3,689 research outputs found

    Spherical Harmonic Decomposition on a Cubic Grid

    Get PDF
    A method is described by which a function defined on a cubic grid (as from a finite difference solution of a partial differential equation) can be resolved into spherical harmonic components at some fixed radius. This has applications to the treatment of boundary conditions imposed at radii larger than the size of the grid, following Abrahams, Rezzola, Rupright et al.(gr-qc/9709082}. In the method described here, the interpolation of the grid data to the integration 2-sphere is combined in the same step as the integrations to extract the spherical harmonic amplitudes, which become sums over grid points. Coordinates adapted to the integration sphere are not needed.Comment: 5 pages, LaTeX uses cjour.cls (supplied

    W. Watt to J. E. Davis, 19 May

    Get PDF
    Former slave petitioning for a loan to replace a lost horse.https://egrove.olemiss.edu/ciwar_corresp/1023/thumbnail.jp

    Sex distribution of offspring-parents obesity: Angel's hypothesis revisited

    Get PDF
    This study, which is based on two cross sectional surveys' data, aims to establish any effect of parental obesity sex distribution of offspring and to replicate the results that led to the hypothesis that obesity may be associated with sex-linked recessive lethal gene. A representative sample of 4,064 couples living in Renfrew/Paisley, Scotland was surveyed 1972-1976. A total of 2,338 offspring from 1,477 of the couples screened in 1972-1976, living in Paisley, were surveyed in 1996. In this study, males represented 47.7% among the total offspring of the couples screened in 1972-1976. In the first survey there was a higher male proportion of offspring (53%, p < 0.05) from parents who were both obese, yet this was not significant after adjustment for age of parents. Also, there were no other significant differences in sex distribution of offspring according to body mass index, age, or social class of parents. The conditions of the original 1949 study of Angel (1949) (which proposed a sex-linked lethal recessive gene) were simulated by selecting couples with at least one obese daughter. In this subset, (n = 409), obesity in fathers and mothers was associated with 26% of offspring being male compared with 19% of offspring from a non-obese father and obese mother. Finally we conclude that families with an obese father have a higher proportion of male offspring. These results do not support the long-established hypotheses of a sex-linked recessive lethal gene in the etiology of obesity

    Precise location of Sagittarius X ray sources with a rocket-borne rotating modulation collimator

    Get PDF
    Precise location of Sagittarius X ray sources with rocket-borne rotating modulation collimato

    Statistics of Solar Wind Electron Breakpoint Energies Using Machine Learning Techniques

    Get PDF
    Solar wind electron velocity distributions at 1 au consist of a thermal "core" population and two suprathermal populations: "halo" and "strahl". The core and halo are quasi-isotropic, whereas the strahl typically travels radially outwards along the parallel and/or anti-parallel direction with respect to the interplanetary magnetic field. With Cluster-PEACE data, we analyse energy and pitch angle distributions and use machine learning techniques to provide robust classifications of these solar wind populations. Initially, we use unsupervised algorithms to classify halo and strahl differential energy flux distributions to allow us to calculate relative number densities, which are of the same order as previous results. Subsequently, we apply unsupervised algorithms to phase space density distributions over ten years to study the variation of halo and strahl breakpoint energies with solar wind parameters. In our statistical study, we find both halo and strahl suprathermal breakpoint energies display a significant increase with core temperature, with the halo exhibiting a more positive correlation than the strahl. We conclude low energy strahl electrons are scattering into the core at perpendicular pitch angles. This increases the number of Coulomb collisions and extends the perpendicular core population to higher energies, resulting in a larger difference between halo and strahl breakpoint energies at higher core temperatures. Statistically, the locations of both suprathermal breakpoint energies decrease with increasing solar wind speed. In the case of halo breakpoint energy, we observe two distinct profiles above and below 500 km/s. We relate this to the difference in origin of fast and slow solar wind.Comment: Published in Astronomy & Astrophysics, 11 pages, 10 figure

    Defending Against Insider Use of Digital Steganography

    Get PDF
    The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse their privilege of access to the Internet to download, install, and use an information hiding tool, such as one of the hundreds of digital steganography applications available on the Internet, to steal sensitive, classified, or proprietary information. Effective countermeasures to this threat must begin with an organizational policy prohibiting installation of information hiding tools on user workstations and must also include automated tools capable of detecting attempts to download and use digital steganography applications. This paper will describe the threat from insider use of digital steganography applications; a new approach to detecting the presence or use of these applications; and extraction of hidden information when a known signature of one of these applications is detected. The analytical approach to steganalysis involves the development and use of computer forensic tools that can detect fingerprints and signatures of digital steganography applications. These tools can be employed in both an off-line forensic-based mode as well as a real-time network surveillance mode. Detection of fingerprints or signatures in either mode may lead to the discovery and extraction of hidden information. Accordingly, this approach represents a significant improvement over traditional blind detection techniques which typically only provide a probability that information may be hidden in a given file without providing a capability to extract any hidden information. Keywords: insider, steganography, steganalysis, computer forensics, artifacts, fingerprints, hash values, signature

    Test planning, concurrence, and conduct in the SAGE system

    Get PDF
    Includes: definitions; test planning; test plan concurrence; test conduct; and diagram.The logical steps necessary to the planning and execution of SAGE subsystem and system tests are outlined and the various kinds of these tests are defined
    • 

    corecore