550 research outputs found
Manuscript Writing Present Practices and Extension Trends Within Schools of the State of Washington
In assuming this study, the author purported to ascertain both the potential and the limitations of manuscript-style hand-writing. A more important goal was to probe the existing fallacies and beliefs that surround one of the most controversial areas in the field of language arts, manuscript-style handwriting. The most important goal was to diagnose the usage and extension trends of manuscript writing within the elementary schools of the state of Washington
I Don\u27t Want To Play In Your Yard
https://digitalcommons.library.umaine.edu/mmb-vp/1648/thumbnail.jp
Implementation of the LANS-alpha turbulence model in a primitive equation ocean model
This paper presents the first numerical implementation and tests of the
Lagrangian-averaged Navier-Stokes-alpha (LANS-alpha) turbulence model in a
primitive equation ocean model. The ocean model in which we work is the Los
Alamos Parallel Ocean Program (POP); we refer to POP and our implementation of
LANS-alpha as POP-alpha. Two versions of POP-alpha are presented: the full
POP-alpha algorithm is derived from the LANS-alpha primitive equations, but
requires a nested iteration that makes it too slow for practical simulations; a
reduced POP-alpha algorithm is proposed, which lacks the nested iteration and
is two to three times faster than the full algorithm. The reduced algorithm
does not follow from a formal derivation of the LANS-alpha model equations.
Despite this, simulations of the reduced algorithm are nearly identical to the
full algorithm, as judged by globally averaged temperature and kinetic energy,
and snapshots of temperature and velocity fields. Both POP-alpha algorithms can
run stably with longer timesteps than standard POP.
Comparison of implementations of full and reduced POP-alpha algorithms are
made within an idealized test problem that captures some aspects of the
Antarctic Circumpolar Current, a problem in which baroclinic instability is
prominent. Both POP-alpha algorithms produce statistics that resemble
higher-resolution simulations of standard POP.
A linear stability analysis shows that both the full and reduced POP-alpha
algorithms benefit from the way the LANS-alpha equations take into account the
effects of the small scales on the large. Both algorithms (1) are stable; (2)
make the Rossby Radius effectively larger; and (3) slow down Rossby and gravity
waves.Comment: Submitted to J. Computational Physics March 21, 200
Defending Against Insider Use of Digital Steganography
The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse their privilege of access to the Internet to download, install, and use an information hiding tool, such as one of the hundreds of digital steganography applications available on the Internet, to steal sensitive, classified, or proprietary information. Effective countermeasures to this threat must begin with an organizational policy prohibiting installation of information hiding tools on user workstations and must also include automated tools capable of detecting attempts to download and use digital steganography applications. This paper will describe the threat from insider use of digital steganography applications; a new approach to detecting the presence or use of these applications; and extraction of hidden information when a known signature of one of these applications is detected. The analytical approach to steganalysis involves the development and use of computer forensic tools that can detect fingerprints and signatures of digital steganography applications. These tools can be employed in both an off-line forensic-based mode as well as a real-time network surveillance mode. Detection of fingerprints or signatures in either mode may lead to the discovery and extraction of hidden information. Accordingly, this approach represents a significant improvement over traditional blind detection techniques which typically only provide a probability that information may be hidden in a given file without providing a capability to extract any hidden information.
Keywords: insider, steganography, steganalysis, computer forensics, artifacts, fingerprints, hash values, signature
Recommended from our members
Workshop on advances in smooth particle hydrodynamics
This proceedings contains viewgraphs presented at the 1993 workshop held at Los Alamos National Laboratory. Discussed topics include: negative stress, reactive flow calculations, interface problems, boundaries and interfaces, energy conservation in viscous flows, linked penetration calculations, stability and consistency of the SPH method, instabilities, wall heating and conservative smoothing, tensors, tidal disruption of stars, breaking the 10,000,000 particle limit, modelling relativistic collapse, SPH without H, relativistic KSPH avoidance of velocity based kernels, tidal compression and disruption of stars near a supermassive rotation black hole, and finally relativistic SPH viscosity and energy
One-Loop Matching of the Heavy-Light A_0 and V_0 Currents with NRQCD Heavy and Improved Naive Light Quarks
One-loop matching of heavy-light currents is carried out for a highly
improved lattice action, including the effects of dimension 4 O(1/M) and O(a)
operators. We use the NRQCD action for heavy quarks, the Asqtad improved naive
action for light quarks, and the Symanzik improved glue action. As part of the
matching procedure we also present results for the NRQCD self energy and for
massless Asqtad quark wavefunction renormalization with improved glue.Comment: 25 pages, 3 eps-figure
Masculinity as Governance: police, public service and the embodiment of authority, c. 1700-1850
About the book: Public Men offers an introduction to an exciting new field: the history of masculinities in the political domain and will be essential reading for students and specialists alike with interests in gender or political culture. By building upon new work on gender and political culture, these new case studies explore the gendering of the political domain and the masculinities of the men who have historically dominated it. As such, Public Men is a major contribution to our understanding of the history of Britain between the Eighteenth and the Twentieth centuries
The B_s and D_s decay constants in 3 flavor lattice QCD
Capitalizing on recent advances in lattice QCD, we present a calculation of
the leptonic decay constants f_{B_s} and f_{D_s} that includes effects of one
strange sea quark and two light sea quarks. The discretization errors of
improved staggered fermion actions are small enough to simulate with 3
dynamical flavors on lattices with spacings around 0.1 fm using present
computer resources. By shedding the quenched approximation and the associated
lattice scale ambiguity, lattice QCD greatly increases its predictive power.
NRQCD is used to simulate heavy quarks with masses between 1.5 m_c and m_b. We
arrive at the following results: f_{B_s} = 260 \pm 7 \pm 26 \pm 8 \pm 5 MeV and
f_{D_s} = 290 \pm 20 \pm 29 \pm 29 \pm 6 MeV. The first quoted error is the
statistical uncertainty, and the rest estimate the sizes of higher order terms
neglected in this calculation. All of these uncertainties are systematically
improvable by including another order in the weak coupling expansion, the
nonrelativistic expansion, or the Symanzik improvement program.Comment: 4 page
Endocranial suture closure : its progress and age relationship
Part I. : Adult males of white stock Part II. : Ectocranial closure in adult males of white stock Part III. : Endocranial closure in adult males of negro stock Part IV.: Ectocranial closure in adult males of negro stoc
- …