73,860 research outputs found

    Natural Resource Information System, remote sensing studies

    Get PDF
    Potential applications of remote sensing data were reviewed, and available imagery was interpreted to provide input to a demonstration data base. A literature review was conducted to determine the types and qualities of imagery required to satisfy identified data needs. Ektachrome imagery available over the demonstration areas was reviewed to establish the feasibility of interpreting cultural features, range condition, and timber type. Using the same imagery, a land use map was prepared for the demonstration area. The feasibility of identifying commercial timber areas using a density slicing technique was tested on multispectral imagery available for a portion of the demonstration area

    On the dynamical structure of the Trojan group of asteroids

    Get PDF
    Using a semi-analytical approach, domains of possible motion for Trojan asteroids were established. It is shown that stable librating motion is possible for both high inclination and high eccentricity. Frequency distributions were also produced for real Trojan asteroids, against differing libration amplitudes and libration periods

    Quantum Algorithms for Finding Constant-sized Sub-hypergraphs

    Full text link
    We develop a general framework to construct quantum algorithms that detect if a 33-uniform hypergraph given as input contains a sub-hypergraph isomorphic to a prespecified constant-sized hypergraph. This framework is based on the concept of nested quantum walks recently proposed by Jeffery, Kothari and Magniez [SODA'13], and extends the methodology designed by Lee, Magniez and Santha [SODA'13] for similar problems over graphs. As applications, we obtain a quantum algorithm for finding a 44-clique in a 33-uniform hypergraph on nn vertices with query complexity O(n1.883)O(n^{1.883}), and a quantum algorithm for determining if a ternary operator over a set of size nn is associative with query complexity O(n2.113)O(n^{2.113}).Comment: 18 pages; v2: changed title, added more backgrounds to the introduction, added another applicatio

    Numerical solutions of several reflected shock-wave flow fields with nonequilibrium chemical reactions

    Get PDF
    The method of characteristics for a chemically reacting gas is used in the construction of the time-dependent, one-dimensional flow field resulting from the normal reflection of an incident shock wave at the end wall of a shock tube. Nonequilibrium chemical reactions are allowed behind both the incident and reflected shock waves. All the solutions are evaluated for oxygen, but the results are generally representative of any inviscid, nonconducting, and nonradiating diatomic gas. The solutions clearly show that: (1) both the incident- and reflected-shock chemical relaxation times are important in governing the time to attain steady state thermodynamic properties; and (2) adjacent to the end wall, an excess-entropy layer develops wherein the steady state values of all the thermodynamic variables except pressure differ significantly from their corresponding Rankine-Hugoniot equilibrium values

    Mining Frequent Graph Patterns with Differential Privacy

    Full text link
    Discovering frequent graph patterns in a graph database offers valuable information in a variety of applications. However, if the graph dataset contains sensitive data of individuals such as mobile phone-call graphs and web-click graphs, releasing discovered frequent patterns may present a threat to the privacy of individuals. {\em Differential privacy} has recently emerged as the {\em de facto} standard for private data analysis due to its provable privacy guarantee. In this paper we propose the first differentially private algorithm for mining frequent graph patterns. We first show that previous techniques on differentially private discovery of frequent {\em itemsets} cannot apply in mining frequent graph patterns due to the inherent complexity of handling structural information in graphs. We then address this challenge by proposing a Markov Chain Monte Carlo (MCMC) sampling based algorithm. Unlike previous work on frequent itemset mining, our techniques do not rely on the output of a non-private mining algorithm. Instead, we observe that both frequent graph pattern mining and the guarantee of differential privacy can be unified into an MCMC sampling framework. In addition, we establish the privacy and utility guarantee of our algorithm and propose an efficient neighboring pattern counting technique as well. Experimental results show that the proposed algorithm is able to output frequent patterns with good precision

    Net Returns for Grain Sorghum and Corn under Alternative Irrigation Systems in Western Kansas

    Get PDF
    This study evaluates seven irrigation systems for use in production of grain sorghum and corn. These systems are medium pressure center-pivot (MPCP), low pressure center-pivot (LPCP), low drift nozzle center-pivot (LDN) , low energy precision application center-pivot (LEPA), furrow flood (FF) , surge flood (SF), and subsurface drip (SD). After-tax net present value estimates from investing in and using each system over a 10-year period to produce grain sorghum and corn are compared. The surge flood system, has the highest net returns under typical conditions for irrigation of both grain sorghum and corn. The furrow flood system generates the next highest net returns for both crops, followed by the subsurface drip system. The medium pressure center-pivot system is the least profitable for both crops. Of the center-pivot systems, the low pressure system has the highest net return, but is followed very closely by the low drift nozzle system. The results of the sensitivity analysis indicate that the net return estimates and ranking of the subsurface drip system are very sensitive to the yield response to irrigation. Lower than average crop prices also have a substantial impact on the ranking of this system. The original investment cost is also an important determinant of its net return.Crop Production/Industries,

    Spin Dynamics near the Superconductor-to-Insulator Transition in Impurity-Doped YBa2Cu4O8

    Full text link
    We studied low-frequency spin dynamics near the impurity-induced superconductor-to-insulator transition for underdoped high-Tc superconductor YBa2(Cu1-xMx)4O8 (M=Ni, Zn) using the Cu nuclear quadrupole resonance (NQR) spin-echo technique. We observed remarkable suppression of the normal-state pseudo spin-gap and a loss of Cu NQR spectrum intensity at low temperatures around the critical impurity concentration.Comment: 6 pages, 4 figures. To be published in J. Phys. Soc. Jpn. Vol.70, No.7 (2001

    The aspherical Cavicchioli-Hegenbarth-Repovš generalized Fibonacci groups

    Get PDF
    The Cavicchioli–Hegenbarth–Repovš generalized Fibonacci groups are defined by the presentations Gn (m, k) = 〈x 1, … , xn | xixi+m = xi+k (1 ⩽ i ⩽ n)〉. These cyclically presented groups generalize Conway's Fibonacci groups and the Sieradski groups. Building on a theorem of Bardakov and Vesnin we classify the aspherical presentations Gn (m, k). We determine when Gn (m, k) has infinite abelianization and provide sufficient conditions for Gn (m, k) to be perfect. We conjecture that these are also necessary conditions. Combined with our asphericity theorem, a proof of this conjecture would imply a classification of the finite Cavicchioli–Hegenbarth–Repovš groups
    corecore