12,083 research outputs found

    Temporal Integration of Seismic Traveltime Tomography

    Get PDF
    Time-lapse geophysical measurements and seismic imaging methods in particular are powerful techniques for monitoring changes in reservoir properties. Traditional time-lapse processing methods treat each dataset as an independent unit and estimate changes in reservoir state through differencing these separate inversions. We present a general least-squares approach to jointly inverting time-varying property models through use of spatio-temporal coupling operators. Originally developed within the medical imaging community, this extension of traditional Tikhonov regularization allows us to constrain the way in which models vary in time, thereby reducing artifacts observed in traditional time-lapse imaging formulations. The same methodology can also accommodate changes in experiment geometry as a function of time thus allowing inversion of incremental or incomplete surveys. In this case, temporal resolution is traded for improved spatial coverage at individual timesteps. We use seismic traveltime tomography as a model problem although almost any geophysical inversion task can be posed within this formalism. We apply the developed time-lapse inversion algorithm to a synthetic crosswell dataset designed to replicate a CO2 sequestration monitoring experiment

    M2000 : an astrometric catalog in the Bordeaux Carte du Ciel zone +11 degrees < {delta} < +18 degrees

    Full text link
    During four years, systematic observations have been conducted in drift scan mode with the Bordeaux automated meridian circle in the declination band [+11 ; +18]. The resulting astrometric catalog includes about 2 300 000 stars down to the magnitude limit V_M=16.3. Nearly all stars (96%) have been observed at least 6 times, the catalog being complete down to V_M=15.4. The median internal standard error in position is about 35 mas in the V_M magnitude range [11 ; 15], which degrades to about 50 mas when the faintest stars are considered. M2000 provides also one band photometry with a median internal standard error of 0.04 mag. Comparisons with the Hipparcos and bright part of Tycho-2 catalogs have enabled to estimate external errors in position to be lower than 40 mas. In this zone and at epoch 1998, the faint part of Tycho-2 is found to have an accuracy of 116 mas in alpha instead of 82 mas deduced from the model-based standard errors given in the catalog.Comment: The catalogue can be fetched directly from: ftp://cdsarc.u-strasbg.fr/cats/I/272 or queried from: http://vizier.u-strasbg.fr/viz-bin/VizieR?-source=I/272 More information at : http://www.observ.u-bordeaux.fr/~soubiran/m2000.ht

    Fast Ground State Manipulation of Neutral Atoms in Microscopic Optical Traps

    Full text link
    We demonstrate Rabi flopping at MHz rates between ground hyperfine states of neutral 87^{87}Rb atoms that are trapped in two micron sized optical traps. Using tightly focused laser beams we demonstrate high fidelity, site specific Rabi rotations with crosstalk on neighboring sites separated by 8μm8 \mu\rm m at the level of 10−310^{-3}. Ramsey spectroscopy is used to measure a dephasing time of 870μs870 \mu\rm s which is ≈\approx 5000 times longer than the time for a π/2\pi/2 pulse.Comment: 4 pages, 4 figure

    Gilbert Damping in Magnetic Multilayers

    Full text link
    We study the enhancement of the ferromagnetic relaxation rate in thin films due to the adjacent normal metal layers. Using linear response theory, we derive the dissipative torque produced by the s-d exchange interaction at the ferromagnet-normal metal interface. For a slow precession, the enhancement of Gilbert damping constant is proportional to the square of the s-d exchange constant times the zero-frequency limit of the frequency derivative of the local dynamic spin susceptibility of the normal metal at the interface. Electron-electron interactions increase the relaxation rate by the Stoner factor squared. We attribute the large anisotropic enhancements of the relaxation rate observed recently in multilayers containing palladium to this mechanism. For free electrons, the present theory compares favorably with recent spin-pumping result of Tserkovnyak et al. [Phys. Rev. Lett. \textbf{88},117601 (2002)].Comment: 1 figure, 5page

    Reconstruction of modified gravity with ghost dark energy models

    Full text link
    In this work, we reconstruct the f(R)f(R) modified gravity for different ghost and generalized ghost dark energy models in FRW flat universe, which describe the accelerated expansion of the universe. The equation of state of reconstructed f(R)f(R) - gravity has been calculated. We show that the corresponding f(R)f(R) gravity of ghost dark energy model can behave like phantom or quintessence. We also show that the equation of state of reconstructed f(R)f(R) gravity for generalized ghost model can transit from quintessence regime to the phantom regime as indicated by recent observations.Comment: 13 pages, some references and one author are added. Accepted for publication by MPL

    Reining in the Web's Inconsistencies with Site Policy

    Get PDF
    Over the years, browsers have adopted an ever-increasing number of client-enforced security policies deployed through HTTP headers. Such mechanisms are fundamental for web application security, and usually deployed on a per-page basis. This, however, enables inconsistencies, as different pages within the same security boundaries (in form of origins or sites) can express conflicting security requirements. In this paper, we formalize inconsistencies for cookie security attributes, CSP, and HSTS, and then quantify the magnitude and impact of inconsistencies at scale by crawling 15,000 popular sites. We show that numerous sites endanger their own security by omission or misconfiguration of the aforementioned mechanisms, which lead to unnecessary exposure to XSS, cookie theft, and HSTS deactivation. We then use our data to analyse to which extent the recent Origin Policy proposal can fix the problem of inconsistencies. Unfortunately, we conclude that the current Origin Policy design suffers from major shortcomings which limit its practical applicability to address security inconsistencies while catering to the need of real-world sites. Based on these insights, we propose Site Policy, designed to overcome Origin Policy's shortcomings and make any insecurity explicit. We make a prototype implementation of Site Policy publicly available, along with a supporting toolchain for initial policy generation, security analysis, and test deployment

    ethical reasons and political commitment

    Get PDF
    Political commitments to resist oppression play a central role in the moral lives of many people. Such commitments are also a source of ethical reasons. They influence and organize ethical beliefs, emotions and reasons in an ongoing way. Political commitments to address oppression often contain a concern for the dignity and well-being of others and the objects of political commitments often have value, according to ideal moral theories, such as Kantian and utilitarian theory. However, ideal moral theories do not fully explain the ethical reasons political commitments engender. First, ideal moral theories do not explain the normative priority that agents give to politically committed ethical reasons. Their profound effect on a politically committed agent’s ethical deliberation and choice and the precedence they are given over other ends cannot be wholly understood through the moral obligations within ideal theories. Second, although politically committed reasons are valuable in ideal theory for the benefits they bring to others, they are not fungible with other reasons ideal theory would regard as having equal ethical value. A person might substitute another beneficial humanitarian aim for that to which she is politically committed and nevertheless regard herself as having done a morally wrong thing for failing or betraying her commitment. Politically committed ethical reasons are also motivated and informed by the social location of agents and their relationship to structures of oppression. Although there are universal ethical reasons to oppose oppression, this means that some of a person’s actual ethical reasons will be irreducibly particular

    Proof-Pattern Recognition and Lemma Discovery in ACL2

    Full text link
    We present a novel technique for combining statistical machine learning for proof-pattern recognition with symbolic methods for lemma discovery. The resulting tool, ACL2(ml), gathers proof statistics and uses statistical pattern-recognition to pre-processes data from libraries, and then suggests auxiliary lemmas in new proofs by analogy with already seen examples. This paper presents the implementation of ACL2(ml) alongside theoretical descriptions of the proof-pattern recognition and lemma discovery methods involved in it
    • …
    corecore