9,790 research outputs found

    Update on g-mode research

    Full text link
    Since the beginning of this century we have attended a blooming of the gravity-mode research thanks to the unprecedented quality of the data available, either from space with SoHO, or from the ground-based networks as BiSON or GONG. From the first upper limit of the gravity-mode amplitudes fixed at 10 mm/s at 200 microHz given by Appourchaux et al. (2000), on one hand, a peak was supposed to be a component of the l=1, n=1 mixed mode (Garcia et al. 2001a, b; Gabriel et al. 2002) and, on the other hand, a couple of patterns --multiplets-- were attributed to gravity modes (Turck-Chieze et al. 2004; Mathur et al. 2007). One of these patterns, found around 220 microHz, could be labeled as the l=2, n =-3 g mode, which is expected to be the one with the highest surface amplitude (Cox and Guzik 2004). Finally, in 2007, Garcia et al. were able to measure the fingertips of the dipole gravity modes looking for their asymptotic properties. In the present paper we present an update of the recent developments on this subject with special attention to the 220 microHz region, the dipole asymptotic properties and the impact of the incoming g-mode observations on the knowledge of the solar structure and rotation profile.Comment: Paper accepted for publication in Astronomische Nachrichten. 9 pages, 8 figure

    Relation between growth dynamics and the spatial distribution of intrinsic defects in self-assembled colloidal crystal films

    Get PDF
    Herein we establish a clear relation between the parameters that govern the growth dynamics and the structural quality of colloidal crystal films. We report an optical analysis of the spatial distribution of intrinsic defects in colloidal crystal films and correlate our results with a theoretical model describing the growth dynamics of such lattices. We find that the amount of defects fluctuates periodically and decreases along the growth direction of the lattice. We demonstrate that these spatial variations are a direct consequence of the temporal oscillations of the crystal film formation velocity, which are inherent to the colloidal particle deposition process.Ministerio de Ciencia y EducaciĂłn MAT2004-0302

    BGP-like TE Capabilities for SHIM6

    Get PDF
    In this paper we present a comprehensive set of mechanisms that restore to the site administrator the capacity of enforcing traffic engineering (TE) policies in a multiaddressed IPv6 scenario. The mechanisms rely on the ability of SHIM6 to securely perform locator changes in a transparent fashion to transport and application layers. Once an outgoing path has been selected for a communication by proper routing configuration in the site, the source prefix of SHIM6 data packets is rewritten by the site routers to avoid packet discarding due to ingress filtering. The SHIM6 locator preferences exchanged in the context establishment phase are modified by the site routers to influence in the path used for receiving traffic. Scalable deployment is ensured by the stateless nature of these mechanisms.Publicad

    Fault Tolerant Scalable Support for Network Portability and Traffic Engineering

    Get PDF
    The P-SHIM6 architecture provides ISP independence to IPv6 sites without compromising scalability. This architecture is based on a middle-box, the P-SHIM6, which manages the SHIM6 protocol exchange on behalf of the nodes of a site, which are configured with provider independent addresses. Incoming and outgoing packets are processed by the P-SHIM6 box, which can assign different locators to a given communication, either when it is started, or dynamically after the communication has been established. As a consequence, changes required for provider portability are minimized, and fine-grained Traffic Engineering can be enforced at the P-SHIM6 box, in addition to the fault tolerance support provided by SHIM6.This project has been supported by the RiNG project IST-2005-035167 and by the IMPROVISA project TSI2005-07384-C03-02.Publicad

    Defining Desire: Re(storyng) a 'fraudulent' marriage in 1901 Spain

    Get PDF
    In the second half of the 19th century, two Spanish primary school teachers were married despite the fact that their legal status as women rendered this union not only illegal but also publicly scandalous. In 2008 their story was resurrected in the form of a book based on an extensive review of educational, legal, and media archives. The Spanish press responded to the book’s publication by embedding the events within a more recent historical narrative around the struggle for gay marriage rights. In this article, we analyze the events in light of the understandings of sex, gender and sexuality that were available at the time, and then explore both the continuities and discontinuities with the modern interpretive framework that affords these women a lesbian identity, drawing upon Bennett’s notion of ‘‘lesbian-like’’ practices in eras where such identities were not yet conceptualized

    Resonance in Electrical Power Systems of Petrochemical Plants

    Get PDF

    Introducing probabilistic celular automata. A versatile extension of Game of Live

    Get PDF
    The "Game of life" model was created in 1970 by the mathematician Jonh Horton Conway using cellular automata. Since then, di erent extensions of these cellular automata have been used in many applications, such as car traffic control or baggage traffic in an airport. These extensions introduce ideas not only from cellular automata models but also from neural networks theory. In this work, we introduce probabilistic cellular automata which include non-deterministic rules for transitions between successive generations of the automaton together with probabilistic decisions about life and death of the cells in next generation of the automaton. This way, more realistic situations can be modeled and the obtained results are also non-deterministic. As an example of use, an implementation of this probabilistic cellular automaton has been developed using it for simulating tissues evolution. The authors are specially interested in simulations of cancerous tissues.Universidad de MĂĄlaga. Campus de Excelencia Internacional AndalucĂ­a Tech

    An Architecture for Network Layer Privacy

    Get PDF
    We present an architecture for the provision of network layer privacy based on the SHIM6 multihoming protocol. In its basic form, the architecture prevents on-path eavesdroppers from using SHIM6 network layer information to correlate packets that belong to the same communication but use different locators. To achieve this, several extensions to the SHIM6 protocol and to the HBA (Hash Based Addresses) addressing model are defined. On its full-featured mode of operation, hosts can vary dynamically the addresses of the packets of on-going communications. Single-homed hosts can adopt the SHIM6 protocol with the privacy enhancements to benefit from this protection against information collectors.IEEE Communications SocietyPublicad

    A RBES for Generating Automatically Personalized Menus

    Get PDF
    Food bought at supermarkets in, for instance, North America or the European Union, give comprehensive information about ingredients and allergens. Meanwhile, the menus of restaurants are usually incomplete and cannot be normally completed by the waiter. This is specially important when traveling to countries with a di erent culture. A curious example is "calamares en su tinta" (squid in its own ink), a common dish in Spain. Its brief description would be "squid with boiled rice in its own (black) ink", but an ingredient of its sauce is flour, a fact very important for celiacs. There are constraints based on religious believes, due to food allergies or to illnesses, while others just derive from personal preferences. Another complicated situation arise in hospitals, where the doctors' nutritional recommendations have to be added to the patient's usual constraints. We have therefore designed and developed a Rule Based Expert System (RBES) that can address these problems. The rules derive directly from the recipes of the di fferent dishes and contain the information about the required ingredients and ways of cooking. In fact, we distinguish: ingredients and ways of cooking, intermediate products (like sauces, that aren't always made explicit) and final products (the dishes listed in the menu of the restaurant). For a certain restaurant, customer and instant, the input to the RBES are: actualized stock of ingredients and personal characteristics of that customer. The RBES then prepares a "personalized menu" using set operations and knowledge extraction (thanks to an algebraic inference engine [1]). The RBES has been implemented in the computer algebra system MapleTM2015. A rst version of this work was presented at "Applications of Computer Algebra 2015" (ACA'2015) conference. The corresponding abstract is available at [2].Universidad de MĂĄlaga. Campus de Excelencia Internacional AndalucĂ­a Tech
    • 

    corecore