7,611 research outputs found

    User's guide: Programs for processing altimeter data over inland seas

    Get PDF
    The programs described were developed to process GEODYN-formatted satellite altimeter data, and to apply the processed results to predict geoid undulations and gravity anomalies of inland sea areas. These programs are written in standard FORTRAN 77 and are designed to run on the NSESCC IBM 3081(MVS) computer. Because of the experimental nature of these programs they are tailored to the geographical area analyzed. The attached program listings are customized for processing the altimeter data over the Black Sea. Users interested in the Caspian Sea data are expected to modify each program, although the required modifications are generally minor. Program control parameters are defined in the programs via PARAMETER statements and/or DATA statements. Other auxiliary parameters, such as labels, are hard-wired into the programs. Large data files are read in or written out through different input or output units. The program listings of these programs are accompanied by sample IBM job control language (JCL) images. Familiarity with IBM JCL and the TEMPLATE graphic package is assumed

    Analysis of altimetry over inland seas

    Get PDF
    Satellite-based altimetric data taken by GEOS-3 and SEASAT over the Black Sea and Caspian Sea are analyzed and a least squares collocation technique is used to predict the geoid undulation on a .25-degree by .25-degree grid and to transform these geoid undulations to free air gravity anomalies. This project entailed processing satellite altimeter data over inland seas for recovery of area mean gravity information. Gravity information in this area of the world is not readily available, so the possibility of obtaining it from the processing of altimeter observations is attractive. The principal objective was to complete and extend analyses done in a previous study, verify those results, and document the results and techniques. A secondary objective was to improve the algorithms and results, if possible. The approach used involved editing geoid height data to remove overland data; evaluating geoid height differences at crossover points; removing orbit errors from geoid heights using crossover differences; gridding geoid height data at .25-degree by .25-degree intervals; and estimating the gravity anomalies from gridded geoid heights using the collocation technique

    Remote sensing of Pacific hurricane and radiometric measurements from foam and slicks

    Get PDF
    There are no author-identified significant results in this report

    SHOP2: An HTN Planning System

    Full text link
    The SHOP2 planning system received one of the awards for distinguished performance in the 2002 International Planning Competition. This paper describes the features of SHOP2 which enabled it to excel in the competition, especially those aspects of SHOP2 that deal with temporal and metric planning domains

    Duality and Symmetry in Chiral Potts Model

    Full text link
    We discover an Ising-type duality in the general NN-state chiral Potts model, which is the Kramers-Wannier duality of planar Ising model when N=2. This duality relates the spectrum and eigenvectors of one chiral Potts model at a low temperature (of small k′k') to those of another chiral Potts model at a high temperature (of k′−1k'^{-1}). The τ(2)\tau^{(2)}-model and chiral Potts model on the dual lattice are established alongside the dual chiral Potts models. With the aid of this duality relation, we exact a precise relationship between the Onsager-algebra symmetry of a homogeneous superintegrable chiral Potts model and the sl2sl_2-loop-algebra symmetry of its associated spin-N−12\frac{N-1}{2} XXZ chain through the identification of their eigenstates.Comment: Latex 34 pages, 2 figures; Typos and misprints in Journal version are corrected with minor changes in expression of some formula

    Anonymous Single-Sign-On for n designated services with traceability

    Get PDF
    Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations. In this paper we describe a new approach whereby anonymous authentication to different verifiers is achieved via authorisation tags and pseudonyms. The particular innovation of our scheme is authentication can only occur between a user and its designated verifier for a service, and the verification cannot be performed by any other verifier. The benefit of this authentication approach is that it prevents information leakage of a user's service access information, even if the verifiers for these services collude which each other. Our scheme also supports a trusted third party who is authorised to de-anonymise the user and reveal her whole services access information if required. Furthermore, our scheme is lightweight because it does not rely on attribute or policy-based signature schemes to enable access to multiple services. The scheme's security model is given together with a security proof, an implementation and a performance evaluation.Comment: 3

    Investigation of shock waves in the relativistic Riemann problem: A comparison of viscous fluid dynamics to kinetic theory

    Full text link
    We solve the relativistic Riemann problem in viscous matter using the relativistic Boltzmann equation and the relativistic causal dissipative fluid-dynamical approach of Israel and Stewart. Comparisons between these two approaches clarify and point out the regime of validity of second-order fluid dynamics in relativistic shock phenomena. The transition from ideal to viscous shocks is demonstrated by varying the shear viscosity to entropy density ratio η/s\eta/s. We also find that a good agreement between these two approaches requires a Knudsen number Kn<1/2Kn < 1/2.Comment: Version as published in PRC 82, 024910 (2010); 16 pages, 16 figures, typos correcte

    A wideband linear tunable CDTA and its application in field programmable analogue array

    Get PDF
    This document is the Accepted Manuscript version of the following article: Hu, Z., Wang, C., Sun, J. et al. ‘A wideband linear tunable CDTA and its application in field programmable analogue array’, Analog Integrated Circuits and Signal Processing, Vol. 88 (3): 465-483, September 2016. Under embargo. Embargo end date: 6 June 2017. The final publication is available at Springer via https://link.springer.com/article/10.1007%2Fs10470-016-0772-7 © Springer Science+Business Media New York 2016In this paper, a NMOS-based wideband low power and linear tunable transconductance current differencing transconductance amplifier (CDTA) is presented. Based on the NMOS CDTA, a novel simple and easily reconfigurable configurable analogue block (CAB) is designed. Moreover, using the novel CAB, a simple and versatile butterfly-shaped FPAA structure is introduced. The FPAA consists of six identical CABs, and it could realize six order current-mode low pass filter, second order current-mode universal filter, current-mode quadrature oscillator, current-mode multi-phase oscillator and current-mode multiplier for analog signal processing. The Cadence IC Design Tools 5.1.41 post-layout simulation and measurement results are included to confirm the theory.Peer reviewedFinal Accepted Versio

    Bethe Ansatz Equations for the Broken ZNZ_{N}-Symmetric Model

    Get PDF
    We obtain the Bethe Ansatz equations for the broken ZN{\bf Z}_{N}-symmetric model by constructing a functional relation of the transfer matrix of LL-operators. This model is an elliptic off-critical extension of the Fateev-Zamolodchikov model. We calculate the free energy of this model on the basis of the string hypothesis.Comment: 43 pages, latex, 11 figure
    • …
    corecore