10,490 research outputs found
Bearing detection in the presence of two sources of varying coherence using the complex cepstrum
The effect of the presence of two acoustic sources (one, the primary, whose location is to be detected) of varying coherence on a cepstral bearing finding procedure is experimentally studied. The coherence between the acoustic sources was altered by adding random noise of various SNR (signal-to-noise ratio) to the input signal of the primary source; the same base signal being fed to both sources. The results demonstrate that, when block liftering is used, the primary source bearing is reliably estimated for coherences as low as gamma sup 2 greater than or approx equal to 0.5. The results also imply that background noise (unreflected) of SNR greater than or approx equal to 10 dB will not markedly affect the accuracy of the bearing estimation algorithm
User's manual for PRESTO: A computer code for the performance of regenerative steam turbine cycles
Standard turbine cycles for baseload power plants and cycles with such additional features as process steam extraction and induction and feedwater heating by external heat sources may be modeled. Peaking and high back pressure cycles are also included. The code's methodology is to use the expansion line efficiencies, exhaust loss, leakages, mechanical losses, and generator losses to calculate the heat rate and generator output. A general description of the code is given as well as the instructions for input data preparation. Appended are two complete example cases
Nonuniversal Effects in the Homogeneous Bose Gas
Effective field theory predicts that the leading nonuniversal effects in the
homogeneous Bose gas arise from the effective range for S-wave scattering and
from an effective three-body contact interaction. We calculate the leading
nonuniversal contributions to the energy density and condensate fraction and
compare the predictions with results from diffusion Monte Carlo calculations by
Giorgini, Boronat, and Casulleras. We give a crude determination of the
strength of the three-body contact interaction for various model potentials.
Accurate determinations could be obtained from diffusion Monte Carlo
calculations of the energy density with higher statistics.Comment: 24 pages, RevTex, 5 ps figures, included with epsf.te
Evidence for an Intense Neutrino Flux during -Process Nucleosynthesis?
We investigate the possibility that neutrino capture on heavy nuclei competes
with beta decay in the environment where the -Process elements are
synthesized. We find that such neutrino capture is not excluded by existing
abundance determinations. We show that inclusion of significant neutrino
capture on the (neutron number) N=82 waiting point nuclei can allow the
inferred abundances of these species to provide a good fit to steady weak (beta
decay plus neutrino capture) flow equilibrium. In fact, for particular choices
of neutrino flux conditions, this fit is improved over the case where nuclei
change their charge by beta decay alone. However, this improved fit can be
realized only if neutrino capture plays a negligible role in nuclear decay back
toward stability. We discuss the implications of these considerations for
current proposed sites and models for -Process nucleosynthesis.Comment: 10 pages, plain tex, submitted to ApJ
Working with Amateur Labour: Between Culture and Economy
An introduction to the 'Amateur Economies' special issue of CSR 19.1, with an overview of the themes and articles within.</jats:p
Modulus Computational Entropy
The so-called {\em leakage-chain rule} is a very important tool used in many
security proofs. It gives an upper bound on the entropy loss of a random
variable in case the adversary who having already learned some random
variables correlated with , obtains some further
information about . Analogously to the information-theoretic
case, one might expect that also for the \emph{computational} variants of
entropy the loss depends only on the actual leakage, i.e. on .
Surprisingly, Krenn et al.\ have shown recently that for the most commonly used
definitions of computational entropy this holds only if the computational
quality of the entropy deteriorates exponentially in
. This means that the current standard definitions
of computational entropy do not allow to fully capture leakage that occurred
"in the past", which severely limits the applicability of this notion.
As a remedy for this problem we propose a slightly stronger definition of the
computational entropy, which we call the \emph{modulus computational entropy},
and use it as a technical tool that allows us to prove a desired chain rule
that depends only on the actual leakage and not on its history. Moreover, we
show that the modulus computational entropy unifies other,sometimes seemingly
unrelated, notions already studied in the literature in the context of
information leakage and chain rules. Our results indicate that the modulus
entropy is, up to now, the weakest restriction that guarantees that the chain
rule for the computational entropy works. As an example of application we
demonstrate a few interesting cases where our restricted definition is
fulfilled and the chain rule holds.Comment: Accepted at ICTS 201
Women secondary head teachers in England: where are they now?
The underrepresentation of women in secondary school headship in England and elsewhere is an early and longstanding theme in the women and gender in educational leadership literature. The purpose of this article is to report findings from a statistical survey of secondary school head teachers across England. Data available in the public domain on school websites have been collated during a single academic year to present a new picture of where women lead secondary schools in England. Mapping the distribution of women by local authority continues to show considerable unevenness across the country. This article argues that a geographical perspective still has value. It might influence the mobilization of resources to targeted areas and ultimately result in women’s proportionate representation in school leadership. Alongside this is a need for schools and academy trusts to comply with the Public Sector Equality Duty
Performance of a commercial wine store with insulated concrete walls
The internal environment within an unconditioned wine barrel store, constructed from insulated concrete panels and located in south-eastern Australia, has been investigated during a summer and winter month. Average temperatures inside the store were found to be 13.7°C and 22.8°C in the winter and summer month respectively. A validated mathematical model of the store was used to investigate the contribution of the concrete walls, insulation and the wine itself to the internal thermal environment. The concrete walls were found to be the least influential.<br /
Weak Charge-Changing Flow in Expanding r-Process Environments
We assess the prospects for attaining steady nuclear flow equilibrium in
expanding r-process environments where beta decay and/or neutrino capture
determine the nuclear charge-changing rates. For very rapid expansions, we find
that weak steady flow equilibrium normally cannot be attained. However, even
when neutron capture processes freeze out in such nonequilibrium conditions,
abundance ratios of nuclear species in the r-process peaks might still mimic
those attained in weak steady flow. This result suggests that the r-process
yield in a regime of rapid expansion can be calculated reliably only when all
neutron capture, photodisintegration, and weak interaction processes are fully
coupled in a dynamical calculation. We discuss the implications of these
results for models of the r-process sited in rapidly expanding neutrino-heated
ejecta.Comment: 21 pages, AAS LaTex, 2 postscript figure
Smart Metering Enables Effective Demand Management Design
The water demand and water use practices of each community are different. Designing cost-effective demand management programs requires investigating and responding directly to the unique water issues and opportunities of each community (Turner et al., 2010). As presented in this paper, a `mixed method baseline analysis' has proven to be valuable in developing a demand management program tailored to the distinctive community context. A mixed method baseline analysis is comprised of two interlinked components: (i) quantitative smart meter data analysis to create a detailed understanding of the water demand pro¬file; and (ii) qualitative social research to understand the social, cultural and institutional influences that drive existing water patterns. This paper shares the mixed method baseline analysis and resulting implications for a demand management program implemented in the remote Indigenous community of Gunbalanya, Northern Territory, in 2013
- …