6,643 research outputs found

    The On The Fly Imaging Technique

    Full text link
    The On-The-Fly (OTF) imaging technique enables single-dish radio telescopes to construct images of small areas of the sky with greater efficiency and accuracy. This paper describes the practical application of the OTF imaging technique. By way of example the implementation of the OTF imaging technique at the NRAO 12 Meter Telescope is described. Specific requirements for data sampling, image formation, and Doppler correction are discussed.Comment: 10 pages, 13 figures, accepted A&

    NGC1333/IRAS4: A multiple star formation laboratory

    Get PDF
    We present SCUBA observations of the protomultiple system NGC1333/IRAS4 at 450um and 850um. The 850um map shows significant extended emission which is most probably a remnant of the initial cloud core. At 450um, the component 4A is seen to have an elongated shape suggestive of a disk. Also we confirm that in addition to the 4A and 4B system, there exists another component 4C, which appears to lie out of the plane of the system and of the extended emission. Deconvolution of the beam reveals a binary companion to IRAS4B. Simple considerations of binary dynamics suggest that this triple 4A-4BI-4BII system is unstable and will probably not survive in its current form. Thus IRAS4 provides evidence that systems can evolve from higher to lower multiplicity as they move towards the main sequence. We construct a map of spectral index from the two wavelengths, and comment on the implications of this for dust evolution and temperature differences across the map. There is evidence that in the region of component 4A the dust has evolved, probably by coagulating into larger or more complex grains. Furthermore, there is evidence from the spectral index maps that dust from this object is being entrained in its associated outflow.Comment: 10 pages, 10 figures. To appear in MNRAS. Uses mn.sty. Also available at http://www.astro.phys.ethz.ch/papers/smith/smith_p_m.htm

    ROMA SURRECTA: Portrait of a Counterinsurgent Power, 216 BC - AD 72

    Get PDF
    This study evaluates the military history and practice of the Roman Empire in the context of contemporary counterinsurgency theory. It purports that the majority of Rome’s security challenges fulfill the criteria of insurgency, and that Rome’s responses demonstrate counterinsurgency proficiency. These assertions are proven by means of an extensive investigation of the grand strategic, military, and cultural aspects of the Roman state. Fourteen instances of likely insurgency are identified and examined, permitting the application of broad theoretical precepts to episodes spanning 300 years of Roman power. In summary, Rome demonstrates remarkable counterinsurgent sophistication, suggesting far more savvy and doctrinal agility than is afforded the Roman Empire by most modern observers

    EVIDENCE- STATUTES - CONTRADICTION OF LEGISLATIVE JOURNAL ENTRY TO SHOW DATE OF RECEIPT OF BILL BY GOVERNOR

    Get PDF
    Plaintiff, a tax assessor, sought to recover salary claims against a county, contending that compensation was payable under an act passed by the General Assembly but vetoed by the governor. An entry in the House journal reported delivery of the bill to the governor on March 5. The Assembly adjourned March 13, and the governor vetoed the bill March 28. An official receipt dated March 10 had been given for the bill by the governor\u27s office. The Arkansas Constitution gives the governor five days within which to approve or disapprove the bill. If he fails to act, the bill becomes law unless adjournment of the Assembly prevents its return within the five days. In that case the constitution allows the governor twenty days from the date of adjournment to approve or disapprove. Plaintiff contended that the date shown in the journal entry was conclusive. Held, judgment disallowing claims affirmed. The constitutional requirement that all bills be sent to the governor impliedly authorizes him to give evidence of receipt in a reasonable manner. An official receipt, therefore, should be given the same weight as a House journal entry, and since records of equal dignity conflict as to the date of delivery, the governor\u27s act in vetoing must be presumed to be within the constitutional requirements. Whaley v. lndependence County, (Ark. 1947) 205 S.W. (2d) 861

    CORPORATIONS--SECTION 16 (b) OF SECURITIES EXCHANGE ACT-SHORT SWING PROFITS-STATUTE OF LIMITATIONS

    Get PDF
    Plaintiffs brought a shareholders\u27 class action under section 16 (b) of the Securities and Exchange Act of 1934 alleging that defendant, an officer, director, and substantial stockholder of the corporation, had realized profits from trading in the corporation\u27s securities within a six-month period and had fraudulently concealed such profits by failing to file the statement required by section 16 (a) of the act until after suit was instituted against him over four years later by the S.E.C., thereby delaying plaintiff\u27s discovery of the facts. Defendant moved for dismissal on the ground that suit was not brought within the two-year period as prescribed by section 16 (b), and also on the ground that plaintiffs commenced suit before the expiration of the sixty-day period after notice and demand upon the corporation as provided in section 16 (b). Held, motion denied. Fraudulent concealment by an insider of profits realized within a six-month period tolls the two-year limitation provision of the statute. Grossman v. Young, (D.C. N.Y. I 94 7) 72 F. Supp. 375

    An Energy-Minimization Finite-Element Approach for the Frank-Oseen Model of Nematic Liquid Crystals: Continuum and Discrete Analysis

    Full text link
    This paper outlines an energy-minimization finite-element approach to the computational modeling of equilibrium configurations for nematic liquid crystals under free elastic effects. The method targets minimization of the system free energy based on the Frank-Oseen free-energy model. Solutions to the intermediate discretized free elastic linearizations are shown to exist generally and are unique under certain assumptions. This requires proving continuity, coercivity, and weak coercivity for the accompanying appropriate bilinear forms within a mixed finite-element framework. Error analysis demonstrates that the method constitutes a convergent scheme. Numerical experiments are performed for problems with a range of physical parameters as well as simple and patterned boundary conditions. The resulting algorithm accurately handles heterogeneous constant coefficients and effectively resolves configurations resulting from complicated boundary conditions relevant in ongoing research.Comment: 31 pages, 3 figures, 3 table

    Parameterized Model-Checking for Timed-Systems with Conjunctive Guards (Extended Version)

    Full text link
    In this work we extend the Emerson and Kahlon's cutoff theorems for process skeletons with conjunctive guards to Parameterized Networks of Timed Automata, i.e. systems obtained by an \emph{apriori} unknown number of Timed Automata instantiated from a finite set U1,,UnU_1, \dots, U_n of Timed Automata templates. In this way we aim at giving a tool to universally verify software systems where an unknown number of software components (i.e. processes) interact with continuous time temporal constraints. It is often the case, indeed, that distributed algorithms show an heterogeneous nature, combining dynamic aspects with real-time aspects. In the paper we will also show how to model check a protocol that uses special variables storing identifiers of the participating processes (i.e. PIDs) in Timed Automata with conjunctive guards. This is non-trivial, since solutions to the parameterized verification problem often relies on the processes to be symmetric, i.e. indistinguishable. On the other side, many popular distributed algorithms make use of PIDs and thus cannot directly apply those solutions
    corecore