You can print anything... or can you? 3D printing is an exciting new technology that promises to very quickly create anything people can design. Scientists who want to make soft robots, like Baymax from Big Hero 6TM, are excited about 3D printers. Our team uses 3D printing to make molds to produce soft robots. Molding is like using a muffin tin to make cupcakes. But can you make anything with 3D printing or are there times when 3D-printed molds do not work? Just like a cupcake liner, 3D-printed molds leave ridges, like a Ruffles potato chip, in soft robots. These ridges are a weak point where cracks can form, causing the robot to pop like a balloon. To prevent this, we sometimes need to make our robots using very smooth molds made from metal. This article talks about when and how 3D printing is useful in making soft robots.
more »
« less
Geomagnetic field intensity: How high can it get? How fast can it change? Constraints from Iron Age copper slag (Dataset)
Paleomagnetic, rock magnetic, or geomagnetic data found in the MagIC data repository from a paper titled: Geomagnetic field intensity: How high can it get? How fast can it change? Constraints from Iron Age copper slag
more »
« less
- Award ID(s):
- 2126298
- PAR ID:
- 10558679
- Publisher / Repository:
- Magnetics Information Consortium (MagIC)
- Date Published:
- Subject(s) / Keyword(s):
- Archeologic Pottery Slag Not Specified 2840 2987 Years BP
- Format(s):
- Medium: X
- Location:
- (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95); (Latitude:29.77; Longitude:34.95)
- Right(s):
- Creative Commons Attribution 4.0 International
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Workflow reconstruction through logs is crucial for troubleshooting targeted distributed systems. It is also challenging to extract enough information from logs and keep a concise view, which makes manual log analysis hard to practice. However, currently popular tools rely on identifier-based log parsing, leaving a large amount of workflow information unexploited. In this paper, we propose a log extraction approach NLog, which utilizes a natural language processing based approach to obtain the key information from log messages and identify the same object in logs generated by different statements without any domain knowledge. We propose to use keyed message, a new log storage structure to store the parsed logs. We implement NLog and apply it to distributed data analytics frameworks Spark and MapReduce. Evaluation results show that NLog can accurately identify the objects in log messages even without explicit identifiers. By using keyed messages, users can have a concise as well as flexible view of the workflows.more » « less
-
null (Ed.)Collaborations that require information sharing and mutual trust between companies, suppliers, and clients can be tough, particularly in the remote era. But blockchain’s distributed ledger — and its use of smart contracts — can simplify the process, creating a common, reliable record of transactions and avoiding costly disputes. In doing so, blockchain changes how deals are made: Partner selection is made simpler, as establishing trust is less important; agreement formation is more important, because protocols are hard to alter once put in place; and execution is made easier, because outcomes can be automated. Blockchain isn’t a magic bullet — it works much better in some situations than others — but it can fundamentally change how collaborations work.more » « less
-
Abstract Coevolution has come to be widely understood as specific, simultaneous, reciprocal adaptation by pairs of interacting species. This strict-sense definition arose from a desire for conceptual clarity, but it has never reflected the much wider diversity of ways in which interacting species may shape each other’s evolution. As a result, much of the literature on the evolutionary consequences of species interactions pays homage to the strict-sense definition while addressing some other form of coevolution. This tension suggests we should reframe the key question in coevolution research, from “when is it coevolution?” to, rather, “how is it coevolution?”. The result is not so much a definition of coevolution as a mission statement: We can describe how species coevolve by documenting the ways that each species shaped the other’s genetic diversity over a shared history of interaction. Making this change shifts our focus from identifying case studies for a single, narrowly defined process to describing the many ways—specific and diffuse, simultaneous and stepwise, and adaptive and nonadaptive—in which species evolve together.more » « less
-
In this paper, we i) analyze and classify real-world failures of Kubernetes (the most popular container orchestration system), ii) develop a framework to perform a fault/error injection campaign targeting the data store preserving the cluster state, and iii) compare results of our fault/error injection experiments with real-world failures, showing that our fault/error injections can recreate many real-world failure patterns. The paper aims to address the lack of studies on systematic analyses of Kubernetes failures to date. Our results show that even a single fault/error (e.g., a bit-flip) in the data stored can propagate, causing cluster-wide failures (3% of injections), service networking issues (4%), and service under/over provisioning (24%). Errors in the fields tracking dependencies between object caused 51% of such cluster-wide failures. We argue that controlled fault/error injection-based testing should be employed to proactively assess Kubernetes' resiliency and guide the design of failure mitigation strategies.more » « less
An official website of the United States government
