2,499 research outputs found

    An Introduction to U.S. Export Control: Regulations for Patent Practitioners

    Get PDF
    This article presents basic information on the U.S. export control laws most relevant to U.S. patent practice, including the preparation and filing of patent applications related to commercial items, and the intended audience of this article is the U.S. patent practitioner who does not routinely deal with export-controlled subject matter. If the patent practitioner intends to: export technical information from the U.S. for the purpose of having a patent application prepared; hire or work with foreign nationals (who may or may not actually be in the U.S.) in conducting technical research or patentability and invalidity searches; or help prepare patent applications for filing, the practitioner is encouraged to become familiar with the Export Administration Regulations (EAR) and the International Traffic in Arms Regulations as discussed below, or to consult an export control practitioner for further guidance

    Communication Deficiencies from Chimp to Child

    Get PDF
    Equating speech with language is a fallacy, declare these authors. They describe a plastic word non-speech response approach that opens a whole new vista for teaching the language-deficient child to communicate

    Velocity Curve Analysis of the Spectroscopic Binary Stars V373 Cas, V2388 Oph, V401 Cyg, GM Dra, V523 Cas, AB And, and HD 141929 by Artificial Neural Networks

    Full text link
    We used an Artificial Neural Network (ANN) to derive the orbital parameters of spectroscopic binary stars. Using measured radial velocity data of seven double-lined spectroscopic binary systems V373 Cas, V2388 Oph, V401 Cyg, GM Dra, V523 Cas, AB And, and HD 141929, we found corresponding orbital and spectroscopic elements. Our numerical results are in good agreement with those obtained by others using more traditional methods.Comment: 13 pages, 8 figures, 14 Table

    Analysis of complex singularities in high-Reynolds-number Navier-Stokes solutions

    Full text link
    Numerical solutions of the laminar Prandtl boundary-layer and Navier-Stokes equations are considered for the case of the two-dimensional uniform flow past an impulsively-started circular cylinder. We show how Prandtl's solution develops a finite time separation singularity. On the other hand Navier-Stokes solution is characterized by the presence of two kinds of viscous-inviscid interactions that can be detected by the analysis of the enstrophy and of the pressure gradient on the wall. Moreover we apply the complex singularity tracking method to Prandtl and Navier-Stokes solutions and analyze the previous interactions from a different perspective

    Lanczos-based Low-Rank Correction Method for Solving the Dyson Equation in Inhomogenous Dynamical Mean-Field Theory

    Get PDF
    Inhomogeneous dynamical mean-field theory has been employed to solve many interesting strongly interacting problems from transport in multilayered devices to the properties of ultracold atoms in a trap. The main computational step, especially for large systems, is the problem of calculating the inverse of a large sparse matrix to solve Dyson's equation and determine the local Green's function at each lattice site from the corresponding local self-energy. We present a new efficient algorithm, the Lanczos-based low-rank algorithm, for the calculation of the inverse of a large sparse matrix which yields this local (imaginary time) Green's function. The Lanczos-based low-rank algorithm is based on a domain decomposition viewpoint, but avoids explicit calculation of Schur complements and relies instead on low-rank matrix approximations derived from the Lanczos algorithm, for solving the Dyson equation. We report at least a 25-fold improvement of performance compared to explicit decomposition (such as sparse LU) of the matrix inverse. We also report that scaling relative to matrix sizes, of the low-rank correction method on the one hand and domain decomposition methods on the other, are comparable.Comment: 13 pages, 1 figure, 24th Annual CSP Workshop, University of Georgia, Athens, GA, submitted to Physics Procedia. New version has some of the References correcte

    Optimally Distributed Receiver Placements Versus an Environmentally Aware Source: New England Shelf Break Acoustics Signals and Noise Experiment

    Get PDF
    This article describes the results of the Spring of 2021 New England Shelf Break Acoustics (NESBA) Signals and Noise experiment as they pertain to the optimization of a field of passive receivers versus an environmentally aware source with end-state goals. A discrete optimization has been designed and used to demonstrate providing an acoustic system operator with actionable guidance relating to optimally distributed receiver locations and depths and likely mean source detection times and associated uncertainties as a function of source and receiver levels of environmental awareness. The uncertainties considered here are those due to the imperfect spatial and temporal sensing of the water column, ambient noise (AN), and the seabed, and the impact this has on ocean forecasting and acoustic performance prediction accuracy. As a part of the NESBA experiment, high-resolution (1 km spatial) regional Navy Coastal Ocean Model ensemble forecasts were generated to capture oceanographic variability and uncertainty. Passive AN-based seabed measurements were conducted to estimate seabed properties including variability and uncertainty. Extensive AN and conductivity, temperature, and depth measurements were also conducted. In this article, operationally relevant metrics are employed to estimate the potential value-added of optimal receiver location and depth placements as a function of source end-state goals and assumed level of environmental awareness. A concept for generating stochastic acoustic prediction metrics and associated optimally distributed receiver locations and depths in an operational environment is proposed

    Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE

    Full text link
    As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are concerned. Security experts, however, must still be able to acquire and analyze data in a methodical, rigorous and forensically sound manner. This work applies the STRIDE asset-based risk assessment method to cloud computing infrastructure for the purpose of identifying and assessing an organization's ability to respond to and investigate breaches in cloud computing environments. An extension to the STRIDE risk assessment model is proposed to help organizations quickly respond to incidents while ensuring acquisition and integrity of the largest amount of digital evidence possible. Further, the proposed model allows organizations to assess the needs and capacity of their incident responders before an incident occurs.Comment: 13 pages, 3 figures, 3 tables, 5th International Conference on Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp. 223-236, 201
    • …
    corecore