10,706 research outputs found

    Gravitational collapse: A case for thermal relaxation

    Get PDF
    Two relativistic models for collapsing spheres at different stages of evolution, which include pre-relaxation processes, are presented. The influence of relaxation time on the outcome of evolution in both cases is exhibited and established. It is shown that relaxation processes can drastically change the final state of the collapsing system. In particular, there are cases in which the value of the relaxation time determines the bounce or the collapse of the sphere.Comment: 33 pages, LaTex 2.09, 11 Postscript figures. To be published in General Relativity and Gravitatio

    Evaluation of Audio Compression Artifacts

    Get PDF
    This paper deals with subjective evaluation of audio-coding systems. From this evaluation, it is found that, depending on the type of signal and the algorithm of the audio-coding system, different types of audible errors arise. These errors are called coding artifacts. Although three kinds of artifacts are perceivable in the auditory domain, the author proposes that in the coding domain there is only one common cause for the appearance of the artifact, inefficient tracking of transient-stochastic signals. For this purpose, state-of-the art audio coding systems use a wide range of signal processing techniques, including application of the wavelet transform, which is described here.

    Moments of inertia for solids of revolution and variational methods

    Full text link
    We present some formulae for the moments of inertia of homogeneous solids of revolution in terms of the functions that generate the solids. The development of these expressions exploits the cylindrical symmetry of these objects, and avoids the explicit use of multiple integration, providing an easy and pedagogical approach. The explicit use of the functions that generate the solid gives the possibility of writing the moment of inertia as a functional, which in turn allows us to utilize the calculus of variations to obtain a new insight into some properties of this fundamental quantity. In particular, minimization of moments of inertia under certain restrictions is possible by using variational methods.Comment: 6 pages, 6 figures, LaTeX2e. Two paragraphs added. Minor typos corrected. Version to appear in European Journal of Physic

    Remittances and welfare in Tajikistan

    Get PDF
    In many developing countries, migration and remittances have become an important option for households facing poverty, unemployment and lack of opportunities. This raises the question of how effective this strategy is in improving welfare in countries sending migrants abroad and receiving remittances back. Of particular interest is the case of countries that have become highly dependent on the remittance income. Among them, Tajikistan registered the highest percentage of received remittances on the Gross Domestic Product in 2009, about 35%. This paper thus focuses on the evaluation of the remittance effect on three welfare indicators for Tajikistan in 2007: poverty, inequality, and schooling. This is done by estimating a contrafactual consumption aggregate for households in the hypothetical case they stop receiving remittances and re-calculating the poverty and inequality indicators. The effect of remittances on schooling is evaluated by estimating how receiving remittances in the household affect the probability of a child to be enrolled at school. The results point to a positive relationship between remittances and poverty reduction, but also a relationship with an increase in inequality. Remittances are found to be related to an increase in the likelihood of children aged 7 to 15 years to be enrolled at school, with a stronger effect for girls

    Security Assessment of Select Computer Systems under Distributed Denial of Service Attacks Performed by Botnets

    Get PDF
    With the passage of time Internet connectivity has been found on more electronic devices than in previous decades. This continuous development may be perceived as a double-edged sword. While the world becomes more Internet-connected and quality of life increases, the lack of proper security protocols in some of these electronic devices permits illegitimate parties to take control of them for their own malicious purposes. This thesis studies the impact of compromised Internet-connected devices on commonly used server operating systems: Microsoft’s Windows Server 2012 R2 Datacenter, Windows Server 2016 Datacenter, and Apple’s macOS 10.13.6 High Sierra deployed on Apple’s Mac Pro Server (Mac Pro Mid2010). Their performance under prevalent Distributed Denial of Service Attacks will be evaluated at equal attack traffic loads while utilizing three networks of simulated botnets. While the server was under attack connection rate, network traffic, processor utilization, processor temperature, and memory utilization were evaluated for computer systems under consideration
    • …
    corecore