574 research outputs found
Short Subjects: When Archivist Meets Architect
Most archivists are better prepared to file and retrieve blueprints than to read them, more comfortable with COM (Computer Output Microfiche) than CAD (Computer Assisted Design), and better prepared to discuss linear feet of documents than square feet of floor space. Yet archival repositories do not spring up full-blown, and if the space an archival facility is to occupy is going to be utilitarian and provide for the various specialized needs of an archives, the archivist must become involved with the design process. In practical fact this means working with an architect either to design new space or to refurbish old space. This can be done, even if the archivist is untrained in construction methodology, mechanical engineering, or quantum physics
Numerical and experimental verification of a theoretical model of ripple formation in ice growth under supercooled water film flow
Little is known about morphological instability of a solidification front
during the crystal growth of a thin film of flowing supercooled liquid with a
free surface: for example, the ring-like ripples on the surface of icicles. The
length scale of the ripples is nearly 1 cm. Two theoretical models for the
ripple formation mechanism have been proposed. However, these models lead to
quite different results because of differences in the boundary conditions at
the solid-liquid interface and liquid-air surface. The validity of the
assumption used in the two models is numerically investigated and some of the
theoretical predictions are compared with experiments.Comment: 30 pages, 9 figure
Asynchronous Games over Tree Architectures
We consider the task of controlling in a distributed way a Zielonka
asynchronous automaton. Every process of a controller has access to its causal
past to determine the next set of actions it proposes to play. An action can be
played only if every process controlling this action proposes to play it. We
consider reachability objectives: every process should reach its set of final
states. We show that this control problem is decidable for tree architectures,
where every process can communicate with its parent, its children, and with the
environment. The complexity of our algorithm is l-fold exponential with l being
the height of the tree representing the architecture. We show that this is
unavoidable by showing that even for three processes the problem is
EXPTIME-complete, and that it is non-elementary in general
Spectroscopic characterization of singlet-triplet doorway states of aluminum monofluoride
Aluminum monofluoride (AlF) possesses highly favorable properties for laser cooling, both via the A1Πand a3Πstates. Determining efficient pathways between the singlet and the triplet manifold of electronic states will be advantageous for future experiments at ultralow temperatures. The lowest rotational levels of the A1Π, v = 6 and b3Σ+, v = 5 states of AlF are nearly iso-energetic and interact via spin–orbit coupling. These levels thus have a strongly mixed spin-character and provide a singlet–triplet doorway. We here present a hyperfine resolved spectroscopic study of the A1Π, v = 6//b3Σ+, v = 5 perturbed system in a jet-cooled, pulsed molecular beam. From a fit to the observed energies of the hyperfine levels, the fine and hyperfine structure parameters of the coupled states and their relative energies as well as the spin–orbit interaction parameter are determined. The standard deviation of the fit is about 15 MHz. We experimentally determine the radiative lifetimes of selected hyperfine levels by time-delayed ionization, Lamb dip spectroscopy, and accurate measurements of the transition lineshapes. The measured lifetimes range between 2 and 200 ns, determined by the degree of singlet–triplet mixing for each level
On the number of simple arrangements of five double pseudolines
We describe an incremental algorithm to enumerate the isomorphism classes of
double pseudoline arrangements. The correction of our algorithm is based on the
connectedness under mutations of the spaces of one-extensions of double
pseudoline arrangements, proved in this paper. Counting results derived from an
implementation of our algorithm are also reported.Comment: 24 pages, 16 figures, 6 table
Cryogenic Buffer Gas beams of AlF, CaF, MgF, YbF, Al, Ca, Yb and NO -- a comparison
Cryogenic buffer gas beams are central to many cold molecule experiments. Here, we use absorption and fluorescence spectroscopy to directly compare molecular beams of AlF, CaF, MgF, and YbF molecules, produced by chemical reaction of laser ablated atoms with fluorine rich reagents. The beam brightness for AlF is measured as 2 X 1012 molecules per steradian per pulse in a single rotational state, comparable to an Al atomic beam produced in the same setup. The CaF, MgF and YbF beams show an order of magnitude lower brightness than AlF, and far below the brightness of Ca and Yb beams. The addition of either NF3 or SF6 to the cell extinguishes the Al atomic beam, but has a minimal effect on the Ca and Yb beams. NF3 reacts more efficiently than SF6, as a significantly lower flow rate is required to maximise the molecule production, which is particularly beneficial for long-term stability of the AlF beam. We use NO as a proxy for the reactant gas as it can be optically detected. We demonstrate that a cold, rotationally pure NO beam can be generated by laser desorption, thereby gaining insight into the dynamics of the reactant gas inside the buffer gas cell
Robustness of the European power grids under intentional attack
The power grid defines one of the most important technological networks of
our times and sustains our complex society. It has evolved for more than a
century into an extremely huge and seemingly robust and well understood system.
But it becomes extremely fragile as well, when unexpected, usually minimal,
failures turn into unknown dynamical behaviours leading, for example, to sudden
and massive blackouts. Here we explore the fragility of the European power grid
under the effect of selective node removal. A mean field analysis of fragility
against attacks is presented together with the observed patterns. Deviations
from the theoretical conditions for network percolation (and fragmentation)
under attacks are analysed and correlated with non topological reliability
measures.Comment: 7 pages, 4 figure
- …