scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Phd by thesis

01 Apr 1988-Nature (Nature Publishing Group)-Vol. 332, Iss: 6166, pp 676-676
TL;DR: In this paper, a sedimentological core and petrographic characterisation of samples from eleven boreholes from the Lower Carboniferous of Bowland Basin (Northwest England) is presented.
Abstract: Deposits of clastic carbonate-dominated (calciclastic) sedimentary slope systems in the rock record have been identified mostly as linearly-consistent carbonate apron deposits, even though most ancient clastic carbonate slope deposits fit the submarine fan systems better. Calciclastic submarine fans are consequently rarely described and are poorly understood. Subsequently, very little is known especially in mud-dominated calciclastic submarine fan systems. Presented in this study are a sedimentological core and petrographic characterisation of samples from eleven boreholes from the Lower Carboniferous of Bowland Basin (Northwest England) that reveals a >250 m thick calciturbidite complex deposited in a calciclastic submarine fan setting. Seven facies are recognised from core and thin section characterisation and are grouped into three carbonate turbidite sequences. They include: 1) Calciturbidites, comprising mostly of highto low-density, wavy-laminated bioclast-rich facies; 2) low-density densite mudstones which are characterised by planar laminated and unlaminated muddominated facies; and 3) Calcidebrites which are muddy or hyper-concentrated debrisflow deposits occurring as poorly-sorted, chaotic, mud-supported floatstones. These

Content maybe subject to copyright    Report

Citations
More filters
ReportDOI
01 Nov 1990
TL;DR: This report will establish methods for performing a domain analysis and describe the products of the domain analysis process to illustrate the application of domain analysis to a representative class of software systems.
Abstract: : Successful Software reuse requires the systematic discovery and exploitation of commonality across related software systems. By examining related software systems and the underlying theory of the class of systems they represent, domain analysis can provide a generic description of the requirements of that class of systems and a set of approaches for their implementation. This report will establish methods for performing a domain analysis and describe the products of the domain analysis process. To illustrate the application of domain analysis to a representative class of software systems, this report will provide a domain analysis of window management system software.

4,420 citations

Journal ArticleDOI
TL;DR: The straw person model (SPM) as mentioned in this paper has been proposed to explain the orientation effects of active galactic nuclei (AGN) and quasars in the line of sight (LOS) images.
Abstract: Because the critical central regions of Active Galactic Nuclei (AGN) and quasars are strongly nonspherical but spatially unresolved, orientation effects have been the source of much confusion. In fact, it now appears that much of the variety in AGN types is just the result of varying orientation relative to the line of sight. We can define an extreme hypothesis,, the straw person model (SPM), in which there are two basic types of AGN: the radio quiets and the radio louds. For each type there is a range in intrinsic luminosity, and the luminosity controls some properties such as the Fanaroff and Riley classes. However, at a given intrinsic luminosity, all other properties such as spectroscopic classification and VLBI component speeds are ascribed to orientation. This model is only a caricature of the unification idea, and is already ruled out on many grounds, but it will be useful for organizing the discussion. I’ll describe what I consider to be convincing evidence that orientation effects are important and widespread. The true situation may be in some sense half way between the SPM and the hypothesis that orientation doesn’t affect classification at aIl. To us optimists, the orienration cup is half full rather than half empty. Although it is too soon to say for sure, the hypothesis that most objects’ classifications would be different if seen from other directions is a tenable one today.

4,005 citations


Cites methods from "Phd by thesis"

  • ...Kay (1990) and Tran et al (1992) have fo und more Seyfert 2s with broad permitted lines in the polarized fl ux, but the FC polarizations are generally much less than that of NGC 1068....

    [...]

Journal ArticleDOI
TL;DR: This Review assembles the current knowledge on the isolation of microfibrillated cellulose from wood and its application in nanocomposites; the preparation of nanocrystalline cellulose and its use as a reinforcing agent; and the biofabrication of bacterial nanocellulose, as well as its evaluation as a biomaterial for medical implants.
Abstract: Cellulose fibrils with widths in the nanometer range are nature-based materials with unique and potentially useful features. Most importantly, these novel nanocelluloses open up the strongly expanding fields of sustainable materials and nanocomposites, as well as medical and life-science devices, to the natural polymer cellulose. The nanodimensions of the structural elements result in a high surface area and hence the powerful interaction of these celluloses with surrounding species, such as water, organic and polymeric compounds, nanoparticles, and living cells. This Review assembles the current knowledge on the isolation of microfibrillated cellulose from wood and its application in nanocomposites; the preparation of nanocrystalline cellulose and its use as a reinforcing agent; and the biofabrication of bacterial nanocellulose, as well as its evaluation as a biomaterial for medical implants.

3,452 citations


Cites background or methods from "Phd by thesis"

  • ...b) Spheres formed by agitated cultivation with a shaking rate of 80–100 rpm; diameter: 2–3 mm, smooth surface.([181]) c) Tubes...

    [...]

  • ...a) Film prepared in a PP container under static conditions; dimensions: 25 25 cm(2), thickness: 200 mm.([181]) b) Spheres formed by agitated cultivation with a shaking rate of 80–100 rpm; diameter: 2–3 mm, smooth surface....

    [...]

Journal ArticleDOI
TL;DR: The Arcade Learning Environment (ALE) as discussed by the authors is a platform for evaluating the development of general, domain-independent AI technology, which provides an interface to hundreds of Atari 2600 game environments, each one different, interesting, and designed to be a challenge for human players.
Abstract: In this article we introduce the Arcade Learning Environment (ALE): both a challenge problem and a platform and methodology for evaluating the development of general, domain-independent AI technology. ALE provides an interface to hundreds of Atari 2600 game environments, each one different, interesting, and designed to be a challenge for human players. ALE presents significant research challenges for reinforcement learning, model learning, model-based planning, imitation learning, transfer learning, and intrinsic motivation. Most importantly, it provides a rigorous testbed for evaluating and comparing approaches to these problems. We illustrate the promise of ALE by developing and benchmarking domain-independent agents designed using well-established AI techniques for both reinforcement learning and planning. In doing so, we also propose an evaluation methodology made possible by ALE, reporting empirical results on over 55 different games. All of the software, including the benchmark agents, is publicly available.

2,429 citations

Journal ArticleDOI
TL;DR: The solid electrolyte interphase (SEI) is a protecting layer formed on the negative electrode of Li-ion batteries as a result of electrolyte decomposition, mainly during the first cycle as discussed by the authors.

2,386 citations

References
More filters
Journal ArticleDOI
TL;DR: In this paper, the entanglement dynamics of arrays of qubits are analyzed in the presence of some general sources of noise and disorder, such as spin or boson fluctuations due to the background circuitry and surrounding substrate, and disorder in the initial preparation and the control parameters.
Abstract: The entanglement dynamics of arrays of qubits is analysed in the presence of some general sources of noise and disorder. In particular, we consider linear chains of Josephson qubits in experimentally realistic conditions. Electromagnetic and other (spin or boson) fluctuations due to the background circuitry and surrounding substrate, finite temperature in the external environment, and disorder in the initial preparation and the control parameters are embedded into our model. We show that the amount of disorder that is typically present in current experiments does not affect the entanglement dynamics significantly, while the presence of noise can have a drastic influence on the generation and propagation of entanglement. We examine under which circumstances the system exhibits steady-state entanglement for both short (N 30) chains and show that, remarkably, there are parameter regimes where the steady-state entanglement is strictly non-monotonic as a function of the noise strength. We also present optimized schemes for entanglement verification and quantification based on simple correlation measurements that are experimentally more economic than state tomography.

64 citations

18 May 2003
TL;DR: AFORS-HET as mentioned in this paper is a numerical simulation tool for homo-and heterojunction devices, which allows to model homo and hetero-junction devices.
Abstract: We offer a numerical simulation tool, AFORS-HET, for public use, which allows to model homo- as well as heterojunction devices. AFORS-HET is the short form of automat for simulation of heterostructures and can be downloaded via the internet: http://www.hmi.de/bereiche/SE/SE1/projects/aSicSi/AFORS-HET. An arbitrary sequence of semiconducting layers can be modelled. A variety of boundary conditions can be chosen. The program solves the one dimensional semiconductor equations in steady-state and for small sinusoidal ac-perturbations. Furthermore, a variety of common characterisation techniques have been implemented, current-voltage (I-V), internal quantum efficiency (IQE), impedance, capacitance (CV, CT), static surface photovoltage (SPV), electron beam induced current (EBIC) and photoluminescence (PL). A user-friendly interface allows to easily perform parameter variations, and to visualise and compare your simulations.

64 citations

Journal ArticleDOI
TL;DR: A definition of the QCD coupling, denoted by α[over ^]_{s}, whose running is explicitly renormalization scheme invariant, and it is demonstrated that appropriate choices of C can lead to substantial improvements in the perturbative prediction of physical observables.
Abstract: The quantum chromodynamics (QCD) coupling α_{s} is not a physical observable of the theory, since it depends on conventions related to the renormalization procedure. We introduce a definition of the QCD coupling, denoted by α[over ^]_{s}, whose running is explicitly renormalization scheme invariant. The scheme dependence of the new coupling α[over ^]_{s} is parametrized by a single parameter C, related to transformations of the QCD scale Λ. It is demonstrated that appropriate choices of C can lead to substantial improvements in the perturbative prediction of physical observables. As phenomenological applications, we study e^{+}e^{-} scattering and decays of the τ lepton into hadrons, both being governed by the QCD Adler function.

64 citations

Journal ArticleDOI
TL;DR: In this paper, a fitting code based on the leading-twist handbag Deep Virtual Compton Scattering (DVCS) amplitude was developed to extract Generalized Parton Distribution (GPD) information from DVCS observables in the valence region.
Abstract: We have developed a fitting code based on the leading-twist handbag Deep Virtual Compton Scattering (DVCS) amplitude in order to extract Generalized Parton Distribution (GPD) information from DVCS observables in the valence region. In a first stage, with simulations and pseudo-data, we show that the full GPD information can be recovered from experimental data if enough observables are measured. If only some of these observables are measured, valuable information can still be extracted, with certain observables being particularly sensitive to certain GPDs. In a second stage, we make a practical application of this code to the recent DVCS Jefferson Lab Hall-A data from which we can extract numerical constraints for the two H GPD Compton form factors.

63 citations

Journal Article
TL;DR: This work presents a framework for systematic fine grained response that is achieved by dynamically controlling the host’s exposure to perceived threats.
Abstract: As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system and application based mechanisms for automated response are increasingly needed. Existing solutions have either been customized to specific attacks, such as disabling an account after a number of authentication failures, or utilize harsh measures, such as shutting the system down. In contrast, we present a framework for systematic fine grained response that is achieved by dynamically controlling the host's exposure to perceived threats. This paper introduces a formal model to characterize the risk faced by a host. It also describes how the risk can be managed in real-time by adapting the exposure. This is achieved by modifying the access control subsystem to let the choice of whether to grant a permission be delegated to code that is customized to the specific right. The code can then use the runtime context to make a more informed choice, thereby tightening access to a resource when a threat is detected. The running time can be constrained to provide performance guarantees. The framework was implemented by modifying the Java Runtime. A suite of vulnerable Jigsaw servlets and corresponding attacks was created. The following were manually added: code for dynamic permission checks; estimates of the reduction in exposure associated with each check; the frequencies with which individual permissions occurred in a typical workload; a global risk tolerance. The resulting platform disrupted the attacks by denying the permissions needed for their completion.

63 citations