11,783 research outputs found
Isostaticity of Constraints in Jammed Systems of Soft Frictionless Platonic Solids
The average number of constraints per particle in
mechanically stable systems of Platonic solids (except cubes) approaches the
isostatic limit at the jamming point (), though
average number of contacts are hypostatic. By introducing angular alignment
metrics to classify the degree of constraint imposed by each contact,
constraints are shown to arise as a direct result of local orientational order
reflected in edge-face and face-face alignment angle distributions. With
approximately one face-face contact per particle at jamming chain-like
face-face clusters with finite extent form in these systems.Comment: 4 pages, 3 figures, 4 tabl
Recommended from our members
The impace of custom ROM backups on android external storage erasure
The Android operating system is the current market leader on mobile devices such as smartphones and tablet computers. The core operating system is open source and has a number of developers creating variants of this operating system. These variants, often referred to as custom ROMs are available for a wide number of mobile devices. Custom ROMs provide a number of features, such as enhanced control over the operating system, variation in user interfaces and so on. The process of installing custom ROMs is often accomplished through the use of a ROM manager application. Such applications often provide mechanisms to back up the contents of the mobile device prior to upgrade. This mechanism is utilised in the case of a failed update to restore the device to its previous functional state. Backups produced in this manner are often stored in on an external media such as a micro-SD card.In the conducted research we evaluated devices inbuilt data erasure mechanisms within the context of erasure of backups produced by ROM managers. It was found that simply using the devices Format External / SD function is not an effective means of completely erasing these backups. Once recovered, these backups offer a quick source of information that a potential attacker could carve to retrieve user files such as media transferred to the external or from applications. Although the same files could be recovered from an image of the external storage itself, the carving process is more efficient than traditional carving methods
Recommended from our members
Digital anatomy at your fingertips: A bespoke touchscreen gateway for accessing digital anatomy resources at the dissection table
No description supplie
Reexamining What We Stand to Lose: A Look at Reinitiated Consultation Under the Endangered Species Act
This article first examines the role reinitiated consultation plays within Congress\u27s statutory framework and concludes that in many ways, reinitiated consultation is the glue that holds the Endangered Species Act\u27s protective scheme together. While the ESA generally prohibits any injury to an endangered species, Congress has authorized the Service to permit such injuries under certain circumstances. But these authorizations must be accompanied by a limit that will trigger reinitiated consultation if exceeded. Thus, without reinitiated consultation, these preauthorized injuries or “takes” would prove gaping leaks in Congress\u27s “Ark,” leaving little or no safety for endangered species. Moreover, reinitiated consultation has significant real world consequences for federal agencies and private parties. Failure to reinitiate consultation when legally required can subject the agency and its employees, as well as private parties, to civil and even criminal liability.
Next, this article explores the legal basis for reinitiated consultation. Despite its central role, Congress never provided for reinitiated consultation within the Act itself. While the Service has acknowledged this silence, the courts generally do not raise this question of statutory authority. In light of the ambiguities within the ESA and Congress\u27s clear direction in the legislative history of the Act that it intended for agencies to reinitiate consultation, this article concludes that the practice is legally supportable.
Finally, given the significance of reinitiated consultation, and the likelihood that it is here to stay, this article then explores how courts have reviewed suits concerning reinitiated consultation. This discussion highlights potential challenges and best practices for federal agencies and permittees. This article concludes that, with few exceptions, courts have taken a surprisingly deferential approach to reviewing agency decisions to reinitiate, or more commonly not reinitiate, consultation. For example, courts have allowed agencies to expand a project\u27s scope, duration, or impact on listed species or to recalculate how to measure the impacts altogether without requiring reinitiated consultation. Nonetheless, courts have taken a much stricter approach when considering the triggers for reinitiated consultation and have frequently insisted that those triggers be as meaningful and as exact as possible.
However, before discussing reinitiated consultation in detail, this article provides some additional background on the ESA in general and reinitiated consultation in particular. To understand the purpose and effect of reinitiated consultation, one must first understand several key ESA provisions - namely, the ESA\u27s listing, liability, and consultation provisions
A new and unusual LBV-like outburst from a Wolf–Rayet star in the outskirts of M33
MCA-1B (also called UIT003) is a luminous hot star in the western outskirts of M33, classified over 20 yr ago with a spectral type of Ofpe/WN9 and identified then as a candidate luminous blue variable (LBV). Palomar Transient Factory data reveal that this star brightened in 2010, with a light curve resembling that of the classic LBV star AF And in M31. Other Ofpe/WN9 stars have erupted as LBVs, but MCA-1B was unusual because it remained hot. It showed a WN-type spectrum throughout its eruption, whereas LBVs usually get much cooler. MCA-1B showed an almost four-fold increase in bolometric luminosity and a doubling of its radius, but its temperature stayed ≳29 kK. As it faded, it shifted to even hotter temperatures, exhibiting a WN7/WN8-type spectrum, and doubling its wind speed. MCA-1B is reminiscent of some supernova impostors, and its location resembles the isolated environment of SN 2009ip. It is most similar to HD 5980 (in the Small Magellanic Cloud) and GR 290 (also in M33). Whereas these two LBVs exhibited B-type spectra in eruption, MCA-1B is the first clear case where a Wolf–Rayet (WR) spectrum persisted at all times. Together, MCA-1B, HD 5980, and GR 290 constitute a class of WN-type LBVs, distinct from S Doradus LBVs. They are most interesting in the context of LBVs at low metallicity, a possible post-LBV/WR transition in binaries, and as likely Type Ibn supernova progenitors
Does elevating image receptor increase breast receptor footprint and improve pressure balance?
There is no consensus in the literature regarding the image receptor (IR) position for the cradio-caudal
projection in mammography. Some literature indicates the IR should be positioned to the infra mammary
fold (IMF); other literature suggests the IR be raised 2 cm relative to the IMF. Using 16 female volunteers
(32 breasts) and a pressure sensitive mat we investigated breast footprint and pressure balance with IR at
IMF and IR 2 cm above the IMF. Breast area on IR and paddle and interface pressure between IR/breast and
paddle/breast were recorded. A uniformity index (UI) gave a measure of pressure balance between IR/
breast and paddle/breast. IR breast footprint increases significantly by 13.81 cm2 (p < 0.02) when IR is
raised by 2 cm. UI reduces from 0.4 to 0.00 (p ¼ 0.04) when positioned at IMF þ2 cm demonstrating an
improved pressure balance. Practitioners should consider raising the IR by 2 cm relative to the IMF in
clinical practice. Further work is suggested to investigate the effects of practitioner variability and breast
asymmetry
Demonstration of multi-channel 80 Gbit/s integrated transmitter and receiver for wavelength-division multiplexing passive optical network and fronthauling applications
The performance evaluation of a multi-channel transmitter that employs an arrayed reflective electroabsorption modulator-based photonic integrated circuit and a low-power driver array in conjunction with a multi-channel receiver incorporating a pin photodiode array and integrated arrayed waveguide grating is reported. Due to their small footprint, low power consumption and potential low cost, these devices are attractive solutions for future mobile fronthaul and next generation optical access networks. A BER performance of <10(-9) at 10.3 Gbit/s per channel is achieved over 25 km of standard single mode fibre. The transmitter/receiver combination can achieve an aggregate bit rate of 82.4 Gbit/s when eight channels are active
Indigenous knowledge, methodology and mayhem: What is the role of methodology in producing indigenous insights? A discussion from Mātauranga Māori
The emergence of an academic discourse called Indigenous knowledge internationally, and mātauranga Māori in Aotearoa New Zealand, presents some substantive challenges to concepts of knowing and being, of knowledge creation, knowledge work and the making of meaning. These challenges engage us across philosophical, disciplinary, institutional, inter-generational, territorial and community boundaries, presenting an opportunity to imagine this field anew, and the theories and methodologies that inform contemporary Māori or Indigenous Studies. This article raises some discussion about ‘research methodologies’ being used when discussing mātauranga Māori and Indigenous knowledge (hereafter referred to as IK mātauranga). Research methodologies are often associated with specific disciplines of knowledge and viewed as the primary if not singular way in which knowledge is generated. Arguably, IK mātauranga occupies a different knowledge space from traditional academic disciplines, including their transdisciplinary interstices. This article speaks to a gnawing sense that mayhem is at play, as the academic work around IK mātauranga begins to consolidate and become institutionalised away from its indigenous communities and contexts, where it began and where it still informs identities, ways of living and being
Algorithm Selection Framework for Cyber Attack Detection
The number of cyber threats against both wired and wireless computer systems
and other components of the Internet of Things continues to increase annually.
In this work, an algorithm selection framework is employed on the NSL-KDD data
set and a novel paradigm of machine learning taxonomy is presented. The
framework uses a combination of user input and meta-features to select the best
algorithm to detect cyber attacks on a network. Performance is compared between
a rule-of-thumb strategy and a meta-learning strategy. The framework removes
the conjecture of the common trial-and-error algorithm selection method. The
framework recommends five algorithms from the taxonomy. Both strategies
recommend a high-performing algorithm, though not the best performing. The work
demonstrates the close connectedness between algorithm selection and the
taxonomy for which it is premised.Comment: 6 pages, 7 figures, 1 table, accepted to WiseML '2
The time resolution of the St. Petersburg paradox
A resolution of the St. Petersburg paradox is presented. In contrast to the
standard resolution, utility is not required. Instead, the time-average
performance of the lottery is computed. The final result can be phrased
mathematically identically to Daniel Bernoulli's resolution, which uses
logarithmic utility, but is derived using a conceptually different argument.
The advantage of the time resolution is the elimination of arbitrary utility
functions.Comment: 20 pages, 1 figur
- …
