84 research outputs found

    Anisotropic Nonlinear Diffusion with Absorption: Existence and Extinction

    Get PDF
    The authors prove that the nonlinear parabolic partial differential equation ∂ u ∂ t = ∑ i , j = 1 n ∂ 2 ∂ x i ∂ x j φ i j ( u ) − f ( u ) with homogeneous Dirichlet boundary conditions and a nonnegative initial condition has a nonnegative generalized solution u . They also give necessary and sufficient conditions on the constitutive functions φ i j and f which ensure the existence of a time t 0 \u3e 0 for which u vanishes for all t ≥ t 0

    Atomic-scale compensation phenomena at polar interfaces

    Full text link
    The interfacial screening charge that arises to compensate electric fields of dielectric or ferroelectric thin films is now recognized as the most important factor in determining the capacitance or polarization of ultrathin ferroelectrics. Here we investigate using aberration-corrected electron microscopy and density functional theory how interfaces cope with the need to terminate ferroelectric polarization. In one case, we show evidence for ionic screening, which has been predicted by theory but never observed. For a ferroelectric film on an insulating substrate, we found that compensation can be mediated by interfacial charge generated, for example, by oxygen vacancies.Comment: 3 figure

    Measuring the Reflection Matrix of a Rough Surface

    Get PDF
    Phase modulation methods for imaging around corners with reflectively scattered light required illumination of the occluded scene with a light source either in the scene or with direct line of sight to the scene. The RM (reflection matrix) allows control and refocusing of light after reflection, which could provide a means of illuminating an occluded scene without access or line of sight. Two optical arrangements, one focal-plane, the other an imaging system, were used to measure the RM of five different rough-surface reflectors. Intensity enhancement values of up to 24 were achieved. Surface roughness, correlation length, and slope were examined for their effect on enhancement. Diffraction-based simulations were used to corroborate experimental results

    Reflective Inverse Diffusion

    Get PDF
    Phase front modulation was previously used to refocus light after transmission through scattering media. This process has been adapted here to work in reflection. A liquid crystal spatial light modulator is used to conjugate the phase scattering properties of diffuse reflectors to produce a converging phase front just after reflection. The resultant focused spot had intensity enhancement values between 13 and 122 depending on the type of reflector. The intensity enhancement of more specular materials was greater in the specular region, while diffuse reflector materials achieved a greater enhancement in non-specular regions, facilitating non-mechanical steering of the focused spot. Scalar wave optics modeling corroborates the experimental results

    Receiver Operating Characteristic Analysis for Detecting Explosives-related Threats

    Get PDF
    The Department of Homeland Security (DHS) and the Transportation Security Administration (TSA) are interested in developing a standardized testing procedure for determining the performance of candidate detection systems. This document outlines a potential method for judging detection system performance as well as determining if combining the information from a legacy system with a new system can signiÃÂÃÂÃÂÃÂcantly improve performance. In this document, performance corresponds to the Neyman-Pearson criterion applied to the Receiver Operating Characteristic (ROC) curves of the detection systems in question. A simulation was developed to investigate how the amount of data provided by the vendor in the form of the ROC curve eÃÂÃÂÃÂäects the performance of the combined detection system. Furthermore, the simulation also takes into account the potential eÃÂÃÂÃÂäects of correlation and how this information can also impact the performance of the combined system

    Models of Nation-Building via Systems of Differential Equations

    Get PDF
    Nation-building modeling is an important field of research given the increasing number of candidate nations and the limited resources available. A modeling methodology and a system of differential equations model are presented to investigate the dynamics of nation-building. The methodology is based upon parameter identification techniques applied to a system of differential equations, to evaluate nation-building operations. Data from Operation Iraqi Freedom (OIF) and Afghanistan are used to demonstrate the validity of different models as well as the comparison of models

    Autoassociative-heteroassociative Neural Network

    Get PDF
    An efficient neural network computing technique capable of synthesizing two sets of output signal data from a single input signal data set. The method and device of the invention involves a unique integration of autoassociative and heteroassociative neural network mappings, the autoassociative neural network mapping enabling a quality metric for assessing the generalization or prediction accuracy of the heteroassociative neural network mapping

    A Method for Revealing and Addressing Security Vulnerabilities in Cyber-physical Systems by Modeling Malicious Agent Interactions with Formal Verification

    Get PDF
    Several cyber-attacks on the cyber-physical systems (CPS) that monitor and control critical infrastructure were publically announced over the last few years. Almost without exception, the proposed security solutions focus on preventing unauthorized access to the industrial control systems (ICS) at various levels – the defense in depth approach. While useful, it does not address the problem of making the systems more capable of responding to the malicious actions of an attacker once they have gained access to the system. The first step in making an ICS more resilient to an attacker is identifying the cyber security vulnerabilities the attacker can use during system design. This paper presents a method that reveals cyber security vulnerabilities in ICS through the formal modeling of the system and malicious agents. The inclusion of the malicious agent in the analysis of an existing systems identifies security vulnerabilities that are missed in traditional functional model checking

    How Captain Amerika uses neural networks to fight crime

    Get PDF
    Artificial neural network models can make amazing computations. These models are explained along with their application in problems associated with fighting crime. Specific problems addressed are identification of people using face recognition, speaker identification, and fingerprint and handwriting analysis (biometric authentication)
    • …
    corecore