20,900 research outputs found

    Sensitivity-analysis method for inverse simulation application

    Get PDF
    An important criticism of traditional methods of inverse simulation that are based on the Newton–Raphson algorithm is that they suffer from numerical problems. In this paper these problems are discussed and a new method based on sensitivity-analysis theory is developed and evaluated. The Jacobian matrix may be calculated by solving a sensitivity equation and this has advantages over the approximation methods that are usually applied when the derivatives of output variables with respect to inputs cannot be found analytically. The methodology also overcomes problems of input-output redundancy that arise in the traditional approaches to inverse simulation. The sensitivity- analysis approach makes full use of information within the time interval over which key quantities are compared, such as the difference between calculated values and the given ideal maneuver after each integration step. Applications to nonlinear HS125 aircraft and Lynx helicopter models show that, for this sensitivity-analysis method, more stable and accurate results are obtained than from use of the traditional Newton–Raphson approach

    Calculation of Elastic Green's Functions for Lattices with Cavities

    Full text link
    In this Brief Report, we present an algorithm for calculating the elastic Lattice Greens Function of a regular lattice, in which defects are created by removing lattice points. The method is computationally efficient, since the required matrix operations are on matrices that scale with the size of the defect subspace, and not with the size of the full lattice. This method allows the treatment of force fields with multi-atom interactions.Comment: 3 pages. RevTeX, using epsfig.sty. One figur

    A simple derivation of the electromagnetic field of an arbitrarily moving charge

    Full text link
    The expression for the electromagnetic field of a charge moving along an arbitrary trajectory is obtained in a direct, elegant, and Lorentz invariant manner without resorting to more complicated procedures such as differentiation of the Lienard-Wiechert potentials. The derivation uses arguments based on Lorentz invariance and a physically transparent expression originally due to J.J.Thomson for the field of a charge that experiences an impulsive acceleration.Comment: The following article has been accepted by the American Journal of Physics. After it is published, it will be found at http://scitation.aip.org/ajp; 12 pages, 1 figur

    Projecting current and future location, quality, and connectivity of habitat for breeding birds in the Great Basin

    Get PDF
    We estimated the current location, quality, and connectivity of habitat for 50 species of breeding birds in four mountain ranges in the central Great Basin (Lander, Nye, and Eureka Counties, Nevada) and projected the future location, quality, and connectivity of habitat for these species given different scenarios of climate-induced land-cover change. In the United States, such models are relevant to federally mandated management of wild animals by state-level agencies. We sampled birds during the breeding seasons of 2001-2009 with fixed-radius point counts. For each species, we used boosted regression trees to model incidence (proportion of years a location was surveyed in which the species was present) as a function of topography and current land cover and climate. To assess model fit, we calculated the proportion of binomial deviance explained. We used cross-validation to estimate the predictive accuracy of the models. We applied the conservation planning program Zonation to identify locations where incidences of multiple species were maximized through time given current land cover and two scenarios of land-cover change, expansion of pinyon-juniper woodland into sagebrush shrubsteppe and contraction of riparian woodland. Models based on a set of 13 covariates derived from remotely sensed data had some predictive capacity for 41 of 50 species. Model outputs suggested substantial changes in amount of habitat for many species following projected expansion of pinyon-juniper woodland, but less pronounced changes following projected contraction of riparian woodland. Zonation analyses indicated that the spatial distribution of the highest-quality habitat for the avian assemblage was relatively consistent through time under both scenarios. Breeding birds in the Great Basin commonly are grouped in management plans on the basis of their general association with land-cover classes such as pinyon-juniper woodland, sagebrush shrubsteppe, and riparian woodland. However, even within these groups, the environmental attributes that explained a high proportion of variation in species\u27 incidences and the projected responses to different scenarios of land-cover change varied considerably among species

    A direct optical method for the study of grain boundary melting

    Full text link
    The structure and evolution of grain boundaries underlies the nature of polycrystalline materials. Here we describe an experimental apparatus and light reflection technique for measuring disorder at grain boundaries in optically clear material, in thermodynamic equilibrium. The approach is demonstrated on ice bicrystals. Crystallographic orientation is measured for each ice sample. The type and concentration of impurity in the liquid can be controlled and the temperature can be continuously recorded and controlled over a range near the melting point. The general methodology is appropriate for a wide variety of materials.Comment: 8 pages, 8 figures, updated with minor changes made to published versio

    2-Player Nash and Nonsymmetric Bargaining Games: Algorithms and Structural Properties

    Full text link
    The solution to a Nash or a nonsymmetric bargaining game is obtained by maximizing a concave function over a convex set, i.e., it is the solution to a convex program. We show that each 2-player game whose convex program has linear constraints, admits a rational solution and such a solution can be found in polynomial time using only an LP solver. If in addition, the game is succinct, i.e., the coefficients in its convex program are ``small'', then its solution can be found in strongly polynomial time. We also give a non-succinct linear game whose solution can be found in strongly polynomial time

    Protecting Information Stored Inside the Cloud with A New CCA-EBO Protocol Designed on Hive Technology

    Get PDF
    Massively scalable facilities may be accessed online with ease due to "Cloud Computing (CC)". The CC resources are primarily characterized by the fact that "Cloud User (CU)" information is often kept on "Cloud Server (CS)" that the CU doesn't even possess or control. The CUs' apprehension about the loss of management of their information may lead to a substantial roadblock in their acceptance of CC offerings. In an attempt to highlight the effectiveness of CC security, the "Cloud Service Providers (CSP)" need to empower the CU to control and evaluate their data. The focus of this research chooses to highlight a key aspect of CC platforms employed to handle CU information on unrecognized CSs at remote locations. Concerns about compromising personal information arise from this feature's importance. In this research, a novel swarm-based "Enhanced BAT Optimization (EBO)" for key generating in "Cloud Computing Accountability (CCA)" for CC information tracking is proposed to solve security issues. Generally, this proposed hybrid CCA-EBO architecture is based on the idea of data accountability, which enables dispersed end-to-end responsibility. The information is made available to the general public, although with a limited set of permissions. The "Cloud Administrator (CA)" would specify the level of access each CU has to the data before it is made available to them. All CU accesses to data are recorded and will be found in a log file for CA to review. According to evaluation methods for the proposed CCA-EBO, existing "Hybrid Secure Cloud Storage (HSCS)", and "Advanced Distribution Verification Protocol (ADVP)", the CCA-EBO provides more security than HSCS, and ADVP in terms of "Auditing Time", "Encryption Time", "Decryption Time", and "Storage Overhead"

    Active and passive multispectral scanner for earth resources applications: An advanced applications flight experiment

    Get PDF
    The development of an experimental airborne multispectral scanner to provide both active (laser illuminated) and passive (solar illuminated) data from a commonly registered surface scene is discussed. The system was constructed according to specifications derived in an initial programs design study. The system was installed in an aircraft and test flown to produce illustrative active and passive multi-spectral imagery. However, data was not collected nor analyzed for any specific application

    Topological Constraints on the Charge Distributions for the Thomson Problem

    Full text link
    The method of Morse theory is used to analyze the distributions of unit charges interacting through a repulsive force and constrained to move on the surface of a sphere -- the Thomson problem. We find that, due to topological reasons, the system may organize itself in the form of pentagonal structures. This gives a qualitative account for the interesting ``pentagonal buttons'' discovered in recent numerical work.Comment: 10 pages; dedicated to Rafael Sorkin on his 60th birthda
    • …
    corecore