3,689 research outputs found
Spherical Harmonic Decomposition on a Cubic Grid
A method is described by which a function defined on a cubic grid (as from a
finite difference solution of a partial differential equation) can be resolved
into spherical harmonic components at some fixed radius. This has applications
to the treatment of boundary conditions imposed at radii larger than the size
of the grid, following Abrahams, Rezzola, Rupright et al.(gr-qc/9709082}. In
the method described here, the interpolation of the grid data to the
integration 2-sphere is combined in the same step as the integrations to
extract the spherical harmonic amplitudes, which become sums over grid points.
Coordinates adapted to the integration sphere are not needed.Comment: 5 pages, LaTeX uses cjour.cls (supplied
W. Watt to J. E. Davis, 19 May
Former slave petitioning for a loan to replace a lost horse.https://egrove.olemiss.edu/ciwar_corresp/1023/thumbnail.jp
Recommended from our members
On the magnetospheric ULF wave counterpart of substorm onset
One nearâubiquitous signature of substorms observed on the ground is the azimuthal structuring of the onset auroral arc in the minutes prior to onset. Termed auroral beads, these optical signatures correspond to concurrent exponential increases in ground ultralow frequency (ULF) wave power and are likely the result of a plasma instability in the magnetosphere. Here, we present a case study showing the development of auroral beads from a Time History of Events and Macroscale Interactions during Substorms (THEMIS) allâsky camera with near simultaneous exponential increases in auroral brightness, ionospheric and conjugate magnetotail ULF wave power, evidencing their intrinsic link. We further present a survey of magnetic field fluctuations in the magnetotail around substorm onset. We find remarkably similar superposed epoch analyses of ULF power around substorm onset from space and conjugate ionospheric observations. Examining periods of exponential wave growth, we find the groundâ and spaceâbased observations to be consistent, with average growth rates of âŒ0.01 sâ1, lasting for âŒ4 min. Crossâcorrelation suggests that the spaceâbased observations lead those on the ground by approximately 1â1.5 min. Meanwhile, spacecraft located premidnight and âŒ10 RE downtail are more likely to observe enhanced wave power. These combined observations lead us to conclude that there is a magnetospheric counterpart of auroral beads and exponentially increasing ground ULF wave power. This is likely the result of the linear phase of a magnetospheric instability, active in the magnetotail for several minutes prior to auroral breakup
Recommended from our members
Observations of the J = 2â1 transitions of <sup>12</sup>C<sup>16</sup>O and <sup>12</sup>C<sup>18</sup>O towards galactic H II regions
Observations are reported of the J = 2â1 transitions of CO and 12C18O at 230 and 219 GHz respectively from a number of galactic sources. A map of the central 1/2° Ă 1/2° of the Orion A molecular cloud is presented. The spectra are interpreted to derive molecular densities and abundance ratios in the molecular clouds observed
Sex distribution of offspring-parents obesity: Angel's hypothesis revisited
This study, which is based on two cross sectional surveys' data, aims to establish any effect of parental obesity sex distribution of offspring and to replicate the results that led to the hypothesis that obesity may be associated with sex-linked recessive lethal gene. A representative sample of 4,064 couples living in Renfrew/Paisley, Scotland was surveyed 1972-1976. A total of 2,338 offspring from 1,477 of the couples screened in 1972-1976, living in Paisley, were surveyed in 1996. In this study, males represented 47.7% among the total offspring of the couples screened in 1972-1976. In the first survey there was a higher male proportion of offspring (53%, p < 0.05) from parents who were both obese, yet this was not significant after adjustment for age of parents. Also, there were no other significant differences in sex distribution of offspring according to body mass index, age, or social class of parents. The conditions of the original 1949 study of Angel (1949) (which proposed a sex-linked lethal recessive gene) were simulated by selecting couples with at least one obese daughter. In this subset, (n = 409), obesity in fathers and mothers was associated with 26% of offspring being male compared with 19% of offspring from a non-obese father and obese mother. Finally we conclude that families with an obese father have a higher proportion of male offspring. These results do not support the long-established hypotheses of a sex-linked recessive lethal gene in the etiology of obesity
Precise location of Sagittarius X ray sources with a rocket-borne rotating modulation collimator
Precise location of Sagittarius X ray sources with rocket-borne rotating modulation collimato
Recommended from our members
Whistler mode wave growth and propagation in the prenoon magnetosphere
Pitch-angle scattering of electrons can limit the stably trapped particle flux in the magnetosphere and precipitate energetic electrons into the ionosphere. Whistler-mode waves generated by a temperature anisotropy can mediate this pitch-angle scattering over a wide range of radial distances and latitudes, but in order to correctly predict the phase-space diffusion, it is important to characterise the whistler-mode wave distributions that result from the instability. We use previously-published observations of number density, pitch-angle anisotropy and phase space density to model the plasma in the quiet pre-noon magnetosphere (defined as periods when AE<100nT). We investigate the global propagation and growth of whistler-mode waves by studying millions of growing ray paths and demonstrate that the wave distribution at any one location is a superposition of many waves at different points along their trajectories and with different histories. We show that for observed electron plasma properties, very few raypaths undergo magnetospheric reflection, most rays grow and decay within 30 degrees of the magnetic equator. The frequency range of the wave distribution at large L can be adequately described by the solutions of the local dispersion relation, but the range of wavenormal angle is different. The wave distribution is asymmetric with respect to the wavenormal angle. The numerical results suggest that it is important to determine the variation of magnetospheric parameters as a function of latitude, as well as local time and L-shell
Statistics of Solar Wind Electron Breakpoint Energies Using Machine Learning Techniques
Solar wind electron velocity distributions at 1 au consist of a thermal
"core" population and two suprathermal populations: "halo" and "strahl". The
core and halo are quasi-isotropic, whereas the strahl typically travels
radially outwards along the parallel and/or anti-parallel direction with
respect to the interplanetary magnetic field. With Cluster-PEACE data, we
analyse energy and pitch angle distributions and use machine learning
techniques to provide robust classifications of these solar wind populations.
Initially, we use unsupervised algorithms to classify halo and strahl
differential energy flux distributions to allow us to calculate relative number
densities, which are of the same order as previous results. Subsequently, we
apply unsupervised algorithms to phase space density distributions over ten
years to study the variation of halo and strahl breakpoint energies with solar
wind parameters. In our statistical study, we find both halo and strahl
suprathermal breakpoint energies display a significant increase with core
temperature, with the halo exhibiting a more positive correlation than the
strahl. We conclude low energy strahl electrons are scattering into the core at
perpendicular pitch angles. This increases the number of Coulomb collisions and
extends the perpendicular core population to higher energies, resulting in a
larger difference between halo and strahl breakpoint energies at higher core
temperatures. Statistically, the locations of both suprathermal breakpoint
energies decrease with increasing solar wind speed. In the case of halo
breakpoint energy, we observe two distinct profiles above and below 500 km/s.
We relate this to the difference in origin of fast and slow solar wind.Comment: Published in Astronomy & Astrophysics, 11 pages, 10 figure
Defending Against Insider Use of Digital Steganography
The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organizationâs goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse their privilege of access to the Internet to download, install, and use an information hiding tool, such as one of the hundreds of digital steganography applications available on the Internet, to steal sensitive, classified, or proprietary information. Effective countermeasures to this threat must begin with an organizational policy prohibiting installation of information hiding tools on user workstations and must also include automated tools capable of detecting attempts to download and use digital steganography applications. This paper will describe the threat from insider use of digital steganography applications; a new approach to detecting the presence or use of these applications; and extraction of hidden information when a known signature of one of these applications is detected. The analytical approach to steganalysis involves the development and use of computer forensic tools that can detect fingerprints and signatures of digital steganography applications. These tools can be employed in both an off-line forensic-based mode as well as a real-time network surveillance mode. Detection of fingerprints or signatures in either mode may lead to the discovery and extraction of hidden information. Accordingly, this approach represents a significant improvement over traditional blind detection techniques which typically only provide a probability that information may be hidden in a given file without providing a capability to extract any hidden information.
Keywords: insider, steganography, steganalysis, computer forensics, artifacts, fingerprints, hash values, signature
Test planning, concurrence, and conduct in the SAGE system
Includes: definitions; test planning; test plan concurrence; test conduct; and diagram.The logical steps necessary to the planning and execution of
SAGE subsystem and system tests are outlined and the various kinds of these tests are defined
- âŠ