WorldWideScience

Sample records for leading log approximation

  1. Nonperturbative dynamics of hot non-Abelian gauge fields: Beyond the leading log approximation

    International Nuclear Information System (INIS)

    Arnold, Peter; Yaffe, Laurence G.

    2000-01-01

    Many aspects of high-temperature gauge theories, such as the electroweak baryon number violation rate, color conductivity, and the hard gluon damping rate, have previously been understood only at leading logarithmic order (that is, neglecting effects suppressed only by an inverse logarithm of the gauge coupling). We discuss how to systematically go beyond leading logarithmic order in the analysis of physical quantities. Specifically, we extend to next-to-leading-log order (NLLO) the simple leading-log effective theory due to Bo''deker that describes non-perturbative color physics in hot non-Abelian plasmas. A suitable scaling analysis is used to show that no new operators enter the effective theory at next-to-leading-log order. However, a NLLO calculation of the color conductivity is required, and we report the resulting value. Our NLLO result for the color conductivity can be trivially combined with previous numerical work by Moore to yield a NLLO result for the hot electroweak baryon number violation rate

  2. The log-linear return approximation, bubbles, and predictability

    DEFF Research Database (Denmark)

    Engsted, Tom; Pedersen, Thomas Quistgaard; Tanggaard, Carsten

    We study in detail the log-linear return approximation introduced by Campbell and Shiller (1988a). First, we derive an upper bound for the mean approximation error, given stationarity of the log dividendprice ratio. Next, we simulate various rational bubbles which have explosive conditional expec...

  3. The Log-Linear Return Approximation, Bubbles, and Predictability

    DEFF Research Database (Denmark)

    Engsted, Tom; Pedersen, Thomas Quistgaard; Tanggaard, Carsten

    2012-01-01

    We study in detail the log-linear return approximation introduced by Campbell and Shiller (1988a). First, we derive an upper bound for the mean approximation error, given stationarity of the log dividend-price ratio. Next, we simulate various rational bubbles which have explosive conditional expe...

  4. Gluon saturation beyond (naive) leading logs

    Energy Technology Data Exchange (ETDEWEB)

    Beuf, Guillaume

    2014-12-15

    An improved version of the Balitsky–Kovchegov equation is presented, with a consistent treatment of kinematics. That improvement allows to resum the most severe of the large higher order corrections which plague the conventional versions of high-energy evolution equations, with approximate kinematics. This result represents a further step towards having high-energy QCD scattering processes under control beyond strict Leading Logarithmic accuracy and with gluon saturation effects.

  5. Efficient and accurate log-Lévy approximations to Lévy driven LIBOR models

    DEFF Research Database (Denmark)

    Papapantoleon, Antonis; Schoenmakers, John; Skovmand, David

    2011-01-01

    The LIBOR market model is very popular for pricing interest rate derivatives, but is known to have several pitfalls. In addition, if the model is driven by a jump process, then the complexity of the drift term is growing exponentially fast (as a function of the tenor length). In this work, we con...... ratchet caps show that the approximations perform very well. In addition, we also consider the log-L\\'evy approximation of annuities, which offers good approximations for high volatility regimes....

  6. Computational error estimates for Monte Carlo finite element approximation with log normal diffusion coefficients

    KAUST Repository

    Sandberg, Mattias

    2015-01-07

    The Monte Carlo (and Multi-level Monte Carlo) finite element method can be used to approximate observables of solutions to diffusion equations with log normal distributed diffusion coefficients, e.g. modelling ground water flow. Typical models use log normal diffusion coefficients with H¨older regularity of order up to 1/2 a.s. This low regularity implies that the high frequency finite element approximation error (i.e. the error from frequencies larger than the mesh frequency) is not negligible and can be larger than the computable low frequency error. This talk will address how the total error can be estimated by the computable error.

  7. Computational error estimates for Monte Carlo finite element approximation with log normal diffusion coefficients

    KAUST Repository

    Sandberg, Mattias

    2015-01-01

    log normal diffusion coefficients with H¨older regularity of order up to 1/2 a.s. This low regularity implies that the high frequency finite element approximation error (i.e. the error from frequencies larger than the mesh frequency) is not negligible

  8. Efficient and Accurate Log-Levy Approximations of Levy-Driven LIBOR Models

    DEFF Research Database (Denmark)

    Papapantoleon, Antonis; Schoenmakers, John; Skovmand, David

    2012-01-01

    The LIBOR market model is very popular for pricing interest rate derivatives but is known to have several pitfalls. In addition, if the model is driven by a jump process, then the complexity of the drift term grows exponentially fast (as a function of the tenor length). We consider a Lévy-driven ...... ratchet caps show that the approximations perform very well. In addition, we also consider the log-Lévy approximation of annuities, which offers good approximations for high-volatility regimes....

  9. Multijet final states: exact results and the leading pole approximation

    International Nuclear Information System (INIS)

    Ellis, R.K.; Owens, J.F.

    1984-09-01

    Exact results for the process gg → ggg are compared with those obtained using the leading pole approximation. Regions of phase space where the approximation breaks down are discussed. A specific example relevant for background estimates to W boson production is presented. It is concluded that in this instance the leading pole approximation may underestimate the standard QCD background by more than a factor of two in certain kinematic regions of physical interest

  10. Common approximations for density operators may lead to imaginary entropy

    International Nuclear Information System (INIS)

    Lendi, K.; Amaral Junior, M.R. do

    1983-01-01

    The meaning and validity of usual second order approximations for density operators are illustrated with the help of a simple exactly soluble two-level model in which all relevant quantities can easily be controlled. This leads to exact upper bound error estimates which help to select more precisely permissible correlation times as frequently introduced if stochastic potentials are present. A final consideration of information entropy reveals clearly the limitations of this kind of approximation procedures. (Author) [pt

  11. Strong interactions and quantum chromodynamics at the leading logarithm approximation

    International Nuclear Information System (INIS)

    Mantrach, A.

    1982-11-01

    This thesis is a contribution to the study of Quantum Chromodynamics (QCD) at the leading logarithm approximation (LLA). We have used the interpretation of the LLA in terms of the generalized parton model to propose tests of elementary processes of QCD in large transverse momentum photoproduction reactions. We have used the LLA to sum gluon radiation effects induced in high energy hadronic reactions. We have obtained this way a rise of the nucleon-nucleon total cross section of 15 mb from 60 GeV to 540 GeV. We have exploited the existence of a preconfinement transition in the LLA to study scaling violations in the framework of the dual parton model [fr

  12. High temperature color conductivity at next-to-leading log order

    International Nuclear Information System (INIS)

    Arnold, Peter; Yaffe, Laurence G.

    2000-01-01

    The non-Abelian analogue of electrical conductivity at high temperature has previously been known only at leading logarithmic order -- that is, neglecting effects suppressed only by an inverse logarithm of the gauge coupling. We calculate the first sub-leading correction. This has immediate application to improving, to next-to-leading log order, both effective theories of non-perturbative color dynamics, and calculations of the hot electroweak baryon number violation rate

  13. Log-Likelihood Ratio Calculation for Iterative Decoding on Rayleigh Fading Channels Using Padé Approximation

    Directory of Open Access Journals (Sweden)

    Gou Hosoya

    2013-01-01

    Full Text Available Approximate calculation of channel log-likelihood ratio (LLR for wireless channels using Padé approximation is presented. LLR is used as an input of iterative decoding for powerful error-correcting codes such as low-density parity-check (LDPC codes or turbo codes. Due to the lack of knowledge of the channel state information of a wireless fading channel, such as uncorrelated fiat Rayleigh fading channels, calculations of exact LLR for these channels are quite complicated for a practical implementation. The previous work, an LLR calculation using the Taylor approximation, quickly becomes inaccurate as the channel output leaves some derivative point. This becomes a big problem when higher order modulation scheme is employed. To overcome this problem, a new LLR approximation using Padé approximation, which expresses the original function by a rational form of two polynomials with the same total number of coefficients of the Taylor series and can accelerate the Taylor approximation, is devised. By applying the proposed approximation to the iterative decoding and the LDPC codes with some modulation schemes, we show the effectiveness of the proposed methods by simulation results and analysis based on the density evolution.

  14. Simulation of mineral dust aerosol with Piecewise Log-normal Approximation (PLA in CanAM4-PAM

    Directory of Open Access Journals (Sweden)

    Y. Peng

    2012-08-01

    Full Text Available A new size-resolved dust scheme based on the numerical method of piecewise log-normal approximation (PLA was developed and implemented in the fourth generation of the Canadian Atmospheric Global Climate Model with the PLA Aerosol Model (CanAM4-PAM. The total simulated annual global dust emission is 2500 Tg yr−1, and the dust mass load is 19.3 Tg for year 2000. Both are consistent with estimates from other models. Results from simulations are compared with multiple surface measurements near and away from dust source regions, validating the generation, transport and deposition of dust in the model. Most discrepancies between model results and surface measurements are due to unresolved aerosol processes. Biases in long-range transport are also contributing. Radiative properties of dust aerosol are derived from approximated parameters in two size modes using Mie theory. The simulated aerosol optical depth (AOD is compared with satellite and surface remote sensing measurements and shows general agreement in terms of the dust distribution around sources. The model yields a dust AOD of 0.042 and dust aerosol direct radiative forcing (ADRF of −1.24 W m−2 respectively, which show good consistency with model estimates from other studies.

  15. Estimation of geological formation thermal conductivity by using stochastic approximation method based on well-log temperature data

    International Nuclear Information System (INIS)

    Cheng, Wen-Long; Huang, Yong-Hua; Liu, Na; Ma, Ran

    2012-01-01

    Thermal conductivity is a key parameter for evaluating wellbore heat losses which plays an important role in determining the efficiency of steam injection processes. In this study, an unsteady formation heat-transfer model was established and a cost-effective in situ method by using stochastic approximation method based on well-log temperature data was presented. The proposed method was able to estimate the thermal conductivity and the volumetric heat capacity of geological formation simultaneously under the in situ conditions. The feasibility of the present method was assessed by a sample test, the results of which shown that the thermal conductivity and the volumetric heat capacity could be obtained with the relative errors of −0.21% and −0.32%, respectively. In addition, three field tests were conducted based on the easily obtainable well-log temperature data from the steam injection wells. It was found that the relative errors of thermal conductivity for the three field tests were within ±0.6%, demonstrating the excellent performance of the proposed method for calculating thermal conductivity. The relative errors of volumetric heat capacity ranged from −6.1% to −14.2% for the three field tests. Sensitivity analysis indicated that this was due to the low correlation between the volumetric heat capacity and the wellbore temperature, which was used to generate the judgment criterion. -- Highlights: ► A cost-effective in situ method for estimating thermal properties of formation was presented. ► Thermal conductivity and volumetric heat capacity can be estimated simultaneously by the proposed method. ► The relative error of thermal conductivity estimated was within ±0.6%. ► Sensitivity analysis was conducted to study the estimated results of thermal properties.

  16. On the description of exclusive processes beyond the leading twist approximation

    International Nuclear Information System (INIS)

    Anikin, I.V.; Ivanov, D.Yu.; Pire, B.; Szymanowski, L.; Wallon, S.

    2010-01-01

    We describe hard exclusive processes beyond the leading twist approximation in a framework based on the Taylor expansion of the amplitude around the dominant light-cone directions. This naturally introduces an appropriate set of non-perturbative correlators whose number is minimalized after taking into account QCD equations of motion and the invariance under rotation on the light-cone. We exemplify this method at the twist 3 level and show that the coordinate and momentum space descriptions are fully equivalent.

  17. On the description of exclusive processes beyond the leading twist approximation

    Energy Technology Data Exchange (ETDEWEB)

    Anikin, I.V. [Bogoliubov Laboratory of Theoretical Physics, JINR, 141980 Dubna (Russian Federation); Ivanov, D.Yu. [Institute of Mathematics, 630090 Novosibirsk (Russian Federation); Pire, B., E-mail: pire@cpht.polytechnique.f [CPhT, Ecole Polytechnique, CNRS, F-91128 Palaiseau (France); Szymanowski, L. [Soltan Institute for Nuclear Studies, Hoza 69, 00-681 Warsaw (Poland); Wallon, S. [LPT, Universite d' Orsay, CNRS, 91404 Orsay (France); UPMC Univ. Paris 6, Faculte de Physique, 4 place Jussieu, 75252 Paris Cedex 05 (France)

    2010-01-04

    We describe hard exclusive processes beyond the leading twist approximation in a framework based on the Taylor expansion of the amplitude around the dominant light-cone directions. This naturally introduces an appropriate set of non-perturbative correlators whose number is minimalized after taking into account QCD equations of motion and the invariance under rotation on the light-cone. We exemplify this method at the twist 3 level and show that the coordinate and momentum space descriptions are fully equivalent.

  18. Shear viscosity of the quark-gluon plasma in a weak magnetic field in perturbative QCD: Leading log

    Science.gov (United States)

    Li, Shiyong; Yee, Ho-Ung

    2018-03-01

    We compute the shear viscosity of two-flavor QCD plasma in an external magnetic field in perturbative QCD at leading log order, assuming that the magnetic field is weak or soft: e B ˜g4log (1 /g )T2. We work in the assumption that the magnetic field is homogeneous and static, and the electrodynamics is nondynamical in a formal limit e →0 while e B is kept fixed. We show that the shear viscosity takes a form η =η ¯(B ¯)T3/(g4log (1 /g )) with a dimensionless function η ¯(B ¯) in terms of a dimensionless variable B ¯=(e B )/(g4log (1 /g )T2). The variable B ¯ corresponds to the relative strength of the effect of cyclotron motions compared to the QCD collisions: B ¯˜lmfp/lcyclo. We provide a full numerical result for the scaled shear viscosity η ¯(B ¯).

  19. Mining legacy data: digitizing well logs leads to bypassed pay opportunities

    Energy Technology Data Exchange (ETDEWEB)

    Polczer, S.

    1999-10-01

    International Datashare Corporation's (iDc) computer software that filters graphic data through an algorithm programmed to recognize pre-set patterns, a process similar to optical character recognition, is described. The software is particularly well suited to large volumes of legacy data because it does not recognize numbers or calculations. Instead, it scans well log files as high-resolution raster files, strips them of all numeric data to isolate hydrocarbon signatures. This pattern recognition is expected to expose (to trained professionals) significant bypassed oil and gas pay that at the time of first development of the well were considered worthless due to lack of markets and transportation infrastructure. iDc plans to distribute the raster well log library of nearly one million records by making it available online. iDc also intends to rasterize and index other data sets such as drill stem data and fluids data , and combine the information into a complete solutions package to mark the company's 50 years in business. This new 'data mining' application is intended to enable operators to locate and develop hydrocarbon reserves that were originally bypassed. 1 photo, 1 fig.

  20. Abduction aiming at empirical progress or even at truth approximation, leading to challenge for computational modelling

    NARCIS (Netherlands)

    Kuipers, Theo A.F.

    1999-01-01

    This paper primarily deals with the conceptual prospects for generalizing the aim of abduction from the standard one of explaining surprising or anomalous observations to that of empirical progress or even truth approximation. It turns out that the main abduction task then becomes the

  1. The next-next-to-leading QCD approximation for non-singlet moments of deep inelastic structure functions

    Energy Technology Data Exchange (ETDEWEB)

    Larin, S.A.; Ritbergen, T. van; Vermaseren, J.A.M.

    1993-12-01

    We obtain the analytic next-next-to-leading perturbative QCD corrections in the leading twist approximation for the moments N = 2, 4, 6, 8 of the non-singlet deep inelastic structure functions F{sub 2} and F{sub L}. We calculate the three-loop anomalous dimensions of the corresponding non-singlet operators and the three-loop coefficient functions of the structure function F{sub L}. (orig.).

  2. The next-next-to-leading QCD approximation for non-singlet moments of deep inelastic structure functions

    International Nuclear Information System (INIS)

    Larin, S.A.; Ritbergen, T. van; Vermaseren, J.A.M.

    1993-12-01

    We obtain the analytic next-next-to-leading perturbative QCD corrections in the leading twist approximation for the moments N = 2, 4, 6, 8 of the non-singlet deep inelastic structure functions F 2 and F L . We calculate the three-loop anomalous dimensions of the corresponding non-singlet operators and the three-loop coefficient functions of the structure function F L . (orig.)

  3. The BFKL high energy asymptotic in the next-to-leading approximation

    International Nuclear Information System (INIS)

    Levin, Eugene

    1999-01-01

    We discuss the high energy asymptotic in the next-to-leading (NLO) BFKL equation. We find a general solution for the Green functions and consider two properties of the NLO BFKL kernel: running QCD coupling and large NLO corrections to the conformal part of the kernel. Both these effects lead to Regge-BFKL asymptotic only in the limited range of energy (y = ln(s/qq 0 ) ≤ (α S ) ((-5)/(3)) ) and change the energy behaviour of the amplitude for higher values of energy. We confirm the oscillation in the total cross section found by D.A. Ross [SHEP-98-06, hep-ph/9804332] in the NLO BFKL asymptotic, which shows that the NLO BFKL has a serious pathology

  4. Development of a simple proton nuclear magnetic resonance-based procedure to estimate the approximate distribution coefficient at physiological pH (logD7.4)

    DEFF Research Database (Denmark)

    Stéen, E Johanna L; Nyberg, Nils; Lehel, Szabolcs

    2017-01-01

    D7.4) in 1-octanol and D2O buffer. The method can be applied to both UV and non-UV active compounds. In addition, neither calibration curves nor internal/external standards are needed. We have demonstrated that logD7.4 can be accurately measured using 1H NMR for compounds within the logD7.4 interval...

  5. $O(N)$ model in Euclidean de Sitter space: beyond the leading infrared approximation

    CERN Document Server

    Nacir, Diana López; Trombetta, Leonardo G

    2016-01-01

    We consider an $O(N)$ scalar field model with quartic interaction in $d$-dimensional Euclidean de Sitter space. In order to avoid the problems of the standard perturbative calculations for light and massless fields, we generalize to the $O(N)$ theory a systematic method introduced previously for a single field, which treats the zero modes exactly and the nonzero modes perturbatively. We compute the two-point functions taking into account not only the leading infrared contribution, coming from the self-interaction of the zero modes, but also corrections due to the interaction of the ultraviolet modes. For the model defined in the corresponding Lorentzian de Sitter spacetime, we obtain the two-point functions by analytical continuation. We point out that a partial resummation of the leading secular terms (which necessarily involves nonzero modes) is required to obtain a decay at large distances for massless fields. We implement this resummation along with a systematic double expansion in an effective coupling c...

  6. Experience in production works by X-ray radiometric logging to improve the confidence of borehole cross section sampling for zinc and lead

    International Nuclear Information System (INIS)

    Krasnoperov, V.A.; Zvujkovskij, Z.P.; Budnikov, F.G.; Sheleshko, R.P.

    1977-01-01

    An experiment on the application of roentgenoradiometric logging (RRL) for simultaneous determination of lead and zinc in prospecting boreholes is described. The measurements were made with a GKS-IH spectrometer equipped with modernized logging SP-4 probes of 42 mm in diameter with external units and CPM-19 counters. A radioactive armoured cable KRK-2 was used for transmitting information, the diagrams being recorded on an PR-6 photorecorder. The characteristic lines of the K-series of zinc and the L-series of lead, as well as singly scattered source radiation were recorded. The ranges of the recorded energies were 7-10, 10-15, and 18-21 keV. The spectrometer resolution for the zinc line was 20-23%. The portion of the integral spectrum of the working source with an energy of over 40 keV from the 87-keV line of cadmium-109 was used as a gamma reference. As a result of the investigation it was concluded that the sensitivity threshold of RRL is 3-5 times lower than the limiting content for overbalance ores and meets the prospecting requirements. The errors in the estimate of the contents and linear resources from RRL are commensurate with those of qualitative geological testing

  7. A next-to-leading-log Monte Carlo study of photon pairs and the search for the intermediate mass Higgs Boson

    International Nuclear Information System (INIS)

    Bailey, B.R.

    1993-01-01

    Symmetry breaking and the question of the origin of mass are the reasons the Superconducting Super Collider and the Large Hadron Collider are being built. The Standard Model of particle physics provides a solution to this problem by proposing the existence of a neutral scalar particle, the Higgs boson. This particle, via its interactions, gives mass to all of the particles in the Standard Model. The question of whether the Higgs boson can be detected at these machines depends critically on its final state decays. These decays in turn depend crucially on the mass of the Higgs boson, an unknown parameter of the theory. A lower bound of the Higgs mass has been set by experiment and a upper bound via theoretical arguments. Throughout much of the mass range Higgs decays via weak gauge bosons yield a clear signal. However, near the lower limit, the so-called intermediate mass region, the situation is less clear. In this region Higgs decays into photon pairs have been suggested as a viable signal. The significance of such a signal depends on other competing processes or backgrounds. This dissertation attempts to answer the question, open-quotes Can the Intermediate mass Higgs boson be detected via its electromagnetic decays?close quotes To answer this question various Standard Model processes are calculated to the leading-log and next-to-leading-log level in a Monte Carlo environment

  8. Borehole logging

    International Nuclear Information System (INIS)

    Olsen, H.

    1995-01-01

    Numerous ground water investigations have been accomplished by means of borehole logging. Borehole logging can be applied to establish new water recovery wells, to control the existing water producing wells and source areas and to estimate ground water quality. (EG)

  9. Extending the Matrix Element Method beyond the Born approximation: calculating event weights at next-to-leading order accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Martini, Till; Uwer, Peter [Humboldt-Universität zu Berlin, Institut für Physik,Newtonstraße 15, 12489 Berlin (Germany)

    2015-09-14

    In this article we illustrate how event weights for jet events can be calculated efficiently at next-to-leading order (NLO) accuracy in QCD. This is a crucial prerequisite for the application of the Matrix Element Method in NLO. We modify the recombination procedure used in jet algorithms, to allow a factorisation of the phase space for the real corrections into resolved and unresolved regions. Using an appropriate infrared regulator the latter can be integrated numerically. As illustration, we reproduce differential distributions at NLO for two sample processes. As further application and proof of concept, we apply the Matrix Element Method in NLO accuracy to the mass determination of top quarks produced in e{sup +}e{sup −} annihilation. This analysis is relevant for a future Linear Collider. We observe a significant shift in the extracted mass depending on whether the Matrix Element Method is used in leading or next-to-leading order.

  10. Extending the Matrix Element Method beyond the Born approximation: calculating event weights at next-to-leading order accuracy

    International Nuclear Information System (INIS)

    Martini, Till; Uwer, Peter

    2015-01-01

    In this article we illustrate how event weights for jet events can be calculated efficiently at next-to-leading order (NLO) accuracy in QCD. This is a crucial prerequisite for the application of the Matrix Element Method in NLO. We modify the recombination procedure used in jet algorithms, to allow a factorisation of the phase space for the real corrections into resolved and unresolved regions. Using an appropriate infrared regulator the latter can be integrated numerically. As illustration, we reproduce differential distributions at NLO for two sample processes. As further application and proof of concept, we apply the Matrix Element Method in NLO accuracy to the mass determination of top quarks produced in e"+e"− annihilation. This analysis is relevant for a future Linear Collider. We observe a significant shift in the extracted mass depending on whether the Matrix Element Method is used in leading or next-to-leading order.

  11. General Rytov approximation.

    Science.gov (United States)

    Potvin, Guy

    2015-10-01

    We examine how the Rytov approximation describing log-amplitude and phase fluctuations of a wave propagating through weak uniform turbulence can be generalized to the case of turbulence with a large-scale nonuniform component. We show how the large-scale refractive index field creates Fermat rays using the path integral formulation for paraxial propagation. We then show how the second-order derivatives of the Fermat ray action affect the Rytov approximation, and we discuss how a numerical algorithm would model the general Rytov approximation.

  12. Encyclopedia of well logging

    International Nuclear Information System (INIS)

    Desbrandes, R.

    1985-01-01

    The 16 chapters of this book aim to provide students, trainees and engineers with a manual covering all well-logging measurements ranging from drilling to productions, from oil to minerals going by way of geothermal energy. Each chapter is a summary but a bibliography is given at the end of each chapter. Well-logging during drilling, wireline logging equipment and techniques, petroleum logging, data processing of borehole data, interpretation of well-logging, sampling tools, completion and production logging, logging in relief wells to kill off uncontrolled blowouts, techniques for high temperature geothermal energy, small-scale mining and hydrology, logging with oil-base mud and finally recommended logging programs are all topics covered. There is one chapter on nuclear well-logging which is indexed separately. (UK)

  13. Jet calculus beyond leading logarithms

    International Nuclear Information System (INIS)

    Kalinowski, J.; Konishi, K.; Taylor, T.R.

    1981-01-01

    It is shown that the evolution of hadronic jets produced in hard processes can be studied in terms of a simple parton branching picture, beyond the leading log approximation of QCD. The jet calculus is generalized to any given order of logs (but always to all orders of αsub(s)). We discuss the general structure of the formalism. Universality of jet evolution is discussed. We consider also a jet calorimetry measure and the multiplicity distribution of final states in a form which allows a systematic improvement of approximation. To the next-to-leading order, we prove the finiteness and elucidate the scheme dependence of parton subprocess probabilities. The physical inclusive cross section is shown to be scheme independent: next-to-leading results for e + e - → q (nonsinglet) + X agree with those of Curci and others. (orig.)

  14. http Log Analysis

    DEFF Research Database (Denmark)

    Bøving, Kristian Billeskov; Simonsen, Jesper

    2004-01-01

    This article documents how log analysis can inform qualitative studies concerning the usage of web-based information systems (WIS). No prior research has used http log files as data to study collaboration between multiple users in organisational settings. We investigate how to perform http log...... analysis; what http log analysis says about the nature of collaborative WIS use; and how results from http log analysis may support other data collection methods such as surveys, interviews, and observation. The analysis of log files initially lends itself to research designs, which serve to test...... hypotheses using a quantitative methodology. We show that http log analysis can also be valuable in qualitative research such as case studies. The results from http log analysis can be triangulated with other data sources and for example serve as a means of supporting the interpretation of interview data...

  15. Log N-log S in inconclusive

    Science.gov (United States)

    Klebesadel, R. W.; Fenimore, E. E.; Laros, J.

    1983-01-01

    The log N-log S data acquired by the Pioneer Venus Orbiter Gamma Burst Detector (PVO) are presented and compared to similar data from the Soviet KONUS experiment. Although the PVO data are consistent with and suggestive of a -3/2 power law distribution, the results are not adequate at this state of observations to differentiate between a -3/2 and a -1 power law slope.

  16. The Meaning of Logs

    NARCIS (Netherlands)

    Etalle, Sandro; Massacci, Fabio; Yautsiukhin, Artsiom

    2007-01-01

    While logging events is becoming increasingly common in computing, in communication and in collaborative work, log systems need to satisfy increasingly challenging (if not conflicting) requirements.Despite the growing pervasiveness of log systems, to date there is no high-level framework which

  17. The Meaning of Logs

    NARCIS (Netherlands)

    Etalle, Sandro; Massacci, Fabio; Yautsiukhin, Artsiom; Lambrinoudakis, Costas; Pernul, Günther; Tjoa, A Min

    While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not conflicting) requirements. In this paper we propose a high-level framework for modeling log systems, and reasoning about

  18. BFKL equation for the adjoint representation of the gauge group in the next-to-leading approximation at N=4 SUSY

    Energy Technology Data Exchange (ETDEWEB)

    Fadin, V.S. [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Budker Nuclear Physics Institute, Novosibirsk (Russian Federation); Novosibirskij Gosudarstvennyj Univ., Novosibirsk (Russian Federation); Lipatov, L.N. [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Petersburg Nuclear Physics Institute, Gatchina (Russian Federation); St. Petersburg State Univ., Gatchina (Russian Federation)

    2011-12-15

    We calculate the eigenvalues of the next-to-leading kernel for the BFKL equation in the adjoint representation of the gauge group SU(N{sub c}) in the N=4 supersymmetric Yang-Mills model. These eigenvalues are used to obtain the high energy behavior of the remainder function for the 6-point scattering amplitude with the maximal helicity violation in the kinematical regions containing the Mandelstam cut contribution. The leading and next-to-leading singularities of the corresponding collinear anomalous dimension are calculated in all orders of perturbation theory. We compare our result with the known collinear limit and with the recently suggested ansatz for the remainder function in three loops and obtain the full agreement providing that the numerical parameters in this anzatz are chosen in an appropriate way.

  19. LogScope

    Science.gov (United States)

    Havelund, Klaus; Smith, Margaret H.; Barringer, Howard; Groce, Alex

    2012-01-01

    LogScope is a software package for analyzing log files. The intended use is for offline post-processing of such logs, after the execution of the system under test. LogScope can, however, in principle, also be used to monitor systems online during their execution. Logs are checked against requirements formulated as monitors expressed in a rule-based specification language. This language has similarities to a state machine language, but is more expressive, for example, in its handling of data parameters. The specification language is user friendly, simple, and yet expressive enough for many practical scenarios. The LogScope software was initially developed to specifically assist in testing JPL s Mars Science Laboratory (MSL) flight software, but it is very generic in nature and can be applied to any application that produces some form of logging information (which almost any software does).

  20. Performance analysis of MIMO wireless optical communication system with Q-ary PPM over correlated log-normal fading channel

    Science.gov (United States)

    Wang, Huiqin; Wang, Xue; Lynette, Kibe; Cao, Minghua

    2018-06-01

    The performance of multiple-input multiple-output wireless optical communication systems that adopt Q-ary pulse position modulation over spatial correlated log-normal fading channel is analyzed in terms of its un-coded bit error rate and ergodic channel capacity. The analysis is based on the Wilkinson's method which approximates the distribution of a sum of correlated log-normal random variables to a log-normal random variable. The analytical and simulation results corroborate the increment of correlation coefficients among sub-channels lead to system performance degradation. Moreover, the receiver diversity has better performance in resistance of spatial correlation caused channel fading.

  1. Approximate Likelihood

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Most physics results at the LHC end in a likelihood ratio test. This includes discovery and exclusion for searches as well as mass, cross-section, and coupling measurements. The use of Machine Learning (multivariate) algorithms in HEP is mainly restricted to searches, which can be reduced to classification between two fixed distributions: signal vs. background. I will show how we can extend the use of ML classifiers to distributions parameterized by physical quantities like masses and couplings as well as nuisance parameters associated to systematic uncertainties. This allows for one to approximate the likelihood ratio while still using a high dimensional feature vector for the data. Both the MEM and ABC approaches mentioned above aim to provide inference on model parameters (like cross-sections, masses, couplings, etc.). ABC is fundamentally tied Bayesian inference and focuses on the “likelihood free” setting where only a simulator is available and one cannot directly compute the likelihood for the dat...

  2. Diophantine approximation

    CERN Document Server

    Schmidt, Wolfgang M

    1980-01-01

    "In 1970, at the U. of Colorado, the author delivered a course of lectures on his famous generalization, then just established, relating to Roth's theorem on rational approxi- mations to algebraic numbers. The present volume is an ex- panded and up-dated version of the original mimeographed notes on the course. As an introduction to the author's own remarkable achievements relating to the Thue-Siegel-Roth theory, the text can hardly be bettered and the tract can already be regarded as a classic in its field."(Bull.LMS) "Schmidt's work on approximations by algebraic numbers belongs to the deepest and most satisfactory parts of number theory. These notes give the best accessible way to learn the subject. ... this book is highly recommended." (Mededelingen van het Wiskundig Genootschap)

  3. Radiometric well logging instruments

    International Nuclear Information System (INIS)

    Davydov, A.V.

    1975-01-01

    The technical properties of well instruments for radioactive logging used in the radiometric logging complexes PKS-1000-1 (''Sond-1'') and PRKS-2 (''Vitok-2'') are described. The main features of the electric circuit of the measuring channels are given

  4. Power to the logs!

    CERN Multimedia

    CERN. Geneva; MACMAHON, Joseph

    2015-01-01

    Are you tired of using grep, vi and emacs to read your logs? Do you feel like you’re missing the big picture? Does the word "statistics" put a smile on your face? Then it’s time to give power to the logs!

  5. Log-binomial models: exploring failed convergence.

    Science.gov (United States)

    Williamson, Tyler; Eliasziw, Misha; Fick, Gordon Hilton

    2013-12-13

    Relative risk is a summary metric that is commonly used in epidemiological investigations. Increasingly, epidemiologists are using log-binomial models to study the impact of a set of predictor variables on a single binary outcome, as they naturally offer relative risks. However, standard statistical software may report failed convergence when attempting to fit log-binomial models in certain settings. The methods that have been proposed in the literature for dealing with failed convergence use approximate solutions to avoid the issue. This research looks directly at the log-likelihood function for the simplest log-binomial model where failed convergence has been observed, a model with a single linear predictor with three levels. The possible causes of failed convergence are explored and potential solutions are presented for some cases. Among the principal causes is a failure of the fitting algorithm to converge despite the log-likelihood function having a single finite maximum. Despite these limitations, log-binomial models are a viable option for epidemiologists wishing to describe the relationship between a set of predictors and a binary outcome where relative risk is the desired summary measure. Epidemiologists are encouraged to continue to use log-binomial models and advocate for improvements to the fitting algorithms to promote the widespread use of log-binomial models.

  6. Hierarchical matrix approximation of large covariance matrices

    KAUST Repository

    Litvinenko, Alexander; Genton, Marc G.; Sun, Ying

    2015-01-01

    We approximate large non-structured Matérn covariance matrices of size n×n in the H-matrix format with a log-linear computational cost and storage O(kn log n), where rank k ≪ n is a small integer. Applications are: spatial statistics, machine learning and image analysis, kriging and optimal design.

  7. Hierarchical matrix approximation of large covariance matrices

    KAUST Repository

    Litvinenko, Alexander

    2015-11-30

    We approximate large non-structured Matérn covariance matrices of size n×n in the H-matrix format with a log-linear computational cost and storage O(kn log n), where rank k ≪ n is a small integer. Applications are: spatial statistics, machine learning and image analysis, kriging and optimal design.

  8. Digital mineral logging system

    International Nuclear Information System (INIS)

    West, J.B.

    1980-01-01

    A digital mineral logging system acquires data from a mineral logging tool passing through a borehole and transmits the data uphole to an electronic digital signal processor. A predetermined combination of sensors, including a deviometer, is located in a logging tool for the acquisition of the desired data as the logging tool is raised from the borehole. Sensor data in analog format is converted in the logging tool to a digital format and periodically batch transmitted to the surface at a predetermined sampling rate. An identification code is provided for each mineral logging tool, and the code is transmitted to the surface along with the sensor data. The self-identifying tool code is transmitted to the digital signal processor to identify the code against a stored list of the range of numbers assigned to that type of tool. The data is transmitted up the d-c power lines of the tool by a frequency shift key transmission technique. At the surface, a frequency shift key demodulation unit transmits the decoupled data to an asynchronous receiver interfaced to the electronic digital signal processor. During a recording phase, the signals from the logging tool are read by the electronic digital signal processor and stored for later processing. During a calculating phase, the stored data is processed by the digital signal processor and the results are outputted to a printer or plotter, or both

  9. Mariners Weather Log

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Mariners Weather Log (MWL) is a publication containing articles, news and information about marine weather events and phenomena, worldwide environmental impact...

  10. Log-inject-log in sand consolidation

    International Nuclear Information System (INIS)

    Murphy, R.P.; Spurlock, J.W.

    1977-01-01

    A method is described for gathering information for the determination of the adequacy of placement of sand consolidating plastic for sand control in oil and gas wells. The method uses a high neutron cross-section tracer which becomes part of the plastic and uses pulsed neutron logging before and after injection of the plastic. Preferably, the method uses lithium, boron, indium, and/or cadmium tracers. Boron oxide is especially useful and can be dissolved in alcohol and mixed with the plastic ingredients

  11. Elephant logging and environment

    International Nuclear Information System (INIS)

    Tin-Aung-Hla

    1995-01-01

    The natural environment comprises non-biological elements such as air, water, light, heat and biological elements of animal and plant life; all interact with each other to create an ecosystem. Human activities like over-exploitation of forest results in deforestation and desertification. This consequently changes ecological balance. Topics on: (1) history of elephants utilization; (2) elephant logging; (3) classification of elephants; (4) dragging gear; (5) elephant power; (6) elephant logging and environment, are discussed

  12. Approximation by Cylinder Surfaces

    DEFF Research Database (Denmark)

    Randrup, Thomas

    1997-01-01

    We present a new method for approximation of a given surface by a cylinder surface. It is a constructive geometric method, leading to a monorail representation of the cylinder surface. By use of a weighted Gaussian image of the given surface, we determine a projection plane. In the orthogonal...

  13. Approximating Frequent Items in Asynchronous Data Stream over a Sliding Window

    DEFF Research Database (Denmark)

    Ting, Hing-Fung; Lee, Lap Kei; Chan, Ho-Leung

    2011-01-01

    with sufficient accuracy. Prior to our work, the best solution is given by Cormode et al. [1], who gave an O (1/ε log W log (εB/ log W) min {log W, 1/ε} log |U|)- space data structure that can approximate the frequent items within an ε error bound, where W and B are parameters of the sliding window, and U...

  14. Log4J

    CERN Document Server

    Perry, Steven

    2009-01-01

    Log4j has been around for a while now, and it seems like so many applications use it. I've used it in my applications for years now, and I'll bet you have too. But every time I need to do something with log4j I've never done before I find myself searching for examples of how to do whatever that is, and I don't usually have much luck. I believe the reason for this is that there is a not a great deal of useful information about log4j, either in print or on the Internet. The information is too simple to be of real-world use, too complicated to be distilled quickly (which is what most developers

  15. Mechanics of log calibration

    International Nuclear Information System (INIS)

    Waller, W.C.; Cram, M.E.; Hall, J.E.

    1975-01-01

    For any measurement to have meaning, it must be related to generally accepted standard units by a valid and specified system of comparison. To calibrate well-logging tools, sensing systems are designed which produce consistent and repeatable indications over the range for which the tool was intended. The basics of calibration theory, procedures, and calibration record presentations are reviewed. Calibrations for induction, electrical, radioactivity, and sonic logging tools will be discussed. The authors' intent is to provide an understanding of the sources of errors, of the way errors are minimized in the calibration process, and of the significance of changes in recorded calibration data

  16. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    OpenAIRE

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin

    2014-01-01

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US?Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3%...

  17. Log of Apollo 11.

    Science.gov (United States)

    National Aeronautics and Space Administration, Washington, DC.

    The major events of the first manned moon landing mission, Apollo 11, are presented in chronological order from launch time until arrival of the astronauts aboard the U.S.S. Hornet. The log is descriptive, non-technical, and includes numerous color photographs of the astronauts on the moon. (PR)

  18. Borehole logging system

    International Nuclear Information System (INIS)

    Allen, L.S.

    1988-01-01

    A radioactive borehole logging tool employs an epithermal neutron detector having a neutron counter surrounded by an inner thermal neutron filter and an outer thermal neutron filter. Located between the inner and outer filters is a neutron moderating material for extending the lifetime of epithermal neutrons to enhance the counting rate of such epithermal neutrons by the neutron counter

  19. Neutron--neutron logging

    International Nuclear Information System (INIS)

    Allen, L.S.

    1977-01-01

    A borehole logging tool includes a steady-state source of fast neutrons, two epithermal neutron detectors, and two thermal neutron detectors. A count rate meter is connected to each neutron detector. A first ratio detector provides an indication of the porosity of the formation surrounding the borehole by determining the ratio of the outputs of the two count rate meters connected to the two epithermal neutron detectors. A second ratio detector provides an indication of both porosity and macroscopic absorption cross section of the formation surrounding the borehole by determining the ratio of the outputs of the two count rate meters connected to the two thermal neutron detectors. By comparing the signals of the two ratio detectors, oil bearing zones and salt water bearing zones within the formation being logged can be distinguished and the amount of oil saturation can be determined. 6 claims, 2 figures

  20. Pulsed radiation decay logging

    International Nuclear Information System (INIS)

    Mills, W.R. Jr.

    1983-01-01

    There are provided new and improved well logging processes and systems wherein the detection of secondary radiation is accomplished during a plurality of time windows in a manner to accurately characterize the decay rate of the secondary radiation. The system comprises a well logging tool having a primary pulsed radiation source which emits repetitive time-spaced bursts of primary radiation and detector means for detecting secondary radiation resulting from the primary radiation and producing output signals in response to the detected radiation. A plurality of measuring channels are provided, each of which produces a count rate function representative of signals received from the detector means during successive time windows occurring between the primary radiation bursts. The logging system further comprises means responsive to the measuring channels for producing a plurality of functions representative of the ratios of the radiation count rates measured during adjacent pairs of the time windows. Comparator means function to compare the ratio functions and select at least one of the ratio functions to generate a signal representative of the decay rate of the secondary radiation

  1. Geophysical borehole logging

    International Nuclear Information System (INIS)

    McCann, D.; Barton, K.J.; Hearn, K.

    1981-08-01

    Most of the available literature on geophysical borehole logging refers to studies carried out in sedimentary rocks. It is only in recent years that any great interest has been shown in geophysical logging in boreholes in metamorphic and igneous rocks following the development of research programmes associated with geothermal energy and nuclear waste disposal. This report is concerned with the programme of geophysical logging carried out on the three deep boreholes at Altnabreac, Caithness, to examine the effectiveness of these methods in crystalline rock. Of particular importance is the assessment of the performance of the various geophysical sondes run in the boreholes in relation to the rock mass properties. The geophysical data can be used to provide additional in-situ information on the geological, hydrogeological and engineering properties of the rock mass. Fracturing and weathering in the rock mass have a considerable effect on both the design parameters for an engineering structure and the flow of water through the rock mass; hence, the relation between the geophysical properties and the degree of fracturing and weathering is examined in some detail. (author)

  2. Hierarchical matrix approximation of large covariance matrices

    KAUST Repository

    Litvinenko, Alexander

    2015-01-07

    We approximate large non-structured covariance matrices in the H-matrix format with a log-linear computational cost and storage O(n log n). We compute inverse, Cholesky decomposition and determinant in H-format. As an example we consider the class of Matern covariance functions, which are very popular in spatial statistics, geostatistics, machine learning and image analysis. Applications are: kriging and optimal design

  3. Hierarchical matrix approximation of large covariance matrices

    KAUST Repository

    Litvinenko, Alexander; Genton, Marc G.; Sun, Ying; Tempone, Raul

    2015-01-01

    We approximate large non-structured covariance matrices in the H-matrix format with a log-linear computational cost and storage O(n log n). We compute inverse, Cholesky decomposition and determinant in H-format. As an example we consider the class of Matern covariance functions, which are very popular in spatial statistics, geostatistics, machine learning and image analysis. Applications are: kriging and optimal design

  4. Diophantine approximation and badly approximable sets

    DEFF Research Database (Denmark)

    Kristensen, S.; Thorn, R.; Velani, S.

    2006-01-01

    . The classical set Bad of `badly approximable' numbers in the theory of Diophantine approximation falls within our framework as do the sets Bad(i,j) of simultaneously badly approximable numbers. Under various natural conditions we prove that the badly approximable subsets of Omega have full Hausdorff dimension...

  5. An improved saddlepoint approximation.

    Science.gov (United States)

    Gillespie, Colin S; Renshaw, Eric

    2007-08-01

    Given a set of third- or higher-order moments, not only is the saddlepoint approximation the only realistic 'family-free' technique available for constructing an associated probability distribution, but it is 'optimal' in the sense that it is based on the highly efficient numerical method of steepest descents. However, it suffers from the problem of not always yielding full support, and whilst [S. Wang, General saddlepoint approximations in the bootstrap, Prob. Stat. Lett. 27 (1992) 61.] neat scaling approach provides a solution to this hurdle, it leads to potentially inaccurate and aberrant results. We therefore propose several new ways of surmounting such difficulties, including: extending the inversion of the cumulant generating function to second-order; selecting an appropriate probability structure for higher-order cumulants (the standard moment closure procedure takes them to be zero); and, making subtle changes to the target cumulants and then optimising via the simplex algorithm.

  6. Pulse neutron logging technique

    International Nuclear Information System (INIS)

    Bespalov, D.F.; Dylyuk, A.A.

    1975-01-01

    A new method of neutron-burst logging is proposed, residing in irradiating rocks with fast neutron bursts and registering the integrated flux burst of thermal and/or epithermal neutrons, from the moment of its initiation to that of full absorption. The obtaained value is representative of the rock properties (porosity, hydrogen content). The integrated flux in a burst of thermal and epithermal neutrons can be measured both by way of activation of a reference sample of a known chemical composition during the neutron burst and by recording the radiation of induced activity of the sample within an interval between two bursts. The proposed method features high informative value, accuracy and efficiency

  7. Well logging, atom and geology

    International Nuclear Information System (INIS)

    Serra, O.

    1994-01-01

    Well logging techniques exploit interactions of gamma photons and neutrons with atoms. Interactions of neutrons of different energies with atoms allow the detection and evaluation of the weight percentage of several elements composing the rocks (C, O, Si, Ca, Fe, S); spectrometry of gamma rays produced by thermal neutron absorption allows for the weight percentage determination of Si, Ca, Fe, S, Cl, H, Ti and Gd, etc. High resolution detectors (germanium doped by Li, at liquid nitrogen temperature) allow the recognition of more elements. Other techniques involving neutrons consist in determining the population in epithermal neutrons at a certain distance of the neutron source (measurement of the hydrogen index). By analyzing the intensity of the gamma flux produced by Compton scattering, the electronic and bulk densities of the rocks are measured. All these data lead to the detection and evaluation of ore deposits (uranium and potassium) and coal, and determination of the lithology, the main minerals composing the rocks, petrophysical properties... 1 fig

  8. On the WKBJ approximation

    International Nuclear Information System (INIS)

    El Sawi, M.

    1983-07-01

    A simple approach employing properties of solutions of differential equations is adopted to derive an appropriate extension of the WKBJ method. Some of the earlier techniques that are commonly in use are unified, whereby the general approximate solution to a second-order homogeneous linear differential equation is presented in a standard form that is valid for all orders. In comparison to other methods, the present one is shown to be leading in the order of iteration, and thus possibly has the ability of accelerating the convergence of the solution. The method is also extended for the solution of inhomogeneous equations. (author)

  9. Nova Event Logging System

    International Nuclear Information System (INIS)

    Calliger, R.J.; Suski, G.J.

    1981-01-01

    Nova is a 200 terawatt, 10-beam High Energy Glass Laser currently under construction at LLNL. This facility, designed to demonstrate the feasibility of laser driven inertial confinement fusion, contains over 5000 elements requiring coordinated control, data acquisition, and analysis functions. The large amounts of data that will be generated must be maintained over the life of the facility. Often the most useful but inaccessible data is that related to time dependent events associated with, for example, operator actions or experiment activity. We have developed an Event Logging System to synchronously record, maintain, and analyze, in part, this data. We see the system as being particularly useful to the physics and engineering staffs of medium and large facilities in that it is entirely separate from experimental apparatus and control devices. The design criteria, implementation, use, and benefits of such a system will be discussed

  10. Querying Workflow Logs

    Directory of Open Access Journals (Sweden)

    Yan Tang

    2018-01-01

    Full Text Available A business process or workflow is an assembly of tasks that accomplishes a business goal. Business process management is the study of the design, configuration/implementation, enactment and monitoring, analysis, and re-design of workflows. The traditional methodology for the re-design and improvement of workflows relies on the well-known sequence of extract, transform, and load (ETL, data/process warehousing, and online analytical processing (OLAP tools. In this paper, we study the ad hoc queryiny of process enactments for (data-centric business processes, bypassing the traditional methodology for more flexibility in querying. We develop an algebraic query language based on “incident patterns” with four operators inspired from Business Process Model and Notation (BPMN representation, allowing the user to formulate ad hoc queries directly over workflow logs. A formal semantics of this query language, a preliminary query evaluation algorithm, and a group of elementary properties of the operators are provided.

  11. Log-periodic dipole antenna with low cross-polarization

    DEFF Research Database (Denmark)

    Pivnenko, Sergey

    2006-01-01

    In this work, log-periodic antennas with improved cross-polarization level were studied. It was found that some modifications of the traditional design lead to an essential improvement of the co-to-cross polarization ratio up to 40 dB. An improved design of a log-periodic dipole antenna with low...

  12. Interpretation of horizontal well production logs: influence of logging tool

    Energy Technology Data Exchange (ETDEWEB)

    Ozkan, E. [Colorado School of Mines, Boulder, CO (United States); Sarica, C. [Pennsylvania State Univ., College Park, PA (United States); Haci, M. [Drilling Measurements, Inc (United States)

    1998-12-31

    The influence of a production-logging tool on wellbore flow rate and pressure measurements was investigated, focusing on the disturbence caused by the production-logging tool and the coiled tubing on the original flow conditions in the wellbore. The investigation was carried out using an analytical model and single-phase liquid flow was assumed. Results showed that the production-logging tool influenced the measurements as shown by the deviation of the original flow-rate, pressure profiles and low-conductivity wellbores. High production rates increase the effect of the production-logging tool. Recovering or inferring the original flow conditions in the wellbore from the production-logging data is a very complex process which cannot be solved easily. For this reason, the conditions under which the information obtained by production-logging is meaningful is of considerable practical interest. 7 refs., 2 tabs., 15 figs.

  13. Laser scanning measurements on trees for logging harvesting operations.

    Science.gov (United States)

    Zheng, Yili; Liu, Jinhao; Wang, Dian; Yang, Ruixi

    2012-01-01

    Logging harvesters represent a set of high-performance modern forestry machinery, which can finish a series of continuous operations such as felling, delimbing, peeling, bucking and so forth with human intervention. It is found by experiment that during the process of the alignment of the harvesting head to capture the trunk, the operator needs a lot of observation, judgment and repeated operations, which lead to the time and fuel losses. In order to improve the operation efficiency and reduce the operating costs, the point clouds for standing trees are collected with a low-cost 2D laser scanner. A cluster extracting algorithm and filtering algorithm are used to classify each trunk from the point cloud. On the assumption that every cross section of the target trunk is approximate a standard circle and combining the information of an Attitude and Heading Reference System, the radii and center locations of the trunks in the scanning range are calculated by the Fletcher-Reeves conjugate gradient algorithm. The method is validated through experiments in an aspen forest, and the optimized calculation time consumption is compared with the previous work of other researchers. Moreover, the implementation of the calculation result for automotive capturing trunks by the harvesting head during the logging operation is discussed in particular.

  14. Approximating Frequent Items in Asynchronous Data Stream over a Sliding Window

    Directory of Open Access Journals (Sweden)

    Ho-Leung Chan

    2011-09-01

    Full Text Available In an asynchronous data stream, the data items may be out of order with respect to their original timestamps. This paper studies the space complexity required by a data structure to maintain such a data stream so that it can approximate the set of frequent items over a sliding time window with sufficient accuracy. Prior to our work, the best solution is given by Cormode et al. [1], who gave an O (1/ε log W log (εB/ log W min {log W, 1/ε} log |U|- space data structure that can approximate the frequent items within an ε error bound, where W and B are parameters of the sliding window, and U is the set of all possible item names. We gave a more space-efficient data structure that only requires O (1/ε log W log (εB/ logW log log W space.

  15. Weighted approximation with varying weight

    CERN Document Server

    Totik, Vilmos

    1994-01-01

    A new construction is given for approximating a logarithmic potential by a discrete one. This yields a new approach to approximation with weighted polynomials of the form w"n"(" "= uppercase)P"n"(" "= uppercase). The new technique settles several open problems, and it leads to a simple proof for the strong asymptotics on some L p(uppercase) extremal problems on the real line with exponential weights, which, for the case p=2, are equivalent to power- type asymptotics for the leading coefficients of the corresponding orthogonal polynomials. The method is also modified toyield (in a sense) uniformly good approximation on the whole support. This allows one to deduce strong asymptotics in some L p(uppercase) extremal problems with varying weights. Applications are given, relating to fast decreasing polynomials, asymptotic behavior of orthogonal polynomials and multipoint Pade approximation. The approach is potential-theoretic, but the text is self-contained.

  16. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    Science.gov (United States)

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin

    2014-04-01

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  17. Logging concessions enable illegal logging crisis in the Peruvian Amazon.

    Science.gov (United States)

    Finer, Matt; Jenkins, Clinton N; Sky, Melissa A Blue; Pine, Justin

    2014-04-17

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  18. Approximation properties of haplotype tagging

    Directory of Open Access Journals (Sweden)

    Dreiseitl Stephan

    2006-01-01

    Full Text Available Abstract Background Single nucleotide polymorphisms (SNPs are locations at which the genomic sequences of population members differ. Since these differences are known to follow patterns, disease association studies are facilitated by identifying SNPs that allow the unique identification of such patterns. This process, known as haplotype tagging, is formulated as a combinatorial optimization problem and analyzed in terms of complexity and approximation properties. Results It is shown that the tagging problem is NP-hard but approximable within 1 + ln((n2 - n/2 for n haplotypes but not approximable within (1 - ε ln(n/2 for any ε > 0 unless NP ⊂ DTIME(nlog log n. A simple, very easily implementable algorithm that exhibits the above upper bound on solution quality is presented. This algorithm has running time O((2m - p + 1 ≤ O(m(n2 - n/2 where p ≤ min(n, m for n haplotypes of size m. As we show that the approximation bound is asymptotically tight, the algorithm presented is optimal with respect to this asymptotic bound. Conclusion The haplotype tagging problem is hard, but approachable with a fast, practical, and surprisingly simple algorithm that cannot be significantly improved upon on a single processor machine. Hence, significant improvement in computatational efforts expended can only be expected if the computational effort is distributed and done in parallel.

  19. Log-Concavity Properties of Minkowski Valuations

    OpenAIRE

    Berg, Astrid; Parapatits, Lukas; Schuster, Franz E.; Weberndorfer, Manuel

    2014-01-01

    New Orlicz Brunn-Minkowski inequalities are established for rigid motion compatible Minkowski valuations of arbitrary degree. These extend classical log-concavity properties of intrinsic volumes and generalize seminal results of Lutwak and others. Two different approaches which refine previously employed techniques are explored. It is shown that both lead to the same class of Minkowski valuations for which these inequalities hold. An appendix by Semyon Alesker contains the proof of a new clas...

  20. Likelihood Approximation With Hierarchical Matrices For Large Spatial Datasets

    KAUST Repository

    Litvinenko, Alexander; Sun, Ying; Genton, Marc G.; Keyes, David E.

    2017-01-01

    algebra, we approximate the discretized covariance function in the hierarchical (H-) matrix format. The H-matrix format has a log-linear computational cost and storage O(kn log n), where the rank k is a small integer and n is the number of locations. The H

  1. SNG-logs at Skjern

    DEFF Research Database (Denmark)

    Korsbech, Uffe C C; Petersen, Jesper; Aage, Helle Karina

    1998-01-01

    Spectral Natural Gamma-ray logs have been run in two water supply borings at Skjern. The log data have been examined by a new technique - Noise Adjusted Singular Value Decomposition - in order to get a detailed and reliable picture of the distribution of uranium and thorium gamma-rays from heavy...

  2. Log-Log Convexity of Type-Token Growth in Zipf's Systems

    Science.gov (United States)

    Font-Clos, Francesc; Corral, Álvaro

    2015-06-01

    It is traditionally assumed that Zipf's law implies the power-law growth of the number of different elements with the total number of elements in a system—the so-called Heaps' law. We show that a careful definition of Zipf's law leads to the violation of Heaps' law in random systems, with growth curves that have a convex shape in log-log scale. These curves fulfill universal data collapse that only depends on the value of Zipf's exponent. We observe that real books behave very much in the same way as random systems, despite the presence of burstiness in word occurrence. We advance an explanation for this unexpected correspondence.

  3. Lead dust in Broken Hill homes: effect of remediation on indoor lead levels.

    Science.gov (United States)

    Boreland, F; Lyle, D M

    2006-02-01

    This study was undertaken to determine whether home remediation effectively reduced indoor lead levels in Broken Hill, a long-established silver-lead-zinc mining town in outback Australia. A before-after study of the effect of home remediation on indoor lead levels was embedded into a randomized controlled trial of the effectiveness of remediation for reducing elevated blood lead levels in young children. Moist towelettes were used to measure lead loading (microg/m2) on internal windowsills and internal and entry floors of 98 homes; samples were collected before, immediately after, and 2, 4, 6, 8, and 10 months after remediation. Data were log(10) transformed for the analysis. Remediation reduced average indoor lead levels by approximately 50%, and lead levels remained low for the duration of the follow-up period (10 months). The greatest gains were made in homes with the highest initial lead levels; homes with low preremediation lead levels showed little or no benefit. Before remediation, homes located in areas with high soil lead levels or with "poor" dust proofing had higher lead levels than those in areas with lower soil lead levels or with "medium" or "good" dust proofing; these relative differences remained after remediation. There was no evidence that lead loading was reduced by an increased opportunity to become aware of lead issues. We conclude that remediation is an effective strategy for reducing the lead exposure of children living in homes with high indoor lead levels.

  4. Engineering aspects of radiometric logging

    International Nuclear Information System (INIS)

    Huppert, P.

    1982-01-01

    Engineering problems encountered in the development of nuclear borehole logging techniques are discussed. Spectrometric techniques require electronic stability of the equipment. In addition the electronics must be capable of handling high count rates of randomly distributed pulses of fast rise time from the detector and the systems must be designed so that precise calibration is possible under field operating conditions. Components of a logging system are discussed in detail. They include the logging probe (electronics, detector, high voltage supply, preamplifier), electronic instrumentation for data collection and processing and auxiliary equipment

  5. Log-balanced combinatorial sequences

    Directory of Open Access Journals (Sweden)

    Tomislav Došlic

    2005-01-01

    Full Text Available We consider log-convex sequences that satisfy an additional constraint imposed on their rate of growth. We call such sequences log-balanced. It is shown that all such sequences satisfy a pair of double inequalities. Sufficient conditions for log-balancedness are given for the case when the sequence satisfies a two- (or more- term linear recurrence. It is shown that many combinatorially interesting sequences belong to this class, and, as a consequence, that the above-mentioned double inequalities are valid for all of them.

  6. Approximation of Surfaces by Cylinders

    DEFF Research Database (Denmark)

    Randrup, Thomas

    1998-01-01

    We present a new method for approximation of a given surface by a cylinder surface. It is a constructive geometric method, leading to a monorail representation of the cylinder surface. By use of a weighted Gaussian image of the given surface, we determine a projection plane. In the orthogonal...

  7. Approximating the minimum cycle mean

    Directory of Open Access Journals (Sweden)

    Krishnendu Chatterjee

    2013-07-01

    Full Text Available We consider directed graphs where each edge is labeled with an integer weight and study the fundamental algorithmic question of computing the value of a cycle with minimum mean weight. Our contributions are twofold: (1 First we show that the algorithmic question is reducible in O(n^2 time to the problem of a logarithmic number of min-plus matrix multiplications of n-by-n matrices, where n is the number of vertices of the graph. (2 Second, when the weights are nonnegative, we present the first (1 + ε-approximation algorithm for the problem and the running time of our algorithm is ilde(O(n^ω log^3(nW/ε / ε, where O(n^ω is the time required for the classic n-by-n matrix multiplication and W is the maximum value of the weights.

  8. VT Route Log Points 2017

    Data.gov (United States)

    Vermont Center for Geographic Information — This data layer is used with VTrans' Integrated Route Log System (IRA). It is also used to calibrate the linear referencing systems, including the End-to-End and...

  9. New materials for fireplace logs

    Science.gov (United States)

    Kieselback, D. J.; Smock, A. W.

    1971-01-01

    Fibrous insulation and refractory concrete are used for logs as well as fireproof walls, incinerator bricks, planters, and roof shingles. Insulation is lighter and more shock resistant than fireclay. Lightweight slag bonded with refractory concrete serves as aggregrate.

  10. Modulated Pade approximant

    International Nuclear Information System (INIS)

    Ginsburg, C.A.

    1980-01-01

    In many problems, a desired property A of a function f(x) is determined by the behaviour of f(x) approximately equal to g(x,A) as x→xsup(*). In this letter, a method for resuming the power series in x of f(x) and approximating A (modulated Pade approximant) is presented. This new approximant is an extension of a resumation method for f(x) in terms of rational functions. (author)

  11. Palm distributions for log Gaussian Cox processes

    DEFF Research Database (Denmark)

    Coeurjolly, Jean-Francois; Møller, Jesper; Waagepetersen, Rasmus Plenge

    2017-01-01

    This paper establishes a remarkable result regarding Palm distributions for a log Gaussian Cox process: the reduced Palm distribution for a log Gaussian Cox process is itself a log Gaussian Cox process that only differs from the original log Gaussian Cox process in the intensity function. This new...... result is used to study functional summaries for log Gaussian Cox processes....

  12. Sparse approximation with bases

    CERN Document Server

    2015-01-01

    This book systematically presents recent fundamental results on greedy approximation with respect to bases. Motivated by numerous applications, the last decade has seen great successes in studying nonlinear sparse approximation. Recent findings have established that greedy-type algorithms are suitable methods of nonlinear approximation in both sparse approximation with respect to bases and sparse approximation with respect to redundant systems. These insights, combined with some previous fundamental results, form the basis for constructing the theory of greedy approximation. Taking into account the theoretical and practical demand for this kind of theory, the book systematically elaborates a theoretical framework for greedy approximation and its applications.  The book addresses the needs of researchers working in numerical mathematics, harmonic analysis, and functional analysis. It quickly takes the reader from classical results to the latest frontier, but is written at the level of a graduate course and do...

  13. Log quality enhancement: A systematic assessment of logging company wellsite performance and log quality

    International Nuclear Information System (INIS)

    Farnan, R.A.; Mc Hattie, C.M.

    1984-01-01

    To improve the monitoring of logging company performance, computer programs were developed to assess information en masse from log quality check lists completed on wellsite by the service company engineer and Phillips representative. A study of all logging jobs performed by different service companies for Phillips in Oklahoma (panhandle excepted) during 1982 enabled several pertinent and beneficial interpretations to be made. Company A provided the best tool and crew service. Company B incurred an excessive amount of lost time related to tool failure, in particular the neutron-density tool combination. Company C, although used only three times, incurred no lost time. With a reasonable data base valid conclusions were made pertaining, for example, to repeated tool malfunctions. The actual logs were then assessed for quality

  14. Log-Normal Turbulence Dissipation in Global Ocean Models

    Science.gov (United States)

    Pearson, Brodie; Fox-Kemper, Baylor

    2018-03-01

    Data from turbulent numerical simulations of the global ocean demonstrate that the dissipation of kinetic energy obeys a nearly log-normal distribution even at large horizontal scales O (10 km ) . As the horizontal scales of resolved turbulence are larger than the ocean is deep, the Kolmogorov-Yaglom theory for intermittency in 3D homogeneous, isotropic turbulence cannot apply; instead, the down-scale potential enstrophy cascade of quasigeostrophic turbulence should. Yet, energy dissipation obeys approximate log-normality—robustly across depths, seasons, regions, and subgrid schemes. The distribution parameters, skewness and kurtosis, show small systematic departures from log-normality with depth and subgrid friction schemes. Log-normality suggests that a few high-dissipation locations dominate the integrated energy and enstrophy budgets, which should be taken into account when making inferences from simplified models and inferring global energy budgets from sparse observations.

  15. Face Recognition using Approximate Arithmetic

    DEFF Research Database (Denmark)

    Marso, Karol

    Face recognition is image processing technique which aims to identify human faces and found its use in various different fields for example in security. Throughout the years this field evolved and there are many approaches and many different algorithms which aim to make the face recognition as effective...... processing applications the results do not need to be completely precise and use of the approximate arithmetic can lead to reduction in terms of delay, space and power consumption. In this paper we examine possible use of approximate arithmetic in face recognition using Eigenfaces algorithm....

  16. Approximate symmetries of Hamiltonians

    Science.gov (United States)

    Chubb, Christopher T.; Flammia, Steven T.

    2017-08-01

    We explore the relationship between approximate symmetries of a gapped Hamiltonian and the structure of its ground space. We start by considering approximate symmetry operators, defined as unitary operators whose commutators with the Hamiltonian have norms that are sufficiently small. We show that when approximate symmetry operators can be restricted to the ground space while approximately preserving certain mutual commutation relations. We generalize the Stone-von Neumann theorem to matrices that approximately satisfy the canonical (Heisenberg-Weyl-type) commutation relations and use this to show that approximate symmetry operators can certify the degeneracy of the ground space even though they only approximately form a group. Importantly, the notions of "approximate" and "small" are all independent of the dimension of the ambient Hilbert space and depend only on the degeneracy in the ground space. Our analysis additionally holds for any gapped band of sufficiently small width in the excited spectrum of the Hamiltonian, and we discuss applications of these ideas to topological quantum phases of matter and topological quantum error correcting codes. Finally, in our analysis, we also provide an exponential improvement upon bounds concerning the existence of shared approximate eigenvectors of approximately commuting operators under an added normality constraint, which may be of independent interest.

  17. Hierarchical matrix approximation of large covariance matrices

    KAUST Repository

    Litvinenko, Alexander

    2015-01-05

    We approximate large non-structured covariance matrices in the H-matrix format with a log-linear computational cost and storage O(nlogn). We compute inverse, Cholesky decomposition and determinant in H-format. As an example we consider the class of Matern covariance functions, which are very popular in spatial statistics, geostatistics, machine learning and image analysis. Applications are: kriging and op- timal design.

  18. Hierarchical matrix approximation of large covariance matrices

    KAUST Repository

    Litvinenko, Alexander; Genton, Marc G.; Sun, Ying; Tempone, Raul

    2015-01-01

    We approximate large non-structured covariance matrices in the H-matrix format with a log-linear computational cost and storage O(nlogn). We compute inverse, Cholesky decomposition and determinant in H-format. As an example we consider the class of Matern covariance functions, which are very popular in spatial statistics, geostatistics, machine learning and image analysis. Applications are: kriging and op- timal design.

  19. Approximating distributions from moments

    Science.gov (United States)

    Pawula, R. F.

    1987-11-01

    A method based upon Pearson-type approximations from statistics is developed for approximating a symmetric probability density function from its moments. The extended Fokker-Planck equation for non-Markov processes is shown to be the underlying foundation for the approximations. The approximation is shown to be exact for the beta probability density function. The applicability of the general method is illustrated by numerous pithy examples from linear and nonlinear filtering of both Markov and non-Markov dichotomous noise. New approximations are given for the probability density function in two cases in which exact solutions are unavailable, those of (i) the filter-limiter-filter problem and (ii) second-order Butterworth filtering of the random telegraph signal. The approximate results are compared with previously published Monte Carlo simulations in these two cases.

  20. Pulsed neutron generator for logging

    International Nuclear Information System (INIS)

    Thibideau, F.D.

    1977-01-01

    A pulsed neutron generator for uranium logging is described. This generator is one component of a prototype uranium logging probe which is being developed by SLA to detect, and assay, uranium by borehole logging. The logging method is based on the measurement of epithermal neutrons resulting from the prompt fissioning of uranium from a pulsed source of 17.6 MeV neutrons. An objective of the prototype probe was that its diameter not exceed 2.75 inches, which would allow its use in conventional rotary drill holes of 4.75-inch diameter. This restriction limited the generator to a maximum 2.375-inch diameter. The performance requirements for the neutron generator specified that it operate with a nominal output of 5 x 10 6 neutrons/pulse at up to 100 pulses/second for a one-hour period. The development of a neutron generator meeting the preliminary design goals was completed and two prototype models were delivered to SLA. These two generators have been used by SLA to log a number of boreholes in field evaluation of the probe. The results of the field evaluations have led to the recommendation of several changes to improve the probe's operation. Some of these changes will require additional development effort on the neutron generator. It is expected that this work will be performed during 1977. The design and operation of the first prototype neutron generators is described

  1. CONTRIBUTIONS TO RATIONAL APPROXIMATION,

    Science.gov (United States)

    Some of the key results of linear Chebyshev approximation theory are extended to generalized rational functions. Prominent among these is Haar’s...linear theorem which yields necessary and sufficient conditions for uniqueness. Some new results in the classic field of rational function Chebyshev...Furthermore a Weierstrass type theorem is proven for rational Chebyshev approximation. A characterization theorem for rational trigonometric Chebyshev approximation in terms of sign alternation is developed. (Author)

  2. Approximation techniques for engineers

    CERN Document Server

    Komzsik, Louis

    2006-01-01

    Presenting numerous examples, algorithms, and industrial applications, Approximation Techniques for Engineers is your complete guide to the major techniques used in modern engineering practice. Whether you need approximations for discrete data of continuous functions, or you''re looking for approximate solutions to engineering problems, everything you need is nestled between the covers of this book. Now you can benefit from Louis Komzsik''s years of industrial experience to gain a working knowledge of a vast array of approximation techniques through this complete and self-contained resource.

  3. Convergence of posteriors for discretized log Gaussian Cox processes

    DEFF Research Database (Denmark)

    Waagepetersen, Rasmus Plenge

    2004-01-01

    In Markov chain Monte Carlo posterior computation for log Gaussian Cox processes (LGCPs) a discretization of the continuously indexed Gaussian field is required. It is demonstrated that approximate posterior expectations computed from discretized LGCPs converge to the exact posterior expectations...... when the cell sizes of the discretization tends to zero. The effect of discretization is studied in a data example....

  4. Testing and analysis of internal hardwood log defect prediction models

    Science.gov (United States)

    R. Edward Thomas

    2011-01-01

    The severity and location of internal defects determine the quality and value of lumber sawn from hardwood logs. Models have been developed to predict the size and position of internal defects based on external defect indicator measurements. These models were shown to predict approximately 80% of all internal knots based on external knot indicators. However, the size...

  5. Clonal differences in log end splitting in Eucalyptus grandis in ...

    African Journals Online (AJOL)

    This paper discusses the juvenile–mature correlation of log end splitting among Eucalyptus grandis clones from two trials and how differences in splitting relate to differences in wood density, pith-to-bark gradient and growth rate. Two approximately 20-year-old Eucalyptus grandis clonal trials at Bergvliet plantation were ...

  6. Hardwood log grades and lumber grade yields for factory lumber logs

    Science.gov (United States)

    Leland F. Hanks; Glenn L. Gammon; Robert L. Brisbin; Everette D. Rast

    1980-01-01

    The USDA Forest Service Standard Grades for Hardwood Factory Lumber Logs are described, and lumber grade yields for 16 species and 2 species groups are presented by log grade and log diameter. The grades enable foresters, log buyers, and log sellers to select and grade those log suitable for conversion into standard factory grade lumber. By using the apropriate lumber...

  7. The log S -log N distribution of gamma ray brust

    International Nuclear Information System (INIS)

    Yamagami, Takamasa; Nishimura, Jun; Fujii, Masami

    1982-01-01

    The relation between the size S and the frequency N of gamma ray burst has been studied. This relation may be determined from the celestial distribution of gamma ray burst sources. The present analysis gives that the log S - log N relation for any direction is determined by the celestial distribution of gamma ray burst sources. The observed bursts were analyzed. The celestial distribution of gamma ray burst sources was observed by the satellites of USSR. The results showed that the distribution seemed to be isotropic. However, the calculated log S - log N relation based on the isotropic distribution wasF in disagreement with the observed ones. As the result of analysis, it was found that the observed bursts missed low energy part because of the threshold of detectors. The levels of discrimination of detection were not clear. When a proper threshold level is set for each type of burst, and the size of bursts is determined, the above mentioned discrepancy will be deleted regardless of luminosity and the spatial distribution of bursts. (Kato, T.)

  8. Mud Logging; Control geologico en perforaciones petroliferas (Mud Logging)

    Energy Technology Data Exchange (ETDEWEB)

    Pumarega Lafuente, J.C.

    1994-12-31

    Mud Logging is an important activity in the oil field and it is a key job in drilling operations, our duties are the acquisition, collection and interpretation of the geological and engineering data at the wellsite, also inform the client immediately of any significant changes in the well. (Author)

  9. Minimax rational approximation of the Fermi-Dirac distribution

    Science.gov (United States)

    Moussa, Jonathan E.

    2016-10-01

    Accurate rational approximations of the Fermi-Dirac distribution are a useful component in many numerical algorithms for electronic structure calculations. The best known approximations use O(log(βΔ)log(ɛ-1)) poles to achieve an error tolerance ɛ at temperature β-1 over an energy interval Δ. We apply minimax approximation to reduce the number of poles by a factor of four and replace Δ with Δocc, the occupied energy interval. This is particularly beneficial when Δ ≫ Δocc, such as in electronic structure calculations that use a large basis set.

  10. Borehole logging for uranium exploration

    International Nuclear Information System (INIS)

    1982-01-01

    The present text has been prepared taking into account the requirements of both developing countries, which might be at an incipient stage of uranium exploration, and industrialized countries, where more advanced exploration and resource evaluation techniques are commonly in use. While it was felt necessary to include some discussion of exploration concepts and fundamental physical principles underlying various logging methods, it was not the intention of the consultants to provide a thorough, detailed explanation of the various techniques, or even to give a comprehensive listing thereof. However, a list of references has been included, and it is strongly recommended that the serious student of mineral logging consult this list for further guidance

  11. Pulsed neutron porosity logging system

    International Nuclear Information System (INIS)

    Smith, H.D. Jr.; Smith, M.P.; Schultz, W.E.

    1978-01-01

    An improved pulsed neutron porosity logging system is provided in the present invention. A logging tool provided with a 14 MeV pulsed neutron source, an epithermal neutron detector, and a fast neutron detector is moved through a borehole. Repetitive bursts of neutrons irradiate the earth formations and, during the bursts, the fast neutron population is sampled. During the interval between bursts the epithermal neutron population is sampled along with background gamma radiation due to lingering thermal neutrons. The fast and epithermal neutron population measurements are combined to provide a measurement of formation porosity

  12. Expectation Consistent Approximate Inference

    DEFF Research Database (Denmark)

    Opper, Manfred; Winther, Ole

    2005-01-01

    We propose a novel framework for approximations to intractable probabilistic models which is based on a free energy formulation. The approximation can be understood from replacing an average over the original intractable distribution with a tractable one. It requires two tractable probability dis...

  13. Ordered cones and approximation

    CERN Document Server

    Keimel, Klaus

    1992-01-01

    This book presents a unified approach to Korovkin-type approximation theorems. It includes classical material on the approximation of real-valuedfunctions as well as recent and new results on set-valued functions and stochastic processes, and on weighted approximation. The results are notonly of qualitative nature, but include quantitative bounds on the order of approximation. The book is addressed to researchers in functional analysis and approximation theory as well as to those that want to applythese methods in other fields. It is largely self- contained, but the readershould have a solid background in abstract functional analysis. The unified approach is based on a new notion of locally convex ordered cones that are not embeddable in vector spaces but allow Hahn-Banach type separation and extension theorems. This concept seems to be of independent interest.

  14. Forest canopy damage and recovery in reduced-impact and conventional selective logging in eastern Para, Brazil.

    Science.gov (United States)

    Rodrigo Pereira Jr.; Johan Zweedea; Gregory P. Asnerb; Keller; Michael

    2002-01-01

    We investigated ground and canopy damage and recovery following conventional logging and reduced-impact logging (RIL) of moist tropical forest in the eastern Amazon of Brazil. Paired conventional and RIL blocks were selectively logged with a harvest intensity of approximately 23 m3 ha

  15. Logging Work Injuries in Appalachia

    Science.gov (United States)

    Charles H. Wolf; Gilbert P. Dempsey

    1978-01-01

    Logging accidents are costly. They may bring pain to injured workers, hardship to their families, and higher insurance premiums and lower productivity to their employers. Our analysis of 1,172 injuries in central Appalachia reveals that nearly half of all time lost-and almost all fatalities-resulted from accidents during felling and unloading. The largest proportion of...

  16. Log files for testing usability

    NARCIS (Netherlands)

    Klein Teeselink, G.; Siepe, A.H.M.; Pijper, de J.R.

    1999-01-01

    The aim of this study is to gain insight in the usefulness of log file analysis as a method to evaluate the usability of individual interface components and their influence on the usability of the overall user interface. We selected a music player as application, with four different interfaces and

  17. Approximate and renormgroup symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Ibragimov, Nail H. [Blekinge Institute of Technology, Karlskrona (Sweden). Dept. of Mathematics Science; Kovalev, Vladimir F. [Russian Academy of Sciences, Moscow (Russian Federation). Inst. of Mathematical Modeling

    2009-07-01

    ''Approximate and Renormgroup Symmetries'' deals with approximate transformation groups, symmetries of integro-differential equations and renormgroup symmetries. It includes a concise and self-contained introduction to basic concepts and methods of Lie group analysis, and provides an easy-to-follow introduction to the theory of approximate transformation groups and symmetries of integro-differential equations. The book is designed for specialists in nonlinear physics - mathematicians and non-mathematicians - interested in methods of applied group analysis for investigating nonlinear problems in physical science and engineering. (orig.)

  18. Approximate and renormgroup symmetries

    International Nuclear Information System (INIS)

    Ibragimov, Nail H.; Kovalev, Vladimir F.

    2009-01-01

    ''Approximate and Renormgroup Symmetries'' deals with approximate transformation groups, symmetries of integro-differential equations and renormgroup symmetries. It includes a concise and self-contained introduction to basic concepts and methods of Lie group analysis, and provides an easy-to-follow introduction to the theory of approximate transformation groups and symmetries of integro-differential equations. The book is designed for specialists in nonlinear physics - mathematicians and non-mathematicians - interested in methods of applied group analysis for investigating nonlinear problems in physical science and engineering. (orig.)

  19. Approximations of Fuzzy Systems

    Directory of Open Access Journals (Sweden)

    Vinai K. Singh

    2013-03-01

    Full Text Available A fuzzy system can uniformly approximate any real continuous function on a compact domain to any degree of accuracy. Such results can be viewed as an existence of optimal fuzzy systems. Li-Xin Wang discussed a similar problem using Gaussian membership function and Stone-Weierstrass Theorem. He established that fuzzy systems, with product inference, centroid defuzzification and Gaussian functions are capable of approximating any real continuous function on a compact set to arbitrary accuracy. In this paper we study a similar approximation problem by using exponential membership functions

  20. Hardwood log supply: a broader perspective

    Science.gov (United States)

    Iris Montague; Adri Andersch; Jan Wiedenbeck; Urs. Buehlmann

    2015-01-01

    At regional and state meetings we talk with others in our business about the problems we face: log exports, log quality, log markets, logger shortages, cash flow problems, the weather. These are familiar talking points and real and persistent problems. But what is the relative importance of these problems for log procurement in different regions of...

  1. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  2. A method of estimating log weights.

    Science.gov (United States)

    Charles N. Mann; Hilton H. Lysons

    1972-01-01

    This paper presents a practical method of estimating the weights of logs before they are yarded. Knowledge of log weights is required to achieve optimum loading of modern yarding equipment. Truckloads of logs are weighed and measured to obtain a local density index (pounds per cubic foot) for a species of logs. The density index is then used to estimate the weights of...

  3. Nondestructive evaluation for sorting red maple logs

    Science.gov (United States)

    Xiping Wang; Robert J. Ross; David W. Green; Karl Englund; Michael Wolcott

    2000-01-01

    Existing log grading procedures in the United States make only visual assessments of log quality. These procedures do not incorporate estimates of the modulus of elasticity (MOE) of logs. It is questionable whether the visual grading procedures currently used for logs adequately assess the potential quality of structural products manufactured from them, especially...

  4. Nuclear well logging in hydrology

    International Nuclear Information System (INIS)

    1971-01-01

    The optimum development of regional and local groundwater resources requires a quantitative evaluation of its aquifers and aquicludes, and of the physical and chemical properties relevant to the recharge to and withdrawal of water from them. If an understanding of the groundwater regime is to be obtained, geological observations at outcrop must be augmented by subsurface measurements of the strata and the waters they contain. Measurements of many hydrological and geological parameters can be made in situ by nuclear geophysical well-logging methods. Very simply, well logging consists of lowering a measuring probe into a well and making a continuous record of the variations of a particular parameter with depth. In most circumstances, repetition of the measurements under differing hydrodynamic conditions results in a better definition of the flow regime in the aquifer. Nuclear well-logging techniques have for some years been capable of solving a number of the sub-surface measurement problems faced by hydrogeologists. However, the present usage of these methods varies from country to country and the literature concerning applications is scattered in the professional journals of several disciplines. The objective of this report is to include in a single reference volume descriptions of the physical principles of nuclear logging methods, their applications to hydrogeological problems and their limitations on a level suitable for the practising hydrologists with a limited knowledge of nuclear physics. The Working Group responsible for compiling the report recommended that it should cover a broad spectrum of hydrogeological investigations and problems. For example, it saw no valid reason to distinguish for the purposes of the report between well-logging applications for water-supply purposes and for water-flooding studies in the petroleum industry. Neutron measurements made for soil-moisture determinations in the unsaturated zone have been specifically omitted, however, as

  5. Geometric approximation algorithms

    CERN Document Server

    Har-Peled, Sariel

    2011-01-01

    Exact algorithms for dealing with geometric objects are complicated, hard to implement in practice, and slow. Over the last 20 years a theory of geometric approximation algorithms has emerged. These algorithms tend to be simple, fast, and more robust than their exact counterparts. This book is the first to cover geometric approximation algorithms in detail. In addition, more traditional computational geometry techniques that are widely used in developing such algorithms, like sampling, linear programming, etc., are also surveyed. Other topics covered include approximate nearest-neighbor search, shape approximation, coresets, dimension reduction, and embeddings. The topics covered are relatively independent and are supplemented by exercises. Close to 200 color figures are included in the text to illustrate proofs and ideas.

  6. INTOR cost approximation

    International Nuclear Information System (INIS)

    Knobloch, A.F.

    1980-01-01

    A simplified cost approximation for INTOR parameter sets in a narrow parameter range is shown. Plausible constraints permit the evaluation of the consequences of parameter variations on overall cost. (orig.) [de

  7. Approximation and Computation

    CERN Document Server

    Gautschi, Walter; Rassias, Themistocles M

    2011-01-01

    Approximation theory and numerical analysis are central to the creation of accurate computer simulations and mathematical models. Research in these areas can influence the computational techniques used in a variety of mathematical and computational sciences. This collection of contributed chapters, dedicated to renowned mathematician Gradimir V. Milovanovia, represent the recent work of experts in the fields of approximation theory and numerical analysis. These invited contributions describe new trends in these important areas of research including theoretic developments, new computational alg

  8. Approximate kernel competitive learning.

    Science.gov (United States)

    Wu, Jian-Sheng; Zheng, Wei-Shi; Lai, Jian-Huang

    2015-03-01

    Kernel competitive learning has been successfully used to achieve robust clustering. However, kernel competitive learning (KCL) is not scalable for large scale data processing, because (1) it has to calculate and store the full kernel matrix that is too large to be calculated and kept in the memory and (2) it cannot be computed in parallel. In this paper we develop a framework of approximate kernel competitive learning for processing large scale dataset. The proposed framework consists of two parts. First, it derives an approximate kernel competitive learning (AKCL), which learns kernel competitive learning in a subspace via sampling. We provide solid theoretical analysis on why the proposed approximation modelling would work for kernel competitive learning, and furthermore, we show that the computational complexity of AKCL is largely reduced. Second, we propose a pseudo-parallelled approximate kernel competitive learning (PAKCL) based on a set-based kernel competitive learning strategy, which overcomes the obstacle of using parallel programming in kernel competitive learning and significantly accelerates the approximate kernel competitive learning for large scale clustering. The empirical evaluation on publicly available datasets shows that the proposed AKCL and PAKCL can perform comparably as KCL, with a large reduction on computational cost. Also, the proposed methods achieve more effective clustering performance in terms of clustering precision against related approximate clustering approaches. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Summing threshold logs in a parton shower

    International Nuclear Information System (INIS)

    Nagy, Zoltan; Soper, Davison E.

    2016-05-01

    When parton distributions are falling steeply as the momentum fractions of the partons increases, there are effects that occur at each order in α s that combine to affect hard scattering cross sections and need to be summed. We show how to accomplish this in a leading approximation in the context of a parton shower Monte Carlo event generator.

  10. Summing threshold logs in a parton shower

    Energy Technology Data Exchange (ETDEWEB)

    Nagy, Zoltán [DESY,Notkestrasse 85, 22607 Hamburg (Germany); Soper, Davison E. [Institute of Theoretical Science, University of Oregon,Eugene, OR 97403-5203 (United States)

    2016-10-05

    When parton distributions are falling steeply as the momentum fractions of the partons increases, there are effects that occur at each order in α{sub s} that combine to affect hard scattering cross sections and need to be summed. We show how to accomplish this in a leading approximation in the context of a parton shower Monte Carlo event generator.

  11. Neutron die-away well logging

    International Nuclear Information System (INIS)

    Jacobson, L.A.

    1976-01-01

    Neutron die-away well logging is extensively used for the location and monitoring of hydrocarbon zones in cased wells. Casing prohibits the use of conventional open-hole electrical resistivity methods. Through an appropriate interpretation of the measured capture cross-section, it is possible to determine the fractional hydrocarbon content of the rock pore volume, provided that the interstitial water is moderately saline (Σ/sub w/ greater than or equal to .035 cm -1 ). Special sealed D-T accelerator tubes and high voltage supplies have been developed for this purpose. They must fit into a 25 mm design circle and operate at 175 0 C, producing approximately 10 8 neutron/sec average in repetitive bursts. In the Schlumberger method an electronic servo-system adjusts burst and measure-gate timing to minimize statistical uncertainty regardless of die-away time

  12. Consumption of lead-shot cervid meat and blood lead concentrations in a group of adult Norwegians.

    Science.gov (United States)

    Meltzer, H M; Dahl, H; Brantsæter, A L; Birgisdottir, B E; Knutsen, H K; Bernhoft, A; Oftedal, B; Lande, U S; Alexander, J; Haugen, M; Ydersbond, T A

    2013-11-01

    Several recent investigations have reported high concentrations of lead in samples of minced cervid meat. This paper describes findings from a Norwegian study performed in 2012 among 147 adults with a wide range of cervid game consumption. The main aim was to assess whether high consumption of lead-shot cervid meat is associated with increased concentration of lead in blood. A second aim was to investigate to what extent factors apart from game consumption explain observed variability in blood lead levels. Median (5 and 95 percentile) blood concentration of lead was 16.6 µg/L (7.5 and 39 µg/L). An optimal multivariate linear regression model for log-transformed blood lead indicated that cervid game meat consumption once a month or more was associated with approximately 31% increase in blood lead concentrations. The increase seemed to be mostly associated with consumption of minced cervid meat, particularly purchased minced meat. However, many participants with high and long-lasting game meat intake had low blood lead concentrations. Cervid meat together with number of bullet shots per year, years with game consumption, self-assembly of bullets, wine consumption and smoking jointly accounted for approximately 25% of the variation in blood lead concentrations, while age and sex accounted for 27% of the variance. Blood lead concentrations increased approximately 18% per decade of age, and men had on average 30% higher blood lead concentrations than women. Hunters who assembled their own ammunition had 52% higher blood lead concentrations than persons not making ammunition. In conjunction with minced cervid meat, wine intake was significantly associated with increased blood lead. Our results indicate that hunting practices such as use of lead-based ammunition, self-assembling of lead containing bullets and inclusion of lead-contaminated meat for mincing to a large extent determine the exposure to lead from cervid game consumption. © 2013 Elsevier Inc. All rights

  13. Uranium logging in earth formations

    International Nuclear Information System (INIS)

    Givens, W.W.

    1979-01-01

    A technique is provided for assaying the formations surrounding a borehole for uranium. A borehole logging tool cyclically irradiates the formations with neutrons and responds to neutron fluxes produced during the period of time that prompt neutrons are being produced by the neutron fission of uranium in the formations. A borehole calibration tool employs a steady-state (continuous output) neutron source, firstly, to produce a response to neutron fluxes in models having known concentrations of uranium and, secondly, to to produce a response to neutron fluxes in the formations surrounding the borehole. The neutron flux responses of the borehole calibration tool in both the model and the formations surrounding the borehole are utilized to correct the neutron flux response of the borehole logging tool for the effects of epithermal/thermal neutron moderation, scattering, and absorption within the borehole itself

  14. Logística empresarial

    OpenAIRE

    Feres Sahid

    1987-01-01

    RESUMEN El concepto logístico, se pudo ver reflejado con exactitud desde el punto de vista etimológico e histórico a través de la revista de la E.A.N; ya que  tiene cierto carácter militar que lo hace característico a la gestión empresarial y de esto se formula un debate definitivo de este concepto.

  15. Chemical logging of geothermal wells

    Science.gov (United States)

    Allen, C.A.; McAtee, R.E.

    The presence of geothermal aquifers can be detected while drilling in geothermal formations by maintaining a chemical log of the ratio of the concentrations of calcium to carbonate and bicarbonate ions in the return drilling fluid. A continuous increase in the ratio of the concentrations of calcium to carbonate and bicarbonate ions is indicative of the existence of a warm or hot geothermal aquifer at some increased depth.

  16. Audit Log for Forensic Photography

    Science.gov (United States)

    Neville, Timothy; Sorell, Matthew

    We propose an architecture for an audit log system for forensic photography, which ensures that the chain of evidence of a photograph taken by a photographer at a crime scene is maintained from the point of image capture to its end application at trial. The requirements for such a system are specified and the results of experiments are presented which demonstrate the feasibility of the proposed approach.

  17. Logística empresarial

    Directory of Open Access Journals (Sweden)

    Feres Sahid

    1987-04-01

    Full Text Available RESUMEN El concepto logístico, se pudo ver reflejado con exactitud desde el punto de vista etimológico e histórico a través de la revista de la E.A.N; ya que  tiene cierto carácter militar que lo hace característico a la gestión empresarial y de esto se formula un debate definitivo de este concepto.

  18. Neutron capture in borehole logging

    International Nuclear Information System (INIS)

    Randall, R.R.

    1981-01-01

    The use is described of a pulsed source of fast neutrons and a radiation detector to measure the thermal neutron population decay rate in a well logging instrument. The macroscopic neutron absorption cross-section is calculated by taking the natural logarithm of the ratio of the detected radiation counts occurring within two measurement intervals of fixed duration and starting at a fixed time after a neutron burst. (U.K.)

  19. Borehole logging in uranium exploration

    International Nuclear Information System (INIS)

    Kulkarni, N.H.

    1992-01-01

    The ultimate objective of exploration by drilling as far as Atomic Minerals Division is concerned is to locate the ore zone in the subsurface, draw samples and analyze them for their metal content. The presence of the ore zone is also indicated by gamma-ray logging of the borehole. A gamma-ray detector is lowered in the borehole and precise depth and grade of the ore zone is established. This helps the geologist in correlating the ore horizon with the surface outcrop or the ore zone intercepted in adjoining boreholes and in deciding about further drilling and location of boreholes. Most commonly, total gamma measurements are made although some units capable of measuring the gamma-ray spectrum are also in use. It is possible to know if the mineralization is due to uranium without waiting for the laboratory results. The present write up gives a brief account of the principles, equipment and methods of borehole gamma-ray logging including density and self-potential logging. (author). 8 refs., 5 figs

  20. On Covering Approximation Subspaces

    Directory of Open Access Journals (Sweden)

    Xun Ge

    2009-06-01

    Full Text Available Let (U';C' be a subspace of a covering approximation space (U;C and X⊂U'. In this paper, we show that and B'(X⊂B(X∩U'. Also, iff (U;C has Property Multiplication. Furthermore, some connections between outer (resp. inner definable subsets in (U;C and outer (resp. inner definable subsets in (U';C' are established. These results answer a question on covering approximation subspace posed by J. Li, and are helpful to obtain further applications of Pawlak rough set theory in pattern recognition and artificial intelligence.

  1. Uniform analytic approximation of Wigner rotation matrices

    Science.gov (United States)

    Hoffmann, Scott E.

    2018-02-01

    We derive the leading asymptotic approximation, for low angle θ, of the Wigner rotation matrix elements, dm1m2 j(θ ) , uniform in j, m1, and m2. The result is in terms of a Bessel function of integer order. We numerically investigate the error for a variety of cases and find that the approximation can be useful over a significant range of angles. This approximation has application in the partial wave analysis of wavepacket scattering.

  2. Reducing Monte Carlo error in the Bayesian estimation of risk ratios using log-binomial regression models.

    Science.gov (United States)

    Salmerón, Diego; Cano, Juan A; Chirlaque, María D

    2015-08-30

    In cohort studies, binary outcomes are very often analyzed by logistic regression. However, it is well known that when the goal is to estimate a risk ratio, the logistic regression is inappropriate if the outcome is common. In these cases, a log-binomial regression model is preferable. On the other hand, the estimation of the regression coefficients of the log-binomial model is difficult owing to the constraints that must be imposed on these coefficients. Bayesian methods allow a straightforward approach for log-binomial regression models and produce smaller mean squared errors in the estimation of risk ratios than the frequentist methods, and the posterior inferences can be obtained using the software WinBUGS. However, Markov chain Monte Carlo methods implemented in WinBUGS can lead to large Monte Carlo errors in the approximations to the posterior inferences because they produce correlated simulations, and the accuracy of the approximations are inversely related to this correlation. To reduce correlation and to improve accuracy, we propose a reparameterization based on a Poisson model and a sampling algorithm coded in R. Copyright © 2015 John Wiley & Sons, Ltd.

  3. Quirks of Stirling's Approximation

    Science.gov (United States)

    Macrae, Roderick M.; Allgeier, Benjamin M.

    2013-01-01

    Stirling's approximation to ln "n"! is typically introduced to physical chemistry students as a step in the derivation of the statistical expression for the entropy. However, naive application of this approximation leads to incorrect conclusions. In this article, the problem is first illustrated using a familiar "toy…

  4. On Convex Quadratic Approximation

    NARCIS (Netherlands)

    den Hertog, D.; de Klerk, E.; Roos, J.

    2000-01-01

    In this paper we prove the counterintuitive result that the quadratic least squares approximation of a multivariate convex function in a finite set of points is not necessarily convex, even though it is convex for a univariate convex function. This result has many consequences both for the field of

  5. Prestack wavefield approximations

    KAUST Repository

    Alkhalifah, Tariq

    2013-01-01

    The double-square-root (DSR) relation offers a platform to perform prestack imaging using an extended single wavefield that honors the geometrical configuration between sources, receivers, and the image point, or in other words, prestack wavefields. Extrapolating such wavefields, nevertheless, suffers from limitations. Chief among them is the singularity associated with horizontally propagating waves. I have devised highly accurate approximations free of such singularities which are highly accurate. Specifically, I use Padé expansions with denominators given by a power series that is an order lower than that of the numerator, and thus, introduce a free variable to balance the series order and normalize the singularity. For the higher-order Padé approximation, the errors are negligible. Additional simplifications, like recasting the DSR formula as a function of scattering angle, allow for a singularity free form that is useful for constant-angle-gather imaging. A dynamic form of this DSR formula can be supported by kinematic evaluations of the scattering angle to provide efficient prestack wavefield construction. Applying a similar approximation to the dip angle yields an efficient 1D wave equation with the scattering and dip angles extracted from, for example, DSR ray tracing. Application to the complex Marmousi data set demonstrates that these approximations, although they may provide less than optimal results, allow for efficient and flexible implementations. © 2013 Society of Exploration Geophysicists.

  6. Approximating The DCM

    DEFF Research Database (Denmark)

    Madsen, Rasmus Elsborg

    2005-01-01

    The Dirichlet compound multinomial (DCM), which has recently been shown to be well suited for modeling for word burstiness in documents, is here investigated. A number of conceptual explanations that account for these recent results, are provided. An exponential family approximation of the DCM...

  7. Prestack wavefield approximations

    KAUST Repository

    Alkhalifah, Tariq

    2013-09-01

    The double-square-root (DSR) relation offers a platform to perform prestack imaging using an extended single wavefield that honors the geometrical configuration between sources, receivers, and the image point, or in other words, prestack wavefields. Extrapolating such wavefields, nevertheless, suffers from limitations. Chief among them is the singularity associated with horizontally propagating waves. I have devised highly accurate approximations free of such singularities which are highly accurate. Specifically, I use Padé expansions with denominators given by a power series that is an order lower than that of the numerator, and thus, introduce a free variable to balance the series order and normalize the singularity. For the higher-order Padé approximation, the errors are negligible. Additional simplifications, like recasting the DSR formula as a function of scattering angle, allow for a singularity free form that is useful for constant-angle-gather imaging. A dynamic form of this DSR formula can be supported by kinematic evaluations of the scattering angle to provide efficient prestack wavefield construction. Applying a similar approximation to the dip angle yields an efficient 1D wave equation with the scattering and dip angles extracted from, for example, DSR ray tracing. Application to the complex Marmousi data set demonstrates that these approximations, although they may provide less than optimal results, allow for efficient and flexible implementations. © 2013 Society of Exploration Geophysicists.

  8. Dynamic Planar Convex Hull with Optimal Query Time and O(log n · log log n ) Update Time

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Jakob, Riko

    2000-01-01

    The dynamic maintenance of the convex hull of a set of points in the plane is one of the most important problems in computational geometry. We present a data structure supporting point insertions in amortized O(log n · log log log n) time, point deletions in amortized O(log n · log log n) time......, and various queries about the convex hull in optimal O(log n) worst-case time. The data structure requires O(n) space. Applications of the new dynamic convex hull data structure are improved deterministic algorithms for the k-level problem and the red-blue segment intersection problem where all red and all...

  9. Analytical approximation of neutron physics data

    International Nuclear Information System (INIS)

    Badikov, S.A.; Vinogradov, V.A.; Gaj, E.V.; Rabotnov, N.S.

    1984-01-01

    The method for experimental neutron-physical data analytical approximation by rational functions based on the Pade approximation is suggested. It is shown that the existence of the Pade approximation specific properties in polar zones is an extremely favourable analytical property essentially extending the convergence range and increasing its rate as compared with polynomial approximation. The Pade approximation is the particularly natural instrument for resonance curve processing as the resonances conform to the complex poles of the approximant. But even in a general case analytical representation of the data in this form is convenient and compact. Thus representation of the data on the neutron threshold reaction cross sections (BOSPOR constant library) in the form of rational functions lead to approximately twenty fold reduction of the storaged numerical information as compared with the by-point calculation at the same accWracy

  10. The Higgs transverse momentum spectrum with finite quark masses beyond leading order

    CERN Document Server

    Caola, Fabrizio; Marzani, Simone; Muselli, Claudio; Vita, Gherardo

    2016-01-01

    We apply the leading-log high-energy resummation technique recently derived by some of us to the transverse momentum (pt) distribution for production of a Higgs boson in gluon fusion. We use our results to obtain information on mass-dependent corrections to this observable, which is only known at leading order when exact mass dependence is included. In the low pt region we discuss the all-order exponentiation of collinear bottom mass logarithms. In the high pt region we show that the infinite top mass approximation loses accuracy as a power of pt, while the accuracy of the high-energy approximation is approximately constant as pt grows. We argue that a good approximation to the NLO result for pt >~200 GeV can be obtained by combining the full LO result with a K-factor computed using the high-energy approximation.

  11. Prestack traveltime approximations

    KAUST Repository

    Alkhalifah, Tariq Ali

    2011-01-01

    Most prestack traveltime relations we tend work with are based on homogeneous (or semi-homogenous, possibly effective) media approximations. This includes the multi-focusing or double square-root (DSR) and the common reflection stack (CRS) equations. Using the DSR equation, I analyze the associated eikonal form in the general source-receiver domain. Like its wave-equation counterpart, it suffers from a critical singularity for horizontally traveling waves. As a result, I derive expansion based solutions of this eikonal based on polynomial expansions in terms of the reflection and dip angles in a generally inhomogenous background medium. These approximate solutions are free of singularities and can be used to estimate travetimes for small to moderate offsets (or reflection angles) in a generally inhomogeneous medium. A Marmousi example demonstrates the usefulness of the approach. © 2011 Society of Exploration Geophysicists.

  12. Topology, calculus and approximation

    CERN Document Server

    Komornik, Vilmos

    2017-01-01

    Presenting basic results of topology, calculus of several variables, and approximation theory which are rarely treated in a single volume, this textbook includes several beautiful, but almost forgotten, classical theorems of Descartes, Erdős, Fejér, Stieltjes, and Turán. The exposition style of Topology, Calculus and Approximation follows the Hungarian mathematical tradition of Paul Erdős and others. In the first part, the classical results of Alexandroff, Cantor, Hausdorff, Helly, Peano, Radon, Tietze and Urysohn illustrate the theories of metric, topological and normed spaces. Following this, the general framework of normed spaces and Carathéodory's definition of the derivative are shown to simplify the statement and proof of various theorems in calculus and ordinary differential equations. The third and final part is devoted to interpolation, orthogonal polynomials, numerical integration, asymptotic expansions and the numerical solution of algebraic and differential equations. Students of both pure an...

  13. Importance of well logging measurements in the design of underground railway tunnels

    International Nuclear Information System (INIS)

    Kiss, E.Z.; Szlaboczky, P.

    1981-01-01

    The paper shows how logs can be used in the construction of underground railway tunnels in terciary sediments. Even standard well logging techniques (electric conductivity, gamma logging) can provide important additional information on the wells if conclusions concerning construction technology are gained from the logs. In the course of continuous research work the application of well logs renders an essential help if the measurements give in-situ information on absolute values of the well sections by revealing the various geological formations based on the distribution of characteristic parameters. Well logging increases the resolving power of the mechanical method of layer differentiation. Beside the usual geological interpretation of logs the zones of shifting rocks, hard and friable formations as well as intercalations leading to problems in construction technology can be pointed out. (author)

  14. Approximate Bayesian recursive estimation

    Czech Academy of Sciences Publication Activity Database

    Kárný, Miroslav

    2014-01-01

    Roč. 285, č. 1 (2014), s. 100-111 ISSN 0020-0255 R&D Projects: GA ČR GA13-13502S Institutional support: RVO:67985556 Keywords : Approximate parameter estimation * Bayesian recursive estimation * Kullback–Leibler divergence * Forgetting Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 4.038, year: 2014 http://library.utia.cas.cz/separaty/2014/AS/karny-0425539.pdf

  15. Approximating Preemptive Stochastic Scheduling

    OpenAIRE

    Megow Nicole; Vredeveld Tjark

    2009-01-01

    We present constant approximative policies for preemptive stochastic scheduling. We derive policies with a guaranteed performance ratio of 2 for scheduling jobs with release dates on identical parallel machines subject to minimizing the sum of weighted completion times. Our policies as well as their analysis apply also to the recently introduced more general model of stochastic online scheduling. The performance guarantee we give matches the best result known for the corresponding determinist...

  16. Optimization and approximation

    CERN Document Server

    Pedregal, Pablo

    2017-01-01

    This book provides a basic, initial resource, introducing science and engineering students to the field of optimization. It covers three main areas: mathematical programming, calculus of variations and optimal control, highlighting the ideas and concepts and offering insights into the importance of optimality conditions in each area. It also systematically presents affordable approximation methods. Exercises at various levels have been included to support the learning process.

  17. Data Mining of Network Logs

    Science.gov (United States)

    Collazo, Carlimar

    2011-01-01

    The statement of purpose is to analyze network monitoring logs to support the computer incident response team. Specifically, gain a clear understanding of the Uniform Resource Locator (URL) and its structure, and provide a way to breakdown a URL based on protocol, host name domain name, path, and other attributes. Finally, provide a method to perform data reduction by identifying the different types of advertisements shown on a webpage for incident data analysis. The procedures used for analysis and data reduction will be a computer program which would analyze the URL and identify and advertisement links from the actual content links.

  18. Neutron borehole logging correction technique

    International Nuclear Information System (INIS)

    Goldman, L.H.

    1978-01-01

    In accordance with an illustrative embodiment of the present invention, a method and apparatus is disclosed for logging earth formations traversed by a borehole in which an earth formation is irradiated with neutrons and gamma radiation produced thereby in the formation and in the borehole is detected. A sleeve or shield for capturing neutrons from the borehole and producing gamma radiation characteristic of that capture is provided to give an indication of the contribution of borehole capture events to the total detected gamma radiation. It is then possible to correct from those borehole effects the total detected gamma radiation and any earth formation parameters determined therefrom

  19. Benchmark neutron porosity log calculations

    International Nuclear Information System (INIS)

    Little, R.C.; Michael, M.; Verghese, K.; Gardner, R.P.

    1989-01-01

    Calculations have been made for a benchmark neutron porosity log problem with the general purpose Monte Carlo code MCNP and the specific purpose Monte Carlo code McDNL. For accuracy and timing comparison purposes the CRAY XMP and MicroVax II computers have been used with these codes. The CRAY has been used for an analog version of the MCNP code while the MicroVax II has been used for the optimized variance reduction versions of both codes. Results indicate that the two codes give the same results within calculated standard deviations. Comparisons are given and discussed for accuracy (precision) and computation times for the two codes

  20. 29 CFR 1918.88 - Log operations.

    Science.gov (United States)

    2010-07-01

    ...) SAFETY AND HEALTH REGULATIONS FOR LONGSHORING Handling Cargo § 1918.88 Log operations. (a) Working in..., the employer shall ensure that employees remain clear of areas where logs being dumped could strike...

  1. Artificial intelligence approach to interwell log correlation

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Jong-Se [Korea Maritime University, Pusan(Korea); Kang, Joo Myung [Seoul National University, Seoul(Korea); Kim, Jung Whan [Korea National Oil Corp., Anyang(Korea)

    2000-04-30

    This paper describes a new approach to automated interwell log correlation using artificial intelligence and principal component analysis. The approach to correlate wire line logging data is on the basis of a large set of subjective rules that are intended to represent human logical processes. The data processed are mainly the qualitative information such as the characteristics of the shapes extracted along log traces. The apparent geologic zones are identified by pattern recognition for the specific characteristics of log trace collected as a set of objects by object oriented programming. The correlation of zones between wells is made by rule-based inference program. The reliable correlation can be established from the first principal component logs derived from both the important information around well bore and the largest common part of variances of all available well log data. Correlation with field log data shows that this approach can make interwell log correlation more reliable and accurate. (author). 6 refs., 7 figs.

  2. Face logging in Copenhagen Limestone, Denmark

    DEFF Research Database (Denmark)

    Jakobsen, Lisa; Foged, Niels Nielsen; Erichsen, Lars

    2015-01-01

    tunnel in Copenhagen more than 2.5 km face logs were made in 467 locations at underground stations, shafts, caverns and along bored tunnels. Over 160 geotechnical boreholes, many with geophysical logging were executed prior to construction works. The bedrock consists of Paleogene "Copenhagen limestone......The requirement for excavation support can be assessed from face logging. Face logs can also improve our knowledge of lithological and structural conditions within bedrock and supplement information from boreholes and geophysical logs. During the construction of 8 km metro tunnel and 4 km heating....... The induration degrees recorded in face logs and boreholes are compared and correlated. Distinct geophysical log markers are used to divide the limestone into three units. These marker horizons are correlated between face logs and geotechnical boreholes. A 3D model of the strength variations recorded within...

  3. Tucker Wireline Open Hole Wireline Logging; FINAL

    International Nuclear Information System (INIS)

    Milliken, M.

    2002-01-01

    The Tucker Wireline unit ran a suite of open hole logs right behind the RMOTC logging contractor for comparison purposes. The tools included Dual Laterolog, Phased Induction, BHC Sonic, and Density-Porosity

  4. Approximate maximum parsimony and ancestral maximum likelihood.

    Science.gov (United States)

    Alon, Noga; Chor, Benny; Pardi, Fabio; Rapoport, Anat

    2010-01-01

    We explore the maximum parsimony (MP) and ancestral maximum likelihood (AML) criteria in phylogenetic tree reconstruction. Both problems are NP-hard, so we seek approximate solutions. We formulate the two problems as Steiner tree problems under appropriate distances. The gist of our approach is the succinct characterization of Steiner trees for a small number of leaves for the two distances. This enables the use of known Steiner tree approximation algorithms. The approach leads to a 16/9 approximation ratio for AML and asymptotically to a 1.55 approximation ratio for MP.

  5. Selective logging in the Brazilian Amazon.

    Science.gov (United States)

    G. P. Asner; D. E. Knapp; E. N. Broadbent; P. J. C. Oliveira; M Keller; J. N. Silva

    2005-01-01

    Amazon deforestation has been measured by remote sensing for three decades. In comparison, selective logging has been mostly invisible to satellites. We developed a large-scale, high-resolution, automated remote-sensing analysis of selective logging in the top five timber-producing states of the Brazilian Amazon. Logged areas ranged from 12,075 to 19,823 square...

  6. Linking log quality with product performance

    Science.gov (United States)

    D. W. Green; Robert Ross

    1997-01-01

    In the United States, log grading procedures use visual assessment of defects, in relation to the log scaling diameter, to estimate the yield of lumber that maybe expected from the log. This procedure was satisfactory when structural grades were based only on defect size and location. In recent years, however, structural products have increasingly been graded using a...

  7. Selective logging and its relation to deforestation

    Science.gov (United States)

    Gregory P. Asner; Michael Keller; Marco Lentini; Frank Merry; Souza Jr. Carlos

    2009-01-01

    Selective logging is a major contributor to the social, economic, and ecological dynamics of Brazilian Amazonia. Logging activities have expanded from low-volume floodplain harvests in past centuries to high-volume operations today that take about 25 million m3 of wood from the forest each year. The most common high-impact conventional and often illegal logging...

  8. Pacific Rim log trade: determinants and trends.

    Science.gov (United States)

    Donald F. Flora; Andrea L. Anderson; Wendy J. McGinnls

    1991-01-01

    Pacific Rim trade in softwood logs amounts to about $3 billion annually, of which the U.S. share is about $2 billion. Log exporting is a significant part of the forest economy in the Pacific Northwest. The 10 major Pacific Rim log-trading client and competitor countries differ widely in their roles in trade and in their policies affecting the industry.

  9. Well logging radioactive detector assembly

    International Nuclear Information System (INIS)

    Osburn, T.D.

    1992-01-01

    This patent describes a well logging instrument of the type having a radioactive logging sub having a sealed chamber and have a radioactive source for emitting radioactive energy into the well formation, the instrument having a radioactive energy detector for detecting gamma rays resulting from the emission of the radioactive energy into the well formation, and means for pressing the sub against the well of the well, an improved Dewar flask for the detector. It comprises: an inner housing formed of titanium and containing the detector; an outer housing formed of titanium, having a cylindrical side wall surrounding the inner housing and separated by a clearance which is evacuated, the outer housing being located within the sealed chamber in the sub of the instrument; a window section formed in the side wall of the outer housing adjacent the detector and on a side of the side wall closest to the wall of the well when the sub is pressed against the wall of the well; and wherein the inner housing has a cylindrical side wall that is of lesser wall thickness than the wall thickness of the side wall of the outer housing other than in the window section

  10. Cyclic approximation to stasis

    Directory of Open Access Journals (Sweden)

    Stewart D. Johnson

    2009-06-01

    Full Text Available Neighborhoods of points in $mathbb{R}^n$ where a positive linear combination of $C^1$ vector fields sum to zero contain, generically, cyclic trajectories that switch between the vector fields. Such points are called stasis points, and the approximating switching cycle can be chosen so that the timing of the switches exactly matches the positive linear weighting. In the case of two vector fields, the stasis points form one-dimensional $C^1$ manifolds containing nearby families of two-cycles. The generic case of two flows in $mathbb{R}^3$ can be diffeomorphed to a standard form with cubic curves as trajectories.

  11. The relaxation time approximation

    International Nuclear Information System (INIS)

    Gairola, R.P.; Indu, B.D.

    1991-01-01

    A plausible approximation has been made to estimate the relaxation time from a knowledge of the transition probability of phonons from one state (r vector, q vector) to other state (r' vector, q' vector), as a result of collision. The relaxation time, thus obtained, shows a strong dependence on temperature and weak dependence on the wave vector. In view of this dependence, relaxation time has been expressed in terms of a temperature Taylor's series in the first Brillouin zone. Consequently, a simple model for estimating the thermal conductivity is suggested. the calculations become much easier than the Callaway model. (author). 14 refs

  12. Polynomial approximation on polytopes

    CERN Document Server

    Totik, Vilmos

    2014-01-01

    Polynomial approximation on convex polytopes in \\mathbf{R}^d is considered in uniform and L^p-norms. For an appropriate modulus of smoothness matching direct and converse estimates are proven. In the L^p-case so called strong direct and converse results are also verified. The equivalence of the moduli of smoothness with an appropriate K-functional follows as a consequence. The results solve a problem that was left open since the mid 1980s when some of the present findings were established for special, so-called simple polytopes.

  13. Finite elements and approximation

    CERN Document Server

    Zienkiewicz, O C

    2006-01-01

    A powerful tool for the approximate solution of differential equations, the finite element is extensively used in industry and research. This book offers students of engineering and physics a comprehensive view of the principles involved, with numerous illustrative examples and exercises.Starting with continuum boundary value problems and the need for numerical discretization, the text examines finite difference methods, weighted residual methods in the context of continuous trial functions, and piecewise defined trial functions and the finite element method. Additional topics include higher o

  14. Approximate Bayesian computation.

    Directory of Open Access Journals (Sweden)

    Mikael Sunnåker

    Full Text Available Approximate Bayesian computation (ABC constitutes a class of computational methods rooted in Bayesian statistics. In all model-based statistical inference, the likelihood function is of central importance, since it expresses the probability of the observed data under a particular statistical model, and thus quantifies the support data lend to particular values of parameters and to choices among different models. For simple models, an analytical formula for the likelihood function can typically be derived. However, for more complex models, an analytical formula might be elusive or the likelihood function might be computationally very costly to evaluate. ABC methods bypass the evaluation of the likelihood function. In this way, ABC methods widen the realm of models for which statistical inference can be considered. ABC methods are mathematically well-founded, but they inevitably make assumptions and approximations whose impact needs to be carefully assessed. Furthermore, the wider application domain of ABC exacerbates the challenges of parameter estimation and model selection. ABC has rapidly gained popularity over the last years and in particular for the analysis of complex problems arising in biological sciences (e.g., in population genetics, ecology, epidemiology, and systems biology.

  15. Semi-automatic logarithmic converter of logs

    International Nuclear Information System (INIS)

    Gol'dman, Z.A.; Bondar's, V.V.

    1974-01-01

    Semi-automatic logarithmic converter of logging charts. An original semi-automatic converter was developed for use in converting BK resistance logging charts and the time interval, ΔT, of acoustic logs from a linear to a logarithmic scale with a specific ratio for subsequent combining of them with neutron-gamma logging charts in operative interpretation of logging materials by a normalization method. The converter can be used to increase productivity by giving curves different from those obtained in manual, pointwise processing. The equipment operates reliably and is simple in use. (author)

  16. Likelihood Approximation With Hierarchical Matrices For Large Spatial Datasets

    KAUST Repository

    Litvinenko, Alexander

    2017-09-03

    We use available measurements to estimate the unknown parameters (variance, smoothness parameter, and covariance length) of a covariance function by maximizing the joint Gaussian log-likelihood function. To overcome cubic complexity in the linear algebra, we approximate the discretized covariance function in the hierarchical (H-) matrix format. The H-matrix format has a log-linear computational cost and storage O(kn log n), where the rank k is a small integer and n is the number of locations. The H-matrix technique allows us to work with general covariance matrices in an efficient way, since H-matrices can approximate inhomogeneous covariance functions, with a fairly general mesh that is not necessarily axes-parallel, and neither the covariance matrix itself nor its inverse have to be sparse. We demonstrate our method with Monte Carlo simulations and an application to soil moisture data. The C, C++ codes and data are freely available.

  17. TENSOR DECOMPOSITIONS AND SPARSE LOG-LINEAR MODELS

    Science.gov (United States)

    Johndrow, James E.; Bhattacharya, Anirban; Dunson, David B.

    2017-01-01

    Contingency table analysis routinely relies on log-linear models, with latent structure analysis providing a common alternative. Latent structure models lead to a reduced rank tensor factorization of the probability mass function for multivariate categorical data, while log-linear models achieve dimensionality reduction through sparsity. Little is known about the relationship between these notions of dimensionality reduction in the two paradigms. We derive several results relating the support of a log-linear model to nonnegative ranks of the associated probability tensor. Motivated by these findings, we propose a new collapsed Tucker class of tensor decompositions, which bridge existing PARAFAC and Tucker decompositions, providing a more flexible framework for parsimoniously characterizing multivariate categorical data. Taking a Bayesian approach to inference, we illustrate empirical advantages of the new decompositions. PMID:29332971

  18. Local regularity analysis of strata heterogeneities from sonic logs

    Directory of Open Access Journals (Sweden)

    S. Gaci

    2010-09-01

    Full Text Available Borehole logs provide geological information about the rocks crossed by the wells. Several properties of rocks can be interpreted in terms of lithology, type and quantity of the fluid filling the pores and fractures.

    Here, the logs are assumed to be nonhomogeneous Brownian motions (nhBms which are generalized fractional Brownian motions (fBms indexed by depth-dependent Hurst parameters H(z. Three techniques, the local wavelet approach (LWA, the average-local wavelet approach (ALWA, and Peltier Algorithm (PA, are suggested to estimate the Hurst functions (or the regularity profiles from the logs.

    First, two synthetic sonic logs with different parameters, shaped by the successive random additions (SRA algorithm, are used to demonstrate the potential of the proposed methods. The obtained Hurst functions are close to the theoretical Hurst functions. Besides, the transitions between the modeled layers are marked by Hurst values discontinuities. It is also shown that PA leads to the best Hurst value estimations.

    Second, we investigate the multifractional property of sonic logs data recorded at two scientific deep boreholes: the pilot hole VB and the ultra deep main hole HB, drilled for the German Continental Deep Drilling Program (KTB. All the regularity profiles independently obtained for the logs provide a clear correlation with lithology, and from each regularity profile, we derive a similar segmentation in terms of lithological units. The lithological discontinuities (strata' bounds and faults contacts are located at the local extrema of the Hurst functions. Moreover, the regularity profiles are compared with the KTB estimated porosity logs, showing a significant relation between the local extrema of the Hurst functions and the fluid-filled fractures. The Hurst function may then constitute a tool to characterize underground heterogeneities.

  19. A Universal Logging System for LHCb Online

    International Nuclear Information System (INIS)

    Nikolaidis, Fotis; Brarda, Loic; Garnier, Jean-Christophe; Neufeld, Niko

    2011-01-01

    A log is recording of system's activity, aimed to help system administrator to traceback an attack, find the causes of a malfunction and generally with troubleshooting. The fact that logs are the only information an administrator may have for an incident, makes logging system a crucial part of an IT infrastructure. In large scale infrastructures, such as LHCb Online, where quite a few GB of logs are produced daily, it is impossible for a human to review all of these logs. Moreover, a great percentage of them as just n oise . That makes clear that a more automated and sophisticated approach is needed. In this paper, we present a low-cost centralized logging system which allow us to do in-depth analysis of every log.

  20. A neutron well logging system

    International Nuclear Information System (INIS)

    1980-01-01

    A pulsed neutron well logging system using a sealed off neutron generator tube is provided with a programmable digital neutron output control system. The control system monitors the target beam current and compares a function of this current with a pre-programmed control function to develop a control signal for the neutron generator. The control signal is used in a series regulator to control the average replenisher current of the neutron generator tube. The programmable digital control system of the invention also provides digital control signals as a function of time to provide ion source voltages. This arrangement may be utilized to control neutron pulses durations and repetition rates or to produce other modulated wave forms for intensity modulating the output of the neutron generator as a function of time. (Auth.)

  1. Decomposable log-linear models

    DEFF Research Database (Denmark)

    Eriksen, Poul Svante

    can be characterized by a structured set of conditional independencies between some variables given some other variables. We term the new model class decomposable log-linear models, which is illustrated to be a much richer class than decomposable graphical models.It covers a wide range of non...... The present paper considers discrete probability models with exact computational properties. In relation to contingency tables this means closed form expressions of the maksimum likelihood estimate and its distribution. The model class includes what is known as decomposable graphicalmodels, which......-hierarchical models, models with structural zeroes, models described by quasi independence and models for level merging. Also, they have a very natural interpretation as they may be formulated by a structured set of conditional independencies between two events given some other event. In relation to contingency...

  2. The random phase approximation

    International Nuclear Information System (INIS)

    Schuck, P.

    1985-01-01

    RPA is the adequate theory to describe vibrations of the nucleus of very small amplitudes. These vibrations can either be forced by an external electromagnetic field or can be eigenmodes of the nucleus. In a one dimensional analogue the potential corresponding to such eigenmodes of very small amplitude should be rather stiff otherwise the motion risks to be a large amplitude one and to enter a region where the approximation is not valid. This means that nuclei which are supposedly well described by RPA must have a very stable groundstate configuration (must e.g. be very stiff against deformation). This is usually the case for doubly magic nuclei or close to magic nuclei which are in the middle of proton and neutron shells which develop a very stable groundstate deformation; we take the deformation as an example but there are many other possible degrees of freedom as, for example, compression modes, isovector degrees of freedom, spin degrees of freedom, and many more

  3. The quasilocalized charge approximation

    International Nuclear Information System (INIS)

    Kalman, G J; Golden, K I; Donko, Z; Hartmann, P

    2005-01-01

    The quasilocalized charge approximation (QLCA) has been used for some time as a formalism for the calculation of the dielectric response and for determining the collective mode dispersion in strongly coupled Coulomb and Yukawa liquids. The approach is based on a microscopic model in which the charges are quasilocalized on a short-time scale in local potential fluctuations. We review the conceptual basis and theoretical structure of the QLC approach and together with recent results from molecular dynamics simulations that corroborate and quantify the theoretical concepts. We also summarize the major applications of the QLCA to various physical systems, combined with the corresponding results of the molecular dynamics simulations and point out the general agreement and instances of disagreement between the two

  4. Athabasca tar sand reservoir properties derived from cores and logs

    International Nuclear Information System (INIS)

    Woodhouse, R.

    1976-01-01

    Log interpretation parameters for the Athabasca Tar Sand Lease No. 24 have been determined by careful correlation with Dean and Stark core analysis data. Significant expansion of Athabasca cores occurs as overburden pressure is removed. In the more shaly sands the core analysis procedures remove adsorbed water from the clays leading to further overestimation of porosity and free water volume. Log interpretation parameters (R/sub w/ = 0.5 ohm . m and m = n = 1.5) were defined by correlation with the weight of tar as a fraction of the weight of rock solids (grain or dry weight fraction of tar). This quantity is independent of the water content of the cores, whereas porosity and the weight of tar as a fraction of the bulk weight of fluids plus solids (bulk weight fraction) are both dependent on water content. Charts are provided for the conversion of bulk weight fraction of fluids to porosity; grain weight fraction of fluids to porosity; log derived porosity and core grain weight tar to water saturation. Example results show that the core analysis grain weight fraction of tar is adequately matched by the log analyses. The log results provide a better representation of the reservoir fluid volumes than the core analysis data

  5. Summing logs: the saga continues...

    International Nuclear Information System (INIS)

    Ellis, S.D.

    1982-01-01

    The structure of perturbative Quantum Chromodynamics in kinematic regimes characterized by two large but very different mass scales is discussed. The status of the sequence of approximations employed to theoretically study these regimes is reviewed along with some discussion of the present phenomenology. Various important outstanding questions are noted. 22 references

  6. Diffusion approximation of Lévy processes with a view towards finance

    KAUST Repository

    Kiessling, Jonas; Tempone, Raul

    2011-01-01

    Let the (log-)prices of a collection of securities be given by a d-dimensional Lévy process X t having infinite activity and a smooth density. The value of a European contract with payoff g(x) maturing at T is determined by E[g(X T)]. Let X̄ T be a finite activity approximation to X T, where diffusion is introduced to approximate jumps smaller than a given truncation level ∈ > 0. The main result of this work is a derivation of an error expansion for the resulting model error, E[g(X T) - g(X̄ T)], with computable leading order term. Our estimate depends both on the choice of truncation level ∈ and the contract payoff g, and it is valid even when g is not continuous. Numerical experiments confirm that the error estimate is indeed a good approximation of the model error. Using similar techniques we indicate how to construct an adaptive truncation type approximation. Numerical experiments indicate that a substantial amount of work is to be gained from such adaptive approximation. Finally, we extend the previous model error estimates to the case of Barrier options, which have a particular path dependent structure. © de Gruyter 2011.

  7. LEADING WITH LEADING INDICATORS

    International Nuclear Information System (INIS)

    PREVETTE, S.S.

    2005-01-01

    This paper documents Fluor Hanford's use of Leading Indicators, management leadership, and statistical methodology in order to improve safe performance of work. By applying these methods, Fluor Hanford achieved a significant reduction in injury rates in 2003 and 2004, and the improvement continues today. The integration of data, leadership, and teamwork pays off with improved safety performance and credibility with the customer. The use of Statistical Process Control, Pareto Charts, and Systems Thinking and their effect on management decisions and employee involvement are discussed. Included are practical examples of choosing leading indicators. A statistically based color coded dashboard presentation system methodology is provided. These tools, management theories and methods, coupled with involved leadership and employee efforts, directly led to significant improvements in worker safety and health, and environmental protection and restoration at one of the nation's largest nuclear cleanup sites

  8. Approximate quantum Markov chains

    CERN Document Server

    Sutter, David

    2018-01-01

    This book is an introduction to quantum Markov chains and explains how this concept is connected to the question of how well a lost quantum mechanical system can be recovered from a correlated subsystem. To achieve this goal, we strengthen the data-processing inequality such that it reveals a statement about the reconstruction of lost information. The main difficulty in order to understand the behavior of quantum Markov chains arises from the fact that quantum mechanical operators do not commute in general. As a result we start by explaining two techniques of how to deal with non-commuting matrices: the spectral pinching method and complex interpolation theory. Once the reader is familiar with these techniques a novel inequality is presented that extends the celebrated Golden-Thompson inequality to arbitrarily many matrices. This inequality is the key ingredient in understanding approximate quantum Markov chains and it answers a question from matrix analysis that was open since 1973, i.e., if Lieb's triple ma...

  9. Prestack traveltime approximations

    KAUST Repository

    Alkhalifah, Tariq Ali

    2012-05-01

    Many of the explicit prestack traveltime relations used in practice are based on homogeneous (or semi-homogenous, possibly effective) media approximations. This includes the multifocusing, based on the double square-root (DSR) equation, and the common reflection stack (CRS) approaches. Using the DSR equation, I constructed the associated eikonal form in the general source-receiver domain. Like its wave-equation counterpart, it suffers from a critical singularity for horizontally traveling waves. As a result, I recasted the eikonal in terms of the reflection angle, and thus, derived expansion based solutions of this eikonal in terms of the difference between the source and receiver velocities in a generally inhomogenous background medium. The zero-order term solution, corresponding to ignoring the lateral velocity variation in estimating the prestack part, is free of singularities and can be used to estimate traveltimes for small to moderate offsets (or reflection angles) in a generally inhomogeneous medium. The higher-order terms include limitations for horizontally traveling waves, however, we can readily enforce stability constraints to avoid such singularities. In fact, another expansion over reflection angle can help us avoid these singularities by requiring the source and receiver velocities to be different. On the other hand, expansions in terms of reflection angles result in singularity free equations. For a homogenous background medium, as a test, the solutions are reasonably accurate to large reflection and dip angles. A Marmousi example demonstrated the usefulness and versatility of the formulation. © 2012 Society of Exploration Geophysicists.

  10. Geomicrobial Optical Logging Detectors (GOLD)

    Science.gov (United States)

    Bramall, N. E.; Stoker, C. R.; Price, P. B.; Coates, J. D.; Allamandola, L. J.; Mattioda, A. L.

    2008-12-01

    We will present concepts for downhole instrumentation that could be used in the Deep Underground Science and Engineering Laboratory (DUSEL). We envision optical borehole-logging instruments that could monitor bacterial concentration, mineralogy, aromatic organics, temperature and oxygen concentration, allowing for the in situ monitoring of time-dependent microbial and short-scale geologic processes and provide valuable in situ data on stratigraphy to supplement core analyses, especially where instances of missing or damaged core sections make such studies difficult. Incorporated into these instruments will be a sampling/inoculation tool to allow for the recovery and/or manipulation of particularly interesting sections of the borehole wall for further study, enabling a series of microbiological studies. The borehole tools we will develop revolve around key emerging technologies and methods, some of which are briefly described below: 1) Autofluorescence Spectroscopy: Building on past instruments, we will develop a new borehole logger that searches for microbial life and organics using fluorescence spectroscopy. Many important organic compounds (e.g. PAHs) and biomolecules (e.g. aromatic amino acids, proteins, methanogenic coenzymes) fluoresce when excited with ultraviolet and visible light. Through the careful selection of excitation wavelength(s) and temporal gating parameters, a borehole logging instrument can detect and differentiate between these different compounds and the mineral matrix in which they exist. 2) Raman Spectroscopy: Though less sensitive than fluorescence spectroscopy, Raman spectroscopy is more definitive: it can provide important mineral phase distribution/proportions and other chemical data enabling studies of mineralogy and microbe-mineral interactions (when combined with fluorescence). 3) Borehole Camera: Imaging of the borehole wall with extended information in the UV, visible, and NIR for a more informative view can provide a lot of insight

  11. California-Nevada uranium logging. Final report

    International Nuclear Information System (INIS)

    1981-04-01

    The purpose of this project was to obtain geophysical logs of industry drill holes to assess the uranium resource potential of geologic formations of interest. The work was part of the US Department of Energy's National Uranium Resource Evaluation (NURE) Program. The principal objective of the logging program was to determine radioelement grade of formations through natural gamma ray detectors. Supplementary information was obtained from resistivity (R), self-potential (SP), point resistance (RE), and neutron density (NN) logs for formation interpretation. Additional data for log interpretation was obtained from caliper logs, casing schedules, and downhole temperature. This data was obtained from well operators when available, with new logs obtained where not formerly available. This report contains a summary of the project and data obtained to date

  12. HLIBCov: Parallel Hierarchical Matrix Approximation of Large Covariance Matrices and Likelihoods with Applications in Parameter Identification

    KAUST Repository

    Litvinenko, Alexander

    2017-01-01

    matrices. Therefore covariance matrices are approximated in the hierarchical ($\\H$-) matrix format with computational cost $\\mathcal{O}(k^2n \\log^2 n/p)$ and storage $\\mathcal{O}(kn \\log n)$, where the rank $k$ is a small integer (typically $k<25$), $p

  13. Pembangkitan Data dari Distribusi Log-logistik

    Directory of Open Access Journals (Sweden)

    Aceng Komarudin Mutaqin

    2014-11-01

    Full Text Available Distribusi log-logistik merupakan salah satu distribusi yang dapat diaplikasikan untuk data mutu lingkungan. Makalah ini membahas pembangkitan data dari distribusi log-logistik mulai dari pembangunan algoritme sampai pembuatan program komputer pada perangkat lunak MATLAB. Metode pembangkitan datanya menggunakan metode inverse transform. Ada dua jenis data yang dibangkitkan, yaitu data lengkap dan data tersensor kiri. Dalam makalah ini diberikan contoh data yang dibangkitkan dari distribusi log-logistik.

  14. A Resampling-Based Stochastic Approximation Method for Analysis of Large Geostatistical Data

    KAUST Repository

    Liang, Faming

    2013-03-01

    The Gaussian geostatistical model has been widely used in modeling of spatial data. However, it is challenging to computationally implement this method because it requires the inversion of a large covariance matrix, particularly when there is a large number of observations. This article proposes a resampling-based stochastic approximation method to address this challenge. At each iteration of the proposed method, a small subsample is drawn from the full dataset, and then the current estimate of the parameters is updated accordingly under the framework of stochastic approximation. Since the proposed method makes use of only a small proportion of the data at each iteration, it avoids inverting large covariance matrices and thus is scalable to large datasets. The proposed method also leads to a general parameter estimation approach, maximum mean log-likelihood estimation, which includes the popular maximum (log)-likelihood estimation (MLE) approach as a special case and is expected to play an important role in analyzing large datasets. Under mild conditions, it is shown that the estimator resulting from the proposed method converges in probability to a set of parameter values of equivalent Gaussian probability measures, and that the estimator is asymptotically normally distributed. To the best of the authors\\' knowledge, the present study is the first one on asymptotic normality under infill asymptotics for general covariance functions. The proposed method is illustrated with large datasets, both simulated and real. Supplementary materials for this article are available online. © 2013 American Statistical Association.

  15. LogDet Rank Minimization with Application to Subspace Clustering

    Directory of Open Access Journals (Sweden)

    Zhao Kang

    2015-01-01

    Full Text Available Low-rank matrix is desired in many machine learning and computer vision problems. Most of the recent studies use the nuclear norm as a convex surrogate of the rank operator. However, all singular values are simply added together by the nuclear norm, and thus the rank may not be well approximated in practical problems. In this paper, we propose using a log-determinant (LogDet function as a smooth and closer, though nonconvex, approximation to rank for obtaining a low-rank representation in subspace clustering. Augmented Lagrange multipliers strategy is applied to iteratively optimize the LogDet-based nonconvex objective function on potentially large-scale data. By making use of the angular information of principal directions of the resultant low-rank representation, an affinity graph matrix is constructed for spectral clustering. Experimental results on motion segmentation and face clustering data demonstrate that the proposed method often outperforms state-of-the-art subspace clustering algorithms.

  16. SNG-logs at the Bagsvaerd Lake

    International Nuclear Information System (INIS)

    Korsbech, U.

    1992-11-01

    Spectral Natural Gamma-logs (SNG) were taken in old boreholes around Bagsvaerd Lake (Zealand). The purpose of this investigation was to clarify the geologic/lithologic conditions in this region and the potential risks of waste penetration into ground water. Relationship curves for thorium, uranium and potassium concentrations are given. Some special logs which can be useful for evaluating concentration variations or transition forms among various lithological layers are collected. Appendices contain technical information on the boreholes and discussion of differences between results of SNG-logging and the conventional gamma-logging. (EG)

  17. Self-similar factor approximants

    International Nuclear Information System (INIS)

    Gluzman, S.; Yukalov, V.I.; Sornette, D.

    2003-01-01

    The problem of reconstructing functions from their asymptotic expansions in powers of a small variable is addressed by deriving an improved type of approximants. The derivation is based on the self-similar approximation theory, which presents the passage from one approximant to another as the motion realized by a dynamical system with the property of group self-similarity. The derived approximants, because of their form, are called self-similar factor approximants. These complement the obtained earlier self-similar exponential approximants and self-similar root approximants. The specific feature of self-similar factor approximants is that their control functions, providing convergence of the computational algorithm, are completely defined from the accuracy-through-order conditions. These approximants contain the Pade approximants as a particular case, and in some limit they can be reduced to the self-similar exponential approximants previously introduced by two of us. It is proved that the self-similar factor approximants are able to reproduce exactly a wide class of functions, which include a variety of nonalgebraic functions. For other functions, not pertaining to this exactly reproducible class, the factor approximants provide very accurate approximations, whose accuracy surpasses significantly that of the most accurate Pade approximants. This is illustrated by a number of examples showing the generality and accuracy of the factor approximants even when conventional techniques meet serious difficulties

  18. 32 CFR 700.846 - Status of logs.

    Science.gov (United States)

    2010-07-01

    ... Officers Afloat § 700.846 Status of logs. The deck log, the engineering log, the compass record, the bearing hooks, the engineer's bell book, and any records generated by automated data logging equipment...

  19. SAR image regularization with fast approximate discrete minimization.

    Science.gov (United States)

    Denis, Loïc; Tupin, Florence; Darbon, Jérôme; Sigelle, Marc

    2009-07-01

    Synthetic aperture radar (SAR) images, like other coherent imaging modalities, suffer from speckle noise. The presence of this noise makes the automatic interpretation of images a challenging task and noise reduction is often a prerequisite for successful use of classical image processing algorithms. Numerous approaches have been proposed to filter speckle noise. Markov random field (MRF) modelization provides a convenient way to express both data fidelity constraints and desirable properties of the filtered image. In this context, total variation minimization has been extensively used to constrain the oscillations in the regularized image while preserving its edges. Speckle noise follows heavy-tailed distributions, and the MRF formulation leads to a minimization problem involving nonconvex log-likelihood terms. Such a minimization can be performed efficiently by computing minimum cuts on weighted graphs. Due to memory constraints, exact minimization, although theoretically possible, is not achievable on large images required by remote sensing applications. The computational burden of the state-of-the-art algorithm for approximate minimization (namely the alpha -expansion) is too heavy specially when considering joint regularization of several images. We show that a satisfying solution can be reached, in few iterations, by performing a graph-cut-based combinatorial exploration of large trial moves. This algorithm is applied to joint regularization of the amplitude and interferometric phase in urban area SAR images.

  20. The Approximability of Learning and Constraint Satisfaction Problems

    Science.gov (United States)

    2010-10-07

    further improved this result to NP ⊆ naPCP1,3/4+²(O(log(n)),3). Around the same time, Zwick [141] showed that naPCP1,5/8(O(log(n)),3)⊆ BPP by giving a...randomized polynomial-time 5/8-approximation algorithm for satisfiable 3CSP. Therefore unless NP⊆ BPP , the best s must be bigger than 5/8. Zwick... BPP [141]. We think that Question 5.1.2 addresses an important missing part in understanding the 3-query PCP systems. In addition, as is mentioned the

  1. A new measurement-while-drilling gamma ray log calibrator

    International Nuclear Information System (INIS)

    Meisner, J.; Brooks, A.; Wisniewski, W.

    1985-01-01

    Many of the present methods of calibration for both wireline and MWD gamma ray detectors use a point source at a fixed distance from the detector. MWD calibration errors are introduced from scattering effects, from spectral differences, from position sensitivity and form lack of cylindrical geometry. A new method has been developed at Exploration Logging INc. (EXLOG) that eliminates these errors. The method uses a wrap-around or annular calibrator, referenced to the University of Houston gamma ray API pit. The new calibrator is designed to simulate the API pit's gamma ray emission spectrum with a finite amount of natural source material in the annular shape. Because of the thickness of steel between the MWD gamma ray detector and the formation, there is theoretical necessity for spectral matching. A simple theoretical approach was used to calibrate the new calibrator. Spectral matching allows a closer approximation to wireline logs and makes it possible to estimate the relative spectral content of a formation

  2. Methods and apparatus for environmental correction of thermal neutron logs

    International Nuclear Information System (INIS)

    Preeg, W.E.; Scott, H.D.

    1983-01-01

    An on-line environmentally-corrected measurement of the thermal neutron decay time (tau) of an earth formation traversed by a borehole is provided in a two-detector, pulsed neutron logging tool, by measuring tau at each detector and combining the two tau measurements in accordance with a previously established empirical relationship of the general form: tau = tausub(F) +A(tausub(F) + tausub(N)B) + C, where tausub(F) and tausub(N) are the tau measurements at the far-spaced and near-spaced detectors, respectively, A is a correction coefficient for borehole capture cross section effects, B is a correction coefficient for neutron diffusion effects, and C is a constant related to parameters of the logging tool. Preferred numerical values of A, B and C are disclosed, and a relationship for more accurately approximating the A term to specific borehole conditions. (author)

  3. Geophysical borehole logging. Final disposal of spent fuel

    International Nuclear Information System (INIS)

    Rouhiainen, P.

    1984-01-01

    Teollisuuden Voima Oy (Industrial Power Company Ltd.) will take precautions for final disposal of spent fuel in the Finnish bedrock. The first stage of the site selection studies includes drilling of a deep borehole down to approximately 1000 meters in the year 1984. The report deals with geophysical borehole logging methods, which could be used for the studies. The aim of geophysical borehole logging methods is to descripe specially hydrogeological and structural features. Only the most essential methods are dealt with in this report. Attention is paid to the information produced with the methods, derscription of the methods, interpretation and limitations. The feasibility and possibilities for the aims are evaluated. The evaluations are based mainly on the results from Sweden, England, Canada and USA as well as experiencies gained in Finland

  4. Approximate distance oracles for planar graphs with improved query time-space tradeoff

    DEFF Research Database (Denmark)

    Wulff-Nilsen, Christian

    2016-01-01

    We consider approximate distance oracles for edge-weighted n-vertex undirected planar graphs. Given fixed ϵ > 0, we present a (1 + ϵ)-approximate distance oracle with O(n(log log n)2) space and O((loglogr?,)3) query time. This improves the previous best product of query time and space...... of the oracles of Thorup (FOCS 2001, J. ACM 2004) and Klein (SODA 2002) from O(nlogn) to O(n(loglogn)5)....

  5. Modelling research on determining shape coefficients for subdivision interpretation in γ-ray spectral logging

    International Nuclear Information System (INIS)

    Yin Wangming; She Guanjun; Tang Bin

    2011-01-01

    This paper first describes the physical meaning of the shape coefficients in the subdivision interpretation of γ-ray logging; then discusses the theory, method to determine the practical shape coefficients with logging model and defines the formula to approximately calculate the coefficients. A great deal of experimental work has been preformed with a HPGe γ-ray spectrometer and reached satisfied result which has validated the effeciency of the modelling method. (authors)

  6. Influence of borehole-eccentred tools on wireline and logging-while-drilling sonic logging measurements

    KAUST Repository

    Pardo, David; Matuszyk, Paweł Jerzy; Torres-Verdí n, Carlos; Mora Cordova, Angel; Muga, Ignacio; Calo, Victor M.

    2013-01-01

    We describe a numerical study to quantify the influence of tool-eccentricity on wireline (WL) and logging-while-drilling (LWD) sonic logging measurements. Simulations are performed with a height-polynomial-adaptive (hp) Fourier finite-element method

  7. Log canonical thresholds of smooth Fano threefolds

    International Nuclear Information System (INIS)

    Cheltsov, Ivan A; Shramov, Konstantin A

    2008-01-01

    The complex singularity exponent is a local invariant of a holomorphic function determined by the integrability of fractional powers of the function. The log canonical thresholds of effective Q-divisors on normal algebraic varieties are algebraic counterparts of complex singularity exponents. For a Fano variety, these invariants have global analogues. In the former case, it is the so-called α-invariant of Tian; in the latter case, it is the global log canonical threshold of the Fano variety, which is the infimum of log canonical thresholds of all effective Q-divisors numerically equivalent to the anticanonical divisor. An appendix to this paper contains a proof that the global log canonical threshold of a smooth Fano variety coincides with its α-invariant of Tian. The purpose of the paper is to compute the global log canonical thresholds of smooth Fano threefolds (altogether, there are 105 deformation families of such threefolds). The global log canonical thresholds are computed for every smooth threefold in 64 deformation families, and the global log canonical thresholds are computed for a general threefold in 20 deformation families. Some bounds for the global log canonical thresholds are computed for 14 deformation families. Appendix A is due to J.-P. Demailly.

  8. Aggregation of log-linear risks

    DEFF Research Database (Denmark)

    Embrechts, Paul; Hashorva, Enkeleijd; Mikosch, Thomas Valentin

    2014-01-01

    In this paper we work in the framework of a k-dimensional vector of log-linear risks. Under weak conditions on the marginal tails and the dependence structure of a vector of positive risks, we derive the asymptotic tail behaviour of the aggregated risk {and present} an application concerning log...

  9. Synthetic rope applications in Appalachian logging

    Science.gov (United States)

    Ben D. Spong; Jingxin Wang

    2008-01-01

    New ultra-high molecular weight polyethylene rope has shown good results as a replacement for wire rope in logging applications in the western United States. A single case study trial was performed in Appalachian forest conditions to assess the appropriateness of this technology for hardwood logging applications. The study focused on use of the rope in West Virginia...

  10. Palm distributions for log Gaussian Cox processes

    DEFF Research Database (Denmark)

    Coeurjolly, Jean-Francois; Møller, Jesper; Waagepetersen, Rasmus

    This paper reviews useful results related to Palm distributions of spatial point processes and provides a new result regarding the characterization of Palm distributions for the class of log Gaussian Cox processes. This result is used to study functional summary statistics for a log Gaussian Cox...

  11. LHCb Online Log Analysis and Maintenance System

    CERN Document Server

    Garnier, J-C

    2011-01-01

    History has shown, many times computer logs are the only information an administrator may have for an incident, which could be caused either by a malfunction or an attack. Due to the huge amount of logs that are produced from large-scale IT infrastructures, such as LHCb Online, critical information may be overlooked or simply be drowned in a sea of other messages. This clearly demonstrates the need for an automatic system for long-term maintenance and real time analysis of the logs. We have constructed a low cost, fault tolerant centralized logging system which is able to do in-depth analysis and cross-correlation of every log. This system is capable of handling O(10000) different log sources and numerous formats, while trying to keep the overhead as low as possible. It provides log gathering and management, Offline analysis and online analysis. We call Offline analysis the procedure of analyzing old logs for critical information, while Online analysis refer to the procedure of early alerting and reacting. ...

  12. The nuclear magnetic resonance well logging

    International Nuclear Information System (INIS)

    Zhang Yumin; Shen Huitang

    2003-01-01

    In this paper, the characteristic of the nuclear magnetic resonance logging is described at first. Then its development and its principle is presented. Compared with the nuclear magnetic resonance spectrometer, the magnet techniques is the first question that we must solve in the manufacture of the NMR well logging

  13. A semantic perspective on query log analysis

    NARCIS (Netherlands)

    Hofmann, K.; de Rijke, M.; Huurnink, B.; Meij, E.

    2009-01-01

    We present our views on the CLEF log file analysis task. We argue for a task definition that focuses on the semantic enrichment of query logs. In addition, we discuss how additional information about the context in which queries are being made could further our understanding of users’ information

  14. Utilization and cost for animal logging operations

    Science.gov (United States)

    Suraj P. Shrestha; Bobby L. Lanford

    2001-01-01

    Forest harvesting with animals is a labor-intensive operation. Due to the development of efficient machines and high volume demands from the forest products industry, mechanization of logging developed very fast, leaving behind the traditional horse and mule logging. It is expensive to use machines on smaller woodlots, which require frequent moves if mechanically...

  15. Data logging system upgrade for Indus accelerator

    International Nuclear Information System (INIS)

    Mishra, R.; Merh, B.N.; Agrawal, R.K.; Fatnani, P.; Navathe, C.P.; Pal, S.

    2012-01-01

    An accelerator has various subsystems like Magnet Power Supply, Beam Diagnostics and Vacuum etc. which are required to work in a stable manner to ensure required machine performance. Logging of system parameters at a faster rate plays a crucial role in analysing and understanding machine behaviour. Logging all the machine parameters consistently at the rate of typically more than 1 Hz has been the aim of a recent data logging system upgrade. Nearly ten thousand parameters are being logged at varying intervals of one second to one minute in Indus accelerator complex. The present logging scheme is augmented to log all these parameters at a rate equal to or more than 1 Hz. The database schema is designed according to the data type of the parameter. The data is distributed into historical table and intermediate table which comprises of recent data. Machine control applications read the parameter values from the control system and store them into the text files of finite time duration for each sub-system. The logging application of each sub-system passes these text files to database for bulk insertion. The detail design of database, logging scheme and its architecture is presented in the paper. (author)

  16. Impacts of extended working hours in logging

    Science.gov (United States)

    Dana Mitchell; Tom Gallagher

    2008-01-01

    Last year at the 2007 AIM in Minneapolis, MN, the authors presented the human factors impacts to consider when implementing extended working hours in the logging industry. In a continuation of this project, we have researched existing literature to identify possible actions that logging business owners can take to reduce the impact of extended working hours on their...

  17. Neutron logging reliability techniques and apparatus

    International Nuclear Information System (INIS)

    Johnstone, C.W.

    1978-01-01

    This invention relates in general to neutron logging of earth formations, and in particular, to novel apparatus and procedures for determining the validity, or reliability, of data derived at least in part by logging neutron characteristics of earth formations and, if desired, for affording verifiably accurate indications of such data

  18. Neutron logging reliability techniques and apparatus

    International Nuclear Information System (INIS)

    Johnstone, C.W.

    1974-01-01

    This invention relates in general to neutron logging of earth formations, and in particular, to novel apparatus and procedures for determining the validity, or reliability, of data derived at least in part by logging neutron characteristics of earth formations and, if desired, for affording verifiably accurate indications of such data. (author)

  19. Logging methods and peeling of Aspen

    Science.gov (United States)

    T. Schantz-Hansen

    1948-01-01

    The logging of forest products is influenced by many factors, including the size of the trees, density of the stand, the soundness of the trees, size of the area logged, topography and soil, weather conditions, the degree of utilization, the skill of the logger and the equipment used, the distance from market, etc. Each of these factors influences not only the method...

  20. Log Analysis Using Splunk Hadoop Connect

    Science.gov (United States)

    2017-06-01

    23 A. INPUT SELECTION ...Conversion Resource Consumption .............................................. 28 Figure 8. Distribution of Events in Years...running a logging service puts a performance tax on the system and may cause the degradation of performance. More thorough 8 logging will cause a

  1. Grading sugar pine saw logs in trees.

    Science.gov (United States)

    John W. Henley

    1972-01-01

    Small limbs and small overgrown limbs cause problems when grading saw logs in sugar pine trees. Surface characteristics and lumber recovery information for 426 logs from 64 sugar pine trees were examined. Resulting modifications in the grading specification that allow a grader to ignore small limbs and small limb indicators do not appear to decrease the performance of...

  2. International Conference Approximation Theory XV

    CERN Document Server

    Schumaker, Larry

    2017-01-01

    These proceedings are based on papers presented at the international conference Approximation Theory XV, which was held May 22–25, 2016 in San Antonio, Texas. The conference was the fifteenth in a series of meetings in Approximation Theory held at various locations in the United States, and was attended by 146 participants. The book contains longer survey papers by some of the invited speakers covering topics such as compressive sensing, isogeometric analysis, and scaling limits of polynomials and entire functions of exponential type. The book also includes papers on a variety of current topics in Approximation Theory drawn from areas such as advances in kernel approximation with applications, approximation theory and algebraic geometry, multivariate splines for applications, practical function approximation, approximation of PDEs, wavelets and framelets with applications, approximation theory in signal processing, compressive sensing, rational interpolation, spline approximation in isogeometric analysis, a...

  3. On Nash-Equilibria of Approximation-Stable Games

    Science.gov (United States)

    Awasthi, Pranjal; Balcan, Maria-Florina; Blum, Avrim; Sheffet, Or; Vempala, Santosh

    One reason for wanting to compute an (approximate) Nash equilibrium of a game is to predict how players will play. However, if the game has multiple equilibria that are far apart, or ɛ-equilibria that are far in variation distance from the true Nash equilibrium strategies, then this prediction may not be possible even in principle. Motivated by this consideration, in this paper we define the notion of games that are approximation stable, meaning that all ɛ-approximate equilibria are contained inside a small ball of radius Δ around a true equilibrium, and investigate a number of their properties. Many natural small games such as matching pennies and rock-paper-scissors are indeed approximation stable. We show furthermore there exist 2-player n-by-n approximation-stable games in which the Nash equilibrium and all approximate equilibria have support Ω(log n). On the other hand, we show all (ɛ,Δ) approximation-stable games must have an ɛ-equilibrium of support O(Δ^{2-o(1)}/ɛ2{log n}), yielding an immediate n^{O(Δ^{2-o(1)}/ɛ^2log n)}-time algorithm, improving over the bound of [11] for games satisfying this condition. We in addition give a polynomial-time algorithm for the case that Δ and ɛ are sufficiently close together. We also consider an inverse property, namely that all non-approximate equilibria are far from some true equilibrium, and give an efficient algorithm for games satisfying that condition.

  4. LBA-ECO TG-07 Trace Gas Fluxes, Undisturbed and Logged Sites, Para, Brazil: 2000-2002

    Science.gov (United States)

    M.M. Keller; R.K. Varner; J.D. Dias; H.S. Silva; P.M. Crill; Jr. de Oliveira; G.P. Asner

    2009-01-01

    Trace gas fluxes of carbon dioxide, methane, nitrous oxide, and nitric oxide were measured manually at undisturbed and logged forest sites in the Tapajos National Forest, near Santarem, Para, Brazil. Manual measurements were made approximately weekly at both the undisturbed and logged sites. Fluxes from clay and sand soils were completed at the undisturbed sites....

  5. Analysis of RIA standard curve by log-logistic and cubic log-logit models

    International Nuclear Information System (INIS)

    Yamada, Hideo; Kuroda, Akira; Yatabe, Tami; Inaba, Taeko; Chiba, Kazuo

    1981-01-01

    In order to improve goodness-of-fit in RIA standard analysis, programs for computing log-logistic and cubic log-logit were written in BASIC using personal computer P-6060 (Olivetti). Iterative least square method of Taylor series was applied for non-linear estimation of logistic and log-logistic. Hear ''log-logistic'' represents Y = (a - d)/(1 + (log(X)/c)sup(b)) + d As weights either 1, 1/var(Y) or 1/σ 2 were used in logistic or log-logistic and either Y 2 (1 - Y) 2 , Y 2 (1 - Y) 2 /var(Y), or Y 2 (1 - Y) 2 /σ 2 were used in quadratic or cubic log-logit. The term var(Y) represents squares of pure error and σ 2 represents estimated variance calculated using a following equation log(σ 2 + 1) = log(A) + J log(y). As indicators for goodness-of-fit, MSL/S sub(e)sup(2), CMD% and WRV (see text) were used. Better regression was obtained in case of alpha-fetoprotein by log-logistic than by logistic. Cortisol standard curve was much better fitted with cubic log-logit than quadratic log-logit. Predicted precision of AFP standard curve was below 5% in log-logistic in stead of 8% in logistic analysis. Predicted precision obtained using cubic log-logit was about five times lower than that with quadratic log-logit. Importance of selecting good models in RIA data processing was stressed in conjunction with intrinsic precision of radioimmunoassay system indicated by predicted precision. (author)

  6. Model wells for nuclear well logging

    International Nuclear Information System (INIS)

    Tittle, C.W.

    1989-01-01

    Considerations needed in the design and construction of model wells for nuclear log calibration are covered, with special attention to neutron porosity logging and total γ-ray logging. Pulsed neutron decay-time and spectral γ-ray logging are discussed briefly. The American Petroleum Institute calibration facility for nuclear logs is a good starting point for similar or expanded facilities. A few of its shortcomings are mentioned; they are minor. The problem of fluid saturation is emphasized. Attention is given to models made of consolidated rock and those containing unconsolidated material such as Ottawa sand. Needed precautions are listed. A similarity method is presented for estimating the porosity index of formations that are not fully saturated. (author)

  7. Processing of gamma-ray spectrometric logs

    International Nuclear Information System (INIS)

    Umiastowski, K.; Dumesnil, P.

    1984-10-01

    CEA (Commissariat a l'Energie Atomique) has developped a gamma-ray spectrometric tool, containing an analog-to-digital converter. This new tool permits to perform very precise uranium logs (natural gamma-ray spectrometry), neutron activation logs and litho-density logs (gamma-gamma spectrometric logs). Specific processing methods were developped to treate the particular problems of down-hole gamma-ray spectrometry. Extraction of the characteristic gamma-ray peak, even if they are superposed on the background radiation of very high intensity, is possible. This processing methode enables also to obtain geological informations contained in the continuous background of the spectrum. Computer programs are written in high level language for SIRIUS (VICTOR) and APOLLO computers. Exemples of uranium and neutron activation logs treatment are presented [fr

  8. LOG2MARKUP: State module to transform a Stata text log into a markup document

    DEFF Research Database (Denmark)

    2016-01-01

    log2markup extract parts of the text version from the Stata log command and transform the logfile into a markup based document with the same name, but with extension markup (or otherwise specified in option extension) instead of log. The author usually uses markdown for writing documents. However...

  9. Processing well logging data, for example for verification and calibration of well logs

    International Nuclear Information System (INIS)

    Suau, J.; Boutemy, Y.

    1981-01-01

    A method is described of machine processing well logging data derived from borehole exploring devices which investigate earth formations traversed by boreholes. The method can be used for verifying and recalibrating logs, reconstructing missing logs and combining the data to form a statistical model of the traversed earth formations. (U.K.)

  10. Hierarchical low-rank approximation for high dimensional approximation

    KAUST Repository

    Nouy, Anthony

    2016-01-01

    Tensor methods are among the most prominent tools for the numerical solution of high-dimensional problems where functions of multiple variables have to be approximated. Such high-dimensional approximation problems naturally arise in stochastic analysis and uncertainty quantification. In many practical situations, the approximation of high-dimensional functions is made computationally tractable by using rank-structured approximations. In this talk, we present algorithms for the approximation in hierarchical tensor format using statistical methods. Sparse representations in a given tensor format are obtained with adaptive or convex relaxation methods, with a selection of parameters using crossvalidation methods.

  11. Hierarchical low-rank approximation for high dimensional approximation

    KAUST Repository

    Nouy, Anthony

    2016-01-07

    Tensor methods are among the most prominent tools for the numerical solution of high-dimensional problems where functions of multiple variables have to be approximated. Such high-dimensional approximation problems naturally arise in stochastic analysis and uncertainty quantification. In many practical situations, the approximation of high-dimensional functions is made computationally tractable by using rank-structured approximations. In this talk, we present algorithms for the approximation in hierarchical tensor format using statistical methods. Sparse representations in a given tensor format are obtained with adaptive or convex relaxation methods, with a selection of parameters using crossvalidation methods.

  12. On the efficient simulation of the left-tail of the sum of correlated log-normal variates

    KAUST Repository

    Alouini, Mohamed-Slim; Rached, Nadhir B.; Kammoun, Abla; Tempone, Raul

    2018-01-01

    The sum of log-normal variates is encountered in many challenging applications such as performance analysis of wireless communication systems and financial engineering. Several approximation methods have been reported in the literature. However

  13. Forms of Approximate Radiation Transport

    CERN Document Server

    Brunner, G

    2002-01-01

    Photon radiation transport is described by the Boltzmann equation. Because this equation is difficult to solve, many different approximate forms have been implemented in computer codes. Several of the most common approximations are reviewed, and test problems illustrate the characteristics of each of the approximations. This document is designed as a tutorial so that code users can make an educated choice about which form of approximate radiation transport to use for their particular simulation.

  14. Approximation by planar elastic curves

    DEFF Research Database (Denmark)

    Brander, David; Gravesen, Jens; Nørbjerg, Toke Bjerge

    2016-01-01

    We give an algorithm for approximating a given plane curve segment by a planar elastic curve. The method depends on an analytic representation of the space of elastic curve segments, together with a geometric method for obtaining a good initial guess for the approximating curve. A gradient......-driven optimization is then used to find the approximating elastic curve....

  15. Exact constants in approximation theory

    CERN Document Server

    Korneichuk, N

    1991-01-01

    This book is intended as a self-contained introduction for non-specialists, or as a reference work for experts, to the particular area of approximation theory that is concerned with exact constants. The results apply mainly to extremal problems in approximation theory, which in turn are closely related to numerical analysis and optimization. The book encompasses a wide range of questions and problems: best approximation by polynomials and splines; linear approximation methods, such as spline-approximation; optimal reconstruction of functions and linear functionals. Many of the results are base

  16. International Conference Approximation Theory XIV

    CERN Document Server

    Schumaker, Larry

    2014-01-01

    This volume developed from papers presented at the international conference Approximation Theory XIV,  held April 7–10, 2013 in San Antonio, Texas. The proceedings contains surveys by invited speakers, covering topics such as splines on non-tensor-product meshes, Wachspress and mean value coordinates, curvelets and shearlets, barycentric interpolation, and polynomial approximation on spheres and balls. Other contributed papers address a variety of current topics in approximation theory, including eigenvalue sequences of positive integral operators, image registration, and support vector machines. This book will be of interest to mathematicians, engineers, and computer scientists working in approximation theory, computer-aided geometric design, numerical analysis, and related approximation areas.

  17. Logística del transporte

    OpenAIRE

    Robusté Antón, Francesc

    2005-01-01

    La logística se ha conformado como un proceso estratégico para organizar las actividades de producción y de distribución de las empresas. El concepto de sistema logístico ha incluido un amplio espectro de operaciones que condicionan la eficiencia y la competitividad empresarial en el actual contexto de globalización de la economía. En este sentido, este libro afronta y analiza los distintos aspectos que inciden en los procesos de planificación y gestión de los procesos logísticos relacionados...

  18. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  19. Supply of Rubber Wood Log in Malaysia

    OpenAIRE

    Noraida, A. W.; Abdul-Rahim, A. S.

    2014-01-01

    Issue on shortage of raw material for wood processing solved by discovery of rubber wood log as one of the substitutes the natural log. This paper examines the supply of rubber wood log in Malaysia. We employ ARDL Bound Approach Test and time series data from 1980 to 2010 which represented the whole Malaysia are used to achieve the established objectives. The result shown, in the long run harvested area and wages have 1% and 10% significant level respectively. While in the short run, there wa...

  20. Bird species and traits associated with logged and unlogged forest in Borneo.

    Science.gov (United States)

    Cleary, Daniel F R; Boyle, Timothy J B; Setyawati, Titiek; Anggraeni, Celina D; Van Loon, E Emiel; Menken, Steph B J

    2007-06-01

    The ecological consequences of logging have been and remain a focus of considerable debate. In this study, we assessed bird species composition within a logging concession in Central Kalimantan, Indonesian Borneo. Within the study area (approximately 196 km2) a total of 9747 individuals of 177 bird species were recorded. Our goal was to identify associations between species traits and environmental variables. This can help us to understand the causes of disturbance and predict whether species with given traits will persist under changing environmental conditions. Logging, slope position, and a number of habitat structure variables including canopy cover and liana abundance were significantly related to variation in bird composition. In addition to environmental variables, spatial variables also explained a significant amount of variation. However, environmental variables, particularly in relation to logging, were of greater importance in structuring variation in composition. Environmental change following logging appeared to have a pronounced effect on the feeding guild and size class structure but there was little evidence of an effect on restricted range or threatened species although certain threatened species were adversely affected. For example, species such as the terrestrial insectivore Argusianus argus and the hornbill Buceros rhinoceros, both of which are threatened, were rare or absent in recently logged forest. In contrast, undergrowth insectivores such as Orthotomus atrogularis and Trichastoma rostratum were abundant in recently logged forest and rare in unlogged forest. Logging appeared to have the strongest negative effect on hornbills, terrestrial insectivores, and canopy bark-gleaning insectivores while moderately affecting canopy foliage-gleaning insectivores and frugivores, raptors, and large species in general. In contrast, undergrowth insectivores responded positively to logging while most understory guilds showed little pronounced effect

  1. Drilling and logging in uranium exploration

    International Nuclear Information System (INIS)

    Anon.

    1976-01-01

    The report reviews drilling and logging practices in exploration of uranium ores and summarizes the papers presented in the panel meeting. Recommendations for further research and development are given

  2. Neutron logging reliability techniques and apparatus

    International Nuclear Information System (INIS)

    Johnstone, C.W.

    1975-01-01

    Apparatus and methods for verifying the validity of data derived at least in part by neutron logging of earth formations, and, where indicated, for affording neutron diffusion-corrected values of such data, are disclosed. (WHK)

  3. Nuclear log interpretation by first principle

    International Nuclear Information System (INIS)

    Oelgaard, P.L.

    1988-07-01

    A weakness connected to the present interpretation of nuclear borehole logs is that the interdependence of the various logs and physical effects of importance for the tools are not always taken into account in a correct way. Therefore a new approach to the interpretation of nuclear borehole logs is considered. It is based on the logs obtained with the natural gamma, the neutron porosity, the gamma density, and the pulsed neutron tools. For each of these tools a model, taking into account the important physical effects, is established. These models are incorporated into a computer programme which from the tool signals calculates, by use of iteration, a consistent set of the corresponding formation properties. In the paper the models developed for the four tools and the interpretation programme are briefly described. An example of the use of the interpretation programme is given and compared with a conventional interpretation. (author)

  4. CMLOG: A common message logging system

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  5. LATTE - Log and Time Tracking for Elections

    Data.gov (United States)

    Office of Personnel Management — LATTE - Log and Time Tracking for Elections is a time tracking and voucher preparation system used to schedule employees to cover elections, to document their time...

  6. Well Logging Equipment Updated in China

    Institute of Scientific and Technical Information of China (English)

    Xu Lili

    1996-01-01

    @@ As one of the ten principal disciplines in the petroleum industry, well logging has been developed for about 55years in China and is playing an increasingly important role in the country's oil and gas exploration and development.

  7. Lead poisoning

    Science.gov (United States)

    ... drinking water in homes containing pipes that were connected with lead solder . Although new building codes require ... lead in their bodies when they put lead objects in their mouths, especially if they swallow those ...

  8. Lead Poisoning

    Science.gov (United States)

    Lead is a metal that occurs naturally in the earth's crust. Lead can be found in all parts of our ... from human activities such as mining and manufacturing. Lead used to be in paint; older houses may ...

  9. Conversation Threads Hidden within Email Server Logs

    Science.gov (United States)

    Palus, Sebastian; Kazienko, Przemysław

    Email server logs contain records of all email Exchange through this server. Often we would like to analyze those emails not separately but in conversation thread, especially when we need to analyze social network extracted from those email logs. Unfortunately each mail is in different record and those record are not tided to each other in any obvious way. In this paper method for discussion threads extraction was proposed together with experiments on two different data sets - Enron and WrUT..

  10. Nuclear borehole logging for oil exploration

    International Nuclear Information System (INIS)

    Oelgaard, P.L.

    1989-01-01

    Reactor physics can be applied to the logging of boreholes for the exploration of oil and gas and the results obtained can be interpreted more correctly by use of reactor physics models, e.g. one-dimensional multi-group diffusion theory adapted for gamma quanta. The standard nuclear logging tools are: natural gamma, gamma density, neutron porosity and the pulsed-neutron tool. The models and interpretation procedures are discussed. 1 fig

  11. Geophysical logging of the Harwell boreholes

    International Nuclear Information System (INIS)

    Brightman, M.A.

    1983-08-01

    A comprehensive geophysical borehole logging survey was carried out on each of three deep boreholes drilled at the Harwell research site. KOALA and PETRA computer programs were used to analyse and interpret the logs to obtain continuous quantitative estimates of the geological and hydrogeological properties of the sequences penetrated at the Harwell site. Quantitative estimates of the mineral composition and porosity of the cores samples were made. (UK)

  12. Defect core detection in radiata pine logs

    International Nuclear Information System (INIS)

    Wallace, G.

    1993-01-01

    Internal defect cores in Pinus radiata logs arise primarily from the practice in New Zealand of pruning trees to increase the amount of clear wood. Realising the benefits of this practice when milling the logs is hampered by the lack of a practical method for detecting the defect cores. This report attempts to establish industry requirements for detections and examine techniques which may be suitable. Some trials of a novel technique are described. (author) 19 refs.; 11 figs

  13. Researching Illegal Logging and Deforestation

    Directory of Open Access Journals (Sweden)

    Tim Boekhout van Solinge

    2014-08-01

    Full Text Available Tropical deforestation such as in the Amazon can be studied well from a green criminological perspective. Ethnographic research methods form a useful way to get insight into the dynamics and complexity of tropical deforestation, which often is illegal. This article gives an account of various ethnographic visits to the rainforests of the Amazon in the period 2003-2014. Ethnographic methods provide insight into the overlap between the legal and illegal, the functioning (or not of state institutions, the power of (corporate lobbies, and why tropical deforestation correlates with crimes such as corruption and violence. The use of ethnographic methods in forest areas where trustworthy state actors and institutions are not very present can also present danger and raise ethical issues (such as when the researcher, for reasons of safety, does not present as a criminological researcher. However, a large advantage of ethnographic visits to tropical rainforests is that they allow the gathering of local views and voices, which rarely reach the international level. These local views lead to interesting contradictions at the international level where corporate views and lobbies dominate.

  14. Modeling Precipitation Extremes using Log-Histospline

    Science.gov (United States)

    Huang, W. K.; Nychka, D. W.; Zhang, H.

    2017-12-01

    One of the commonly used approaches to modeling univariate extremes is the peaks-overthreshold (POT) method. The POT method models exceedances over a (sufficiently high/low) threshold as a generalized Pareto distribution (GPD). To apply this method, a threshold has to be chosen and the estimates might be sensitive to the chosen threshold. Here we propose an alternative, the "Log-Histospline", to explore modeling the tail behavior and the remainder of the density in one step using the full range of the data. Log-Histospline applies a smoothing spline model on a finely binned histogram of the log transformed data to estimate its log density. By construction, we are able to preserve the polynomial upper tail behavior, a feature commonly observed in geophysical observations. The Log-Histospline can be extended to the spatial setting by treating the marginal (log) density at each location as spatially indexed functional data, and perform a dimension reduction and spatial smoothing. We illustrate the proposed method by analyzing precipitation data from regional climate model output (North American Regional Climate Change and Assessment Program (NARCCAP)).

  15. Likelihood Approximation With Parallel Hierarchical Matrices For Large Spatial Datasets

    KAUST Repository

    Litvinenko, Alexander

    2017-11-01

    The main goal of this article is to introduce the parallel hierarchical matrix library HLIBpro to the statistical community. We describe the HLIBCov package, which is an extension of the HLIBpro library for approximating large covariance matrices and maximizing likelihood functions. We show that an approximate Cholesky factorization of a dense matrix of size $2M\\\\times 2M$ can be computed on a modern multi-core desktop in few minutes. Further, HLIBCov is used for estimating the unknown parameters such as the covariance length, variance and smoothness parameter of a Matérn covariance function by maximizing the joint Gaussian log-likelihood function. The computational bottleneck here is expensive linear algebra arithmetics due to large and dense covariance matrices. Therefore covariance matrices are approximated in the hierarchical ($\\\\H$-) matrix format with computational cost $\\\\mathcal{O}(k^2n \\\\log^2 n/p)$ and storage $\\\\mathcal{O}(kn \\\\log n)$, where the rank $k$ is a small integer (typically $k<25$), $p$ the number of cores and $n$ the number of locations on a fairly general mesh. We demonstrate a synthetic example, where the true values of known parameters are known. For reproducibility we provide the C++ code, the documentation, and the synthetic data.

  16. Likelihood Approximation With Parallel Hierarchical Matrices For Large Spatial Datasets

    KAUST Repository

    Litvinenko, Alexander; Sun, Ying; Genton, Marc G.; Keyes, David E.

    2017-01-01

    The main goal of this article is to introduce the parallel hierarchical matrix library HLIBpro to the statistical community. We describe the HLIBCov package, which is an extension of the HLIBpro library for approximating large covariance matrices and maximizing likelihood functions. We show that an approximate Cholesky factorization of a dense matrix of size $2M\\times 2M$ can be computed on a modern multi-core desktop in few minutes. Further, HLIBCov is used for estimating the unknown parameters such as the covariance length, variance and smoothness parameter of a Matérn covariance function by maximizing the joint Gaussian log-likelihood function. The computational bottleneck here is expensive linear algebra arithmetics due to large and dense covariance matrices. Therefore covariance matrices are approximated in the hierarchical ($\\H$-) matrix format with computational cost $\\mathcal{O}(k^2n \\log^2 n/p)$ and storage $\\mathcal{O}(kn \\log n)$, where the rank $k$ is a small integer (typically $k<25$), $p$ the number of cores and $n$ the number of locations on a fairly general mesh. We demonstrate a synthetic example, where the true values of known parameters are known. For reproducibility we provide the C++ code, the documentation, and the synthetic data.

  17. Some results in Diophantine approximation

    DEFF Research Database (Denmark)

    Pedersen, Steffen Højris

    the basic concepts on which the papers build. Among other it introduces metric Diophantine approximation, Mahler’s approach on algebraic approximation, the Hausdorff measure, and properties of the formal Laurent series over Fq. The introduction ends with a discussion on Mahler’s problem when considered......This thesis consists of three papers in Diophantine approximation, a subbranch of number theory. Preceding these papers is an introduction to various aspects of Diophantine approximation and formal Laurent series over Fq and a summary of each of the three papers. The introduction introduces...

  18. Limitations of shallow nets approximation.

    Science.gov (United States)

    Lin, Shao-Bo

    2017-10-01

    In this paper, we aim at analyzing the approximation abilities of shallow networks in reproducing kernel Hilbert spaces (RKHSs). We prove that there is a probability measure such that the achievable lower bound for approximating by shallow nets can be realized for all functions in balls of reproducing kernel Hilbert space with high probability, which is different with the classical minimax approximation error estimates. This result together with the existing approximation results for deep nets shows the limitations for shallow nets and provides a theoretical explanation on why deep nets perform better than shallow nets. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Topics in multivariate approximation and interpolation

    CERN Document Server

    Jetter, Kurt

    2005-01-01

    This book is a collection of eleven articles, written by leading experts and dealing with special topics in Multivariate Approximation and Interpolation. The material discussed here has far-reaching applications in many areas of Applied Mathematics, such as in Computer Aided Geometric Design, in Mathematical Modelling, in Signal and Image Processing and in Machine Learning, to mention a few. The book aims at giving a comprehensive information leading the reader from the fundamental notions and results of each field to the forefront of research. It is an ideal and up-to-date introduction for gr

  20. Spherical Approximation on Unit Sphere

    Directory of Open Access Journals (Sweden)

    Eman Samir Bhaya

    2018-01-01

    Full Text Available In this paper we introduce a Jackson type theorem for functions in LP spaces on sphere And study on best approximation of  functions in  spaces defined on unit sphere. our central problem is to describe the approximation behavior of functions in    spaces for  by modulus of smoothness of functions.

  1. Three-Way Channels With Multiple Unicast Sessions: Capacity Approximation via Network Transformation

    KAUST Repository

    Chaaban, Anas

    2016-09-28

    A network of three nodes mutually communicating with each other is studied. This multi-way network is a suitable model for three-user device-to-device communications. The main goal of this paper is to characterize the capacity region of the underlying Gaussian three-way channel (3WC) within a constant gap. To this end, a capacity outer bound is derived using cut-set bounds and genie-aided bounds. For achievability, the 3WC is first transformed into an equivalent star channel. This latter is then decomposed into a set of “successive” sub-channels, leading to a sub-channel allocation problem. Using backward decoding, interference neutralization, and known results on the capacity of the star-channel relying of physical-layer network coding, an achievable rate region for the 3WC is obtained. It is then shown that the achievable rate region is within a constant gap of the developed outer bound, leading to the desired capacity approximation. Interestingly, in contrast to the Gaussian two-way channel (TWC), adaptation is necessary in the 3WC. Furthermore, message splitting is another ingredient of the developed scheme for the 3WC, which is not required in the TWC. The two setups are, however, similar in terms of their sum-capacity pre-log, which is equal to 2. Finally, some interesting networks and their approximate capacities are recovered as special cases of the 3WC, such as the cooperative broadcast channel and multiple access channel.

  2. La logística integral como ventaja competitiva y sistema logístico

    Directory of Open Access Journals (Sweden)

    Mario Anselmo Martínez gallardo

    2013-07-01

    Full Text Available Esta investigación analiza la logística integral como una ventaja competitiva y el sistema logístico. Es opinión de los autores que la logística integral es esencial para el intercambio de mercancías, toda vez que reduce costos y hace más ágil la actividad comercial. La utilización de esta logística representa una ventaja competitiva con respecto de otras empresas por la optimización del capital y ahorro de tiempo.

  3. Approximate circuits for increased reliability

    Science.gov (United States)

    Hamlet, Jason R.; Mayo, Jackson R.

    2015-08-18

    Embodiments of the invention describe a Boolean circuit having a voter circuit and a plurality of approximate circuits each based, at least in part, on a reference circuit. The approximate circuits are each to generate one or more output signals based on values of received input signals. The voter circuit is to receive the one or more output signals generated by each of the approximate circuits, and is to output one or more signals corresponding to a majority value of the received signals. At least some of the approximate circuits are to generate an output value different than the reference circuit for one or more input signal values; however, for each possible input signal value, the majority values of the one or more output signals generated by the approximate circuits and received by the voter circuit correspond to output signal result values of the reference circuit.

  4. Mean-field approximation minimizes relative entropy

    International Nuclear Information System (INIS)

    Bilbro, G.L.; Snyder, W.E.; Mann, R.C.

    1991-01-01

    The authors derive the mean-field approximation from the information-theoretic principle of minimum relative entropy instead of by minimizing Peierls's inequality for the Weiss free energy of statistical physics theory. They show that information theory leads to the statistical mechanics procedure. As an example, they consider a problem in binary image restoration. They find that mean-field annealing compares favorably with the stochastic approach

  5. Markdown Optimization via Approximate Dynamic Programming

    Directory of Open Access Journals (Sweden)

    Cos?gun

    2013-02-01

    Full Text Available We consider the markdown optimization problem faced by the leading apparel retail chain. Because of substitution among products the markdown policy of one product affects the sales of other products. Therefore, markdown policies for product groups having a significant crossprice elasticity among each other should be jointly determined. Since the state space of the problem is very huge, we use Approximate Dynamic Programming. Finally, we provide insights on the behavior of how each product price affects the markdown policy.

  6. Log evaluation of sub-bituminous coals in Magallanes, Chile

    International Nuclear Information System (INIS)

    Weltz, L.S.

    1976-01-01

    In coal exploration a drilling program is normally used for coal inquest through core analysis, with a high cost and operating time. However, in many cases, there is poor cores recovery due to operating procedures and/or formation conditions which leads to the determination of parameters non-representative of the coal seam. The cost and operating time can be minimized through the use of logs which also represent a continuous and in situ sampling. In the case of sub-bituminous coals, the analysis through logs is more complex due to the high content of clay, which masks the presence of water. This paper describes the analysis of sub-bituminous coals in Magallanes-Chile. The main coal seam components are: coal, clay, secondary quartz and water. An interpretation system using the density log, gamma ray, sonic and microlog, based on rho/sub B/-GR and rho/sub B/--Δ/sub T/ cross plots, permits to know the weight percentages of the following elements: total carbon, ash, moisture, which form the main local coal parameters. Empirical relationships permit us to obtain also the heating value and an estimate strength index to elastic-dynamic forces. The results obtained agree within 3 percent with the Laboratory cores analysis. The method is processed through a sequence of simple computer programs for IBM-360

  7. Well logging with natural gamma radiation

    International Nuclear Information System (INIS)

    Ellis, D.V.

    1983-01-01

    An invention is described for use in natural gamma radiation well logging in which measurements taken in a borehole are used in the search for valuable underground resources such as oil or gas. The invention comprises deriving a log of natural gamma radiation detected in selected energy windows for a selected borehole depth interval and converting it into a log of the selected subsurface materials, e.g. Th, U, K. This log is corrected for the effects of 1) either a gamma ray emitter in the borehole fluid, e.g. potassium salts and/or 2) a gamma ray attenuator in the borehole fluid, e.g. a strong attenuator such as barite and/or hematite. The Th, U, K log is particularly useful in the exploration of oil and gas resources since the Th, U, K concentrations are a good indication as to the presence, type and volume of shale and clay in the formations surrounding the borehole. (U.K.)

  8. AML (Advanced Mud Logging: First Among Equals

    Directory of Open Access Journals (Sweden)

    T. Loermans

    2017-09-01

    Full Text Available During the past ten years an enormous development in mud logging technology has been made. Traditional mud logging was only qualitative in nature, and mudlogs could not be used for the petrophysical well evaluations which form the basis for all subsequent activities on wells and fields. AML however can provide quantitative information, logs with a reliability, trueness and precision like LWD and WLL. Hence for well evaluation programmes there are now three different logging methods available, each with its own pros and cons on specific aspects: AML, LWD and WLL. The largest improvements have been made in mud gas analysis and elemental analysis of cuttings. Mud gas analysis can yield hydrocarbon fluid composition for some components with a quality like PVT analysis, hence not only revolutionising the sampling programme so far done with only LWD/WLL, but also making it possible to geosteer on fluid properties. Elemental analysis of cuttings, e.g. with XRF, with an ability well beyond the capabilities of the spectroscopy measurements possible earlier with LWD/WLL tools, is opening up improved ways to evaluate formations, especially of course where the traditional methods are falling short of requirements, such as in unconventional reservoirs. An overview and specific examples of these AML logs is given, from which it may be concluded that AML now ought to be considered as “first among its equals”.

  9. Approximate Dynamic Programming: Combining Regional and Local State Following Approximations.

    Science.gov (United States)

    Deptula, Patryk; Rosenfeld, Joel A; Kamalapurkar, Rushikesh; Dixon, Warren E

    2018-06-01

    An infinite-horizon optimal regulation problem for a control-affine deterministic system is solved online using a local state following (StaF) kernel and a regional model-based reinforcement learning (R-MBRL) method to approximate the value function. Unlike traditional methods such as R-MBRL that aim to approximate the value function over a large compact set, the StaF kernel approach aims to approximate the value function in a local neighborhood of the state that travels within a compact set. In this paper, the value function is approximated using a state-dependent convex combination of the StaF-based and the R-MBRL-based approximations. As the state enters a neighborhood containing the origin, the value function transitions from being approximated by the StaF approach to the R-MBRL approach. Semiglobal uniformly ultimately bounded (SGUUB) convergence of the system states to the origin is established using a Lyapunov-based analysis. Simulation results are provided for two, three, six, and ten-state dynamical systems to demonstrate the scalability and performance of the developed method.

  10. Logging Damage to Residual Trees Following Partial Cutting in a Green Ash-Sugarberry Stand in the Mississippi Delta

    Science.gov (United States)

    James S. Meadows

    1993-01-01

    Partial cutting in bottomland hardwoods to control stand density and species composition sometimes results in logging damage to the lower bole and/or roots of residual trees. If severe, logging damage may lead to a decline in tree vigor, which may subsequently stimulate the production of epicormic branches, causing a decrease in bole quality and an eventual loss in...

  11. Pulsed neutron logging - a modern approach to petroleum exploration

    International Nuclear Information System (INIS)

    Navalkar, M.P.

    1978-01-01

    As hydrocarbons have strikingly different properties for neutrons as compared with rocks, neutronic methods are useful to prepare logs of bore holes drilled for petroleum exploration. The earlier neutron logs were based on steady neutron sources, but the superior logs, namely, neutron life time log and neutron induced spectral log are based on pulsed neutron sources. The methods of obtaining these logs, their limitations and the field equipment required are described briefly. As the two logs are complementary, a plea has been made to develop field equipment which can obtain two logs in a single run. (M.G.B.)

  12. Lead poisoning

    Energy Technology Data Exchange (ETDEWEB)

    Beijers, J A

    1952-01-01

    Three cases of acute lead poisoning of cattle herds via ingestion are reported, and reference is made to several other incidents of lead in both humans and animals. The quantity of lead which was found in the livers of the dead cows varied from 6.5 to 19 mg/kg, while 1160 mg/kg of lead in the liver was found for a young cow which was poisoned experimentally with 5 gms of lead acetate per day; hence, there appears to be great variability in the amounts deposited that can lead to intoxication and death. No evidence was found for a lead seam around the teeth, prophyrinuria, or basophil granules in the erythrocytes during acute or chronic lead poisoning of cattle or horses examined. Reference is made to attempts of finding the boundary line between increased lead absorption and lead intoxication in humans, and an examination of 60 laborers in an offset-printing office containing a great deal of inhalable lead (0.16 to 1.9 mg/cu m air) is reviewed. Physical deviation, basophylic granulation of erythrocytes, increased lead content of the urine, and porphyrinuria only indicate an increased absorption of lead; the use of the term intoxication is justified if, in addition, there are complaints of lack of appetite, constipation, fatigue, abdominal pain, and emaciation.

  13. The efficiency of Flory approximation

    International Nuclear Information System (INIS)

    Obukhov, S.P.

    1984-01-01

    The Flory approximation for the self-avoiding chain problem is compared with a conventional perturbation theory expansion. While in perturbation theory each term is averaged over the unperturbed set of configurations, the Flory approximation is equivalent to the perturbation theory with the averaging over the stretched set of configurations. This imposes restrictions on the integration domain in higher order terms and they can be treated self-consistently. The accuracy δν/ν of Flory approximation for self-avoiding chain problems is estimated to be 2-5% for 1 < d < 4. (orig.)

  14. Fracture diagnostics with tube wave reflection logs

    International Nuclear Information System (INIS)

    Medlin, W.L.

    1991-01-01

    This paper reports on the Tube Wave Reflection Log (TWRL) which is acoustic logging method which provides information about the height, location and conductivity of hydraulically induced fractures behind perforated casing. The TWRL tool consists of a transmitter and closely spaced receiver. The transmitter is driven with a short, low frequency tone burst to generate long wavelength tube waves which are little attenuated in unperforated casing. They are partially reflected when they pass perforated intervals communicating with a hydraulically induced fracture. The tool listens for such reflections for 0.1 seconds following each excitation burst. As the tool is moved uphole at logging speed, the transmitter is excited at each foot of depth. VDL displays of the TWRL records provide reflection traces whose projections define the uppermost and lower-most perforations communicating with the fracture. The strength of the reflections depends on the ease of fluid flow into the fracture and thus, is an indicator of fracture conductivity

  15. Smartphone log data in a qualitative perspective

    DEFF Research Database (Denmark)

    Ørmen, Jacob; Thorhauge, Anne Mette

    2015-01-01

    into studies of smartphones in everyday life. Through an illustrative study, we explore a more nuanced perspective on what can be considered “log data” and how these types of data can be collected and analysed. A qualitative approach to log data analysis offers researchers new opportunities to situate......Log data from smartphones have primarily been used in large-scale research designs to draw statistical inferences from hundreds or even thousands of participants. In this article, we argue that more qualitatively oriented designs can also benefit greatly from integrating these rich data sources...... serve as cues to instigate discussion and reflection as well as act as resources for contextualizing and organizing related empirical material. In the discussion, the advantages of a qualitative perspective for research designs are assessed in relation to issues of validity. Further perspectives...

  16. Lead Toxicity

    Science.gov (United States)

    ... o Do not use glazed ceramics, home remedies, cosmetics, or leaded-crystal glassware unless you know that they are lead safe. o If you live near an industry, mine, or waste site that may have contaminated ...

  17. Relational Leading

    DEFF Research Database (Denmark)

    Larsen, Mette Vinther; Rasmussen, Jørgen Gulddahl

    2015-01-01

    This first chapter presents the exploratory and curious approach to leading as relational processes – an approach that pervades the entire book. We explore leading from a perspective that emphasises the unpredictable challenges and triviality of everyday life, which we consider an interesting......, relevant and realistic way to examine leading. The chapter brings up a number of concepts and contexts as formulated by researchers within the field, and in this way seeks to construct a first understanding of relational leading....

  18. Drilling, construction, geophysical log data, and lithologic log for boreholes USGS 142 and USGS 142A, Idaho National Laboratory, Idaho

    Science.gov (United States)

    Twining, Brian V.; Hodges, Mary K.V.; Schusler, Kyle; Mudge, Christopher

    2017-07-27

    Starting in 2014, the U.S. Geological Survey in cooperation with the U.S. Department of Energy, drilled and constructed boreholes USGS 142 and USGS 142A for stratigraphic framework analyses and long-term groundwater monitoring of the eastern Snake River Plain aquifer at the Idaho National Laboratory in southeast Idaho. Borehole USGS 142 initially was cored to collect rock and sediment core, then re-drilled to complete construction as a screened water-level monitoring well. Borehole USGS 142A was drilled and constructed as a monitoring well after construction problems with borehole USGS 142 prevented access to upper 100 feet (ft) of the aquifer. Boreholes USGS 142 and USGS 142A are separated by about 30 ft and have similar geology and hydrologic characteristics. Groundwater was first measured near 530 feet below land surface (ft BLS) at both borehole locations. Water levels measured through piezometers, separated by almost 1,200 ft, in borehole USGS 142 indicate upward hydraulic gradients at this location. Following construction and data collection, screened water-level access lines were placed in boreholes USGS 142 and USGS 142A to allow for recurring water level measurements.Borehole USGS 142 was cored continuously, starting at the first basalt contact (about 4.9 ft BLS) to a depth of 1,880 ft BLS. Excluding surface sediment, recovery of basalt, rhyolite, and sediment core at borehole USGS 142 was approximately 89 percent or 1,666 ft of total core recovered. Based on visual inspection of core and geophysical data, material examined from 4.9 to 1,880 ft BLS in borehole USGS 142 consists of approximately 45 basalt flows, 16 significant sediment and (or) sedimentary rock layers, and rhyolite welded tuff. Rhyolite was encountered at approximately 1,396 ft BLS. Sediment layers comprise a large percentage of the borehole between 739 and 1,396 ft BLS with grain sizes ranging from clay and silt to cobble size. Sedimentary rock layers had calcite cement. Basalt flows

  19. Lead Test

    Science.gov (United States)

    ... to do renovation and repair projects using lead-safe work practices to avoid creating more lead dust or ... in a dangerous area? Yes. If you are working in a potentially harmful environment with exposure to lead dust or fumes: Wash ...

  20. Financial feasibility of a log sort yard handling small-diameter logs: A preliminary study

    Science.gov (United States)

    Han-Sup Han; E. M. (Ted) Bilek; John (Rusty) Dramm; Dan Loeffler; Dave Calkin

    2011-01-01

    The value and use of the trees removed in fuel reduction thinning and restoration treatments could be enhanced if the wood were effectively evaluated and sorted for quality and highest value before delivery to the next manufacturing destination. This article summarizes a preliminary financial feasibility analysis of a log sort yard that would serve as a log market to...

  1. Geothermal well log interpretation midterm report

    Energy Technology Data Exchange (ETDEWEB)

    Sanyal, S.K.; Wells, L.E.; Bickham, R.E.

    1979-02-01

    Reservoir types are defined according to fluid phase and temperature, lithology, geologic province, pore geometry, and salinity and fluid chemistry. Improvements are needed in lithology and porosity definition, fracture detection, and thermal evaluation for more accurate interpretation. Further efforts are directed toward improving diagnostic techniques for relating rock characteristics and log response, developing petrophysical models for geothermal systems, and developing thermal evaluation techniques. The Geothermal Well Log Interpretation study and report has concentrated only on hydrothermal geothermal reservoirs. Other geothermal reservoirs (hot dry rock, geopressured, etc.) are not considered.

  2. New portable neutron generator for well logging

    International Nuclear Information System (INIS)

    Chicanov, A.E.; Gromov, E. V.; Gulko, V. M.; Izmailov, A. V.

    1994-01-01

    The information about the design, investigation and testing of new well neutron generator for the pulse neutron logging (PNL) is given in this paper. The main physical characteristics of new PNL apparatus are: Neutron flux 2.10 sup 8 n/s ; Pulse frequency>=400 Hz; Diameter= 90 mm; Logging velocity >200 m/h; Number of probes = 2; Resource > 300 h. The generator were provided by gas-filled neutron accelerative tube named NTF-2. The perspective of application and optimization shown PNL apparatus are considered. (author)

  3. Analyzing Log Files using Data-Mining

    Directory of Open Access Journals (Sweden)

    Marius Mihut

    2008-01-01

    Full Text Available Information systems (i.e. servers, applications and communication devices create a large amount of monitoring data that are saved as log files. For analyzing them, a data-mining approach is helpful. This article presents the steps which are necessary for creating an ‘analyzing instrument’, based on an open source software called Waikato Environment for Knowledge Analysis (Weka [1]. For exemplification, a system log file created by a Windows-based operating system, is used as input file.

  4. Kaizen aplicado à logística

    OpenAIRE

    Santos, Ana Catarina Almeida

    2011-01-01

    O presente trabalho propõe alcançar um aumento de produtividade e consequente redução de custos e desperdícios ajudando o departamento logístico da Empresa Revigrés – Industria de Revestimentos de Grés, Lda, a tornar-se mais eficiente, através da aplicação da filosofia kaizen que propõe melhorias no desempenho por implementação de pequenas ações. O objetivo deste projeto é a melhoria do departamento logístico globalmente, para isso houve o recurso a pesquisas e levantamento ...

  5. Geophysical borehole logging test procedure: Final draft

    International Nuclear Information System (INIS)

    1986-09-01

    The purpose of geophysical borehole logging from the At-Depth Facility (ADF) is to provide information which will assist in characterizing the site geologic conditions and in classifying the engineering characteristics of the rock mass in the vicinity of the ADF. The direct goals of borehole logging include identification of lithologic units and their correlation from hole to hole, identification of fractured or otherwise porous or permeable zones, quantitative or semi-quantitative estimation of various formation properties, and evaluation of factors such as the borehole diameter and orientation. 11 figs., 4 tabs

  6. CS model coil experimental log book

    International Nuclear Information System (INIS)

    Nishijima, Gen; Sugimoto, Makoto; Nunoya, Yoshihiko; Wakabayashi, Hiroshi; Tsuji, Hiroshi

    2001-02-01

    Charging test of the ITER CS Model Coil which is the world's largest superconducting pulse coil and the CS Insert Coil had started at April 11, 2000 and had completed at August 18, 2000. In the campaign, total shot numbers were 356 and the size of the data file in the DAS (Data Acquisition System) was over 20 GB. This report is a database that consists of the log list and the log sheets of every shot. One can access the database, make a search, and browse results via Internet (http://1ogwww.naka.jaeri.go.jp). The database will be useful to quick search to choose necessary shots. (author)

  7. Perfil logístico de Colombia

    OpenAIRE

    Cardozo Maglioni, María Victoria; Lozano Suarez, María Goretty

    2012-01-01

    El presente documento ofrece un estudio del perfil logístico de Colombia con la finalidad de dar a conocer el estado de arte de las ciudades, puertos e infraestructura principal para facilitar la toma de decisiones de los empresarios. Para el desarrollo de este trabajo se determinaron a partir de un análisis competitivo del país; las principales ciudades y puertos; logrando establecer un inventario de maquinaria y equipo e infraestructura logística; enmarcados en retos ya establecidos en las ...

  8. Well logging instrumental and methodological research

    International Nuclear Information System (INIS)

    Andrassy, L.; Barath, I.; Dorko, R.

    1983-01-01

    This part of the Annual Report of the Roland Eoetvoes Geophysical Institute (ELGI) of Hungary for 1982, summarizes the well logging instrumental and methodological researches of ELGI. The theoretical neutron diffusion fluxes for black and brown coals of Hungarian mines were calculated. A coal probe was developed and tested in boreholes using computerized data processing and interpretation. An X-ray radiometric method was used for the determination of Cu and Fe contents of minerals. Researches in the field of magnetic susceptibility and induced polarization logging are also summarized. A rapid analyzer for bauxite mining and a photorecorder for petroleum industry were developed by ELGI. (D.Gy.)

  9. Approximate Implicitization Using Linear Algebra

    Directory of Open Access Journals (Sweden)

    Oliver J. D. Barrowclough

    2012-01-01

    Full Text Available We consider a family of algorithms for approximate implicitization of rational parametric curves and surfaces. The main approximation tool in all of the approaches is the singular value decomposition, and they are therefore well suited to floating-point implementation in computer-aided geometric design (CAGD systems. We unify the approaches under the names of commonly known polynomial basis functions and consider various theoretical and practical aspects of the algorithms. We offer new methods for a least squares approach to approximate implicitization using orthogonal polynomials, which tend to be faster and more numerically stable than some existing algorithms. We propose several simple propositions relating the properties of the polynomial bases to their implicit approximation properties.

  10. Rollout sampling approximate policy iteration

    NARCIS (Netherlands)

    Dimitrakakis, C.; Lagoudakis, M.G.

    2008-01-01

    Several researchers have recently investigated the connection between reinforcement learning and classification. We are motivated by proposals of approximate policy iteration schemes without value functions, which focus on policy representation using classifiers and address policy learning as a

  11. Framework for sequential approximate optimization

    NARCIS (Netherlands)

    Jacobs, J.H.; Etman, L.F.P.; Keulen, van F.; Rooda, J.E.

    2004-01-01

    An object-oriented framework for Sequential Approximate Optimization (SAO) isproposed. The framework aims to provide an open environment for thespecification and implementation of SAO strategies. The framework is based onthe Python programming language and contains a toolbox of Python

  12. Securing a cyber physical system in nuclear power plants using least square approximation and computational geometric approach

    International Nuclear Information System (INIS)

    Gawand, Hemangi Laxman; Bhattacharjee, A. K.; Roy, Kallol

    2017-01-01

    In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications

  13. Securing a cyber physical system in nuclear power plants using least square approximation and computational geometric approach

    Energy Technology Data Exchange (ETDEWEB)

    Gawand, Hemangi Laxman [Homi Bhabha National Institute, Computer Section, BARC, Mumbai (India); Bhattacharjee, A. K. [Reactor Control Division, BARC, Mumbai (India); Roy, Kallol [BHAVINI, Kalpakkam (India)

    2017-04-15

    In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

  14. Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

    Directory of Open Access Journals (Sweden)

    Hemangi Laxman Gawand

    2017-04-01

    Full Text Available In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA software. A targeted attack (also termed a control aware attack on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

  15. Log-based identification of sweet spots for effective fracs in shale reservoirs

    Energy Technology Data Exchange (ETDEWEB)

    Hashmy, K.; Barnett, C.; Jonkers, J. [Weatherford (United States); Abueita, S. [Anadarko Petroleum (United States)

    2011-07-01

    Shale reservoir exploitation requires horizontal hydro-fracturing, often in a multi-stage configuration. Fracture stages are usually evenly spaced along the horizontal well, regardless of reservoir characteristics, even though wireline logs or logging-while-drilling (LWD) methods could be used to determine sweet spots for more cost-effective fracturing locations. This paper aims to show how failure to take into consideration a reservoir's geological properties can lead to less effective exploitation, and then goes on to describe logging techniques, LWD and wireline logs combined, and their usefulness in effectively placing fracturing stages on a reservoir's sweet spots. By studying logs from different LWD and wireline log techniques, such as gamma ray, resistivity, X-ray fluorescence or shockwave sonic measurements for different existing wells, the study shows how sweet spots, where kerogen concentration is higher, with higher porosity, can be determined. These logging techniques, requiring low investments, offer a variety of methods for identifying sweet spots in shale reservoirs, and fracturing only these spots will avoid unnecessary expenditure on frac stages in zones with poor reservoir characteristics.

  16. Extracting useful knowledge from event logs

    DEFF Research Database (Denmark)

    Djenouri, Youcef; Belhadi, Asma; Fournier-Viger, Philippe

    2018-01-01

    Business process analysis is a key activity that aims at increasing the efficiency of business operations. In recent years, several data mining based methods have been designed for discovering interesting patterns in event logs. A popular type of methods consists of applying frequent itemset mini...

  17. Potential for shared log transport services

    Science.gov (United States)

    Tim McDonald; Steve Taylor; Jorge Valenzuela

    2001-01-01

    A simulation model of a log transport logistics network was developed. The model could be structured to either share truck capacity among a group of loggers, or to assign a fixed number of trucks to individual loggers. Another variation of the model allowed the use of a staging yard to set out loaded trailers and deliver them to destinations using dedicated shuttle...

  18. Identifying unstable sites on logging roads

    Science.gov (United States)

    R. M. Rice; J. Lewis

    1986-01-01

    Logging roads are an important source of forestry-related erosion. The amount of erosion on a forest road is determined by the interaction between how the road is constructed and maintained and the environment in which it is built. The roads in this study were constructed with large bulldozers, and most excavated material was sidecast. The roads studied were...

  19. Narrating Illegal Logging Across the Globe

    DEFF Research Database (Denmark)

    Winkel, Georg; Leipold, Sina; Buhmann, Karin

    2017-01-01

    In the last decade illegal logging has triggered the attention of policy makers and scholars of international forest governance. The issue is multifaceted, involving aspects of social and environmental sustainability, development, trade, access to markets and competitiveness. A vivid academic deb...

  20. Modelling tropical forests response to logging

    Science.gov (United States)

    Cazzolla Gatti, Roberto; Di Paola, Arianna; Valentini, Riccardo; Paparella, Francesco

    2013-04-01

    Tropical rainforests are among the most threatened ecosystems by large-scale fragmentation due to human activity such as heavy logging and agricultural clearance. Although, they provide crucial ecosystem goods and services, such as sequestering carbon from the atmosphere, protecting watersheds and conserving biodiversity. In several countries forest resource extraction has experienced a shift from clearcutting to selective logging to maintain a significant forest cover and understock of living biomass. However the knowledge on the short and long-term effects of removing selected species in tropical rainforest are scarce and need to be further investigated. One of the main effects of selective logging on forest dynamics seems to be the local disturbance which involve the invasion of open space by weed, vines and climbers at the expense of the late-successional state cenosis. We present a simple deterministic model that describes the dynamics of tropical rainforest subject to selective logging to understand how and why weeds displace native species. We argue that the selective removal of tallest tropical trees carries out gaps of light that allow weeds, vines and climbers to prevail on native species, inhibiting the possibility of recovery of the original vegetation. Our results show that different regime shifts may occur depending on the type of forest management adopted. This hypothesis is supported by a dataset of trees height and weed/vines cover that we collected from 9 plots located in Central and West Africa both in untouched and managed areas.

  1. ADN* Density log estimation Using Rockcell*

    International Nuclear Information System (INIS)

    Okuku, C.; Iloghalu, Emeka. M.; Omotayo, O.

    2003-01-01

    This work is intended to inform on the possibilities of estimating good density data in zones associated with sliding in a reservoir with ADN* tool with or without ADOS in string in cases where repeat sections were not done, possibly due to hole stability or directional concerns. This procedure has been equally used to obtain a better density data in corkscrew holes. Density data (ROBB) was recomputed using neural network in RockCell* to estimate the density over zones of interest. RockCell* is a Schlumberger software that has neural network functionally which can be used to estimate missing logs using the combination of the responses of other log curves and intervals that are not affected by sliding. In this work, an interval was selected and within this interval twelve litho zones were defined using the unsupervised neural network. From this a training set was selected based on intervals of very good log responses outside the sliding zones. This training set was used to train and run the neural network for a specific lithostratigraphic interval. The results matched the known good density curve. Then after this, an estimation of the density curve was done using the supervised neural network. The output from this estimation matched very closely in the good portions of the log, thus providing some density measurements in the sliding zone. This methodology provides a scientific solution to missing data during the process of Formation evaluation

  2. Changes in the Logging Labor Force

    Science.gov (United States)

    Charles H. Wolf; Jean W. Nolley

    1977-01-01

    Employment in the logging industry dropped 28 percent between 1950 and 1970, while output of industrial roundwood increased 31 percent. Today's loggers are older, better educated, and more skilled. A large proportion are self-employed, many work less than a full year, and a substantial number have incomes below the poverty level. Mechanization of timber harvesting...

  3. Alaska midgrade logs: supply and offshore demand.

    Science.gov (United States)

    Donald F. Flora; Wendy J. McGinnis

    1989-01-01

    The outlook for shipments and prices of export logs from Alaska differs significantly by grade (quality class). For the majority lying in the middle of the value range, the trend of prices is projected to increase $200 per thousand board feet, or about 55 percent, by 2000. Shipments are expected to rise about 30 percent by 1995 and then subside about 10 percent. These...

  4. Analyzing Grid Log Data with Affinity Propagation

    NARCIS (Netherlands)

    Modena, G.; van Someren, M.W.; Ali, M; Bosse, T.; Hindriks, K.V.; Hoogendoorn, M.; Jonker, C.M; Treur, J.

    2013-01-01

    In this paper we present an unsupervised learning approach to detect meaningful job traffic patterns in Grid log data. Manual anomaly detection on modern Grid environments is troublesome given their increasing complexity, the distributed, dynamic topology of the network and heterogeneity of the jobs

  5. Exploration and grade control neutron logging

    International Nuclear Information System (INIS)

    Eisler, P.L.

    1982-01-01

    Techniques used in neutron logging in boreholes are discussed. They include the application of neutron probes to porosity measurements, to lithological determinations based on macroscopic cross-section measurements and measurements of the concentration of chemical constituents in rocks and ores

  6. Explorations in statistics: the log transformation.

    Science.gov (United States)

    Curran-Everett, Douglas

    2018-06-01

    Learning about statistics is a lot like learning about science: the learning is more meaningful if you can actively explore. This thirteenth installment of Explorations in Statistics explores the log transformation, an established technique that rescales the actual observations from an experiment so that the assumptions of some statistical analysis are better met. A general assumption in statistics is that the variability of some response Y is homogeneous across groups or across some predictor variable X. If the variability-the standard deviation-varies in rough proportion to the mean value of Y, a log transformation can equalize the standard deviations. Moreover, if the actual observations from an experiment conform to a skewed distribution, then a log transformation can make the theoretical distribution of the sample mean more consistent with a normal distribution. This is important: the results of a one-sample t test are meaningful only if the theoretical distribution of the sample mean is roughly normal. If we log-transform our observations, then we want to confirm the transformation was useful. We can do this if we use the Box-Cox method, if we bootstrap the sample mean and the statistic t itself, and if we assess the residual plots from the statistical model of the actual and transformed sample observations.

  7. Apache Flume distributed log collection for Hadoop

    CERN Document Server

    D'Souza, Subas

    2013-01-01

    A starter guide that covers Apache Flume in detail.Apache Flume: Distributed Log Collection for Hadoop is intended for people who are responsible for moving datasets into Hadoop in a timely and reliable manner like software engineers, database administrators, and data warehouse administrators

  8. 47 CFR 80.409 - Station logs.

    Science.gov (United States)

    2010-10-01

    ... primary office or available to the Commission via secured access to the licensee's Internet web site. Logs..., together with the time of such observation or occurrence and the position of the ship or other mobile unit... devices which do not have integral navigation receivers, including: VHF DSC, MF DSC, satellite EPIRB and...

  9. Geophysical logging for mineral exploration and development

    International Nuclear Information System (INIS)

    Plouffe, R.D.

    1981-01-01

    It is possible to retrieve from small-diameter holes geophysical data for qualitative interpretation in exploration and quantitative interpretation in the development of orebodies. The primary objectives in the exploration stage are to identify where, within a hole, economic minerals are, and to help in lithological interpretations. Other aspects, which are more quantitative, are the interpretation of downhole logs for parameters which can be used in surface geophysical methods (i.e. density for gravity surveys, acoustic velocities for seismic surveys, and magnetic susceptibility for airborne and ground magnetic surveys). Recent advances in equipment design, portability and durability have made downhole logging in exploration more inexpensive and reliable. This new equipment is being used to generate very precise quantitative results. This is especially true on uranium development projects. The interpretation of gamma logs for eU 3 O 8 values has finally become precise enough that they have begun to replace chemical values in reserve calculations. Another part of development data is density and equilibrium information, which, with today's technology, is being derived from downhole probing. In the years to come, the trends for many metals are toward neutron activation techniques, or in-situ assaying, and the use of multiple logs for better lithological and physical rock property determinations. (auth)

  10. Information needs for increasing log transport efficiency

    Science.gov (United States)

    Timothy P. McDonald; Steven E. Taylor; Robert B. Rummer; Jorge Valenzuela

    2001-01-01

    Three methods of dispatching trucks to loggers were tested using a log transport simulation model: random allocation, fixed assignment of trucks to loggers, and dispatch based on knowledge of the current status of trucks and loggers within the system. This 'informed' dispatch algorithm attempted to minimize the difference in time between when a logger would...

  11. Root cause analysis with enriched process logs

    NARCIS (Netherlands)

    Suriadi, S.; Ouyang, C.; Aalst, van der W.M.P.; Hofstede, ter A.H.M.; La Rosa, M.; Soffer, P.

    2013-01-01

    n the field of process mining, the use of event logs for the purpose of root cause analysis is increasingly studied. In such an analysis, the availability of attributes/features that may explain the root cause of some phenomena is crucial. Currently, the process of obtaining these attributes from

  12. Mining process performance from event logs

    NARCIS (Netherlands)

    Adriansyah, A.; Buijs, J.C.A.M.; La Rosa, M.; Soffer, P.

    2013-01-01

    In systems where process executions are not strictly enforced by a predefined process model, obtaining reliable performance information is not trivial. In this paper, we analyzed an event log of a real-life process, taken from a Dutch financial institute, using process mining techniques. In

  13. Lianas and logging in West Africa

    NARCIS (Netherlands)

    Parren, M.P.E.

    2003-01-01

    The role of lianas in relation to logging activities is analysed in a lowland moist forest in Cameroon. Lianas are an abundant, diverse, and conspicuous growth form in nearly all tropical forests. Lianas are mostly seen as a nuisance by foresters. Cutting of liana stems is an important operation in

  14. Experience in design and construction of the Log tunnel

    Directory of Open Access Journals (Sweden)

    Jovičić Vojkan

    2017-09-01

    Full Text Available A twin highway Log tunnel is a part of a new motorway connection between Maribor and Zagreb, section Draženci-Gruškovje, which is located towards the border crossing between Slovenia and Croatia. The tunnel is currently under construction, and only the excavation works have been completed during the writing of this paper. The terrain in the area of the Log tunnel is diverse, and the route of the highway in its vicinity is characterised by deep excavations, bridges or viaducts. The Log tunnel is approximately 250 m long, partly constructed as a gallery. The geological conditions are dominated by Miocene base rock, featuring layers of well-connected clastic rocks, which are covered by diluvium clays, silts, sands and gravels of different thicknesses. Due to the short length of the tunnel, the usual separation of the motorway route to the left and the right tunnel axes was not carried out. Thus, the tunnel was constructed with an intermediate pillar and was designed as a three-lane tunnel, including the stopping lane. The construction of the tunnel was carried out using the New Austrian tunnelling method (NATM, in which the central adit was excavated first and the intermediate pillar was constructed within it. The excavation of the main tubes followed and was divided into the top heading, bench and the invert, enabling the intermediate pillar to take the load off the top heading of both tubes. The secondary lining of the tunnel is currently under construction. The experience of the tunnel construction gathered so far is presented in the paper. The main emphasis is on the construction of the intermediate pillar, which had to take the significant and asymmetrical ground load.

  15. Experience in design and construction of the Log tunnel

    Science.gov (United States)

    Jovičić, Vojkan; Goleš, Niko; Tori, Matija; Peternel, Miha; Vajović, Stanojle; Muhić, Elvir

    2017-09-01

    A twin highway Log tunnel is a part of a new motorway connection between Maribor and Zagreb, section Draženci-Gru\\vskovje, which is located towards the border crossing between Slovenia and Croatia. The tunnel is currently under construction, and only the excavation works have been completed during the writing of this paper. The terrain in the area of the Log tunnel is diverse, and the route of the highway in its vicinity is characterised by deep excavations, bridges or viaducts. The Log tunnel is approximately 250 m long, partly constructed as a gallery. The geological conditions are dominated by Miocene base rock, featuring layers of well-connected clastic rocks, which are covered by diluvium clays, silts, sands and gravels of different thicknesses. Due to the short length of the tunnel, the usual separation of the motorway route to the left and the right tunnel axes was not carried out. Thus, the tunnel was constructed with an intermediate pillar and was designed as a three-lane tunnel, including the stopping lane. The construction of the tunnel was carried out using the New Austrian tunnelling method (NATM), in which the central adit was excavated first and the intermediate pillar was constructed within it. The excavation of the main tubes followed and was divided into the top heading, bench and the invert, enabling the intermediate pillar to take the load off the top heading of both tubes. The secondary lining of the tunnel is currently under construction. The experience of the tunnel construction gathered so far is presented in the paper. The main emphasis is on the construction of the intermediate pillar, which had to take the significant and asymmetrical ground load.

  16. Nuclear Hartree-Fock approximation testing and other related approximations

    International Nuclear Information System (INIS)

    Cohenca, J.M.

    1970-01-01

    Hartree-Fock, and Tamm-Dancoff approximations are tested for angular momentum of even-even nuclei. Wave functions, energy levels and momenta are comparatively evaluated. Quadripole interactions are studied following the Elliott model. Results are applied to Ne 20 [pt

  17. Requirements-Driven Log Analysis Extended Abstract

    Science.gov (United States)

    Havelund, Klaus

    2012-01-01

    Imagine that you are tasked to help a project improve their testing effort. In a realistic scenario it will quickly become clear, that having an impact is diffcult. First of all, it will likely be a challenge to suggest an alternative approach which is significantly more automated and/or more effective than current practice. The reality is that an average software system has a complex input/output behavior. An automated testing approach will have to auto-generate test cases, each being a pair (i; o) consisting of a test input i and an oracle o. The test input i has to be somewhat meaningful, and the oracle o can be very complicated to compute. Second, even in case where some testing technology has been developed that might improve current practice, it is then likely difficult to completely change the current behavior of the testing team unless the technique is obviously superior and does everything already done by existing technology. So is there an easier way to incorporate formal methods-based approaches than the full edged test revolution? Fortunately the answer is affirmative. A relatively simple approach is to benefit from possibly already existing logging infrastructure, which after all is part of most systems put in production. A log is a sequence of events, generated by special log recording statements, most often manually inserted in the code by the programmers. An event can be considered as a data record: a mapping from field names to values. We can analyze such a log using formal methods, for example checking it against a formal specification. This separates running the system for analyzing its behavior. It is not meant as an alternative to testing since it does not address the important in- put generation problem. However, it offers a solution which testing teams might accept since it has low impact on the existing process. A single person might be assigned to perform such log analysis, compared to the entire testing team changing behavior.

  18. Anomalous self potential (sp) log signatures observed in a water ...

    African Journals Online (AJOL)

    Geophysical logging was done after drilling had been completed in a water well at Okwudor, South Eastern Nigeria. Three electric logs were run viz: Self Potential (SP), Resistivity N16″ and N64″ logs. An anomaly was observed in the SP log. The SP results from this well show some deviation from the standard norm.

  19. Using Web Server Logs in Evaluating Instructional Web Sites.

    Science.gov (United States)

    Ingram, Albert L.

    2000-01-01

    Web server logs contain a great deal of information about who uses a Web site and how they use it. This article discusses the analysis of Web logs for instructional Web sites; reviews the data stored in most Web server logs; demonstrates what further information can be gleaned from the logs; and discusses analyzing that information for the…

  20. Stress wave sorting of red maple logs for structural quality

    Science.gov (United States)

    Xiping Wang; Robert J. Ross; David W. Green; Brian Brashaw; Karl Englund; Michael Wolcott

    2004-01-01

    Existing log grading procedures in the United States make only visual assessments of log quality. These procedures do not incorporate estimates of the modulus of elasticity (MOE) of logs. It is questionable whether the visual grading procedures currently used for logs adequately assess the potential quality of structural products manufactured from them, especially...

  1. Tradeoffs and interdependence in the Alaska cant and log markets.

    Science.gov (United States)

    Donald Flora; Una Woller; Michael. Neergaard

    1990-01-01

    During the 1980s, log exports from Alaska have risen while cant (lumber) exports have declined. Eight explanations for the difference between cant and log market behavior are explored. It seems that declining demand for wood products in Japan and a surge of private-sector log harvests in Alaska are enough to account for the apparent substitution of logs for cants. It...

  2. Performance of sampling methods to estimate log characteristics for wildlife.

    Science.gov (United States)

    Lisa J. Bate; Torolf R. Torgersen; Michael J. Wisdom; Edward O. Garton

    2004-01-01

    Accurate estimation of the characteristics of log resources, or coarse woody debris (CWD), is critical to effective management of wildlife and other forest resources. Despite the importance of logs as wildlife habitat, methods for sampling logs have traditionally focused on silvicultural and fire applications. These applications have emphasized estimates of log volume...

  3. Advanced of X-ray fluorescence logging technique in China

    International Nuclear Information System (INIS)

    Zhou Sichun; Ge Liangquan; Lai Wanchang; Yang Qiang

    2010-01-01

    The paper discuses principle of X-ray fluorescence logging, and introduces advanced of X-ray fluorescence logging technique in China. By 2009, third generation XRF logging instrument has been developed in China, and good logging result has been obtained in Lala copper mine. (authors)

  4. Logging utilization in Idaho: Current and past trends

    Science.gov (United States)

    Eric A. Simmons; Todd A. Morgan; Erik C. Berg; Stanley J. Zarnoch; Steven W. Hayes; Mike T. Thompson

    2014-01-01

    A study of commercial timber-harvesting activities in Idaho was conducted during 2008 and 2011 to characterize current tree utilization, logging operations, and changes from previous Idaho logging utilization studies. A two-stage simple random sampling design was used to select sites and felled trees for measurement within active logging sites. Thirty-three logging...

  5. Displacement length and velocity of tagged logs in the tagliamento river

    Directory of Open Access Journals (Sweden)

    Diego Ravazzolo

    2013-09-01

    Full Text Available Large wood enhance the dynamics of geomorphic processes in river systems, increases the morphological complexity of the channel bed, and provides habitats for fish and invertebrates. On the other side, if transported during high-magnitude events, large wood pieces can increase flood risks in sensitive places such as bridges and narrow cross sections prone to outbank flows. However, the dynamics and mobility of logs in rivers is poorly understood, especially in wide gravel-bed rivers. Recent studies have employed fixed video cameras to assess logs velocity, but little evidence is still available about travel length during flood events of different magnitude. This study was conducted in a valley reach of the Tagliamento river, located in the North East of Italy. The Tagliamento river is approximately 800 m wide in the study area, and is characterized by relatively high natural conditions and complex fluvial dynamics. Log mobility have been studied from June 2010 to October 2011, a period characterized by a relatively high magnitude flood in November 2010. Log mobility and displacement during floods have been measured by implanting active radio transmitters (RFID in 113 logs and GPS track devices in 42 logs. The first devices allow to recover the log after flood events by using a portable antenna, and to derive the displacement length over the monitoring period, whereas the second devices allows to calculate instantaneous (1 sec and average log velocity of moving logs. Recovery rate of logs equipped with RFID and GPS was about 50% and 60%, respectively. A preliminary analysis of the data collected indicates that there is a positive relationship between displacement length and the peak of flood events, as well as a positive relationship between log velocity and the flood magnitude. Also, a critical flow rate over which logs stranded on active bars can be transported has been identified. The ability to predict wood mobility in gravel-bed rivers could

  6. Variational Gaussian approximation for Poisson data

    Science.gov (United States)

    Arridge, Simon R.; Ito, Kazufumi; Jin, Bangti; Zhang, Chen

    2018-02-01

    The Poisson model is frequently employed to describe count data, but in a Bayesian context it leads to an analytically intractable posterior probability distribution. In this work, we analyze a variational Gaussian approximation to the posterior distribution arising from the Poisson model with a Gaussian prior. This is achieved by seeking an optimal Gaussian distribution minimizing the Kullback-Leibler divergence from the posterior distribution to the approximation, or equivalently maximizing the lower bound for the model evidence. We derive an explicit expression for the lower bound, and show the existence and uniqueness of the optimal Gaussian approximation. The lower bound functional can be viewed as a variant of classical Tikhonov regularization that penalizes also the covariance. Then we develop an efficient alternating direction maximization algorithm for solving the optimization problem, and analyze its convergence. We discuss strategies for reducing the computational complexity via low rank structure of the forward operator and the sparsity of the covariance. Further, as an application of the lower bound, we discuss hierarchical Bayesian modeling for selecting the hyperparameter in the prior distribution, and propose a monotonically convergent algorithm for determining the hyperparameter. We present extensive numerical experiments to illustrate the Gaussian approximation and the algorithms.

  7. Lognormal Approximations of Fault Tree Uncertainty Distributions.

    Science.gov (United States)

    El-Shanawany, Ashraf Ben; Ardron, Keith H; Walker, Simon P

    2018-01-26

    Fault trees are used in reliability modeling to create logical models of fault combinations that can lead to undesirable events. The output of a fault tree analysis (the top event probability) is expressed in terms of the failure probabilities of basic events that are input to the model. Typically, the basic event probabilities are not known exactly, but are modeled as probability distributions: therefore, the top event probability is also represented as an uncertainty distribution. Monte Carlo methods are generally used for evaluating the uncertainty distribution, but such calculations are computationally intensive and do not readily reveal the dominant contributors to the uncertainty. In this article, a closed-form approximation for the fault tree top event uncertainty distribution is developed, which is applicable when the uncertainties in the basic events of the model are lognormally distributed. The results of the approximate method are compared with results from two sampling-based methods: namely, the Monte Carlo method and the Wilks method based on order statistics. It is shown that the closed-form expression can provide a reasonable approximation to results obtained by Monte Carlo sampling, without incurring the computational expense. The Wilks method is found to be a useful means of providing an upper bound for the percentiles of the uncertainty distribution while being computationally inexpensive compared with full Monte Carlo sampling. The lognormal approximation method and Wilks's method appear attractive, practical alternatives for the evaluation of uncertainty in the output of fault trees and similar multilinear models. © 2018 Society for Risk Analysis.

  8. Subquadratic medial-axis approximation in $\\mathbb{R}^3$

    Directory of Open Access Journals (Sweden)

    Christian Scheffer

    2015-09-01

    Full Text Available We present an algorithm that approximates the medial axis of a smooth manifold in $\\mathbb{R}^3$ which is given by a sufficiently dense point sample. The resulting, non-discrete approximation is shown to converge to the medial axis as the sampling density approaches infinity. While all previous algorithms guaranteeing convergence have a running time quadratic in the size $n$ of the point sample, we achieve a running time of at most $\\mathcal{O}(n\\log^3 n$. While there is no subquadratic upper bound on the output complexity of previous algorithms for non-discrete medial axis approximation, the output of our algorithm is guaranteed to be of linear size.

  9. Shearlets and Optimally Sparse Approximations

    DEFF Research Database (Denmark)

    Kutyniok, Gitta; Lemvig, Jakob; Lim, Wang-Q

    2012-01-01

    Multivariate functions are typically governed by anisotropic features such as edges in images or shock fronts in solutions of transport-dominated equations. One major goal both for the purpose of compression as well as for an efficient analysis is the provision of optimally sparse approximations...... optimally sparse approximations of this model class in 2D as well as 3D. Even more, in contrast to all other directional representation systems, a theory for compactly supported shearlet frames was derived which moreover also satisfy this optimality benchmark. This chapter shall serve as an introduction...... to and a survey about sparse approximations of cartoon-like images by band-limited and also compactly supported shearlet frames as well as a reference for the state-of-the-art of this research field....

  10. Diophantine approximation and Dirichlet series

    CERN Document Server

    Queffélec, Hervé

    2013-01-01

    This self-contained book will benefit beginners as well as researchers. It is devoted to Diophantine approximation, the analytic theory of Dirichlet series, and some connections between these two domains, which often occur through the Kronecker approximation theorem. Accordingly, the book is divided into seven chapters, the first three of which present tools from commutative harmonic analysis, including a sharp form of the uncertainty principle, ergodic theory and Diophantine approximation to be used in the sequel. A presentation of continued fraction expansions, including the mixing property of the Gauss map, is given. Chapters four and five present the general theory of Dirichlet series, with classes of examples connected to continued fractions, the famous Bohr point of view, and then the use of random Dirichlet series to produce non-trivial extremal examples, including sharp forms of the Bohnenblust-Hille theorem. Chapter six deals with Hardy-Dirichlet spaces, which are new and useful Banach spaces of anal...

  11. Approximations to camera sensor noise

    Science.gov (United States)

    Jin, Xiaodan; Hirakawa, Keigo

    2013-02-01

    Noise is present in all image sensor data. Poisson distribution is said to model the stochastic nature of the photon arrival process, while it is common to approximate readout/thermal noise by additive white Gaussian noise (AWGN). Other sources of signal-dependent noise such as Fano and quantization also contribute to the overall noise profile. Question remains, however, about how best to model the combined sensor noise. Though additive Gaussian noise with signal-dependent noise variance (SD-AWGN) and Poisson corruption are two widely used models to approximate the actual sensor noise distribution, the justification given to these types of models are based on limited evidence. The goal of this paper is to provide a more comprehensive characterization of random noise. We concluded by presenting concrete evidence that Poisson model is a better approximation to real camera model than SD-AWGN. We suggest further modification to Poisson that may improve the noise model.

  12. Rational approximations for tomographic reconstructions

    International Nuclear Information System (INIS)

    Reynolds, Matthew; Beylkin, Gregory; Monzón, Lucas

    2013-01-01

    We use optimal rational approximations of projection data collected in x-ray tomography to improve image resolution. Under the assumption that the object of interest is described by functions with jump discontinuities, for each projection we construct its rational approximation with a small (near optimal) number of terms for a given accuracy threshold. This allows us to augment the measured data, i.e., double the number of available samples in each projection or, equivalently, extend (double) the domain of their Fourier transform. We also develop a new, fast, polar coordinate Fourier domain algorithm which uses our nonlinear approximation of projection data in a natural way. Using augmented projections of the Shepp–Logan phantom, we provide a comparison between the new algorithm and the standard filtered back-projection algorithm. We demonstrate that the reconstructed image has improved resolution without additional artifacts near sharp transitions in the image. (paper)

  13. Approximation methods in probability theory

    CERN Document Server

    Čekanavičius, Vydas

    2016-01-01

    This book presents a wide range of well-known and less common methods used for estimating the accuracy of probabilistic approximations, including the Esseen type inversion formulas, the Stein method as well as the methods of convolutions and triangle function. Emphasising the correct usage of the methods presented, each step required for the proofs is examined in detail. As a result, this textbook provides valuable tools for proving approximation theorems. While Approximation Methods in Probability Theory will appeal to everyone interested in limit theorems of probability theory, the book is particularly aimed at graduate students who have completed a standard intermediate course in probability theory. Furthermore, experienced researchers wanting to enlarge their toolkit will also find this book useful.

  14. Impacts of Unsustainable Mahogany Logging in Bolivia and Peru

    Directory of Open Access Journals (Sweden)

    Roberto F. Kometter

    2004-06-01

    Full Text Available Although bigleaf mahogany [Swietenia macrophylla King (Meliaceae] is the premier timber species of Latin America, its exploitation is unsustainable because of a pattern of local depletion and shifting supply. We surveyed experts on the status of mahogany in Bolivia and Peru, the world's past and present largest exporters. Bolivia no longer has commercially viable mahogany (trees > 60 cm diameter at breast height across 79% of its range. In Peru, mahogany's range has shrunk by 50%, and, within a decade, a further 28% will be logged out. Approximately 15% of the mahogany range in these two countries is protected, but low densities and illegal logging mean that this overestimates the extent of mahogany under protection. The international community can support mahogany conservation by funding park management and by encouraging independent verification of the legality of mahogany in trade. Our findings demonstrate that a systematic expert survey can generate reliable and cost-effective information on the status of widespread species of concern and help to inform appropriate management policy.

  15. Approximate reasoning in physical systems

    International Nuclear Information System (INIS)

    Mutihac, R.

    1991-01-01

    The theory of fuzzy sets provides excellent ground to deal with fuzzy observations (uncertain or imprecise signals, wavelengths, temperatures,etc.) fuzzy functions (spectra and depth profiles) and fuzzy logic and approximate reasoning. First, the basic ideas of fuzzy set theory are briefly presented. Secondly, stress is put on application of simple fuzzy set operations for matching candidate reference spectra of a spectral library to an unknown sample spectrum (e.g. IR spectroscopy). Thirdly, approximate reasoning is applied to infer an unknown property from information available in a database (e.g. crystal systems). Finally, multi-dimensional fuzzy reasoning techniques are suggested. (Author)

  16. Analysing organic transistors based on interface approximation

    International Nuclear Information System (INIS)

    Akiyama, Yuto; Mori, Takehiko

    2014-01-01

    Temperature-dependent characteristics of organic transistors are analysed thoroughly using interface approximation. In contrast to amorphous silicon transistors, it is characteristic of organic transistors that the accumulation layer is concentrated on the first monolayer, and it is appropriate to consider interface charge rather than band bending. On the basis of this model, observed characteristics of hexamethylenetetrathiafulvalene (HMTTF) and dibenzotetrathiafulvalene (DBTTF) transistors with various surface treatments are analysed, and the trap distribution is extracted. In turn, starting from a simple exponential distribution, we can reproduce the temperature-dependent transistor characteristics as well as the gate voltage dependence of the activation energy, so we can investigate various aspects of organic transistors self-consistently under the interface approximation. Small deviation from such an ideal transistor operation is discussed assuming the presence of an energetically discrete trap level, which leads to a hump in the transfer characteristics. The contact resistance is estimated by measuring the transfer characteristics up to the linear region

  17. In situ analysis of coal from single electrode resistance, self-potential and gamma-ray logs

    International Nuclear Information System (INIS)

    Kayal, J.R.

    1981-01-01

    Single electrode resistance, self-potential and gamma-ray logging have been carried out in North Karanpura, West Bokaro and Jharia coalfields of Gondwana basin in Eastern India. Correlation of these geophysical logs is found to be very useful in locating the coal beds, determining their accurate depths and thickness and approximate quality. Coal seams have been detected as very high resistive formations compared to sandstone/shale which are interbedded in the coal basin. High or low self-potential values are obtained against the coal beds depending on the borehole fluid conditions. Burnt coals (Jhama) are characterised as highly conductive beds. Gamma ray logs have been effectively used alongwith electrical logs for correlation and identification of coal seams. Further analysis of gamma-ray log data determines a linear relationship with ash content of coal. (author)

  18. Earth formation porosity log using measurement of neutron energy spectrum

    International Nuclear Information System (INIS)

    1981-01-01

    Methods and apparatus are described for measuring the porosity of subsurface earth formations in the vicinity of a well borehole by means of neutron well logging techniques. All the commercial techniques for measuring porosity currently available are not as accurate as desirable due to variations in the borehole wall diameter, in the borehole fluids (e.g. with chlorine content) in the casings of the borehole etc. This invention seeks to improve accuracy by using a measurement of the epithermal neutron population at one detector and the fast neutron population at a second detector, spaced approximately the same distance from a neutron source. The latter can be detected either by a fast neutron detector or indirectly by an inelastic gamma ray detector. Background correction can be made, and special detectors used, to discriminate against the detection of thermal neutrons or their resultant capture gamma rays. These fluctuations affect the measurement of thermal neutron populations. (U.K.)

  19. Background subtraction system for pulsed neutron logging of earth boreholes

    International Nuclear Information System (INIS)

    Hopkinson, E.C.

    1977-01-01

    A neutron generator in well logging instrument is pulsed 100 times having a time between pulses of 1400 microseconds. This is followed by an off period of four cycles wherein 2800 microseconds is allowed for capture radiation to decay to an insignificant level and the remaining 2800 microseconds is used to measure background radiation. This results in the neutron source being disabled four pulses after every hundred pulses of operation, or approximately a 4 percent loss of neutron output. A first detector gate is open from 400 to 680 microseconds and a second detector gate is open from 700 to 980 microseconds. During the 100 cycles, each of the gates is thus open for 280 microseconds times 100 for a total of 28,000 microseconds. By scaling the gate count rate by a factor of 10, the background is subtracted directly

  20. Leading Democratically

    Science.gov (United States)

    Brookfield, Stephen

    2010-01-01

    Democracy is the most venerated of American ideas, the one for which wars are fought and people die. So most people would probably agree that leaders should be able to lead well in a democratic society. Yet, genuinely democratic leadership is a relative rarity. Leading democratically means viewing leadership as a function or process, rather than…

  1. Limitations and developing directions of pulsed neutron logging

    International Nuclear Information System (INIS)

    Wu Wensheng; Xiao Lizhi

    2007-01-01

    The paper explains briefly the principle of pulsed neutron logging method, summarizes the system and uses of the method in petroleum logging. The paper points out the limitations of pulsed neutron logging such as low precise measurements, low logging speed, plenty of influence factors, low vertical resolution, bad adaptability, difficult logging interpretation and so on, and expounds its developing directions in hardware, software, method and principle. (authors)

  2. Fast approximate convex decomposition using relative concavity

    KAUST Repository

    Ghosh, Mukulika; Amato, Nancy M.; Lu, Yanyan; Lien, Jyh-Ming

    2013-01-01

    Approximate convex decomposition (ACD) is a technique that partitions an input object into approximately convex components. Decomposition into approximately convex pieces is both more efficient to compute than exact convex decomposition and can also generate a more manageable number of components. It can be used as a basis of divide-and-conquer algorithms for applications such as collision detection, skeleton extraction and mesh generation. In this paper, we propose a new method called Fast Approximate Convex Decomposition (FACD) that improves the quality of the decomposition and reduces the cost of computing it for both 2D and 3D models. In particular, we propose a new strategy for evaluating potential cuts that aims to reduce the relative concavity, rather than absolute concavity. As shown in our results, this leads to more natural and smaller decompositions that include components for small but important features such as toes or fingers while not decomposing larger components, such as the torso, that may have concavities due to surface texture. Second, instead of decomposing a component into two pieces at each step, as in the original ACD, we propose a new strategy that uses a dynamic programming approach to select a set of n c non-crossing (independent) cuts that can be simultaneously applied to decompose the component into n c+1 components. This reduces the depth of recursion and, together with a more efficient method for computing the concavity measure, leads to significant gains in efficiency. We provide comparative results for 2D and 3D models illustrating the improvements obtained by FACD over ACD and we compare with the segmentation methods in the Princeton Shape Benchmark by Chen et al. (2009) [31]. © 2012 Elsevier Ltd. All rights reserved.

  3. Fast approximate convex decomposition using relative concavity

    KAUST Repository

    Ghosh, Mukulika

    2013-02-01

    Approximate convex decomposition (ACD) is a technique that partitions an input object into approximately convex components. Decomposition into approximately convex pieces is both more efficient to compute than exact convex decomposition and can also generate a more manageable number of components. It can be used as a basis of divide-and-conquer algorithms for applications such as collision detection, skeleton extraction and mesh generation. In this paper, we propose a new method called Fast Approximate Convex Decomposition (FACD) that improves the quality of the decomposition and reduces the cost of computing it for both 2D and 3D models. In particular, we propose a new strategy for evaluating potential cuts that aims to reduce the relative concavity, rather than absolute concavity. As shown in our results, this leads to more natural and smaller decompositions that include components for small but important features such as toes or fingers while not decomposing larger components, such as the torso, that may have concavities due to surface texture. Second, instead of decomposing a component into two pieces at each step, as in the original ACD, we propose a new strategy that uses a dynamic programming approach to select a set of n c non-crossing (independent) cuts that can be simultaneously applied to decompose the component into n c+1 components. This reduces the depth of recursion and, together with a more efficient method for computing the concavity measure, leads to significant gains in efficiency. We provide comparative results for 2D and 3D models illustrating the improvements obtained by FACD over ACD and we compare with the segmentation methods in the Princeton Shape Benchmark by Chen et al. (2009) [31]. © 2012 Elsevier Ltd. All rights reserved.

  4. Approximate Reanalysis in Topology Optimization

    DEFF Research Database (Denmark)

    Amir, Oded; Bendsøe, Martin P.; Sigmund, Ole

    2009-01-01

    In the nested approach to structural optimization, most of the computational effort is invested in the solution of the finite element analysis equations. In this study, the integration of an approximate reanalysis procedure into the framework of topology optimization of continuum structures...

  5. Approximate Matching of Hierarchial Data

    DEFF Research Database (Denmark)

    Augsten, Nikolaus

    -grams of a tree are all its subtrees of a particular shape. Intuitively, two trees are similar if they have many pq-grams in common. The pq-gram distance is an efficient and effective approximation of the tree edit distance. We analyze the properties of the pq-gram distance and compare it with the tree edit...

  6. All-Norm Approximation Algorithms

    NARCIS (Netherlands)

    Azar, Yossi; Epstein, Leah; Richter, Yossi; Woeginger, Gerhard J.; Penttonen, Martti; Meineche Schmidt, Erik

    2002-01-01

    A major drawback in optimization problems and in particular in scheduling problems is that for every measure there may be a different optimal solution. In many cases the various measures are different ℓ p norms. We address this problem by introducing the concept of an All-norm ρ-approximation

  7. Truthful approximations to range voting

    DEFF Research Database (Denmark)

    Filos-Ratsika, Aris; Miltersen, Peter Bro

    We consider the fundamental mechanism design problem of approximate social welfare maximization under general cardinal preferences on a finite number of alternatives and without money. The well-known range voting scheme can be thought of as a non-truthful mechanism for exact social welfare...

  8. On badly approximable complex numbers

    DEFF Research Database (Denmark)

    Esdahl-Schou, Rune; Kristensen, S.

    We show that the set of complex numbers which are badly approximable by ratios of elements of , where has maximal Hausdorff dimension. In addition, the intersection of these sets is shown to have maximal dimension. The results remain true when the sets in question are intersected with a suitably...

  9. Approximate reasoning in decision analysis

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, M M; Sanchez, E

    1982-01-01

    The volume aims to incorporate the recent advances in both theory and applications. It contains 44 articles by 74 contributors from 17 different countries. The topics considered include: membership functions; composite fuzzy relations; fuzzy logic and inference; classifications and similarity measures; expert systems and medical diagnosis; psychological measurements and human behaviour; approximate reasoning and decision analysis; and fuzzy clustering algorithms.

  10. Rational approximation of vertical segments

    Science.gov (United States)

    Salazar Celis, Oliver; Cuyt, Annie; Verdonk, Brigitte

    2007-08-01

    In many applications, observations are prone to imprecise measurements. When constructing a model based on such data, an approximation rather than an interpolation approach is needed. Very often a least squares approximation is used. Here we follow a different approach. A natural way for dealing with uncertainty in the data is by means of an uncertainty interval. We assume that the uncertainty in the independent variables is negligible and that for each observation an uncertainty interval can be given which contains the (unknown) exact value. To approximate such data we look for functions which intersect all uncertainty intervals. In the past this problem has been studied for polynomials, or more generally for functions which are linear in the unknown coefficients. Here we study the problem for a particular class of functions which are nonlinear in the unknown coefficients, namely rational functions. We show how to reduce the problem to a quadratic programming problem with a strictly convex objective function, yielding a unique rational function which intersects all uncertainty intervals and satisfies some additional properties. Compared to rational least squares approximation which reduces to a nonlinear optimization problem where the objective function may have many local minima, this makes the new approach attractive.

  11. Pythagorean Approximations and Continued Fractions

    Science.gov (United States)

    Peralta, Javier

    2008-01-01

    In this article, we will show that the Pythagorean approximations of [the square root of] 2 coincide with those achieved in the 16th century by means of continued fractions. Assuming this fact and the known relation that connects the Fibonacci sequence with the golden section, we shall establish a procedure to obtain sequences of rational numbers…

  12. Ultrafast Approximation for Phylogenetic Bootstrap

    NARCIS (Netherlands)

    Bui Quang Minh, [No Value; Nguyen, Thi; von Haeseler, Arndt

    Nonparametric bootstrap has been a widely used tool in phylogenetic analysis to assess the clade support of phylogenetic trees. However, with the rapidly growing amount of data, this task remains a computational bottleneck. Recently, approximation methods such as the RAxML rapid bootstrap (RBS) and

  13. Testing of dynamic multileaf collimator by dynamic log file

    International Nuclear Information System (INIS)

    Ono, Kaoru; Nakamura, Tetsuji; Yamato, Shinichirou; Miyazawa, Masanori

    2007-01-01

    Intensity-modulated radiation therapy (IMRT) represents one of the most significant technical advances in radiation therapy. In the dynamic multileaf collimator (MLC) method of IMRT delivery, because of the relatively small gaps between opposed leaves and because most regions are shielded by leaves most of the time, the delivered dose is very sensitive to MLC leaf positional accuracy. A variation of ±0.2 mm in the gap width can result in a dose variation of ±3% for each clinical dynamic MLC field. Most often the effects of leaf motion are inferred from dose deviations on film or from variations in ionization measurements. These techniques provide dosimetric information but do not provide detailed information for diagnosing delivery problems. Therefore, a dynamic log file (Dynalog file) was used to verify dynamic MLC leaf positional accuracy. Measuring for narrow gaps using the thickness gauge could detect a log file accuracy of approximately 0.1 mm. The accuracy of dynamic MLC delivery depends on the accuracy with which the velocity of each leaf is controlled. We studied the relationship between leaf positional accuracy and leaf velocity. Leaf velocity of 0.7 cm/sec caused approximately 0.2 mm leaf positional variation. We then analyzed leaf positional accuracy for the clinical dynamic MLC field using Dynalog File Viewer (Varian Medical Systems, Inc., Palo Alto, California (CA)), and developed a new program that can analyze more detailed leaf motions. Using this program, we can obtain more detailed information, and therefore can determine the source of dose uncertainties for the dynamic MLC field. (author)

  14. Cross-sections for semihard interactions in hadronic collisions beyond the leading order of perturbative QCD

    International Nuclear Information System (INIS)

    Kwiecinski, J.

    1986-09-01

    Estimate of cross-sections which correspond to semihard interactions such as gluon (mini) jet production is presented. It takes into account recent results concerning gluon distributions in the small x region beyond the leading logQ 2 approximation and rescattering corrections in the hadron-hadron channel. The estimated cross-sections are at very high energies significantly smaller in their magnitude than simple minded integration of the two-jet inclusive cross-section might imply yet they are still expected to constitute a substantial part of σ tot in the TeV energy regime. 18 refs., 2 figs. (author)

  15. Theoretical and Numerical Study of Seismoelectric Logs for Logging While Drilling (LWD

    Directory of Open Access Journals (Sweden)

    Sun Xiang-Yang

    2017-01-01

    Full Text Available When the acoustic field propagates in the porous medium, the electromagnetic wave can be induced by the seismoelectric effects which can be used in the logging. This paper studies the seismoelectric wave field and deduces the formulations of the acoustic and electromagnetic field of the liquid in the well, and gives the acoustic and electromagnetic boundary conditions between the driller collar and the log liquid, when the driller collar is added. We also do the numerical simulation of the seismoelectric wave field excited by monopole source, study the velocity dispersion characteristics of the acoustic and electromagnetic field, and investigate the detective depth of the seismoelectric logs. Through the simulation we know the seismoelectric logs can avoid the interference of drill collar wave. This paper also provides theoretical guidance for the design of receiving antenna.

  16. Comparative analysis of nuclear magnetic resonance well logging and nuclear magnetic resonance mud logging

    International Nuclear Information System (INIS)

    Yuan Zugui

    2008-01-01

    The hydrogen atoms in oil and water are able to resonate and generate signals in the magnetic field, which is used by the NMR (nuclear magnetic resonance) technology in petroleum engineering to research and evaluate rock characteristics. NMR well logging was used to measure the physical property parameters of the strata in well bore, whereas NMR mud logging was used to analyze (while drilling) the physical property parameters of cores, cuttings and sidewall coring samples on surface (drilling site). Based on the comparative analysis of the porosity and permeability parameters obtained by NMR well logging and those from analysis of the cores, cuttings and sidewall coring samples by NMR mud logging in the same depth of 13 wells, these two methods are of certain difference, but their integral tendency is relatively good. (authors)

  17. Turbo Equalization Using Partial Gaussian Approximation

    DEFF Research Database (Denmark)

    Zhang, Chuanzong; Wang, Zhongyong; Manchón, Carles Navarro

    2016-01-01

    This letter deals with turbo equalization for coded data transmission over intersymbol interference (ISI) channels. We propose a message-passing algorithm that uses the expectation propagation rule to convert messages passed from the demodulator and decoder to the equalizer and computes messages...... returned by the equalizer by using a partial Gaussian approximation (PGA). We exploit the specific structure of the ISI channel model to compute the latter messages from the beliefs obtained using a Kalman smoother/equalizer. Doing so leads to a significant complexity reduction compared to the initial PGA...

  18. A New Closed Form Approximation for BER for Optical Wireless Systems in Weak Atmospheric Turbulence

    Science.gov (United States)

    Kaushik, Rahul; Khandelwal, Vineet; Jain, R. C.

    2018-04-01

    Weak atmospheric turbulence condition in an optical wireless communication (OWC) is captured by log-normal distribution. The analytical evaluation of average bit error rate (BER) of an OWC system under weak turbulence is intractable as it involves the statistical averaging of Gaussian Q-function over log-normal distribution. In this paper, a simple closed form approximation for BER of OWC system under weak turbulence is given. Computation of BER for various modulation schemes is carried out using proposed expression. The results obtained using proposed expression compare favorably with those obtained using Gauss-Hermite quadrature approximation and Monte Carlo Simulations.

  19. CS model coil experimental log book

    Energy Technology Data Exchange (ETDEWEB)

    Nishijima, Gen; Sugimoto, Makoto; Nunoya, Yoshihiko; Wakabayashi, Hiroshi; Tsuji, Hiroshi [Japan Atomic Energy Research Inst., Naka, Ibaraki (Japan). Naka Fusion Research Establishment

    2001-02-01

    Charging test of the ITER CS Model Coil which is the world's largest superconducting pulse coil and the CS Insert Coil had started at April 11, 2000 and had completed at August 18, 2000. In the campaign, total shot numbers were 356 and the size of the data file in the DAS (Data Acquisition System) was over 20 GB. This report is a database that consists of the log list and the log sheets of every shot. One can access the database, make a search, and browse results via Internet (http://1ogwww.naka.jaeri.go.jp). The database will be useful to quick search to choose necessary shots. (author)

  20. High resolution gamma spectroscopy well logging system

    International Nuclear Information System (INIS)

    Giles, J.R.; Dooley, K.J.

    1997-01-01

    A Gamma Spectroscopy Logging System (GSLS) has been developed to study sub-surface radionuclide contamination. The absolute counting efficiencies of the GSLS detectors were determined using cylindrical reference sources. More complex borehole geometries were modeled using commercially available shielding software and correction factors were developed based on relative gamma-ray fluence rates. Examination of varying porosity and moisture content showed that as porosity increases, and as the formation saturation ratio decreases, relative gamma-ray fluence rates increase linearly for all energies. Correction factors for iron and water cylindrical shields were found to agree well with correction factors determined during previous studies allowing for the development of correction factors for type-304 stainless steel and low-carbon steel casings. Regression analyses of correction factor data produced equations for determining correction factors applicable to spectral gamma-ray well logs acquired under non-standard borehole conditions

  1. Well logging system with linearity control

    International Nuclear Information System (INIS)

    Jones, J.M.

    1973-01-01

    Apparatus is described for controlling the gain of a nuclear well logging system comprising: (1) means for measuring the energy spectrum of gamma rays produced by earth formation materials surrounding a well borehole; (2) means for measuring the number of counts of a gamma rays having an energy falling within each of at least two predetermined energy band portions of the gamma ray energy spectrum; (3) means for generating a signal proportional to the ratio of the gamma ray counts and for comparing the ratio signal with at least one constant ratio calibration signal; (4) means for generating an error signal representative of the difference of the ratio signal and the constant ratio calibration signal; and (5) means for using the error signal to control the linearity of the well logging system. (author)

  2. Assessment of radiation safety in well logging

    International Nuclear Information System (INIS)

    Alles, A.; Pérez, Y.; Duménigo, C.

    2015-01-01

    Radiation safety assessments required by current regulations are a means to verify compliance with the requirements. Different methods have been used for this purpose. In the paper the results of applying the method of risk matrices, applied for the first time in the practice of well logging are exposed. For each initiating event frequency of occurrence, the severity of its consequences and the probability of failure of the barriers identified were evaluated. Starting from these assumptions, the risk associated is determined for each of the identified accident sequences, using for this the SEVRRA code 'Risk Assessment System', originally designed for use in radiotherapy. As an result sequences increased risk associated with the practice of well logging were identified, which is the starting point for the further implementation of a coherent program of dose optimization in practice. [es

  3. No chiral truncation of quantum log gravity?

    Science.gov (United States)

    Andrade, Tomás; Marolf, Donald

    2010-03-01

    At the classical level, chiral gravity may be constructed as a consistent truncation of a larger theory called log gravity by requiring that left-moving charges vanish. In turn, log gravity is the limit of topologically massive gravity (TMG) at a special value of the coupling (the chiral point). We study the situation at the level of linearized quantum fields, focussing on a unitary quantization. While the TMG Hilbert space is continuous at the chiral point, the left-moving Virasoro generators become ill-defined and cannot be used to define a chiral truncation. In a sense, the left-moving asymptotic symmetries are spontaneously broken at the chiral point. In contrast, in a non-unitary quantization of TMG, both the Hilbert space and charges are continuous at the chiral point and define a unitary theory of chiral gravity at the linearized level.

  4. Modelo de custos logísticos

    Directory of Open Access Journals (Sweden)

    José Vanderlei Silva Borba

    2010-05-01

    Full Text Available Em contexto de globalização, a distância física entre produtores de bens e de serviços e consumidores deixa de ser relevante. Isso determina que o gerenciamento de custos logísticos venha agregar valor relevante aos produtos comercializados, pois procura identificar e determinar a eficácia dos recursos consumidos internamente pela empresa e, externamente, procura fazer a análise da cadeia de valor. Nessa perspectiva, a definição das variáveis de custos está além de seus muros. Este trabalho propõe um modelo de apuração de custos logísticos, que atenda, simultaneamente, os custos de suprimentos e os custos de distribuição, com impactos sobre o processo de tomada de decisão.

  5. Development of a digital log ratemeter

    International Nuclear Information System (INIS)

    Domienikan, Claudio; Brito, Andreia; Toledo, Fabio de; Zahn, Guilherme S.

    2011-01-01

    A compact log ratemeter that measures and displays an average count rate through a microcomputer is presented. This ratemeter was developed to be used to monitor a laboratory of production of radioactive samples and also for teaching purposes. The main features are log measurement range from .1 to 1.000 counts/sec and adjustable level alarm. The electronic circuit uses a Geiger tube LND7224, and the processed signal is applied to a National Instruments Multifunction I/O USB-6008 connected to a PC through USB input. A program developed in LabView allows storage of data and real-time observation of the rate of radiation evolution. This ratemeter was designed and constructed in the IPEN-CNEN/SP. (author)

  6. Glass scintillator pair for compensation neutron logging

    International Nuclear Information System (INIS)

    Ji Changsong; Li Xuezhi; Yiu Guangduo

    1985-01-01

    Glass scintillator pair types ST 1604 and ST 1605 for compensation of neutron logging is developed. The neutron sensitive material used is multistick lithium glass scintillators 3 and 4 mm in diameter respectively. Thermoneutron detection efficiencies are 50-60% and 100% respectively. The detection efficiency for 60 Co γ ray is lower than 0.3%. The type ST 1604 and ST 1605 may also be used as high sensitive neutron detectors in an intensive γ ray field

  7. Log Gaussian Cox processes on the sphere

    DEFF Research Database (Denmark)

    Pacheco, Francisco Andrés Cuevas; Møller, Jesper

    We define and study the existence of log Gaussian Cox processes (LGCPs) for the description of inhomogeneous and aggregated/clustered point patterns on the d-dimensional sphere, with d = 2 of primary interest. Useful theoretical properties of LGCPs are studied and applied for the description of sky...... positions of galaxies, in comparison with previous analysis using a Thomas process. We focus on simple estimation procedures and model checking based on functional summary statistics and the global envelope test....

  8. Methods for calibrating radioactivity well logging tools

    International Nuclear Information System (INIS)

    Waggoner, J.A.; Turcotte, R.E.; Hunt-Grubbe, R.H.

    1981-01-01

    Field-calibrating of well-logging tools is achieved by means of a sleeve, which has radioactive material distributed therein, and which envelopes the portion of the tool housing containing the detector. Accurate calibration can be performed and the source can be made considerably weaker than those now in use as it can be brought very close to the detector thus lessening errors. (U.K.)

  9. SDSS Log Viewer: visual exploratory analysis of large-volume SQL log data

    Science.gov (United States)

    Zhang, Jian; Chen, Chaomei; Vogeley, Michael S.; Pan, Danny; Thakar, Ani; Raddick, Jordan

    2012-01-01

    User-generated Structured Query Language (SQL) queries are a rich source of information for database analysts, information scientists, and the end users of databases. In this study a group of scientists in astronomy and computer and information scientists work together to analyze a large volume of SQL log data generated by users of the Sloan Digital Sky Survey (SDSS) data archive in order to better understand users' data seeking behavior. While statistical analysis of such logs is useful at aggregated levels, efficiently exploring specific patterns of queries is often a challenging task due to the typically large volume of the data, multivariate features, and data requirements specified in SQL queries. To enable and facilitate effective and efficient exploration of the SDSS log data, we designed an interactive visualization tool, called the SDSS Log Viewer, which integrates time series visualization, text visualization, and dynamic query techniques. We describe two analysis scenarios of visual exploration of SDSS log data, including understanding unusually high daily query traffic and modeling the types of data seeking behaviors of massive query generators. The two scenarios demonstrate that the SDSS Log Viewer provides a novel and potentially valuable approach to support these targeted tasks.

  10. Estimation of the non records logs from existing logs using artificial neural networks

    Directory of Open Access Journals (Sweden)

    Mehdi Mohammad Salehi

    2017-12-01

    Full Text Available Finding the information of the hydrocarbon reservoirs from well logs is one of the main objectives of the engineers. But, missing the log records (due to many reasons such as broken instruments, unsuitable borehole and etc. is a major challenge to achieve it. Prediction of the density and resistivity logs (Rt, DT and LLS from the conventional wire-line logs in one of the Iranian southwest oil fields is the main purpose of this study. Multilayer neural network was applied to develop an intelligent predictive model for prediction of the logs. A total of 3000 data sets from 3 wells (A, B and C of the studied field were used. Among them, the data of A, B and C wells were used to constructing and testing the model, respectively. To evaluate the performance of the model, the mean square error (MSE and correlation coefficient (R2 in the test data were calculated. A comparison between the MSE of the proposed model and recently intelligent models shows that the proposed model is more accurate than others. Acceptable accuracy and using conventional well logging data are the highlight advantages of the proposed intelligent model.

  11. Polarized constituent quarks in NLO approximation

    International Nuclear Information System (INIS)

    Khorramian, Ali N.; Tehrani, S. Atashbar; Mirjalili, A.

    2006-01-01

    The valon representation provides a basis between hadrons and quarks, in terms of which the bound-state and scattering properties of hadrons can be united and described. We studied polarized valon distributions which have an important role in describing the spin dependence of parton distribution in leading and next-to-leading order approximation. Convolution integral in frame work of valon model as a useful tool, was used in polarized case. To obtain polarized parton distributions in a proton we need to polarized valon distribution in a proton and polarized parton distributions inside the valon. We employed Bernstein polynomial averages to get unknown parameters of polarized valon distributions by fitting to available experimental data

  12. Chiral gravity, log gravity, and extremal CFT

    International Nuclear Information System (INIS)

    Maloney, Alexander; Song Wei; Strominger, Andrew

    2010-01-01

    We show that the linearization of all exact solutions of classical chiral gravity around the AdS 3 vacuum have positive energy. Nonchiral and negative-energy solutions of the linearized equations are infrared divergent at second order, and so are removed from the spectrum. In other words, chirality is confined and the equations of motion have linearization instabilities. We prove that the only stationary, axially symmetric solutions of chiral gravity are BTZ black holes, which have positive energy. It is further shown that classical log gravity--the theory with logarithmically relaxed boundary conditions--has finite asymptotic symmetry generators but is not chiral and hence may be dual at the quantum level to a logarithmic conformal field theories (CFT). Moreover we show that log gravity contains chiral gravity within it as a decoupled charge superselection sector. We formally evaluate the Euclidean sum over geometries of chiral gravity and show that it gives precisely the holomorphic extremal CFT partition function. The modular invariance and integrality of the expansion coefficients of this partition function are consistent with the existence of an exact quantum theory of chiral gravity. We argue that the problem of quantizing chiral gravity is the holographic dual of the problem of constructing an extremal CFT, while quantizing log gravity is dual to the problem of constructing a logarithmic extremal CFT.

  13. Gerencia logística y global

    Directory of Open Access Journals (Sweden)

    Pablo Cesar Ocampo Vélez

    2009-04-01

    Full Text Available La logística es una filosofía que se encarga de aplicar las buenas pá¡cticas en los macroprocesos, procesos, procedimientos, tareas y productos dentro de una organización, con el fin de satisfacer las necesidades del cliente, quien es la razón de ser de la empresa. Existen entes internacionales que velan porque las compañias en todo el mundo utilicen y difundan las diferentes disciplinas logísticas en toda la red de valor y tengan un mismo enfoque estratégico.El objetivo de este artículo es explicar la existencia de procesos y macroprocesos de clase mundial en la logística, gracias a los cuales hay una gran oportunidad de mejora para los empresarios colombianos, con el fin de reestructurar los procesos estratégicos, tácticos y operacionales de cada Unidad de Negocio, para que sean organizaciones más competitivas, que puedan enfrentar los tratados de libre comercio, brindando mayor sostenibilidad y óptimo nivel de servicio.

  14. Leading change.

    Science.gov (United States)

    2017-02-27

    In response to feedback from nursing, midwifery and other care staff who wanted to understand better how the Leading Change, Adding Value framework applies to them, NHS England has updated its webpage to include practice examples.

  15. Beyond the random phase approximation

    DEFF Research Database (Denmark)

    Olsen, Thomas; Thygesen, Kristian S.

    2013-01-01

    We assess the performance of a recently proposed renormalized adiabatic local density approximation (rALDA) for ab initio calculations of electronic correlation energies in solids and molecules. The method is an extension of the random phase approximation (RPA) derived from time-dependent density...... functional theory and the adiabatic connection fluctuation-dissipation theorem and contains no fitted parameters. The new kernel is shown to preserve the accurate description of dispersive interactions from RPA while significantly improving the description of short-range correlation in molecules, insulators......, and metals. For molecular atomization energies, the rALDA is a factor of 7 better than RPA and a factor of 4 better than the Perdew-Burke-Ernzerhof (PBE) functional when compared to experiments, and a factor of 3 (1.5) better than RPA (PBE) for cohesive energies of solids. For transition metals...

  16. Hydrogen: Beyond the Classic Approximation

    International Nuclear Information System (INIS)

    Scivetti, Ivan

    2003-01-01

    The classical nucleus approximation is the most frequently used approach for the resolution of problems in condensed matter physics.However, there are systems in nature where it is necessary to introduce the nuclear degrees of freedom to obtain a correct description of the properties.Examples of this, are the systems with containing hydrogen.In this work, we have studied the resolution of the quantum nuclear problem for the particular case of the water molecule.The Hartree approximation has been used, i.e. we have considered that the nuclei are distinguishable particles.In addition, we have proposed a model to solve the tunneling process, which involves the resolution of the nuclear problem for configurations of the system away from its equilibrium position

  17. Approximation errors during variance propagation

    International Nuclear Information System (INIS)

    Dinsmore, Stephen

    1986-01-01

    Risk and reliability analyses are often performed by constructing and quantifying large fault trees. The inputs to these models are component failure events whose probability of occuring are best represented as random variables. This paper examines the errors inherent in two approximation techniques used to calculate the top event's variance from the inputs' variance. Two sample fault trees are evaluated and several three dimensional plots illustrating the magnitude of the error over a wide range of input means and variances are given

  18. A history of nuclear well logging in the oil industry

    International Nuclear Information System (INIS)

    Tittle, C.W.

    1989-01-01

    Spurred by an interest in logging through steel casing γ-ray logging began in the late 1930s followed soon by neutron logging for porosity. These were the first two nuclear well logs. Gamma-gamma density logging was developed during the 1950s. Pulsed neutron lifetime logging appeared in the 1960s; the slim tools came in the early 1970s. Developments since then have included dual detector devices of several types which offered improved measurements or interpretation, γ-ray spectrometry logging (natural and neutron-induced) which identifies certain chemical elements, induced radioactivity logging, and the photoelectric absorption log, which, combined with the density log in a single tool, is known as litho-density logging. A combination of several γ-ray spectrometers in one tool, designed to determine 10 formation elements, was recently introduced, and a new neutron porosity tool measuring epithermal neutron die-away time has been developed. Digital transmission of logging data was a step forward in about 1975. Also, log interpretation techniques have greatly expanded since the advent of digital computers, and the microcomputer has had a distinct impact. It is now practical and economical to do iterative analysis on a suite of logs to obtain an optimum overall interpretation. (author)

  19. WKB approximation in atomic physics

    International Nuclear Information System (INIS)

    Karnakov, Boris Mikhailovich

    2013-01-01

    Provides extensive coverage of the Wentzel-Kramers-Brillouin approximation and its applications. Presented as a sequence of problems with highly detailed solutions. Gives a concise introduction for calculating Rydberg states, potential barriers and quasistationary systems. This book has evolved from lectures devoted to applications of the Wentzel-Kramers-Brillouin- (WKB or quasi-classical) approximation and of the method of 1/N -expansion for solving various problems in atomic and nuclear physics. The intent of this book is to help students and investigators in this field to extend their knowledge of these important calculation methods in quantum mechanics. Much material is contained herein that is not to be found elsewhere. WKB approximation, while constituting a fundamental area in atomic physics, has not been the focus of many books. A novel method has been adopted for the presentation of the subject matter, the material is presented as a succession of problems, followed by a detailed way of solving them. The methods introduced are then used to calculate Rydberg states in atomic systems and to evaluate potential barriers and quasistationary states. Finally, adiabatic transition and ionization of quantum systems are covered.

  20. Unification of acoustic drillhole logging data

    International Nuclear Information System (INIS)

    Oehman, I.; Palmen, J.; Heikkinen, E.

    2009-04-01

    Posiva Oy prepares for disposal of spent nuclear fuel in bedrock in Olkiluoto, Eurajoki. This is in accordance of the application filed in 1999, the Decision-in-Principle of the State Council in 2000, and ratification by the Parliament in 2001. The site characterization at Olkiluoto has included comprehensive geological, hydrological, geochemical and geophysical investigations airborne, on ground and in drillholes since 1988. One of key techniques in geophysical drillhole surveys has been acoustic full waveform logging, which has been implemented since 1994. Various tools have been used in acquisition of acoustic data and several processing techniques have been applied. The logging work and processing to P and S wave velocities has been previously carried out on single drillhole basis. Comparisons to actual values and levels have not been made, and the results have not been calibrated. Therefore results for different drillholes have not been comparable. Resolution of the P and S wave velocity has been rather coarse, and depth correlation to the core data has been on tentative level. As the investigation data has been accumulating, it has become possible to correlate the results to geological and laboratory control data and to calibrate the results of separate measurement campaigns and different drillholes together onto same reference level and resolution. The presented technique has been applied for drillhole OL-KR29 onwards and has set the processing standard, settings and reference levels for later surveys. This approach will further assist the application of the method for mapping and numerical description of lithology variation and possible effect of alteration and deformation on it. Further on, the P and S wave velocity data together with density can be used in computing of dynamic in situ rock mechanical parameters, and possibly in correlating rock strength laboratory data to P and S wave velocity logging data. The acoustic logging data from drillholes OL-KR1

  1. A Lower Bound on the Differential Entropy of Log-Concave Random Vectors with Applications

    Directory of Open Access Journals (Sweden)

    Arnaud Marsiglietti

    2018-03-01

    Full Text Available We derive a lower bound on the differential entropy of a log-concave random variable X in terms of the p-th absolute moment of X. The new bound leads to a reverse entropy power inequality with an explicit constant, and to new bounds on the rate-distortion function and the channel capacity. Specifically, we study the rate-distortion function for log-concave sources and distortion measure d ( x , x ^ = | x − x ^ | r , with r ≥ 1 , and we establish that the difference between the rate-distortion function and the Shannon lower bound is at most log ( π e ≈ 1 . 5 bits, independently of r and the target distortion d. For mean-square error distortion, the difference is at most log ( π e 2 ≈ 1 bit, regardless of d. We also provide bounds on the capacity of memoryless additive noise channels when the noise is log-concave. We show that the difference between the capacity of such channels and the capacity of the Gaussian channel with the same noise power is at most log ( π e 2 ≈ 1 bit. Our results generalize to the case of a random vector X with possibly dependent coordinates. Our proof technique leverages tools from convex geometry.

  2. Effects of post-fire logging on California spotted owl occupancy

    Directory of Open Access Journals (Sweden)

    Chad T. Hanson

    2018-01-01

    Full Text Available In fire-adapted forest ecosystems around the world, there has been growing concern about adverse impacts of post-fire logging on native biodiversity and ecological processes. This is also true in conifer forests of California, U.S.A. which are home to a rare and declining owl subspecies, the California spotted owl (Strix occidentalis occidentalis. While there has been recent concern about the California spotted owl occupancy in large fire areas where some territories have substantial high-severity fire effects, the influence of post-fire logging on the California spotted owl occupancy has been investigated very little, leading to some uncertainty about interpretation of conflicting results in different large fires. Research has found these owls preferentially select high-severity fire areas, characterised by high levels of snags and native shrubs, for foraging in forests that were not logged after fire, suggesting that removal of this foraging habitat might impact occupancy. The authors assessed the effect of post-fire logging and high-severity fire, on occupancy of this subspecies in eight large fire areas, within spotted owl sites with two different levels of high-severity fire effects. They found a significant adverse effect of such logging and no effect of high-severity fire alone. These results indicate it is post-fire logging, not large fires themselves, that poses a conservation threat to this imperilled species.

  3. Ecotoxicology: Lead

    Science.gov (United States)

    Scheuhammer, A.M.; Beyer, W.N.; Schmitt, C.J.; Jorgensen, Sven Erik; Fath, Brian D.

    2008-01-01

    Lead (Pb) is a naturally occurring metallic element; trace concentrations are found in all environmental media and in all living things. However, certain human activities, especially base metal mining and smelting; combustion of leaded gasoline; the use of Pb in hunting, target shooting, and recreational angling; the use of Pb-based paints; and the uncontrolled disposal of Pb-containing products such as old vehicle batteries and electronic devices have resulted in increased environmental levels of Pb, and have created risks for Pb exposure and toxicity in invertebrates, fish, and wildlife in some ecosystems.

  4. Approximate solutions to Mathieu's equation

    Science.gov (United States)

    Wilkinson, Samuel A.; Vogt, Nicolas; Golubev, Dmitry S.; Cole, Jared H.

    2018-06-01

    Mathieu's equation has many applications throughout theoretical physics. It is especially important to the theory of Josephson junctions, where it is equivalent to Schrödinger's equation. Mathieu's equation can be easily solved numerically, however there exists no closed-form analytic solution. Here we collect various approximations which appear throughout the physics and mathematics literature and examine their accuracy and regimes of applicability. Particular attention is paid to quantities relevant to the physics of Josephson junctions, but the arguments and notation are kept general so as to be of use to the broader physics community.

  5. Approximate Inference for Wireless Communications

    DEFF Research Database (Denmark)

    Hansen, Morten

    This thesis investigates signal processing techniques for wireless communication receivers. The aim is to improve the performance or reduce the computationally complexity of these, where the primary focus area is cellular systems such as Global System for Mobile communications (GSM) (and extensions...... to the optimal one, which usually requires an unacceptable high complexity. Some of the treated approximate methods are based on QL-factorization of the channel matrix. In the work presented in this thesis it is proven how the QL-factorization of frequency-selective channels asymptotically provides the minimum...

  6. Quantum tunneling beyond semiclassical approximation

    International Nuclear Information System (INIS)

    Banerjee, Rabin; Majhi, Bibhas Ranjan

    2008-01-01

    Hawking radiation as tunneling by Hamilton-Jacobi method beyond semiclassical approximation is analysed. We compute all quantum corrections in the single particle action revealing that these are proportional to the usual semiclassical contribution. We show that a simple choice of the proportionality constants reproduces the one loop back reaction effect in the spacetime, found by conformal field theory methods, which modifies the Hawking temperature of the black hole. Using the law of black hole mechanics we give the corrections to the Bekenstein-Hawking area law following from the modified Hawking temperature. Some examples are explicitly worked out.

  7. Generalized Gradient Approximation Made Simple

    International Nuclear Information System (INIS)

    Perdew, J.P.; Burke, K.; Ernzerhof, M.

    1996-01-01

    Generalized gradient approximations (GGA close-quote s) for the exchange-correlation energy improve upon the local spin density (LSD) description of atoms, molecules, and solids. We present a simple derivation of a simple GGA, in which all parameters (other than those in LSD) are fundamental constants. Only general features of the detailed construction underlying the Perdew-Wang 1991 (PW91) GGA are invoked. Improvements over PW91 include an accurate description of the linear response of the uniform electron gas, correct behavior under uniform scaling, and a smoother potential. copyright 1996 The American Physical Society

  8. Blood lead levels and risk factors for lead poisoning among children in Jakarta, Indonesia

    Energy Technology Data Exchange (ETDEWEB)

    Albalak, Rachel; Noonan, Gary; Buchanan, Sharunda; Flanders, W. Dana; Gotway-Crawford, Carol; Blumenthal, Wendy; Curtis, Gerald; McGeehin, Michael A. [Division of Environmental Hazards and Health Effects, National Center for Environmental Health, Centers for Disease Control and Prevention, 1600 Clifton Rd. Mailstop E-19, Atlanta, GA 30333 (United States); Kim, Dennis; Tan, Regina [Epidemic Intelligence Service, Epidemiology Program Office, Centers for Disease Control and Prevention, 1600 Clifton Rd. Mailstop D-18, Atlanta, GA 30333 (United States); Jones, Robert L. [Division of Laboratory Sciences, National Center for Environmental Health, Centers for Disease Control and Prevention, 1600 Clifton Rd. Mailstop F-18, Atlanta, GA 30333 (United States); Sulaiman, Rini [Swisscontact, Jl. Wijaya XII No. 44, Jakarta (Indonesia) 12160

    2003-01-01

    The phase-out of leaded gasoline began in Jakarta, Indonesia on July 1, 2001. We evaluated mean blood lead levels (BLLs) and the prevalence of elevated BLLs of Jakarta school children and assessed risk factors for lead exposure in these children before the beginning of the phase-out activities. The study involved a population-based, cross-sectional blood lead survey that included capillary blood lead sampling and a brief questionnaire on risk factors for lead poisoning. A cluster survey design was used. Forty clusters, defined as primary schools in Jakarta, and 15 2nd- and 3rd-grade children in each cluster were randomly selected for participation in the study. The average age of children in this study was 8.6 years (range 6-12) and the geometric mean BLL of the children was 8.6 {mu}g/dl (median: 8.6 {mu}g/dl; range: 2.6-24.1 {mu}g/dl) (n=397). Thirty-five percent of children had BLLs {>=}10 {mu}g/dl and 2.4% had BLLs {>=}20 {mu}g/dl. Approximately one-fourth of children had BLLs 10-14.9 {mu}g/dl. In multivariate models, level of education of the child's primary caregiver, water collection method, home varnishing and occupational recycling of metals, other than lead, by a family member were predictors of log BLLs after adjustment for age and sex. BLLs of children who lived near a highway or major intersection were significantly higher than those of children who lived near a street with little or no traffic when level of education was not included in the model. Water collection method was a significant predictor of BLLs {>=}10 {mu}g/dl after adjustment for age and sex. BLLs in children in this study were moderately high and consistent with BLLs of children in other countries where leaded gasoline is used. With the phase-out of leaded gasoline, BLLs of children in Jakarta are expected to rapidly decline as they have in other countries that have phased lead out of gasoline.

  9. Leading men

    DEFF Research Database (Denmark)

    Bekker-Nielsen, Tønnes

    2016-01-01

    Through a systematic comparison of c. 50 careers leading to the koinarchate or high priesthood of Asia, Bithynia, Galatia, Lycia, Macedonia and coastal Pontus, as described in funeral or honorary inscriptions of individual koinarchs, it is possible to identify common denominators but also disting...

  10. Generalized localization for the double trigonometric Fourier series and the Walsh-Fourier series of functions in L log +L log + log +L

    International Nuclear Information System (INIS)

    Bloshanskaya, S K; Bloshanskii, I L; Roslova, T Y

    1998-01-01

    For an arbitrary open set Ω subset of I 2 =[0,1) 2 and an arbitrary function f element of L log + L log + log + L(I 2 ) such that f=0 on Ω the double Fourier series of f with respect to the trigonometric system Ψ=E and the Walsh-Paley system Ψ=W is shown to converge to zero (over rectangles) almost everywhere on Ω. Thus, it is proved that generalized localization almost everywhere holds on arbitrary open subsets of the square I 2 for the double trigonometric Fourier series and the Walsh-Fourier series of functions in the class L log + L log + log + L (in the case of summation over rectangles). It is also established that such localization breaks down on arbitrary sets that are not dense in I 2 , in the classes Φ Ψ (L)(I 2 ) for the orthonormal system Ψ=E and an arbitrary function such that Φ E (u)=o(u log + log + u) as u→∞ or for Φ W (u)=u( log + log + u) 1-ε , 0<ε<1

  11. A novel approach proposed for fractured zone detection using petrophysical logs

    International Nuclear Information System (INIS)

    Tokhmechi, B; Memarian, H; Noubari, H A; Moshiri, B

    2009-01-01

    Fracture detection is a key step in wellbore stability and fractured reservoir fluid flow simulation. While different methods have been proposed for fractured zones detection, each of them is associated with certain shortcomings that prevent their full use in different related engineering applications. In this paper, a novel combined method is proposed for fractured zone detection, using processing of petrophysical logs with wavelet, classification and data fusion techniques. Image and petrophysical logs from Asmari reservoir in eight wells of an oilfield in southwestern Iran were used to investigate the accuracy and applicability of the proposed method. Initially, an energy matching strategy was utilized to select the optimum mother wavelets for de-noising and decomposition of petrophysical logs. Parzen and Bayesian classifiers were applied to raw, de-noised and various frequency bands of logs after decomposition in order to detect fractured zones. Results show that the low-frequency bands (approximation 2, a 2 ) of de-noised logs are the best data for fractured zones detection. These classifiers considered one well as test well and the other seven wells as train wells. Majority voting, optimistic OWA (ordered weighted averaging) and pessimistic OWA methods were used to fuse the results obtained from seven train wells. Results confirmed that Parzen and optimistic OWA are the best combined methods to detect fractured zones. The generalization of method is confirmed with an average accuracy of about 72%

  12. Impulse approximation in solid helium

    International Nuclear Information System (INIS)

    Glyde, H.R.

    1985-01-01

    The incoherent dynamic form factor S/sub i/(Q, ω) is evaluated in solid helium for comparison with the impulse approximation (IA). The purpose is to determine the Q values for which the IA is valid for systems such a helium where the atoms interact via a potential having a steeply repulsive but not infinite hard core. For 3 He, S/sub i/(Q, ω) is evaluated from first principles, beginning with the pair potential. The density of states g(ω) is evaluated using the self-consistent phonon theory and S/sub i/(Q,ω) is expressed in terms of g(ω). For solid 4 He resonable models of g(ω) using observed input parameters are used to evaluate S/sub i/(Q,ω). In both cases S/sub i/(Q, ω) is found to approach the impulse approximation S/sub IA/(Q, ω) closely for wave vector transfers Q> or approx. =20 A -1 . The difference between S/sub i/ and S/sub IA/, which is due to final state interactions of the scattering atom with the remainder of the atoms in the solid, is also predominantly antisymmetric in (ω-ω/sub R/), where ω/sub R/ is the recoil frequency. This suggests that the symmetrization procedure proposed by Sears to eliminate final state contributions should work well in solid helium

  13. Finite approximations in fluid mechanics

    International Nuclear Information System (INIS)

    Hirschel, E.H.

    1986-01-01

    This book contains twenty papers on work which was conducted between 1983 and 1985 in the Priority Research Program ''Finite Approximations in Fluid Mechanics'' of the German Research Society (Deutsche Forschungsgemeinschaft). Scientists from numerical mathematics, fluid mechanics, and aerodynamics present their research on boundary-element methods, factorization methods, higher-order panel methods, multigrid methods for elliptical and parabolic problems, two-step schemes for the Euler equations, etc. Applications are made to channel flows, gas dynamical problems, large eddy simulation of turbulence, non-Newtonian flow, turbomachine flow, zonal solutions for viscous flow problems, etc. The contents include: multigrid methods for problems from fluid dynamics, development of a 2D-Transonic Potential Flow Solver; a boundary element spectral method for nonstationary viscous flows in 3 dimensions; navier-stokes computations of two-dimensional laminar flows in a channel with a backward facing step; calculations and experimental investigations of the laminar unsteady flow in a pipe expansion; calculation of the flow-field caused by shock wave and deflagration interaction; a multi-level discretization and solution method for potential flow problems in three dimensions; solutions of the conservation equations with the approximate factorization method; inviscid and viscous flow through rotating meridional contours; zonal solutions for viscous flow problems

  14. Plasma Physics Approximations in Ares

    International Nuclear Information System (INIS)

    Managan, R. A.

    2015-01-01

    Lee & More derived analytic forms for the transport properties of a plasma. Many hydro-codes use their formulae for electrical and thermal conductivity. The coefficients are complex functions of Fermi-Dirac integrals, Fn( μ/θ ), the chemical potential, μ or ζ = ln(1+e μ/θ ), and the temperature, θ = kT. Since these formulae are expensive to compute, rational function approximations were fit to them. Approximations are also used to find the chemical potential, either μ or ζ . The fits use ζ as the independent variable instead of μ/θ . New fits are provided for A α (ζ ),A β (ζ ), ζ, f(ζ ) = (1 + e -μ/θ )F 1/2 (μ/θ), F 1/2 '/F 1/2 , F c α , and F c β . In each case the relative error of the fit is minimized since the functions can vary by many orders of magnitude. The new fits are designed to exactly preserve the limiting values in the non-degenerate and highly degenerate limits or as ζ→ 0 or ∞. The original fits due to Lee & More and George Zimmerman are presented for comparison.

  15. Permeability log using new lifetime measurements

    International Nuclear Information System (INIS)

    Dowling, D.J.; Boyd, J.F.; Fuchs, J.A.

    1975-01-01

    Comparative measurements of thermal neutron decay time are obtained for a formation after irradiation with a pulsed neutron source. Chloride ions in formation fluids are concentrated by the electrosmosis effect using charged poles on a well logging sonde. The formation is irradiated with fast neutrons and a first comparative measure of the thermal neutron decay time or neutron lifetime is taken. The chloride ions are then dispersed by acoustic pumping with a magnetostrictive transducer. The formation is then again irradiated with fast neutrons and a comparative measure of neutron lifetime is taken. The comparison is a function of the variation in chloride concentration between the two measurements which is related to formation permeability

  16. Pulsed neutron source well logging system

    International Nuclear Information System (INIS)

    Dillingham, M.E.

    1975-01-01

    A pulsed neutron source arrangement is provided in which a sealed cylindrical chamber encloses a rotatable rotor member carrying a plurality of elongated target strips of material which emits neutrons when bombarded with alpha particles emitted by the plurality of source material strips. The rotor may be locked in a so-called ON position by an electromagnetic clutch drive mechanism controllable from the earth's surface so as to permit the making of various types of logs utilizing a continuously emitting neutron source. (Patent Office Record)

  17. On conditional independence and log-convexity

    Czech Academy of Sciences Publication Activity Database

    Matúš, František

    2012-01-01

    Roč. 48, č. 4 (2012), s. 1137-1147 ISSN 0246-0203 R&D Projects: GA AV ČR IAA100750603; GA ČR GA201/08/0539 Institutional support: RVO:67985556 Keywords : Conditional independence * Markov properties * factorizable distributions * graphical Markov models * log-convexity * Gibbs- Markov equivalence * Markov fields * Gaussian distributions * positive definite matrices * covariance selection model Subject RIV: BA - General Mathematics Impact factor: 0.933, year: 2012 http://library.utia.cas.cz/separaty/2013/MTR/matus-0386229.pdf

  18. New radio meteor detecting and logging software

    Science.gov (United States)

    Kaufmann, Wolfgang

    2017-08-01

    A new piece of software ``Meteor Logger'' for the radio observation of meteors is described. It analyses an incoming audio stream in the frequency domain to detect a radio meteor signal on the basis of its signature, instead of applying an amplitude threshold. For that reason the distribution of the three frequencies with the highest spectral power are considered over the time (3f method). An auto notch algorithm is developed to prevent the radio meteor signal detection from being jammed by a present interference line. The results of an exemplary logging session are discussed.

  19. Zope based electronic operation log system - Zlog

    International Nuclear Information System (INIS)

    Yoshii, K.; Satoh, Y.; Kitabayashi, T.

    2004-01-01

    Since January 2004, the Zope based electronic operation logging system, named Zlog, has been running at the KEKB and AR accelerator facilities. Since Zope is the python based open source web application server software and python language is familiar for the members in the KEKB accelerator control group, we have developed the Zlog system rapidly. In this paper, we report the development history and the present status of Zlog system. Also we show some general plug-in components, called Zope products, have been useful for our Zlog development. (author)

  20. Nut Production in Bertholletia excelsa across a Logged Forest Mosaic: Implications for Multiple Forest Use

    Science.gov (United States)

    Rockwell, Cara A.; Guariguata, Manuel R.; Menton, Mary; Arroyo Quispe, Eriks; Quaedvlieg, Julia; Warren-Thomas, Eleanor; Fernandez Silva, Harol; Jurado Rojas, Edwin Eduardo; Kohagura Arrunátegui, José Andrés Hideki; Meza Vega, Luis Alberto; Revilla Vera, Olivia; Valera Tito, Jonatan Frank; Villarroel Panduro, Betxy Tabita; Yucra Salas, Juan José

    2015-01-01

    Although many examples of multiple-use forest management may be found in tropical smallholder systems, few studies provide empirical support for the integration of selective timber harvesting with non-timber forest product (NTFP) extraction. Brazil nut (Bertholletia excelsa, Lecythidaceae) is one of the world’s most economically-important NTFP species extracted almost entirely from natural forests across the Amazon Basin. An obligate out-crosser, Brazil nut flowers are pollinated by large-bodied bees, a process resulting in a hard round fruit that takes up to 14 months to mature. As many smallholders turn to the financial security provided by timber, Brazil nut fruits are increasingly being harvested in logged forests. We tested the influence of tree and stand-level covariates (distance to nearest cut stump and local logging intensity) on total nut production at the individual tree level in five recently logged Brazil nut concessions covering about 4000 ha of forest in Madre de Dios, Peru. Our field team accompanied Brazil nut harvesters during the traditional harvest period (January-April 2012 and January-April 2013) in order to collect data on fruit production. Three hundred and ninety-nine (approximately 80%) of the 499 trees included in this study were at least 100 m from the nearest cut stump, suggesting that concessionaires avoid logging near adult Brazil nut trees. Yet even for those trees on the edge of logging gaps, distance to nearest cut stump and local logging intensity did not have a statistically significant influence on Brazil nut production at the applied logging intensities (typically 1–2 timber trees removed per ha). In one concession where at least 4 trees ha-1 were removed, however, the logging intensity covariate resulted in a marginally significant (0.09) P value, highlighting a potential risk for a drop in nut production at higher intensities. While we do not suggest that logging activities should be completely avoided in Brazil nut rich

  1. Nut Production in Bertholletia excelsa across a Logged Forest Mosaic: Implications for Multiple Forest Use.

    Directory of Open Access Journals (Sweden)

    Cara A Rockwell

    Full Text Available Although many examples of multiple-use forest management may be found in tropical smallholder systems, few studies provide empirical support for the integration of selective timber harvesting with non-timber forest product (NTFP extraction. Brazil nut (Bertholletia excelsa, Lecythidaceae is one of the world's most economically-important NTFP species extracted almost entirely from natural forests across the Amazon Basin. An obligate out-crosser, Brazil nut flowers are pollinated by large-bodied bees, a process resulting in a hard round fruit that takes up to 14 months to mature. As many smallholders turn to the financial security provided by timber, Brazil nut fruits are increasingly being harvested in logged forests. We tested the influence of tree and stand-level covariates (distance to nearest cut stump and local logging intensity on total nut production at the individual tree level in five recently logged Brazil nut concessions covering about 4000 ha of forest in Madre de Dios, Peru. Our field team accompanied Brazil nut harvesters during the traditional harvest period (January-April 2012 and January-April 2013 in order to collect data on fruit production. Three hundred and ninety-nine (approximately 80% of the 499 trees included in this study were at least 100 m from the nearest cut stump, suggesting that concessionaires avoid logging near adult Brazil nut trees. Yet even for those trees on the edge of logging gaps, distance to nearest cut stump and local logging intensity did not have a statistically significant influence on Brazil nut production at the applied logging intensities (typically 1-2 timber trees removed per ha. In one concession where at least 4 trees ha-1 were removed, however, the logging intensity covariate resulted in a marginally significant (0.09 P value, highlighting a potential risk for a drop in nut production at higher intensities. While we do not suggest that logging activities should be completely avoided in Brazil

  2. Well logging. Acquisition and applications; Diagraphies. Acquisition et applications

    Energy Technology Data Exchange (ETDEWEB)

    Serra, O.; Serra, L.

    2001-07-01

    This reference book on wire-line and LWD well logging covers all geophysical methods of underground survey in a synthetic, visual and dynamical way. It treats of: the physical principle of well logging measurements, the different types of existing probes, the factors that can influence the measurements, and the applications of these measurements. The following well-logging methods are reviewed: resistivity; electromagnetic wave propagation; magnetic susceptibility and magnetic field; spontaneous potential; nuclear logging: natural gamma radioactivity, density logging, photoelectric index, neutron emission probes, hydrogen index or neutron porosity, neutron induced gamma spectroscopy, neutron relaxation time, NMR; acoustic measurements: sonic logging, seismic profiles; texture, structure and stratigraphy data acquisition; borehole diameter measurement; temperature measurement; wire sampling methods; place and role of well-logging in petroleum exploration; well-logging programs. (J.S.)

  3. Shiitake mushroom production on small diameter oak logs in Ohio

    Science.gov (United States)

    S.M. Bratkovich

    1991-01-01

    Yields of different strains of shiitake mushrooms (Lentinus edodes) were evaluated when produced on small diameter oak logs in Ohio. Logs averaging between 3-4 inches in diameter were inoculated with four spawn strains in 1985.

  4. Log and tree sawing times for hardwood mills

    Science.gov (United States)

    Everette D. Rast

    1974-01-01

    Data on 6,850 logs and 1,181 trees were analyzed to predict sawing times. For both logs and trees, regression equations were derived that express (in minutes) sawing time per log or tree and per Mbf. For trees, merchantable height is expressed in number of logs as well as in feet. One of the major uses for the tables of average sawing times is as a bench mark against...

  5. Wood moisture monitoring during log house thermal insulation mounting

    Directory of Open Access Journals (Sweden)

    Pavla Kotásková

    2011-01-01

    Full Text Available The current designs of thermal insulation for buildings concentrate on the achievement of the required heat transmission coefficient. However, another factor that cannot be neglected is the assessment of the possible water vapour condensation inside the construction. The aim of the study was to find out whether the designed modification of the cladding structure of an existing log house will or will not lead to a risk of possible water vapour condensation in the walls after an additional thermal insulation mounting. The condensation could result in the increase in moisture of the walls and consequently the constructional timber, which would lead to the reduction of the timber construction strength, wood degradation by biotic factors – wood-destroying insects, mildew or wood-destroying fungi. The main task was to compare the theoretically established values of moisture of the constructional timber with the values measured inside the construction using a specific example of a thermal insulated log house. Three versions of thermal insulation were explored to find the solution of a log house reconstruction which would be the optimum for living purposes. Two versions deal with the cladding structure with the insulation from the interior, the third version deals with an external insulation.In a calculation model the results can be affected to a great degree by input values (boundary conditions. This especially concerns the factor of vapour barrier diffusion resistance, which is entered in accordance with the producer’s specifications; however, its real value can be lower as it depends on the perfectness and correctness of the technological procedure. That is why the study also includes thermal technical calculations of all designed insulation versions in the most unfavourable situation, which includes the degradation of the vapour barrier down to 10% efficiency, i.e. the reduction of the diffusion resistance factor to 10% of the original value

  6. Data Cleaning Methods for Client and Proxy Logs

    NARCIS (Netherlands)

    Weinreich, H.; Obendorf, H.; Herder, E.; Edmonds, A.; Hawkey, K.; Kellar, M.; Turnbull, D.

    2006-01-01

    In this paper we present our experiences with the cleaning of Web client and proxy usage logs, based on a long-term browsing study with 25 participants. A detailed clickstream log, recorded using a Web intermediary, was combined with a second log of user interface actions, which was captured by a

  7. Sediment transport and soil disturbance after postfire logging.

    Science.gov (United States)

    James D. McIver

    2003-01-01

    Recently there has been considerable debate on the practice of postfire logging, in which burned forests are entered soon after fire to recover commercially valuable trees. Proponents of the practice argue that postfire logging is part of a 'restoration package' that can be used to control erosion (e.g., contour logging) and can help to mitigate costs of...

  8. Why, What, and How to Log? Lessons from LISTEN

    Science.gov (United States)

    Mostow, Jack; Beck, Joseph E.

    2009-01-01

    The ability to log tutorial interactions in comprehensive, longitudinal, fine-grained detail offers great potential for educational data mining--but what data is logged, and how, can facilitate or impede the realization of that potential. We propose guidelines gleaned over 15 years of logging, exploring, and analyzing millions of events from…

  9. Economic incentives exist to support measures to reduce illegal logging

    Science.gov (United States)

    J.A. Turner; J. Buongiorno; A. Katz; S. Zhu; R. Li

    2008-01-01

    Three studies of the global economic implications of eliminating illegal logging are summarized. Processors of illegally sourced wood would lose from the elimination of illegal logging through high prices for logs and decreased production of wood products. Associated with these changes could be losses in employment and income. Beyond these losses to the processing...

  10. A survey of animal-powered logging in Alabama

    Science.gov (United States)

    Christopher W. Toms; Mark R. Dubois; John C. Bliss; John H. Wilhoit; Robert B. Rummer

    2001-01-01

    In a state with a very large, highly mechanized timber harvesting industry, animal-powered logging still occupies a niche in Alabama as a small-scale harvesting alternative. This article summarizes the results from a study that examined the extent of animal logging in Alabama. We investigated this topic by asking who is logging with animals, where are they working,...

  11. Interactive machine learning for postprocessing CT images of hardwood logs

    Science.gov (United States)

    Erol Sarigul; A. Lynn Abbott; Daniel L. Schmoldt

    2003-01-01

    This paper concerns the nondestructive evaluation of hardwood logs through the analysis of computed tomography (CT) images. Several studies have shown that the commercial value of resulting boards can be increased substantially if log sawing strategies are chosen using prior knowledge of internal log defects. Although CT imaging offers a potential means of obtaining...

  12. Financial and Economic Analysis of Reduced Impact Logging

    Science.gov (United States)

    Tom Holmes

    2016-01-01

    Concern regarding extensive damage to tropical forests resulting from logging increased dramatically after World War II when mechanized logging systems developed in industrialized countries were deployed in the tropics. As a consequence, tropical foresters began developing logging procedures that were more environmentally benign, and by the 1990s, these practices began...

  13. Environmental effects of postfire logging: literature review and annotated bibliography.

    Science.gov (United States)

    James D. McIver; Lynn Starr

    2000-01-01

    The scientific literature on logging after wildfire is reviewed, with a focus on environmental effects of logging and removal of large woody structure. Rehabilitation, the practice of planting or seeding after logging, is not reviewed here. Several publications are cited that can be described as “commentaries,” intended to help frame the public debate. We review 21...

  14. Utilization and cost of log production from animal loging operations

    Science.gov (United States)

    Suraj P. Shrestha; Bobby L. Lanford; Robert B. Rummer; Mark Dubois

    2006-01-01

    Forest harvesting with animals is a labor-intensive operation. It is expensive to use machines on smaller woodlots, which require frequent moves if mechanically logged. So, small logging systems using animals may be more cost effective. In this study, work sampling was used for five animal logging operations in Alabama to measure productive and non-productive time...

  15. Development of regional stump-to-mill logging cost estimators

    Science.gov (United States)

    Chris B. LeDoux; John E. Baumgras

    1989-01-01

    Planning logging operations requires estimating the logging costs for the sale or tract being harvested. Decisions need to be made on equipment selection and its application to terrain. In this paper a methodology is described that has been developed and implemented to solve the problem of accurately estimating logging costs by region. The methodology blends field time...

  16. Ultrafast CT scanning of an oak log for internal defects

    Science.gov (United States)

    Francis G. Wagner; Fred W. Taylor; Douglas S. Ladd; Charles W. McMillin; Fredrick L. Roder

    1989-01-01

    Detecting internal defects in sawlogs and veneer logs with computerized tomographic (CT) scanning is possible, but has been impractical due to the long scanning time required. This research investigated a new scanner able to acquire 34 cross-sectional log scans per second. This scanning rate translates to a linear log feed rate of 85 feet (25.91 m) per minute at one...

  17. Technology development for high temperature logging tools

    Energy Technology Data Exchange (ETDEWEB)

    Veneruso, A.F.; Coquat, J.A.

    1979-01-01

    A set of prototype, high temperature logging tools (temperature, pressure and flow) were tested successfully to temperatures up to 275/sup 0/C in a Union geothermal well during November 1978 as part of the Geothermal Logging Instrumentation Development Program. This program is being conducted by Sandia Laboratories for the Department of Energy's Division of Geothermal Energy. The progress and plans of this industry based program to develop and apply the high temperature instrumentation technology needed to make reliable geothermal borehole measurements are described. Specifically, this program is upgrading existing sondes for improved high temperature performance, as well as applying new materials (elastomers, polymers, metals and ceramics) and developing component technology such as high temperature cables, cableheads and electronics to make borehole measurements such as formation temperature, flow rate, high resolution pressure and fracture mapping. In order to satisfy critical existing needs, the near term goal is for operation up to 275/sup 0/C and 7000 psi by the end of FY80. The long term goal is for operation up to 350/sup 0/C and 20,000 psi by the end of FY84.

  18. Public PCs: Log Out or Lose Out

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Do you regularly use one of the public Windows or Linux terminals in the CERN library or in front of the Users' Office? Or do you often give presentations or run meetings, workshops or conferences? Did you recently attend a training session in the CERN Training Centre? If you answered at least once with “yes”, we have a plea for you: LOG OUT when done in order to protect your data!   You might recall that CERN considers that “Your Privacy is Paramount”. But this does not come for free. In the few past months, we have received several reports from vigilant people who have spotted open user sessions on public PCs at CERN. Those users simply forgot to log out once their work, training or meeting was over. Their session continued without them being present. Worse, with CERN using a central Single Sign-On (SSO) portal, their login credentials would allow a malicious person at CERN to use those credentials to access that user’s mailbox, DFS ...

  19. Dual excitation acoustic paramagnetic logging tool

    Energy Technology Data Exchange (ETDEWEB)

    Vail, III, William B. (Bothell, WA)

    1989-01-01

    New methods and apparatus are disclosed which allow measurement of the presence of oil and water in gelogical formations using a new physical effect called the Acoustic Paramagnetic Logging Effect (APLE). The presence of petroleum in formation causes a slight increase in the earth's magnetic field in the vicinity of the reservoir. This is the phenomena of paramagnetism. Application of an acoustic source to a geological formation at the Larmor frequency of the nucleous present causes the paramagnetism of the formation to disappear. This results in a decrease in the earth's magnetic field in the vicinity of the oil bearing formation. Repetitively frequency sweeping the acoustic source through the Larmor frequency of the nucleons present (approx. 2 kHz) causes an amplitude modulation of the earth's magnetic field which is a consequence of the APLE. The amplitude modulation of the earth's magnetic field is measured with an induction coil gradiometer and provides a direct measure of the amount of oil and water in the excitation zone of the formation. The phase of the signal is used to infer the longitudinal relaxation times of the fluids present, which results in the ability in general to separate oil and water and to measure the viscosity of the oil present. Such measurements may be preformed in open boreholes and in cased well bores. The Dual Excitation Acoustic Paramagnetic Logging Tool employing two acoustic sources is also described.

  20. Radiation incident in oil well logging

    International Nuclear Information System (INIS)

    Lozada, J.A.

    1998-01-01

    On June 4th 1997 equipment failure and violation of approved procedures by a crew of workers initiated a series of events that resulted in the unnecessary exposure to neutron and gamma radiation, from a 666 GBq Am 241 Be source, of forty two workers from a well logging company in Venezuela. Due to the presence of dry mud or drilling fluids inside the logging tool, the nosepiece was screwed off the rest of the source holder; this piece was mistaken for the entire source holder thus leaving the source inside the tool. The tool was labelled for maintenance and electronic laboratory personal worked near the source for seven hours before they identify its presence. As soon as the incident was detected a contingency plan was implemented and the source could be retrieved from the tool and placed in its shipping container. The TLD badges indicate doses well below the annual limit of 20 mSv, and none of the workers involved in the incident seem to show serious health consequences from it. After the incident, in order to avoid the occurrence of similar situations, a better source and tool maintenance program was implemented, all the workers were re-trained, and area monitors were installed in all operations bases. (author)

  1. Who Leads China's Leading Universities?

    Science.gov (United States)

    Huang, Futao

    2017-01-01

    This study attempts to identify the major characteristics of two different groups of institutional leaders in China's leading universities. The study begins with a review of relevant literature and theory. Then, there is a brief introduction to the selection of party secretaries, deputy secretaries, presidents and vice presidents in leading…

  2. Nonlinear approximation with dictionaries I. Direct estimates

    DEFF Research Database (Denmark)

    Gribonval, Rémi; Nielsen, Morten

    2004-01-01

    We study various approximation classes associated with m-term approximation by elements from a (possibly) redundant dictionary in a Banach space. The standard approximation class associated with the best m-term approximation is compared to new classes defined by considering m-term approximation w...

  3. Approximate cohomology in Banach algebras | Pourabbas ...

    African Journals Online (AJOL)

    We introduce the notions of approximate cohomology and approximate homotopy in Banach algebras and we study the relation between them. We show that the approximate homotopically equivalent cochain complexes give the same approximate cohomologies. As a special case, approximate Hochschild cohomology is ...

  4. Morphometric analyses of hominoid crania, probabilities of conspecificity and an approximation of a biological species constant.

    Science.gov (United States)

    Thackeray, J F; Dykes, S

    2016-02-01

    Thackeray has previously explored the possibility of using a morphometric approach to quantify the "amount" of variation within species and to assess probabilities of conspecificity when two fossil specimens are compared, instead of "pigeon-holing" them into discrete species. In an attempt to obtain a statistical (probabilistic) definition of a species, Thackeray has recognized an approximation of a biological species constant (T=-1.61) based on the log-transformed standard error of the coefficient m (log sem) in regression analysis of cranial and other data from pairs of specimens of conspecific extant species, associated with regression equations of the form y=mx+c where m is the slope and c is the intercept, using measurements of any specimen A (x axis), and any specimen B of the same species (y axis). The log-transformed standard error of the co-efficient m (log sem) is a measure of the degree of similarity between pairs of specimens, and in this study shows central tendency around a mean value of -1.61 and standard deviation 0.10 for modern conspecific specimens. In this paper we focus attention on the need to take into account the range of difference in log sem values (Δlog sem or "delta log sem") obtained from comparisons when specimen A (x axis) is compared to B (y axis), and secondly when specimen A (y axis) is compared to B (x axis). Thackeray's approach can be refined to focus on high probabilities of conspecificity for pairs of specimens for which log sem is less than -1.61 and for which Δlog sem is less than 0.03. We appeal for the adoption of a concept here called "sigma taxonomy" (as opposed to "alpha taxonomy"), recognizing that boundaries between species are not always well defined. Copyright © 2015 Elsevier GmbH. All rights reserved.

  5.  Higher Order Improvements for Approximate Estimators

    DEFF Research Database (Denmark)

    Kristensen, Dennis; Salanié, Bernard

    Many modern estimation methods in econometrics approximate an objective function, through simulation or discretization for instance. The resulting "approximate" estimator is often biased; and it always incurs an efficiency loss. We here propose three methods to improve the properties of such appr......Many modern estimation methods in econometrics approximate an objective function, through simulation or discretization for instance. The resulting "approximate" estimator is often biased; and it always incurs an efficiency loss. We here propose three methods to improve the properties...... of such approximate estimators at a low computational cost. The first two methods correct the objective function so as to remove the leading term of the bias due to the approximation. One variant provides an analytical bias adjustment, but it only works for estimators based on stochastic approximators......, such as simulation-based estimators. Our second bias correction is based on ideas from the resampling literature; it eliminates the leading bias term for non-stochastic as well as stochastic approximators. Finally, we propose an iterative procedure where we use Newton-Raphson (NR) iterations based on a much finer...

  6. Assessment of the body burden of chelatable lead: a model and its application to lead workers

    Energy Technology Data Exchange (ETDEWEB)

    Araki, S.; Ushio, K.

    1982-05-01

    A hypothetical model was introduced to estimate the body burden of chelatable lead from the mobilisation yield of lead by calcium disodium ethylenediamine tetra-acetate. It was estimated that, on average, 14 and 19% of the body burden was mobilized into the urine during the 24 hours after an injection of 53.4 mumol and 107 mumol CaEDTA per kg bodyweight, respectively. The body burden of chelatable lead ranged from 4 mumol to 120 mumol in lead workers with blood lead concentrations of 0.3-2.9 mumol/kg. There were linear relationships between blood lead concentrations and body burden of chelatable lead on a log scale.

  7. Rill erosion in burned and salvage logged western montane forests: Effects of logging equipment type, traffic level, and slash treatment

    Science.gov (United States)

    J. W. Wagenbrenner; P. R. Robichaud; R. E. Brown

    2016-01-01

    Following wildfires, forest managers often consider salvage logging burned trees to recover monetary value of timber, reduce fuel loads, or to meet other objectives. Relatively little is known about the cumulative hydrologic effects of wildfire and subsequent timber harvest using logging equipment. We used controlled rill experiments in logged and unlogged (control)...

  8. Use of pulsed neutron logging to evaluate perforation washing

    International Nuclear Information System (INIS)

    Dimon, C.A.

    1986-01-01

    This invention relates to the use of pulsed neutron logging techniques before and after perforation washing operations are performed to evaluate the degree of success of the perforation washing operations. Well logging operations of a type designed to respond to the difference between a formation immediately behind the well sheath and voids in the formation are performed both before and after the perforation washing operation. differences between the two resulting logs are then indicative of voids created by perforation washing. In a preferred embodiment, pulsed neutron logging is used as the logging technique, while a weighted brine having a high absorption cross section to pulsed neutrons is used as the perforation washing fluid

  9. Study of the reservoirs of Jurassic and Cretaceous periods in the south-cast slope of Central Kara-Kum vault using combination of acoustic logging, neutron-gamma logging, gamma logging, and electrical logging

    International Nuclear Information System (INIS)

    Meredov, T.M.; Baranov, M.I.

    1978-01-01

    Considered is the possibility of application of the combination of neutron-gamma logging, gamma logging al partitioncoustic logging and electrical logging to lithologica of sections, discovery reservoir layers in carbonate and terrigeneous sections as well as quantitative estimation of the porosity coefficients values at prospecting areas in the south-east slope of Central Kara-Kum vault. Neutron-gamma logging mostly makes it possible to partition carbonate rocks into limestones, dolomites and their interstitial variaties and to indicate sand stone layers with different degree of carbonate content

  10. KFM 01A. Q-logging

    International Nuclear Information System (INIS)

    Barton, Nick

    2003-03-01

    The first Forsmark potential repository site borehole KFM 01A provided core from 101.8 to 1000.7 m depth. This was independently Q-logged during a two-day period (19th-20th February, 2003), without access to BORMAP results or regional jointing frequencies or orientations. The Q-logging was intended to be an independent check for subsequent BORMAP-derived Q-parameter estimation. The Q-logging was accomplished using the manually-recorded 'histogram method' which allows the logger to enter Q-parameter ranges and depths directly into the appropriate histograms, which facilitates subsequent data processing using Excel spreadsheets. Successive pairs of core boxes, which contain an average of 11 meters of core in ten rows, were the source of ten opinions of each of the six Q-parameters, giving a total of 4920 recordings of Q-parameter values for the 164 core boxes. Data processing was divided into several parts, with successively increasing detail. The report therefore contains Q-histograms for the whole core, for four identified fracture(d) zones combined as if one unit, and then for the whole core minus these fracture(d) zones. This background rock mass quality is subsequently divided into nine depth zones or slices, and trends of variation with depth are tabulated. The four identified fracture(d) zones, which are actually of reasonable quality, are also analysed separately, and similarities and subtle differences are discerned between them. The overall quality of this first core is very good to excellent, with Q(mean) of 48.4, and a most frequent Q-value of 100. The range of quality is from 2.1 to 2130, which is the complete upper half of the six order of magnitude Q scale. Even the relatively fracture(d) zones, representing some 13% of the 900 m cored, have a combined Q(mean) of 13.9 and a range of quality of 2.1 to 150

  11. Method and apparatus for logging inclined earth boreholes

    International Nuclear Information System (INIS)

    Youmans, A.H.

    1981-01-01

    An improved technique is provided for comparing the velocity of an elongated well logging instrument traversing an inclined earth borehole with the playout velocity of the well logging cable at the earth's surface to control both the cable hoist drum rotation and the rate of movement of the subsurface instrument and thus insure cable playout is in equilibrium with the logging instrument movement. Method and apparatus are described for detecting any reduction in movement of the logging instrument through the borehole and for reducing the velocity of the logging cable playout in response thereto by reducing drum rotation. Further, when the velocity of cable playout slows to a preselected value, a monitoring circuit generates control signals which actuate a means of power attached to or integral with the logging instrument which, upon initiation, apply a force to move the logging instrument upward or downward within the borehole

  12. DOE-Grand Junction logging model data synopsis

    International Nuclear Information System (INIS)

    Mathews, M.A.; Koizumi, C.J.; Evans, H.B.

    1978-05-01

    This synopsis provides the available data concerning the logging models at the DoE-Grand Junction facility, to date (1976). Because gamma-ray logs are used in uranium exploration to estimate the grade (percent U 3 O 8 ) and the thickness of uranium ore zones in exploration drill holes, logging models are required to calibrate the gamma-ray logging equipment in order to obtain accuracy, uniformity, standardization, and repeatability during logging. This quality control is essential for accurate ore reserve calculations and for estimates of ore potential. The logging models at the DoE-Grand Junction facility are available for use by private industry in calibrating their gamma-ray logging equipment. 21 figures, 26 tables

  13. Applicability estimation of flowmeter logging for detecting hydraulic pass

    International Nuclear Information System (INIS)

    Miyakawa, Kimio; Tanaka, Yasuji; Tanaka, Kazuhiro

    1997-01-01

    Estimation of the hydraulic pass governing hydrogeological structure contributes significantly to the siting HLW repository. Flowmeter logging can detect hydraulic passes by measuring vertical flow velocity of groundwater in the borehole. We reviewed application of this logging in situ. The hydraulic pass was detected with combination of ambient flow logging, with pumping and/or injecting induced flow logging. This application showed that the flowmeter logging detected hydraulic passes conveniently and accurately compared with other hydraulic tests. Hydraulic conductivity by using flowmeter logging was assessed above 10 -6 m/sec and within one order from comparison with injection packer tests. We suggest that appropriate application of the flowmeter logging for the siting is conducted before hydraulic tests because test sections and monitoring sections are decided rationally for procurement of quantitative hydraulic data. (author)

  14. Acoustic--nuclear permeability logging system

    International Nuclear Information System (INIS)

    Dowling, D.J.; Arnold, D.M.

    1978-01-01

    A down hole logging tool featuring a neutron generator, an acoustic disturbance generator, and a radiation detection system is described. An array of acoustic magnetostriction transducers is arranged about the target of a neutron accelerator. Two gamma ray sensors are separated from the accelerator target by shielding. According to the method of the invention, the underground fluid at the level of a formation is bombarded by neutrons which react with oxygen in the fluid to produce unstable nitrogen 16 particles according to the reaction 16 O(n,p) 16 N. Acoustic pulses are communicated to the fluid, and are incident on the boundary of the borehole at the formation. The resulting net flow of fluid across the boundary is determined from radiation detection measurements of the decaying 16 N particles in the fluid. A measure of the permeability of the formation is obtained from the determination of net fluid flow across the boundary

  15. Logging-while-drilling (LWD) pressure test

    Energy Technology Data Exchange (ETDEWEB)

    Thirud, Aase P.

    2003-07-01

    Statoil and Halliburton have completed a successful test of a new ground-breaking formation evaluation technology on the Norwegian shelf. An LWD formation tester, the GeoTapTM sensor, was used to quantify formation pressure during drilling operations. The inaugural job was completed by Halliburton's Sperry-Sun product service line onboard the Bideford Dolphin at the Borg Field while drilling a horizontal production well in the Vigdis Extension development. The GeoTap tool, part of Sperry-Sun's StellarTM MWD/LWT suite, was run in combination with a complete logging-while-drilling sensor package and the Geo-Pilot rotary steerable drilling system. Repeat formation pressures were taken and successfully transmitted to surface. This is the first time this type of technology has been successfully applied on the Norwegian shelf.

  16. Water injection profiling by nuclear logging

    International Nuclear Information System (INIS)

    Arnold, D.M.

    1980-01-01

    This invention relates to nuclear logging techniques for determining the volume flow rates and flow directions of injected water moving behind a wellbore casing. The apparatus includes a sonde equipped with a neutron source and dual radiation detectors. Oxygen in the neutron irradiated water is transmitted to 16 N and the resultant primary and Compton scattered gamma rays are detected in two energy windows by both detectors. Count rate data is analysed in terms of the windows to obtain linear flow velocities for water flow within and behind the casing. Volume flow rates are determined for upward and downward flow, and horizontal volume flow into the surrounding formation is calculated. A complete injection profile may thus be obtained. (U.K.)

  17. Simulation Control Graphical User Interface Logging Report

    Science.gov (United States)

    Hewling, Karl B., Jr.

    2012-01-01

    One of the many tasks of my project was to revise the code of the Simulation Control Graphical User Interface (SIM GUI) to enable logging functionality to a file. I was also tasked with developing a script that directed the startup and initialization flow of the various LCS software components. This makes sure that a software component will not spin up until all the appropriate dependencies have been configured properly. Also I was able to assist hardware modelers in verifying the configuration of models after they have been upgraded to a new software version. I developed some code that analyzes the MDL files to determine if any error were generated due to the upgrade process. Another one of the projects assigned to me was supporting the End-to-End Hardware/Software Daily Tag-up meeting.

  18. Evaluation of Fresnel's corrections to the eikonal approximation by the separabilization method

    International Nuclear Information System (INIS)

    Musakhanov, M.M.; Zubarev, A.L.

    1975-01-01

    Method of separabilization of potential over the Schroedinger approximate solutions, leading to Schwinger's variational principle for scattering amplitude, is suggested. The results are applied to calculation of the Fresnel corrections to the Glauber approximation

  19. Usefulness of bound-state approximations in reaction theory

    International Nuclear Information System (INIS)

    Adhikari, S.K.

    1981-01-01

    A bound-state approximation when applied to certain operators, such as the many-body resolvent operator for a two-body fragmentation channel, in many-body scattering equations, reduces such equations to equivalent two-body scattering equations which are supposed to provide a good description of the underlying physical process. In this paper we test several variants of bound-state approximations in the soluble three-boson Amado model and find that such approximations lead to weak and unacceptable kernels for the equivalent two-body scattering equations and hence to a poor description of the underlying many-body process

  20. Automated Detection of Selective Logging in Amazon Forests Using Airborne Lidar Data and Pattern Recognition Algorithms

    Science.gov (United States)

    Keller, M. M.; d'Oliveira, M. N.; Takemura, C. M.; Vitoria, D.; Araujo, L. S.; Morton, D. C.

    2012-12-01

    Selective logging, the removal of several valuable timber trees per hectare, is an important land use in the Brazilian Amazon and may degrade forests through long term changes in structure, loss of forest carbon and species diversity. Similar to deforestation, the annual area affected by selected logging has declined significantly in the past decade. Nonetheless, this land use affects several thousand km2 per year in Brazil. We studied a 1000 ha area of the Antimary State Forest (FEA) in the State of Acre, Brazil (9.304 ○S, 68.281 ○W) that has a basal area of 22.5 m2 ha-1 and an above-ground biomass of 231 Mg ha-1. Logging intensity was low, approximately 10 to 15 m3 ha-1. We collected small-footprint airborne lidar data using an Optech ALTM 3100EA over the study area once each in 2010 and 2011. The study area contained both recent and older logging that used both conventional and technologically advanced logging techniques. Lidar return density averaged over 20 m-2 for both collection periods with estimated horizontal and vertical precision of 0.30 and 0.15 m. A relative density model comparing returns from 0 to 1 m elevation to returns in 1-5 m elevation range revealed the pattern of roads and skid trails. These patterns were confirmed by ground-based GPS survey. A GIS model of the road and skid network was built using lidar and ground data. We tested and compared two pattern recognition approaches used to automate logging detection. Both segmentation using commercial eCognition segmentation and a Frangi filter algorithm identified the road and skid trail network compared to the GIS model. We report on the effectiveness of these two techniques.

  1. Specific features of well logging of boreholes drilled on electrical nonconducting solutions

    International Nuclear Information System (INIS)

    Ruchkin, A.F.; Fomenko, V.G.

    1978-01-01

    Methods for identification of permeable strata and determination of their porosity and oil-gas saturation using standard combination of geophysical investigations in the boreholes drilled with nonaqueous and inert drilling fluids are considered. Geophysical combination consists of the methods indications of which are independent on electrical conductivity of drilling fluids. They are all modifications of radioactivity logging (gamma logging, neutron logging, neutron-gamma logging, gamma-gamma logging, pulsed neutron logging, nuclear-magnetic logging), acoustic logging and thermal logging

  2. Development of an Intelligent System to Synthesize Petrophysical Well Logs

    Directory of Open Access Journals (Sweden)

    Morteza Nouri Taleghani

    2013-07-01

    Full Text Available Porosity is one of the fundamental petrophysical properties that should be evaluated for hydrocarbon bearing reservoirs. It is a vital factor in precise understanding of reservoir quality in a hydrocarbon field. Log data are exceedingly crucial information in petroleum industries, for many of hydrocarbon parameters are obtained by virtue of petrophysical data. There are three main petrophysical logging tools for the determination of porosity, namely neutron, density, and sonic well logs. Porosity can be determined by the use of each of these tools; however, a precise analysis requires a complete set of these tools. Log sets are commonly either incomplete or unreliable for many reasons (i.e. incomplete logging, measurement errors, and loss of data owing to unsuitable data storage. To overcome this drawback, in this study several intelligent systems such as fuzzy logic (FL, neural network (NN, and support vector machine are used to predict synthesized petrophysical logs including neutron, density, and sonic. To accomplish this, the petrophysical well logs data were collected from a real reservoir in one of Iran southwest oil fields. The corresponding correlation was obtained through the comparison of synthesized log values with real log values. The results showed that all intelligent systems were capable of synthesizing petrophysical well logs, but SVM had better accuracy and could be used as the most reliable method compared to the other techniques.

  3. Pulsed neutron uranium borehole logging with prompt fission neutrons

    International Nuclear Information System (INIS)

    Bivens, H.M.; Smith, G.W.; Jensen, D.H.

    1976-01-01

    The gross count natural gamma log normally used for uranium borehole logging is seriously affected by disequilibrium. Methods for the direct measurement of uranium, such as neutron logging, which are not affected by disequilibrium have been the object of considerable effort in recent years. This paper describes a logging system for uranium which uses a small accelerator to generate pulses of 14 MeV neutrons to detect and assay uranium by the measurement of prompt fission neutrons in the epithermal energy range. After an initial feasibility study, a prototype logging probe was built for field evaluation which began in January 1976. Physical and operational characteristics of the prototype probe, the neutron tube-transformer assembly, and the neutron tube are described. In logging operations, only the epithermal prompt fission neutrons detected between 250 microseconds to 2500 microseconds following the excitation neutron pulse are counted. Comparison of corrected neutron logs with the conventional gross count natural gamma logs and the chemical assays of cores from boreholes are shown. The results obtained with this neutron probe clearly demonstrate its advantages over the gross count natural gamma log, although at this time the accuracy of the neutron log assay is not satisfactory under some conditions. The necessary correction factors for various borehole and formation parameters are being determined and, when applied, should improve the assay accuracy

  4. Intelligent approaches for the synthesis of petrophysical logs

    International Nuclear Information System (INIS)

    Rezaee, M Reza; Kadkhodaie-Ilkhchi, Ali; Alizadeh, Pooya Mohammad

    2008-01-01

    Log data are of prime importance in acquiring petrophysical data from hydrocarbon reservoirs. Reliable log analysis in a hydrocarbon reservoir requires a complete set of logs. For many reasons, such as incomplete logging in old wells, destruction of logs due to inappropriate data storage and measurement errors due to problems with logging apparatus or hole conditions, log suites are either incomplete or unreliable. In this study, fuzzy logic and artificial neural networks were used as intelligent tools to synthesize petrophysical logs including neutron, density, sonic and deep resistivity. The petrophysical data from two wells were used for constructing intelligent models in the Fahlian limestone reservoir, Southern Iran. A third well from the field was used to evaluate the reliability of the models. The results showed that fuzzy logic and artificial neural networks were successful in synthesizing wireline logs. The combination of the results obtained from fuzzy logic and neural networks in a simple averaging committee machine (CM) showed a significant improvement in the accuracy of the estimations. This committee machine performed better than fuzzy logic or the neural network model in the problem of estimating petrophysical properties from well logs

  5. Improving gross count gamma-ray logging in uranium mining with the NGRS probe

    Directory of Open Access Journals (Sweden)

    Carasco C.

    2018-01-01

    Full Text Available AREVA Mines and the Nuclear Measurement Laboratory of CEA Cadarache are collaborating to improve the sensitivity and precision of uranium concentration measurement by means of gamma ray logging. The determination of uranium concentration in boreholes is performed with the Natural Gamma Ray Sonde (NGRS based on a NaI(Tl scintillation detector. The total gamma count rate is converted into uranium concentration using a calibration coefficient measured in concrete blocks with known uranium concentration in the AREVA Mines calibration facility located in Bessines, France. Until now, to take into account gamma attenuation in a variety of boreholes diameters, tubing materials, diameters and thicknesses, filling fluid densities and compositions, a semi-empirical formula was used to correct the calibration coefficient measured in Bessines facility. In this work, we propose to use Monte Carlo simulations to improve gamma attenuation corrections. To this purpose, the NGRS probe and the calibration measurements in the standard concrete blocks have been modeled with MCNP computer code. The calibration coefficient determined by simulation, 5.3 s-1.ppmU-1 ± 10%, is in good agreement with the one measured in Bessines, 5.2 s-1.ppmU-1. Based on the validated MCNP model, several parametric studies have been performed. For instance, the rock density and chemical composition proved to have a limited impact on the calibration coefficient. However, gamma self-absorption in uranium leads to a nonlinear relationship between count rate and uranium concentration beyond approximately 1% of uranium weight fraction, the underestimation of the uranium content reaching more than a factor 2.5 for a 50 % uranium weight fraction. Next steps will concern parametric studies with different tubing materials, diameters and thicknesses, as well as different borehole filling fluids representative of real measurement conditions.

  6. Improving gross count gamma-ray logging in uranium mining with the NGRS probe

    Science.gov (United States)

    Carasco, C.; Pérot, B.; Ma, J.-L.; Toubon, H.; Dubille-Auchère, A.

    2018-01-01

    AREVA Mines and the Nuclear Measurement Laboratory of CEA Cadarache are collaborating to improve the sensitivity and precision of uranium concentration measurement by means of gamma ray logging. The determination of uranium concentration in boreholes is performed with the Natural Gamma Ray Sonde (NGRS) based on a NaI(Tl) scintillation detector. The total gamma count rate is converted into uranium concentration using a calibration coefficient measured in concrete blocks with known uranium concentration in the AREVA Mines calibration facility located in Bessines, France. Until now, to take into account gamma attenuation in a variety of boreholes diameters, tubing materials, diameters and thicknesses, filling fluid densities and compositions, a semi-empirical formula was used to correct the calibration coefficient measured in Bessines facility. In this work, we propose to use Monte Carlo simulations to improve gamma attenuation corrections. To this purpose, the NGRS probe and the calibration measurements in the standard concrete blocks have been modeled with MCNP computer code. The calibration coefficient determined by simulation, 5.3 s-1.ppmU-1 ± 10%, is in good agreement with the one measured in Bessines, 5.2 s-1.ppmU-1. Based on the validated MCNP model, several parametric studies have been performed. For instance, the rock density and chemical composition proved to have a limited impact on the calibration coefficient. However, gamma self-absorption in uranium leads to a nonlinear relationship between count rate and uranium concentration beyond approximately 1% of uranium weight fraction, the underestimation of the uranium content reaching more than a factor 2.5 for a 50 % uranium weight fraction. Next steps will concern parametric studies with different tubing materials, diameters and thicknesses, as well as different borehole filling fluids representative of real measurement conditions.

  7. One less trip : logging with less tripping, more protection

    Energy Technology Data Exchange (ETDEWEB)

    Byfield, M.

    2005-12-15

    New logging technology by Datalog Technology Inc. was described. Logging-while-tripping (LWT) technology uses a slim petrophysical sensor package that is moved to the targeted geological formation through a drill pipe, which reduces the exposure to vibration and shock involved in logging-while-drilling (LWD). The equipment features standard components in a patented configuration and comes in 2 segments: the receiver sub and the sensor package electronics. A receiver sub is inserted into the bottomhole assembly at the end of the drill string. Drilling progresses with the LWT sub in the bottomhole assembly until the borehole approaches the logging depth. The sensor package and electronics are then lowered into the drill string. If the well is horizontal, rig pumps push the package into the drill string until it lands in the LWT sub. Drill pipes are moved across the zone of interest and logs are recorded on downhole memory contained within the LWT package. As the logging operation progresses, a depth recorder at the surface records depth information along with the downhole recorders. When logging is completed, downhole tools are retrieved, and data downloaded from the LWT onboard memory is merged with the surface depth information to generate well logs. Retrieval via the drill string greatly reduces the risk of losing the logging gear, which contains radioactive material. Federal officials now routinely insist on extensive fishing operations to retrieve lost tools. If a well gets a gas kick while logging is in progress, the operator can still pump down mud or close the blowout preventer rams if necessary, and save time in determining where to perforate shallow gas wells. Compensated neutron logs, gamma rays, spectrum gamma rays, and induction have been tested with the LWT system. It was concluded that Petro-Canada has deployed the logs recently and has achieved results that compared satisfactorily with conventional logs. 2 figs.

  8. Lead diffusion in monazite

    International Nuclear Information System (INIS)

    Gardes, E.

    2006-06-01

    Proper knowledge of the diffusion rates of lead in monazite is necessary to understand the U-Th-Pb age anomalies of this mineral, which is one of the most used in geochronology after zircon. Diffusion experiments were performed in NdPO 4 monocrystals and in Nd 0.66 Ca 0.17 Th 0.17 PO 4 polycrystals from Nd 0.66 Pb 0.17 Th 0.17 PO 4 thin films to investigate Pb 2+ + Th 4+ ↔ 2 Nd 3+ and Pb 2+ ↔ Ca 2+ exchanges. Diffusion annealings were run between 1200 and 1500 Celsius degrees, at room pressure, for durations ranging from one hour to one month. The diffusion profiles were analysed using TEM (transmission electronic microscopy) and RBS (Rutherford backscattering spectroscopy). The diffusivities extracted for Pb 2+ + Th 4+ ↔ 2 Nd 3+ exchange follow an Arrhenius law with parameters E equals 509 ± 24 kJ mol -1 and log(D 0 (m 2 s -1 )) equals -3.41 ± 0.77. Preliminary data for Pb 2+ ↔ Ca 2+ exchange are in agreement with this result. The extrapolation of our data to crustal temperatures yields very slow diffusivities. For instance, the time necessary for a 50 μm grain to lose all of its lead at 800 Celsius degrees is greater than the age of the Earth. From these results and other evidence from the literature, we conclude that most of the perturbations in U-Th-Pb ages of monazite cannot be attributed to lead diffusion, but rather to interactions with fluids. (author)

  9. Calibration models for density borehole logging - construction report

    International Nuclear Information System (INIS)

    Engelmann, R.E.; Lewis, R.E.; Stromswold, D.C.

    1995-10-01

    Two machined blocks of magnesium and aluminum alloys form the basis for Hanford's density models. The blocks provide known densities of 1.780 ± 0.002 g/cm 3 and 2.804 ± 0.002 g/cm 3 for calibrating borehole logging tools that measure density based on gamma-ray scattering from a source in the tool. Each block is approximately 33 x 58 x 91 cm (13 x 23 x 36 in.) with cylindrical grooves cut into the sides of the blocks to hold steel casings of inner diameter 15 cm (6 in.) and 20 cm (8 in.). Spacers that can be inserted between the blocks and casings can create air gaps of thickness 0.64, 1.3, 1.9, and 2.5 cm (0.25, 0.5, 0.75 and 1.0 in.), simulating air gaps that can occur in actual wells from hole enlargements behind the casing

  10. Water saturation in shaly sands: logging parameters from log-derived values

    International Nuclear Information System (INIS)

    Miyairi, M.; Itoh, T.; Okabe, F.

    1976-01-01

    The methods are presented for determining the relation of porosity to formation factor and that of true resistivity of formation to water saturation, which were investigated through the log interpretation of one of the oil and gas fields of northern Japan Sea. The values of the coefficients ''a'' and ''m'' in porosity-formation factor relation are derived from cross-plot of porosity and resistivity of formation corrected by clay content. The saturation exponent ''n'' is determined from cross-plot of porosity and resistivity index on the assumption that the product of porosity and irreducible water saturation is constant. The relation of porosity to irreducible water saturation is also investigated from core analysis. The new logging parameters determined from the methods, a = 1, m = 2, n = 1.4, improved the values of water saturation by 6 percent in average, and made it easy to distinguish the points which belong to the productive zone and ones belonging to the nonproductive zone

  11. Role of eikonal approximation in the infrared domain

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, H; Sharma, S K [Saha Inst. of Nuclear Physics, Calcutta (India); Mallik, S [Bern Univ. (Switzerland). Inst. fuer Theoretische Physik

    1977-01-31

    It is shown that the infrared limit of amplitudes for ladder diagrams in spinor electrodynamics is given by eikonal approximation correctly upto terms of relative O(/t/sup(1/2)/ssup(1/2)) only if one also makes the 'small-angle assumption'. Leading corrections to eikonal amplitude contain s-channel poles which do not have Coulomb analogue. For fixed angle scattering the leading infrared contribution of ladder diagrams is obtained.

  12. The role of eikonal approximation in the infrared domain

    International Nuclear Information System (INIS)

    Banerjee, H.; Sharma, S.K.; Mallik, S.

    1977-01-01

    It is shown that the infrared limit of amplitudes for ladder diagrams in spinor electrodynamics is given by eikonal approximation correctly upto terms of relative O(/t/sup(1/2)/ssup(1/2)) only if one also makes the 'small-angle assumption'. Leading corrections to eikonal amplitude contain s-channel poles which do not have Coulomb analogue. For fixed angle scattering the leading infrared contribution of ladder diagrams is obtained. (Auth.)

  13. Rill erosion in burned and salvage logged western montane forests: Effects of logging equipment type, traffic level, and slash treatment

    Science.gov (United States)

    Wagenbrenner, J. W.; Robichaud, P. R.; Brown, R. E.

    2016-10-01

    Following wildfires, forest managers often consider salvage logging burned trees to recover monetary value of timber, reduce fuel loads, or to meet other objectives. Relatively little is known about the cumulative hydrologic effects of wildfire and subsequent timber harvest using logging equipment. We used controlled rill experiments in logged and unlogged (control) forests burned at high severity in northern Montana, eastern Washington, and southern British Columbia to quantify rill overland flow and sediment production rates (fluxes) after ground-based salvage logging. We tested different types of logging equipment-feller-bunchers, tracked and wheeled skidders, and wheeled forwarders-as well as traffic levels and the addition of slash to skid trails as a best management practice. Rill experiments were done at each location in the first year after the fire and repeated in subsequent years. Logging was completed in the first or second post-fire year. We found that ground-based logging using heavy equipment compacted soil, reduced soil water repellency, and reduced vegetation cover. Vegetation recovery rates were slower in most logged areas than the controls. Runoff rates were higher in the skidder and forwarder plots than their respective controls in the Montana and Washington sites in the year that logging occurred, and the difference in runoff between the skidder and control plots at the British Columbia site was nearly significant (p = 0.089). Most of the significant increases in runoff in the logged plots persisted for subsequent years. The type of skidder, the addition of slash, and the amount of forwarder traffic did not significantly affect the runoff rates. Across the three sites, rill sediment fluxes were 5-1900% greater in logged plots than the controls in the year of logging, and the increases were significant for all logging treatments except the low use forwarder trails. There was no difference in the first-year sediment fluxes between the feller

  14. Boundary curves of individual items in the distribution of total depressive symptom scores approximate an exponential pattern in a general population.

    Science.gov (United States)

    Tomitaka, Shinichiro; Kawasaki, Yohei; Ide, Kazuki; Akutagawa, Maiko; Yamada, Hiroshi; Furukawa, Toshiaki A; Ono, Yutaka

    2016-01-01

    Previously, we proposed a model for ordinal scale scoring in which individual thresholds for each item constitute a distribution by each item. This lead us to hypothesize that the boundary curves of each depressive symptom score in the distribution of total depressive symptom scores follow a common mathematical model, which is expressed as the product of the frequency of the total depressive symptom scores and the probability of the cumulative distribution function of each item threshold. To verify this hypothesis, we investigated the boundary curves of the distribution of total depressive symptom scores in a general population. Data collected from 21,040 subjects who had completed the Center for Epidemiologic Studies Depression Scale (CES-D) questionnaire as part of a national Japanese survey were analyzed. The CES-D consists of 20 items (16 negative items and four positive items). The boundary curves of adjacent item scores in the distribution of total depressive symptom scores for the 16 negative items were analyzed using log-normal scales and curve fitting. The boundary curves of adjacent item scores for a given symptom approximated a common linear pattern on a log normal scale. Curve fitting showed that an exponential fit had a markedly higher coefficient of determination than either linear or quadratic fits. With negative affect items, the gap between the total score curve and boundary curve continuously increased with increasing total depressive symptom scores on a log-normal scale, whereas the boundary curves of positive affect items, which are not considered manifest variables of the latent trait, did not exhibit such increases in this gap. The results of the present study support the hypothesis that the boundary curves of each depressive symptom score in the distribution of total depressive symptom scores commonly follow the predicted mathematical model, which was verified to approximate an exponential mathematical pattern.

  15. Boundary curves of individual items in the distribution of total depressive symptom scores approximate an exponential pattern in a general population

    Directory of Open Access Journals (Sweden)

    Shinichiro Tomitaka

    2016-10-01

    Full Text Available Background Previously, we proposed a model for ordinal scale scoring in which individual thresholds for each item constitute a distribution by each item. This lead us to hypothesize that the boundary curves of each depressive symptom score in the distribution of total depressive symptom scores follow a common mathematical model, which is expressed as the product of the frequency of the total depressive symptom scores and the probability of the cumulative distribution function of each item threshold. To verify this hypothesis, we investigated the boundary curves of the distribution of total depressive symptom scores in a general population. Methods Data collected from 21,040 subjects who had completed the Center for Epidemiologic Studies Depression Scale (CES-D questionnaire as part of a national Japanese survey were analyzed. The CES-D consists of 20 items (16 negative items and four positive items. The boundary curves of adjacent item scores in the distribution of total depressive symptom scores for the 16 negative items were analyzed using log-normal scales and curve fitting. Results The boundary curves of adjacent item scores for a given symptom approximated a common linear pattern on a log normal scale. Curve fitting showed that an exponential fit had a markedly higher coefficient of determination than either linear or quadratic fits. With negative affect items, the gap between the total score curve and boundary curve continuously increased with increasing total depressive symptom scores on a log-normal scale, whereas the boundary curves of positive affect items, which are not considered manifest variables of the latent trait, did not exhibit such increases in this gap. Discussion The results of the present study support the hypothesis that the boundary curves of each depressive symptom score in the distribution of total depressive symptom scores commonly follow the predicted mathematical model, which was verified to approximate an

  16. Geophysical borehole logging in the unsaturated zone, Yucca Mountain, Nevada

    International Nuclear Information System (INIS)

    Schimschal, U.; Nelson, P.H.

    1991-01-01

    Borehole geophysical logging for site characterization in the volcanic rocks at the proposed nuclear waste repository at Yucca Mountain, Nevada, requires data collection under rather unusual conditions. Logging tools must operate in rugose, dry holes above the water table in the unsaturated zone. Not all logging tools will operate in this environment, therefore; careful consideration must be given to selection and calibration. A sample suite of logs is presented that demonstrates correlation of geological formations from borehole to borehole, the definition of zones of altered mineralogy, and the quantitative estimates of rock properties. The authors show the results of an exploratory calculation of porosity and water saturation based upon density and epithermal neutron logs. Comparison of the results with a few core samples is encouraging, particularly because the logs can provide continuous data in boreholes where core samples are not available

  17. Aespoe Hard Rock Laboratory. BIPS logging in borehole KAS09

    International Nuclear Information System (INIS)

    Gustafsson, Jaana; Gustafsson, Christer

    2010-01-01

    This report includes the data gained in BIPS logging performed at the Aespoe Hard Rock Laboratory. The logging operation presented here includes BIPS logging in the core drilled borehole KAS09. The objective for the BIPS logging was to observe the condition of KAS09 in order to restore the borehole in the hydrogeological monitoring programme.All measurements were conducted by Malaa Geoscience AB on October 9th 2009. The objective of the BIPS logging is to achieve information of the borehole including occurrence of rock types as well as determination of fracture distribution and orientation. This report describes the equipment used as well as the measurement procedures and data gained. For the BIPS survey, the result is presented as images. The basic conditions of the BIPS logging for geological mapping and orientation of structures are satisfying for borehole KAS09, although induced affects from the drilling on the borehole walls limit the visibility

  18. Aespoe Hard Rock Laboratory. BIPS logging in borehole KAS09

    Energy Technology Data Exchange (ETDEWEB)

    Gustafsson, Jaana; Gustafsson, Christer (Malaa Geoscience AB (Sweden))

    2010-01-15

    This report includes the data gained in BIPS logging performed at the Aespoe Hard Rock Laboratory. The logging operation presented here includes BIPS logging in the core drilled borehole KAS09. The objective for the BIPS logging was to observe the condition of KAS09 in order to restore the borehole in the hydrogeological monitoring programme.All measurements were conducted by Malaa Geoscience AB on October 9th 2009. The objective of the BIPS logging is to achieve information of the borehole including occurrence of rock types as well as determination of fracture distribution and orientation. This report describes the equipment used as well as the measurement procedures and data gained. For the BIPS survey, the result is presented as images. The basic conditions of the BIPS logging for geological mapping and orientation of structures are satisfying for borehole KAS09, although induced affects from the drilling on the borehole walls limit the visibility

  19. Geophysical well logging operations and log analysis in Geothermal Well Desert Peak No. B-23-1

    Energy Technology Data Exchange (ETDEWEB)

    Sethi, D.K.; Fertl, W.H.

    1980-03-01

    Geothermal Well Desert Peak No. B-23-1 was logged by Dresser Atlas during April/May 1979 to a total depth of 2939 m (9642 ft). A temperature of 209/sup 0/C (408/sup 0/F) was observed on the maximum thermometer run with one of the logging tools. Borehole tools rated to a maximum temperature of 204.4/sup 0/C (400/sup 0/F) were utilized for logging except for the Densilog tool, which was from the other set of borehole instruments, rated to a still higher temperature, i.e., 260/sup 0/C (500/sup 0/F). The quality of the logs recorded and the environmental effects on the log response have been considered. The log response in the unusual lithologies of igneous and metamorphic formations encountered in this well could be correlated with the drill cutting data. An empirical, statistical log interpretation approach has made it possible to obtain meaningful information on the rocks penetrated. Various crossplots/histograms of the corrected log data have been generated on the computer. These are found to provide good resolution between the lithological units in the rock sequence. The crossplotting techniques and the statistical approach were combined with the drill cutting descriptions in order to arrive at the lithological characteristics. The results of log analysis and recommendations for logging of future wells have been included.

  20. Circular induction accelerator for borehole logging

    International Nuclear Information System (INIS)

    Chen, F.K.; Bertozzi, W.; Corris, G.W.; Diamond, W.; Doucet, J.A.; Schweitzer, J.S.

    1992-01-01

    This patent describes a downhole logging sonde adapted to be moved through a borehole, a source of gamma rays in the sonde for irradiating earth formations traversed by the borehole, one or more gamma ray detectors for detecting gamma rays scattered back to the sonde from the irradiated earth formations, and means for transmitting signals representative of the detected gamma rays to the earth's surface for processing. This patent describes improvement in the gamma ray source comprises a magnetic induction particle accelerator, including: a magnetic circuit having a field magnet, generally circular opposed pole pieces, and a core magnet metal ions from the group consisting of Mn, Zn and Ni; an excitation circuit including a field coil surrounding the field magnet and the core magnet and a core coil surrounding the central axially leg of the core magnet; an annular acceleration chamber interposed between the pole pieces; means for applying time-varying acceleration voltage pulses across the primary excitation circuit; means for injecting charged particles into orbit within the acceleration chamber; means for compressing the particle orbits to trap particles within generally circular orbits within the acceleration chamber; means for generating a particle accelerating magnetic flux in the magnetic circuit; and means for ejecting charged particles from the generally circular orbits and into contact with a target to produce gamma ray photons

  1. Acoustic and Optical Televiewer Borehole Logging

    International Nuclear Information System (INIS)

    Ahmad Hasnulhadi Che Kamaruddin; Nik Marzukee Nik Ibrahim; Zaidi Ibrahim; Nurul Wahida Ahmad Khairuddin; Azmi Ibrahim

    2016-01-01

    This review paper is focused on Borehole Televiewer. Borehole Televiewer or (BHTV) was used to obtain high-resolution acoustical images from the borehole wall. A probe with a high resolution downward looking camera is used. The camera has specific optics (a conical mirror with a ring of bulbs) with just one shot needed to capture the entire borehole circumference as a 360 panoramic view. Settings similar to traditional cameras (exposure, quality, light, frame rate and resolution) make it effective in almost any type of borehole fluid. After each shot, a series of horizontal pixel strings are acquired, giving a rasterized RGB picture in real-time which is transmitted to the console and finally to a monitor. The orientation device embedded in the tool, which is made of 3 inclinometers and 3 magnetometers, allows the inclination and azimuth of the probe to be computed in real-time, correctly orienting the borehole images. Besides, Acoustic and Optical Televiewer has been introduced as its advanced in technological research. Its logging has been successfully applied to geotechnical investigations and mineral exploration (Schepers et al., 2001) due to advances in beam focusing, increased dynamic range, digital recording techniques, and digital data processing (Schepers, 1991). Thus, this paper will go through to the basic principle of (BHTV) as one type of data collection today. (author)

  2. MCNP capabilities for nuclear well logging calculations

    International Nuclear Information System (INIS)

    Forster, R.A.; Little, R.C.; Briesmeister, J.F.; Hendricks, J.S.

    1990-01-01

    The Los Alamos Radiation Transport Code System (LARTCS) consists of state-of-the-art Monte Carlo and discrete ordinates transport codes and data libraries. This paper discusses how the general-purpose continuous-energy Monte Carlo code MCNP (Monte Carlo neutron photon), part of the LARTCS, provides a computational predictive capability for many applications of interest to the nuclear well logging community. The generalized three-dimensional geometry of MCNP is well suited for borehole-tool models. SABRINA, another component of the LARTCS, is a graphics code that can be used to interactively create a complex MCNP geometry. Users can define many source and tally characteristics with standard MCNP features. The time-dependent capability of the code is essential when modeling pulsed sources. Problems with neutrons, photons, and electrons as either single particle or coupled particles can be calculated with MCNP. The physics of neutron and photon transport and interactions is modeled in detail using the latest available cross-section data

  3. Acoustic reflection log in transversely isotropic formations

    Science.gov (United States)

    Ronquillo Jarillo, G.; Markova, I.; Markov, M.

    2018-01-01

    We have calculated the waveforms of sonic reflection logging for a fluid-filled borehole located in a transversely isotropic rock. Calculations have been performed for an acoustic impulse source with the characteristic frequency of tens of kilohertz that is considerably less than the frequencies of acoustic borehole imaging tools. It is assumed that the borehole axis coincides with the axis of symmetry of the transversely isotropic rock. It was shown that the reflected wave was excited most efficiently at resonant frequencies. These frequencies are close to the frequencies of oscillations of a fluid column located in an absolutely rigid hollow cylinder. We have shown that the acoustic reverberation is controlled by the acoustic impedance of the rock Z = Vphρs for fixed parameters of the borehole fluid, where Vph is the velocity of horizontally propagating P-wave; ρs is the rock density. The methods of waveform processing to determine the parameters characterizing the reflected wave have been discussed.

  4. Cost of skid roads for arch logging in West Virginia

    Science.gov (United States)

    George R., Jr. Trimble; Carl R. Barr

    1960-01-01

    In the mountain hardwood country of the northern Appalachians, tree-length skidding with tractor and arch has proved to be economical logging. One essential part of this type of logging is that tree-length logs are winched to the skid roads: tractor and arch do not run around through the woods. Winching distance is commonly 200 to 300 feet; and occasionally an extra...

  5. Western tight gas sands advanced logging workshop proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Jennings, J B; Carroll, Jr, H B [eds.

    1982-04-01

    An advanced logging research program is one major aspect of the Western Tight Sands Program. Purpose of this workshop is to help BETC define critical logging needs for tight gas sands and to allow free interchange of ideas on all aspects of the current logging research program. Sixteen papers and abstracts are included together with discussions. Separate abstracts have been prepared for the 12 papers. (DLC)

  6. An artificial intelligence approach to well log correlation

    International Nuclear Information System (INIS)

    Startzman, R.A.; Kuo, T.B.

    1986-01-01

    This paper shows how an expert computer system was developed to correlate two well logs in at least moderately difficult situations. A four step process was devised to process log trace information and apply a set of rules to identify zonal correlations. Some of the advantages and problems with the artificial intelligence approach are shown using field logs. The approach is useful and, if properly and systematically applied, it can result in good correlations

  7. Use of improved hydrologic testing and borehole geophysical logging methods for aquifer characterization

    International Nuclear Information System (INIS)

    Newcomer, D.R.; Hall, S.H.; Vermeul, V.R.

    1996-01-01

    Depth-discrete aquifer information was obtained using recently developed adaptations and improvements to conventional characterization techniques. These improvements included running neutron porosity and bulk density geophysical logging tools through a cased hole, performing an enhanced point-dilution tracer test for monitoring tracer concentration as a function of time and depth, and using pressure derivatives for diagnostic and quantitative analysis of constant rate discharge test data. Data results from the use of these techniques were used to develop a conceptual model of a heterogeneous aquifer. Depth-discrete aquifer information was required to effectively design field-scale deployment and monitoring of an in situ bioremediation technology. The bioremediation study site is located on the US Department of Energy's Hanford site. The study is being conducted by the Pacific Northwest National Laboratory to demonstrate in situ bioremediation of carbon tetrachloride (CCl 4 ). Geophysical logging and point-dilution tracer test results provided the relative distribution of porosity and horizontal hydraulic conductivity, respectively, with depth and correlated well. Hydraulic pumping tests were conducted to estimate mean values for transmissivity and effective hydraulic conductivity. Tracer test and geophysical logging results indicated that ground water flow was predominant in the upper approximate 10 feet of the aquifer investigated. These results were used to delineate a more representative interval thickness for estimating effective hydraulic conductivity. Hydraulic conductivity, calculated using this representative interval, was estimated to be 73 ft/d, approximately three times higher than that calculated using the full length of the screened test interval

  8. Towards an entropy-based analysis of log variability

    DEFF Research Database (Denmark)

    Back, Christoffer Olling; Debois, Søren; Slaats, Tijs

    2017-01-01

    the development of hybrid miners: given a (sub-)log, can we determine a priori whether the log is best suited for imperative or declarative mining? We propose using the concept of entropy, commonly used in information theory. We consider different measures for entropy that could be applied and show through...... experimentation on both synthetic and real-life logs that these entropy measures do indeed give insights into the complexity of the log and can act as an indicator of which mining paradigm should be used....

  9. Towards an Entropy-based Analysis of Log Variability

    DEFF Research Database (Denmark)

    Back, Christoffer Olling; Debois, Søren; Slaats, Tijs

    2018-01-01

    the development of hybrid miners: given a log, can we determine a priori whether the log is best suited for imperative or declarative mining? We propose using the concept of entropy, commonly used in information theory. We consider different measures for entropy that could be applied and show through...... experimentation on both synthetic and real-life logs that these entropy measures do indeed give insights into the complexity of the log and can act as an indicator of which mining paradigm should be used....

  10. Real Time Face Quality Assessment for Face Log Generation

    DEFF Research Database (Denmark)

    Kamal, Nasrollahi; Moeslund, Thomas B.

    2009-01-01

    Summarizing a long surveillance video to just a few best quality face images of each subject, a face-log, is of great importance in surveillance systems. Face quality assessment is the back-bone for face log generation and improving the quality assessment makes the face logs more reliable....... Developing a real time face quality assessment system using the most important facial features and employing it for face logs generation are the concerns of this paper. Extensive tests using four databases are carried out to validate the usability of the system....

  11. Calculating Resonance Positions and Widths Using the Siegert Approximation Method

    Science.gov (United States)

    Rapedius, Kevin

    2011-01-01

    Here, we present complex resonance states (or Siegert states) that describe the tunnelling decay of a trapped quantum particle from an intuitive point of view that naturally leads to the easily applicable Siegert approximation method. This can be used for analytical and numerical calculations of complex resonances of both the linear and nonlinear…

  12. Neutron-neutron-resonance logging of boron in boreholes with the use of the PRKS-2 radiometer

    International Nuclear Information System (INIS)

    Vakhtin, B.S.; Ivanov, V.S.; Filippov, E.M.; Novoselov, A.V.

    1973-01-01

    The well rig of the PRKS-2 logging radiometer is supplemented with a probe device for neutron measurements permitting to vary the probe size from 20 to 45 cm. To decrease the natural gamma radiation effect an external lead shield 7-mm thick having 50-mm outer diameter is fixed on the instrument sleeve. The instrument is provided with a NaI detector and a set of foils of Cd, Ag, Rh, Tu, In, Ta, and a Pu-Be source of 1x10 6 n/sec strength. The optimal size of the probe is assumed as 25 cm. From the results of well measurements a better differentiation of neutron resonance logging was noticed in comparison with neutron gamma logging. Comparing the data obtained with those of kern analysis a calibration curve was derived of neutron resonance logging versus B for wells of 59 mm dia

  13. Correlation and persistence of hunting and logging impacts on tropical rainforest mammals.

    Science.gov (United States)

    Brodie, Jedediah F; Giordano, Anthony J; Zipkin, Elise F; Bernard, Henry; Mohd-Azlan, Jayasilan; Ambu, Laurentius

    2015-02-01

    Humans influence tropical rainforest animals directly via exploitation and indirectly via habitat disturbance. Bushmeat hunting and logging occur extensively in tropical forests and have large effects on particular species. But how they alter animal diversity across landscape scales and whether their impacts are correlated across species remain less known. We used spatially widespread measurements of mammal occurrence across Malaysian Borneo and recently developed multispecies hierarchical models to assess the species richness of medium- to large-bodied terrestrial mammals while accounting for imperfect detection of all species. Hunting was associated with 31% lower species richness. Moreover, hunting remained high even where richness was very low, highlighting that hunting pressure persisted even in chronically overhunted areas. Newly logged sites had 11% lower species richness than unlogged sites, but sites logged >10 years previously had richness levels similar to those in old-growth forest. Hunting was a more serious long-term threat than logging for 91% of primate and ungulate species. Hunting and logging impacts across species were not correlated across taxa. Negative impacts of hunting were the greatest for common mammalian species, but commonness versus rarity was not related to species-specific impacts of logging. Direct human impacts appeared highly persistent and lead to defaunation of certain areas. These impacts were particularly severe for species of ecological importance as seed dispersers and herbivores. Indirect impacts were also strong but appeared to attenuate more rapidly than previously thought. The lack of correlation between direct and indirect impacts across species highlights that multifaceted conservation strategies may be needed for mammal conservation in tropical rainforests, Earth's most biodiverse ecosystems. © 2014 Society for Conservation Biology.

  14. Systematic logging utilizing a log sheet designed for drill core descriptions. An example in uranium exploration activities

    International Nuclear Information System (INIS)

    Sasao, Eiji; Tsuruta, Tadahiko; Iida, Yoshimasa

    2000-01-01

    We describe the log sheets used during uranium exploration activities for unconformity-related uranium deposits by JNC. The purpose of using the logging sheets is to standardize the objects which all geologists must observe and for data quality assurance. The log sheets are a three-part set describing basement lithology, sandstone lithology and geotechnics. We devised our own log sheets to describe both the sandstone and the underlying basement rock when we started exploration in Athabasca Basin, Canada. We modified the sheets to gain a better understanding of the geological features related to uranium mineralization, and made final improvements to satisfy required quality based on the criteria of descriptive objects and accuracy. Use of the log sheets resulted in effective performance of core logging and improvement in the display of data. (author)

  15. Accounting for measurement error in log regression models with applications to accelerated testing.

    Directory of Open Access Journals (Sweden)

    Robert Richardson

    Full Text Available In regression settings, parameter estimates will be biased when the explanatory variables are measured with error. This bias can significantly affect modeling goals. In particular, accelerated lifetime testing involves an extrapolation of the fitted model, and a small amount of bias in parameter estimates may result in a significant increase in the bias of the extrapolated predictions. Additionally, bias may arise when the stochastic component of a log regression model is assumed to be multiplicative when the actual underlying stochastic component is additive. To account for these possible sources of bias, a log regression model with measurement error and additive error is approximated by a weighted regression model which can be estimated using Iteratively Re-weighted Least Squares. Using the reduced Eyring equation in an accelerated testing setting, the model is compared to previously accepted approaches to modeling accelerated testing data with both simulations and real data.

  16. Accounting for measurement error in log regression models with applications to accelerated testing.

    Science.gov (United States)

    Richardson, Robert; Tolley, H Dennis; Evenson, William E; Lunt, Barry M

    2018-01-01

    In regression settings, parameter estimates will be biased when the explanatory variables are measured with error. This bias can significantly affect modeling goals. In particular, accelerated lifetime testing involves an extrapolation of the fitted model, and a small amount of bias in parameter estimates may result in a significant increase in the bias of the extrapolated predictions. Additionally, bias may arise when the stochastic component of a log regression model is assumed to be multiplicative when the actual underlying stochastic component is additive. To account for these possible sources of bias, a log regression model with measurement error and additive error is approximated by a weighted regression model which can be estimated using Iteratively Re-weighted Least Squares. Using the reduced Eyring equation in an accelerated testing setting, the model is compared to previously accepted approaches to modeling accelerated testing data with both simulations and real data.

  17. Estimation of geothermal gradients from single temperature log-field cases

    International Nuclear Information System (INIS)

    Kutasov, I M; Eppelbaum, L V

    2009-01-01

    A geothermal gradient is one of the most frequently used parameters in logging geophysics. However, the drilling process greatly disturbs the temperature of the formations around the wellbore. For this reason, in order to determine with the required accuracy the formation temperatures and geothermal gradients, a certain length of shut-in time is required. It was shown earlier (Kutasov 1968 Freiberger Forshungshefte C 238 55–61, 1987 Geothermics 16 467–72) that at least two transient temperature surveys are needed to determine the geothermal gradient with adequate accuracy. However, in many cases only one temperature log is conducted in a shut-in borehole. For these cases, we propose an approximate method for the estimation of the geothermal gradient. The utilization of this method is demonstrated on four field examples

  18. Static dictionaries on AC0 RAMs: query time (√log n/log log n) is necessary and sufficient

    DEFF Research Database (Denmark)

    Andersson, Arne; Miltersen, Peter Bro; Riis, Søren

    1996-01-01

    ) on the time for answering membership queries in a set of size n when reasonable space is used for the data structure storing the set; the upper bound can be obtained using O(n) space, and the lower bound holds even if we allow space 2polylog n. Several variations of this result are also obtained. Among others......, we show a tradeoff between time and circuit depth under the unit-cost assumption: any RAM instruction set which permits a linear space, constant query time solution to the static dictionary problem must have an instruction of depth Ω(log w/log log to), where w is the word size of the machine (and log...

  19. Trajectory averaging for stochastic approximation MCMC algorithms

    KAUST Repository

    Liang, Faming

    2010-01-01

    to the stochastic approximation Monte Carlo algorithm [Liang, Liu and Carroll J. Amer. Statist. Assoc. 102 (2007) 305-320]. The application of the trajectory averaging estimator to other stochastic approximationMCMC algorithms, for example, a stochastic

  20. Reduction of Linear Programming to Linear Approximation

    OpenAIRE

    Vaserstein, Leonid N.

    2006-01-01

    It is well known that every Chebyshev linear approximation problem can be reduced to a linear program. In this paper we show that conversely every linear program can be reduced to a Chebyshev linear approximation problem.

  1. Adaptive approximation of higher order posterior statistics

    KAUST Repository

    Lee, Wonjung

    2014-02-01

    Filtering is an approach for incorporating observed data into time-evolving systems. Instead of a family of Dirac delta masses that is widely used in Monte Carlo methods, we here use the Wiener chaos expansion for the parametrization of the conditioned probability distribution to solve the nonlinear filtering problem. The Wiener chaos expansion is not the best method for uncertainty propagation without observations. Nevertheless, the projection of the system variables in a fixed polynomial basis spanning the probability space might be a competitive representation in the presence of relatively frequent observations because the Wiener chaos approach not only leads to an accurate and efficient prediction for short time uncertainty quantification, but it also allows to apply several data assimilation methods that can be used to yield a better approximate filtering solution. The aim of the present paper is to investigate this hypothesis. We answer in the affirmative for the (stochastic) Lorenz-63 system based on numerical simulations in which the uncertainty quantification method and the data assimilation method are adaptively selected by whether the dynamics is driven by Brownian motion and the near-Gaussianity of the measure to be updated, respectively. © 2013 Elsevier Inc.

  2. Some relations between entropy and approximation numbers

    Institute of Scientific and Technical Information of China (English)

    郑志明

    1999-01-01

    A general result is obtained which relates the entropy numbers of compact maps on Hilbert space to its approximation numbers. Compared with previous works in this area, it is particularly convenient for dealing with the cases where the approximation numbers decay rapidly. A nice estimation between entropy and approximation numbers for noncompact maps is given.

  3. Axiomatic Characterizations of IVF Rough Approximation Operators

    Directory of Open Access Journals (Sweden)

    Guangji Yu

    2014-01-01

    Full Text Available This paper is devoted to the study of axiomatic characterizations of IVF rough approximation operators. IVF approximation spaces are investigated. The fact that different IVF operators satisfy some axioms to guarantee the existence of different types of IVF relations which produce the same operators is proved and then IVF rough approximation operators are characterized by axioms.

  4. An approximation for kanban controlled assembly systems

    NARCIS (Netherlands)

    Topan, E.; Avsar, Z.M.

    2011-01-01

    An approximation is proposed to evaluate the steady-state performance of kanban controlled two-stage assembly systems. The development of the approximation is as follows. The considered continuous-time Markov chain is aggregated keeping the model exact, and this aggregate model is approximated

  5. Operator approximant problems arising from quantum theory

    CERN Document Server

    Maher, Philip J

    2017-01-01

    This book offers an account of a number of aspects of operator theory, mainly developed since the 1980s, whose problems have their roots in quantum theory. The research presented is in non-commutative operator approximation theory or, to use Halmos' terminology, in operator approximants. Focusing on the concept of approximants, this self-contained book is suitable for graduate courses.

  6. Physiological and morphological responses of pine and willow saplings to post-fire salvage logging

    Science.gov (United States)

    Millions, E. L.; Letts, M. G.; Harvey, T.; Rood, S. B.

    2015-12-01

    With global warming, forest fires may be increasing in frequency, and post-fire salvage logging may become more common. The ecophysiological impacts of this practice on tree saplings remain poorly understood. In this study, we examined the physiological and morphological impacts of increased light intensity, due to post-fire salvage logging, on the conifer Pinus contorta (pine) and deciduous broadleaf Salix lucida (willow) tree and shrub species in the Crowsnest Pass region of southern Alberta. Photosynthetic gas-exchange and plant morphological measurements were taken throughout the summer of 2013 on approximately ten year-old saplings of both species. Neither species exhibited photoinhibition, but different strategies were observed to acclimate to increased light availability. Willow saplings were able to slightly elevate their light-saturated rate of net photosynthesis (Amax) when exposed to higher photosynthetic photon flux density (PPFD), thus increasing their growth rate. Willow also exhibited increased leaf inclination angles and leaf mass per unit area (LMA), to decrease light interception in the salvage-logged plot. By contrast, pine, which exhibited lower Amax and transpiration (E), but higher water-use efficiency (WUE = Amax/E) than willow, increased the rate at which electrons were moved through and away from the photosynthetic apparatus in order to avoid photoinhibition. Acclimation indices were higher in willow saplings, consistent with the hypothesis that species with short-lived foliage exhibit greater acclimation. LMA was higher in pine saplings growing in the logged plot, but whole-plant and branch-level morphological acclimation was limited and more consistent with a response to decreased competition in the logged plot, which had much lower stand density.

  7. Mining the SDSS SkyServer SQL queries log

    Science.gov (United States)

    Hirota, Vitor M.; Santos, Rafael; Raddick, Jordan; Thakar, Ani

    2016-05-01

    SkyServer, the Internet portal for the Sloan Digital Sky Survey (SDSS) astronomic catalog, provides a set of tools that allows data access for astronomers and scientific education. One of SkyServer data access interfaces allows users to enter ad-hoc SQL statements to query the catalog. SkyServer also presents some template queries that can be used as basis for more complex queries. This interface has logged over 330 million queries submitted since 2001. It is expected that analysis of this data can be used to investigate usage patterns, identify potential new classes of queries, find similar queries, etc. and to shed some light on how users interact with the Sloan Digital Sky Survey data and how scientists have adopted the new paradigm of e-Science, which could in turn lead to enhancements on the user interfaces and experience in general. In this paper we review some approaches to SQL query mining, apply the traditional techniques used in the literature and present lessons learned, namely, that the general text mining approach for feature extraction and clustering does not seem to be adequate for this type of data, and, most importantly, we find that this type of analysis can result in very different queries being clustered together.

  8. Use of gamma logging for calculating reserves of hydrogenic deposits

    International Nuclear Information System (INIS)

    Polkanov, Yu.G.

    1992-01-01

    Recently, in studies of hydrogenic deposits of uranium, great importance was laid on investigating the effect of radium halos, incorrect accounting of which leads to overestimates of the depth of the mineralization and to errors in determining the uranium content by radiographic methods. Radium halos are located both in the rear and in the front of ore deposits. Ores located in the front of ore deposits are primarily formed from the diffusion of radium into rocks near the ores. Radium halos located in the rear of the deposits are called residual halos. They are caused by the retention of radium in sections from which the uranium already has been carried away. In order to consider the radium halos, which are confined to zones of stratified oxidation and adjoining ore intervals, one uses the dependence of the edge mass fraction of radium at the boundaries of the (uranium) ore intervals on the average radium mass fraction in the intervals. This method makes it possible to separate with satisfactory accuracy sections on the γ-ray logging curves which corresponds to zones of stratified oxidation (red-colored rock) and to exclude them in calculating the reserves

  9. Logging a roadside stand to protect scenic values

    Science.gov (United States)

    Philip M. McDonald; Raymond V. Whiteley

    1972-01-01

    A case study on the Challenge Experimental Forest, California, demonstrated that logging along roadsides need not despoil roadside stands. Nearly every tree was "viewed" before marking. Because of the "special-care" procedures followed, combined logging and slash-disposal cost was about twice that of a single-tree selection cut.

  10. Condition and fate of logged forests in the Brazilian Amazon.

    Science.gov (United States)

    Gregory P. Asner; Eben N. Broadbent; Paulo J. C. Oliveira; Michael Keller; David E. Knapp; Jose N. M. Silva

    2006-01-01

    The long-term viability of a forest industry in the Amazon region of Brazil depends on the maintenance of adequate timber volume and growth in healthy forests. Using extensive high-resolution satellite analyses, we studied the forest damage caused by recent logging operations and the likelihood that logged forests would be cleared within 4 years after timber harvest....

  11. Veneer-log production and receipts, North Central Region, 1976.

    Science.gov (United States)

    James E. Blyth; Jerold T. Hahn

    1978-01-01

    Shows 1976 veneer-log production and receipts by species in the Lake States (Michigan, Minnesota, and Wisconsin) and in the Central States (Illinois, Indiana, Iowa, and Missouri). Comparisons are made with similar data for 1974. Includes tables showing veneer-log production and receipts (for selected years) since 1946 in the Lake States and since 1956 in the Central...

  12. Veneer-log production and receipts, North Central Region, 1974.

    Science.gov (United States)

    James E. Blyth; Jerold T. Hahn

    1976-01-01

    Shows 1974 veneer-log production and receipts by species in the Lake States (Michigan, Minnesota, and Wisconsin) and in the Central States (Illinois, Indiana, Iowa, and Missouri). Comparisons are made with similar data for 1972. Includes tables showing veneer-log production and receipts (for selected years) since 1946 in the Lake States and since 1956 in the Central...

  13. A selective logging mechanism for hardware transactional memory systems

    OpenAIRE

    Lupon Navazo, Marc; Magklis, Grigorios; González Colás, Antonio María

    2011-01-01

    Log-based Hardware Transactional Memory (HTM) systems offer an elegant solution to handle speculative data that overflow transactional L1 caches. By keeping the pre-transactional values on a software-resident log, speculative values can be safely moved across the memory hierarchy, without requiring expensive searches on L1 misses or commits.

  14. Teaching an Old Log New Tricks with Machine Learning.

    Science.gov (United States)

    Schnell, Krista; Puri, Colin; Mahler, Paul; Dukatz, Carl

    2014-03-01

    To most people, the log file would not be considered an exciting area in technology today. However, these relatively benign, slowly growing data sources can drive large business transformations when combined with modern-day analytics. Accenture Technology Labs has built a new framework that helps to expand existing vendor solutions to create new methods of gaining insights from these benevolent information springs. This framework provides a systematic and effective machine-learning mechanism to understand, analyze, and visualize heterogeneous log files. These techniques enable an automated approach to analyzing log content in real time, learning relevant behaviors, and creating actionable insights applicable in traditionally reactive situations. Using this approach, companies can now tap into a wealth of knowledge residing in log file data that is currently being collected but underutilized because of its overwhelming variety and volume. By using log files as an important data input into the larger enterprise data supply chain, businesses have the opportunity to enhance their current operational log management solution and generate entirely new business insights-no longer limited to the realm of reactive IT management, but extending from proactive product improvement to defense from attacks. As we will discuss, this solution has immediate relevance in the telecommunications and security industries. However, the most forward-looking companies can take it even further. How? By thinking beyond the log file and applying the same machine-learning framework to other log file use cases (including logistics, social media, and consumer behavior) and any other transactional data source.

  15. Predictive models of forest logging residues of Triplochiton ...

    African Journals Online (AJOL)

    The model developed indicated that logarithmic functions performed better than other form of equation. The findings of this study revealed that there is significant logging residues left to waste in the forest after timber harvest and quantifying this logging residue in terms of biomass model can serve as management tools in ...

  16. Secure Audit Logging with Tamper-Resistant Hardware

    NARCIS (Netherlands)

    Chong, C.N.; Peng, Z.; Peng, Z.; Hartel, Pieter H.; Gritzalis, D.; De Capitani di Vimercati, S.; Katsikas, S.K.; Samarati, P.

    Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user's actions on content and enables detection of some forms of tampering with

  17. Ubiquitous Learning Project Using Life-Logging Technology in Japan

    Science.gov (United States)

    Ogata, Hiroaki; Hou, Bin; Li, Mengmeng; Uosaki, Noriko; Mouri, Kosuke; Liu, Songran

    2014-01-01

    A Ubiquitous Learning Log (ULL) is defined as a digital record of what a learner has learned in daily life using ubiquitous computing technologies. In this paper, a project which developed a system called SCROLL (System for Capturing and Reusing Of Learning Log) is presented. The aim of developing SCROLL is to help learners record, organize,…

  18. 14 CFR 125.407 - Maintenance log: Airplanes.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Maintenance log: Airplanes. 125.407 Section... OPERATIONS: AIRPLANES HAVING A SEATING CAPACITY OF 20 OR MORE PASSENGERS OR A MAXIMUM PAYLOAD CAPACITY OF 6... Maintenance log: Airplanes. (a) Each person who takes corrective action or defers action concerning a reported...

  19. Ontology-driven extraction of event logs from relational databases

    NARCIS (Netherlands)

    Calvanese, Diego; Montali, Marco; Syamsiyah, Alifah; van der Aalst, Wil M P; Reichert, M.; Reijers, H.A.

    2015-01-01

    Process mining is an emerging discipline whose aim is to discover, monitor and improve real processes by extracting knowledge from event logs representing actual process executions in a given organizational setting. In this light, it can be applied only if faithful event logs, adhering to accepted

  20. Prediction of Log "P": ALOGPS Application in Medicinal Chemistry Education

    Science.gov (United States)

    Kujawski, Jacek; Bernard, Marek K.; Janusz, Anna; Kuzma, Weronika

    2012-01-01

    Molecular hydrophobicity (lipophilicity), usually quantified as log "P" where "P" is the partition coefficient, is an important molecular characteristic in medicinal chemistry and drug design. The log "P" coefficient is one of the principal parameters for the estimation of lipophilicity of chemical compounds and pharmacokinetic properties. The…