6,378 research outputs found
Thermal fluctuations in moderately damped Josephson junctions: Multiple escape and retrapping, switching- and return-current distributions and hysteresis
A crossover at a temperature T* in the temperature dependence of the width s
of the distribution of switching currents of moderately damped Josephson
junctions has been reported in a number of recent publications, with positive
ds/dT and IV characteristics associated with underdamped behaviour for lower
temperatures T<T*, and negative ds/dT and IV characteristics resembling
overdamped behaviour for higher temperatures T>T*. We have investigated in
detail the behaviour of Josephson junctions around the temperature T* by using
Monte Carlo simulations including retrapping from the running state into the
supercurrent state as given by the model of Ben-Jacob et al. We develop
discussion of the important role of multiple escape and retrapping events in
the moderate-damping regime, in particular considering the behaviour in the
region close to T*. We show that the behaviour is more fully understood by
considering two crossover temperatures, and that the shape of the distribution
and s(T) around T*, as well as at lower T<T*, are largely determined by the
shape of the conventional thermally activated switching distribution. We show
that the characteristic temperatures T* are not unique for a particular
Josephson junction, but have some dependence on the ramp rate of the applied
bias current. We also consider hysteresis in moderately damped Josephson
junctions and discuss the less commonly measured distribution of return
currents for a decreasing current ramp. We find that some hysteresis should be
expected to persist above T* and we highlight the importance, even well below
T*, of accounting properly for thermal fluctuations when determining the
damping parameter Q.Comment: Accepted for publication in PR
Remote sensing in Iowa agriculture
The author has identified the following significant results. Analysis of 1972 single-date coverage indicated that a complete crop classification was not attainable at the test sites. Good multi-date coverage during 1973 indicates that many of the problems encountered in 1972 will be minimized. In addition, the compilation of springtime imagery covering the entire state of Iowa has added a new dimension to interpretation of Iowa's natural resources. ERTS-1 has provided data necessary to achieve the broad synoptic view not attainable through other means. This should provide soils and crop researchers and land use planners a base map of Iowa. Granted and due to the resolution of ERTS-1, not all details are observable for many land use planning needs, but this gives a general and current view of Iowa
Assessing Young Children from Diverse Backgrounds: Novel Ways to Measure Language Abilities and Meet the Requirements of the Early Years Foundation Stage
This paper examines the communication, language and literacy assessment required by the 2017 Statutory Framework for the Early Years Foundation Stage (EYFS) and the challenges from this mandate in particular: ‘If a child does not have a strong grasp of English language, practitioners must explore the child’s skills in the home language with parents and/or carers, to establish whether there is cause for concern about language delay’ (p. 9).
• If there is cause for concern, practitioners face three challenges:
o Challenge 1: Providing consistent and objective assessment when relying on parental reports;
o Challenge 2: Assessing children’s skills in the 300-plus home languages of the one million children in English primary schools who do not have English as their first language (DfE, 2019);
o Challenge 3: Determining whether low performance on English assessments is due to (a) limited English language exposure, likely to be resolved through additional exposure in primary school and not requiring specialist intervention, or (b) an underlying language disorder that cannot be resolved through additional exposure alone.
• To address these challenges, we argue for a policy that utilises a small range of evidence-based and easily-administered tests that evaluate language-learning skills, focusing on skills needed to learn word forms (the sounds that make up a word) and word meanings
Remote sensing in Iowa agriculture: Identification and classification of Iowa's crops, soils and forestry resources using ERTS-1 and complimentary underflight imagery
The author has identified the following significant results. Springtime ERTS-1 imagery covering pre-selected test sites in Iowa showed considerable detail with respect to broad soil and land use patterns. Additional imagery has been incorporated into a state mosaic. The mosaic was used as a base for soil association lines transferred from an existing map. The regions of greatest contrast are between the Clarion-Nicollet-Webster soil association area and adjacent areas. Landscape characteristics in this area result in land use patterns with a high percentage of pasture, hay, and timber. The soil association areas of the state that have patterns interpreted to be associated with intensive row crop production are: Moody, Galva-Primghar-Sac, Clarion-Nicollet-Webter, Tama-Muscatine, Dinsdale-Tama, Cresco-Lourdes, Clyde, Kenyon-Floyd-Clyde, and the Luton-Onawa-Salix area on the Missouri River floodplain. Forestland estimates have been attained for an area in central Iowa using wintertime ERTS-1 imagery. Visual analysis of multispectral, temporal imagery indicates that temporal analysis for cropland identification and acreage analyses procedures may be a very useful tool. Combinations of wintertime, springtime, and summertime ERTS-1 imagery separate most vegetation types. Timing can be critical depending upon crop development and harvesting times because of the dynamic nature of agricultural production
Towards operational measures of computer security
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit ‘more secure behaviour’ in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behaviour will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working towards measures of ‘operational security’ similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches (cf rate of occurrence of failures in reliability), or the probability that a specified ‘mission’ can be accomplished without a security breach (cf reliability function). This new approach is based on the analogy between system failure and security breach. A number of other analogies to support this view are introduced. We examine this duality critically, and have identified a number of important open questions that need to be answered before this quantitative approach can be taken further. The work described here is therefore somewhat tentative, and one of our major intentions is to invite discussion about the plausibility and feasibility of this new approach
Remote sensing in Iowa agriculture: Identification and classification of Iowa's crops, soils and forestry resources using ERTS-1 and complimentary underflight imagery
There are no author-identified significant results in this report
Recommended from our members
Bayesian belief network model for the safety assessment of nuclear computer-based systems
The formalism of Bayesian Belief Networks (BBNs) is being increasingly applied to probabilistic modelling and decision problems in a widening variety of fields. This method provides the advantages of a formal probabilistic model, presented in an easily assimilated visual form, together with the ready availability of efficient computational methods and tools for exploring model consequences. Here we formulate one BBN model of a part of the safety assessment task for computer and software based nuclear systems important to safety. Our model is developed from the perspective of an independent safety assessor who is presented with the task of evaluating evidence from disparate sources: the requirement specification and verification documentation of the system licensee and of the system manufacturer; the previous reputation of the various participants in the design process; knowledge of commercial pressures;information about tools and resources used; and many other sources. Based on these multiple sources of evidence, the independent assessor is ultimately obliged to make a decision as to whether or not the system should be licensed for operation within a particular nuclear plant environment. Our BBN model is a contribution towards a formal model of this decision problem. We restrict attention to a part of this problem: the safety analysis of the Computer System Specification documentation. As with other BBN applications we see this modelling activity as having several potential benefits. It employs a rigorous formalism as a focus for examination, discussion, and criticism of arguments about safety. It obliges the modeller to be very explicit about assumptions concerning probabilistic dependencies, correlations, and causal relationships. It allows sensitivity analyses to be carried out. Ultimately we envisage this BBN, or some later development of it, forming part of a larger model, which might well take the form of a larger BBN model, covering all sources of evidence about pre-operational life-cycle stages. This could provide an integrated model of all aspects of the task of the independent assessor, leading up to the final judgement about system safety in a particular context. We expect to offer some results of this further work later in the DeVa project
- …