10,490 research outputs found

    Bearing detection in the presence of two sources of varying coherence using the complex cepstrum

    Get PDF
    The effect of the presence of two acoustic sources (one, the primary, whose location is to be detected) of varying coherence on a cepstral bearing finding procedure is experimentally studied. The coherence between the acoustic sources was altered by adding random noise of various SNR (signal-to-noise ratio) to the input signal of the primary source; the same base signal being fed to both sources. The results demonstrate that, when block liftering is used, the primary source bearing is reliably estimated for coherences as low as gamma sup 2 greater than or approx equal to 0.5. The results also imply that background noise (unreflected) of SNR greater than or approx equal to 10 dB will not markedly affect the accuracy of the bearing estimation algorithm

    User's manual for PRESTO: A computer code for the performance of regenerative steam turbine cycles

    Get PDF
    Standard turbine cycles for baseload power plants and cycles with such additional features as process steam extraction and induction and feedwater heating by external heat sources may be modeled. Peaking and high back pressure cycles are also included. The code's methodology is to use the expansion line efficiencies, exhaust loss, leakages, mechanical losses, and generator losses to calculate the heat rate and generator output. A general description of the code is given as well as the instructions for input data preparation. Appended are two complete example cases

    Nonuniversal Effects in the Homogeneous Bose Gas

    Full text link
    Effective field theory predicts that the leading nonuniversal effects in the homogeneous Bose gas arise from the effective range for S-wave scattering and from an effective three-body contact interaction. We calculate the leading nonuniversal contributions to the energy density and condensate fraction and compare the predictions with results from diffusion Monte Carlo calculations by Giorgini, Boronat, and Casulleras. We give a crude determination of the strength of the three-body contact interaction for various model potentials. Accurate determinations could be obtained from diffusion Monte Carlo calculations of the energy density with higher statistics.Comment: 24 pages, RevTex, 5 ps figures, included with epsf.te

    Evidence for an Intense Neutrino Flux during rr-Process Nucleosynthesis?

    Get PDF
    We investigate the possibility that neutrino capture on heavy nuclei competes with beta decay in the environment where the rr-Process elements are synthesized. We find that such neutrino capture is not excluded by existing abundance determinations. We show that inclusion of significant neutrino capture on the (neutron number) N=82 waiting point nuclei can allow the inferred abundances of these species to provide a good fit to steady weak (beta decay plus neutrino capture) flow equilibrium. In fact, for particular choices of neutrino flux conditions, this fit is improved over the case where nuclei change their charge by beta decay alone. However, this improved fit can be realized only if neutrino capture plays a negligible role in nuclear decay back toward stability. We discuss the implications of these considerations for current proposed sites and models for rr-Process nucleosynthesis.Comment: 10 pages, plain tex, submitted to ApJ

    Working with Amateur Labour: Between Culture and Economy

    Full text link
    An introduction to the 'Amateur Economies' special issue of CSR 19.1, with an overview of the themes and articles within.</jats:p

    Modulus Computational Entropy

    Full text link
    The so-called {\em leakage-chain rule} is a very important tool used in many security proofs. It gives an upper bound on the entropy loss of a random variable XX in case the adversary who having already learned some random variables Z1,,ZZ_{1},\ldots,Z_{\ell} correlated with XX, obtains some further information Z+1Z_{\ell+1} about XX. Analogously to the information-theoretic case, one might expect that also for the \emph{computational} variants of entropy the loss depends only on the actual leakage, i.e. on Z+1Z_{\ell+1}. Surprisingly, Krenn et al.\ have shown recently that for the most commonly used definitions of computational entropy this holds only if the computational quality of the entropy deteriorates exponentially in (Z1,,Z)|(Z_{1},\ldots,Z_{\ell})|. This means that the current standard definitions of computational entropy do not allow to fully capture leakage that occurred "in the past", which severely limits the applicability of this notion. As a remedy for this problem we propose a slightly stronger definition of the computational entropy, which we call the \emph{modulus computational entropy}, and use it as a technical tool that allows us to prove a desired chain rule that depends only on the actual leakage and not on its history. Moreover, we show that the modulus computational entropy unifies other,sometimes seemingly unrelated, notions already studied in the literature in the context of information leakage and chain rules. Our results indicate that the modulus entropy is, up to now, the weakest restriction that guarantees that the chain rule for the computational entropy works. As an example of application we demonstrate a few interesting cases where our restricted definition is fulfilled and the chain rule holds.Comment: Accepted at ICTS 201

    Women secondary head teachers in England: where are they now?

    Get PDF
    The underrepresentation of women in secondary school headship in England and elsewhere is an early and longstanding theme in the women and gender in educational leadership literature. The purpose of this article is to report findings from a statistical survey of secondary school head teachers across England. Data available in the public domain on school websites have been collated during a single academic year to present a new picture of where women lead secondary schools in England. Mapping the distribution of women by local authority continues to show considerable unevenness across the country. This article argues that a geographical perspective still has value. It might influence the mobilization of resources to targeted areas and ultimately result in women’s proportionate representation in school leadership. Alongside this is a need for schools and academy trusts to comply with the Public Sector Equality Duty

    Performance of a commercial wine store with insulated concrete walls

    Full text link
    The internal environment within an unconditioned wine barrel store, constructed from insulated concrete panels and located in south-eastern Australia, has been investigated during a summer and winter month. Average temperatures inside the store were found to be 13.7&deg;C and 22.8&deg;C in the winter and summer month respectively. A validated mathematical model of the store was used to investigate the contribution of the concrete walls, insulation and the wine itself to the internal thermal environment. The concrete walls were found to be the least influential.<br /

    Weak Charge-Changing Flow in Expanding r-Process Environments

    Get PDF
    We assess the prospects for attaining steady nuclear flow equilibrium in expanding r-process environments where beta decay and/or neutrino capture determine the nuclear charge-changing rates. For very rapid expansions, we find that weak steady flow equilibrium normally cannot be attained. However, even when neutron capture processes freeze out in such nonequilibrium conditions, abundance ratios of nuclear species in the r-process peaks might still mimic those attained in weak steady flow. This result suggests that the r-process yield in a regime of rapid expansion can be calculated reliably only when all neutron capture, photodisintegration, and weak interaction processes are fully coupled in a dynamical calculation. We discuss the implications of these results for models of the r-process sited in rapidly expanding neutrino-heated ejecta.Comment: 21 pages, AAS LaTex, 2 postscript figure

    Smart Metering Enables Effective Demand Management Design

    Full text link
    The water demand and water use practices of each community are different. Designing cost-effective demand management programs requires investigating and responding directly to the unique water issues and opportunities of each community (Turner et al., 2010). As presented in this paper, a `mixed method baseline analysis' has proven to be valuable in developing a demand management program tailored to the distinctive community context. A mixed method baseline analysis is comprised of two interlinked components: (i) quantitative smart meter data analysis to create a detailed understanding of the water demand pro¬file; and (ii) qualitative social research to understand the social, cultural and institutional influences that drive existing water patterns. This paper shares the mixed method baseline analysis and resulting implications for a demand management program implemented in the remote Indigenous community of Gunbalanya, Northern Territory, in 2013
    corecore