponsored Superboom Caustic and Analysis Measurement Program (SCAMP) flight test. The computer code was in good agreement with both the numerical and experimental validation. The newly developed code was applied to examine the focusing of a NASA low-boom demonstration vehicle concept. The resulting pressure field was calculated for several supersonic climb profiles. The shaping efforts designed into the signatures were still somewhat evident despite the effects of sonic boom focusing.

  13. Modernization and optimization of a legacy open-source CFD code for high-performance computing architectures

    NASA Astrophysics Data System (ADS)

    Gel, Aytekin; Hu, Jonathan; Ould-Ahmed-Vall, ElMoustapha; Kalinkin, Alexander A.

    2017-02-01

    Legacy codes remain a crucial element of today's simulation-based engineering ecosystem due to the extensive validation process and investment in such software. The rapid evolution of high-performance computing architectures necessitates the modernization of these codes. One approach to modernization is a complete overhaul of the code. However, this could require extensive investments, such as rewriting in modern languages, new data constructs, etc., which will necessitate systematic verification and validation to re-establish the credibility of the computational models. The current study advocates using a more incremental approach and is a culmination of several modernization efforts of the legacy code MFIX, which is an open-source computational fluid dynamics code that has evolved over several decades, widely used in multiphase flows and still being developed by the National Energy Technology Laboratory. Two different modernization approaches,'bottom-up' and 'top-down', are illustrated. Preliminary results show up to 8.5x improvement at the selected kernel level with the first approach, and up to 50% improvement in total simulated time with the latter were achieved for the demonstration cases and target HPC systems employed.

  14. Visual Computing Environment Workshop

    NASA Technical Reports Server (NTRS)

    Lawrence, Charles (Compiler)

    1998-01-01

    The Visual Computing Environment (VCE) is a framework for intercomponent and multidisciplinary computational simulations. Many current engineering analysis codes simulate various aspects of aircraft engine operation. For example, existing computational fluid dynamics (CFD) codes can model the airflow through individual engine components such as the inlet, compressor, combustor, turbine, or nozzle. Currently, these codes are run in isolation, making intercomponent and complete system simulations very difficult to perform. In addition, management and utilization of these engineering codes for coupled component simulations is a complex, laborious task, requiring substantial experience and effort. To facilitate multicomponent aircraft engine analysis, the CFD Research Corporation (CFDRC) is developing the VCE system. This system, which is part of NASA's Numerical Propulsion Simulation System (NPSS) program, can couple various engineering disciplines, such as CFD, structural analysis, and thermal analysis.

  15. Force user's manual: A portable, parallel FORTRAN

    NASA Technical Reports Server (NTRS)

    Jordan, Harry F.; Benten, Muhammad S.; Arenstorf, Norbert S.; Ramanan, Aruna V.

    1990-01-01

    The use of Force, a parallel, portable FORTRAN on shared memory parallel computers is described. Force simplifies writing code for parallel computers and, once the parallel code is written, it is easily ported to computers on which Force is installed. Although Force is nearly the same for all computers, specific details are included for the Cray-2, Cray-YMP, Convex 220, Flex/32, Encore, Sequent, Alliant computers on which it is installed.

  16. Monte Carlo simulation of Ising models by multispin coding on a vector computer

    NASA Astrophysics Data System (ADS)

    Wansleben, Stephan; Zabolitzky, John G.; Kalle, Claus

    1984-11-01

    Rebbi's efficient multispin coding algorithm for Ising models is combined with the use of the vector computer CDC Cyber 205. A speed of 21.2 million updates per second is reached. This is comparable to that obtained by special- purpose computers.

  17. Thrust chamber performance using Navier-Stokes solution. [space shuttle main engine viscous nozzle calculation

    NASA Technical Reports Server (NTRS)

    Chan, J. S.; Freeman, J. A.

    1984-01-01

    The viscous, axisymmetric flow in the thrust chamber of the space shuttle main engine (SSME) was computed on the CRAY 205 computer using the general interpolants method (GIM) code. Results show that the Navier-Stokes codes can be used for these flows to study trends and viscous effects as well as determine flow patterns; but further research and development is needed before they can be used as production tools for nozzle performance calculations. The GIM formulation, numerical scheme, and computer code are described. The actual SSME nozzle computation showing grid points, flow contours, and flow parameter plots is discussed. The computer system and run times/costs are detailed.

  18. Finite difference time domain electromagnetic scattering from frequency-dependent lossy materials

    NASA Technical Reports Server (NTRS)

    Luebbers, Raymond J.; Beggs, John H.

    1991-01-01

    Four different FDTD computer codes and companion Radar Cross Section (RCS) conversion codes on magnetic media are submitted. A single three dimensional dispersive FDTD code for both dispersive dielectric and magnetic materials was developed, along with a user's manual. The extension of FDTD to more complicated materials was made. The code is efficient and is capable of modeling interesting radar targets using a modest computer workstation platform. RCS results for two different plate geometries are reported. The FDTD method was also extended to computing far zone time domain results in two dimensions. Also the capability to model nonlinear materials was incorporated into FDTD and validated.

  19. Multitasking the code ARC3D. [for computational fluid dynamics

    NASA Technical Reports Server (NTRS)

    Barton, John T.; Hsiung, Christopher C.

    1986-01-01

    The CRAY multitasking system was developed in order to utilize all four processors and sharply reduce the wall clock run time. This paper describes the techniques used to modify the computational fluid dynamics code ARC3D for this run and analyzes the achieved speedup. The ARC3D code solves either the Euler or thin-layer N-S equations using an implicit approximate factorization scheme. Results indicate that multitask processing can be used to achieve wall clock speedup factors of over three times, depending on the nature of the program code being used. Multitasking appears to be particularly advantageous for large-memory problems running on multiple CPU computers.

  20. Addressing the challenges of standalone multi-core simulations in molecular dynamics

    NASA Astrophysics Data System (ADS)

    Ocaya, R. O.; Terblans, J. J.

    2017-07-01

    Computational modelling in material science involves mathematical abstractions of force fields between particles with the aim to postulate, develop and understand materials by simulation. The aggregated pairwise interactions of the material's particles lead to a deduction of its macroscopic behaviours. For practically meaningful macroscopic scales, a large amount of data are generated, leading to vast execution times. Simulation times of hours, days or weeks for moderately sized problems are not uncommon. The reduction of simulation times, improved result accuracy and the associated software and hardware engineering challenges are the main motivations for many of the ongoing researches in the computational sciences. This contribution is concerned mainly with simulations that can be done on a "standalone" computer based on Message Passing Interfaces (MPI), parallel code running on hardware platforms with wide specifications, such as single/multi- processor, multi-core machines with minimal reconfiguration for upward scaling of computational power. The widely available, documented and standardized MPI library provides this functionality through the MPI_Comm_size (), MPI_Comm_rank () and MPI_Reduce () functions. A survey of the literature shows that relatively little is written with respect to the efficient extraction of the inherent computational power in a cluster. In this work, we discuss the main avenues available to tap into this extra power without compromising computational accuracy. We also present methods to overcome the high inertia encountered in single-node-based computational molecular dynamics. We begin by surveying the current state of the art and discuss what it takes to achieve parallelism, efficiency and enhanced computational accuracy through program threads and message passing interfaces. Several code illustrations are given. The pros and cons of writing raw code as opposed to using heuristic, third-party code are also discussed. The growing trend towards graphical processor units and virtual computing clouds for high-performance computing is also discussed. Finally, we present the comparative results of vacancy formation energy calculations using our own parallelized standalone code called Verlet-Stormer velocity (VSV) operating on 30,000 copper atoms. The code is based on the Sutton-Chen implementation of the Finnis-Sinclair pairwise embedded atom potential. A link to the code is also given.

  1. Superimposed Code Theoretic Analysis of DNA Codes and DNA Computing

    DTIC Science & Technology

    2008-01-01

    complements of one another and the DNA duplex formed is a Watson - Crick (WC) duplex. However, there are many instances when the formation of non-WC...that the user’s requirements for probe selection are met based on the Watson - Crick probe locality within a target. The second type, called...AFRL-RI-RS-TR-2007-288 Final Technical Report January 2008 SUPERIMPOSED CODE THEORETIC ANALYSIS OF DNA CODES AND DNA COMPUTING

  2. Preliminary Results from the Application of Automated Adjoint Code Generation to CFL3D

    NASA Technical Reports Server (NTRS)

    Carle, Alan; Fagan, Mike; Green, Lawrence L.

    1998-01-01

    This report describes preliminary results obtained using an automated adjoint code generator for Fortran to augment a widely-used computational fluid dynamics flow solver to compute derivatives. These preliminary results with this augmented code suggest that, even in its infancy, the automated adjoint code generator can accurately and efficiently deliver derivatives for use in transonic Euler-based aerodynamic shape optimization problems with hundreds to thousands of independent design variables.

  3. Aeroacoustic Prediction Codes

    NASA Technical Reports Server (NTRS)

    Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

    2000-01-01

    This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor-noise correlation model was developed from engine acoustic test results. This work provided several insights on potential approaches to reducing aircraft engine noise. Code development is described in this report, and those insights are discussed.

  4. Turbine Internal and Film Cooling Modeling For 3D Navier-Stokes Codes

    NASA Technical Reports Server (NTRS)

    DeWitt, Kenneth; Garg Vijay; Ameri, Ali

    2005-01-01

    The aim of this research project is to make use of NASA Glenn on-site computational facilities in order to develop, validate and apply aerodynamic, heat transfer, and turbine cooling models for use in advanced 3D Navier-Stokes Computational Fluid Dynamics (CFD) codes such as the Glenn-" code. Specific areas of effort include: Application of the Glenn-HT code to specific configurations made available under Turbine Based Combined Cycle (TBCC), and Ultra Efficient Engine Technology (UEET) projects. Validating the use of a multi-block code for the time accurate computation of the detailed flow and heat transfer of cooled turbine airfoils. The goal of the current research is to improve the predictive ability of the Glenn-HT code. This will enable one to design more efficient turbine components for both aviation and power generation. The models will be tested against specific configurations provided by NASA Glenn.

  5. Development of a 3-D upwind PNS code for chemically reacting hypersonic flowfields

    NASA Technical Reports Server (NTRS)

    Tannehill, J. C.; Wadawadigi, G.

    1992-01-01

    Two new parabolized Navier-Stokes (PNS) codes were developed to compute the three-dimensional, viscous, chemically reacting flow of air around hypersonic vehicles such as the National Aero-Space Plane (NASP). The first code (TONIC) solves the gas dynamic and species conservation equations in a fully coupled manner using an implicit, approximately-factored, central-difference algorithm. This code was upgraded to include shock fitting and the capability of computing the flow around complex body shapes. The revised TONIC code was validated by computing the chemically-reacting (M(sub infinity) = 25.3) flow around a 10 deg half-angle cone at various angles of attack and the Ames All-Body model at 0 deg angle of attack. The results of these calculations were in good agreement with the results from the UPS code. One of the major drawbacks of the TONIC code is that the central-differencing of fluxes across interior flowfield discontinuities tends to introduce errors into the solution in the form of local flow property oscillations. The second code (UPS), originally developed for a perfect gas, has been extended to permit either perfect gas, equilibrium air, or nonequilibrium air computations. The code solves the PNS equations using a finite-volume, upwind TVD method based on Roe's approximate Riemann solver that was modified to account for real gas effects. The dissipation term associated with this algorithm is sufficiently adaptive to flow conditions that, even when attempting to capture very strong shock waves, no additional smoothing is required. For nonequilibrium calculations, the code solves the fluid dynamic and species continuity equations in a loosely-coupled manner. This code was used to calculate the hypersonic, laminar flow of chemically reacting air over cones at various angles of attack. In addition, the flow around the McDonnel Douglas generic option blended-wing-body was computed and comparisons were made between the perfect gas, equilibrium air, and the nonequilibrium air results.

  6. Linear chirp phase perturbing approach for finding binary phased codes

    NASA Astrophysics Data System (ADS)

    Li, Bing C.

    2017-05-01

    Binary phased codes have many applications in communication and radar systems. These applications require binary phased codes to have low sidelobes in order to reduce interferences and false detection. Barker codes are the ones that satisfy these requirements and they have lowest maximum sidelobes. However, Barker codes have very limited code lengths (equal or less than 13) while many applications including low probability of intercept radar, and spread spectrum communication, require much higher code lengths. The conventional techniques of finding binary phased codes in literatures include exhaust search, neural network, and evolutionary methods, and they all require very expensive computation for large code lengths. Therefore these techniques are limited to find binary phased codes with small code lengths (less than 100). In this paper, by analyzing Barker code, linear chirp, and P3 phases, we propose a new approach to find binary codes. Experiments show that the proposed method is able to find long low sidelobe binary phased codes (code length >500) with reasonable computational cost.

  7. Development of Reduced-Order Models for Aeroelastic and Flutter Prediction Using the CFL3Dv6.0 Code

    NASA Technical Reports Server (NTRS)

    Silva, Walter A.; Bartels, Robert E.

    2002-01-01

    A reduced-order model (ROM) is developed for aeroelastic analysis using the CFL3D version 6.0 computational fluid dynamics (CFD) code, recently developed at the NASA Langley Research Center. This latest version of the flow solver includes a deforming mesh capability, a modal structural definition for nonlinear aeroelastic analyses, and a parallelization capability that provides a significant increase in computational efficiency. Flutter results for the AGARD 445.6 Wing computed using CFL3D v6.0 are presented, including discussion of associated computational costs. Modal impulse responses of the unsteady aerodynamic system are then computed using the CFL3Dv6 code and transformed into state-space form. Important numerical issues associated with the computation of the impulse responses are presented. The unsteady aerodynamic state-space ROM is then combined with a state-space model of the structure to create an aeroelastic simulation using the MATLAB/SIMULINK environment. The MATLAB/SIMULINK ROM is used to rapidly compute aeroelastic transients including flutter. The ROM shows excellent agreement with the aeroelastic analyses computed using the CFL3Dv6.0 code directly.

  8. Radiant Energy Measurements from a Scaled Jet Engine Axisymmetric Exhaust Nozzle for a Baseline Code Validation Case

    NASA Technical Reports Server (NTRS)

    Baumeister, Joseph F.

    1994-01-01

    A non-flowing, electrically heated test rig was developed to verify computer codes that calculate radiant energy propagation from nozzle geometries that represent aircraft propulsion nozzle systems. Since there are a variety of analysis tools used to evaluate thermal radiation propagation from partially enclosed nozzle surfaces, an experimental benchmark test case was developed for code comparison. This paper briefly describes the nozzle test rig and the developed analytical nozzle geometry used to compare the experimental and predicted thermal radiation results. A major objective of this effort was to make available the experimental results and the analytical model in a format to facilitate conversion to existing computer code formats. For code validation purposes this nozzle geometry represents one validation case for one set of analysis conditions. Since each computer code has advantages and disadvantages based on scope, requirements, and desired accuracy, the usefulness of this single nozzle baseline validation case can be limited for some code comparisons.

  9. Manual for obscuration code with space station applications

    NASA Technical Reports Server (NTRS)

    Marhefka, R. J.; Takacs, L.

    1986-01-01

    The Obscuration Code, referred to as SHADOW, is a user-oriented computer code to determine the case shadow of an antenna in a complex environment onto the far zone sphere. The surrounding structure can be composed of multiple composite cone frustums and multiply sided flat plates. These structural pieces are ideal for modeling space station configurations. The means of describing the geometry input is compatible with the NEC-BASIC Scattering Code. In addition, an interactive mode of operation has been provided for DEC VAX computers. The first part of this document is a user's manual designed to give a description of the method used to obtain the shadow map, to provide an overall view of the operation of the computer code, to instruct a user in how to model structures, and to give examples of inputs and outputs. The second part is a code manual that details how to set up the interactive and non-interactive modes of the code and provides a listing and brief description of each of the subroutines.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ritchie, L.T.; Johnson, J.D.; Blond, R.M.

    The CRAC2 computer code is a revision of the Calculation of Reactor Accident Consequences computer code, CRAC, developed for the Reactor Safety Study. The CRAC2 computer code incorporates significant modeling improvements in the areas of weather sequence sampling and emergency response, and refinements to the plume rise, atmospheric dispersion, and wet deposition models. New output capabilities have also been added. This guide is to facilitate the informed and intelligent use of CRAC2. It includes descriptions of the input data, the output results, the file structures, control information, and five sample problems.

  11. Progressive fracture of fiber composites

    NASA Technical Reports Server (NTRS)

    Irvin, T. B.; Ginty, C. A.

    1983-01-01

    Refined models and procedures are described for determining progressive composite fracture in graphite/epoxy angleplied laminates. Lewis Research Center capabilities are utilized including the Real Time Ultrasonic C Scan (RUSCAN) experimental facility and the Composite Durability Structural Analysis (CODSTRAN) computer code. The CODSTRAN computer code is used to predict the fracture progression based on composite mechanics, finite element stress analysis, and fracture criteria modules. The RUSCAN facility, CODSTRAN computer code, and scanning electron microscope are used to determine durability and identify failure mechanisms in graphite/epoxy composites.

  12. Modeling Improvements and Users Manual for Axial-flow Turbine Off-design Computer Code AXOD

    NASA Technical Reports Server (NTRS)

    Glassman, Arthur J.

    1994-01-01

    An axial-flow turbine off-design performance computer code used for preliminary studies of gas turbine systems was modified and calibrated based on the experimental performance of large aircraft-type turbines. The flow- and loss-model modifications and calibrations are presented in this report. Comparisons are made between computed performances and experimental data for seven turbines over wide ranges of speed and pressure ratio. This report also serves as the users manual for the revised code, which is named AXOD.

  13. Design geometry and design/off-design performance computer codes for compressors and turbines

    NASA Technical Reports Server (NTRS)

    Glassman, Arthur J.

    1995-01-01

    This report summarizes some NASA Lewis (i.e., government owned) computer codes capable of being used for airbreathing propulsion system studies to determine the design geometry and to predict the design/off-design performance of compressors and turbines. These are not CFD codes; velocity-diagram energy and continuity computations are performed fore and aft of the blade rows using meanline, spanline, or streamline analyses. Losses are provided by empirical methods. Both axial-flow and radial-flow configurations are included.

  14. PerSEUS: Ultra-Low-Power High Performance Computing for Plasma Simulations

    NASA Astrophysics Data System (ADS)

    Doxas, I.; Andreou, A.; Lyon, J.; Angelopoulos, V.; Lu, S.; Pritchett, P. L.

    2017-12-01

    Peta-op SupErcomputing Unconventional System (PerSEUS) aims to explore the use for High Performance Scientific Computing (HPC) of ultra-low-power mixed signal unconventional computational elements developed by Johns Hopkins University (JHU), and demonstrate that capability on both fluid and particle Plasma codes. We will describe the JHU Mixed-signal Unconventional Supercomputing Elements (MUSE), and report initial results for the Lyon-Fedder-Mobarry (LFM) global magnetospheric MHD code, and a UCLA general purpose relativistic Particle-In-Cell (PIC) code.

  15. Multiple grid problems on concurrent-processing computers

    NASA Technical Reports Server (NTRS)

    Eberhardt, D. S.; Baganoff, D.

    1986-01-01

    Three computer codes were studied which make use of concurrent processing computer architectures in computational fluid dynamics (CFD). The three parallel codes were tested on a two processor multiple-instruction/multiple-data (MIMD) facility at NASA Ames Research Center, and are suggested for efficient parallel computations. The first code is a well-known program which makes use of the Beam and Warming, implicit, approximate factored algorithm. This study demonstrates the parallelism found in a well-known scheme and it achieved speedups exceeding 1.9 on the two processor MIMD test facility. The second code studied made use of an embedded grid scheme which is used to solve problems having complex geometries. The particular application for this study considered an airfoil/flap geometry in an incompressible flow. The scheme eliminates some of the inherent difficulties found in adapting approximate factorization techniques onto MIMD machines and allows the use of chaotic relaxation and asynchronous iteration techniques. The third code studied is an application of overset grids to a supersonic blunt body problem. The code addresses the difficulties encountered when using embedded grids on a compressible, and therefore nonlinear, problem. The complex numerical boundary system associated with overset grids is discussed and several boundary schemes are suggested. A boundary scheme based on the method of characteristics achieved the best results.

  16. Binary weight distributions of some Reed-Solomon codes

    NASA Technical Reports Server (NTRS)

    Pollara, F.; Arnold, S.

    1992-01-01

    The binary weight distributions of the (7,5) and (15,9) Reed-Solomon (RS) codes and their duals are computed using the MacWilliams identities. Several mappings of symbols to bits are considered and those offering the largest binary minimum distance are found. These results are then used to compute bounds on the soft-decoding performance of these codes in the presence of additive Gaussian noise. These bounds are useful for finding large binary block codes with good performance and for verifying the performance obtained by specific soft-coding algorithms presently under development.

  17. A high temperature fatigue life prediction computer code based on the total strain version of StrainRange Partitioning (SRP)

    NASA Technical Reports Server (NTRS)

    Mcgaw, Michael A.; Saltsman, James F.

    1993-01-01

    A recently developed high-temperature fatigue life prediction computer code is presented and an example of its usage given. The code discussed is based on the Total Strain version of Strainrange Partitioning (TS-SRP). Included in this code are procedures for characterizing the creep-fatigue durability behavior of an alloy according to TS-SRP guidelines and predicting cyclic life for complex cycle types for both isothermal and thermomechanical conditions. A reasonably extensive materials properties database is included with the code.

  18. Turbomachinery Heat Transfer and Loss Modeling for 3D Navier-Stokes Codes

    NASA Technical Reports Server (NTRS)

    DeWitt, Kenneth; Ameri, Ali

    2005-01-01

    This report's contents focus on making use of NASA Glenn on-site computational facilities,to develop, validate, and apply models for use in advanced 3D Navier-Stokes Computational Fluid Dynamics (CFD) codes to enhance the capability to compute heat transfer and losses in turbomachiney.

  19. Real-time computer treatment of THz passive device images with the high image quality

    NASA Astrophysics Data System (ADS)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.

    2012-06-01

    We demonstrate real-time computer code improving significantly the quality of images captured by the passive THz imaging system. The code is not only designed for a THz passive device: it can be applied to any kind of such devices and active THz imaging systems as well. We applied our code for computer processing of images captured by four passive THz imaging devices manufactured by different companies. It should be stressed that computer processing of images produced by different companies requires using the different spatial filters usually. The performance of current version of the computer code is greater than one image per second for a THz image having more than 5000 pixels and 24 bit number representation. Processing of THz single image produces about 20 images simultaneously corresponding to various spatial filters. The computer code allows increasing the number of pixels for processed images without noticeable reduction of image quality. The performance of the computer code can be increased many times using parallel algorithms for processing the image. We develop original spatial filters which allow one to see objects with sizes less than 2 cm. The imagery is produced by passive THz imaging devices which captured the images of objects hidden under opaque clothes. For images with high noise we develop an approach which results in suppression of the noise after using the computer processing and we obtain the good quality image. With the aim of illustrating the efficiency of the developed approach we demonstrate the detection of the liquid explosive, ordinary explosive, knife, pistol, metal plate, CD, ceramics, chocolate and other objects hidden under opaque clothes. The results demonstrate the high efficiency of our approach for the detection of hidden objects and they are a very promising solution for the security problem.

  20. Fingerprinting Communication and Computation on HPC Machines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peisert, Sean

    2010-06-02

    How do we identify what is actually running on high-performance computing systems? Names of binaries, dynamic libraries loaded, or other elements in a submission to a batch queue can give clues, but binary names can be changed, and libraries provide limited insight and resolution on the code being run. In this paper, we present a method for"fingerprinting" code running on HPC machines using elements of communication and computation. We then discuss how that fingerprint can be used to determine if the code is consistent with certain other types of codes, what a user usually runs, or what the user requestedmore » an allocation to do. In some cases, our techniques enable us to fingerprint HPC codes using runtime MPI data with a high degree of accuracy.« less

  1. Practices in source code sharing in astrophysics

    NASA Astrophysics Data System (ADS)

    Shamir, Lior; Wallin, John F.; Allen, Alice; Berriman, Bruce; Teuben, Peter; Nemiroff, Robert J.; Mink, Jessica; Hanisch, Robert J.; DuPrie, Kimberly

    2013-02-01

    While software and algorithms have become increasingly important in astronomy, the majority of authors who publish computational astronomy research do not share the source code they develop, making it difficult to replicate and reuse the work. In this paper we discuss the importance of sharing scientific source code with the entire astrophysics community, and propose that journals require authors to make their code publicly available when a paper is published. That is, we suggest that a paper that involves a computer program not be accepted for publication unless the source code becomes publicly available. The adoption of such a policy by editors, editorial boards, and reviewers will improve the ability to replicate scientific results, and will also make computational astronomy methods more available to other researchers who wish to apply them to their data.

  2. Development of V/STOL methodology based on a higher order panel method

    NASA Technical Reports Server (NTRS)

    Bhateley, I. C.; Howell, G. A.; Mann, H. W.

    1983-01-01

    The development of a computational technique to predict the complex flowfields of V/STOL aircraft was initiated in which a number of modules and a potential flow aerodynamic code were combined in a comprehensive computer program. The modules were developed in a building-block approach to assist the user in preparing the geometric input and to compute parameters needed to simulate certain flow phenomena that cannot be handled directly within a potential flow code. The PAN AIR aerodynamic code, which is higher order panel method, forms the nucleus of this program. PAN AIR's extensive capability for allowing generalized boundary conditions allows the modules to interact with the aerodynamic code through the input and output files, thereby requiring no changes to the basic code and easy replacement of updated modules.

  3. Lattice surgery on the Raussendorf lattice

    NASA Astrophysics Data System (ADS)

    Herr, Daniel; Paler, Alexandru; Devitt, Simon J.; Nori, Franco

    2018-07-01

    Lattice surgery is a method to perform quantum computation fault-tolerantly by using operations on boundary qubits between different patches of the planar code. This technique allows for universal planar code computation without eliminating the intrinsic two-dimensional nearest-neighbor properties of the surface code that eases physical hardware implementations. Lattice surgery approaches to algorithmic compilation and optimization have been demonstrated to be more resource efficient for resource-intensive components of a fault-tolerant algorithm, and consequently may be preferable over braid-based logic. Lattice surgery can be extended to the Raussendorf lattice, providing a measurement-based approach to the surface code. In this paper we describe how lattice surgery can be performed on the Raussendorf lattice and therefore give a viable alternative to computation using braiding in measurement-based implementations of topological codes.

  4. 40 CFR 1033.110 - Emission diagnostics-general requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... engine operation. (d) Record and store in computer memory any diagnostic trouble codes showing a... and understand the diagnostic trouble codes stored in the onboard computer with generic tools and...

  5. Airfoil Vibration Dampers program

    NASA Technical Reports Server (NTRS)

    Cook, Robert M.

    1991-01-01

    The Airfoil Vibration Damper program has consisted of an analysis phase and a testing phase. During the analysis phase, a state-of-the-art computer code was developed, which can be used to guide designers in the placement and sizing of friction dampers. The use of this computer code was demonstrated by performing representative analyses on turbine blades from the High Pressure Oxidizer Turbopump (HPOTP) and High Pressure Fuel Turbopump (HPFTP) of the Space Shuttle Main Engine (SSME). The testing phase of the program consisted of performing friction damping tests on two different cantilever beams. Data from these tests provided an empirical check on the accuracy of the computer code developed in the analysis phase. Results of the analysis and testing showed that the computer code can accurately predict the performance of friction dampers. In addition, a valuable set of friction damping data was generated, which can be used to aid in the design of friction dampers, as well as provide benchmark test cases for future code developers.

  6. Computer optimization of reactor-thermoelectric space power systems

    NASA Technical Reports Server (NTRS)

    Maag, W. L.; Finnegan, P. M.; Fishbach, L. H.

    1973-01-01

    A computer simulation and optimization code that has been developed for nuclear space power systems is described. The results of using this code to analyze two reactor-thermoelectric systems are presented.

  7. Fighting Networks: The Defining Challenge of Irregular Warfare

    DTIC Science & Technology

    2011-06-01

    Terror on the Internet, describes the collection of this information as “data mining ,” and describes extensive research, information sharing using...suicide bombings. The first, a dramatically increased use of mines and IEDs, reflects both their ability to emplace such explosive devices stealthfully, as...well as the Russian reliance on more static positions supported by road arteries. The ‘ mine warfare’ employed by the Chechen fighters presented

  8. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    DTIC Science & Technology

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  9. Applications of sub-audible speech recognition based upon electromyographic signals

    NASA Technical Reports Server (NTRS)

    Jorgensen, C. Charles (Inventor); Betts, Bradley J. (Inventor)

    2009-01-01

    Method and system for generating electromyographic or sub-audible signals (''SAWPs'') and for transmitting and recognizing the SAWPs that represent the original words and/or phrases. The SAWPs may be generated in an environment that interferes excessively with normal speech or that requires stealth communications, and may be transmitted using encoded, enciphered or otherwise transformed signals that are less subject to signal distortion or degradation in the ambient environment.

  10. China’s Near Seas Combat Capabilities (China Maritime Study, Number 11)

    DTIC Science & Technology

    2014-02-01

    Chinese writings stress preemptive attacks on key U.S. power-projection capabili- ties—including aircraft carriers—prior to or quickly following formal...attack craft consistently stress covert, long-range attacks taking advantage of stealth, surprise, and standoff ranges. A final factor that supports...craft tenders, but this is speculative.56 The 2010 Chinese defense white paper does stress , however, that sea-based china’s near seas combat

  11. Elasticity of bilayers containing PEG lipids

    NASA Astrophysics Data System (ADS)

    Bivas, I.; Winterhalter, M.; Méléard, P.; Bothorel, P.

    1998-02-01

    The addition of lipids with a poly(ethylene glycol) head group (Stealth or grafted or PEG lipids) to a phosphatidylcholine bilayer changes the mechanical properties of the membrane. We calculate the dependences of the bending and stretching elasticities of the bilayer on the PEG lipid concentration and on the monomer number in its polymer chain. The role of the bending elasticity at blocked flip-flop of the pure bilayer is revealed.

  12. Fixed-Price Development Contracts: A Historical Perspective

    DTIC Science & Technology

    2012-09-01

    its rival, Boeing, in 1997 ( Boyne , 2002). 36   F-117 Nighthawk In the 1970s, the Air Force expressed a desire to integrate stealth...original cost-reimbursement contract was later changed to a fixed-price incentive contract by Secretary of the Navy John Lehman in response to...inquiry [Memorandum for the Secretary of the Navy]. Washington, DC: Department of the Navy. Boyne , W. (2002). Air warfare: An international

  13. A 3D-CFD code for accurate prediction of fluid flows and fluid forces in seals

    NASA Technical Reports Server (NTRS)

    Athavale, M. M.; Przekwas, A. J.; Hendricks, R. C.

    1994-01-01

    Current and future turbomachinery requires advanced seal configurations to control leakage, inhibit mixing of incompatible fluids and to control the rotodynamic response. In recognition of a deficiency in the existing predictive methodology for seals, a seven year effort was established in 1990 by NASA's Office of Aeronautics Exploration and Technology, under the Earth-to-Orbit Propulsion program, to develop validated Computational Fluid Dynamics (CFD) concepts, codes and analyses for seals. The effort will provide NASA and the U.S. Aerospace Industry with advanced CFD scientific codes and industrial codes for analyzing and designing turbomachinery seals. An advanced 3D CFD cylindrical seal code has been developed, incorporating state-of-the-art computational methodology for flow analysis in straight, tapered and stepped seals. Relevant computational features of the code include: stationary/rotating coordinates, cylindrical and general Body Fitted Coordinates (BFC) systems, high order differencing schemes, colocated variable arrangement, advanced turbulence models, incompressible/compressible flows, and moving grids. This paper presents the current status of code development, code demonstration for predicting rotordynamic coefficients, numerical parametric study of entrance loss coefficients for generic annular seals, and plans for code extensions to labyrinth, damping, and other seal configurations.

  14. Thermochromic properties of W-doped VO2 thin films deposited by aqueous sol-gel method for adaptive infrared stealth application

    NASA Astrophysics Data System (ADS)

    Liu, Dongqing; Cheng, Haifeng; Xing, Xin; Zhang, Chaoyang; Zheng, Wenwei

    2016-07-01

    The W doped VO2 thin films with various W contents were successfully deposited by aqueous sol-gel method followed by a post annealing process. The derived thin films were characterized by X-ray diffraction, Raman spectra, scanning electron microscopy and atomic force microscopy. Besides, the resistance-temperature relationship and infrared emissivity in the waveband 7.5-14 μm were analyzed, and the effects of W doping on the thermochromic properties of VO2 thin films were studied. The results show that W atoms enter the crystal lattice of VO2 and the transition temperature decreases gradually with increasing doping amount of W. The emissivity of VO2-W-4% thin films has dropped to 0.4 when its real temperature is above 30 °C. The thermal infrared images were also examined under different temperature by thermal imager. The results indicate that the temperature under which W doped VO2 thin films begin to have lower emissivity decreases gradually with increasing doping amount of W. W doped VO2 thin films can control its infrared radiation intensity actively at a lower temperature level of 30 °C, which has great application prospects in the adaptive infrared stealth technology.

  15. Modelling of long-wave chaotic radar system for anti-stealth applications

    NASA Astrophysics Data System (ADS)

    Al-Suhail, Ghaida A.; Tahir, Fadhil Rahma; Abd, Mariam Hussien; Pham, Viet-Thanh; Fortuna, Luigi

    2018-04-01

    Although the Very Low-Frequency (VLF) waveforms have limited practical applications in acoustics (sonar) and secure military communications with radars and submarines; to this end; this paper presents a new and simple analytical model of VLF monostatic direct chaotic radar system. The model hypothetically depends on the two identical coupled time-delayed feedback chaotic systems which can generate and recover a long-wave chaotic signal. To resist the influence of positive Lyapunov exponents of the time-delay chaotic systems, the complete replacement of Pecaro and Carroll (PC) synchronization is employed. It can faithfully recover the chaotic signal from the back-scattered (echo) signal from the target over a noisy channel. The system performance is characterized in terms of the time series of synchronization in addition to the peak of the cross-correlation. Simulation results are conducted for substantial sensitivities of the chaotic signal to the system parameters and initial conditions. As a result, it is found that an effective and robust chaotic radar (CRADAR) model can be obtained when the signal-to-noise ratio (SNR) highly degrades to 0 dB, but with clear peak in correlation performance for detecting the target. Then, the model can be considered as a state of the art towards counter stealth technology and might be developed for other acoustic secure applications.

  16. Study of plasma-based stable and ultra-wideband electromagnetic wave absorption for stealth application

    NASA Astrophysics Data System (ADS)

    Xuyang, CHEN; Fangfang, SHEN; Yanming, LIU; Wei, AI; Xiaoping, LI

    2018-06-01

    A plasma-based stable, ultra-wideband electromagnetic (EM) wave absorber structure is studied in this paper for stealth applications. The stability is maintained by a multi-layer structure with several plasma layers and dielectric layers distributed alternately. The plasma in each plasma layer is designed to be uniform, whereas it has a discrete nonuniform distribution from the overall view of the structure. The nonuniform distribution of the plasma is the key to obtaining ultra-wideband wave absorption. A discrete Epstein distribution model is put forward to constrain the nonuniform electron density of the plasma layers, by which the wave absorption range is extended to the ultra-wideband. Then, the scattering matrix method (SMM) is employed to analyze the electromagnetic reflection and absorption of the absorber structure. In the simulation, the validation of the proposed structure and model in ultra-wideband EM wave absorption is first illustrated by comparing the nonuniform plasma model with the uniform case. Then, the influence of various parameters on the EM wave reflection of the plasma are simulated and analyzed in detail, verifying the EM wave absorption performance of the absorber. The proposed structure and model are expected to be superior in some realistic applications, such as supersonic aircraft.

  17. Command History for 1989.

    DTIC Science & Technology

    1990-09-01

    13 Bart Kuhn, GM-14 Samantha K. Maddox , GS-04 Mike Nakada, GM- 13 John Wolfe, GM-14 Reynaldo I. Monzon, GS- 12 Jose G. Suarez, GS- 11 19 Product...1410-09 GS-334-09 Janice Whiting Procurement Clerk Code 21 GS-1106-05 Separations Samantha Maddox Hoa T. Lu Supply Clerk Computer Specialist Code 21...Jennifer Thorp Royal S. Magnus Student Aide Personnel Research Psychologist Code 23 Code 12 GW-322-03 GS-180-11 Linda L. Turnmire Yvonne S. Baker Computer

  18. Ascent Aerodynamic Pressure Distributions on WB001

    NASA Technical Reports Server (NTRS)

    Vu, B.; Ruf, J.; Canabal, F.; Brunty, J.

    1996-01-01

    To support the reusable launch vehicle concept study, the aerodynamic data and surface pressure for WB001 were predicted using three computational fluid dynamic (CFD) codes at several flow conditions between code to code and code to aerodynamic database as well as available experimental data. A set of particular solutions have been selected and recommended for use in preliminary conceptual designs. These computational fluid dynamic (CFD) results have also been provided to the structure group for wing loading analysis.

  19. User's guide for vectorized code EQUIL for calculating equilibrium chemistry on Control Data STAR-100 computer

    NASA Technical Reports Server (NTRS)

    Kumar, A.; Graves, R. A., Jr.; Weilmuenster, K. J.

    1980-01-01

    A vectorized code, EQUIL, was developed for calculating the equilibrium chemistry of a reacting gas mixture on the Control Data STAR-100 computer. The code provides species mole fractions, mass fractions, and thermodynamic and transport properties of the mixture for given temperature, pressure, and elemental mass fractions. The code is set up for the electrons H, He, C, O, N system of elements. In all, 24 chemical species are included.

  20. Computer code for charge-exchange plasma propagation

    NASA Technical Reports Server (NTRS)

    Robinson, R. S.; Kaufman, H. R.

    1981-01-01

    The propagation of the charge-exchange plasma from an electrostatic ion thruster is crucial in determining the interaction of that plasma with the associated spacecraft. A model that describes this plasma and its propagation is described, together with a computer code based on this model. The structure and calling sequence of the code, named PLASIM, is described. An explanation of the program's input and output is included, together with samples of both. The code is written in ASNI Standard FORTRAN.

  1. Self-Scheduling Parallel Methods for Multiple Serial Codes with Application to WOPWOP

    NASA Technical Reports Server (NTRS)

    Long, Lyle N.; Brentner, Kenneth S.

    2000-01-01

    This paper presents a scheme for efficiently running a large number of serial jobs on parallel computers. Two examples are given of computer programs that run relatively quickly, but often they must be run numerous times to obtain all the results needed. It is very common in science and engineering to have codes that are not massive computing challenges in themselves, but due to the number of instances that must be run, they do become large-scale computing problems. The two examples given here represent common problems in aerospace engineering: aerodynamic panel methods and aeroacoustic integral methods. The first example simply solves many systems of linear equations. This is representative of an aerodynamic panel code where someone would like to solve for numerous angles of attack. The complete code for this first example is included in the appendix so that it can be readily used by others as a template. The second example is an aeroacoustics code (WOPWOP) that solves the Ffowcs Williams Hawkings equation to predict the far-field sound due to rotating blades. In this example, one quite often needs to compute the sound at numerous observer locations, hence parallelization is utilized to automate the noise computation for a large number of observers.

  2. Computer Code for Transportation Network Design and Analysis

    DOT National Transportation Integrated Search

    1977-01-01

    This document describes the results of research into the application of the mathematical programming technique of decomposition to practical transportation network problems. A computer code called Catnap (for Control Analysis Transportation Network A...

  3. Current and anticipated uses of the thermal hydraulics codes at the NRC

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Caruso, R.

    1997-07-01

    The focus of Thermal-Hydraulic computer code usage in nuclear regulatory organizations has undergone a considerable shift since the codes were originally conceived. Less work is being done in the area of {open_quotes}Design Basis Accidents,{close_quotes}, and much more emphasis is being placed on analysis of operational events, probabalistic risk/safety assessment, and maintenance practices. All of these areas need support from Thermal-Hydraulic computer codes to model the behavior of plant fluid systems, and they all need the ability to perform large numbers of analyses quickly. It is therefore important for the T/H codes of the future to be able to support thesemore » needs, by providing robust, easy-to-use, tools that produce easy-to understand results for a wider community of nuclear professionals. These tools need to take advantage of the great advances that have occurred recently in computer software, by providing users with graphical user interfaces for both input and output. In addition, reduced costs of computer memory and other hardware have removed the need for excessively complex data structures and numerical schemes, which make the codes more difficult and expensive to modify, maintain, and debug, and which increase problem run-times. Future versions of the T/H codes should also be structured in a modular fashion, to allow for the easy incorporation of new correlations, models, or features, and to simplify maintenance and testing. Finally, it is important that future T/H code developers work closely with the code user community, to ensure that the code meet the needs of those users.« less

  4. Analyzing Pulse-Code Modulation On A Small Computer

    NASA Technical Reports Server (NTRS)

    Massey, David E.

    1988-01-01

    System for analysis pulse-code modulation (PCM) comprises personal computer, computer program, and peripheral interface adapter on circuit board that plugs into expansion bus of computer. Functions essentially as "snapshot" PCM decommutator, which accepts and stores thousands of frames of PCM data, sifts through them repeatedly to process according to routines specified by operator. Enables faster testing and involves less equipment than older testing systems.

  5. A fast technique for computing syndromes of BCH and RS codes. [deep space network

    NASA Technical Reports Server (NTRS)

    Reed, I. S.; Truong, T. K.; Miller, R. L.

    1979-01-01

    A combination of the Chinese Remainder Theorem and Winograd's algorithm is used to compute transforms of odd length over GF(2 to the m power). Such transforms are used to compute the syndromes needed for decoding CBH and RS codes. The present scheme requires substantially fewer multiplications and additions than the conventional method of computing the syndromes directly.

  6. Computational techniques for solar wind flows past terrestrial planets: Theory and computer programs

    NASA Technical Reports Server (NTRS)

    Stahara, S. S.; Chaussee, D. S.; Trudinger, B. C.; Spreiter, J. R.

    1977-01-01

    The interaction of the solar wind with terrestrial planets can be predicted using a computer program based on a single fluid, steady, dissipationless, magnetohydrodynamic model to calculate the axisymmetric, supersonic, super-Alfvenic solar wind flow past both magnetic and nonmagnetic planets. The actual calculations are implemented by an assemblage of computer codes organized into one program. These include finite difference codes which determine the gas-dynamic solution, together with a variety of special purpose output codes for determining and automatically plotting both flow field and magnetic field results. Comparisons are made with previous results, and results are presented for a number of solar wind flows. The computational programs developed are documented and are presented in a general user's manual which is included.

  7. Numerical computation of space shuttle orbiter flow field

    NASA Technical Reports Server (NTRS)

    Tannehill, John C.

    1988-01-01

    A new parabolized Navier-Stokes (PNS) code has been developed to compute the hypersonic, viscous chemically reacting flow fields around 3-D bodies. The flow medium is assumed to be a multicomponent mixture of thermally perfect but calorically imperfect gases. The new PNS code solves the gas dynamic and species conservation equations in a coupled manner using a noniterative, implicit, approximately factored, finite difference algorithm. The space-marching method is made well-posed by special treatment of the streamwise pressure gradient term. The code has been used to compute hypersonic laminar flow of chemically reacting air over cones at angle of attack. The results of the computations are compared with the results of reacting boundary-layer computations and show excellent agreement.

  8. Determining mode excitations of vacuum electronics devices via three-dimensional simulations using the SOS code

    NASA Technical Reports Server (NTRS)

    Warren, Gary

    1988-01-01

    The SOS code is used to compute the resonance modes (frequency-domain information) of sample devices and separately to compute the transient behavior of the same devices. A code, DOT, is created to compute appropriate dot products of the time-domain and frequency-domain results. The transient behavior of individual modes in the device is then plotted. Modes in a coupled-cavity traveling-wave tube (CCTWT) section excited beam in separate simulations are analyzed. Mode energy vs. time and mode phase vs. time are computed and it is determined whether the transient waves are forward or backward waves for each case. Finally, the hot-test mode frequencies of the CCTWT section are computed.

  9. An evaluation of TRAC-PF1/MOD1 computer code performance during posttest simulations of Semiscale MOD-2C feedwater line break transients

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hall, D.G.: Watkins, J.C.

    This report documents an evaluation of the TRAC-PF1/MOD1 reactor safety analysis computer code during computer simulations of feedwater line break transients. The experimental data base for the evaluation included the results of three bottom feedwater line break tests performed in the Semiscale Mod-2C test facility. The tests modeled 14.3% (S-FS-7), 50% (S-FS-11), and 100% (S-FS-6B) breaks. The test facility and the TRAC-PF1/MOD1 model used in the calculations are described. Evaluations of the accuracy of the calculations are presented in the form of comparisons of measured and calculated histories of selected parameters associated with the primary and secondary systems. In additionmore » to evaluating the accuracy of the code calculations, the computational performance of the code during the simulations was assessed. A conclusion was reached that the code is capable of making feedwater line break transient calculations efficiently, but there is room for significant improvements in the simulations that were performed. Recommendations are made for follow-on investigations to determine how to improve future feedwater line break calculations and for code improvements to make the code easier to use.« less

  10. Development of Parallel Computing Framework to Enhance Radiation Transport Code Capabilities for Rare Isotope Beam Facility Design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kostin, Mikhail; Mokhov, Nikolai; Niita, Koji

    A parallel computing framework has been developed to use with general-purpose radiation transport codes. The framework was implemented as a C++ module that uses MPI for message passing. It is intended to be used with older radiation transport codes implemented in Fortran77, Fortran 90 or C. The module is significantly independent of radiation transport codes it can be used with, and is connected to the codes by means of a number of interface functions. The framework was developed and tested in conjunction with the MARS15 code. It is possible to use it with other codes such as PHITS, FLUKA andmore » MCNP after certain adjustments. Besides the parallel computing functionality, the framework offers a checkpoint facility that allows restarting calculations with a saved checkpoint file. The checkpoint facility can be used in single process calculations as well as in the parallel regime. The framework corrects some of the known problems with the scheduling and load balancing found in the original implementations of the parallel computing functionality in MARS15 and PHITS. The framework can be used efficiently on homogeneous systems and networks of workstations, where the interference from the other users is possible.« less

  11. Prediction of sound radiated from different practical jet engine inlets

    NASA Technical Reports Server (NTRS)

    Zinn, B. T.; Meyer, W. L.

    1980-01-01

    Existing computer codes for calculating the far field radiation patterns surrounding various practical jet engine inlet configurations under different excitation conditions were upgraded. The computer codes were refined and expanded so that they are now more efficient computationally by a factor of about three and they are now capable of producing accurate results up to nondimensional wave numbers of twenty. Computer programs were also developed to help generate accurate geometrical representations of the inlets to be investigated. This data is required as input for the computer programs which calculate the sound fields. This new geometry generating computer program considerably reduces the time required to generate the input data which was one of the most time consuming steps in the process. The results of sample runs using the NASA-Lewis QCSEE inlet are presented and comparison of run times and accuracy are made between the old and upgraded computer codes. The overall accuracy of the computations is determined by comparison of the results of the computations with simple source solutions.

  12. Error Suppression for Hamiltonian-Based Quantum Computation Using Subsystem Codes

    NASA Astrophysics Data System (ADS)

    Marvian, Milad; Lidar, Daniel A.

    2017-01-01

    We present general conditions for quantum error suppression for Hamiltonian-based quantum computation using subsystem codes. This involves encoding the Hamiltonian performing the computation using an error detecting subsystem code and the addition of a penalty term that commutes with the encoded Hamiltonian. The scheme is general and includes the stabilizer formalism of both subspace and subsystem codes as special cases. We derive performance bounds and show that complete error suppression results in the large penalty limit. To illustrate the power of subsystem-based error suppression, we introduce fully two-local constructions for protection against local errors of the swap gate of adiabatic gate teleportation and the Ising chain in a transverse field.

  13. Error Suppression for Hamiltonian-Based Quantum Computation Using Subsystem Codes.

    PubMed

    Marvian, Milad; Lidar, Daniel A

    2017-01-20

    We present general conditions for quantum error suppression for Hamiltonian-based quantum computation using subsystem codes. This involves encoding the Hamiltonian performing the computation using an error detecting subsystem code and the addition of a penalty term that commutes with the encoded Hamiltonian. The scheme is general and includes the stabilizer formalism of both subspace and subsystem codes as special cases. We derive performance bounds and show that complete error suppression results in the large penalty limit. To illustrate the power of subsystem-based error suppression, we introduce fully two-local constructions for protection against local errors of the swap gate of adiabatic gate teleportation and the Ising chain in a transverse field.

  14. VERAIn

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simunovic, Srdjan

    2015-02-16

    CASL's modeling and simulation technology, the Virtual Environment for Reactor Applications (VERA), incorporates coupled physics and science-based models, state-of-the-art numerical methods, modern computational science, integrated uncertainty quantification (UQ) and validation against data from operating pressurized water reactors (PWRs), single-effect experiments, and integral tests. The computational simulation component of VERA is the VERA Core Simulator (VERA-CS). The core simulator is the specific collection of multi-physics computer codes used to model and deplete a LWR core over multiple cycles. The core simulator has a single common input file that drives all of the different physics codes. The parser code, VERAIn, converts VERAmore » Input into an XML file that is used as input to different VERA codes.« less

  15. Navier-Stokes and Comprehensive Analysis Performance Predictions of the NREL Phase VI Experiment

    NASA Technical Reports Server (NTRS)

    Duque, Earl P. N.; Burklund, Michael D.; Johnson, Wayne

    2003-01-01

    A vortex lattice code, CAMRAD II, and a Reynolds-Averaged Navier-Stoke code, OVERFLOW-D2, were used to predict the aerodynamic performance of a two-bladed horizontal axis wind turbine. All computations were compared with experimental data that was collected at the NASA Ames Research Center 80- by 120-Foot Wind Tunnel. Computations were performed for both axial as well as yawed operating conditions. Various stall delay models and dynamics stall models were used by the CAMRAD II code. Comparisons between the experimental data and computed aerodynamic loads show that the OVERFLOW-D2 code can accurately predict the power and spanwise loading of a wind turbine rotor.

  16. Fault-tolerance in Two-dimensional Topological Systems

    NASA Astrophysics Data System (ADS)

    Anderson, Jonas T.

    This thesis is a collection of ideas with the general goal of building, at least in the abstract, a local fault-tolerant quantum computer. The connection between quantum information and topology has proven to be an active area of research in several fields. The introduction of the toric code by Alexei Kitaev demonstrated the usefulness of topology for quantum memory and quantum computation. Many quantum codes used for quantum memory are modeled by spin systems on a lattice, with operators that extract syndrome information placed on vertices or faces of the lattice. It is natural to wonder whether the useful codes in such systems can be classified. This thesis presents work that leverages ideas from topology and graph theory to explore the space of such codes. Homological stabilizer codes are introduced and it is shown that, under a set of reasonable assumptions, any qubit homological stabilizer code is equivalent to either a toric code or a color code. Additionally, the toric code and the color code correspond to distinct classes of graphs. Many systems have been proposed as candidate quantum computers. It is very desirable to design quantum computing architectures with two-dimensional layouts and low complexity in parity-checking circuitry. Kitaev's surface codes provided the first example of codes satisfying this property. They provided a new route to fault tolerance with more modest overheads and thresholds approaching 1%. The recently discovered color codes share many properties with the surface codes, such as the ability to perform syndrome extraction locally in two dimensions. Some families of color codes admit a transversal implementation of the entire Clifford group. This work investigates color codes on the 4.8.8 lattice known as triangular codes. I develop a fault-tolerant error-correction strategy for these codes in which repeated syndrome measurements on this lattice generate a three-dimensional space-time combinatorial structure. I then develop an integer program that analyzes this structure and determines the most likely set of errors consistent with the observed syndrome values. I implement this integer program to find the threshold for depolarizing noise on small versions of these triangular codes. Because the threshold for magic-state distillation is likely to be higher than this value and because logical CNOT gates can be performed by code deformation in a single block instead of between pairs of blocks, the threshold for fault-tolerant quantum memory for these codes is also the threshold for fault-tolerant quantum computation with them. Since the advent of a threshold theorem for quantum computers much has been improved upon. Thresholds have increased, architectures have become more local, and gate sets have been simplified. The overhead for magic-state distillation has been studied, but not nearly to the extent of the aforementioned topics. A method for greatly reducing this overhead, known as reusable magic states, is studied here. While examples of reusable magic states exist for Clifford gates, I give strong reasons to believe they do not exist for non-Clifford gates.

  17. System, methods and apparatus for program optimization for multi-threaded processor architectures

    DOEpatents

    Bastoul, Cedric; Lethin, Richard A; Leung, Allen K; Meister, Benoit J; Szilagyi, Peter; Vasilache, Nicolas T; Wohlford, David E

    2015-01-06

    Methods, apparatus and computer software product for source code optimization are provided. In an exemplary embodiment, a first custom computing apparatus is used to optimize the execution of source code on a second computing apparatus. In this embodiment, the first custom computing apparatus contains a memory, a storage medium and at least one processor with at least one multi-stage execution unit. The second computing apparatus contains at least two multi-stage execution units that allow for parallel execution of tasks. The first custom computing apparatus optimizes the code for parallelism, locality of operations and contiguity of memory accesses on the second computing apparatus. This Abstract is provided for the sole purpose of complying with the Abstract requirement rules. This Abstract is submitted with the explicit understanding that it will not be used to interpret or to limit the scope or the meaning of the claims.

  18. An efficient method for computing unsteady transonic aerodynamics of swept wings with control surfaces

    NASA Technical Reports Server (NTRS)

    Liu, D. D.; Kao, Y. F.; Fung, K. Y.

    1989-01-01

    A transonic equivalent strip (TES) method was further developed for unsteady flow computations of arbitrary wing planforms. The TES method consists of two consecutive correction steps to a given nonlinear code such as LTRAN2; namely, the chordwise mean flow correction and the spanwise phase correction. The computation procedure requires direct pressure input from other computed or measured data. Otherwise, it does not require airfoil shape or grid generation for given planforms. To validate the computed results, four swept wings of various aspect ratios, including those with control surfaces, are selected as computational examples. Overall trends in unsteady pressures are established with those obtained by XTRAN3S codes, Isogai's full potential code and measured data by NLR and RAE. In comparison with these methods, the TES has achieved considerable saving in computer time and reasonable accuracy which suggests immediate industrial applications.

  19. Method and computer program product for maintenance and modernization backlogging

    DOEpatents

    Mattimore, Bernard G; Reynolds, Paul E; Farrell, Jill M

    2013-02-19

    According to one embodiment, a computer program product for determining future facility conditions includes a computer readable medium having computer readable program code stored therein. The computer readable program code includes computer readable program code for calculating a time period specific maintenance cost, for calculating a time period specific modernization factor, and for calculating a time period specific backlog factor. Future facility conditions equal the time period specific maintenance cost plus the time period specific modernization factor plus the time period specific backlog factor. In another embodiment, a computer-implemented method for calculating future facility conditions includes calculating a time period specific maintenance cost, calculating a time period specific modernization factor, and calculating a time period specific backlog factor. Future facility conditions equal the time period specific maintenance cost plus the time period specific modernization factor plus the time period specific backlog factor. Other embodiments are also presented.

  20. Development Of A Navier-Stokes Computer Code

    NASA Technical Reports Server (NTRS)

    Yoon, Seokkwan; Kwak, Dochan

    1993-01-01

    Report discusses aspects of development of CENS3D computer code, solving three-dimensional Navier-Stokes equations of compressible, viscous, unsteady flow. Implements implicit finite-difference or finite-volume numerical-integration scheme, called "lower-upper symmetric-Gauss-Seidel" (LU-SGS), offering potential for very low computer time per iteration and for fast convergence.

  1. A Flexible and Non-instrusive Approach for Computing Complex Structural Coverage Metrics

    NASA Technical Reports Server (NTRS)

    Whalen, Michael W.; Person, Suzette J.; Rungta, Neha; Staats, Matt; Grijincu, Daniela

    2015-01-01

    Software analysis tools and techniques often leverage structural code coverage information to reason about the dynamic behavior of software. Existing techniques instrument the code with the required structural obligations and then monitor the execution of the compiled code to report coverage. Instrumentation based approaches often incur considerable runtime overhead for complex structural coverage metrics such as Modified Condition/Decision (MC/DC). Code instrumentation, in general, has to be approached with great care to ensure it does not modify the behavior of the original code. Furthermore, instrumented code cannot be used in conjunction with other analyses that reason about the structure and semantics of the code under test. In this work, we introduce a non-intrusive preprocessing approach for computing structural coverage information. It uses a static partial evaluation of the decisions in the source code and a source-to-bytecode mapping to generate the information necessary to efficiently track structural coverage metrics during execution. Our technique is flexible; the results of the preprocessing can be used by a variety of coverage-driven software analysis tasks, including automated analyses that are not possible for instrumented code. Experimental results in the context of symbolic execution show the efficiency and flexibility of our nonintrusive approach for computing code coverage information

  2. "SMART": A Compact and Handy FORTRAN Code for the Physics of Stellar Atmospheres

    NASA Astrophysics Data System (ADS)

    Sapar, A.; Poolamäe, R.

    2003-01-01

    A new computer code SMART (Spectra from Model Atmospheres by Radiative Transfer) for computing the stellar spectra, forming in plane-parallel atmospheres, has been compiled by us and A. Aret. To guarantee wide compatibility of the code with shell environment, we chose FORTRAN-77 as programming language and tried to confine ourselves to common part of its numerous versions both in WINDOWS and LINUX. SMART can be used for studies of several processes in stellar atmospheres. The current version of the programme is undergoing rapid changes due to our goal to elaborate a simple, handy and compact code. Instead of linearisation (being a mathematical method of recurrent approximations) we propose to use the physical evolutionary changes or in other words relaxation of quantum state populations rates from LTE to NLTE has been studied using small number of NLTE states. This computational scheme is essentially simpler and more compact than the linearisation. This relaxation scheme enables using instead of the Λ-iteration procedure a physically changing emissivity (or the source function) which incorporates in itself changing Menzel coefficients for NLTE quantum state populations. However, the light scattering on free electrons is in the terms of Feynman graphs a real second-order quantum process and cannot be reduced to consequent processes of absorption and emission as in the case of radiative transfer in spectral lines. With duly chosen input parameters the code SMART enables computing radiative acceleration to the matter of stellar atmosphere in turbulence clumps. This also enables to connect the model atmosphere in more detail with the problem of the stellar wind triggering. Another problem, which has been incorporated into the computer code SMART, is diffusion of chemical elements and their isotopes in the atmospheres of chemically peculiar (CP) stars due to usual radiative acceleration and the essential additional acceleration generated by the light-induced drift. As a special case, using duly chosen pixels on the stellar disk, the spectrum of rotating star can be computed. No instrumental broadening has been incorporated in the code of SMART. To facilitate study of stellar spectra, a GUI (Graphical User Interface) with selection of labels by ions has been compiled to study the spectral lines of different elements and ions in the computed emergent flux. An amazing feature of SMART is that its code is very short: it occupies only 4 two-sided two-column A4 sheets in landscape format. In addition, if well commented, it is quite easily readable and understandable. We have used the tactics of writing the comments on the right-side margin (columns starting from 73). Such short code has been composed widely using the unified input physics (for example the ionisation cross-sections for bound-free transitions and the electron and ion collision rates). As current restriction to the application area of the present version of the SMART is that molecules are since ignored. Thus, it can be used only for luke and hot stellar atmospheres. In the computer code we have tried to avoid bulky often over-optimised methods, primarily meant to spare the time of computations. For instance, we compute the continuous absorption coefficient at every wavelength. Nevertheless, during an hour by the personal computer in our disposal AMD Athlon XP 1700+, 512MB DDRAM) a stellar spectrum with spectral step resolution λ / dλ = 3D100,000 for spectral interval 700 -- 30,000 Å is computed. The model input data and the line data used by us are both the ones computed and compiled by R. Kurucz. In order to follow presence and representability of quantum states and to enumerate them for NLTE studies a C++ code, transforming the needed data to the LATEX version, has been compiled. Thus we have composed a quantum state list for all neutrals and ions in the Kurucz file 'gfhyperall.dat'. The list enables more adequately to compose the concept of super-states, including partly correlating super-states. We are grateful to R. Kurucz for making available by CD-ROMs and Internet his computer codes ATLAS and SYNTHE used by us as a starting point in composing of the new computer code. We are also grateful to Estonian Science Foundation for grant ESF-4701.

  3. Guide to AERO2S and WINGDES Computer Codes for Prediction and Minimization of Drag Due to Lift

    NASA Technical Reports Server (NTRS)

    Carlson, Harry W.; Chu, Julio; Ozoroski, Lori P.; McCullers, L. Arnold

    1997-01-01

    The computer codes, AER02S and WINGDES, are now widely used for the analysis and design of airplane lifting surfaces under conditions that tend to induce flow separation. These codes have undergone continued development to provide additional capabilities since the introduction of the original versions over a decade ago. This code development has been reported in a variety of publications (NASA technical papers, NASA contractor reports, and society journals). Some modifications have not been publicized at all. Users of these codes have suggested the desirability of combining in a single document the descriptions of the code development, an outline of the features of each code, and suggestions for effective code usage. This report is intended to supply that need.

  4. Transferring ecosystem simulation codes to supercomputers

    NASA Technical Reports Server (NTRS)

    Skiles, J. W.; Schulbach, C. H.

    1995-01-01

    Many ecosystem simulation computer codes have been developed in the last twenty-five years. This development took place initially on main-frame computers, then mini-computers, and more recently, on micro-computers and workstations. Supercomputing platforms (both parallel and distributed systems) have been largely unused, however, because of the perceived difficulty in accessing and using the machines. Also, significant differences in the system architectures of sequential, scalar computers and parallel and/or vector supercomputers must be considered. We have transferred a grassland simulation model (developed on a VAX) to a Cray Y-MP/C90. We describe porting the model to the Cray and the changes we made to exploit the parallelism in the application and improve code execution. The Cray executed the model 30 times faster than the VAX and 10 times faster than a Unix workstation. We achieved an additional speedup of 30 percent by using the compiler's vectoring and 'in-line' capabilities. The code runs at only about 5 percent of the Cray's peak speed because it ineffectively uses the vector and parallel processing capabilities of the Cray. We expect that by restructuring the code, it could execute an additional six to ten times faster.

  5. Duct flow nonuniformities for Space Shuttle Main Engine (SSME)

    NASA Technical Reports Server (NTRS)

    1987-01-01

    A three-duct Space Shuttle Main Engine (SSME) Hot Gas Manifold geometry code was developed for use. The methodology of the program is described, recommendations on its implementation made, and an input guide, input deck listing, and a source code listing provided. The code listing is strewn with an abundance of comments to assist the user in following its development and logic. A working source deck will be provided. A thorough analysis was made of the proper boundary conditions and chemistry kinetics necessary for an accurate computational analysis of the flow environment in the SSME fuel side preburner chamber during the initial startup transient. Pertinent results were presented to facilitate incorporation of these findings into an appropriate CFD code. The computation must be a turbulent computation, since the flow field turbulent mixing will have a profound effect on the chemistry. Because of the additional equations demanded by the chemistry model it is recommended that for expediency a simple algebraic mixing length model be adopted. Performing this computation for all or selected time intervals of the startup time will require an abundance of computer CPU time regardless of the specific CFD code selected.

  6. War of Ontology Worlds: Mathematics, Computer Code, or Esperanto?

    PubMed Central

    Rzhetsky, Andrey; Evans, James A.

    2011-01-01

    The use of structured knowledge representations—ontologies and terminologies—has become standard in biomedicine. Definitions of ontologies vary widely, as do the values and philosophies that underlie them. In seeking to make these views explicit, we conducted and summarized interviews with a dozen leading ontologists. Their views clustered into three broad perspectives that we summarize as mathematics, computer code, and Esperanto. Ontology as mathematics puts the ultimate premium on rigor and logic, symmetry and consistency of representation across scientific subfields, and the inclusion of only established, non-contradictory knowledge. Ontology as computer code focuses on utility and cultivates diversity, fitting ontologies to their purpose. Like computer languages C++, Prolog, and HTML, the code perspective holds that diverse applications warrant custom designed ontologies. Ontology as Esperanto focuses on facilitating cross-disciplinary communication, knowledge cross-referencing, and computation across datasets from diverse communities. We show how these views align with classical divides in science and suggest how a synthesis of their concerns could strengthen the next generation of biomedical ontologies. PMID:21980276

  7. Verifying a computational method for predicting extreme ground motion

    USGS Publications Warehouse

    Harris, R.A.; Barall, M.; Andrews, D.J.; Duan, B.; Ma, S.; Dunham, E.M.; Gabriel, A.-A.; Kaneko, Y.; Kase, Y.; Aagaard, Brad T.; Oglesby, D.D.; Ampuero, J.-P.; Hanks, T.C.; Abrahamson, N.

    2011-01-01

    In situations where seismological data is rare or nonexistent, computer simulations may be used to predict ground motions caused by future earthquakes. This is particularly practical in the case of extreme ground motions, where engineers of special buildings may need to design for an event that has not been historically observed but which may occur in the far-distant future. Once the simulations have been performed, however, they still need to be tested. The SCEC-USGS dynamic rupture code verification exercise provides a testing mechanism for simulations that involve spontaneous earthquake rupture. We have performed this examination for the specific computer code that was used to predict maximum possible ground motion near Yucca Mountain. Our SCEC-USGS group exercises have demonstrated that the specific computer code that was used for the Yucca Mountain simulations produces similar results to those produced by other computer codes when tackling the same science problem. We also found that the 3D ground motion simulations produced smaller ground motions than the 2D simulations.

  8. An evaluation of four single element airfoil analytic methods

    NASA Technical Reports Server (NTRS)

    Freuler, R. J.; Gregorek, G. M.

    1979-01-01

    A comparison of four computer codes for the analysis of two-dimensional single element airfoil sections is presented for three classes of section geometries. Two of the computer codes utilize vortex singularities methods to obtain the potential flow solution. The other two codes solve the full inviscid potential flow equation using finite differencing techniques, allowing results to be obtained for transonic flow about an airfoil including weak shocks. Each program incorporates boundary layer routines for computing the boundary layer displacement thickness and boundary layer effects on aerodynamic coefficients. Computational results are given for a symmetrical section represented by an NACA 0012 profile, a conventional section illustrated by an NACA 65A413 profile, and a supercritical type section for general aviation applications typified by a NASA LS(1)-0413 section. The four codes are compared and contrasted in the areas of method of approach, range of applicability, agreement among each other and with experiment, individual advantages and disadvantages, computer run times and memory requirements, and operational idiosyncrasies.

  9. War of ontology worlds: mathematics, computer code, or Esperanto?

    PubMed

    Rzhetsky, Andrey; Evans, James A

    2011-09-01

    The use of structured knowledge representations-ontologies and terminologies-has become standard in biomedicine. Definitions of ontologies vary widely, as do the values and philosophies that underlie them. In seeking to make these views explicit, we conducted and summarized interviews with a dozen leading ontologists. Their views clustered into three broad perspectives that we summarize as mathematics, computer code, and Esperanto. Ontology as mathematics puts the ultimate premium on rigor and logic, symmetry and consistency of representation across scientific subfields, and the inclusion of only established, non-contradictory knowledge. Ontology as computer code focuses on utility and cultivates diversity, fitting ontologies to their purpose. Like computer languages C++, Prolog, and HTML, the code perspective holds that diverse applications warrant custom designed ontologies. Ontology as Esperanto focuses on facilitating cross-disciplinary communication, knowledge cross-referencing, and computation across datasets from diverse communities. We show how these views align with classical divides in science and suggest how a synthesis of their concerns could strengthen the next generation of biomedical ontologies.

  10. 48 CFR 1819.1005 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... System (NAICS) codes are: NAICS code Industry category 334111 Electronic Computer Manufacturing. 334418... Manufacturing. 334119 Other Computer Peripheral Equipment Manufacturing. 33422 Radio and Television Broadcasting and Wireless Communication Equipment Manufacturing. 336415 Guided Missile and Space Vehicle Propulsion...

  11. 48 CFR 1819.1005 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... System (NAICS) codes are: NAICS code Industry category 334111 Electronic Computer Manufacturing. 334418... Manufacturing. 334119 Other Computer Peripheral Equipment Manufacturing. 33422 Radio and Television Broadcasting and Wireless Communication Equipment Manufacturing. 336415 Guided Missile and Space Vehicle Propulsion...

  12. 48 CFR 1819.1005 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... System (NAICS) codes are: NAICS code Industry category 334111 Electronic Computer Manufacturing. 334418... Manufacturing. 334119 Other Computer Peripheral Equipment Manufacturing. 33422 Radio and Television Broadcasting and Wireless Communication Equipment Manufacturing. 336415 Guided Missile and Space Vehicle Propulsion...

  13. 40 CFR 1048.110 - How must my engines diagnose malfunctions?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., the MIL may stay off during later engine operation. (d) Store trouble codes in computer memory. Record and store in computer memory any diagnostic trouble codes showing a malfunction that should illuminate...

  14. Recent applications of the transonic wing analysis computer code, TWING

    NASA Technical Reports Server (NTRS)

    Subramanian, N. R.; Holst, T. L.; Thomas, S. D.

    1982-01-01

    An evaluation of the transonic-wing-analysis computer code TWING is given. TWING utilizes a fully implicit approximate factorization iteration scheme to solve the full potential equation in conservative form. A numerical elliptic-solver grid-generation scheme is used to generate the required finite-difference mesh. Several wing configurations were analyzed, and the limits of applicability of this code was evaluated. Comparisons of computed results were made with available experimental data. Results indicate that the code is robust, accurate (when significant viscous effects are not present), and efficient. TWING generally produces solutions an order of magnitude faster than other conservative full potential codes using successive-line overrelaxation. The present method is applicable to a wide range of isolated wing configurations including high-aspect-ratio transport wings and low-aspect-ratio, high-sweep, fighter configurations.

  15. Response surface method in geotechnical/structural analysis, phase 1

    NASA Astrophysics Data System (ADS)

    Wong, F. S.

    1981-02-01

    In the response surface approach, an approximating function is fit to a long running computer code based on a limited number of code calculations. The approximating function, called the response surface, is then used to replace the code in subsequent repetitive computations required in a statistical analysis. The procedure of the response surface development and feasibility of the method are shown using a sample problem in slop stability which is based on data from centrifuge experiments of model soil slopes and involves five random soil parameters. It is shown that a response surface can be constructed based on as few as four code calculations and that the response surface is computationally extremely efficient compared to the code calculation. Potential applications of this research include probabilistic analysis of dynamic, complex, nonlinear soil/structure systems such as slope stability, liquefaction, and nuclear reactor safety.

  16. User's Manual for FEMOM3DS. Version 1.0

    NASA Technical Reports Server (NTRS)

    Reddy, C.J.; Deshpande, M. D.

    1997-01-01

    FEMOM3DS is a computer code written in FORTRAN 77 to compute electromagnetic(EM) scattering characteristics of a three dimensional object with complex materials using combined Finite Element Method (FEM)/Method of Moments (MoM) technique. This code uses the tetrahedral elements, with vector edge basis functions for FEM in the volume of the cavity and the triangular elements with the basis functions similar to that described for MoM at the outer boundary. By virtue of FEM, this code can handle any arbitrarily shaped three-dimensional cavities filled with inhomogeneous lossy materials. The User's Manual is written to make the user acquainted with the operation of the code. The user is assumed to be familiar with the FORTRAN 77 language and the operating environment of the computers on which the code is intended to run.

  17. Performance measures for transform data coding.

    NASA Technical Reports Server (NTRS)

    Pearl, J.; Andrews, H. C.; Pratt, W. K.

    1972-01-01

    This paper develops performance criteria for evaluating transform data coding schemes under computational constraints. Computational constraints that conform with the proposed basis-restricted model give rise to suboptimal coding efficiency characterized by a rate-distortion relation R(D) similar in form to the theoretical rate-distortion function. Numerical examples of this performance measure are presented for Fourier, Walsh, Haar, and Karhunen-Loeve transforms.

  18. The Unified English Braille Code: Examination by Science, Mathematics, and Computer Science Technical Expert Braille Readers

    ERIC Educational Resources Information Center

    Holbrook, M. Cay; MacCuspie, P. Ann

    2010-01-01

    Braille-reading mathematicians, scientists, and computer scientists were asked to examine the usability of the Unified English Braille Code (UEB) for technical materials. They had little knowledge of the code prior to the study. The research included two reading tasks, a short tutorial about UEB, and a focus group. The results indicated that the…

  19. A Coding System for Qualitative Studies of the Information-Seeking Process in Computer Science Research

    ERIC Educational Resources Information Center

    Moral, Cristian; de Antonio, Angelica; Ferre, Xavier; Lara, Graciela

    2015-01-01

    Introduction: In this article we propose a qualitative analysis tool--a coding system--that can support the formalisation of the information-seeking process in a specific field: research in computer science. Method: In order to elaborate the coding system, we have conducted a set of qualitative studies, more specifically a focus group and some…

  20. Improvements to a method for the geometrically nonlinear analysis of compressively loaded stiffened composite panels

    NASA Technical Reports Server (NTRS)

    Stoll, Frederick

    1993-01-01

    The NLPAN computer code uses a finite-strip approach to the analysis of thin-walled prismatic composite structures such as stiffened panels. The code can model in-plane axial loading, transverse pressure loading, and constant through-the-thickness thermal loading, and can account for shape imperfections. The NLPAN code represents an attempt to extend the buckling analysis of the VIPASA computer code into the geometrically nonlinear regime. Buckling mode shapes generated using VIPASA are used in NLPAN as global functions for representing displacements in the nonlinear regime. While the NLPAN analysis is approximate in nature, it is computationally economical in comparison with finite-element analysis, and is thus suitable for use in preliminary design and design optimization. A comprehensive description of the theoretical approach of NLPAN is provided. A discussion of some operational considerations for the NLPAN code is included. NLPAN is applied to several test problems in order to demonstrate new program capabilities, and to assess the accuracy of the code in modeling various types of loading and response. User instructions for the NLPAN computer program are provided, including a detailed description of the input requirements and example input files for two stiffened-panel configurations.

  1. CAVE: A computer code for two-dimensional transient heating analysis of conceptual thermal protection systems for hypersonic vehicles

    NASA Technical Reports Server (NTRS)

    Rathjen, K. A.

    1977-01-01

    A digital computer code CAVE (Conduction Analysis Via Eigenvalues), which finds application in the analysis of two dimensional transient heating of hypersonic vehicles is described. The CAVE is written in FORTRAN 4 and is operational on both IBM 360-67 and CDC 6600 computers. The method of solution is a hybrid analytical numerical technique that is inherently stable permitting large time steps even with the best of conductors having the finest of mesh size. The aerodynamic heating boundary conditions are calculated by the code based on the input flight trajectory or can optionally be calculated external to the code and then entered as input data. The code computes the network conduction and convection links, as well as capacitance values, given basic geometrical and mesh sizes, for four generations (leading edges, cooled panels, X-24C structure and slabs). Input and output formats are presented and explained. Sample problems are included. A brief summary of the hybrid analytical-numerical technique, which utilizes eigenvalues (thermal frequencies) and eigenvectors (thermal mode vectors) is given along with aerodynamic heating equations that have been incorporated in the code and flow charts.

  2. Modernization and optimization of a legacy open-source CFD code for high-performance computing architectures

    DOE PAGES

    Gel, Aytekin; Hu, Jonathan; Ould-Ahmed-Vall, ElMoustapha; ...

    2017-03-20

    Legacy codes remain a crucial element of today's simulation-based engineering ecosystem due to the extensive validation process and investment in such software. The rapid evolution of high-performance computing architectures necessitates the modernization of these codes. One approach to modernization is a complete overhaul of the code. However, this could require extensive investments, such as rewriting in modern languages, new data constructs, etc., which will necessitate systematic verification and validation to re-establish the credibility of the computational models. The current study advocates using a more incremental approach and is a culmination of several modernization efforts of the legacy code MFIX, whichmore » is an open-source computational fluid dynamics code that has evolved over several decades, widely used in multiphase flows and still being developed by the National Energy Technology Laboratory. Two different modernization approaches,‘bottom-up’ and ‘top-down’, are illustrated. Here, preliminary results show up to 8.5x improvement at the selected kernel level with the first approach, and up to 50% improvement in total simulated time with the latter were achieved for the demonstration cases and target HPC systems employed.« less

  3. Modernization and optimization of a legacy open-source CFD code for high-performance computing architectures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gel, Aytekin; Hu, Jonathan; Ould-Ahmed-Vall, ElMoustapha

    Legacy codes remain a crucial element of today's simulation-based engineering ecosystem due to the extensive validation process and investment in such software. The rapid evolution of high-performance computing architectures necessitates the modernization of these codes. One approach to modernization is a complete overhaul of the code. However, this could require extensive investments, such as rewriting in modern languages, new data constructs, etc., which will necessitate systematic verification and validation to re-establish the credibility of the computational models. The current study advocates using a more incremental approach and is a culmination of several modernization efforts of the legacy code MFIX, whichmore » is an open-source computational fluid dynamics code that has evolved over several decades, widely used in multiphase flows and still being developed by the National Energy Technology Laboratory. Two different modernization approaches,‘bottom-up’ and ‘top-down’, are illustrated. Here, preliminary results show up to 8.5x improvement at the selected kernel level with the first approach, and up to 50% improvement in total simulated time with the latter were achieved for the demonstration cases and target HPC systems employed.« less

  4. Method for rapid high-frequency seismogram calculation

    NASA Astrophysics Data System (ADS)

    Stabile, Tony Alfredo; De Matteis, Raffaella; Zollo, Aldo

    2009-02-01

    We present a method for rapid, high-frequency seismogram calculation that makes use of an algorithm to automatically generate an exhaustive set of seismic phases with an appreciable amplitude on the seismogram. The method uses a hierarchical order of ray and seismic-phase generation, taking into account some existing constraints for ray paths and some physical constraints. To compute synthetic seismograms, the COMRAD code (from the Italian: "COdice Multifase per il RAy-tracing Dinamico") uses as core a dynamic ray-tracing code. To validate the code, we have computed in a layered medium synthetic seismograms using both COMRAD and a code that computes the complete wave field by the discrete wave number method. The seismograms are compared according to a time-frequency misfit criteria based on the continuous wavelet transform of the signals. Although the number of phases is considerably reduced by the selection criteria, the results show that the loss in amplitude on the whole seismogram is negligible. Moreover, the time for the computing of the synthetics using the COMRAD code (truncating the ray series at the 10th generation) is 3-4-fold less than that needed for the AXITRA code (up to a frequency of 25 Hz).

  5. Validation of the NCC Code for Staged Transverse Injection and Computations for a RBCC Combustor

    NASA Technical Reports Server (NTRS)

    Ajmani, Kumud; Liu, Nan-Suey

    2005-01-01

    The NCC code was validated for a case involving staged transverse injection into Mach 2 flow behind a rearward facing step. Comparisons with experimental data and with solutions from the FPVortex code was then used to perform computations to study fuel-air mixing for the combustor of a candidate rocket based combined cycle engine geometry. Comparisons with a one-dimensional analysis and a three-dimensional code (VULCAN) were performed to assess the qualitative and quantitative performance of the NCC solver.

  6. A supersonic three-dimensional code for flow over blunt bodies: Program documentation and test cases

    NASA Technical Reports Server (NTRS)

    Chaussee, D. S.; Mcmillan, O. J.

    1980-01-01

    The use of a computer code for the calculation of steady, supersonic, three dimensional, inviscid flow over blunt bodies is illustrated. Input and output are given and explained for two cases: a pointed code of 20 deg half angle at 15 deg angle of attack in a free stream with M sub infinite = 7, and a cone-ogive-cylinder at 10 deg angle of attack with M sub infinite = 2.86. A source listing of the computer code is provided.

  7. PLASIM: A computer code for simulating charge exchange plasma propagation

    NASA Technical Reports Server (NTRS)

    Robinson, R. S.; Deininger, W. D.; Winder, D. R.; Kaufman, H. R.

    1982-01-01

    The propagation of the charge exchange plasma for an electrostatic ion thruster is crucial in determining the interaction of that plasma with the associated spacecraft. A model that describes this plasma and its propagation is described, together with a computer code based on this model. The structure and calling sequence of the code, named PLASIM, is described. An explanation of the program's input and output is included, together with samples of both. The code is written in ANSI Standard FORTRAN.

  8. Extension, validation and application of the NASCAP code

    NASA Technical Reports Server (NTRS)

    Katz, I.; Cassidy, J. J., III; Mandell, M. J.; Schnuelle, G. W.; Steen, P. G.; Parks, D. E.; Rotenberg, M.; Alexander, J. H.

    1979-01-01

    Numerous extensions were made in the NASCAP code. They fall into three categories: a greater range of definable objects, a more sophisticated computational model, and simplified code structure and usage. An important validation of NASCAP was performed using a new two dimensional computer code (TWOD). An interactive code (MATCHG) was written to compare material parameter inputs with charging results. The first major application of NASCAP was performed on the SCATHA satellite. Shadowing and charging calculation were completed. NASCAP was installed at the Air Force Geophysics Laboratory, where researchers plan to use it to interpret SCATHA data.

  9. Calculation of inviscid flow over shuttle-like vehicles at high angles of attack and comparisons with experimental data

    NASA Technical Reports Server (NTRS)

    Weilmuenster, K. J.; Hamilton, H. H., II

    1983-01-01

    A computer code HALIS, designed to compute the three dimensional flow about shuttle like configurations at angles of attack greater than 25 deg, is described. Results from HALIS are compared where possible with an existing flow field code; such comparisons show excellent agreement. Also, HALIS results are compared with experimental pressure distributions on shuttle models over a wide range of angle of attack. These comparisons are excellent. It is demonstrated that the HALIS code can incorporate equilibrium air chemistry in flow field computations.

  10. Analysis of JSI TRIGA MARK II reactor physical parameters calculated with TRIPOLI and MCNP.

    PubMed

    Henry, R; Tiselj, I; Snoj, L

    2015-03-01

    New computational model of the JSI TRIGA Mark II research reactor was built for TRIPOLI computer code and compared with existing MCNP code model. The same modelling assumptions were used in order to check the differences of the mathematical models of both Monte Carlo codes. Differences between the TRIPOLI and MCNP predictions of keff were up to 100pcm. Further validation was performed with analyses of the normalized reaction rates and computations of kinetic parameters for various core configurations. Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. A comparison of two central difference schemes for solving the Navier-Stokes equations

    NASA Technical Reports Server (NTRS)

    Maksymiuk, C. M.; Swanson, R. C.; Pulliam, T. H.

    1990-01-01

    Five viscous transonic airfoil cases were computed by two significantly different computational fluid dynamics codes: An explicit finite-volume algorithm with multigrid, and an implicit finite-difference approximate-factorization method with Eigenvector diagonalization. Both methods are described in detail, and their performance on the test cases is compared. The codes utilized the same grids, turbulence model, and computer to provide the truest test of the algorithms. The two approaches produce very similar results, which, for attached flows, also agree well with experimental results; however, the explicit code is considerably faster.

  12. STEMsalabim: A high-performance computing cluster friendly code for scanning transmission electron microscopy image simulations of thin specimens.

    PubMed

    Oelerich, Jan Oliver; Duschek, Lennart; Belz, Jürgen; Beyer, Andreas; Baranovskii, Sergei D; Volz, Kerstin

    2017-06-01

    We present a new multislice code for the computer simulation of scanning transmission electron microscope (STEM) images based on the frozen lattice approximation. Unlike existing software packages, the code is optimized to perform well on highly parallelized computing clusters, combining distributed and shared memory architectures. This enables efficient calculation of large lateral scanning areas of the specimen within the frozen lattice approximation and fine-grained sweeps of parameter space. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Evaluation of the efficiency and fault density of software generated by code generators

    NASA Technical Reports Server (NTRS)

    Schreur, Barbara

    1993-01-01

    Flight computers and flight software are used for GN&C (guidance, navigation, and control), engine controllers, and avionics during missions. The software development requires the generation of a considerable amount of code. The engineers who generate the code make mistakes and the generation of a large body of code with high reliability requires considerable time. Computer-aided software engineering (CASE) tools are available which generates code automatically with inputs through graphical interfaces. These tools are referred to as code generators. In theory, code generators could write highly reliable code quickly and inexpensively. The various code generators offer different levels of reliability checking. Some check only the finished product while some allow checking of individual modules and combined sets of modules as well. Considering NASA's requirement for reliability, an in house manually generated code is needed. Furthermore, automatically generated code is reputed to be as efficient as the best manually generated code when executed. In house verification is warranted.

  14. Application of a personal computer for the uncoupled vibration analysis of wind turbine blade and counterweight assemblies

    NASA Technical Reports Server (NTRS)

    White, P. R.; Little, R. R.

    1985-01-01

    A research effort was undertaken to develop personal computer based software for vibrational analysis. The software was developed to analytically determine the natural frequencies and mode shapes for the uncoupled lateral vibrations of the blade and counterweight assemblies used in a single bladed wind turbine. The uncoupled vibration analysis was performed in both the flapwise and chordwise directions for static rotor conditions. The effects of rotation on the uncoupled flapwise vibration of the blade and counterweight assemblies were evaluated for various rotor speeds up to 90 rpm. The theory, used in the vibration analysis codes, is based on a lumped mass formulation for the blade and counterweight assemblies. The codes are general so that other designs can be readily analyzed. The input for the codes is generally interactive to facilitate usage. The output of the codes is both tabular and graphical. Listings of the codes are provided. Predicted natural frequencies of the first several modes show reasonable agreement with experimental results. The analysis codes were originally developed on a DEC PDP 11/34 minicomputer and then downloaded and modified to run on an ITT XTRA personal computer. Studies conducted to evaluate the efficiency of running the programs on a personal computer as compared with the minicomputer indicated that, with the proper combination of hardware and software options, the efficiency of using a personal computer exceeds that of a minicomputer.

  15. TERRA: a computer code for simulating the transport of environmentally released radionuclides through agriculture

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baes, C.F. III; Sharp, R.D.; Sjoreen, A.L.

    1984-11-01

    TERRA is a computer code which calculates concentrations of radionuclides and ingrowing daughters in surface and root-zone soil, produce and feed, beef, and milk from a given deposition rate at any location in the conterminous United States. The code is fully integrated with seven other computer codes which together comprise a Computerized Radiological Risk Investigation System, CRRIS. Output from either the long range (> 100 km) atmospheric dispersion code RETADD-II or the short range (<80 km) atmospheric dispersion code ANEMOS, in the form of radionuclide air concentrations and ground deposition rates by downwind location, serves as input to TERRA. User-definedmore » deposition rates and air concentrations may also be provided as input to TERRA through use of the PRIMUS computer code. The environmental concentrations of radionuclides predicted by TERRA serve as input to the ANDROS computer code which calculates population and individual intakes, exposures, doses, and risks. TERRA incorporates models to calculate uptake from soil and atmospheric deposition on four groups of produce for human consumption and four groups of livestock feeds. During the environmental transport simulation, intermediate calculations of interception fraction for leafy vegetables, produce directly exposed to atmospherically depositing material, pasture, hay, and silage are made based on location-specific estimates of standing crop biomass. Pasture productivity is estimated by a model which considers the number and types of cattle and sheep, pasture area, and annual production of other forages (hay and silage) at a given location. Calculations are made of the fraction of grain imported from outside the assessment area. TERRA output includes the above calculations and estimated radionuclide concentrations in plant produce, milk, and a beef composite by location.« less

  16. A survey to identify the clinical coding and classification systems currently in use across Europe.

    PubMed

    de Lusignan, S; Minmagh, C; Kennedy, J; Zeimet, M; Bommezijn, H; Bryant, J

    2001-01-01

    This is a survey to identify what clinical coding systems are currently in use across the European Union, and the states seeking membership to it. We sought to identify what systems are currently used and to what extent they were subject to local adaptation. Clinical coding should facilitate identifying key medical events in a computerised medical record, and aggregating information across groups of records. The emerging new driver is as the enabler of the life-long computerised medical record. A prerequisite for this level of functionality is the transfer of information between different computer systems. This transfer can be facilitated either by working on the interoperability problems between disparate systems or by harmonising the underlying data. This paper examines the extent to which the latter has occurred across Europe. Literature and Internet search. Requests for information via electronic mail to pan-European mailing lists of health informatics professionals. Coding systems are now a de facto part of health information systems across Europe. There are relatively few coding systems in existence across Europe. ICD9 and ICD 10, ICPC and Read were the most established. However the local adaptation of these classification systems either on a by country or by computer software manufacturer basis; significantly reduces the ability for the meaning coded with patients computer records to be easily transferred from one medical record system to another. There is no longer any debate as to whether a coding or classification system should be used. Convergence of different classifications systems should be encouraged. Countries and computer manufacturers within the EU should be encouraged to stop making local modifications to coding and classification systems, as this practice risks significantly slowing progress towards easy transfer of records between computer systems.

  17. PIC codes for plasma accelerators on emerging computer architectures (GPUS, Multicore/Manycore CPUS)

    NASA Astrophysics Data System (ADS)

    Vincenti, Henri

    2016-03-01

    The advent of exascale computers will enable 3D simulations of a new laser-plasma interaction regimes that were previously out of reach of current Petasale computers. However, the paradigm used to write current PIC codes will have to change in order to fully exploit the potentialities of these new computing architectures. Indeed, achieving Exascale computing facilities in the next decade will be a great challenge in terms of energy consumption and will imply hardware developments directly impacting our way of implementing PIC codes. As data movement (from die to network) is by far the most energy consuming part of an algorithm future computers will tend to increase memory locality at the hardware level and reduce energy consumption related to data movement by using more and more cores on each compute nodes (''fat nodes'') that will have a reduced clock speed to allow for efficient cooling. To compensate for frequency decrease, CPU machine vendors are making use of long SIMD instruction registers that are able to process multiple data with one arithmetic operator in one clock cycle. SIMD register length is expected to double every four years. GPU's also have a reduced clock speed per core and can process Multiple Instructions on Multiple Datas (MIMD). At the software level Particle-In-Cell (PIC) codes will thus have to achieve both good memory locality and vectorization (for Multicore/Manycore CPU) to fully take advantage of these upcoming architectures. In this talk, we present the portable solutions we implemented in our high performance skeleton PIC code PICSAR to both achieve good memory locality and cache reuse as well as good vectorization on SIMD architectures. We also present the portable solutions used to parallelize the Pseudo-sepctral quasi-cylindrical code FBPIC on GPUs using the Numba python compiler.

  18. Some Problems and Solutions in Transferring Ecosystem Simulation Codes to Supercomputers

    NASA Technical Reports Server (NTRS)

    Skiles, J. W.; Schulbach, C. H.

    1994-01-01

    Many computer codes for the simulation of ecological systems have been developed in the last twenty-five years. This development took place initially on main-frame computers, then mini-computers, and more recently, on micro-computers and workstations. Recent recognition of ecosystem science as a High Performance Computing and Communications Program Grand Challenge area emphasizes supercomputers (both parallel and distributed systems) as the next set of tools for ecological simulation. Transferring ecosystem simulation codes to such systems is not a matter of simply compiling and executing existing code on the supercomputer since there are significant differences in the system architectures of sequential, scalar computers and parallel and/or vector supercomputers. To more appropriately match the application to the architecture (necessary to achieve reasonable performance), the parallelism (if it exists) of the original application must be exploited. We discuss our work in transferring a general grassland simulation model (developed on a VAX in the FORTRAN computer programming language) to a Cray Y-MP. We show the Cray shared-memory vector-architecture, and discuss our rationale for selecting the Cray. We describe porting the model to the Cray and executing and verifying a baseline version, and we discuss the changes we made to exploit the parallelism in the application and to improve code execution. As a result, the Cray executed the model 30 times faster than the VAX 11/785 and 10 times faster than a Sun 4 workstation. We achieved an additional speed-up of approximately 30 percent over the original Cray run by using the compiler's vectorizing capabilities and the machine's ability to put subroutines and functions "in-line" in the code. With the modifications, the code still runs at only about 5% of the Cray's peak speed because it makes ineffective use of the vector processing capabilities of the Cray. We conclude with a discussion and future plans.

  19. User's manual: Subsonic/supersonic advanced panel pilot code

    NASA Technical Reports Server (NTRS)

    Moran, J.; Tinoco, E. N.; Johnson, F. T.

    1978-01-01

    Sufficient instructions for running the subsonic/supersonic advanced panel pilot code were developed. This software was developed as a vehicle for numerical experimentation and it should not be construed to represent a finished production program. The pilot code is based on a higher order panel method using linearly varying source and quadratically varying doublet distributions for computing both linearized supersonic and subsonic flow over arbitrary wings and bodies. This user's manual contains complete input and output descriptions. A brief description of the method is given as well as practical instructions for proper configurations modeling. Computed results are also included to demonstrate some of the capabilities of the pilot code. The computer program is written in FORTRAN IV for the SCOPE 3.4.4 operations system of the Ames CDC 7600 computer. The program uses overlay structure and thirteen disk files, and it requires approximately 132000 (Octal) central memory words.

  20. Experimental aerothermodynamic research of hypersonic aircraft

    NASA Technical Reports Server (NTRS)

    Cleary, Joseph W.

    1987-01-01

    The 2-D and 3-D advance computer codes being developed for use in the design of such hypersonic aircraft as the National Aero-Space Plane require comparison of the computational results with a broad spectrum of experimental data to fully assess the validity of the codes. This is particularly true for complex flow fields with control surfaces present and for flows with separation, such as leeside flow. Therefore, the objective is to provide a hypersonic experimental data base required for validation of advanced computational fluid dynamics (CFD) computer codes and for development of more thorough understanding of the flow physics necessary for these codes. This is being done by implementing a comprehensive test program for a generic all-body hypersonic aircraft model in the NASA/Ames 3.5 foot Hypersonic Wind Tunnel over a broad range of test conditions to obtain pertinent surface and flowfield data. Results from the flow visualization portion of the investigation are presented.

  1. Verification of a Viscous Computational Aeroacoustics Code using External Verification Analysis

    NASA Technical Reports Server (NTRS)

    Ingraham, Daniel; Hixon, Ray

    2015-01-01

    The External Verification Analysis approach to code verification is extended to solve the three-dimensional Navier-Stokes equations with constant properties, and is used to verify a high-order computational aeroacoustics (CAA) code. After a brief review of the relevant literature, the details of the EVA approach are presented and compared to the similar Method of Manufactured Solutions (MMS). Pseudocode representations of EVA's algorithms are included, along with the recurrence relations needed to construct the EVA solution. The code verification results show that EVA was able to convincingly verify a high-order, viscous CAA code without the addition of MMS-style source terms, or any other modifications to the code.

  2. Verification of a Viscous Computational Aeroacoustics Code Using External Verification Analysis

    NASA Technical Reports Server (NTRS)

    Ingraham, Daniel; Hixon, Ray

    2015-01-01

    The External Verification Analysis approach to code verification is extended to solve the three-dimensional Navier-Stokes equations with constant properties, and is used to verify a high-order computational aeroacoustics (CAA) code. After a brief review of the relevant literature, the details of the EVA approach are presented and compared to the similar Method of Manufactured Solutions (MMS). Pseudocode representations of EVA's algorithms are included, along with the recurrence relations needed to construct the EVA solution. The code verification results show that EVA was able to convincingly verify a high-order, viscous CAA code without the addition of MMS-style source terms, or any other modifications to the code.

  3. Additional extensions to the NASCAP computer code, volume 3

    NASA Technical Reports Server (NTRS)

    Mandell, M. J.; Cooke, D. L.

    1981-01-01

    The ION computer code is designed to calculate charge exchange ion densities, electric potentials, plasma temperatures, and current densities external to a neutralized ion engine in R-Z geometry. The present version assumes the beam ion current and density to be known and specified, and the neutralizing electrons to originate from a hot-wire ring surrounding the beam orifice. The plasma is treated as being resistive, with an electron relaxation time comparable to the plasma frequency. Together with the thermal and electrical boundary conditions described below and other straightforward engine parameters, these assumptions suffice to determine the required quantities. The ION code, written in ASCII FORTRAN for UNIVAC 1100 series computers, is designed to be run interactively, although it can also be run in batch mode. The input is free-format, and the output is mainly graphical, using the machine-independent graphics developed for the NASCAP code. The executive routine calls the code's major subroutines in user-specified order, and the code allows great latitude for restart and parameter change.

  4. Global Magnetohydrodynamic Simulation Using High Performance FORTRAN on Parallel Computers

    NASA Astrophysics Data System (ADS)

    Ogino, T.

    High Performance Fortran (HPF) is one of modern and common techniques to achieve high performance parallel computation. We have translated a 3-dimensional magnetohydrodynamic (MHD) simulation code of the Earth's magnetosphere from VPP Fortran to HPF/JA on the Fujitsu VPP5000/56 vector-parallel supercomputer and the MHD code was fully vectorized and fully parallelized in VPP Fortran. The entire performance and capability of the HPF MHD code could be shown to be almost comparable to that of VPP Fortran. A 3-dimensional global MHD simulation of the earth's magnetosphere was performed at a speed of over 400 Gflops with an efficiency of 76.5 VPP5000/56 in vector and parallel computation that permitted comparison with catalog values. We have concluded that fluid and MHD codes that are fully vectorized and fully parallelized in VPP Fortran can be translated with relative ease to HPF/JA, and a code in HPF/JA may be expected to perform comparably to the same code written in VPP Fortran.

  5. 77 FR 37091 - Agency Information Collection Activities: Request for Comments for a New Information Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ... analysis and design, and computer software design and coding. Given the fact that over $500 million were... acoustic algorithms, computer architecture, and source code that dated to the 1970s. Since that time... 2012. Version 3.0 is an entirely new, state-of-the-art computer program used for predicting noise...

  6. Education:=Coding+Aesthetics; Aesthetic Understanding, Computer Science Education, and Computational Thinking

    ERIC Educational Resources Information Center

    Good, Jonathon; Keenan, Sarah; Mishra, Punya

    2016-01-01

    The popular press is rife with examples of how students in the United States and around the globe are learning to program, make, and tinker. The Hour of Code, maker-education, and similar efforts are advocating that more students be exposed to principles found within computer science. We propose an expansion beyond simply teaching computational…

  7. Numerical, Analytical, Experimental Study of Fluid Dynamic Forces in Seals Volume 6: Description of Scientific CFD Code SCISEAL

    NASA Technical Reports Server (NTRS)

    Athavale, Mahesh; Przekwas, Andrzej

    2004-01-01

    The objectives of the program were to develop computational fluid dynamics (CFD) codes and simpler industrial codes for analyzing and designing advanced seals for air-breathing and space propulsion engines. The CFD code SCISEAL is capable of producing full three-dimensional flow field information for a variety of cylindrical configurations. An implicit multidomain capability allow the division of complex flow domains to allow optimum use of computational cells. SCISEAL also has the unique capability to produce cross-coupled stiffness and damping coefficients for rotordynamic computations. The industrial codes consist of a series of separate stand-alone modules designed for expeditious parametric analyses and optimization of a wide variety of cylindrical and face seals. Coupled through a Knowledge-Based System (KBS) that provides a user-friendly Graphical User Interface (GUI), the industrial codes are PC based using an OS/2 operating system. These codes were designed to treat film seals where a clearance exists between the rotating and stationary components. Leakage is inhibited by surface roughness, small but stiff clearance films, and viscous pumping devices. The codes have demonstrated to be a valuable resource for seal development of future air-breathing and space propulsion engines.

  8. Establishment of a Beta Test Center for the NPARC Code at Central State University

    NASA Technical Reports Server (NTRS)

    Okhio, Cyril B.

    1996-01-01

    Central State University has received a supplementary award to purchase computer workstations for the NPARC (National Propulsion Ames Research Center) computational fluid dynamics code BETA Test Center. The computational code has also been acquired for installation on the workstations. The acquisition of this code is an initial step for CSU in joining an alliance composed of NASA, AEDC, The Aerospace Industry, and academia. A post-Doctoral research Fellow from a neighboring university will assist the PI in preparing a template for Tutorial documents for the BETA test center. The major objective of the alliance is to establish a national applications-oriented CFD capability, centered on the NPARC code. By joining the alliance, the BETA test center at CSU will allow the PI, as well as undergraduate and post-graduate students to test the capability of the NPARC code in predicting the physics of aerodynamic/geometric configurations that are of interest to the alliance. Currently, CSU is developing a once a year, hands-on conference/workshop based upon the experience acquired from running other codes similar to the NPARC code in the first year of this grant.

  9. Microgravity computing codes. User's guide

    NASA Astrophysics Data System (ADS)

    1982-01-01

    Codes used in microgravity experiments to compute fluid parameters and to obtain data graphically are introduced. The computer programs are stored on two diskettes, compatible with the floppy disk drives of the Apple 2. Two versions of both disks are available (DOS-2 and DOS-3). The codes are written in BASIC and are structured as interactive programs. Interaction takes place through the keyboard of any Apple 2-48K standard system with single floppy disk drive. The programs are protected against wrong commands given by the operator. The programs are described step by step in the same order as the instructions displayed on the monitor. Most of these instructions are shown, with samples of computation and of graphics.

  10. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  11. Accelerating execution of the integrated TIGER series Monte Carlo radiation transport codes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, L.M.; Hochstedler, R.D.

    1997-02-01

    Execution of the integrated TIGER series (ITS) of coupled electron/photon Monte Carlo radiation transport codes has been accelerated by modifying the FORTRAN source code for more efficient computation. Each member code of ITS was benchmarked and profiled with a specific test case that directed the acceleration effort toward the most computationally intensive subroutines. Techniques for accelerating these subroutines included replacing linear search algorithms with binary versions, replacing the pseudo-random number generator, reducing program memory allocation, and proofing the input files for geometrical redundancies. All techniques produced identical or statistically similar results to the original code. Final benchmark timing of themore » accelerated code resulted in speed-up factors of 2.00 for TIGER (the one-dimensional slab geometry code), 1.74 for CYLTRAN (the two-dimensional cylindrical geometry code), and 1.90 for ACCEPT (the arbitrary three-dimensional geometry code).« less

  12. Quantum computing with Majorana fermion codes

    NASA Astrophysics Data System (ADS)

    Litinski, Daniel; von Oppen, Felix

    2018-05-01

    We establish a unified framework for Majorana-based fault-tolerant quantum computation with Majorana surface codes and Majorana color codes. All logical Clifford gates are implemented with zero-time overhead. This is done by introducing a protocol for Pauli product measurements with tetrons and hexons which only requires local 4-Majorana parity measurements. An analogous protocol is used in the fault-tolerant setting, where tetrons and hexons are replaced by Majorana surface code patches, and parity measurements are replaced by lattice surgery, still only requiring local few-Majorana parity measurements. To this end, we discuss twist defects in Majorana fermion surface codes and adapt the technique of twist-based lattice surgery to fermionic codes. Moreover, we propose a family of codes that we refer to as Majorana color codes, which are obtained by concatenating Majorana surface codes with small Majorana fermion codes. Majorana surface and color codes can be used to decrease the space overhead and stabilizer weight compared to their bosonic counterparts.

  13. Computational Nuclear Physics and Post Hartree-Fock Methods

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lietz, Justin; Sam, Novario; Hjorth-Jensen, M.

    We present a computational approach to infinite nuclear matter employing Hartree-Fock theory, many-body perturbation theory and coupled cluster theory. These lectures are closely linked with those of chapters 9, 10 and 11 and serve as input for the correlation functions employed in Monte Carlo calculations in chapter 9, the in-medium similarity renormalization group theory of dense fermionic systems of chapter 10 and the Green's function approach in chapter 11. We provide extensive code examples and benchmark calculations, allowing thereby an eventual reader to start writing her/his own codes. We start with an object-oriented serial code and end with discussions onmore » strategies for porting the code to present and planned high-performance computing facilities.« less

  14. Joint Force Quarterly. Issue 59, 4th Quarter 2010

    DTIC Science & Technology

    2010-10-01

    also be used as part of stealth technology in helicopters to create white noise to cancel or hide the sound of the rotor blades . These magnets are... deficit , the size of the defense budget, and the need to reduce and control costs: DOD Directive 1200.17 recognized that the Reserve Components...Senator Frank Church, inves- tigating intelligence blunders that surfaced in the wake of the Watergate investigation. Now a RAND researcher with many

  15. Brave New Warfare: Autonomy in Lethal UAVs

    DTIC Science & Technology

    2011-03-01

    tremendous support throughout the entirety of my work. I am extremely thankful to my advisors , Dr. George Lucas and CDR William Hatch, USN (ret), for their...that need to be evaluated before unmanned systems assume many roles traditionally held by human personnel. The continual advent of new technology will...2011, the Navy also completed the first test flight of the X-47B, a bat-winged unmanned jet with stealth characteristics.36 The advent of the

  16. Sell, Sell, Sell or Learn, Learn, Learn? The EdTech Market in New Zealand's Education System--Privatisation by Stealth?

    ERIC Educational Resources Information Center

    Wright, Noeline; Peters, Michael

    2017-01-01

    An article in "The Atlantic" "Quantifying the Ed-Tech Market" (2015), which draws on a review by the Education Technology Industry Network, reports that the U.S. Ed-tech market totalled $8.38 billion in the 2012-2013 academic year, which is up from $7.9 billion the year before, and up 11.7 per cent from 2009. K-12 online course…

  17. An Assessment of Media Coverage of the B-2 Stealth Bomber

    DTIC Science & Technology

    1990-01-01

    15 Sharon M. Friedman, Carole M. Gorney, and Brenda P. Egolf, "Reporting on Radiation: A Content Analysis of Chernobyl Coverage," Journal of...Mitterrand," Political Science Quarterly, 39 (1987): 103-122. 1 29 Jane Blankenship, Serefa Mendez - Mendez , Jong Guen King and Joseph Giodan, "Initial... Carole M. Gorney and Brenda P. Egolf, "Reporting on Radiation: A Content Analysis of Chernobyl Coverage," Journal of Communication, Summer3 (1987

  18. Integrating SIMNET into Heavy Task Force Tactical Training

    DTIC Science & Technology

    1994-10-01

    the overlays will allow the battlemaster time to input them for display on the Plan View Display ( PVD ) for use in AARs. The time schedule must also...reconnaissance for both friendly and enemy forces to occupy. The stealth station, in conjunction with the Plan View Display ( PVD ), can be used to...was moved to another assembly area for armor crewman and Nuclear, Biological, and Chemical (NBC) skills testing. The battalion observer tested 25% to

  19. Proceedings of the Antenna Applications Symposium (32nd) Held in Monticello, Illinois on 16-18 September 2008. Volume 2

    DTIC Science & Technology

    2008-12-20

    operational concepts. The adaptation or translations of these systems can provide an effective means of addressing many current and emerging challenges . The...providing stealth, cloaking, mimicry and other capabilities such as EM windowing to these platforms presents many challenges as their operational role...physical insight into a complex system or emerging technological challenges . A bio-system that shares synergistic goals with this complex system

  20. Air Superiority by the Numbers: Cutting Combat Air Forces in a Time of Uncertainty

    DTIC Science & Technology

    2014-06-01

    5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) School of Advanced Air And Space Studies,,Air University,,Maxwell Air...iii ACKNOWLEDGMENTS I would first like to thank the men and women whom I have had the...interdiction role. Finally, in the midst of a growing Soviet radar-guided surface-to-air threat, “Skunk Works ” developed the first stealth attack

  1. AMC’s Future Strategic Airlifter: The Blended Wing Body?

    DTIC Science & Technology

    2010-06-01

    winglets and deflected upwards. Not only does the noise reduction help reduce noise pollution, but it increases the stealth capability of the airlifter...deflected between the large winglets further keeping the waves from extending out from the aircraft to the sides. Based on this observation, Boeing...decided to move the winglets in towards the engines to further shield and deflect sound waves straight above the aircraft as shown in the figures 16

  2. Computer codes for thermal analysis of a solid rocket motor nozzle

    NASA Technical Reports Server (NTRS)

    Chauhan, Rajinder Singh

    1988-01-01

    A number of computer codes are available for performing thermal analysis of solid rocket motor nozzles. Aerotherm Chemical Equilibrium (ACE) computer program can be used to perform one-dimensional gas expansion to determine the state of the gas at each location of a nozzle. The ACE outputs can be used as input to a computer program called Momentum/Energy Integral Technique (MEIT) for predicting boundary layer development development, shear, and heating on the surface of the nozzle. The output from MEIT can be used as input to another computer program called Aerotherm Charring Material Thermal Response and Ablation Program (CMA). This program is used to calculate oblation or decomposition response of the nozzle material. A code called Failure Analysis Nonlinear Thermal and Structural Integrated Code (FANTASTIC) is also likely to be used for performing thermal analysis of solid rocket motor nozzles after the program is duly verified. A part of the verification work on FANTASTIC was done by using one and two dimension heat transfer examples with known answers. An attempt was made to prepare input for performing thermal analysis of the CCT nozzle using the FANTASTIC computer code. The CCT nozzle problem will first be solved by using ACE, MEIT, and CMA. The same problem will then be solved using FANTASTIC. These results will then be compared for verification of FANTASTIC.

  3. New Parallel computing framework for radiation transport codes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kostin, M.A.; /Michigan State U., NSCL; Mokhov, N.V.

    A new parallel computing framework has been developed to use with general-purpose radiation transport codes. The framework was implemented as a C++ module that uses MPI for message passing. The module is significantly independent of radiation transport codes it can be used with, and is connected to the codes by means of a number of interface functions. The framework was integrated with the MARS15 code, and an effort is under way to deploy it in PHITS. Besides the parallel computing functionality, the framework offers a checkpoint facility that allows restarting calculations with a saved checkpoint file. The checkpoint facility canmore » be used in single process calculations as well as in the parallel regime. Several checkpoint files can be merged into one thus combining results of several calculations. The framework also corrects some of the known problems with the scheduling and load balancing found in the original implementations of the parallel computing functionality in MARS15 and PHITS. The framework can be used efficiently on homogeneous systems and networks of workstations, where the interference from the other users is possible.« less

  4. Verification and Validation: High Charge and Energy (HZE) Transport Codes and Future Development

    NASA Technical Reports Server (NTRS)

    Wilson, John W.; Tripathi, Ram K.; Mertens, Christopher J.; Blattnig, Steve R.; Clowdsley, Martha S.; Cucinotta, Francis A.; Tweed, John; Heinbockel, John H.; Walker, Steven A.; Nealy, John E.

    2005-01-01

    In the present paper, we give the formalism for further developing a fully three-dimensional HZETRN code using marching procedures but also development of a new Green's function code is discussed. The final Green's function code is capable of not only validation in the space environment but also in ground based laboratories with directed beams of ions of specific energy and characterized with detailed diagnostic particle spectrometer devices. Special emphasis is given to verification of the computational procedures and validation of the resultant computational model using laboratory and spaceflight measurements. Due to historical requirements, two parallel development paths for computational model implementation using marching procedures and Green s function techniques are followed. A new version of the HZETRN code capable of simulating HZE ions with either laboratory or space boundary conditions is under development. Validation of computational models at this time is particularly important for President Bush s Initiative to develop infrastructure for human exploration with first target demonstration of the Crew Exploration Vehicle (CEV) in low Earth orbit in 2008.

  5. User's manual for CBS3DS, version 1.0

    NASA Astrophysics Data System (ADS)

    Reddy, C. J.; Deshpande, M. D.

    1995-10-01

    CBS3DS is a computer code written in FORTRAN 77 to compute the backscattering radar cross section of cavity backed apertures in infinite ground plane and slots in thick infinite ground plane. CBS3DS implements the hybrid Finite Element Method (FEM) and Method of Moments (MoM) techniques. This code uses the tetrahedral elements, with vector edge basis functions for FEM in the volume of the cavity/slot and the triangular elements with the basis functions for MoM at the apertures. By virtue of FEM, this code can handle any arbitrarily shaped three-dimensional cavities filled with inhomogeneous lossy materials; due to MoM, the apertures can be of any arbitrary shape. The User's Manual is written to make the user acquainted with the operation of the code. The user is assumed to be familiar with the FORTRAN 77 language and the operating environment of the computer the code is intended to run.

  6. Program optimizations: The interplay between power, performance, and energy

    DOE PAGES

    Leon, Edgar A.; Karlin, Ian; Grant, Ryan E.; ...

    2016-05-16

    Practical considerations for future supercomputer designs will impose limits on both instantaneous power consumption and total energy consumption. Working within these constraints while providing the maximum possible performance, application developers will need to optimize their code for speed alongside power and energy concerns. This paper analyzes the effectiveness of several code optimizations including loop fusion, data structure transformations, and global allocations. A per component measurement and analysis of different architectures is performed, enabling the examination of code optimizations on different compute subsystems. Using an explicit hydrodynamics proxy application from the U.S. Department of Energy, LULESH, we show how code optimizationsmore » impact different computational phases of the simulation. This provides insight for simulation developers into the best optimizations to use during particular simulation compute phases when optimizing code for future supercomputing platforms. Here, we examine and contrast both x86 and Blue Gene architectures with respect to these optimizations.« less

  7. Computational simulation of progressive fracture in fiber composites

    NASA Technical Reports Server (NTRS)

    Chamis, C. C.

    1986-01-01

    Computational methods for simulating and predicting progressive fracture in fiber composite structures are presented. These methods are integrated into a computer code of modular form. The modules include composite mechanics, finite element analysis, and fracture criteria. The code is used to computationally simulate progressive fracture in composite laminates with and without defects. The simulation tracks the fracture progression in terms of modes initiating fracture, damage growth, and imminent global (catastrophic) laminate fracture.

  8. A computer-aided design system geared toward conceptual design in a research environment. [for hypersonic vehicles

    NASA Technical Reports Server (NTRS)

    STACK S. H.

    1981-01-01

    A computer-aided design system has recently been developed specifically for the small research group environment. The system is implemented on a Prime 400 minicomputer linked with a CDC 6600 computer. The goal was to assign the minicomputer specific tasks, such as data input and graphics, thereby reserving the large mainframe computer for time-consuming analysis codes. The basic structure of the design system consists of GEMPAK, a computer code that generates detailed configuration geometry from a minimum of input; interface programs that reformat GEMPAK geometry for input to the analysis codes; and utility programs that simplify computer access and data interpretation. The working system has had a large positive impact on the quantity and quality of research performed by the originating group. This paper describes the system, the major factors that contributed to its particular form, and presents examples of its application.

  9. With or without you: predictive coding and Bayesian inference in the brain

    PubMed Central

    Aitchison, Laurence; Lengyel, Máté

    2018-01-01

    Two theoretical ideas have emerged recently with the ambition to provide a unifying functional explanation of neural population coding and dynamics: predictive coding and Bayesian inference. Here, we describe the two theories and their combination into a single framework: Bayesian predictive coding. We clarify how the two theories can be distinguished, despite sharing core computational concepts and addressing an overlapping set of empirical phenomena. We argue that predictive coding is an algorithmic / representational motif that can serve several different computational goals of which Bayesian inference is but one. Conversely, while Bayesian inference can utilize predictive coding, it can also be realized by a variety of other representations. We critically evaluate the experimental evidence supporting Bayesian predictive coding and discuss how to test it more directly. PMID:28942084

  10. Comparison of the LLNL ALE3D and AKTS Thermal Safety Computer Codes for Calculating Times to Explosion in ODTX and STEX Thermal Cookoff Experiments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wemhoff, A P; Burnham, A K

    2006-04-05

    Cross-comparison of the results of two computer codes for the same problem provides a mutual validation of their computational methods. This cross-validation exercise was performed for LLNL's ALE3D code and AKTS's Thermal Safety code, using the thermal ignition of HMX in two standard LLNL cookoff experiments: the One-Dimensional Time to Explosion (ODTX) test and the Scaled Thermal Explosion (STEX) test. The chemical kinetics model used in both codes was the extended Prout-Tompkins model, a relatively new addition to ALE3D. This model was applied using ALE3D's new pseudospecies feature. In addition, an advanced isoconversional kinetic approach was used in the AKTSmore » code. The mathematical constants in the Prout-Tompkins code were calibrated using DSC data from hermetically sealed vessels and the LLNL optimization code Kinetics05. The isoconversional kinetic parameters were optimized using the AKTS Thermokinetics code. We found that the Prout-Tompkins model calculations agree fairly well between the two codes, and the isoconversional kinetic model gives very similar results as the Prout-Tompkins model. We also found that an autocatalytic approach in the beta-delta phase transition model does affect the times to explosion for some conditions, especially STEX-like simulations at ramp rates above 100 C/hr, and further exploration of that effect is warranted.« less

  11. Ducted-Fan Engine Acoustic Predictions using a Navier-Stokes Code

    NASA Technical Reports Server (NTRS)

    Rumsey, C. L.; Biedron, R. T.; Farassat, F.; Spence, P. L.

    1998-01-01

    A Navier-Stokes computer code is used to predict one of the ducted-fan engine acoustic modes that results from rotor-wake/stator-blade interaction. A patched sliding-zone interface is employed to pass information between the moving rotor row and the stationary stator row. The code produces averaged aerodynamic results downstream of the rotor that agree well with a widely used average-passage code. The acoustic mode of interest is generated successfully by the code and is propagated well upstream of the rotor; temporal and spatial numerical resolution are fine enough such that attenuation of the signal is small. Two acoustic codes are used to find the far-field noise. Near-field propagation is computed by using Eversman's wave envelope code, which is based on a finite-element model. Propagation to the far field is accomplished by using the Kirchhoff formula for moving surfaces with the results of the wave envelope code as input data. Comparison of measured and computed far-field noise levels show fair agreement in the range of directivity angles where the peak radiation lobes from the inlet are observed. Although only a single acoustic mode is targeted in this study, the main conclusion is a proof-of-concept: Navier-Stokes codes can be used both to generate and propagate rotor/stator acoustic modes forward through an engine, where the results can be coupled to other far-field noise prediction codes.

  12. Relative efficiency and accuracy of two Navier-Stokes codes for simulating attached transonic flow over wings

    NASA Technical Reports Server (NTRS)

    Bonhaus, Daryl L.; Wornom, Stephen F.

    1991-01-01

    Two codes which solve the 3-D Thin Layer Navier-Stokes (TLNS) equations are used to compute the steady state flow for two test cases representing typical finite wings at transonic conditions. Several grids of C-O topology and varying point densities are used to determine the effects of grid refinement. After a description of each code and test case, standards for determining code efficiency and accuracy are defined and applied to determine the relative performance of the two codes in predicting turbulent transonic wing flows. Comparisons of computed surface pressure distributions with experimental data are made.

  13. Computer Simulation of the VASIMR Engine

    NASA Technical Reports Server (NTRS)

    Garrison, David

    2005-01-01

    The goal of this project is to develop a magneto-hydrodynamic (MHD) computer code for simulation of the VASIMR engine. This code is designed be easy to modify and use. We achieve this using the Cactus framework, a system originally developed for research in numerical relativity. Since its release, Cactus has become an extremely powerful and flexible open source framework. The development of the code will be done in stages, starting with a basic fluid dynamic simulation and working towards a more complex MHD code. Once developed, this code can be used by students and researchers in order to further test and improve the VASIMR engine.

  14. Procedures for the computation of unsteady transonic flows including viscous effects

    NASA Technical Reports Server (NTRS)

    Rizzetta, D. P.

    1982-01-01

    Modifications of the code LTRAN2, developed by Ballhaus and Goorjian, which account for viscous effects in the computation of planar unsteady transonic flows are presented. Two models are considered and their theoretical development and numerical implementation is discussed. Computational examples employing both models are compared with inviscid solutions and with experimental data. Use of the modified code is described.

  15. Expanding Capacity and Promoting Inclusion in Introductory Computer Science: A Focus on Near-Peer Mentor Preparation and Code Review

    ERIC Educational Resources Information Center

    Pon-Barry, Heather; Packard, Becky Wai-Ling; St. John, Audrey

    2017-01-01

    A dilemma within computer science departments is developing sustainable ways to expand capacity within introductory computer science courses while remaining committed to inclusive practices. Training near-peer mentors for peer code review is one solution. This paper describes the preparation of near-peer mentors for their role, with a focus on…

  16. 77 FR 37736 - Agency Information Collection Activities: Request for Comments for a New Information Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ... analysis and design, and computer software design and coding. Given the fact that over $500 million were... acoustic algorithms, computer architecture, and source code that dated to the 1970s. Since that time... towards the end of 2012. Version 3.0 is an entirely new, state-of-the-art computer program used for...

  17. 28 CFR 802.4 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Administration COURT SERVICES AND OFFENDER SUPERVISION AGENCY FOR THE DISTRICT OF COLUMBIA DISCLOSURE OF RECORDS... proprietary interest in the information. (e) Computer software means tools by which records are created, stored, and retrieved. Normally, computer software, including source code, object code, and listings of...

  18. Error threshold for color codes and random three-body Ising models.

    PubMed

    Katzgraber, Helmut G; Bombin, H; Martin-Delgado, M A

    2009-08-28

    We study the error threshold of color codes, a class of topological quantum codes that allow a direct implementation of quantum Clifford gates suitable for entanglement distillation, teleportation, and fault-tolerant quantum computation. We map the error-correction process onto a statistical mechanical random three-body Ising model and study its phase diagram via Monte Carlo simulations. The obtained error threshold of p(c) = 0.109(2) is very close to that of Kitaev's toric code, showing that enhanced computational capabilities do not necessarily imply lower resistance to noise.

  19. Photoionization and High Density Gas

    NASA Technical Reports Server (NTRS)

    Kallman, T.; Bautista, M.; White, Nicholas E. (Technical Monitor)

    2002-01-01

    We present results of calculations using the XSTAR version 2 computer code. This code is loosely based on the XSTAR v.1 code which has been available for public use for some time. However it represents an improvement and update in several major respects, including atomic data, code structure, user interface, and improved physical description of ionization/excitation. In particular, it now is applicable to high density situations in which significant excited atomic level populations are likely to occur. We describe the computational techniques and assumptions, and present sample runs with particular emphasis on high density situations.

  20. The mathematical theory of signal processing and compression-designs

    NASA Astrophysics Data System (ADS)

    Feria, Erlan H.

    2006-05-01

    The mathematical theory of signal processing, named processor coding, will be shown to inherently arise as the computational time dual of Shannon's mathematical theory of communication which is also known as source coding. Source coding is concerned with signal source memory space compression while processor coding deals with signal processor computational time compression. Their combination is named compression-designs and referred as Conde in short. A compelling and pedagogically appealing diagram will be discussed highlighting Conde's remarkable successful application to real-world knowledge-aided (KA) airborne moving target indicator (AMTI) radar.

  1. Solution of 3-dimensional time-dependent viscous flows. Part 2: Development of the computer code

    NASA Technical Reports Server (NTRS)

    Weinberg, B. C.; Mcdonald, H.

    1980-01-01

    There is considerable interest in developing a numerical scheme for solving the time dependent viscous compressible three dimensional flow equations to aid in the design of helicopter rotors. The development of a computer code to solve a three dimensional unsteady approximate form of the Navier-Stokes equations employing a linearized block emplicit technique in conjunction with a QR operator scheme is described. Results of calculations of several Cartesian test cases are presented. The computer code can be applied to more complex flow fields such as these encountered on rotating airfoils.

  2. Computer program for prediction of the deposition of material released from fixed and rotary wing aircraft

    NASA Technical Reports Server (NTRS)

    Teske, M. E.

    1984-01-01

    This is a user manual for the computer code ""AGDISP'' (AGricultural DISPersal) which has been developed to predict the deposition of material released from fixed and rotary wing aircraft in a single-pass, computationally efficient manner. The formulation of the code is novel in that the mean particle trajectory and the variance about the mean resulting from turbulent fluid fluctuations are simultaneously predicted. The code presently includes the capability of assessing the influence of neutral atmospheric conditions, inviscid wake vortices, particle evaporation, plant canopy and terrain on the deposition pattern.

  3. HOMAR: A computer code for generating homotopic grids using algebraic relations: User's manual

    NASA Technical Reports Server (NTRS)

    Moitra, Anutosh

    1989-01-01

    A computer code for fast automatic generation of quasi-three-dimensional grid systems for aerospace configurations is described. The code employs a homotopic method to algebraically generate two-dimensional grids in cross-sectional planes, which are stacked to produce a three-dimensional grid system. Implementation of the algebraic equivalents of the homotopic relations for generating body geometries and grids are explained. Procedures for controlling grid orthogonality and distortion are described. Test cases with description and specification of inputs are presented in detail. The FORTRAN computer program and notes on implementation and use are included.

  4. Advances in Computational Capabilities for Hypersonic Flows

    NASA Technical Reports Server (NTRS)

    Kumar, Ajay; Gnoffo, Peter A.; Moss, James N.; Drummond, J. Philip

    1997-01-01

    The paper reviews the growth and advances in computational capabilities for hypersonic applications over the period from the mid-1980's to the present day. The current status of the code development issues such as surface and field grid generation, algorithms, physical and chemical modeling, and validation is provided. A brief description of some of the major codes being used at NASA Langley Research Center for hypersonic continuum and rarefied flows is provided, along with their capabilities and deficiencies. A number of application examples are presented, and future areas of research to enhance accuracy, reliability, efficiency, and robustness of computational codes are discussed.

  5. Development and application of computational aerothermodynamics flowfield computer codes

    NASA Technical Reports Server (NTRS)

    Venkatapathy, Ethiraj

    1994-01-01

    Research was performed in the area of computational modeling and application of hypersonic, high-enthalpy, thermo-chemical nonequilibrium flow (Aerothermodynamics) problems. A number of computational fluid dynamic (CFD) codes were developed and applied to simulate high altitude rocket-plume, the Aeroassist Flight Experiment (AFE), hypersonic base flow for planetary probes, the single expansion ramp model (SERN) connected with the National Aerospace Plane, hypersonic drag devices, hypersonic ramp flows, ballistic range models, shock tunnel facility nozzles, transient and steady flows in the shock tunnel facility, arc-jet flows, thermochemical nonequilibrium flows around simple and complex bodies, axisymmetric ionized flows of interest to re-entry, unsteady shock induced combustion phenomena, high enthalpy pulsed facility simulations, and unsteady shock boundary layer interactions in shock tunnels. Computational modeling involved developing appropriate numerical schemes for the flows on interest and developing, applying, and validating appropriate thermochemical processes. As part of improving the accuracy of the numerical predictions, adaptive grid algorithms were explored, and a user-friendly, self-adaptive code (SAGE) was developed. Aerothermodynamic flows of interest included energy transfer due to strong radiation, and a significant level of effort was spent in developing computational codes for calculating radiation and radiation modeling. In addition, computational tools were developed and applied to predict the radiative heat flux and spectra that reach the model surface.

  6. GCKP84-general chemical kinetics code for gas-phase flow and batch processes including heat transfer effects

    NASA Technical Reports Server (NTRS)

    Bittker, D. A.; Scullin, V. J.

    1984-01-01

    A general chemical kinetics code is described for complex, homogeneous ideal gas reactions in any chemical system. The main features of the GCKP84 code are flexibility, convenience, and speed of computation for many different reaction conditions. The code, which replaces the GCKP code published previously, solves numerically the differential equations for complex reaction in a batch system or one dimensional inviscid flow. It also solves numerically the nonlinear algebraic equations describing the well stirred reactor. A new state of the art numerical integration method is used for greatly increased speed in handling systems of stiff differential equations. The theory and the computer program, including details of input preparation and a guide to using the code are given.

  7. A Multiple Sphere T-Matrix Fortran Code for Use on Parallel Computer Clusters

    NASA Technical Reports Server (NTRS)

    Mackowski, D. W.; Mishchenko, M. I.

    2011-01-01

    A general-purpose Fortran-90 code for calculation of the electromagnetic scattering and absorption properties of multiple sphere clusters is described. The code can calculate the efficiency factors and scattering matrix elements of the cluster for either fixed or random orientation with respect to the incident beam and for plane wave or localized- approximation Gaussian incident fields. In addition, the code can calculate maps of the electric field both interior and exterior to the spheres.The code is written with message passing interface instructions to enable the use on distributed memory compute clusters, and for such platforms the code can make feasible the calculation of absorption, scattering, and general EM characteristics of systems containing several thousand spheres.

  8. Computation of neutron fluxes in clusters of fuel pins arranged in hexagonal assemblies (2D and 3D)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prabha, H.; Marleau, G.

    2012-07-01

    For computations of fluxes, we have used Carvik's method of collision probabilities. This method requires tracking algorithms. An algorithm to compute tracks (in 2D and 3D) has been developed for seven hexagonal geometries with cluster of fuel pins. This has been implemented in the NXT module of the code DRAGON. The flux distribution in cluster of pins has been computed by using this code. For testing the results, they are compared when possible with the EXCELT module of the code DRAGON. Tracks are plotted in the NXT module by using MATLAB, these plots are also presented here. Results are presentedmore » with increasing number of lines to show the convergence of these results. We have numerically computed volumes, surface areas and the percentage errors in these computations. These results show that 2D results converge faster than 3D results. The accuracy on the computation of fluxes up to second decimal is achieved with fewer lines. (authors)« less

  9. Probabilistic Structural Analysis Methods (PSAM) for select space propulsion systems components

    NASA Technical Reports Server (NTRS)

    1991-01-01

    Summarized here is the technical effort and computer code developed during the five year duration of the program for probabilistic structural analysis methods. The summary includes a brief description of the computer code manuals and a detailed description of code validation demonstration cases for random vibrations of a discharge duct, probabilistic material nonlinearities of a liquid oxygen post, and probabilistic buckling of a transfer tube liner.

  10. ASTEC—the Aarhus STellar Evolution Code

    NASA Astrophysics Data System (ADS)

    Christensen-Dalsgaard, Jørgen

    2008-08-01

    The Aarhus code is the result of a long development, starting in 1974, and still ongoing. A novel feature is the integration of the computation of adiabatic oscillations for specified models as part of the code. It offers substantial flexibility in terms of microphysics and has been carefully tested for the computation of solar models. However, considerable development is still required in the treatment of nuclear reactions, diffusion and convective mixing.

  11. Instrumentation for Verification of Bomb Damage Repair Computer Code.

    DTIC Science & Technology

    1981-09-01

    record the data, a conventional 14-track FM analog tape recorder was retained. The unknown factors of signal duration, test duration, and signal ...Kirtland Air Force Base computer centers for more detailed analyses. In addition to the analog recorder, signal conditioning equipment and amplifiers were...necessary to allow high quality data to be recorded. An Interrange Instrumentation Group (IRIG) code generator/reader placed a coded signal on the tape

  12. Feasibility of a computer-assisted feedback system between dispatch centre and ambulances.

    PubMed

    Lindström, Veronica; Karlsten, Rolf; Falk, Ann-Charlotte; Castrèn, Maaret

    2011-06-01

    The aim of the study was to evaluate the feasibility of a newly developed computer-assisted feedback system between dispatch centre and ambulances in Stockholm, Sweden. A computer-assisted feedback system based on a Finnish model was designed to fit the Swedish emergency medical system. Feedback codes were identified and divided into three categories; assessment of patients' primary condition when ambulance arrives at scene, no transport by the ambulance and level of priority. Two ambulances and one emergency medical communication centre (EMCC) in Stockholm participated in the study. A sample of 530 feedback codes sent through the computer-assisted feedback system was reviewed. The information on the ambulance medical records was compared with the feedback codes used and 240 assignments were further analyzed. The used feedback codes sent from ambulance to EMCC were correct in 92% of the assignments. The most commonly used feedback code sent to the emergency medical dispatchers was 'agree with the dispatchers' assessment'. In addition, in 160 assignments there was a mismatch between emergency medical dispatchers and ambulance nurse assessments. Our results have shown a high agreement between medical dispatchers and ambulance nurse assessment. The feasibility of the feedback codes seems to be acceptable based on the small margin of error. The computer-assisted feedback system may, when used on a daily basis, make it possible for the medical dispatchers to receive feedback in a structural way. The EMCC organization can directly evaluate any changes in the assessment protocol by structured feedback sent from the ambulance.

  13. A Computer Code for Swirling Turbulent Axisymmetric Recirculating Flows in Practical Isothermal Combustor Geometries

    NASA Technical Reports Server (NTRS)

    Lilley, D. G.; Rhode, D. L.

    1982-01-01

    A primitive pressure-velocity variable finite difference computer code was developed to predict swirling recirculating inert turbulent flows in axisymmetric combustors in general, and for application to a specific idealized combustion chamber with sudden or gradual expansion. The technique involves a staggered grid system for axial and radial velocities, a line relaxation procedure for efficient solution of the equations, a two-equation k-epsilon turbulence model, a stairstep boundary representation of the expansion flow, and realistic accommodation of swirl effects. A user's manual, dealing with the computational problem, showing how the mathematical basis and computational scheme may be translated into a computer program is presented. A flow chart, FORTRAN IV listing, notes about various subroutines and a user's guide are supplied as an aid to prospective users of the code.

  14. Parallelization of Finite Element Analysis Codes Using Heterogeneous Distributed Computing

    NASA Technical Reports Server (NTRS)

    Ozguner, Fusun

    1996-01-01

    Performance gains in computer design are quickly consumed as users seek to analyze larger problems to a higher degree of accuracy. Innovative computational methods, such as parallel and distributed computing, seek to multiply the power of existing hardware technology to satisfy the computational demands of large applications. In the early stages of this project, experiments were performed using two large, coarse-grained applications, CSTEM and METCAN. These applications were parallelized on an Intel iPSC/860 hypercube. It was found that the overall speedup was very low, due to large, inherently sequential code segments present in the applications. The overall execution time T(sub par), of the application is dependent on these sequential segments. If these segments make up a significant fraction of the overall code, the application will have a poor speedup measure.

  15. Computing Legacy Software Behavior to Understand Functionality and Security Properties: An IBM/370 Demonstration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Linger, Richard C; Pleszkoch, Mark G; Prowell, Stacy J

    Organizations maintaining mainframe legacy software can benefit from code modernization and incorporation of security capabilities to address the current threat environment. Oak Ridge National Laboratory is developing the Hyperion system to compute the behavior of software as a means to gain understanding of software functionality and security properties. Computation of functionality is critical to revealing security attributes, which are in fact specialized functional behaviors of software. Oak Ridge is collaborating with MITRE Corporation to conduct a demonstration project to compute behavior of legacy IBM Assembly Language code for a federal agency. The ultimate goal is to understand functionality and securitymore » vulnerabilities as a basis for code modernization. This paper reports on the first phase, to define functional semantics for IBM Assembly instructions and conduct behavior computation experiments.« less

  16. Los Alamos radiation transport code system on desktop computing platforms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Briesmeister, J.F.; Brinkley, F.W.; Clark, B.A.

    The Los Alamos Radiation Transport Code System (LARTCS) consists of state-of-the-art Monte Carlo and discrete ordinates transport codes and data libraries. These codes were originally developed many years ago and have undergone continual improvement. With a large initial effort and continued vigilance, the codes are easily portable from one type of hardware to another. The performance of scientific work-stations (SWS) has evolved to the point that such platforms can be used routinely to perform sophisticated radiation transport calculations. As the personal computer (PC) performance approaches that of the SWS, the hardware options for desk-top radiation transport calculations expands considerably. Themore » current status of the radiation transport codes within the LARTCS is described: MCNP, SABRINA, LAHET, ONEDANT, TWODANT, TWOHEX, and ONELD. Specifically, the authors discuss hardware systems on which the codes run and present code performance comparisons for various machines.« less

  17. Assessment of the impact of the change from manual to automated coding on mortality statistics in Australia.

    PubMed

    McKenzie, Kirsten; Walker, Sue; Tong, Shilu

    It remains unclear whether the change from a manual to an automated coding system (ACS) for deaths has significantly affected the consistency of Australian mortality data. The underlying causes of 34,000 deaths registered in 1997 in Australia were dual coded, in ICD-9 manually, and by using an automated computer coding program. The diseases most affected by the change from manual to ACS were senile/presenile dementia, and pneumonia. The most common disease to which a manually assigned underlying cause of senile dementia was coded with ACS was unspecified psychoses (37.2%). Only 12.5% of codes assigned by ACS as senile dementia were coded the same by manual coders. This study indicates some important differences in mortality rates when comparing mortality data that have been coded manually with those coded using an automated computer coding program. These differences may be related to both the different interpretation of ICD coding rules between manual and automated coding, and different co-morbidities or co-existing conditions among demographic groups.

  18. Developing and Evaluating a Target-Background Similarity Metric for Camouflage Detection

    PubMed Central

    Lin, Chiuhsiang Joe; Chang, Chi-Chan; Liu, Bor-Shong

    2014-01-01

    Background Measurement of camouflage performance is of fundamental importance for military stealth applications. The goal of camouflage assessment algorithms is to automatically assess the effect of camouflage in agreement with human detection responses. In a previous study, we found that the Universal Image Quality Index (UIQI) correlated well with the psychophysical measures, and it could be a potentially camouflage assessment tool. Methodology In this study, we want to quantify the camouflage similarity index and psychophysical results. We compare several image quality indexes for computational evaluation of camouflage effectiveness, and present the results of an extensive human visual experiment conducted to evaluate the performance of several camouflage assessment algorithms and analyze the strengths and weaknesses of these algorithms. Significance The experimental data demonstrates the effectiveness of the approach, and the correlation coefficient result of the UIQI was higher than those of other methods. This approach was highly correlated with the human target-searching results. It also showed that this method is an objective and effective camouflage performance evaluation method because it considers the human visual system and image structure, which makes it consistent with the subjective evaluation results. PMID:24498310

  19. Adaptive neural coding: from biological to behavioral decision-making

    PubMed Central

    Louie, Kenway; Glimcher, Paul W.; Webb, Ryan

    2015-01-01

    Empirical decision-making in diverse species deviates from the predictions of normative choice theory, but why such suboptimal behavior occurs is unknown. Here, we propose that deviations from optimality arise from biological decision mechanisms that have evolved to maximize choice performance within intrinsic biophysical constraints. Sensory processing utilizes specific computations such as divisive normalization to maximize information coding in constrained neural circuits, and recent evidence suggests that analogous computations operate in decision-related brain areas. These adaptive computations implement a relative value code that may explain the characteristic context-dependent nature of behavioral violations of classical normative theory. Examining decision-making at the computational level thus provides a crucial link between the architecture of biological decision circuits and the form of empirical choice behavior. PMID:26722666

  20. Star adaptation for two-algorithms used on serial computers

    NASA Technical Reports Server (NTRS)

    Howser, L. M.; Lambiotte, J. J., Jr.

    1974-01-01

    Two representative algorithms used on a serial computer and presently executed on the Control Data Corporation 6000 computer were adapted to execute efficiently on the Control Data STAR-100 computer. Gaussian elimination for the solution of simultaneous linear equations and the Gauss-Legendre quadrature formula for the approximation of an integral are the two algorithms discussed. A description is given of how the programs were adapted for STAR and why these adaptations were necessary to obtain an efficient STAR program. Some points to consider when adapting an algorithm for STAR are discussed. Program listings of the 6000 version coded in 6000 FORTRAN, the adapted STAR version coded in 6000 FORTRAN, and the STAR version coded in STAR FORTRAN are presented in the appendices.

  1. Variation in clinical coding lists in UK general practice: a barrier to consistent data entry?

    PubMed

    Tai, Tracy Waize; Anandarajah, Sobanna; Dhoul, Neil; de Lusignan, Simon

    2007-01-01

    Routinely collected general practice computer data are used for quality improvement; poor data quality including inconsistent coding can reduce their usefulness. To document the diversity of data entry systems currently in use in UK general practice and highlight possible implications for data quality. General practice volunteers provided screen shots of the clinical coding screen they would use to code a diagnosis or problem title in the clinical consultation. The six clinical conditions examined were: depression, cystitis, type 2 diabetes mellitus, sore throat, tired all the time, and myocardial infarction. We looked at the picking lists generated for these problem titles in EMIS, IPS, GPASS and iSOFT general practice clinical computer systems, using the Triset browser as a gold standard for comparison. A mean of 19.3 codes is offered in the picking list after entering a diagnosis or problem title. EMIS produced the longest picking lists and GPASS the shortest, with a mean number of choices of 35.2 and 12.7, respectively. Approximately three-quarters (73.5%) of codes are diagnoses, one-eighth (12.5%) symptom codes, and the remainder come from a range of Read chapters. There was no readily detectable consistent order in which codes were displayed. Velocity coding, whereby commonly-used codes are placed higher in the picking list, results in variation between practices even where they have the same brand of computer system. Current systems for clinical coding promote diversity rather than consistency of clinical coding. As the UK moves towards an integrated health IT system consistency of coding will become more important. A standardised, limited list of codes for primary care might help address this need.

  2. Parameters that affect parallel processing for computational electromagnetic simulation codes on high performance computing clusters

    NASA Astrophysics Data System (ADS)

    Moon, Hongsik

    What is the impact of multicore and associated advanced technologies on computational software for science? Most researchers and students have multicore laptops or desktops for their research and they need computing power to run computational software packages. Computing power was initially derived from Central Processing Unit (CPU) clock speed. That changed when increases in clock speed became constrained by power requirements. Chip manufacturers turned to multicore CPU architectures and associated technological advancements to create the CPUs for the future. Most software applications benefited by the increased computing power the same way that increases in clock speed helped applications run faster. However, for Computational ElectroMagnetics (CEM) software developers, this change was not an obvious benefit - it appeared to be a detriment. Developers were challenged to find a way to correctly utilize the advancements in hardware so that their codes could benefit. The solution was parallelization and this dissertation details the investigation to address these challenges. Prior to multicore CPUs, advanced computer technologies were compared with the performance using benchmark software and the metric was FLoting-point Operations Per Seconds (FLOPS) which indicates system performance for scientific applications that make heavy use of floating-point calculations. Is FLOPS an effective metric for parallelized CEM simulation tools on new multicore system? Parallel CEM software needs to be benchmarked not only by FLOPS but also by the performance of other parameters related to type and utilization of the hardware, such as CPU, Random Access Memory (RAM), hard disk, network, etc. The codes need to be optimized for more than just FLOPs and new parameters must be included in benchmarking. In this dissertation, the parallel CEM software named High Order Basis Based Integral Equation Solver (HOBBIES) is introduced. This code was developed to address the needs of the changing computer hardware platforms in order to provide fast, accurate and efficient solutions to large, complex electromagnetic problems. The research in this dissertation proves that the performance of parallel code is intimately related to the configuration of the computer hardware and can be maximized for different hardware platforms. To benchmark and optimize the performance of parallel CEM software, a variety of large, complex projects are created and executed on a variety of computer platforms. The computer platforms used in this research are detailed in this dissertation. The projects run as benchmarks are also described in detail and results are presented. The parameters that affect parallel CEM software on High Performance Computing Clusters (HPCC) are investigated. This research demonstrates methods to maximize the performance of parallel CEM software code.

  3. ACON: a multipurpose production controller for plasma physics codes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Snell, C.

    1983-01-01

    ACON is a BCON controller designed to run large production codes on the CTSS Cray-1 or the LTSS 7600 computers. ACON can also be operated interactively, with input from the user's terminal. The controller can run one code or a sequence of up to ten codes during the same job. Options are available to get and save Mass storage files, to perform Historian file updating operations, to compile and load source files, and to send out print and film files. Special features include ability to retry after Mass failures, backup options for saving files, startup messages for the various codes,more » and ability to reserve specified amounts of computer time after successive code runs. ACON's flexibility and power make it useful for running a number of different production codes.« less

  4. Quantum Error Correction

    NASA Astrophysics Data System (ADS)

    Lidar, Daniel A.; Brun, Todd A.

    2013-09-01

    Prologue; Preface; Part I. Background: 1. Introduction to decoherence and noise in open quantum systems Daniel Lidar and Todd Brun; 2. Introduction to quantum error correction Dave Bacon; 3. Introduction to decoherence-free subspaces and noiseless subsystems Daniel Lidar; 4. Introduction to quantum dynamical decoupling Lorenza Viola; 5. Introduction to quantum fault tolerance Panos Aliferis; Part II. Generalized Approaches to Quantum Error Correction: 6. Operator quantum error correction David Kribs and David Poulin; 7. Entanglement-assisted quantum error-correcting codes Todd Brun and Min-Hsiu Hsieh; 8. Continuous-time quantum error correction Ognyan Oreshkov; Part III. Advanced Quantum Codes: 9. Quantum convolutional codes Mark Wilde; 10. Non-additive quantum codes Markus Grassl and Martin Rötteler; 11. Iterative quantum coding systems David Poulin; 12. Algebraic quantum coding theory Andreas Klappenecker; 13. Optimization-based quantum error correction Andrew Fletcher; Part IV. Advanced Dynamical Decoupling: 14. High order dynamical decoupling Zhen-Yu Wang and Ren-Bao Liu; 15. Combinatorial approaches to dynamical decoupling Martin Rötteler and Pawel Wocjan; Part V. Alternative Quantum Computation Approaches: 16. Holonomic quantum computation Paolo Zanardi; 17. Fault tolerance for holonomic quantum computation Ognyan Oreshkov, Todd Brun and Daniel Lidar; 18. Fault tolerant measurement-based quantum computing Debbie Leung; Part VI. Topological Methods: 19. Topological codes Héctor Bombín; 20. Fault tolerant topological cluster state quantum computing Austin Fowler and Kovid Goyal; Part VII. Applications and Implementations: 21. Experimental quantum error correction Dave Bacon; 22. Experimental dynamical decoupling Lorenza Viola; 23. Architectures Jacob Taylor; 24. Error correction in quantum communication Mark Wilde; Part VIII. Critical Evaluation of Fault Tolerance: 25. Hamiltonian methods in QEC and fault tolerance Eduardo Novais, Eduardo Mucciolo and Harold Baranger; 26. Critique of fault-tolerant quantum information processing Robert Alicki; References; Index.

  5. Visual Computing Environment

    NASA Technical Reports Server (NTRS)

    Lawrence, Charles; Putt, Charles W.

    1997-01-01

    The Visual Computing Environment (VCE) is a NASA Lewis Research Center project to develop a framework for intercomponent and multidisciplinary computational simulations. Many current engineering analysis codes simulate various aspects of aircraft engine operation. For example, existing computational fluid dynamics (CFD) codes can model the airflow through individual engine components such as the inlet, compressor, combustor, turbine, or nozzle. Currently, these codes are run in isolation, making intercomponent and complete system simulations very difficult to perform. In addition, management and utilization of these engineering codes for coupled component simulations is a complex, laborious task, requiring substantial experience and effort. To facilitate multicomponent aircraft engine analysis, the CFD Research Corporation (CFDRC) is developing the VCE system. This system, which is part of NASA's Numerical Propulsion Simulation System (NPSS) program, can couple various engineering disciplines, such as CFD, structural analysis, and thermal analysis. The objectives of VCE are to (1) develop a visual computing environment for controlling the execution of individual simulation codes that are running in parallel and are distributed on heterogeneous host machines in a networked environment, (2) develop numerical coupling algorithms for interchanging boundary conditions between codes with arbitrary grid matching and different levels of dimensionality, (3) provide a graphical interface for simulation setup and control, and (4) provide tools for online visualization and plotting. VCE was designed to provide a distributed, object-oriented environment. Mechanisms are provided for creating and manipulating objects, such as grids, boundary conditions, and solution data. This environment includes parallel virtual machine (PVM) for distributed processing. Users can interactively select and couple any set of codes that have been modified to run in a parallel distributed fashion on a cluster of heterogeneous workstations. A scripting facility allows users to dictate the sequence of events that make up the particular simulation.

  6. Efficient Helicopter Aerodynamic and Aeroacoustic Predictions on Parallel Computers

    NASA Technical Reports Server (NTRS)

    Wissink, Andrew M.; Lyrintzis, Anastasios S.; Strawn, Roger C.; Oliker, Leonid; Biswas, Rupak

    1996-01-01

    This paper presents parallel implementations of two codes used in a combined CFD/Kirchhoff methodology to predict the aerodynamics and aeroacoustics properties of helicopters. The rotorcraft Navier-Stokes code, TURNS, computes the aerodynamic flowfield near the helicopter blades and the Kirchhoff acoustics code computes the noise in the far field, using the TURNS solution as input. The overall parallel strategy adds MPI message passing calls to the existing serial codes to allow for communication between processors. As a result, the total code modifications required for parallel execution are relatively small. The biggest bottleneck in running the TURNS code in parallel comes from the LU-SGS algorithm that solves the implicit system of equations. We use a new hybrid domain decomposition implementation of LU-SGS to obtain good parallel performance on the SP-2. TURNS demonstrates excellent parallel speedups for quasi-steady and unsteady three-dimensional calculations of a helicopter blade in forward flight. The execution rate attained by the code on 114 processors is six times faster than the same cases run on one processor of the Cray C-90. The parallel Kirchhoff code also shows excellent parallel speedups and fast execution rates. As a performance demonstration, unsteady acoustic pressures are computed at 1886 far-field observer locations for a sample acoustics problem. The calculation requires over two hundred hours of CPU time on one C-90 processor but takes only a few hours on 80 processors of the SP2. The resultant far-field acoustic field is analyzed with state of-the-art audio and video rendering of the propagating acoustic signals.

  7. Computer code for the optimization of performance parameters of mixed explosive formulations.

    PubMed

    Muthurajan, H; Sivabalan, R; Talawar, M B; Venugopalan, S; Gandhe, B R

    2006-08-25

    LOTUSES is a novel computer code, which has been developed for the prediction of various thermodynamic properties such as heat of formation, heat of explosion, volume of explosion gaseous products and other related performance parameters. In this paper, we report LOTUSES (Version 1.4) code which has been utilized for the optimization of various high explosives in different combinations to obtain maximum possible velocity of detonation. LOTUSES (Version 1.4) code will vary the composition of mixed explosives automatically in the range of 1-100% and computes the oxygen balance as well as the velocity of detonation for various compositions in preset steps. Further, the code suggests the compositions for which least oxygen balance and the higher velocity of detonation could be achieved. Presently, the code can be applied for two component explosive compositions. The code has been validated with well-known explosives like, TNT, HNS, HNF, TATB, RDX, HMX, AN, DNA, CL-20 and TNAZ in different combinations. The new algorithm incorporated in LOTUSES (Version 1.4) enhances the efficiency and makes it a more powerful tool for the scientists/researches working in the field of high energy materials/hazardous materials.

  8. Upgrades of Two Computer Codes for Analysis of Turbomachinery

    NASA Technical Reports Server (NTRS)

    Chima, Rodrick V.; Liou, Meng-Sing

    2005-01-01

    Major upgrades have been made in two of the programs reported in "ive Computer Codes for Analysis of Turbomachinery". The affected programs are: Swift -- a code for three-dimensional (3D) multiblock analysis; and TCGRID, which generates a 3D grid used with Swift. Originally utilizing only a central-differencing scheme for numerical solution, Swift was augmented by addition of two upwind schemes that give greater accuracy but take more computing time. Other improvements in Swift include addition of a shear-stress-transport turbulence model for better prediction of adverse pressure gradients, addition of an H-grid capability for flexibility in modeling flows in pumps and ducts, and modification to enable simultaneous modeling of hub and tip clearances. Improvements in TCGRID include modifications to enable generation of grids for more complicated flow paths and addition of an option to generate grids compatible with the ADPAC code used at NASA and in industry. For both codes, new test cases were developed and documentation was updated. Both codes were converted to Fortran 90, with dynamic memory allocation. Both codes were also modified for ease of use in both UNIX and Windows operating systems.

  9. Development and Validation of a Fast, Accurate and Cost-Effective Aeroservoelastic Method on Advanced Parallel Computing Systems

    NASA Technical Reports Server (NTRS)

    Goodwin, Sabine A.; Raj, P.

    1999-01-01

    Progress to date towards the development and validation of a fast, accurate and cost-effective aeroelastic method for advanced parallel computing platforms such as the IBM SP2 and the SGI Origin 2000 is presented in this paper. The ENSAERO code, developed at the NASA-Ames Research Center has been selected for this effort. The code allows for the computation of aeroelastic responses by simultaneously integrating the Euler or Navier-Stokes equations and the modal structural equations of motion. To assess the computational performance and accuracy of the ENSAERO code, this paper reports the results of the Navier-Stokes simulations of the transonic flow over a flexible aeroelastic wing body configuration. In addition, a forced harmonic oscillation analysis in the frequency domain and an analysis in the time domain are done on a wing undergoing a rigid pitch and plunge motion. Finally, to demonstrate the ENSAERO flutter-analysis capability, aeroelastic Euler and Navier-Stokes computations on an L-1011 wind tunnel model including pylon, nacelle and empennage are underway. All computational solutions are compared with experimental data to assess the level of accuracy of ENSAERO. As the computations described above are performed, a meticulous log of computational performance in terms of wall clock time, execution speed, memory and disk storage is kept. Code scalability is also demonstrated by studying the impact of varying the number of processors on computational performance on the IBM SP2 and the Origin 2000 systems.

  10. Computer programs for predicting supersonic and hypersonic interference flow fields and heating

    NASA Technical Reports Server (NTRS)

    Morris, D. J.; Keyes, J. W.

    1973-01-01

    This report describes computer codes which calculate two-dimensional shock interference patterns. These codes compute the six types of interference flows as defined by Edney (Aeronaut. Res. Inst. of Sweden FAA Rep. 115). Results include properties of the inviscid flow field and the inviscid-viscous interaction at the surface along with peak pressure and peak heating at the impingement point.

  11. A Model Code of Ethics for the Use of Computers in Education.

    ERIC Educational Resources Information Center

    Shere, Daniel T.; Cannings, Terence R.

    Two Delphi studies were conducted by the Ethics and Equity Committee of the International Council for Computers in Education (ICCE) to obtain the opinions of experts on areas that should be covered by ethical guides for the use of computers in education and for software development, and to develop a model code of ethics for each of these areas.…

  12. Nonlinear Computational Aeroelasticity: Formulations and Solution Algorithms

    DTIC Science & Technology

    2003-03-01

    problem is proposed. Fluid-structure coupling algorithms are then discussed with some emphasis on distributed computing strategies. Numerical results...the structure and the exchange of structure motion to the fluid. The computational fluid dynamics code PFES is our finite element code for the numerical ...unstructured meshes). It was numerically demonstrated [1-3] that EBS can be less diffusive than SUPG [4-6] and the standard Finite Volume schemes

  13. MIADS2 ... an alphanumeric map information assembly and display system for a large computer

    Treesearch

    Elliot L. Amidon

    1966-01-01

    A major improvement and extension of the Map Information Assembly and Display System (MIADS) developed in 1964 is described. Basic principles remain unchanged, but the computer programs have been expanded and rewritten for a large computer, in Fortran IV and MAP languages. The code system is extended from 99 integers to about 2,200 alphanumeric 2-character codes. Hand-...

  14. Parallelisation study of a three-dimensional environmental flow model

    NASA Astrophysics Data System (ADS)

    O'Donncha, Fearghal; Ragnoli, Emanuele; Suits, Frank

    2014-03-01

    There are many simulation codes in the geosciences that are serial and cannot take advantage of the parallel computational resources commonly available today. One model important for our work in coastal ocean current modelling is EFDC, a Fortran 77 code configured for optimal deployment on vector computers. In order to take advantage of our cache-based, blade computing system we restructured EFDC from serial to parallel, thereby allowing us to run existing models more quickly, and to simulate larger and more detailed models that were previously impractical. Since the source code for EFDC is extensive and involves detailed computation, it is important to do such a port in a manner that limits changes to the files, while achieving the desired speedup. We describe a parallelisation strategy involving surgical changes to the source files to minimise error-prone alteration of the underlying computations, while allowing load-balanced domain decomposition for efficient execution on a commodity cluster. The use of conjugate gradient posed particular challenges due to implicit non-local communication posing a hindrance to standard domain partitioning schemes; a number of techniques are discussed to address this in a feasible, computationally efficient manner. The parallel implementation demonstrates good scalability in combination with a novel domain partitioning scheme that specifically handles mixed water/land regions commonly found in coastal simulations. The approach presented here represents a practical methodology to rejuvenate legacy code on a commodity blade cluster with reasonable effort; our solution has direct application to other similar codes in the geosciences.

  15. USU AFOSR University Engineering Design Challenge Proposal

    DTIC Science & Technology

    2015-01-02

    gauge, voltmeter, on/off switch Handle ◦ Aluminum, 7.5 in. wide Skirt ◦ EVA foam, abrasion resistant Friction strip ◦ Stealth Rubber 8 12/28/2014 5 Hose...0.962 Tensile Strength [Gpa] 3.2 2.9 1.103 Abrasion Resistance [cycles to failure] 286 83 3.446 Impact Resistance [Energy @ penetration, in-lbs] 125...combination of) terrain to extricate equipment and personnel in situations where the scene is actively on fire or burnt and have exposed sharp metallic

  16. Air Force F-22 Fighter Program: Background and Issues for Congress

    DTIC Science & Technology

    2009-11-25

    recover those critical skills becomes increasingly expensive, particularly where F-22 comprises a large share of their overall business.23 The Air...15, is offering for sale on the international market an upgraded version of the F-15 called the Silent Eagle, which incorporates some added stealth...is only stealthy from the front,” Hirata says, referencing a limitation shared by the Eurofighter Typhoon. “I am afraid that the F-15 Silent Eagle

  17. Attacking the Lion: A Study of Cohesion in Naval Special Warfare Operational Units

    DTIC Science & Technology

    2011-06-01

    of Existential Courage.‖ Journal of Humanistic Psychology 44, no. 3 (Summer 2004): 279–298. ———. ―Relevance of Hardiness Assessment and Training to...stealth, teamwork, and violence of action to survive and succeed in missions against larger opponents. Developing bonds of trust between individuals and...a force that conducts kinetic action missions with an emphasis on speed, surprise, and violence of action. For the most part, this mentality

  18. Net-Warlords: An Information Analysis of the Caballeros Templarios in Mexico

    DTIC Science & Technology

    2014-12-01

    especially marijuana and heroin were smuggled utilizing a simple, effective system consisting of stealth and bribery to move small batches of product into...the United States.21 At this point in the early 1960s, seizure of five pounds of marijuana was considered front page news.22 Today, seizure of drugs...quantities of marijuana became an activity of the past. C. THE PRI AND INSTITUTIONALIZED SMUGGLING: 1964–1975 The decades during and after the

  19. Analysis of internal flows relative to the space shuttle main engine

    NASA Technical Reports Server (NTRS)

    1987-01-01

    Cooperative efforts between the Lockheed-Huntsville Computational Mechanics Group and the NASA-MSFC Computational Fluid Dynamics staff has resulted in improved capabilities for numerically simulating incompressible flows generic to the Space Shuttle Main Engine (SSME). A well established and documented CFD code was obtained, modified, and applied to laminar and turbulent flows of the type occurring in the SSME Hot Gas Manifold. The INS3D code was installed on the NASA-MSFC CRAY-XMP computer system and is currently being used by NASA engineers. Studies to perform a transient analysis of the FPB were conducted. The COBRA/TRAC code is recommended for simulating the transient flow of oxygen into the LOX manifold. Property data for modifying the code to represent LOX/GOX flow was collected. The ALFA code was developed and recommended for representing the transient combustion in the preburner. These two codes will couple through the transient boundary conditions to simulate the startup and/or shutdown of the fuel preburner. A study, NAS8-37461, is currently being conducted to implement this modeling effort.

  20. Near Zone: Basic scattering code user's manual with space station applications

    NASA Technical Reports Server (NTRS)

    Marhefka, R. J.; Silvestro, J. W.

    1989-01-01

    The Electromagnetic Code - Basic Scattering Code, Version 3, is a user oriented computer code to analyze near and far zone patterns of antennas in the presence of scattering structures, to provide coupling between antennas in a complex environment, and to determine radiation hazard calculations at UHF and above. The analysis is based on uniform asymptotic techniques formulated in terms of the Uniform Geometrical Theory of Diffraction (UTD). Complicated structures can be simulated by arbitrarily oriented flat plates and an infinite ground plane that can be perfectly conducting or dielectric. Also, perfectly conducting finite elliptic cylinder, elliptic cone frustum sections, and finite composite ellipsoids can be used to model the superstructure of a ship, the body of a truck, and airplane, a satellite, etc. This manual gives special consideration to space station modeling applications. This is a user manual designed to give an overall view of the operation of the computer code, to instruct a user in how to model structures, and to show the validity of the code by comparing various computed results against measured and alternative calculations such as method of moments whenever available.

Top