Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Staff:
Edward Litwin
Nora Lin
Dhanya Asokumar
Raghu Somala
Joanna Cohen
Leah Umanskiy
Jay Dhanoa
Anna Knes
Christine Obert-Hong
Walker Melton
Sam van Loon
Justin Whitehouse
Editor-in-Chief
Biology Editor
Assistant Biology Editor
Assistant Biology Editor
Chemistry Editor
Chemistry Editor
Physics Editor
Assistant Physics Editor
Assistant Physics Editor
Computer Science Editor
Assistant Computer Science Editor
Assistant Comptutuer Science Editor
Vertical Jump
by Christine Obert-Hong
How is it that the average male
tiger, which usually weighs 221.2
kg, is capable of jumping 4.55 meters horizontally, while the average man, usually weighing about
79.73kg, is only able to jump about
12 meters? Why can the tiny flea
jump one hundred times its own
body length? The reason for all
of these occurrences is directly related to how each mammal utilizes
its body for physics. In this paper, I will discuss the physics involved in jumping from a horizontal surface by addressing the concepts of normal force and the force
of gravity, the anatomical structure of the jumping object, and the
energy that is transferred through
the jumping object from takeoff to
landing using examples in cats, humans, and fleas.
The normal force, FN , and the
force of gravity, Fg , are two opposing forces that act on an object of
mass m at the same time, provided
the object is on a substrate. A substrate is any solid or liquid that is
capable of producing an opposite
force on an object. Newtons third
law states that when one object exerts force on a second object, the
second object exerts an equal but
opposite force. FN is the opposing force that the substrate exerts
on the object. Fg is the attracting
force the Earth exerts on an object, regardless of whether or not
it is on a substrate. The relationship between Fg and FN on a flat
surface is
FN = Fg = mg
.
When an organism wants to
jump, it must first exert more force
against the substrate than Fg exerts on the object. One would
assume that, because FN = Fg ,
it would take very little force to
actually get an organism into the
air, but it actually depends on
how quickly the force is exerted.
For example, if an animal were to
slowly push its foot against the
ground, regardless of the amount
of pressure exerted, the animal
would not actually jump. While
there would be enough force to
push the animal off of the ground,
the force is distributed across a
longer period of time. An animals
change in momentum, called impulse, helps determine whether or
not it will jump.
A key example of the interaction of normal force and the force
of gravity is when a person attempts to jump vertically. To derive the height of the jump, h, the
objects center of gravity, which
is the distance d when the person lowers into a crouch, must be
calculated. Newtons third law
is demonstrated, because an equal
upward force pushes back on the
jumper. The two forces acting
on the jumper are the gravitational acceleration g (downward
force) and reaction force F (upward force). This gives the formula
(Davidovits, 2004):
mg
a=F
mg
(F mg)d
mg
tential, the following equation is knee, and flex the ankle. The storderived:
age and recycling of energy in the
elastic material of the muscle and
1
tendons help to propel the jumper
W m = mv 2 + mgh.
2
(Umberger, 2998). Very little work
Where m is body mass, v is TOV is done at the joints. The enand g is gravitational acceleration. ergy generated in the muscles is
The optimal angle for a vertical transferred through the ligaments
jump is 90 . The height, h, is and tendons. Roughly fifty perestimated by stretching the limb cent of the energy generated by
at the onset of the jump. As the large hip muscles will be transthe length of the limb is increased ferred down to the knee and analong with the COM (center of kle (Umberger, 2998). This transmass), a greater takeoff velocity re- fer of energy from the large muscles to the much smaller muscles of
sults. This gives the equation:
the knee and ankle provide the exV 2 = 2al
tra energy that the knee and ankle
require to jump efficiently by cre, where a is the acceleration and ating a spring-like effect. Hookes
l is the length of the limb. These Law of elasticity states that force
equations combine to give us and necessary to extend or compress a
show the effect of the hind limb spring by a distance x is directly
length on TOV (Harris, 2002):
negatively proportional to the distance (Georgia State University).
Muscle work = ml(a + g)
F = kx
In a human, we find that the
anatomical structure of the hu- F is the restoring force and k is the
man leg and the transfer of energy spring constant.
through the leg contribute to the
It is important to note that,
humans jumping ability. After ex- while the muscles help build up enamining the human leg, one may ergy, the energy the tendons pronotice there are many muscle in- duce make up most of the overvolved in the explosive movements. all force. This can be reversed,
The largest muscle mass in the leg so that the greater the x distance,
is located near the hip with much the more force is released. Thus,
less muscle mass near the knee and the longer the tendon, the more
ankle. The muscle mass serves a force can be applied to a substrate.
mechanical purpose.
When cats crouch, their back and
The preparation of jumping in- leg tendons tighten, and their body
Muscle Work = W m,
volves the flexion of the hip and is essentially turned into a slinky.
where W is the work done per unit knee and dorsiflexion of the anThe flea is one of the aniextensor muscle mass and m is the kle. During takeoff, the muscle, mal kingdoms champion jumpers
muscle mass. Because the total joints capsules, tendons and lig- and is because it is wingless, yet
work involves both kinetic and po- aments will extend the hip and jumps hundreds of times its own
1 The relationship between maximum jumping performance and hind limb morphology/physiology in domestic cats (Felis
silvestris catus)
References
Davidovits, Paul. Physics in Biology and Medicine. (Cambridge: Elsevier Science, 2004), 31.
Cat Behavior Explained. Cat Anatomy. Available from http://www.cat-behavior-explained.com/catanatomy.html; Internet.
Harris, Michelle A. The relationship between maximum jumping performance and hind limb
morphology/physiology in domestic cats (Felis silvestris catus). The Journal of Experimental Biology
205, no. 24 (2002), 377-389.
Umberger, Brian R. Mechanics of the Verical Jump and Two-Joint Muscles: Implications for Training.
Strength and Conditioning 20, no. 5 (1998): 70.
Introduction
The understanding of the relationship between extant species
and their ancestors changes every
day. Phylogeneticists use different
methods to compare similarities
and differences between species
to find the path of evolution.
Thousands of different phylogenetic trees are created to describe
the same group of species, each
representing a different evolutionary path. The study of morphological similarities and proteomic
similarities are common methods
used in phylogenetics. Because of
these varying methods and results,
genus and taxonomic names constantly change (Spaulding et al,
2009). In this study, it was found
that different methods produce different evolutionary clades. Previously, we studied the same group
of sixteen fish from a morphological standpoint. Phylogenies
were created based on morphological similarities and the fewest number of evolutionary steps necessary
to reach the chosen extant taxa.
To understand this group of taxa
thoroughly, it is important to review their evolution in multiple
ways. This paper will focus on creating a phylogeny using protein sequence similarities and differences
between morphological and proteomic phylogenies. It is essential to study proteomic similarities because natural selection affects proteins and an organisms in-
Materials
and Methods
Methods used to create two
phylogenies differ, but the overall
idea is similar. To create a morphological tree, a data matrix (Fig.
1) with sixteen characteristics was
completed using various sources
(Gingerich et al, 1990). Images
found on the Internet were used
as a primary sources because many
characteristics, such as paired appendages and fin type, are external. Scholarly sources were used
to explain internal characteristics,
including the difference between
air-filled swim bladder, jelly-filled
swim bladder, and lungs, and to
find groups of fish with these char-
acteristics. After the data matrix was completed, a morphological phylogeny was created based
on shared characteristics between
the sixteen taxa.
When creating a proteomicbased phylogenetic tree with the
same species, a data matrix (Fig.
2) was also created to represent
similarities between taxa. Similarities were found by comparing protein sequences. Cytochrome c oxidase subunit 1 protein sequences
were used for comparison because
the protein is found and has developed in all chosen species. Subunits of cytochrome c have been
successfully used in previous studies of molecular fish phylogenetics
(Arce et al, 2013). Cytochrome
c plays an important role in the
electron transport chain, an energy system that occurs in all living organisms. Cytochrome c subunit beta was chosen because it is
an oligomeric enzymatic complex
which is a component of the respiratory chain and is involved in
the transfer of electrons from cytochrome c to oxygen. The protein is not specialized in certain
species, so its sequence comparison between all species in this phylogeny shows an accurate representation of ancestors and similarities
(Garcia-Hornsman et al, 1994).
One source was used exclusively for obtaining the protein sequences. This database,
uniprot.org, strives to provide
the scientific community with a
5
Results
Comparing phylogenetic trees
of the same species created by two
different methods had simultaneously surprising and expected results. Fish with the same genus
had the highest similarity in both
phylogenies. For example, Saddled
Bichir (Polypterus endlicherii) and
Cuviers Bichir (Polypterus ornatiannius) had the highest protein sequence similarities (95%)
and had the most similar morphological characteristics (Fig 2).
Dogfish (Squalus acanthias) and
Great White Shark (Carcharodon carcharias) had similar results as Bichirs (Polypterus) because both species are categorized
as sharks. Paddlefish (Polyodon
spathula) and Sturgeon (Acipenser
transmontanus) stayed in similar
positions in both phylogenies although their genuses are not the
same (Fig 3).
Discussion
Creating two phylogenies with
different methods shows that the
chosen species have different evolutionary steps and ancestors depending on parts of the organism experiencing selective pressures. Characteristics chosen for
the morphological phylogeny are
used to increase fitness, reduce
the energy requirement for finding
food, or adapt to environments.
Conversely, the proteomic-based
phylogeny focused on one protein
and tracked its change and differences between taxa. Proteomic
methods using proteins found in
most cells do not allow readers
to understand selective pressures
taxa may experience or physical changes that occur in order
to conserve energy. For example, the evolution of lungs, as
could be seen on the morphological phylogeny, may indicate that
a specific taxon transitioned into
a semi-aquatic, semi-land dweller.
Such changes could not be observed on a proteomic-based phylogeny. Other difficulties were encountered when trying to compare
the two phylogenies. Morphological and proteomic-based phylogenetic methods cannot be used in-
References
Arce, HM, RE Reis, et al. Molecular phylogeny of thorny catfishes (Siluriformes: Doradidae). Molecular
Phylogenetics and Evolution 67.3 (2013)
Garcia-Hornsman, J A. et al. The Super Family of Heme-Copper Respiratory Oxidases. Journal of
Bacteriology 176.18 (1994)
Gingerich, Philip, Elwyn Simons, et al. Hind Limbs of Eocene Basilosaurus: Evidence of Feet in Whales.
Science 249.4965 (1990): 154-157.
Shimamura, Mitsuru, and Hiroshi Yasue. Molecular evidence from retroposons that whales form a clade
within even-toed ungulates. Nature 388. (1997)
Spaulding, Michelle, Maureen OLeary, et al. Relationships of Cetacea (Artiodactyla) Among Mammals:
Increased Taxon Sampling Alters Interpretations of Key Fossils and Character Evolution. Plos One 4.9
(2009)
Changing Technology
editorial by Sam van Loon
Technology is changing on an
extremely rapid basis. Were approaching things like phone notifications in our glasses and virtual
reality at breakneck speed, with
young, savvy inventors at the forefront. One such person is Palmer
Luckey, founder of Oculus VR.
When Luckey reached his late
teenage years, he became obsessed
with VR. He bought all the latest gadgets as they came out, but
they always left him feeling unsatisfied ... and nauseous. With a regular video game, lag is annoying;
however, in VR games, that lag is
vomit-inducing. Imagine turning
your head to the side, only to have
your view remain static, and then
quickly go back to where its meant
to be. It messes up your perception to the point where you want
to vomit.
Luckey has progressed leaps
and bounds with the technology.
Instead of an LCD display, the
Oculus Rift uses twin AMOLED
displays, which are able to change
10
References
Wyss-Coray, Tony. Infusion of young blood recharges brains of old mice, study finds. Available from:
http://med.stanford.edu/ism/2014/may/young-blood.html. Internet; accessed 1 June 2014.
11
Villeda, Saul A. et al. Young blood reverse age-related impairments in cognitive function and synaptic
plasticity in mice.Nature, no. 20 (2014), 659-663.
Terry, Jr., Alvin V. Spatial Navigation (Water Maze) Tasks. In J. Buccafusco (Ed.), Method of Behavior
Analysis in Neuroscience 2nd edition . Boca Raton, Florida. CRC Press, 2009.
12
Abstract
Introduction
2 I would like to thank Dr. Andrew Chien, the William Eckhardt Professor in the Department of Computer Science, a Senior
Fellow in the Computation Institute, and a Senior Computer Scientist at Argonne National Laboratory, and Dr. Nan Dun
(postdoctoral scholar) for providing me the opportunity to work on this project and for all of their help along the way.
3 Resources consumed over and above those consumed by the normal data structure or algorithm.
4 A special case of a binary tree in which the two children of a node are always greater than the node.
5 A function f (x) is said to be O g(x) if there exists real numbers M and x such that |f (x)| M |g(x)| when x x .
0
0
In this case, f (x) is a function describing the number of steps the algorithm takes as a function of the size of the input. It
essentially means that f (x) grows at the same or lesser rate as g(x).
13
heap.
Data structures provide a rich
environment for creating error
handling tools because they are so
ubiquitous and useful. The GVR
group focuses on creating ver-
Implementation
or groups of related classes. The shown in 3 below:7
core data structures (GDSArray
and GDSTree)6 are in subpackages of the main gvr package, as
CoffeeGVR is a Java-based
set of versioned data structures
and fault-tolerant algorithms. It is
organized into several packages,
gvr
array
tree
<<interface>>
Versioned
dictionary
GDSDictionary
GDSTree
GDSArray
GDSArrayList
error injection
GDSArrayInteger
3.1
Versioned
6 The classes are prefixed with GDS, standing for Global Domain System to be consistent with the GVR groups naming
conventions.
7 Unified Modeling Language, or UML, is a type of diagram often used to depict the relationship between classes. Each blue
box represents a package, a collection of related classes. Each yellow box is a class. These diagrams were created with the
LATEX package tikz-uml.
8 This UML diagram represents an interface, a collection of unimplemented functions. When another class implements an
interface, it is required to implement each of those functions. Each of the items in the lowest box is a function any implementing
classes must implement.
14
<<interface>>
Versioned
+
+
+
+
+
3.2
Array
GDSArray
GDSArray is the basic versioned array. It behaves like an actual array with a fixed size except
9 This describes the relationship between Versioned, Version, and GDSArray. Each line indicates a relationship between
two classes. The dotted line ending in a white triangle represents realization, or inheritance. In this diagram, it indicates
that GDSArray implements the Versioned interface. The solid lines ending in a white diamond represent aggregation, or a
weak has-a relationship. In this diagram, the aggregation means that Version has 2 Versions, but their life cycle may not
be dependent on that Version. These are last and next. The solid lines ending in a black diamond indicate composition, a
stronger form of a has-a relationship in which the life cycle of the owned object is dependent on the lifecycle of the owner.
15
gvr
<<interface>>
Versioned
+
+
+
+
+
array
T
GDSArray
T
-
Version
-
+
+
+
+
+
numVersions : int
currVersion : int
currentVersion : Version
firstVersion : Version
guard : HashMap<Integer, T>
Figure 5: GDSArray
To get an element, GDSArray
first looks in the current version
to see if it is in the current version. If it is in the current version,
it returns that value. Otherwise,
it looks in the version before that,
and then the one before that, and
current version
v1
v2
v3
1:Four
4:Seven
5:Six
1:Five
2:Six
3:Seven
5:Eight
3:Four
7:Eight
6:Three
8:Nine
9:One
0:Zero
Figure 6: A diagram of a working GDSArray. Each box is a version, and the lists are hash maps which map
the first element to the second.
Iteration
17
7:
array
T
GDSArray
-
error injection
GDSArrayInteger
array : GDSArray<Integer>
hasError : boolean
errorMessage : String
errorIndices : int[]
+
+
+
+
+
all of GDSArray
resetError()
hasError() : boolean
errorMessage() : String
injectError()
createError()
numVersions : int
currVersion : int
currentVersion : Version
firstVersion : Version
guard : HashMap<Integer, T>
Figure 7: GDSArrayInteger
The use of GDSArrayInteger 3.4 Tree
to inject error into resilient algoA binary tree is a data strucrithms is detailed in section 4.2 beture
consisting of nodes and leafs.
low.
Each node has two children, each
of which could be a leaf or another
node. For example, the following
is a binary tree:10
A
3.3 Dictionary
18
C D F G
While this is a rather ungainly
solution, it would work. A more
important problem is the over-
3.4.1
VersionedNode
19
<<interface>>
Path
+
+
+
+
getDirection() : boolean
rest() : Path
advance()
length() : int
T
VersionedNode
- root: Version<T>
+ hasLeft(vn : int) : boolean
+ hasRight(vn : int) : boolean
+ getThrow(path : Path, vn : int) : T
+ getThrow(path : String, vn : int) : T
+ get(path : Path, vn : int) : T
+ get(path : String, vn : int) : T
+ putThrow(path : Path, newVal : T, vn : int)
+ putThrow(path : String, newVal : T, vn : int)
+ put(path : Path, newVal : T, vn : int)
+ put(path : String, newVal : T, vn : int)
getHereVal(vn : int) : Version<T>
getRightVal(vn : int) : Version<T>
getLeftVal(vn : int) : Version<T>
T
Version
+ isNothing : boolean
+ value : T
+ versionNumber : int
+ Version(value : T, vn : int)
+ Version(vn : int)
Figure 8: VersionedNode
Getting from
a VersionedNode
Time (s)
106
105
104
10%
20%
40%
80%
103
100
101
102
103
104
Depth of GDSArray
105
107
108
107
10%
20%
40%
80%
106
100
101
102
103
104
Depth of GDSArray
105
11 The data was taken on a mid-2011 MacBook Air with a 1.6 Ghz dual-core Intel i5, 256 KB of L2 Cache per core, and 3
MB of L3 cache.
21
ray.
Times were taken using
System.nanoTime() and averaged
10,000 times to obtain more accurate results. The data seem
fairly linear. However, it clearly
bends upwards when the depth is
Time (ns)
6,000
4,000
2,000
0
0
200
400
600
800
1,000
Depth of GDSArray
Figure 11: Performance of get in GDArray
4.2
Immediate
Error two lists. Because my project was tween the virtual lists.
When an error is reported, reRecovery in Merge- not concerned with detecting errors,
GDSArrayInteger
alerts
the
silient
mergesort first calculates
sort
the virtual list that holds the error. It then recomputes that part
of the array from the two lists that
were combined to form that list.
For example, in Figure 12, an error
occurred at location 1 in version 3.
Mergesort recognized that this error is in the subarray between locations 0 and location 4 (non inclusive on the upper end), and recomputed the section shown by the
red box to fix the error:
12 Mergesort
is a O n log n sorting algorithm that recursively splits the list until its length is one element long and then
combining them to form the sorted list. A short algorithm for mergesort is: mergesort(a). 1. If a.length() == 1, return a. 2.
Otherwise, split a into left- and right- sublist (l and r) and let sorted l = mergesort(l) and sorted r = mergesort(r). 3. Combine
sorter r and sorted l and return the result.
22
v4
v3
error
v2
v1
Figure 12: Resilient Mergesort. The blue lines represent the separations between the virtual lists
4.3
I also wrote a version of mergesort that handles a single silent error at a time. Silent errors are errors that have a delay between the
time they occur and the time they
are reported.
Errors were again injected
through combine, but the code
prevents the algorithm from handling the error for some length of
time.
The silent error recovery uses
much of the same code as the im13 The
error rate is the chance that an error is injected each time the algorithm combines two lists.
23
1012
Naive
Versioned
1011
Time (ns)
1010
109
108
107
106
105
0.2
0.4
0.6
0.8
Error Rate
Figure 13: Naive and Versioned Mergesort
Unfortunately, resilient merge- cept at unreasonably high error faster than a naive mergesort.
sort is currently not more effi- rates. At error rates above 0.2,
cient than a naive algorithm ex- resilient mergesort is significantly
Conclusion
point in time before the error occurred. It also enables more sophisticated error-handling methods, such as that used in the faulttolerant mergesort explained previously.
Despite its advantages, Cof-
References
[1] Guoming Lu, Ziming Zheng, and Andrew A. Chien, When are Multiple Checkpoints Needed?, in 3rd
Workshop for Fault-tolerance at Extreme Scale (FTXS), at IEEE Conference on High Performance Distributed Computing, June 2013, New York, New York.
24