5,148 research outputs found

    A Sixth-Order Extension to the MATLAB Package bvp4c of J. Kierzenka and L. Shampine

    Get PDF
    A new two-point boundary value problem algorithm based upon the MATLAB bvp4c package of Kierzenka and Shampine is described. The algorithm, implemented in a new package bvp6c, uses the residual control framework of bvp4c (suitably modified for a more accurate finite difference approximation) to maintain a user specified accuracy. The new package is demonstrated to be as robust as the existing software, but more efficient for most problems, requiring fewer internal mesh points and evaluations to achieve the required accuracy

    ESTIMATING PRODUCER'S SURPLUS WITH THE CENSORED REGRESSION MODEL: AN APPLICATION TO PRODUCERS AFFECTED BY COLUMBIA RIVER BASIN SALMON RECOVERY

    Get PDF
    Application of the tobit model to estimate economic welfare is transferred from the consumer side to the producer side. Supply functions are estimated for multioutput irrigators in the Pacific Northwest. Empirical procedures are then developed for computing expected producer's surplus from the output supply functions. Confidence intervals for the surplus measures are generated using the Krinsky-Robb method. An experiment predicts decreases in surplus given increases in water pumping cost. The experiment replicates possible increases in hydroelectric prices due to the salmon recovery program in the Columbia-Snake River Basin. Output substitution explains producers' ability to mitigate the effect of the price increases on producer's surplus.Resource /Energy Economics and Policy,

    Music transcriptions for euphonium

    Get PDF
    The study presents an overview of two musical transcriptions for euphonium by Robert Schumann. Five Pieces in Folk Style and Fantasiestücke are two important pieces of literature for euphonium. The euphonium has a number of transcriptions written for it, and these works are a good example of how to approach other transcriptions. Both pieces have their challenges when being prepared to perform, and it is important to understand aspects such as background information, differences between original works and the transcription, and difficulties in the piece that require attention when preparing the work.School of MusicThesis (M.M.

    On well-rounded sublattices of the hexagonal lattice

    Get PDF
    We produce an explicit parameterization of well-rounded sublattices of the hexagonal lattice in the plane, splitting them into similarity classes. We use this parameterization to study the number, the greatest minimal norm, and the highest signal-to-noise ratio of well-rounded sublattices of the hexagonal lattice of a fixed index. This investigation parallels earlier work by Bernstein, Sloane, and Wright where similar questions were addressed on the space of all sublattices of the hexagonal lattice. Our restriction is motivated by the importance of well-rounded lattices for discrete optimization problems. Finally, we also discuss the existence of a natural combinatorial structure on the set of similarity classes of well-rounded sublattices of the hexagonal lattice, induced by the action of a certain matrix monoid.Comment: 21 pages (minor correction to the proof of Lemma 2.1); to appear in Discrete Mathematic

    Recent Cases

    Get PDF
    Courts Split on the Necessity of Separate Authorization for a Covert Entry Under Title III of the Omnibus Crime Control and Safe Streets Act of 1968 Daniel Paul Smith Title III of the Omnibus Crime Control and Safe Streets Act of 1968,\u27 which regulates the use of electronic surveillance, was designed to protect the privacy of wire and oral communications, and to delineate on a uniform basis the circumstances and conditions under which the interception of wire and oral communications may be authorized. \u27 In general, communications may be intercepted only by law enforcement officers, who are engaged in the investigation of a certain type of crime, and who have obtained a court order based upon probable cause that authorizes the use of electronic surveillance. Although certain details of the particular interception must be specified in the court order, the statute does not expressly require that the judge who authorizes the use of electronic surveillance also authorize covert entries that may be required to place the electronic listening devices Until recently the federal courts apparently had assumed that an order authorizing the use of electronic surveillance implicitly authorized a surreptitious entry by law enforcement officials to install the necessary device. In United States v. Ford, however, the District of Columbia Circuit became the first federal court of appeals to reject this assumption, holding that absent express judicial authorization, a trespassory entry incident to the placement of an electronic listening device is an invasion of privacy that violates the fourth amendment. =============== ================= =========== Custodial Suspect\u27s Admissions After Assertion and Subsequent Waiver of Right to Counsel Are Not Per Se Excluded in Absence of Coercion R. Michael Moore The holding in this case carries the trend toward reinterpretation of Miranda to an undesirable extreme. Although the rejection of the per se rule will diminish the number of reversals of factually correct convictions, relegating the protection of the right to counsel to the same analysis employed in right to silence cases operates an injustice on criminal suspects. The request for an attorney should trigger greater protection because every effort should be made to insure that the suspect exercises his judgment intelligently. Despite the Supreme Court\u27s retrenchment from the Miranda assumption that all custodial interrogations are inherently coercive, coercion remains a problem, especially where a suspect is confused or unable to exercise his rights intelligently. Thus implementation of a strict waiver test is necessary to secure a suspect\u27s rights in the absence of the per se rule

    Transcriptional profiling of colicin-induced cell death of Escherichia coli MG1655 identifies potential mechanisms by which bacteriocins promote bacterial diversity

    Get PDF
    We report the transcriptional response of Escherichia coli MG1655 to damage induced by colicins E3 and E9, bacteriocins that kill cells through inactivation of the ribosome and degradation of chromosomal DNA, respectively. Colicin E9 strongly induced the LexA-regulated SOS response, while colicin E3 elicited a broad response that included the induction of cold shock genes, symptomatic of translational arrest. Colicin E3 also increased the transcription of cryptic prophage genes and other laterally acquired mobile elements. The transcriptional responses to both these toxins suggest mechanisms that may promote genetic diversity in E. coli populations, pointing to a more general role for colicins in adaptive bacterial physiology than has hitherto been realized

    Training That Works: Lessons from California\u27s Employment Training Panel Program

    Get PDF
    The authors provide an in-depth analysis of an incumbent worker training program funded through California\u27s unemployment insurance taxes.https://research.upjohn.org/up_press/1052/thumbnail.jp

    Influence of wall vibrations on the sound of brass wind instruments

    Get PDF
    The results of an experimental and theoretical investigation of the influence of wall vibrations on the sound of brass wind instruments are presented. Measurements of the transmission function and input impedance of a trumpet, with the bell both heavily damped and freely vibrating, are shown to be consistent with a theory that assumes that the internal pressure causes an oscillation of the diameter of the pipe enclosing the air column. These effects are shown to be most significant in sections where there are flaring walls, which explains why damping these vibrations in cylindrical pipes normally produces no measurable effects
    corecore