Here, beginning from an interest in fractals, infinitely complex shapes. The authors investigated the fractal object that results from crumpling a sheet of paper. They determined its fractal dimension using continuous Chi-squared analysis, thereby testing and validating their model against the more conventional least squares analysis.
Read More...Browse Articles
Comparing the performance of lateral control algorithms on long rigid vehicles in urban environments
Here, seeking to better understand the control algorithms used in autonomous vehicles, the authors compared the Stanley and pure pursuit control algorithms along with a new version of each. Unexpectedly, they found that no control algorithm offered optimal performance, but rather resulted in tradeoffs between the various ideal results.
Read More...Quantitative definition of chemical synthetic pathway complexity of organic compounds
Irrespective of the final application of a molecule, synthetic accessibility is the rate-determining step in discovering and developing novel entities. However, synthetic complexity is challenging to quantify as a single metric, since it is a composite of several measurable metrics, some of which include cost, safety, and availability. Moreover, defining a single synthetic accessibility metric for both natural products and non-natural products poses yet another challenge given the structural distinctions between these two classes of compounds. Here, we propose a model for synthetic accessibility of all chemical compounds, inspired by the Central Limit Theorem, and devise a novel synthetic accessibility metric assessing the overall feasibility of making chemical compounds that has been fitted to a Gaussian distribution.
Read More...Optimizing airfoil shape for small, low speed, unmanned gliders: A homemade investigation
Here, the authors sought to identify a method to optimize the lift generated by an airfoil based solely on its shape. By beginning with a Bernoullian model to predict an optimized wing shape, the authors then tested their model against other possible shapes by constructing them from Styrofoam and testing them in a small wind tunnel. Contrary to their hypothesis, they found their expected optimal airfoil shape did not result in the greatest lift generation. They attributed this to a variety of confounding variables and concluded that their results pointed to a correlation between airfoil shape and lift generation.
Read More...A novel approach to determine which organism best displays Gijswijt's Sequence in its genome
The sequence of nitrogenous bases that make up the DNA of organisms can contain hidden mathematical sequences. Here the authors used BioPython, a programming tool, to find an organism that displays Gijswijt’s Sequence in its genome. In this manner they found that the common carp best displays Gijswijt’s Sequence in its genome.
Read More...Optimizing Interplanetary Travel Using a Genetic Algorithm
In this work, the authors develop an algorithm that solves the problem of efficient space travel between planets. This is a problem that could soon be of relevance as mankind continues to expand its exploration of outer space, and potentially attempt to inhabit it.
Read More...A Retrospective Statistical Analysis of Second Primary Cancers in the Delmarva Peninsula, U.S.A.
A significant percentage of cancer survivors develop a second primary cancer. Using data of deceased patients provided by the Peninsula Regional Medical Center, Li and Holdai conducted a retrospective statistical analysis to investigate whether the type of the first cancer affects the occurrence time and type of the second primary cancer.
Read More...Deciphering correlation and causation in risk factors for heart disease with Mendelian randomization
Here, seeking to identify the risk of coronary artery disease (CAD), a major cause of cardiovascular disease, the authors used Mendelian randomization. With this method they identified several traits such as blood pressure readings, LDL cholesterol and BMI as significant risk factors. While other traits were not found to be significant risk factors.
Read More...People’s Preference to Bet on Home Teams Even When Losing is Likely
In this study, the authors investigate situations in which people make sports bets that seem to go against their better judgement. Using surveys, individuals were asked to bet on which team would win in scenarios when their home team was involved and others when they were not to determine whether fandom for a team can overshadow fans’ judgment. They found that fans bet much more on their home teams than neutral teams when their team was facing a large deficit.
Read More...A meta-analysis on NIST post-quantum cryptographic primitive finalists
The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.
Read More...