1,244 research outputs found
Solar feature tracking in both spatial and temporal domains
A new method for automated coronal loop tracking, in both spatial and temporal
domains, is presented. The reliability of this technique was tested with TRACE 171A observations.
The application of this technique to a flare-induced kink-mode oscillation, revealed a
3500 km spatial periodicity which occur along the loop edge. We establish a reduction in oscillatory
power, for these spatial periodicities, of 45% over a 322 s interval. We relate the reduction
in oscillatory power to the physical damping of these loop-top oscillations
Recommended from our members
Evaluating the applicability of multi-agent software for implementing distributed industrial data management approaches
Distributed approaches to industrial control or information management problems are often tackled using Multi-agent methods. Multi-Agent systems – solutions resulting from taking a Multi-agent based approaches - often come with a certain amount of “overhead” such as communication systems, but can provide a helpful tool with the design and implementation. In this paper, a distributed data management problem is addressed with both a bespoke approach developed specifically for this problem and a more general Multi-agent approach. The two approaches are compared using architecture and software metrics. The software metric results show similar results, although overall the bespoke approach was more appropriate for the particular application examined. The architectural analysis indicates that the main reason for this difference is the communication and computation overhead associated with the agent-based system. It was not within the scope of this study to compare the two approaches under multiple application scenarios.BoeingThis is the author accepted manuscript. The final version is available from Springer via http://dx.doi.org/10.1007/978-3-319-15159-5_1
Recommended from our members
Overcoming limited dataset availability when working with industrial organisations
Increasing data security and privacy requirements combined with the need for additional data management research leads to a conflict for industrial companies. In order to solve their industrial data management problems companies need to share some of their data, but their internal confidentiality rules sometimes hamper this sharing process. Existing techniques for sharing data without releasing company secrets often loose some of the problems/characteristics within the data. This paper therefore presents a qualitative process to overcome this problem of industrial data sharing while still enabling external researchers to develop relevant solutions to organizational problems. It is based on initial trials with two industrial case studies and showed some promising results.BoeingThis is the author accepted manuscript. The final version is available from IEEE via http://dx.doi.org/10.1109/INDIN.2015.728184
THE EVOLVING THREAT AND ENFORCEMENT OF REPLICA GOODS
Of all the instances and schemes for infringing and counterfeiting trademark rights, perhaps none has been as successful and insidious as “replicas.” The term “replica,” when applied, for instance, to a watch or handbag, is synonymous with “counterfeit.” Both terms are used to describe a product that is an exact and unauthorized copy of an authentic product. While some street merchants may call their counterfeit products “replicas,” the designation exploded in popularity on the thousands of websites that boast look-alike counterfeit products. The popularity of “replica” goods is largely dependent on the absence of liability for manufacturers of these transient and low-cost goods, coupled with the public’s quest for a luxury image without the luxury good price. The prevalence of replica goods and the never-ending demand for them has created an unprecedented enforcement challenge for trademark owners.
This Article discusses the issue of replicas and the difficulty in applying liability. It addresses the difficulty in convincing consumers that replica goods are harmful, absent some personal liability. United States Customs even permits those traveling to the United States to import one counterfeit good, such as a handbag or item of clothing, so long as it is intended for personal use. How can trademark owners persuade consumers that all counterfeiting is a crime, when certain circumstances allow—or in the case of replicas, at least appear to condone—counterfeit products? The Author concludes that trademark owners must be proactive and search for alternative ways to enforce their intellectual property rights, including holding third parties liable for infringement
THE EVOLVING THREAT AND ENFORCEMENT OF REPLICA GOODS
Of all the instances and schemes for infringing and counterfeiting trademark rights, perhaps none has been as successful and insidious as “replicas.” The term “replica,” when applied, for instance, to a watch or handbag, is synonymous with “counterfeit.” Both terms are used to describe a product that is an exact and unauthorized copy of an authentic product. While some street merchants may call their counterfeit products “replicas,” the designation exploded in popularity on the thousands of websites that boast look-alike counterfeit products. The popularity of “replica” goods is largely dependent on the absence of liability for manufacturers of these transient and low-cost goods, coupled with the public’s quest for a luxury image without the luxury good price. The prevalence of replica goods and the never-ending demand for them has created an unprecedented enforcement challenge for trademark owners.
This Article discusses the issue of replicas and the difficulty in applying liability. It addresses the difficulty in convincing consumers that replica goods are harmful, absent some personal liability. United States Customs even permits those traveling to the United States to import one counterfeit good, such as a handbag or item of clothing, so long as it is intended for personal use. How can trademark owners persuade consumers that all counterfeiting is a crime, when certain circumstances allow—or in the case of replicas, at least appear to condone—counterfeit products? The Author concludes that trademark owners must be proactive and search for alternative ways to enforce their intellectual property rights, including holding third parties liable for infringement
Evaluation of Retrievable Drip Tape Irrigation Systems
California growers of lettuce, broccoli, celery, and cauliflower have long been leaders in drip tape applications. Starting in the early 1990s, large acreages of buried, subsurface drip irrigation (SDI) were installed with the intent of leaving the tape in the ground for up to 10 years (Burt and Styles, 1999). Tape burial depths were typically 20 - 25 cm below the soil surface. Although yields and irrigation efficiencies typically increased, there were numerous challenges with SDI. Since the tape was buried, such issues occurred as gopher damage, problems with root intrusion, soil back-siphonage when the system was shut off, damage during harvesting during wet weather, and difficulties in developing uniform wetting patterns for germination. In addition, because the location of the buried tape was permanently fixed, any shifting of the beds that took place during cultivation operations would result in vertical or lateral displacement from the tape. The fixed position also made crop rotations inherently inflexible since crop bed widths could not be varied
The effects of transients on photospheric and chromospheric power distributions
We have observed a quiet Sun region with the Swedish 1-meter Solar Telescope
(SST) equipped with CRISP Imaging SpectroPolarimeter. High-resolution,
high-cadence, H line scanning images were taken to observe different
layers of the solar atmosphere from the photosphere to upper chromosphere. We
study the distribution of power in different period-bands at different heights.
Power maps of the upper photosphere and the lower chromosphere show suppressed
power surrounding the magnetic-network elements, known as "magnetic shadows".
These also show enhanced power close to the photosphere, traditionally referred
to as "power halos". The interaction between acoustic waves and inclined
magnetic fields is generally believed to be responsible for these two effects.
In this study we explore if small-scale transients can influence the
distribution of power at different heights. We show that the presence of
transients, like mottles, Rapid Blueshifted Excursions (RBEs) and Rapid
Redshifted Excursions (RREs), can strongly influence the power-maps. The short
and finite lifetime of these events strongly affects all powermaps, potentially
influencing the observed power distribution. We show that Doppler-shifted
transients like RBEs and RREs that occur ubiquitously, can have a dominant
effect on the formation of the power halos in the quiet Sun. For magnetic
shadows, transients like mottles do not seem to have a significant effect in
the power suppression around 3 minutes and wave interaction may play a key role
here. Our high cadence observations reveal that flows, waves and shocks
manifest in presence of magnetic fields to form a non-linear
magnetohydrodynamic system.Comment: 11 pages, 11 Figures, 4 movies (will be available online in ApJ). ApJ
(accepted
Departure of high temperature iron lines from the equilibrium state in flaring solar plasmas
The aim of this study is to clarify if the assumption of ionization
equilibrium and a Maxwellian electron energy distribution is valid in flaring
solar plasmas. We analyze the 2014 December 20 X1.8 flare, in which the
\ion{Fe}{xxi} 187~\AA, \ion{Fe}{xxii} 253~\AA, \ion{Fe}{xxiii} 263~\AA\ and
\ion{Fe}{xxiv} 255~\AA\ emission lines were simultaneously observed by the EUV
Imaging Spectrometer onboard the Hinode satellite. Intensity ratios among these
high temperature Fe lines are compared and departures from isothermal
conditions and ionization equilibrium examined. Temperatures derived from
intensity ratios involving these four lines show significant discrepancies at
the flare footpoints in the impulsive phase, and at the looptop in the gradual
phase. Among these, the temperature derived from the
\ion{Fe}{xxii}/\ion{Fe}{xxiv} intensity ratio is the lowest, which cannot be
explained if we assume a Maxwellian electron distribution and ionization
equilibrium, even in the case of a multi-thermal structure. This result
suggests that the assumption of ionization equilibrium and/or a Maxwellian
electron energy distribution can be violated in evaporating solar plasma around
10~MK.Comment: 10 pages, 4 figures, to appear in Ap
Effects of Unilateral Hearing Loss on Teacher Responses to the SIFTER
Eighteen school children with unilateral hearing loss were compared to their peers through administration of the Screening Instrument for Targeting Educational Risk (SIFTER) to their teachers. Results indicate that children with unilateral hearing loss are given SIFTER scores significantly lower than their peers in all five SIFTER areas of academics, attention, communication, participation, and behavior. Such results support previous findings regarding teachers\u27 attitudes toward students with unilateral hearing loss and indicate a need for in-service education for the classroom teacher and special attention to the educational risks of such children
Comparative Outcomes and Safety of Vedolizumab vs Tumor Necrosis Factor Antagonists for Older Adults With Inflammatory Bowel Diseases
IMPORTANCE: Observational comparative effectiveness studies can inform the positioning of biologic therapies for older patients with inflammatory bowel disease (IBD) who are underrepresented in clinical trials. OBJECTIVE: To compare the effectiveness and safety of vedolizumab vs tumor necrosis factor (TNF) for older patients with IBD. DESIGN, SETTING, AND PARTICIPANTS: This active comparator, new-user design, comparative effectiveness study was conducted between January 1, 2005, and December 31, 2018, among 754 older patients (aged ≥50 years) with IBD from the Danish National Patient Register. The mean follow-up after treatment initiation took place at 32 to 40 weeks. Statistical analysis was performed from February 1 to April 27, 2022. INTERVENTIONS: Treatment with vedolizumab or TNF antagonists. MAIN OUTCOMES AND MEASURES: The primary effectiveness outcome was treatment failure, defined as the composite risk of IBD-related hospitalization, IBD-related surgery, or a new corticosteroid prescription more than 6 weeks after initiation of treatment with biologic therapy. Secondary effectiveness outcomes were time to each individual component of the composite effectiveness outcome. The primary safety outcome was the risk of serious infections, defined as infections requiring hospitalization. A 1:1 propensity score–matched analysis was conducted, accounting for patient-, disease-, and treatment-associated factors. RESULTS: The study compared 377 older patients with IBD with incident use of vedolizumab (202 women [53.6%]; mean [SD] age, 61.2 [8.3] years; 177 [46.9%] with Crohn disease) vs 377 patients with incident use of TNF antagonists (206 women [54.6%]; mean [SD] age, 61.3 [8.1] years; 182 [48.3%] with Crohn disease). Overall, vedolizumab was associated with an increased risk of treatment failure compared with TNF antagonists (1-year risk, 45.4% vs 34.7%; adjusted hazard ratio [HR], 1.31; 95% CI, 1.02-1.69), including higher risk of IBD-related hospitalization (1-year risk, 27.8% vs 16.3%; adjusted HR, 1.48; 95% CI, 1.03-2.15) and IBD-related major abdominal surgery (1-year risk, 21.3% vs 8.0%; adjusted HR, 2.39; 95% CI, 1.45-3.94). In subgroup analysis by IBD phenotype, among patients with Crohn disease, vedolizumab was associated with a 77% higher risk of treatment failure (adjusted HR, 1.77; 95% CI, 1.21-2.58), while no difference in risk of treatment failure was seen among patients with ulcerative colitis (adjusted HR, 1.04; 95% CI, 0.75-1.43; P = .03 for interaction). There was no significant difference in the risk of serious infections, overall (1-year risk, 8.2% vs 8.7%; adjusted HR, 1.04; 95% CI, 0.58-1.85) and by IBD phenotype. CONCLUSIONS AND RELEVANCE: In this comparative effectiveness study of older patients with IBD, vedolizumab was associated with a higher risk of treatment failure compared with TNF antagonists, particularly among patients with Crohn disease, without offering a significant safety advantage
- …