Sample records for metabolic log entry

  1. Pinpointing water entries using pulsed neutron and Production logging tools

    Mukerji, P.; Oluwa, J.


    A successful work over requires a comprehensive understanding of fluid entries into the wellbore and fluid contact movement in the reservoir. Such information can be obtained by a combination of production logs and saturation-monitoring measurements. The ability to combine pulsed neutron and production logging tools provides the operator with better diagnostics for identifying candidates for remedial actions and greatly increases the possibility of a successful well intervention. Advances in pulsed neutron spectroscopy tools have improved the accuracy and precision of measured carbon/oxygen ratios. Some of the improvements in accuracy and precision have resulted from better tool characterization in a wider variety of logging environments in the calibration facility and new spectral standards. Coincident with the advances in pulsed neutron spectroscopy has been the development of production logging measurements run on a platform common. We will show how the application of pulsed neutron and production logs can optimize subsequent well intervention to reduce water production and/or increase oil production

  2. An Entry Point for Formal Methods: Specification and Analysis of Event Logs

    Howard Barringer


    Full Text Available Formal specification languages have long languished, due to the grave scalability problems faced by complete verification methods. Runtime verification promises to use formal specifications to automate part of the more scalable art of testing, but has not been widely applied to real systems, and often falters due to the cost and complexity of instrumentation for online monitoring. In this paper we discuss work in progress to apply an event-based specification system to the logging mechanism of the Mars Science Laboratory mission at JPL. By focusing on log analysis, we exploit the "instrumentation" already implemented and required for communicating with the spacecraft. We argue that this work both shows a practical method for using formal specifications in testing and opens interesting research avenues, including a challenging specification learning problem.

  3. Cystatin C, CRP, log TG/HDLc and metabolic syndrome are associated with microalbuminuria in hypertension

    Moura, Rafaela do Socorro Souza e Silva [Pós-Graduação em Ciências Médicas, Faculdade de Medicina, Universidade de Brasília, Brasília, DF (Brazil); Vasconcelos, Daniel França [Área de Cardiologia, Faculdade de Medicina, Universidade de Brasília, Brasília, DF (Brazil); Freitas, Eduardo [Departamento de Estatística, Universidade de Brasília, Brasília, DF (Brazil); Moura, Flavio José Dutra de; Rosa, Tânia Torres; Veiga, Joel Paulo Russomano, E-mail: [Área de Clínica Médica, Nefrologia, Faculdade de Medicina, Universidade de Brasília, Brasília, DF (Brazil)


    In patients with systemic hypertension, microalbuminuria is a marker of endothelial damage and is associated with an increased risk for cardiovascular disease. To determine the factors that may lead to the occurrence of microalbuminuria in hypertensive patients with serum creatinine lower than 1.5 mg/dL. This cross-sectional study included 133 Brazilians with essential hypertension followed up at a hypertension outpatient clinic. Those with serum creatinine higher than 1.5 mg/dL, as well as those with diabetes mellitus, were excluded. Systolic and diastolic blood pressures were measured, and body mass index (BMI) and GFR estimated by using the CKD-EPI formula were calculated. The serum levels of the following were assessed: CysC, creatinine, total cholesterol, HDL cholesterol, LDL cholesterol, triglycerides, C-reactive protein (CRP) and fasting glucose. Microalbuminuria was determined in 24-hour urine. Hypertensive patients were classified according to the presence of one or more criteria for metabolic syndrome. In a multiple regression analysis, the serum levels of CysC and CRP, the atherogenic index log TG/HDLc and the presence of three or more criteria for metabolic syndrome were positively correlated with microalbuminuria (r{sup 2}: 0.277, p < 0.05). CysC, CRP, log TG/HDLc, and the presence of three or more criteria for metabolic syndrome, regardless of serum creatinine, were associated with microalbuminuria, an early marker of kidney damage and cardiovascular risk in patients with essential hypertension.

  4. Cystatin C, CRP, log TG/HDLc and metabolic syndrome are associated with microalbuminuria in hypertension

    Moura, Rafaela do Socorro Souza e Silva; Vasconcelos, Daniel França; Freitas, Eduardo; Moura, Flavio José Dutra de; Rosa, Tânia Torres; Veiga, Joel Paulo Russomano


    In patients with systemic hypertension, microalbuminuria is a marker of endothelial damage and is associated with an increased risk for cardiovascular disease. To determine the factors that may lead to the occurrence of microalbuminuria in hypertensive patients with serum creatinine lower than 1.5 mg/dL. This cross-sectional study included 133 Brazilians with essential hypertension followed up at a hypertension outpatient clinic. Those with serum creatinine higher than 1.5 mg/dL, as well as those with diabetes mellitus, were excluded. Systolic and diastolic blood pressures were measured, and body mass index (BMI) and GFR estimated by using the CKD-EPI formula were calculated. The serum levels of the following were assessed: CysC, creatinine, total cholesterol, HDL cholesterol, LDL cholesterol, triglycerides, C-reactive protein (CRP) and fasting glucose. Microalbuminuria was determined in 24-hour urine. Hypertensive patients were classified according to the presence of one or more criteria for metabolic syndrome. In a multiple regression analysis, the serum levels of CysC and CRP, the atherogenic index log TG/HDLc and the presence of three or more criteria for metabolic syndrome were positively correlated with microalbuminuria (r 2 : 0.277, p < 0.05). CysC, CRP, log TG/HDLc, and the presence of three or more criteria for metabolic syndrome, regardless of serum creatinine, were associated with microalbuminuria, an early marker of kidney damage and cardiovascular risk in patients with essential hypertension

  5. Molecular time-course and the metabolic basis of entry into dauer in Caenorhabditis elegans.

    Pan-Young Jeong

    Full Text Available When Caenorhabditis elegans senses dauer pheromone (daumone, signaling inadequate growth conditions, it enters the dauer state, which is capable of long-term survival. However, the molecular pathway of dauer entry in C. elegans has remained elusive. To systematically monitor changes in gene expression in dauer paths, we used a DNA microarray containing 22,625 gene probes corresponding to 22,150 unique genes from C. elegans. We employed two different paths: direct exposure to daumone (Path 1 and normal growth media plus liquid culture (Path 2. Our data reveal that entry into dauer is accomplished through the multi-step process, which appears to be compartmentalized in time and according to metabolic flux. That is, a time-course of dauer entry in Path 1 shows that dauer larvae formation begins at post-embryonic stage S4 (48 h and is complete at S6 (72 h. Our results also suggest the presence of a unique adaptive metabolic control mechanism that requires both stage-specific expression of specific genes and tight regulation of different modes of fuel metabolite utilization to sustain the energy balance in the context of prolonged survival under adverse growth conditions. It is apparent that worms entering dauer stage may rely heavily on carbohydrate-based energy reserves, whereas dauer larvae utilize fat or glyoxylate cycle-based energy sources. We created a comprehensive web-based dauer metabolic database for C. elegans ( that makes it possible to search any gene and compare its relative expression at a specific stage, or evaluate overall patterns of gene expression in both paths. This database can be accessed by the research community and could be widely applicable to other related nematodes as a molecular atlas.

  6. Blocking hexose entry into glycolysis activates alternative metabolic conversion of these sugars and upregulates pentose metabolism in Aspergillus nidulans

    Khosravi, Claire; Battaglia, Evy; Kun, Roland S.; Dalhuijsen, Sacha; Visser, Jaap; Aguilar-Pontes, Maria V.; Zhou, Miamiao; Heyman, Heino M.; Kim, Young-Mo; Baker, Scott E.; de Vries, Ronald P.


    Background: Plant biomass is the most abundant carbon source for many fungal species. In the biobased industry fungi are used to produce lignocellulolytic enzymes to degrade agricultural waste biomass. Here we evaluated if it would be possible to create an Aspergillus nidulans strain that releases but does not metabolize hexoses from plant biomass. For this purpose, metabolic mutants were generated that were impaired in glycolysis, by using hexokinase (hxkA) and glucokinase (glkA) negative strains. To prevent repression of enzyme production due to the hexose accumulation, strains were generated that combined these mutations with a deletion in creA, the repressor involved in regulating preferential use of different carbon catabolic pathways. Results: Phenotypic analysis revealed reduced growth for the hxkA1 glkA4 mutant on wheat bran. However, hexoses did not accumulate during growth of the mutants on wheat bran, suggesting that glucose metabolism is re-routed towards alternative carbon catabolic pathways. The creAΔ4 mutation in combination with preventing initial phosphorylation in glycolysis resulted in better growth than the hxkA/glkA mutant and an increased expression of pentose catabolic and pentose phosphate pathway genes. This indicates that the reduced ability to use hexoses as carbon sources created a shift towards the pentose fraction of wheat bran as a major carbon source to support growth. Conclusion: Blocking the direct entry of hexoses to glycolysis activates alternative metabolic conversion of these sugars in A. nidulans during growth on plant biomass, but also upregulates conversion of other sugars, such as pentoses.

  7. Exercise training decreases store-operated Ca2+entry associated with metabolic syndrome and coronary atherosclerosis.

    Edwards, Jason M; Neeb, Zachary P; Alloosh, Mouhamad A; Long, Xin; Bratz, Ian N; Peller, Cassandra R; Byrd, James P; Kumar, Sanjay; Obukhov, Alexander G; Sturek, Michael


    Stenting attenuates restenosis, but accelerated coronary artery disease (CAD) adjacent to the stent (peri-stent CAD) remains a concern in metabolic syndrome (MetS). Smooth muscle cell proliferation, a major mechanism of CAD, is mediated partly by myoplasmic Ca2+ dysregulation and store-operated Ca2+ entry (SOCE) via canonical transient receptor potential 1 (TRPC1) channels is proposed to play a key role. Exercise is known to prevent Ca2+ dysregulation in CAD. We tested the hypothesis that MetS increases SOCE and peri-stent CAD and exercise attenuates these events. Groups (n = 9 pigs each) were (i) healthy lean Ossabaw swine fed standard chow, (ii) excess calorie atherogenic diet fed (MetS), and (iii) aerobically exercise trained starting after 50 weeks of development of MetS (XMetS). Bare metal stents were placed after 54 weeks on diets, and CAD and SOCE were assessed 4 weeks later. Coronary cells were dispersed proximal to the stent (peri-stent) and from non-stent segments, and fura-2 fluorescence was used to assess SOCE, which was verified by Ni2+ blockade and insensitivity to nifedipine. XMetS pigs had increased physical work capacity and decreased LDL/HDL (P molecular expression of TRPC1, STIM1, and Orai1 in MetS.

  8. Borehole logging

    Olsen, H.


    Numerous ground water investigations have been accomplished by means of borehole logging. Borehole logging can be applied to establish new water recovery wells, to control the existing water producing wells and source areas and to estimate ground water quality. (EG)

  9. Serious Learning with Science Comics: "Antarctic Log" as a Tool for Understanding Climate Research in AntarcticaScience comics open doors, providing multiple entry points for diverse learners. Karen Romano Young, award-winning author, presents "Antarctic Log", a comic about her spring 2018 Palmer Station tour, a tool for teaching and inspiration.

    Young, K. R.


    Graphic nonfiction: what is it? Some call these books and articles science comics, but they're no joke: created through research and direct experience by artists invested in creating multiple entry points for new learners, comics can open doors for discovery as introduction, enrichment, or as a vital center point to teaching. Find out what educational pedagogists, scientists, and - yes! - students themselves think about reading, viewing, learning from, and creating science comics in the classroom. Karen Romano Young is the award-winning author of traditional and graphic fiction and nonfiction for children, including Doodlebug, the forthcoming Diving for Deep-Sea Dragons, and the Odyssey/Muse magazine comics feature Humanimal Doodles. In spring 2018 (Antarctic autumn) Young will work as part of a Bigelow Laboratory team studying the production of DMSP by phytoplankton, and the resulting cloud formation. This is invisible stuff, difficult for lay audiences to envision and comprehend. But the audience is already forming around "Antarctic Log," a science comic that tells the story of the science and the experience of doing climate research at Palmer Station as winter draws near. Science comics aren't just for enrichment. They're an invitation, providing multiple entry points for diverse learners. I have received unanticipated support from education groups (including NSTA and IRA), parenting groups, and special educators because these highly visual presentations of middle grade and middle school level material makes the stories and concepts accessible to atypical fiction- and science-reading audiences. As a result, I've learned a great deal about the underlying differences between my material and traditional, text-oriented materials in which visuals may be highly coordinated but are still ancillary. An article that might seem forbidding as text appears open to interpretation in my format, so that readers can pick where to begin reading and how to proceed through the

  10. Astrocyte glycogenolysis is triggered by store-operated calcium entry and provides metabolic energy for cellular calcium homeostasis

    Müller, Margit S; Fox, Rebecca; Schousboe, Arne


    Astrocytic glycogen, the only storage form of glucose in the brain, has been shown to play a fundamental role in supporting learning and memory, an effect achieved by providing metabolic support for neurons. We have examined the interplay between glycogenolysis and the bioenergetics of astrocytic...

  11. Encyclopedia of well logging

    Desbrandes, R.


    The 16 chapters of this book aim to provide students, trainees and engineers with a manual covering all well-logging measurements ranging from drilling to productions, from oil to minerals going by way of geothermal energy. Each chapter is a summary but a bibliography is given at the end of each chapter. Well-logging during drilling, wireline logging equipment and techniques, petroleum logging, data processing of borehole data, interpretation of well-logging, sampling tools, completion and production logging, logging in relief wells to kill off uncontrolled blowouts, techniques for high temperature geothermal energy, small-scale mining and hydrology, logging with oil-base mud and finally recommended logging programs are all topics covered. There is one chapter on nuclear well-logging which is indexed separately. (UK)

  12. Metabolism

    ... Are More Common in People With Type 1 Diabetes Metabolic Syndrome Your Child's Weight Healthy Eating Endocrine System Blood Test: Basic Metabolic Panel (BMP) Activity: Endocrine System Growth Disorders Diabetes Center Thyroid Disorders Your Endocrine System Movie: Endocrine ...

  13. Mechanism of resistance of noncycling mammalian cells to 4'-(9-acridinylamino)methanesulfon-m-anisidide: comparison of uptake, metabolism, and DNA breakage in log- and plateau-phase Chinese hamster fibroblast cell cultures

    Robbie, M.A.; Baguley, B.C.; Denny, W.A.; Gavin, J.B.; Wilson, W.R.


    Resistance of noncycling cells to amsacrine (m-AMSA) has been widely reported and may limit the activity of this drug against solid tumors. The biochemical mechanism(s) for this resistance have been investigated using spontaneously transformed Chinese hamster fibroblasts (AA8 cells, a subline of Chinese hamster ovary-cells) in log- and plateau-phase spinner cultures. In early plateau phase most cells entered a growth-arrested state with a G1-G0 DNA content and showed a marked decrease in sensitivity to cytotoxicity induced by a 1-h exposure to m-AMSA or to its solid tumor-active analogue, CI-921. Studies with radiolabeled m-AMSA established that similar levels of drug were accumulated by log- and plateau-phase cells and that there was no significant drug metabolism in either of these cultures after 1 h. However, marked differences in sensitivity to m-AMSA-induced DNA breakage were observed using a fluorescence assay for DNA unwinding. Changes in sensitivity to DNA breakage occurred in parallel with changes in sensitivity to m-AMSA-induced cell killing. DNA breaks disappeared rapidly after drug removal (half-time approximately 4 min), suggesting that these lesions were probably mediated by DNA topoisomerase II. Resistance to m-AMSA may therefore be associated with changes in topoisomerase II activity in noncycling cells

  14. http Log Analysis

    Bøving, Kristian Billeskov; Simonsen, Jesper


    This article documents how log analysis can inform qualitative studies concerning the usage of web-based information systems (WIS). No prior research has used http log files as data to study collaboration between multiple users in organisational settings. We investigate how to perform http log...... analysis; what http log analysis says about the nature of collaborative WIS use; and how results from http log analysis may support other data collection methods such as surveys, interviews, and observation. The analysis of log files initially lends itself to research designs, which serve to test...... hypotheses using a quantitative methodology. We show that http log analysis can also be valuable in qualitative research such as case studies. The results from http log analysis can be triangulated with other data sources and for example serve as a means of supporting the interpretation of interview data...

  15. Log N-log S in inconclusive

    Klebesadel, R. W.; Fenimore, E. E.; Laros, J.


    The log N-log S data acquired by the Pioneer Venus Orbiter Gamma Burst Detector (PVO) are presented and compared to similar data from the Soviet KONUS experiment. Although the PVO data are consistent with and suggestive of a -3/2 power law distribution, the results are not adequate at this state of observations to differentiate between a -3/2 and a -1 power law slope.

  16. The Meaning of Logs

    Etalle, Sandro; Massacci, Fabio; Yautsiukhin, Artsiom


    While logging events is becoming increasingly common in computing, in communication and in collaborative work, log systems need to satisfy increasingly challenging (if not conflicting) requirements.Despite the growing pervasiveness of log systems, to date there is no high-level framework which

  17. The Meaning of Logs

    Etalle, Sandro; Massacci, Fabio; Yautsiukhin, Artsiom; Lambrinoudakis, Costas; Pernul, Günther; Tjoa, A Min

    While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not conflicting) requirements. In this paper we propose a high-level framework for modeling log systems, and reasoning about

  18. Metabolism

    ... lin), which signals cells to increase their anabolic activities. Metabolism is a complicated chemical process, so it's not ... how those enzymes or hormones work. When the metabolism of body chemicals is ... Hyperthyroidism (pronounced: hi-per-THIGH-roy-dih-zum). Hyperthyroidism ...

  19. LogScope

    Havelund, Klaus; Smith, Margaret H.; Barringer, Howard; Groce, Alex


    LogScope is a software package for analyzing log files. The intended use is for offline post-processing of such logs, after the execution of the system under test. LogScope can, however, in principle, also be used to monitor systems online during their execution. Logs are checked against requirements formulated as monitors expressed in a rule-based specification language. This language has similarities to a state machine language, but is more expressive, for example, in its handling of data parameters. The specification language is user friendly, simple, and yet expressive enough for many practical scenarios. The LogScope software was initially developed to specifically assist in testing JPL s Mars Science Laboratory (MSL) flight software, but it is very generic in nature and can be applied to any application that produces some form of logging information (which almost any software does).

  20. US Ports of Entry

    Department of Homeland Security — HSIP Non-Crossing Ports-of-Entry A Port of Entry is any designated place at which a CBP officer is authorized to accept entries of merchandise to collect duties, and...

  1. Radiometric well logging instruments

    Davydov, A.V.


    The technical properties of well instruments for radioactive logging used in the radiometric logging complexes PKS-1000-1 (''Sond-1'') and PRKS-2 (''Vitok-2'') are described. The main features of the electric circuit of the measuring channels are given

  2. Power to the logs!

    CERN. Geneva; MACMAHON, Joseph


    Are you tired of using grep, vi and emacs to read your logs? Do you feel like you’re missing the big picture? Does the word "statistics" put a smile on your face? Then it’s time to give power to the logs!

  3. Digital mineral logging system

    West, J.B.


    A digital mineral logging system acquires data from a mineral logging tool passing through a borehole and transmits the data uphole to an electronic digital signal processor. A predetermined combination of sensors, including a deviometer, is located in a logging tool for the acquisition of the desired data as the logging tool is raised from the borehole. Sensor data in analog format is converted in the logging tool to a digital format and periodically batch transmitted to the surface at a predetermined sampling rate. An identification code is provided for each mineral logging tool, and the code is transmitted to the surface along with the sensor data. The self-identifying tool code is transmitted to the digital signal processor to identify the code against a stored list of the range of numbers assigned to that type of tool. The data is transmitted up the d-c power lines of the tool by a frequency shift key transmission technique. At the surface, a frequency shift key demodulation unit transmits the decoupled data to an asynchronous receiver interfaced to the electronic digital signal processor. During a recording phase, the signals from the logging tool are read by the electronic digital signal processor and stored for later processing. During a calculating phase, the stored data is processed by the digital signal processor and the results are outputted to a printer or plotter, or both

  4. Mariners Weather Log

    National Oceanic and Atmospheric Administration, Department of Commerce — The Mariners Weather Log (MWL) is a publication containing articles, news and information about marine weather events and phenomena, worldwide environmental impact...

  5. Log-inject-log in sand consolidation

    Murphy, R.P.; Spurlock, J.W.


    A method is described for gathering information for the determination of the adequacy of placement of sand consolidating plastic for sand control in oil and gas wells. The method uses a high neutron cross-section tracer which becomes part of the plastic and uses pulsed neutron logging before and after injection of the plastic. Preferably, the method uses lithium, boron, indium, and/or cadmium tracers. Boron oxide is especially useful and can be dissolved in alcohol and mixed with the plastic ingredients

  6. Elephant logging and environment



    The natural environment comprises non-biological elements such as air, water, light, heat and biological elements of animal and plant life; all interact with each other to create an ecosystem. Human activities like over-exploitation of forest results in deforestation and desertification. This consequently changes ecological balance. Topics on: (1) history of elephants utilization; (2) elephant logging; (3) classification of elephants; (4) dragging gear; (5) elephant power; (6) elephant logging and environment, are discussed

  7. Jesus' Entry into Jerusalem

    Juho Sankamo


    Full Text Available This article intends to contribute to the understanding of Jesus’ entry into Jerusalem. The author studies the entry, which is found in all the Gospels, in its Jewish context. The author argues that Jesus’ entry into Jerusalem on an ass is to be understood as a prophetic sign which was primarily meant to convey a message to the Jews.

  8. Log4J

    Perry, Steven


    Log4j has been around for a while now, and it seems like so many applications use it. I've used it in my applications for years now, and I'll bet you have too. But every time I need to do something with log4j I've never done before I find myself searching for examples of how to do whatever that is, and I don't usually have much luck. I believe the reason for this is that there is a not a great deal of useful information about log4j, either in print or on the Internet. The information is too simple to be of real-world use, too complicated to be distilled quickly (which is what most developers

  9. Mechanics of log calibration

    Waller, W.C.; Cram, M.E.; Hall, J.E.


    For any measurement to have meaning, it must be related to generally accepted standard units by a valid and specified system of comparison. To calibrate well-logging tools, sensing systems are designed which produce consistent and repeatable indications over the range for which the tool was intended. The basics of calibration theory, procedures, and calibration record presentations are reviewed. Calibrations for induction, electrical, radioactivity, and sonic logging tools will be discussed. The authors' intent is to provide an understanding of the sources of errors, of the way errors are minimized in the calibration process, and of the significance of changes in recorded calibration data

  10. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin


    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US?Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3%...

  11. Log of Apollo 11.

    National Aeronautics and Space Administration, Washington, DC.

    The major events of the first manned moon landing mission, Apollo 11, are presented in chronological order from launch time until arrival of the astronauts aboard the U.S.S. Hornet. The log is descriptive, non-technical, and includes numerous color photographs of the astronauts on the moon. (PR)

  12. Borehole logging system

    Allen, L.S.


    A radioactive borehole logging tool employs an epithermal neutron detector having a neutron counter surrounded by an inner thermal neutron filter and an outer thermal neutron filter. Located between the inner and outer filters is a neutron moderating material for extending the lifetime of epithermal neutrons to enhance the counting rate of such epithermal neutrons by the neutron counter

  13. Neutron--neutron logging

    Allen, L.S.


    A borehole logging tool includes a steady-state source of fast neutrons, two epithermal neutron detectors, and two thermal neutron detectors. A count rate meter is connected to each neutron detector. A first ratio detector provides an indication of the porosity of the formation surrounding the borehole by determining the ratio of the outputs of the two count rate meters connected to the two epithermal neutron detectors. A second ratio detector provides an indication of both porosity and macroscopic absorption cross section of the formation surrounding the borehole by determining the ratio of the outputs of the two count rate meters connected to the two thermal neutron detectors. By comparing the signals of the two ratio detectors, oil bearing zones and salt water bearing zones within the formation being logged can be distinguished and the amount of oil saturation can be determined. 6 claims, 2 figures

  14. Financial Indicators of Reduced Impact Logging Performance in Brazil: Case Study Comparisons

    Thomas P. Holmes; Frederick Boltz; Douglas R. Carter


    Indicators of financial performance are compared for three case studies in the Brazilian Amazon. Each case study presents parameters obtained from monitoring initial harvest entries into primary forests for reduced impact logging (RIL) and conventional logging (CL) operations. Differences in cost definitions and data collection protocols complicate the analysis, and...

  15. Pulsed radiation decay logging

    Mills, W.R. Jr.


    There are provided new and improved well logging processes and systems wherein the detection of secondary radiation is accomplished during a plurality of time windows in a manner to accurately characterize the decay rate of the secondary radiation. The system comprises a well logging tool having a primary pulsed radiation source which emits repetitive time-spaced bursts of primary radiation and detector means for detecting secondary radiation resulting from the primary radiation and producing output signals in response to the detected radiation. A plurality of measuring channels are provided, each of which produces a count rate function representative of signals received from the detector means during successive time windows occurring between the primary radiation bursts. The logging system further comprises means responsive to the measuring channels for producing a plurality of functions representative of the ratios of the radiation count rates measured during adjacent pairs of the time windows. Comparator means function to compare the ratio functions and select at least one of the ratio functions to generate a signal representative of the decay rate of the secondary radiation

  16. Geophysical borehole logging

    McCann, D.; Barton, K.J.; Hearn, K.


    Most of the available literature on geophysical borehole logging refers to studies carried out in sedimentary rocks. It is only in recent years that any great interest has been shown in geophysical logging in boreholes in metamorphic and igneous rocks following the development of research programmes associated with geothermal energy and nuclear waste disposal. This report is concerned with the programme of geophysical logging carried out on the three deep boreholes at Altnabreac, Caithness, to examine the effectiveness of these methods in crystalline rock. Of particular importance is the assessment of the performance of the various geophysical sondes run in the boreholes in relation to the rock mass properties. The geophysical data can be used to provide additional in-situ information on the geological, hydrogeological and engineering properties of the rock mass. Fracturing and weathering in the rock mass have a considerable effect on both the design parameters for an engineering structure and the flow of water through the rock mass; hence, the relation between the geophysical properties and the degree of fracturing and weathering is examined in some detail. (author)

  17. Double entry bookkeeping vs single entry bookkeeping

    Ileana Andreica


    Full Text Available Abstract: A financial management eficiently begin, primarily, with an accounting record kept in the best possible conditions, this being conditioned on the adoption of a uniform forms, rational, clear and simple accounting. Throughout history, there have been known two forms of accounting: the simple and double entry. Romanian society after 1990 underwent a substantial change in social structure, the sector on which put a great emphasis being private, that of small manufacturers, peddler, freelance, who work independently and authorized or as associative form (family enterprises, various associations (owners, tenants, etc., liberal professions, etc.. They are obliged to keep a simple bookkeeping, because they have no juridical personality. Companies with legal personality are required to keep double entry bookkeeping; therefore, knowledge and border demarcation between the two forms of organisation of accounting is an essential. The material used for this work is mainly represented by the financial and accounting documents, by the analysis of the economic, by legislative updated sources, and as the method was used the comparison method, using hypothetical data, in case of an authorized individual and a legal entity. Based on the chosen material, an authorized individual (who perform single entry accounting system and a juridical entity (who perform double entry accounting system were selected comparative case studies, using hypothetical data, were analysed advantages and disadvantages in term of fiscal, if using two accounting systems, then were highlighted some conclusion that result.

  18. Pulse neutron logging technique

    Bespalov, D.F.; Dylyuk, A.A.


    A new method of neutron-burst logging is proposed, residing in irradiating rocks with fast neutron bursts and registering the integrated flux burst of thermal and/or epithermal neutrons, from the moment of its initiation to that of full absorption. The obtaained value is representative of the rock properties (porosity, hydrogen content). The integrated flux in a burst of thermal and epithermal neutrons can be measured both by way of activation of a reference sample of a known chemical composition during the neutron burst and by recording the radiation of induced activity of the sample within an interval between two bursts. The proposed method features high informative value, accuracy and efficiency

  19. Double entry bookkeeping vs single entry bookkeeping

    Ileana Andreica


    Abstract: A financial management eficiently begin, primarily, with an accounting record kept in the best possible conditions, this being conditioned on the adoption of a uniform forms, rational, clear and simple accounting. Throughout history, there have been known two forms of accounting: the simple and double entry. Romanian society after 1990 underwent a substantial change in social structure, the sector on which put a great emphasis being private, that of small manufacturers, ped...

  20. Nova Event Logging System

    Calliger, R.J.; Suski, G.J.


    Nova is a 200 terawatt, 10-beam High Energy Glass Laser currently under construction at LLNL. This facility, designed to demonstrate the feasibility of laser driven inertial confinement fusion, contains over 5000 elements requiring coordinated control, data acquisition, and analysis functions. The large amounts of data that will be generated must be maintained over the life of the facility. Often the most useful but inaccessible data is that related to time dependent events associated with, for example, operator actions or experiment activity. We have developed an Event Logging System to synchronously record, maintain, and analyze, in part, this data. We see the system as being particularly useful to the physics and engineering staffs of medium and large facilities in that it is entirely separate from experimental apparatus and control devices. The design criteria, implementation, use, and benefits of such a system will be discussed

  1. Querying Workflow Logs

    Yan Tang


    Full Text Available A business process or workflow is an assembly of tasks that accomplishes a business goal. Business process management is the study of the design, configuration/implementation, enactment and monitoring, analysis, and re-design of workflows. The traditional methodology for the re-design and improvement of workflows relies on the well-known sequence of extract, transform, and load (ETL, data/process warehousing, and online analytical processing (OLAP tools. In this paper, we study the ad hoc queryiny of process enactments for (data-centric business processes, bypassing the traditional methodology for more flexibility in querying. We develop an algebraic query language based on “incident patterns” with four operators inspired from Business Process Model and Notation (BPMN representation, allowing the user to formulate ad hoc queries directly over workflow logs. A formal semantics of this query language, a preliminary query evaluation algorithm, and a group of elementary properties of the operators are provided.

  2. Border Crossing Entry Data

    Department of Transportation — The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics for inbound crossings at the U.S.-Canadian and the U.S.-Mexican...

  3. Interpretation of horizontal well production logs: influence of logging tool

    Ozkan, E. [Colorado School of Mines, Boulder, CO (United States); Sarica, C. [Pennsylvania State Univ., College Park, PA (United States); Haci, M. [Drilling Measurements, Inc (United States)


    The influence of a production-logging tool on wellbore flow rate and pressure measurements was investigated, focusing on the disturbence caused by the production-logging tool and the coiled tubing on the original flow conditions in the wellbore. The investigation was carried out using an analytical model and single-phase liquid flow was assumed. Results showed that the production-logging tool influenced the measurements as shown by the deviation of the original flow-rate, pressure profiles and low-conductivity wellbores. High production rates increase the effect of the production-logging tool. Recovering or inferring the original flow conditions in the wellbore from the production-logging data is a very complex process which cannot be solved easily. For this reason, the conditions under which the information obtained by production-logging is meaningful is of considerable practical interest. 7 refs., 2 tabs., 15 figs.

  4. Entry and Exit.


    1. Introduction R Analyses of industrial competition have attained a new vigor with the application of game -theoretic methods. The process of... competition is represented in models that reflect genuine struggles for entry, market power, and continuing survival. Dynamics and informational effects are...presents a few of the models developed recently to study competitive processes that affect a firm’s entry into a market , and the decision to exit. The

  5. Continuous Tamper-proof Logging using TPM2.0


    process each log entry. Additional hardware support could mitigate this problem. Tradeoffs between performance and security guarantees Disk write...becomes weaker as the block size increases. This problem is mitigated in protocol B by allowing offline recovery from a power failure and detection of...M.K., Isozaki, H.: Flicker : An execution infrastructure for TCB minimization. ACM SIGOPS Operating Systems Review 42(4) (2008) 315–328 24. Parno, B

  6. Entry: direct control or regulation?

    Perotti, E.; Vorage, M.


    We model a setting in which citizens form coalitions to seek preferential entry to a given market. The lower entry the higher firm profits and political contributions, but the lower social welfare. Politicians choose to either control entry directly and be illegally bribed, or regulate entry using a

  7. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin


    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  8. Logging concessions enable illegal logging crisis in the Peruvian Amazon.

    Finer, Matt; Jenkins, Clinton N; Sky, Melissa A Blue; Pine, Justin


    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  9. An innovative OSCE clinical log station: a quantitative study of its influence on Log use by medical students

    Hudson Judith N


    Full Text Available Abstract Background A Clinical Log was introduced as part of a medical student learning portfolio, aiming to develop a habit of critical reflection while learning was taking place, and provide feedback to students and the institution on learning progress. It was designed as a longitudinal self-directed structured record of student learning events, with reflection on these for personal and professional development, and actions planned or taken for learning. As incentive was needed to encourage student engagement, an innovative Clinical Log station was introduced in the OSCE, an assessment format with established acceptance at the School. This study questions: How does an OSCE Clinical Log station influence Log use by students? Methods The Log station was introduced into the formative, and subsequent summative, OSCEs with careful attention to student and assessor training, marking rubrics and the standard setting procedure. The scoring process sought evidence of educational use of the log, and an ability to present and reflect on key learning issues in a concise and coherent manner. Results Analysis of the first cohort’s Log use over the four-year course (quantified as number of patient visits entered by all students revealed limited initial use. Usage was stimulated after introduction of the Log station early in third year, with some improvement during the subsequent year-long integrated community-based clerkship. Student reflection, quantified by the mean number of characters in the ‘reflection’ fields per entry, peaked just prior to the final OSCE (mid-Year 4. Following this, very few students continued to enter and reflect on clinical experience using the Log. Conclusion While the current study suggested that we can’t assume students will self-reflect unless such an activity is included in an assessment, ongoing work has focused on building learner and faculty confidence in the value of self-reflection as part of being a competent

  10. SNG-logs at Skjern

    Korsbech, Uffe C C; Petersen, Jesper; Aage, Helle Karina


    Spectral Natural Gamma-ray logs have been run in two water supply borings at Skjern. The log data have been examined by a new technique - Noise Adjusted Singular Value Decomposition - in order to get a detailed and reliable picture of the distribution of uranium and thorium gamma-rays from heavy...

  11. Exclusive Dealing and Entry

    João Leão


    This paper examines the use of exclusive dealing agreements to prevent the entry of rival firms. An exclusive dealing agreement is a contract between a buyer and a seller where the buyer commits to buy a good exclusively from the seller. One main concern of the literature is to explain how an incumbent seller is able to persuade the buyers to sign an exclusive dealing agreement that deters the entry of a more efficient rival seller. We propose a new explanation when the buyers are downstream ...

  12. Lobbying on entry

    Perotti, E.C.; Volpin, P.


    We develop a model of endogenous lobby formation in which wealth inequality and political accountability undermine entry and financial development. Incumbents seek a low level of effective investor protection to prevent potential entrants from raising capital. They succeed because they can promise

  13. A revised design and implementation of the ATLAS Log Service package

    Murillo Garcia, Raul; Lehamnn Miotto, Giovanna; ATLAS TDAQ Collaboration


    This paper presents a revised design and implementation of the Log Service for the ATLAS Trigger and Data Acquisition (TDAQ) framework at CERN. A previous version of this utility was rarely used for various reasons, herein explained. The lessons learned set the grounds and motivation for a new redesign. The Log Service consists of the Logger, the entity that collects logs and stores them in an Oracle database; a set of user utilities to access and maintain the database; and a Java based tool, known as the Log Manager, which provides a compact and intuitive interface for browsing the log messages based on a user defined search criteria. The outline of these software components are explained, including various optimization techniques deployed in order to handle the large volume of entries expected to be stored in the database. Finally, a performance study has been conducted to prove the validity and behavior of the Log Service.

  14. A revised design and implementation of the ATLAS Log Service package

    Murillo García, R; The ATLAS collaboration


    This paper presents a revised design and implementation of the Log Service for the ATLAS Trigger and Data Acquisition (TDAQ) framework at CERN. A previous version of this utility was rarely used for various reasons, herein explained. The lessons learned set the grounds and motivation for a new redesign. The Log Service consists of the Logger, the entity that collects logs and stores them in an Oracle database; a set of user utilities to access and maintain the database; and a Java based tool, known as the Log Manager, which provides a compact and intuitive interface for browsing the log messages based on a user defined search criteria. The outline of these software components are explained, including various optimization techniques deployed in order to handle the large volume of entries expected to be stored in the database. Finally, a performance study has been conducted to prove the validity and behavior of the Log Service.

  15. Engineering aspects of radiometric logging

    Huppert, P.


    Engineering problems encountered in the development of nuclear borehole logging techniques are discussed. Spectrometric techniques require electronic stability of the equipment. In addition the electronics must be capable of handling high count rates of randomly distributed pulses of fast rise time from the detector and the systems must be designed so that precise calibration is possible under field operating conditions. Components of a logging system are discussed in detail. They include the logging probe (electronics, detector, high voltage supply, preamplifier), electronic instrumentation for data collection and processing and auxiliary equipment

  16. Log-balanced combinatorial sequences

    Tomislav Došlic


    Full Text Available We consider log-convex sequences that satisfy an additional constraint imposed on their rate of growth. We call such sequences log-balanced. It is shown that all such sequences satisfy a pair of double inequalities. Sufficient conditions for log-balancedness are given for the case when the sequence satisfies a two- (or more- term linear recurrence. It is shown that many combinatorially interesting sequences belong to this class, and, as a consequence, that the above-mentioned double inequalities are valid for all of them.

  17. VT Route Log Points 2017

    Vermont Center for Geographic Information — This data layer is used with VTrans' Integrated Route Log System (IRA). It is also used to calibrate the linear referencing systems, including the End-to-End and...

  18. New materials for fireplace logs

    Kieselback, D. J.; Smock, A. W.


    Fibrous insulation and refractory concrete are used for logs as well as fireproof walls, incinerator bricks, planters, and roof shingles. Insulation is lighter and more shock resistant than fireclay. Lightweight slag bonded with refractory concrete serves as aggregrate.

  19. Atmospheric Entry Studies for Uranus

    Agrawal, P.; Allen, G. A.; Hwang, H. H.; Marley, M. S.; McGuire, M. K.; Garcia, J. A.; Sklyanskiy, E.; Huynh, L. C.; Moses, R. W.


    To better understand the technology requirements for Uranus atmospheric entry probe, Entry Vehicle Technology project funded an internal study with a multidisciplinary team from NASA Ames, Langley and JPL. The results of this study are communicated.

  20. Border Crossing/Entry Data

    Department of Transportation — The dataset is known as “Border Crossing/Entry Data.” The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics to the...

  1. Palm distributions for log Gaussian Cox processes

    Coeurjolly, Jean-Francois; Møller, Jesper; Waagepetersen, Rasmus Plenge


    This paper establishes a remarkable result regarding Palm distributions for a log Gaussian Cox process: the reduced Palm distribution for a log Gaussian Cox process is itself a log Gaussian Cox process that only differs from the original log Gaussian Cox process in the intensity function. This new...... result is used to study functional summaries for log Gaussian Cox processes....

  2. Log quality enhancement: A systematic assessment of logging company wellsite performance and log quality

    Farnan, R.A.; Mc Hattie, C.M.


    To improve the monitoring of logging company performance, computer programs were developed to assess information en masse from log quality check lists completed on wellsite by the service company engineer and Phillips representative. A study of all logging jobs performed by different service companies for Phillips in Oklahoma (panhandle excepted) during 1982 enabled several pertinent and beneficial interpretations to be made. Company A provided the best tool and crew service. Company B incurred an excessive amount of lost time related to tool failure, in particular the neutron-density tool combination. Company C, although used only three times, incurred no lost time. With a reasonable data base valid conclusions were made pertaining, for example, to repeated tool malfunctions. The actual logs were then assessed for quality

  3. Storage of sparse files using parallel log-structured file system

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron


    A sparse file is stored without holes by storing a data portion of the sparse file using a parallel log-structured file system; and generating an index entry for the data portion, the index entry comprising a logical offset, physical offset and length of the data portion. The holes can be restored to the sparse file upon a reading of the sparse file. The data portion can be stored at a logical end of the sparse file. Additional storage efficiency can optionally be achieved by (i) detecting a write pattern for a plurality of the data portions and generating a single patterned index entry for the plurality of the patterned data portions; and/or (ii) storing the patterned index entries for a plurality of the sparse files in a single directory, wherein each entry in the single directory comprises an identifier of a corresponding sparse file.

  4. Pulsed neutron generator for logging

    Thibideau, F.D.


    A pulsed neutron generator for uranium logging is described. This generator is one component of a prototype uranium logging probe which is being developed by SLA to detect, and assay, uranium by borehole logging. The logging method is based on the measurement of epithermal neutrons resulting from the prompt fissioning of uranium from a pulsed source of 17.6 MeV neutrons. An objective of the prototype probe was that its diameter not exceed 2.75 inches, which would allow its use in conventional rotary drill holes of 4.75-inch diameter. This restriction limited the generator to a maximum 2.375-inch diameter. The performance requirements for the neutron generator specified that it operate with a nominal output of 5 x 10 6 neutrons/pulse at up to 100 pulses/second for a one-hour period. The development of a neutron generator meeting the preliminary design goals was completed and two prototype models were delivered to SLA. These two generators have been used by SLA to log a number of boreholes in field evaluation of the probe. The results of the field evaluations have led to the recommendation of several changes to improve the probe's operation. Some of these changes will require additional development effort on the neutron generator. It is expected that this work will be performed during 1977. The design and operation of the first prototype neutron generators is described

  5. Hardwood log grades and lumber grade yields for factory lumber logs

    Leland F. Hanks; Glenn L. Gammon; Robert L. Brisbin; Everette D. Rast


    The USDA Forest Service Standard Grades for Hardwood Factory Lumber Logs are described, and lumber grade yields for 16 species and 2 species groups are presented by log grade and log diameter. The grades enable foresters, log buyers, and log sellers to select and grade those log suitable for conversion into standard factory grade lumber. By using the apropriate lumber...

  6. The log S -log N distribution of gamma ray brust

    Yamagami, Takamasa; Nishimura, Jun; Fujii, Masami


    The relation between the size S and the frequency N of gamma ray burst has been studied. This relation may be determined from the celestial distribution of gamma ray burst sources. The present analysis gives that the log S - log N relation for any direction is determined by the celestial distribution of gamma ray burst sources. The observed bursts were analyzed. The celestial distribution of gamma ray burst sources was observed by the satellites of USSR. The results showed that the distribution seemed to be isotropic. However, the calculated log S - log N relation based on the isotropic distribution wasF in disagreement with the observed ones. As the result of analysis, it was found that the observed bursts missed low energy part because of the threshold of detectors. The levels of discrimination of detection were not clear. When a proper threshold level is set for each type of burst, and the size of bursts is determined, the above mentioned discrepancy will be deleted regardless of luminosity and the spatial distribution of bursts. (Kato, T.)

  7. Mud Logging; Control geologico en perforaciones petroliferas (Mud Logging)

    Pumarega Lafuente, J.C.


    Mud Logging is an important activity in the oil field and it is a key job in drilling operations, our duties are the acquisition, collection and interpretation of the geological and engineering data at the wellsite, also inform the client immediately of any significant changes in the well. (Author)

  8. Borehole logging for uranium exploration


    The present text has been prepared taking into account the requirements of both developing countries, which might be at an incipient stage of uranium exploration, and industrialized countries, where more advanced exploration and resource evaluation techniques are commonly in use. While it was felt necessary to include some discussion of exploration concepts and fundamental physical principles underlying various logging methods, it was not the intention of the consultants to provide a thorough, detailed explanation of the various techniques, or even to give a comprehensive listing thereof. However, a list of references has been included, and it is strongly recommended that the serious student of mineral logging consult this list for further guidance

  9. Pulsed neutron porosity logging system

    Smith, H.D. Jr.; Smith, M.P.; Schultz, W.E.


    An improved pulsed neutron porosity logging system is provided in the present invention. A logging tool provided with a 14 MeV pulsed neutron source, an epithermal neutron detector, and a fast neutron detector is moved through a borehole. Repetitive bursts of neutrons irradiate the earth formations and, during the bursts, the fast neutron population is sampled. During the interval between bursts the epithermal neutron population is sampled along with background gamma radiation due to lingering thermal neutrons. The fast and epithermal neutron population measurements are combined to provide a measurement of formation porosity

  10. Macrophage sphingolipids are essential for the entry of mycobacteria.

    Viswanathan, Gopinath; Jafurulla, Md; Kumar, G Aditya; Raghunand, Tirumalai R; Chattopadhyay, Amitabha


    Mycobacteria are intracellular pathogens that can invade and survive within host macrophages. Mycobacterial infections remain a major cause of mortality and morbidity worldwide, with serious concerns of emergence of multi and extensively drug-resistant tuberculosis. While significant advances have been made in identifying mycobacterial virulence determinants, the detailed molecular mechanism of internalization of mycobacteria into host cells remains poorly understood. Although several studies have highlighted the crucial role of sphingolipids in mycobacterial growth, persistence and establishment of infection, the role of sphingolipids in the entry of mycobacteria into host cells is not known. In this work, we explored the role of host membrane sphingolipids in the entry of Mycobacterium smegmatis into J774A.1 macrophages. Our results show that metabolic depletion of sphingolipids in host macrophages results in a significant reduction in the entry of M. smegmatis. Importantly, the entry of Escherichia coli into host macrophages under similar conditions remained invariant, implying the specificity of the requirement of sphingolipids in mycobacterial entry. To the best of our knowledge, our results constitute the first report demonstrating the role of host macrophage sphingolipids in the entry of mycobacteria. Our results could help in the development of novel therapeutic strategies targeting sphingolipid-mediated entry of mycobacteria into host cells. Copyright © 2018 Elsevier B.V. All rights reserved.

  11. Logging Work Injuries in Appalachia

    Charles H. Wolf; Gilbert P. Dempsey


    Logging accidents are costly. They may bring pain to injured workers, hardship to their families, and higher insurance premiums and lower productivity to their employers. Our analysis of 1,172 injuries in central Appalachia reveals that nearly half of all time lost-and almost all fatalities-resulted from accidents during felling and unloading. The largest proportion of...

  12. Log files for testing usability

    Klein Teeselink, G.; Siepe, A.H.M.; Pijper, de J.R.


    The aim of this study is to gain insight in the usefulness of log file analysis as a method to evaluate the usability of individual interface components and their influence on the usability of the overall user interface. We selected a music player as application, with four different interfaces and

  13. Hardwood log supply: a broader perspective

    Iris Montague; Adri Andersch; Jan Wiedenbeck; Urs. Buehlmann


    At regional and state meetings we talk with others in our business about the problems we face: log exports, log quality, log markets, logger shortages, cash flow problems, the weather. These are familiar talking points and real and persistent problems. But what is the relative importance of these problems for log procurement in different regions of...

  14. Unsupervised signature extraction from forensic logs

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.


    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  15. A method of estimating log weights.

    Charles N. Mann; Hilton H. Lysons


    This paper presents a practical method of estimating the weights of logs before they are yarded. Knowledge of log weights is required to achieve optimum loading of modern yarding equipment. Truckloads of logs are weighed and measured to obtain a local density index (pounds per cubic foot) for a species of logs. The density index is then used to estimate the weights of...

  16. Nondestructive evaluation for sorting red maple logs

    Xiping Wang; Robert J. Ross; David W. Green; Karl Englund; Michael Wolcott


    Existing log grading procedures in the United States make only visual assessments of log quality. These procedures do not incorporate estimates of the modulus of elasticity (MOE) of logs. It is questionable whether the visual grading procedures currently used for logs adequately assess the potential quality of structural products manufactured from them, especially...

  17. Nuclear well logging in hydrology


    The optimum development of regional and local groundwater resources requires a quantitative evaluation of its aquifers and aquicludes, and of the physical and chemical properties relevant to the recharge to and withdrawal of water from them. If an understanding of the groundwater regime is to be obtained, geological observations at outcrop must be augmented by subsurface measurements of the strata and the waters they contain. Measurements of many hydrological and geological parameters can be made in situ by nuclear geophysical well-logging methods. Very simply, well logging consists of lowering a measuring probe into a well and making a continuous record of the variations of a particular parameter with depth. In most circumstances, repetition of the measurements under differing hydrodynamic conditions results in a better definition of the flow regime in the aquifer. Nuclear well-logging techniques have for some years been capable of solving a number of the sub-surface measurement problems faced by hydrogeologists. However, the present usage of these methods varies from country to country and the literature concerning applications is scattered in the professional journals of several disciplines. The objective of this report is to include in a single reference volume descriptions of the physical principles of nuclear logging methods, their applications to hydrogeological problems and their limitations on a level suitable for the practising hydrologists with a limited knowledge of nuclear physics. The Working Group responsible for compiling the report recommended that it should cover a broad spectrum of hydrogeological investigations and problems. For example, it saw no valid reason to distinguish for the purposes of the report between well-logging applications for water-supply purposes and for water-flooding studies in the petroleum industry. Neutron measurements made for soil-moisture determinations in the unsaturated zone have been specifically omitted, however, as

  18. Advertising and generic market entry.

    Königbauer, Ingrid


    The effect of purely persuasive advertising on generic market entry and social welfare is analysed. An incumbent has the possibility to invest in advertising which affects the prescribing physician's perceived relative qualities of the brand-name and the generic version of the drug. Advertising creates product differentiation and can induce generic market entry which is deterred without differentiation due to strong Bertrand competition. However, over-investment in advertising can deter generic market entry under certain conditions and reduces welfare as compared to accommodated market entry.

  19. Entry-Control Systems Handbook


    The function of an entry-control system in a total Physical Protection System is to allow the movement of authorized personnel and material through normal access routes, yet detect and delay unauthorized movement of personnel and material from uncontrolled areas. The ten chapters of this handbook cover: introduction, credentials, personnel identity verification systems, special nuclear materials monitors, metal detectors, explosives sensors, package search systems, criteria for selection of entry-control equipment, machine-aided manual entry-control systems, and automated entry-control systems. A system example and its cost are included as an appendix

  20. The impact of tropical forest logging and oil palm agriculture on the soil microbiome.

    Tripathi, Binu M; Edwards, David P; Mendes, Lucas William; Kim, Mincheol; Dong, Ke; Kim, Hyoki; Adams, Jonathan M


    Selective logging and forest conversion to oil palm agriculture are rapidly altering tropical forests. However, functional responses of the soil microbiome to these land-use changes are poorly understood. Using 16S rRNA gene and shotgun metagenomic sequencing, we compared composition and functional attributes of soil biota between unlogged, once-logged and twice-logged rainforest, and areas converted to oil palm plantations in Sabah, Borneo. Although there was no significant effect of logging history, we found a significant difference between the taxonomic and functional composition of both primary and logged forests and oil palm. Oil palm had greater abundances of genes associated with DNA, RNA, protein metabolism and other core metabolic functions, but conversely, lower abundance of genes associated with secondary metabolism and cell-cell interactions, indicating less importance of antagonism or mutualism in the more oligotrophic oil palm environment. Overall, these results show a striking difference in taxonomic composition and functional gene diversity of soil microorganisms between oil palm and forest, but no significant difference between primary forest and forest areas with differing logging history. This reinforces the view that logged forest retains most features and functions of the original soil community. However, networks based on strong correlations between taxonomy and functions showed that network complexity is unexpectedly increased due to both logging and oil palm agriculture, which suggests a pervasive effect of both land-use changes on the interaction of soil microbes. © 2016 John Wiley & Sons Ltd.

  1. Uranium logging in earth formations

    Givens, W.W.


    A technique is provided for assaying the formations surrounding a borehole for uranium. A borehole logging tool cyclically irradiates the formations with neutrons and responds to neutron fluxes produced during the period of time that prompt neutrons are being produced by the neutron fission of uranium in the formations. A borehole calibration tool employs a steady-state (continuous output) neutron source, firstly, to produce a response to neutron fluxes in models having known concentrations of uranium and, secondly, to to produce a response to neutron fluxes in the formations surrounding the borehole. The neutron flux responses of the borehole calibration tool in both the model and the formations surrounding the borehole are utilized to correct the neutron flux response of the borehole logging tool for the effects of epithermal/thermal neutron moderation, scattering, and absorption within the borehole itself

  2. Logística empresarial

    Feres Sahid


    RESUMEN El concepto logístico, se pudo ver reflejado con exactitud desde el punto de vista etimológico e histórico a través de la revista de la E.A.N; ya que  tiene cierto carácter militar que lo hace característico a la gestión empresarial y de esto se formula un debate definitivo de este concepto.

  3. Chemical logging of geothermal wells

    Allen, C.A.; McAtee, R.E.

    The presence of geothermal aquifers can be detected while drilling in geothermal formations by maintaining a chemical log of the ratio of the concentrations of calcium to carbonate and bicarbonate ions in the return drilling fluid. A continuous increase in the ratio of the concentrations of calcium to carbonate and bicarbonate ions is indicative of the existence of a warm or hot geothermal aquifer at some increased depth.

  4. Audit Log for Forensic Photography

    Neville, Timothy; Sorell, Matthew

    We propose an architecture for an audit log system for forensic photography, which ensures that the chain of evidence of a photograph taken by a photographer at a crime scene is maintained from the point of image capture to its end application at trial. The requirements for such a system are specified and the results of experiments are presented which demonstrate the feasibility of the proposed approach.

  5. Logística empresarial

    Feres Sahid


    Full Text Available RESUMEN El concepto logístico, se pudo ver reflejado con exactitud desde el punto de vista etimológico e histórico a través de la revista de la E.A.N; ya que  tiene cierto carácter militar que lo hace característico a la gestión empresarial y de esto se formula un debate definitivo de este concepto.

  6. Neutron capture in borehole logging

    Randall, R.R.


    The use is described of a pulsed source of fast neutrons and a radiation detector to measure the thermal neutron population decay rate in a well logging instrument. The macroscopic neutron absorption cross-section is calculated by taking the natural logarithm of the ratio of the detected radiation counts occurring within two measurement intervals of fixed duration and starting at a fixed time after a neutron burst. (U.K.)

  7. Borehole logging in uranium exploration

    Kulkarni, N.H.


    The ultimate objective of exploration by drilling as far as Atomic Minerals Division is concerned is to locate the ore zone in the subsurface, draw samples and analyze them for their metal content. The presence of the ore zone is also indicated by gamma-ray logging of the borehole. A gamma-ray detector is lowered in the borehole and precise depth and grade of the ore zone is established. This helps the geologist in correlating the ore horizon with the surface outcrop or the ore zone intercepted in adjoining boreholes and in deciding about further drilling and location of boreholes. Most commonly, total gamma measurements are made although some units capable of measuring the gamma-ray spectrum are also in use. It is possible to know if the mineralization is due to uranium without waiting for the laboratory results. The present write up gives a brief account of the principles, equipment and methods of borehole gamma-ray logging including density and self-potential logging. (author). 8 refs., 5 figs

  8. Dynamic Planar Convex Hull with Optimal Query Time and O(log n · log log n ) Update Time

    Brodal, Gerth Stølting; Jakob, Riko


    The dynamic maintenance of the convex hull of a set of points in the plane is one of the most important problems in computational geometry. We present a data structure supporting point insertions in amortized O(log n · log log log n) time, point deletions in amortized O(log n · log log n) time......, and various queries about the convex hull in optimal O(log n) worst-case time. The data structure requires O(n) space. Applications of the new dynamic convex hull data structure are improved deterministic algorithms for the k-level problem and the red-blue segment intersection problem where all red and all...

  9. Variation in National ACGME Case Log Data for Pediatric Orthopaedic Fellowships: Are Fellow Coding Practices Responsible?

    McClure, Philip K; Woiczik, Marcella; Karol, Lori; Sankar, Wudbhav N

    accompanied by standardized and specific guidelines for case log entry. Efforts to optimize training in the post 80-hour era will require accurate data to serve as a starting point for future educational efforts.

  10. Data Mining of Network Logs

    Collazo, Carlimar


    The statement of purpose is to analyze network monitoring logs to support the computer incident response team. Specifically, gain a clear understanding of the Uniform Resource Locator (URL) and its structure, and provide a way to breakdown a URL based on protocol, host name domain name, path, and other attributes. Finally, provide a method to perform data reduction by identifying the different types of advertisements shown on a webpage for incident data analysis. The procedures used for analysis and data reduction will be a computer program which would analyze the URL and identify and advertisement links from the actual content links.

  11. Neutron borehole logging correction technique

    Goldman, L.H.


    In accordance with an illustrative embodiment of the present invention, a method and apparatus is disclosed for logging earth formations traversed by a borehole in which an earth formation is irradiated with neutrons and gamma radiation produced thereby in the formation and in the borehole is detected. A sleeve or shield for capturing neutrons from the borehole and producing gamma radiation characteristic of that capture is provided to give an indication of the contribution of borehole capture events to the total detected gamma radiation. It is then possible to correct from those borehole effects the total detected gamma radiation and any earth formation parameters determined therefrom

  12. Benchmark neutron porosity log calculations

    Little, R.C.; Michael, M.; Verghese, K.; Gardner, R.P.


    Calculations have been made for a benchmark neutron porosity log problem with the general purpose Monte Carlo code MCNP and the specific purpose Monte Carlo code McDNL. For accuracy and timing comparison purposes the CRAY XMP and MicroVax II computers have been used with these codes. The CRAY has been used for an analog version of the MCNP code while the MicroVax II has been used for the optimized variance reduction versions of both codes. Results indicate that the two codes give the same results within calculated standard deviations. Comparisons are given and discussed for accuracy (precision) and computation times for the two codes

  13. 29 CFR 1918.88 - Log operations.


    ...) SAFETY AND HEALTH REGULATIONS FOR LONGSHORING Handling Cargo § 1918.88 Log operations. (a) Working in..., the employer shall ensure that employees remain clear of areas where logs being dumped could strike...

  14. Artificial intelligence approach to interwell log correlation

    Lim, Jong-Se [Korea Maritime University, Pusan(Korea); Kang, Joo Myung [Seoul National University, Seoul(Korea); Kim, Jung Whan [Korea National Oil Corp., Anyang(Korea)


    This paper describes a new approach to automated interwell log correlation using artificial intelligence and principal component analysis. The approach to correlate wire line logging data is on the basis of a large set of subjective rules that are intended to represent human logical processes. The data processed are mainly the qualitative information such as the characteristics of the shapes extracted along log traces. The apparent geologic zones are identified by pattern recognition for the specific characteristics of log trace collected as a set of objects by object oriented programming. The correlation of zones between wells is made by rule-based inference program. The reliable correlation can be established from the first principal component logs derived from both the important information around well bore and the largest common part of variances of all available well log data. Correlation with field log data shows that this approach can make interwell log correlation more reliable and accurate. (author). 6 refs., 7 figs.

  15. Face logging in Copenhagen Limestone, Denmark

    Jakobsen, Lisa; Foged, Niels Nielsen; Erichsen, Lars


    tunnel in Copenhagen more than 2.5 km face logs were made in 467 locations at underground stations, shafts, caverns and along bored tunnels. Over 160 geotechnical boreholes, many with geophysical logging were executed prior to construction works. The bedrock consists of Paleogene "Copenhagen limestone......The requirement for excavation support can be assessed from face logging. Face logs can also improve our knowledge of lithological and structural conditions within bedrock and supplement information from boreholes and geophysical logs. During the construction of 8 km metro tunnel and 4 km heating....... The induration degrees recorded in face logs and boreholes are compared and correlated. Distinct geophysical log markers are used to divide the limestone into three units. These marker horizons are correlated between face logs and geotechnical boreholes. A 3D model of the strength variations recorded within...

  16. Tucker Wireline Open Hole Wireline Logging; FINAL

    Milliken, M.


    The Tucker Wireline unit ran a suite of open hole logs right behind the RMOTC logging contractor for comparison purposes. The tools included Dual Laterolog, Phased Induction, BHC Sonic, and Density-Porosity

  17. Entry Threat and Entry Deterrence: The Timing of Broadband Rollout

    Mo Xiao; Peter F. Orazem


    Past empirical literature provides strong evidence that competition increases when new firms enter a market. However, rarely have economists been able to examine how competition changes with the threat of entry. This paper uses the evolution of the zip code level market structure of facilities-based broadband providers from 1999 to 2004 to investigate how a firm adjusts its entry strategy when facing the threat of additional entrants. We identify the potential entrant into a local market as t...

  18. Selective logging in the Brazilian Amazon.

    G. P. Asner; D. E. Knapp; E. N. Broadbent; P. J. C. Oliveira; M Keller; J. N. Silva


    Amazon deforestation has been measured by remote sensing for three decades. In comparison, selective logging has been mostly invisible to satellites. We developed a large-scale, high-resolution, automated remote-sensing analysis of selective logging in the top five timber-producing states of the Brazilian Amazon. Logged areas ranged from 12,075 to 19,823 square...

  19. Linking log quality with product performance

    D. W. Green; Robert Ross


    In the United States, log grading procedures use visual assessment of defects, in relation to the log scaling diameter, to estimate the yield of lumber that maybe expected from the log. This procedure was satisfactory when structural grades were based only on defect size and location. In recent years, however, structural products have increasingly been graded using a...

  20. Selective logging and its relation to deforestation

    Gregory P. Asner; Michael Keller; Marco Lentini; Frank Merry; Souza Jr. Carlos


    Selective logging is a major contributor to the social, economic, and ecological dynamics of Brazilian Amazonia. Logging activities have expanded from low-volume floodplain harvests in past centuries to high-volume operations today that take about 25 million m3 of wood from the forest each year. The most common high-impact conventional and often illegal logging...

  1. Pacific Rim log trade: determinants and trends.

    Donald F. Flora; Andrea L. Anderson; Wendy J. McGinnls


    Pacific Rim trade in softwood logs amounts to about $3 billion annually, of which the U.S. share is about $2 billion. Log exporting is a significant part of the forest economy in the Pacific Northwest. The 10 major Pacific Rim log-trading client and competitor countries differ widely in their roles in trade and in their policies affecting the industry.

  2. Well logging radioactive detector assembly

    Osburn, T.D.


    This patent describes a well logging instrument of the type having a radioactive logging sub having a sealed chamber and have a radioactive source for emitting radioactive energy into the well formation, the instrument having a radioactive energy detector for detecting gamma rays resulting from the emission of the radioactive energy into the well formation, and means for pressing the sub against the well of the well, an improved Dewar flask for the detector. It comprises: an inner housing formed of titanium and containing the detector; an outer housing formed of titanium, having a cylindrical side wall surrounding the inner housing and separated by a clearance which is evacuated, the outer housing being located within the sealed chamber in the sub of the instrument; a window section formed in the side wall of the outer housing adjacent the detector and on a side of the side wall closest to the wall of the well when the sub is pressed against the wall of the well; and wherein the inner housing has a cylindrical side wall that is of lesser wall thickness than the wall thickness of the side wall of the outer housing other than in the window section

  3. Impact of alternative harvesting technologies on thinning entry and optimal rotation age for eastern hardwoods

    Chris B. LeDoux


    A complete system simulation model is used to integrate alternative logging technologies, stand data, market prices, transportation costs, and economic concerns in a longterm continuous manner to evaluate thinning entry timing and optimal rotation age. Forest Inventory and Analysis (FIA) stand data for the oak/hickory forest type and time and motion study data for 70,...

  4. Corporate Author Entries. Revision 5

    Hendricks, P.L.


    This reference authority has been created and is maintained to provide standard forms for recording the names of organizations consistently in bibliographic citations. This revision includes approximately 42,000 entries established since 1973

  5. Network Competition and Entry Deterrence

    Calzada, Joan; Valletti, Tommaso


    We develop a model of logit demand that extends to a multi-firm industry the traditional duopoly framework of network competition with access charges. Firstly, we show that, when incumbents do not face the threat of entry and compete in prices, they inefficiently establish the reciprocal access charge below cost. This inefficiency disappears if incumbents compete in utilities instead of prices. Secondly, we study how incumbents change their choices under the threat of entry when they determin...

  6. Currency union entries and trade

    Nitsch, Volker


    Recent research suggests that adopting a common currency increases bilateral trade. In this paper, I explore experiences of currency union entry in the post-war period and find no effect on trade. Previous results derived from a large panel data set (covering more than 200 countries from 1948 through 1997) appear to depend crucially on the assumption of symmetry between currency union exits and entries: While countries leaving a currency union experience significant declines in trade, currenc...

  7. Semi-automatic logarithmic converter of logs

    Gol'dman, Z.A.; Bondar's, V.V.


    Semi-automatic logarithmic converter of logging charts. An original semi-automatic converter was developed for use in converting BK resistance logging charts and the time interval, ΔT, of acoustic logs from a linear to a logarithmic scale with a specific ratio for subsequent combining of them with neutron-gamma logging charts in operative interpretation of logging materials by a normalization method. The converter can be used to increase productivity by giving curves different from those obtained in manual, pointwise processing. The equipment operates reliably and is simple in use. (author)

  8. Junior Purple Log-Warriors: Joint Entry-Level Training for Logistics Personnel


    technical training. This option would have the lowest net cost and would be the most effective in joint integration and development of an... premium on the need for all levels of joint logisticians that are able to respond quickly, flexibly, and jointly to the unexpected. The (United States...Army Logistics Management College, is for active or reserve O-3 to O-5s, W-3 to W-5s, E-8 to E-9s, and GS-12 to GS/GM-14s. A similar course of the

  9. A Universal Logging System for LHCb Online

    Nikolaidis, Fotis; Brarda, Loic; Garnier, Jean-Christophe; Neufeld, Niko


    A log is recording of system's activity, aimed to help system administrator to traceback an attack, find the causes of a malfunction and generally with troubleshooting. The fact that logs are the only information an administrator may have for an incident, makes logging system a crucial part of an IT infrastructure. In large scale infrastructures, such as LHCb Online, where quite a few GB of logs are produced daily, it is impossible for a human to review all of these logs. Moreover, a great percentage of them as just n oise . That makes clear that a more automated and sophisticated approach is needed. In this paper, we present a low-cost centralized logging system which allow us to do in-depth analysis of every log.

  10. A neutron well logging system


    A pulsed neutron well logging system using a sealed off neutron generator tube is provided with a programmable digital neutron output control system. The control system monitors the target beam current and compares a function of this current with a pre-programmed control function to develop a control signal for the neutron generator. The control signal is used in a series regulator to control the average replenisher current of the neutron generator tube. The programmable digital control system of the invention also provides digital control signals as a function of time to provide ion source voltages. This arrangement may be utilized to control neutron pulses durations and repetition rates or to produce other modulated wave forms for intensity modulating the output of the neutron generator as a function of time. (Auth.)

  11. Decomposable log-linear models

    Eriksen, Poul Svante

    can be characterized by a structured set of conditional independencies between some variables given some other variables. We term the new model class decomposable log-linear models, which is illustrated to be a much richer class than decomposable graphical models.It covers a wide range of non...... The present paper considers discrete probability models with exact computational properties. In relation to contingency tables this means closed form expressions of the maksimum likelihood estimate and its distribution. The model class includes what is known as decomposable graphicalmodels, which......-hierarchical models, models with structural zeroes, models described by quasi independence and models for level merging. Also, they have a very natural interpretation as they may be formulated by a structured set of conditional independencies between two events given some other event. In relation to contingency...

  12. Well logging, atom and geology

    Serra, O.


    Well logging techniques exploit interactions of gamma photons and neutrons with atoms. Interactions of neutrons of different energies with atoms allow the detection and evaluation of the weight percentage of several elements composing the rocks (C, O, Si, Ca, Fe, S); spectrometry of gamma rays produced by thermal neutron absorption allows for the weight percentage determination of Si, Ca, Fe, S, Cl, H, Ti and Gd, etc. High resolution detectors (germanium doped by Li, at liquid nitrogen temperature) allow the recognition of more elements. Other techniques involving neutrons consist in determining the population in epithermal neutrons at a certain distance of the neutron source (measurement of the hydrogen index). By analyzing the intensity of the gamma flux produced by Compton scattering, the electronic and bulk densities of the rocks are measured. All these data lead to the detection and evaluation of ore deposits (uranium and potassium) and coal, and determination of the lithology, the main minerals composing the rocks, petrophysical properties... 1 fig

  13. [1-13C]Glucose entry in neuronal and astrocytic intermediary metabolism of aged rats. A study of the effects of nicergoline treatment by 13C NMR spectroscopy.

    Miccheli, Alfredo; Puccetti, Caterina; Capuani, Giorgio; Di Cocco, Maria Enrica; Giardino, Luciana; Calzà, Laura; Battaglia, Angelo; Battistin, Leontino; Conti, Filippo


    Age-related changes in glucose utilization through the TCA cycle were studied using [1-13C]glucose and 13C, 1H NMR spectroscopy on rat brain extracts. Significant increases in lactate levels, as well as in creatine/phosphocreatine ratios (Cr/PCr), and a decrease in N-acetyl-aspartate (NAA) and aspartate levels were observed in aged rat brains as compared to adult animals following glucose administration. The total amount of 13C from [1-13C]glucose incorporated in glutamate, glutamine, aspartate and GABA was significantly decreased in control aged rat brains as compared to adult brains. The results showed a decrease in oxidative glucose utilization of control aged rat brains. The long-term nicergoline treatment increased NAA and glutamate levels, and decreased the lactate levels as well as the Cr/PCr ratios in aged rat brains as compared to adult rats. The total amount of 13C incorporated in glutamate, glutamine, aspartate, NAA and GABA was increased by nicergoline treatment, showing an improvement in oxidative glucose metabolism in aged brains. A significant increase in pyruvate carboxylase/pyruvate dehydrogenase activity (PC/PDH) in the synthesis of glutamate in nicergoline-treated aged rats is consistent with an increase in the transport of glutamine from glia to neurons for conversion into glutamate. In adult rat brains, no effect of nicergoline on glutamate PC/PDH activity was observed, although an increase in PC/PDH activity in glutamine was, suggesting that nicergoline affects the glutamate/glutamine cycle between neurons and glia in different ways depending on the age of animals. These results provide new insights into the effects of nicergoline on the CNS.

  14. Geomicrobial Optical Logging Detectors (GOLD)

    Bramall, N. E.; Stoker, C. R.; Price, P. B.; Coates, J. D.; Allamandola, L. J.; Mattioda, A. L.


    We will present concepts for downhole instrumentation that could be used in the Deep Underground Science and Engineering Laboratory (DUSEL). We envision optical borehole-logging instruments that could monitor bacterial concentration, mineralogy, aromatic organics, temperature and oxygen concentration, allowing for the in situ monitoring of time-dependent microbial and short-scale geologic processes and provide valuable in situ data on stratigraphy to supplement core analyses, especially where instances of missing or damaged core sections make such studies difficult. Incorporated into these instruments will be a sampling/inoculation tool to allow for the recovery and/or manipulation of particularly interesting sections of the borehole wall for further study, enabling a series of microbiological studies. The borehole tools we will develop revolve around key emerging technologies and methods, some of which are briefly described below: 1) Autofluorescence Spectroscopy: Building on past instruments, we will develop a new borehole logger that searches for microbial life and organics using fluorescence spectroscopy. Many important organic compounds (e.g. PAHs) and biomolecules (e.g. aromatic amino acids, proteins, methanogenic coenzymes) fluoresce when excited with ultraviolet and visible light. Through the careful selection of excitation wavelength(s) and temporal gating parameters, a borehole logging instrument can detect and differentiate between these different compounds and the mineral matrix in which they exist. 2) Raman Spectroscopy: Though less sensitive than fluorescence spectroscopy, Raman spectroscopy is more definitive: it can provide important mineral phase distribution/proportions and other chemical data enabling studies of mineralogy and microbe-mineral interactions (when combined with fluorescence). 3) Borehole Camera: Imaging of the borehole wall with extended information in the UV, visible, and NIR for a more informative view can provide a lot of insight

  15. California-Nevada uranium logging. Final report


    The purpose of this project was to obtain geophysical logs of industry drill holes to assess the uranium resource potential of geologic formations of interest. The work was part of the US Department of Energy's National Uranium Resource Evaluation (NURE) Program. The principal objective of the logging program was to determine radioelement grade of formations through natural gamma ray detectors. Supplementary information was obtained from resistivity (R), self-potential (SP), point resistance (RE), and neutron density (NN) logs for formation interpretation. Additional data for log interpretation was obtained from caliper logs, casing schedules, and downhole temperature. This data was obtained from well operators when available, with new logs obtained where not formerly available. This report contains a summary of the project and data obtained to date

  16. Pembangkitan Data dari Distribusi Log-logistik

    Aceng Komarudin Mutaqin


    Full Text Available Distribusi log-logistik merupakan salah satu distribusi yang dapat diaplikasikan untuk data mutu lingkungan. Makalah ini membahas pembangkitan data dari distribusi log-logistik mulai dari pembangunan algoritme sampai pembuatan program komputer pada perangkat lunak MATLAB. Metode pembangkitan datanya menggunakan metode inverse transform. Ada dua jenis data yang dibangkitkan, yaitu data lengkap dan data tersensor kiri. Dalam makalah ini diberikan contoh data yang dibangkitkan dari distribusi log-logistik.

  17. SNG-logs at the Bagsvaerd Lake

    Korsbech, U.


    Spectral Natural Gamma-logs (SNG) were taken in old boreholes around Bagsvaerd Lake (Zealand). The purpose of this investigation was to clarify the geologic/lithologic conditions in this region and the potential risks of waste penetration into ground water. Relationship curves for thorium, uranium and potassium concentrations are given. Some special logs which can be useful for evaluating concentration variations or transition forms among various lithological layers are collected. Appendices contain technical information on the boreholes and discussion of differences between results of SNG-logging and the conventional gamma-logging. (EG)

  18. 32 CFR 700.846 - Status of logs.


    ... Officers Afloat § 700.846 Status of logs. The deck log, the engineering log, the compass record, the bearing hooks, the engineer's bell book, and any records generated by automated data logging equipment...

  19. A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients

    Kim Morfitt


    Full Text Available Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation. This paper outlines research that has resulted in the development of a tool for the extraction of ICQ log file entries. Detailed reconstruction of data from log files was achieved with a number of different ICQ software. There are several limitations with the current design including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to address these and other limitations as pointed out in this paper.

  20. Entry Facilitation by Environmental Groups

    van der Made, Allard; Schoonbeek, Lambert

    We consider a model of vertical product differentiation where consumers care about the environmental damage their consumption causes. An environmental group is capable of increasing consumers' environmental concern via a costly campaign. We show that the prospect of such a campaign can induce entry

  1. Ebola virus host cell entry.

    Sakurai, Yasuteru


    Ebola virus is an enveloped virus with filamentous structure and causes a severe hemorrhagic fever in human and nonhuman primates. Host cell entry is the first essential step in the viral life cycle, which has been extensively studied as one of the therapeutic targets. A virus factor of cell entry is a surface glycoprotein (GP), which is an only essential viral protein in the step, as well as the unique particle structure. The virus also interacts with a lot of host factors to successfully enter host cells. Ebola virus at first binds to cell surface proteins and internalizes into cells, followed by trafficking through endosomal vesicles to intracellular acidic compartments. There, host proteases process GPs, which can interact with an intracellular receptor. Then, under an appropriate circumstance, viral and endosomal membranes are fused, which is enhanced by major structural changes of GPs, to complete host cell entry. Recently the basic research of Ebola virus infection mechanism has markedly progressed, largely contributed by identification of host factors and detailed structural analyses of GPs. This article highlights the mechanism of Ebola virus host cell entry, including recent findings.

  2. Influence of borehole-eccentred tools on wireline and logging-while-drilling sonic logging measurements

    Pardo, David; Matuszyk, Paweł Jerzy; Torres-Verdí n, Carlos; Mora Cordova, Angel; Muga, Ignacio; Calo, Victor M.


    We describe a numerical study to quantify the influence of tool-eccentricity on wireline (WL) and logging-while-drilling (LWD) sonic logging measurements. Simulations are performed with a height-polynomial-adaptive (hp) Fourier finite-element method

  3. Log canonical thresholds of smooth Fano threefolds

    Cheltsov, Ivan A; Shramov, Konstantin A


    The complex singularity exponent is a local invariant of a holomorphic function determined by the integrability of fractional powers of the function. The log canonical thresholds of effective Q-divisors on normal algebraic varieties are algebraic counterparts of complex singularity exponents. For a Fano variety, these invariants have global analogues. In the former case, it is the so-called α-invariant of Tian; in the latter case, it is the global log canonical threshold of the Fano variety, which is the infimum of log canonical thresholds of all effective Q-divisors numerically equivalent to the anticanonical divisor. An appendix to this paper contains a proof that the global log canonical threshold of a smooth Fano variety coincides with its α-invariant of Tian. The purpose of the paper is to compute the global log canonical thresholds of smooth Fano threefolds (altogether, there are 105 deformation families of such threefolds). The global log canonical thresholds are computed for every smooth threefold in 64 deformation families, and the global log canonical thresholds are computed for a general threefold in 20 deformation families. Some bounds for the global log canonical thresholds are computed for 14 deformation families. Appendix A is due to J.-P. Demailly.

  4. Aggregation of log-linear risks

    Embrechts, Paul; Hashorva, Enkeleijd; Mikosch, Thomas Valentin


    In this paper we work in the framework of a k-dimensional vector of log-linear risks. Under weak conditions on the marginal tails and the dependence structure of a vector of positive risks, we derive the asymptotic tail behaviour of the aggregated risk {and present} an application concerning log...

  5. Synthetic rope applications in Appalachian logging

    Ben D. Spong; Jingxin Wang


    New ultra-high molecular weight polyethylene rope has shown good results as a replacement for wire rope in logging applications in the western United States. A single case study trial was performed in Appalachian forest conditions to assess the appropriateness of this technology for hardwood logging applications. The study focused on use of the rope in West Virginia...

  6. Palm distributions for log Gaussian Cox processes

    Coeurjolly, Jean-Francois; Møller, Jesper; Waagepetersen, Rasmus

    This paper reviews useful results related to Palm distributions of spatial point processes and provides a new result regarding the characterization of Palm distributions for the class of log Gaussian Cox processes. This result is used to study functional summary statistics for a log Gaussian Cox...

  7. Log-binomial models: exploring failed convergence.

    Williamson, Tyler; Eliasziw, Misha; Fick, Gordon Hilton


    Relative risk is a summary metric that is commonly used in epidemiological investigations. Increasingly, epidemiologists are using log-binomial models to study the impact of a set of predictor variables on a single binary outcome, as they naturally offer relative risks. However, standard statistical software may report failed convergence when attempting to fit log-binomial models in certain settings. The methods that have been proposed in the literature for dealing with failed convergence use approximate solutions to avoid the issue. This research looks directly at the log-likelihood function for the simplest log-binomial model where failed convergence has been observed, a model with a single linear predictor with three levels. The possible causes of failed convergence are explored and potential solutions are presented for some cases. Among the principal causes is a failure of the fitting algorithm to converge despite the log-likelihood function having a single finite maximum. Despite these limitations, log-binomial models are a viable option for epidemiologists wishing to describe the relationship between a set of predictors and a binary outcome where relative risk is the desired summary measure. Epidemiologists are encouraged to continue to use log-binomial models and advocate for improvements to the fitting algorithms to promote the widespread use of log-binomial models.

  8. LHCb Online Log Analysis and Maintenance System

    Garnier, J-C


    History has shown, many times computer logs are the only information an administrator may have for an incident, which could be caused either by a malfunction or an attack. Due to the huge amount of logs that are produced from large-scale IT infrastructures, such as LHCb Online, critical information may be overlooked or simply be drowned in a sea of other messages. This clearly demonstrates the need for an automatic system for long-term maintenance and real time analysis of the logs. We have constructed a low cost, fault tolerant centralized logging system which is able to do in-depth analysis and cross-correlation of every log. This system is capable of handling O(10000) different log sources and numerous formats, while trying to keep the overhead as low as possible. It provides log gathering and management, Offline analysis and online analysis. We call Offline analysis the procedure of analyzing old logs for critical information, while Online analysis refer to the procedure of early alerting and reacting. ...

  9. The nuclear magnetic resonance well logging

    Zhang Yumin; Shen Huitang


    In this paper, the characteristic of the nuclear magnetic resonance logging is described at first. Then its development and its principle is presented. Compared with the nuclear magnetic resonance spectrometer, the magnet techniques is the first question that we must solve in the manufacture of the NMR well logging

  10. A semantic perspective on query log analysis

    Hofmann, K.; de Rijke, M.; Huurnink, B.; Meij, E.


    We present our views on the CLEF log file analysis task. We argue for a task definition that focuses on the semantic enrichment of query logs. In addition, we discuss how additional information about the context in which queries are being made could further our understanding of users’ information

  11. Utilization and cost for animal logging operations

    Suraj P. Shrestha; Bobby L. Lanford


    Forest harvesting with animals is a labor-intensive operation. Due to the development of efficient machines and high volume demands from the forest products industry, mechanization of logging developed very fast, leaving behind the traditional horse and mule logging. It is expensive to use machines on smaller woodlots, which require frequent moves if mechanically...

  12. Data logging system upgrade for Indus accelerator

    Mishra, R.; Merh, B.N.; Agrawal, R.K.; Fatnani, P.; Navathe, C.P.; Pal, S.


    An accelerator has various subsystems like Magnet Power Supply, Beam Diagnostics and Vacuum etc. which are required to work in a stable manner to ensure required machine performance. Logging of system parameters at a faster rate plays a crucial role in analysing and understanding machine behaviour. Logging all the machine parameters consistently at the rate of typically more than 1 Hz has been the aim of a recent data logging system upgrade. Nearly ten thousand parameters are being logged at varying intervals of one second to one minute in Indus accelerator complex. The present logging scheme is augmented to log all these parameters at a rate equal to or more than 1 Hz. The database schema is designed according to the data type of the parameter. The data is distributed into historical table and intermediate table which comprises of recent data. Machine control applications read the parameter values from the control system and store them into the text files of finite time duration for each sub-system. The logging application of each sub-system passes these text files to database for bulk insertion. The detail design of database, logging scheme and its architecture is presented in the paper. (author)

  13. Impacts of extended working hours in logging

    Dana Mitchell; Tom Gallagher


    Last year at the 2007 AIM in Minneapolis, MN, the authors presented the human factors impacts to consider when implementing extended working hours in the logging industry. In a continuation of this project, we have researched existing literature to identify possible actions that logging business owners can take to reduce the impact of extended working hours on their...

  14. Neutron logging reliability techniques and apparatus

    Johnstone, C.W.


    This invention relates in general to neutron logging of earth formations, and in particular, to novel apparatus and procedures for determining the validity, or reliability, of data derived at least in part by logging neutron characteristics of earth formations and, if desired, for affording verifiably accurate indications of such data

  15. Neutron logging reliability techniques and apparatus

    Johnstone, C.W.


    This invention relates in general to neutron logging of earth formations, and in particular, to novel apparatus and procedures for determining the validity, or reliability, of data derived at least in part by logging neutron characteristics of earth formations and, if desired, for affording verifiably accurate indications of such data. (author)

  16. Logging methods and peeling of Aspen

    T. Schantz-Hansen


    The logging of forest products is influenced by many factors, including the size of the trees, density of the stand, the soundness of the trees, size of the area logged, topography and soil, weather conditions, the degree of utilization, the skill of the logger and the equipment used, the distance from market, etc. Each of these factors influences not only the method...

  17. Log Analysis Using Splunk Hadoop Connect


    23 A. INPUT SELECTION ...Conversion Resource Consumption .............................................. 28 Figure 8. Distribution of Events in Years...running a logging service puts a performance tax on the system and may cause the degradation of performance. More thorough 8 logging will cause a

  18. Grading sugar pine saw logs in trees.

    John W. Henley


    Small limbs and small overgrown limbs cause problems when grading saw logs in sugar pine trees. Surface characteristics and lumber recovery information for 426 logs from 64 sugar pine trees were examined. Resulting modifications in the grading specification that allow a grader to ignore small limbs and small limb indicators do not appear to decrease the performance of...

  19. Analysis of RIA standard curve by log-logistic and cubic log-logit models

    Yamada, Hideo; Kuroda, Akira; Yatabe, Tami; Inaba, Taeko; Chiba, Kazuo


    In order to improve goodness-of-fit in RIA standard analysis, programs for computing log-logistic and cubic log-logit were written in BASIC using personal computer P-6060 (Olivetti). Iterative least square method of Taylor series was applied for non-linear estimation of logistic and log-logistic. Hear ''log-logistic'' represents Y = (a - d)/(1 + (log(X)/c)sup(b)) + d As weights either 1, 1/var(Y) or 1/σ 2 were used in logistic or log-logistic and either Y 2 (1 - Y) 2 , Y 2 (1 - Y) 2 /var(Y), or Y 2 (1 - Y) 2 /σ 2 were used in quadratic or cubic log-logit. The term var(Y) represents squares of pure error and σ 2 represents estimated variance calculated using a following equation log(σ 2 + 1) = log(A) + J log(y). As indicators for goodness-of-fit, MSL/S sub(e)sup(2), CMD% and WRV (see text) were used. Better regression was obtained in case of alpha-fetoprotein by log-logistic than by logistic. Cortisol standard curve was much better fitted with cubic log-logit than quadratic log-logit. Predicted precision of AFP standard curve was below 5% in log-logistic in stead of 8% in logistic analysis. Predicted precision obtained using cubic log-logit was about five times lower than that with quadratic log-logit. Importance of selecting good models in RIA data processing was stressed in conjunction with intrinsic precision of radioimmunoassay system indicated by predicted precision. (author)

  20. Model wells for nuclear well logging

    Tittle, C.W.


    Considerations needed in the design and construction of model wells for nuclear log calibration are covered, with special attention to neutron porosity logging and total γ-ray logging. Pulsed neutron decay-time and spectral γ-ray logging are discussed briefly. The American Petroleum Institute calibration facility for nuclear logs is a good starting point for similar or expanded facilities. A few of its shortcomings are mentioned; they are minor. The problem of fluid saturation is emphasized. Attention is given to models made of consolidated rock and those containing unconsolidated material such as Ottawa sand. Needed precautions are listed. A similarity method is presented for estimating the porosity index of formations that are not fully saturated. (author)

  1. Processing of gamma-ray spectrometric logs

    Umiastowski, K.; Dumesnil, P.


    CEA (Commissariat a l'Energie Atomique) has developped a gamma-ray spectrometric tool, containing an analog-to-digital converter. This new tool permits to perform very precise uranium logs (natural gamma-ray spectrometry), neutron activation logs and litho-density logs (gamma-gamma spectrometric logs). Specific processing methods were developped to treate the particular problems of down-hole gamma-ray spectrometry. Extraction of the characteristic gamma-ray peak, even if they are superposed on the background radiation of very high intensity, is possible. This processing methode enables also to obtain geological informations contained in the continuous background of the spectrum. Computer programs are written in high level language for SIRIUS (VICTOR) and APOLLO computers. Exemples of uranium and neutron activation logs treatment are presented [fr

  2. LOG2MARKUP: State module to transform a Stata text log into a markup document


    log2markup extract parts of the text version from the Stata log command and transform the logfile into a markup based document with the same name, but with extension markup (or otherwise specified in option extension) instead of log. The author usually uses markdown for writing documents. However...

  3. Processing well logging data, for example for verification and calibration of well logs

    Suau, J.; Boutemy, Y.


    A method is described of machine processing well logging data derived from borehole exploring devices which investigate earth formations traversed by boreholes. The method can be used for verifying and recalibrating logs, reconstructing missing logs and combining the data to form a statistical model of the traversed earth formations. (U.K.)

  4. Evaluating Coding Accuracy in General Surgery Residents' Accreditation Council for Graduate Medical Education Procedural Case Logs.

    Balla, Fadi; Garwe, Tabitha; Motghare, Prasenjeet; Stamile, Tessa; Kim, Jennifer; Mahnken, Heidi; Lees, Jason

    The Accreditation Council for Graduate Medical Education (ACGME) case log captures resident operative experience based on Current Procedural Terminology (CPT) codes and is used to track operative experience during residency. With increasing emphasis on resident operative experiences, coding is more important than ever. It has been shown in other surgical specialties at similar institutions that the residents' ACGME case log may not accurately reflect their operative experience. What barriers may influence this remains unclear. As the only objective measure of resident operative experience, an accurate case log is paramount in representing one's operative experience. This study aims to determine the accuracy of procedural coding by general surgical residents at a single institution. Data were collected from 2 consecutive graduating classes of surgical residents' ACGME case logs from 2008 to 2014. A total of 5799 entries from 7 residents were collected. The CPT codes entered by residents were compared to departmental billing records submitted by the attending surgeon for each procedure. Assigned CPT codes by institutional American Academy of Professional Coders certified abstract coders were considered the "gold standard." A total of 4356 (75.12%) of 5799 entries were identified in billing records. Excel 2010 and SAS 9.3 were used for analysis. In the event of multiple codes for the same patient, any match between resident codes and billing record codes was considered a "correct" entry. A 4-question survey was distributed to all current general surgical residents at our institution for feedback on coding habits, limitations to accurate coding, and opinions on ACGME case log representation of their operative experience. All 7 residents had a low percentage of correctly entered CPT codes. The overall accuracy proportion for all residents was 52.82% (range: 43.32%-60.07%). Only 1 resident showed significant improvement in accuracy during his/her training (p = 0

  5. Flavivirus Entry Receptors: An Update

    Manuel Perera-Lecoin


    Full Text Available Flaviviruses enter host cells by endocytosis initiated when the virus particles interact with cell surface receptors. The current model suggests that flaviviruses use at least two different sets of molecules for infectious entry: attachment factors that concentrate and/or recruit viruses on the cell surface and primary receptor(s that bind to virions and direct them to the endocytic pathway. Here, we present the currently available knowledge regarding the flavivirus receptors described so far with specific attention to C-type lectin receptors and the phosphatidylserine receptors, T-cell immunoglobulin and mucin domain (TIM and TYRO3, AXL and MER (TAM. Their role in flavivirus attachment and entry as well as their implication in the virus biology will be discussed in depth.

  6. Logística del transporte

    Robusté Antón, Francesc


    La logística se ha conformado como un proceso estratégico para organizar las actividades de producción y de distribución de las empresas. El concepto de sistema logístico ha incluido un amplio espectro de operaciones que condicionan la eficiencia y la competitividad empresarial en el actual contexto de globalización de la economía. En este sentido, este libro afronta y analiza los distintos aspectos que inciden en los procesos de planificación y gestión de los procesos logísticos relacionados...

  7. Nonblocking and orphan free message logging protocols

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith


    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  8. Supply of Rubber Wood Log in Malaysia

    Noraida, A. W.; Abdul-Rahim, A. S.


    Issue on shortage of raw material for wood processing solved by discovery of rubber wood log as one of the substitutes the natural log. This paper examines the supply of rubber wood log in Malaysia. We employ ARDL Bound Approach Test and time series data from 1980 to 2010 which represented the whole Malaysia are used to achieve the established objectives. The result shown, in the long run harvested area and wages have 1% and 10% significant level respectively. While in the short run, there wa...

  9. Automated microbial metabolism laboratory. [Viking 75 entry vehicle and Mars


    The labeled release concept was advanced to accommodate a post- Viking mission designed to extend the search, to confirm the presence of, and to characterize any Martian life found, and to obtain preliminary information on control of the life detected. The advanced labeled release concept utilizes four test chambers, each of which contains either an active or heat sterilized sample of the Martian soil. A variety of C-14 labeled organic substrates can be added sequentially to each soil sample and the resulting evolved radioactive gas monitored. The concept can also test effects of various inhibitors and environmental parameters on the experimental response. The current Viking '75 labeled release hardware is readily adaptable to the advanced labeled release concept.

  10. Drilling and logging in uranium exploration



    The report reviews drilling and logging practices in exploration of uranium ores and summarizes the papers presented in the panel meeting. Recommendations for further research and development are given

  11. Neutron logging reliability techniques and apparatus

    Johnstone, C.W.


    Apparatus and methods for verifying the validity of data derived at least in part by neutron logging of earth formations, and, where indicated, for affording neutron diffusion-corrected values of such data, are disclosed. (WHK)

  12. Nuclear log interpretation by first principle

    Oelgaard, P.L.


    A weakness connected to the present interpretation of nuclear borehole logs is that the interdependence of the various logs and physical effects of importance for the tools are not always taken into account in a correct way. Therefore a new approach to the interpretation of nuclear borehole logs is considered. It is based on the logs obtained with the natural gamma, the neutron porosity, the gamma density, and the pulsed neutron tools. For each of these tools a model, taking into account the important physical effects, is established. These models are incorporated into a computer programme which from the tool signals calculates, by use of iteration, a consistent set of the corresponding formation properties. In the paper the models developed for the four tools and the interpretation programme are briefly described. An example of the use of the interpretation programme is given and compared with a conventional interpretation. (author)

  13. CMLOG: A common message logging system

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III


    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  14. LATTE - Log and Time Tracking for Elections

    Office of Personnel Management — LATTE - Log and Time Tracking for Elections is a time tracking and voucher preparation system used to schedule employees to cover elections, to document their time...

  15. Well Logging Equipment Updated in China

    Xu Lili


    @@ As one of the ten principal disciplines in the petroleum industry, well logging has been developed for about 55years in China and is playing an increasingly important role in the country's oil and gas exploration and development.

  16. Conversation Threads Hidden within Email Server Logs

    Palus, Sebastian; Kazienko, Przemysław

    Email server logs contain records of all email Exchange through this server. Often we would like to analyze those emails not separately but in conversation thread, especially when we need to analyze social network extracted from those email logs. Unfortunately each mail is in different record and those record are not tided to each other in any obvious way. In this paper method for discussion threads extraction was proposed together with experiments on two different data sets - Enron and WrUT..

  17. Nuclear borehole logging for oil exploration

    Oelgaard, P.L.


    Reactor physics can be applied to the logging of boreholes for the exploration of oil and gas and the results obtained can be interpreted more correctly by use of reactor physics models, e.g. one-dimensional multi-group diffusion theory adapted for gamma quanta. The standard nuclear logging tools are: natural gamma, gamma density, neutron porosity and the pulsed-neutron tool. The models and interpretation procedures are discussed. 1 fig

  18. Geophysical logging of the Harwell boreholes

    Brightman, M.A.


    A comprehensive geophysical borehole logging survey was carried out on each of three deep boreholes drilled at the Harwell research site. KOALA and PETRA computer programs were used to analyse and interpret the logs to obtain continuous quantitative estimates of the geological and hydrogeological properties of the sequences penetrated at the Harwell site. Quantitative estimates of the mineral composition and porosity of the cores samples were made. (UK)

  19. Defect core detection in radiata pine logs

    Wallace, G.


    Internal defect cores in Pinus radiata logs arise primarily from the practice in New Zealand of pruning trees to increase the amount of clear wood. Realising the benefits of this practice when milling the logs is hampered by the lack of a practical method for detecting the defect cores. This report attempts to establish industry requirements for detections and examine techniques which may be suitable. Some trials of a novel technique are described. (author) 19 refs.; 11 figs

  20. Predicting the Diversity of Foreign Entry Modes

    Hashai, Niron; Geisler Asmussen, Christian; Benito, Gabriel


    diversity across value chain activities and host markets. Analyzing a sample of Israeli based firms we show that larger firms exhibit a higher degree of entry mode diversity both across value chain activities and across host markets. Higher levels of knowledge intensity are also associated with more......This paper expands entry mode literature by referring to multiple modes exerted in different value chain activities within and across host markets, rather than to a single entry mode at the host market level. Scale of operations and knowledge intensity are argued to affect firms' entry mode...... diversity in firms' entry modes across both dimensions....

  1. Entry decisions in the generic pharmaceutical industry.

    Morton, F M


    Data on all generic drug entries in the period 1984-1994 are used to estimate which markets heterogeneous potential entrants will decide to enter. I find that organizational experience predicts entry. Firms tend to enter markets with supply and demand characteristics similar to the firm's existing drugs. Larger revenue markets, markets with more hospital sales, and products that treat chronic conditions attract more entry. The simultaneous nature of entry leads to an additional interpretation: specialization is profitable because of the severe risk to profits when a market is "overentered." However, I am unable to make any conclusions about the efficiency of entry decisions.

  2. Modeling Precipitation Extremes using Log-Histospline

    Huang, W. K.; Nychka, D. W.; Zhang, H.


    One of the commonly used approaches to modeling univariate extremes is the peaks-overthreshold (POT) method. The POT method models exceedances over a (sufficiently high/low) threshold as a generalized Pareto distribution (GPD). To apply this method, a threshold has to be chosen and the estimates might be sensitive to the chosen threshold. Here we propose an alternative, the "Log-Histospline", to explore modeling the tail behavior and the remainder of the density in one step using the full range of the data. Log-Histospline applies a smoothing spline model on a finely binned histogram of the log transformed data to estimate its log density. By construction, we are able to preserve the polynomial upper tail behavior, a feature commonly observed in geophysical observations. The Log-Histospline can be extended to the spatial setting by treating the marginal (log) density at each location as spatially indexed functional data, and perform a dimension reduction and spatial smoothing. We illustrate the proposed method by analyzing precipitation data from regional climate model output (North American Regional Climate Change and Assessment Program (NARCCAP)).

  3. Atmospheric Entry Experiments at IRS

    Auweter-Kurtz, M.; Endlich, P.; Herdrich, G.; Kurtz, H.; Laux, T.; Löhle, S.; Nazina, N.; Pidan, S.


    Entering the atmosphere of celestial bodies, spacecrafts encounter gases at velocities of several km/s, thereby being subjected to great heat loads. The thermal protection systems and the environment (plasma) have to be investigated by means of computational and ground facility based simulations. For more than a decade, plasma wind tunnels at IRS have been used for the investigation of TPS materials. Nevertheless, ground tests and computer simulations cannot re- place space flights completely. Particularly, entry mission phases encounter challenging problems, such as hypersonic aerothermodynamics. Concerning the TPS, radiation-cooled materials used for reuseable spacecrafts and ablator tech- nologies are of importance. Besides the mentioned technologies, there is the goal to manage guidance navigation, con- trol, landing technology and inflatable technologies such as ballutes that aim to keep vehicles in the atmosphere without landing. The requirement to save mass and energy for planned interplanetary missions such as Mars Society Balloon Mission, Mars Sample Return Mission, Mars Express or Venus Sample Return mission led to the need for manoeuvres like aerocapture, aero-breaking and hyperbolic entries. All three are characterized by very high kinetic vehicle energies to be dissipated by the manoeuvre. In this field flight data are rare. The importance of these manoeuvres and the need to increase the knowledge of required TPS designs and behavior during such mission phases point out the need of flight experiments. As result of the experience within the plasma diagnostic tool development and the plasma wind tunnel data base, flight experiments like the PYrometric RE-entry EXperiment PYREX were developed, fully qualified and successfully flown. Flight experiments such as the entry spectrometer RESPECT and PYREX on HOPE-X are in the conceptual phase. To increase knowledge in the scope of atmospheric manoeuvres and entries, data bases have to be created combining both

  4. SU-F-T-233: Evaluation of Treatment Delivery Parameters Using High Resolution ELEKTA Log Files

    Kabat, C; Defoor, D; Alexandrian, A; Papanikolaou, N; Stathakis, S [University of Texas HSC SA, San Antonio, TX (United States)


    Purpose: As modern linacs have become more technologically advanced with the implementation of IGRT and IMRT with HDMLCs, a requirement for more elaborate tracking techniques to monitor components’ integrity is paramount. ElektaLog files are generated every 40 milliseconds, which can be analyzed to track subtle changes and provide another aspect of quality assurance. This allows for constant monitoring of fraction consistency in addition to machine reliability. With this in mind, it was the aim of the study to evaluate if ElektaLog files can be utilized for linac consistency QA. Methods: ElektaLogs were reviewed for 16 IMRT patient plans with >16 fractions. Logs were analyzed by creating fluence maps from recorded values of MLC locations, jaw locations, and dose per unit time. Fluence maps were then utilized to calculate a 2D gamma index with a 2%–2mm criteria for each fraction. ElektaLogs were also used to analyze positional errors for MLC leaves and jaws, which were used to compute an overall error for the MLC banks, Y-jaws, and X-jaws by taking the root-meansquare value of the individual recorded errors during treatment. Additionally, beam on time was calculated using the number of ElektaLog file entries within the file. Results: The average 2D gamma for all 16 patient plans was found to be 98.0±2.0%. Recorded gamma index values showed an acceptable correlation between fractions. Average RMS values for MLC leaves and the jaws resulted in a leaf variation of roughly 0.3±0.08 mm and jaw variation of about 0.15±0.04 mm, both of which fall within clinical tolerances. Conclusion: The use of ElektaLog files for day-to-day evaluation of linac integrity and patient QA can be utilized to allow for reliable analysis of system accuracy and performance.

  5. SU-F-T-233: Evaluation of Treatment Delivery Parameters Using High Resolution ELEKTA Log Files

    Kabat, C; Defoor, D; Alexandrian, A; Papanikolaou, N; Stathakis, S


    Purpose: As modern linacs have become more technologically advanced with the implementation of IGRT and IMRT with HDMLCs, a requirement for more elaborate tracking techniques to monitor components’ integrity is paramount. ElektaLog files are generated every 40 milliseconds, which can be analyzed to track subtle changes and provide another aspect of quality assurance. This allows for constant monitoring of fraction consistency in addition to machine reliability. With this in mind, it was the aim of the study to evaluate if ElektaLog files can be utilized for linac consistency QA. Methods: ElektaLogs were reviewed for 16 IMRT patient plans with >16 fractions. Logs were analyzed by creating fluence maps from recorded values of MLC locations, jaw locations, and dose per unit time. Fluence maps were then utilized to calculate a 2D gamma index with a 2%–2mm criteria for each fraction. ElektaLogs were also used to analyze positional errors for MLC leaves and jaws, which were used to compute an overall error for the MLC banks, Y-jaws, and X-jaws by taking the root-meansquare value of the individual recorded errors during treatment. Additionally, beam on time was calculated using the number of ElektaLog file entries within the file. Results: The average 2D gamma for all 16 patient plans was found to be 98.0±2.0%. Recorded gamma index values showed an acceptable correlation between fractions. Average RMS values for MLC leaves and the jaws resulted in a leaf variation of roughly 0.3±0.08 mm and jaw variation of about 0.15±0.04 mm, both of which fall within clinical tolerances. Conclusion: The use of ElektaLog files for day-to-day evaluation of linac integrity and patient QA can be utilized to allow for reliable analysis of system accuracy and performance.

  6. Parsing glucose entry into the brain: novel findings obtained with enzyme-based glucose biosensors.

    Kiyatkin, Eugene A; Wakabayashi, Ken T


    Extracellular levels of glucose in brain tissue reflect dynamic balance between its gradient-dependent entry from arterial blood and its use for cellular metabolism. In this work, we present several sets of previously published and unpublished data obtained by using enzyme-based glucose biosensors coupled with constant-potential high-speed amperometry in freely moving rats. First, we consider basic methodological issues related to the reliability of electrochemical measurements of extracellular glucose levels in rats under physiologically relevant conditions. Second, we present data on glucose responses induced in the nucleus accumbens (NAc) by salient environmental stimuli and discuss the relationships between local neuronal activation and rapid glucose entry into brain tissue. Third, by presenting data on changes in NAc glucose induced by intravenous and intragastric glucose delivery, we discuss other mechanisms of glucose entry into the extracellular domain following changes in glucose blood concentrations. Lastly, by showing the pattern of NAc glucose fluctuations during glucose-drinking behavior, we discuss the relationships between "active" and "passive" glucose entry to the brain, its connection to behavior-related metabolic activation, and the possible functional significance of these changes in behavioral regulation. These data provide solid experimental support for the "neuronal" hypothesis of neurovascular coupling, which postulates the critical role of neuronal activity in rapid regulation of vascular tone, local blood flow, and entry of glucose and oxygen to brain tissue to maintain active cellular metabolism.

  7. La logística integral como ventaja competitiva y sistema logístico

    Mario Anselmo Martínez gallardo


    Full Text Available Esta investigación analiza la logística integral como una ventaja competitiva y el sistema logístico. Es opinión de los autores que la logística integral es esencial para el intercambio de mercancías, toda vez que reduce costos y hace más ágil la actividad comercial. La utilización de esta logística representa una ventaja competitiva con respecto de otras empresas por la optimización del capital y ahorro de tiempo.

  8. Well logging with natural gamma radiation

    Ellis, D.V.


    An invention is described for use in natural gamma radiation well logging in which measurements taken in a borehole are used in the search for valuable underground resources such as oil or gas. The invention comprises deriving a log of natural gamma radiation detected in selected energy windows for a selected borehole depth interval and converting it into a log of the selected subsurface materials, e.g. Th, U, K. This log is corrected for the effects of 1) either a gamma ray emitter in the borehole fluid, e.g. potassium salts and/or 2) a gamma ray attenuator in the borehole fluid, e.g. a strong attenuator such as barite and/or hematite. The Th, U, K log is particularly useful in the exploration of oil and gas resources since the Th, U, K concentrations are a good indication as to the presence, type and volume of shale and clay in the formations surrounding the borehole. (U.K.)

  9. AML (Advanced Mud Logging: First Among Equals

    T. Loermans


    Full Text Available During the past ten years an enormous development in mud logging technology has been made. Traditional mud logging was only qualitative in nature, and mudlogs could not be used for the petrophysical well evaluations which form the basis for all subsequent activities on wells and fields. AML however can provide quantitative information, logs with a reliability, trueness and precision like LWD and WLL. Hence for well evaluation programmes there are now three different logging methods available, each with its own pros and cons on specific aspects: AML, LWD and WLL. The largest improvements have been made in mud gas analysis and elemental analysis of cuttings. Mud gas analysis can yield hydrocarbon fluid composition for some components with a quality like PVT analysis, hence not only revolutionising the sampling programme so far done with only LWD/WLL, but also making it possible to geosteer on fluid properties. Elemental analysis of cuttings, e.g. with XRF, with an ability well beyond the capabilities of the spectroscopy measurements possible earlier with LWD/WLL tools, is opening up improved ways to evaluate formations, especially of course where the traditional methods are falling short of requirements, such as in unconventional reservoirs. An overview and specific examples of these AML logs is given, from which it may be concluded that AML now ought to be considered as “first among its equals”.

  10. Pulsed neutron logging - a modern approach to petroleum exploration

    Navalkar, M.P.


    As hydrocarbons have strikingly different properties for neutrons as compared with rocks, neutronic methods are useful to prepare logs of bore holes drilled for petroleum exploration. The earlier neutron logs were based on steady neutron sources, but the superior logs, namely, neutron life time log and neutron induced spectral log are based on pulsed neutron sources. The methods of obtaining these logs, their limitations and the field equipment required are described briefly. As the two logs are complementary, a plea has been made to develop field equipment which can obtain two logs in a single run. (M.G.B.)

  11. Fracture diagnostics with tube wave reflection logs

    Medlin, W.L.


    This paper reports on the Tube Wave Reflection Log (TWRL) which is acoustic logging method which provides information about the height, location and conductivity of hydraulically induced fractures behind perforated casing. The TWRL tool consists of a transmitter and closely spaced receiver. The transmitter is driven with a short, low frequency tone burst to generate long wavelength tube waves which are little attenuated in unperforated casing. They are partially reflected when they pass perforated intervals communicating with a hydraulically induced fracture. The tool listens for such reflections for 0.1 seconds following each excitation burst. As the tool is moved uphole at logging speed, the transmitter is excited at each foot of depth. VDL displays of the TWRL records provide reflection traces whose projections define the uppermost and lower-most perforations communicating with the fracture. The strength of the reflections depends on the ease of fluid flow into the fracture and thus, is an indicator of fracture conductivity

  12. Smartphone log data in a qualitative perspective

    Ørmen, Jacob; Thorhauge, Anne Mette


    into studies of smartphones in everyday life. Through an illustrative study, we explore a more nuanced perspective on what can be considered “log data” and how these types of data can be collected and analysed. A qualitative approach to log data analysis offers researchers new opportunities to situate......Log data from smartphones have primarily been used in large-scale research designs to draw statistical inferences from hundreds or even thousands of participants. In this article, we argue that more qualitatively oriented designs can also benefit greatly from integrating these rich data sources...... serve as cues to instigate discussion and reflection as well as act as resources for contextualizing and organizing related empirical material. In the discussion, the advantages of a qualitative perspective for research designs are assessed in relation to issues of validity. Further perspectives...

  13. Automated entry control system for nuclear facilities

    Ream, W.K.; Espinoza, J.


    An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized. 2 refs., 7 figs

  14. Financial feasibility of a log sort yard handling small-diameter logs: A preliminary study

    Han-Sup Han; E. M. (Ted) Bilek; John (Rusty) Dramm; Dan Loeffler; Dave Calkin


    The value and use of the trees removed in fuel reduction thinning and restoration treatments could be enhanced if the wood were effectively evaluated and sorted for quality and highest value before delivery to the next manufacturing destination. This article summarizes a preliminary financial feasibility analysis of a log sort yard that would serve as a log market to...

  15. Entry Mode Choice in Emerging Markets

    Gundersen, Anne Kathrine Navestad


    As the mature markets of developed economies have become increasingly saturated, firms are turning their attention towards emerging markets for further enterprise growth. However, these countries often present significant challenges for foreign entrants, forcing firms to adapt their strategies to the new context. While MNEs? entry mode choice is an extensively studied field, there is a deficit in the entry mode research on SMEs, and even more so when it comes to entry into emerging markets in...

  16. Geothermal well log interpretation midterm report

    Sanyal, S.K.; Wells, L.E.; Bickham, R.E.


    Reservoir types are defined according to fluid phase and temperature, lithology, geologic province, pore geometry, and salinity and fluid chemistry. Improvements are needed in lithology and porosity definition, fracture detection, and thermal evaluation for more accurate interpretation. Further efforts are directed toward improving diagnostic techniques for relating rock characteristics and log response, developing petrophysical models for geothermal systems, and developing thermal evaluation techniques. The Geothermal Well Log Interpretation study and report has concentrated only on hydrothermal geothermal reservoirs. Other geothermal reservoirs (hot dry rock, geopressured, etc.) are not considered.

  17. New portable neutron generator for well logging

    Chicanov, A.E.; Gromov, E. V.; Gulko, V. M.; Izmailov, A. V.


    The information about the design, investigation and testing of new well neutron generator for the pulse neutron logging (PNL) is given in this paper. The main physical characteristics of new PNL apparatus are: Neutron flux 2.10 sup 8 n/s ; Pulse frequency>=400 Hz; Diameter= 90 mm; Logging velocity >200 m/h; Number of probes = 2; Resource > 300 h. The generator were provided by gas-filled neutron accelerative tube named NTF-2. The perspective of application and optimization shown PNL apparatus are considered. (author)

  18. Analyzing Log Files using Data-Mining

    Marius Mihut


    Full Text Available Information systems (i.e. servers, applications and communication devices create a large amount of monitoring data that are saved as log files. For analyzing them, a data-mining approach is helpful. This article presents the steps which are necessary for creating an ‘analyzing instrument’, based on an open source software called Waikato Environment for Knowledge Analysis (Weka [1]. For exemplification, a system log file created by a Windows-based operating system, is used as input file.

  19. Kaizen aplicado à logística

    Santos, Ana Catarina Almeida


    O presente trabalho propõe alcançar um aumento de produtividade e consequente redução de custos e desperdícios ajudando o departamento logístico da Empresa Revigrés – Industria de Revestimentos de Grés, Lda, a tornar-se mais eficiente, através da aplicação da filosofia kaizen que propõe melhorias no desempenho por implementação de pequenas ações. O objetivo deste projeto é a melhoria do departamento logístico globalmente, para isso houve o recurso a pesquisas e levantamento ...

  20. Geophysical borehole logging test procedure: Final draft


    The purpose of geophysical borehole logging from the At-Depth Facility (ADF) is to provide information which will assist in characterizing the site geologic conditions and in classifying the engineering characteristics of the rock mass in the vicinity of the ADF. The direct goals of borehole logging include identification of lithologic units and their correlation from hole to hole, identification of fractured or otherwise porous or permeable zones, quantitative or semi-quantitative estimation of various formation properties, and evaluation of factors such as the borehole diameter and orientation. 11 figs., 4 tabs

  1. CS model coil experimental log book

    Nishijima, Gen; Sugimoto, Makoto; Nunoya, Yoshihiko; Wakabayashi, Hiroshi; Tsuji, Hiroshi


    Charging test of the ITER CS Model Coil which is the world's largest superconducting pulse coil and the CS Insert Coil had started at April 11, 2000 and had completed at August 18, 2000. In the campaign, total shot numbers were 356 and the size of the data file in the DAS (Data Acquisition System) was over 20 GB. This report is a database that consists of the log list and the log sheets of every shot. One can access the database, make a search, and browse results via Internet ( The database will be useful to quick search to choose necessary shots. (author)

  2. Perfil logístico de Colombia

    Cardozo Maglioni, María Victoria; Lozano Suarez, María Goretty


    El presente documento ofrece un estudio del perfil logístico de Colombia con la finalidad de dar a conocer el estado de arte de las ciudades, puertos e infraestructura principal para facilitar la toma de decisiones de los empresarios. Para el desarrollo de este trabajo se determinaron a partir de un análisis competitivo del país; las principales ciudades y puertos; logrando establecer un inventario de maquinaria y equipo e infraestructura logística; enmarcados en retos ya establecidos en las ...

  3. Well logging instrumental and methodological research

    Andrassy, L.; Barath, I.; Dorko, R.


    This part of the Annual Report of the Roland Eoetvoes Geophysical Institute (ELGI) of Hungary for 1982, summarizes the well logging instrumental and methodological researches of ELGI. The theoretical neutron diffusion fluxes for black and brown coals of Hungarian mines were calculated. A coal probe was developed and tested in boreholes using computerized data processing and interpretation. An X-ray radiometric method was used for the determination of Cu and Fe contents of minerals. Researches in the field of magnetic susceptibility and induced polarization logging are also summarized. A rapid analyzer for bauxite mining and a photorecorder for petroleum industry were developed by ELGI. (D.Gy.)

  4. Optimal firm growth under the threat of entry

    Kort, Peter M.; Wrzaczek, Stefan


    The paper studies the incumbent-entrant problem in a fully dynamic setting. We find that under an open-loop information structure the incumbent anticipates entry by overinvesting, whereas in the Markov perfect equilibrium the incumbent slightly underinvests in the period before the entry. The entry cost level where entry accommodation passes into entry deterrence is lower in the Markov perfect equilibrium. Further we find that the incumbent’s capital stock level needed to deter entry is hump shaped as a function of the entry time, whereas the corresponding entry cost, where the entrant is indifferent between entry and non-entry, is U-shaped. PMID:26435573

  5. Recent Advances in Hepatitis C Virus Cell Entry

    Jean Dubuisson


    Full Text Available More than 170 million patients worldwide are chronically infected with hepatitis C virus (HCV. Prevalence rates range from 0.5% in Northern European countries to 28% in some areas of Egypt. HCV is hepatotropic, and in many countries chronic hepatitis C is a leading cause of liver disease including fibrosis, cirrhosis and hepatocellular carcinoma. HCV persists in 50–85% of infected patients, and once chronic infection is established, spontaneous clearance is rare. HCV is a member of the Flaviviridae family, in which it forms its own genus. Many lines of evidence suggest that the HCV life cycle displays many differences to that of other Flaviviridae family members. Some of these differences may be due to the close interaction of HCV with its host’s lipid and particular triglyceride metabolism in the liver, which may explain why the virus can be found in association with lipoproteins in serum of infected patients. This review focuses on the molecular events underlying the HCV cell entry process and the respective roles of cellular co-factors that have been implied in these events. These include, among others, the lipoprotein receptors low density lipoprotein receptor and scavenger receptor BI, the tight junction factors occludin and claudin-1 as well as the tetraspanin CD81. We discuss the roles of these cellular factors in HCV cell entry and how association of HCV with lipoproteins may modulate the cell entry process.

  6. Strategic Entry Deterrence Modeling: Literature Review

    D. A. Seliverstov


    The prime focus in this article is on key findings concerning theoretical aspects of strategic behavior by incumbents to deter market entry of new firms. The author summarizes main lines of scientific research in the topic which give an insight into the patterns of the incumbent’s impact on the behavior of the entrants, the entry deterrence instruments and the consequences of these actions. Today the free entry markets are considered to be a rare phenomenon. The market entry of new firms is a...

  7. Energy Information Data Base: corporate author entries


    One of the controls for information entered into the data bases created and maintained by the DOE Technical Information Center is the standardized name for the corporate entity or the corporate author. The purpose of Energy Information Data Base: Corporate Author Entries is to provide a means for the consistent citing of the names of organizations in bibliographic records. These entries serve as guides for users of the DOE/RECON computerized data bases who want to locate information originating in particular organizations. The entries in this revision include the corporate entries used in report bibliographic citations since 1973 and list approximately 28,000 corporate sources

  8. Cutting through - open entries require proper support

    Peng, S.S. [West Virginia University, Morgantown, WV (USA). Mining Engineering Dept.


    The paper explains the applications of open entries in mining and different roof techniques to relieve longwall abutment pressures. The primary support for the open (or cut-through) entries and recovery rooms are normally similar to other development entries in the same mines. The supplementary supports installed can be divided into the following three types: complete backfill of open entries, supplemental roof and/or rib-bolt reinforcement only - no standing support and rows of standing support with or without supplemental roof and/or rib-bolt reinforcement. 3 figs.

  9. Gene Therapy Targeting HIV Entry

    Chuka Didigu


    Full Text Available Despite the unquestionable success of antiretroviral therapy (ART in the treatment of HIV infection, the cost, need for daily adherence, and HIV-associated morbidities that persist despite ART all underscore the need to develop a cure for HIV. The cure achieved following an allogeneic hematopoietic stem cell transplant (HSCT using HIV-resistant cells, and more recently, the report of short-term but sustained, ART-free control of HIV replication following allogeneic HSCT, using HIV susceptible cells, have served to both reignite interest in HIV cure research, and suggest potential mechanisms for a cure. In this review, we highlight some of the obstacles facing HIV cure research today, and explore the roles of gene therapy targeting HIV entry, and allogeneic stem cell transplantation in the development of strategies to cure HIV infection.

  10. Automated data mining: an innovative and efficient web-based approach to maintaining resident case logs.

    Bhattacharya, Pratik; Van Stavern, Renee; Madhavan, Ramesh


    Use of resident case logs has been considered by the Residency Review Committee for Neurology of the Accreditation Council for Graduate Medical Education (ACGME). This study explores the effectiveness of a data-mining program for creating resident logs and compares the results to a manual data-entry system. Other potential applications of data mining to enhancing resident education are also explored. Patient notes dictated by residents were extracted from the Hospital Information System and analyzed using an unstructured mining program. History, examination and ICD codes were obtained and compared to the existing manual log. The automated data History, examination, and ICD codes were gathered for a 30-day period and compared to manual case logs. The automated method extracted all resident dictations with the dates of encounter and transcription. The automated data-miner processed information from all 19 residents, while only 4 residents logged manually. The manual method identified only broad categories of diseases; the major categories were stroke or vascular disorder 53 (27.6%), epilepsy 28 (14.7%), and pain syndromes 26 (13.5%). In the automated method, epilepsy 114 (21.1%), cerebral atherosclerosis 114 (21.1%), and headache 105 (19.4%) were the most frequent primary diagnoses, and headache 89 (16.5%), seizures 94 (17.4%), and low back pain 47 (9%) were the most common chief complaints. More detailed patient information such as tobacco use 227 (42%), alcohol use 205 (38%), and drug use 38 (7%) were extracted by the data-mining method. Manual case logs are time-consuming, provide limited information, and may be unpopular with residents. Data mining is a time-effective tool that may aid in the assessment of resident experience or the ACGME core competencies or in resident clinical research. More study of this method in larger numbers of residency programs is needed.

  11. The role of transient receptor potential channels in metabolic syndrome

    Liu, Daoyan; Zhu, Zhiming; Tepel, Martin


    Metabolic syndrome is correlated with increased cardiovascular risk and characterized by several factors, including visceral obesity, hypertension, insulin resistance, and dyslipidemia. Several members of a large family of nonselective cation entry channels, e.g., transient receptor potential (TRP...

  12. Adaptive designs for the one-sample log-rank test.

    Schmidt, Rene; Faldum, Andreas; Kwiecien, Robert


    Traditional designs in phase IIa cancer trials are single-arm designs with a binary outcome, for example, tumor response. In some settings, however, a time-to-event endpoint might appear more appropriate, particularly in the presence of loss to follow-up. Then the one-sample log-rank test might be the method of choice. It allows to compare the survival curve of the patients under treatment to a prespecified reference survival curve. The reference curve usually represents the expected survival under standard of the care. In this work, convergence of the one-sample log-rank statistic to Brownian motion is proven using Rebolledo's martingale central limit theorem while accounting for staggered entry times of the patients. On this basis, a confirmatory adaptive one-sample log-rank test is proposed where provision is made for data dependent sample size reassessment. The focus is to apply the inverse normal method. This is done in two different directions. The first strategy exploits the independent increments property of the one-sample log-rank statistic. The second strategy is based on the patient-wise separation principle. It is shown by simulation that the proposed adaptive test might help to rescue an underpowered trial and at the same time lowers the average sample number (ASN) under the null hypothesis as compared to a single-stage fixed sample design. © 2017, The International Biometric Society.

  13. Border Crossing/Entry Data - Border Crossing/Entry Data Time Series tool

    Department of Transportation — The dataset is known as “Border Crossing/Entry Data.” The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics to the...

  14. Extracting useful knowledge from event logs

    Djenouri, Youcef; Belhadi, Asma; Fournier-Viger, Philippe


    Business process analysis is a key activity that aims at increasing the efficiency of business operations. In recent years, several data mining based methods have been designed for discovering interesting patterns in event logs. A popular type of methods consists of applying frequent itemset mini...

  15. Potential for shared log transport services

    Tim McDonald; Steve Taylor; Jorge Valenzuela


    A simulation model of a log transport logistics network was developed. The model could be structured to either share truck capacity among a group of loggers, or to assign a fixed number of trucks to individual loggers. Another variation of the model allowed the use of a staging yard to set out loaded trailers and deliver them to destinations using dedicated shuttle...

  16. Identifying unstable sites on logging roads

    R. M. Rice; J. Lewis


    Logging roads are an important source of forestry-related erosion. The amount of erosion on a forest road is determined by the interaction between how the road is constructed and maintained and the environment in which it is built. The roads in this study were constructed with large bulldozers, and most excavated material was sidecast. The roads studied were...

  17. Narrating Illegal Logging Across the Globe

    Winkel, Georg; Leipold, Sina; Buhmann, Karin


    In the last decade illegal logging has triggered the attention of policy makers and scholars of international forest governance. The issue is multifaceted, involving aspects of social and environmental sustainability, development, trade, access to markets and competitiveness. A vivid academic deb...

  18. Modelling tropical forests response to logging

    Cazzolla Gatti, Roberto; Di Paola, Arianna; Valentini, Riccardo; Paparella, Francesco


    Tropical rainforests are among the most threatened ecosystems by large-scale fragmentation due to human activity such as heavy logging and agricultural clearance. Although, they provide crucial ecosystem goods and services, such as sequestering carbon from the atmosphere, protecting watersheds and conserving biodiversity. In several countries forest resource extraction has experienced a shift from clearcutting to selective logging to maintain a significant forest cover and understock of living biomass. However the knowledge on the short and long-term effects of removing selected species in tropical rainforest are scarce and need to be further investigated. One of the main effects of selective logging on forest dynamics seems to be the local disturbance which involve the invasion of open space by weed, vines and climbers at the expense of the late-successional state cenosis. We present a simple deterministic model that describes the dynamics of tropical rainforest subject to selective logging to understand how and why weeds displace native species. We argue that the selective removal of tallest tropical trees carries out gaps of light that allow weeds, vines and climbers to prevail on native species, inhibiting the possibility of recovery of the original vegetation. Our results show that different regime shifts may occur depending on the type of forest management adopted. This hypothesis is supported by a dataset of trees height and weed/vines cover that we collected from 9 plots located in Central and West Africa both in untouched and managed areas.

  19. ADN* Density log estimation Using Rockcell*

    Okuku, C.; Iloghalu, Emeka. M.; Omotayo, O.


    This work is intended to inform on the possibilities of estimating good density data in zones associated with sliding in a reservoir with ADN* tool with or without ADOS in string in cases where repeat sections were not done, possibly due to hole stability or directional concerns. This procedure has been equally used to obtain a better density data in corkscrew holes. Density data (ROBB) was recomputed using neural network in RockCell* to estimate the density over zones of interest. RockCell* is a Schlumberger software that has neural network functionally which can be used to estimate missing logs using the combination of the responses of other log curves and intervals that are not affected by sliding. In this work, an interval was selected and within this interval twelve litho zones were defined using the unsupervised neural network. From this a training set was selected based on intervals of very good log responses outside the sliding zones. This training set was used to train and run the neural network for a specific lithostratigraphic interval. The results matched the known good density curve. Then after this, an estimation of the density curve was done using the supervised neural network. The output from this estimation matched very closely in the good portions of the log, thus providing some density measurements in the sliding zone. This methodology provides a scientific solution to missing data during the process of Formation evaluation

  20. Changes in the Logging Labor Force

    Charles H. Wolf; Jean W. Nolley


    Employment in the logging industry dropped 28 percent between 1950 and 1970, while output of industrial roundwood increased 31 percent. Today's loggers are older, better educated, and more skilled. A large proportion are self-employed, many work less than a full year, and a substantial number have incomes below the poverty level. Mechanization of timber harvesting...

  1. Alaska midgrade logs: supply and offshore demand.

    Donald F. Flora; Wendy J. McGinnis


    The outlook for shipments and prices of export logs from Alaska differs significantly by grade (quality class). For the majority lying in the middle of the value range, the trend of prices is projected to increase $200 per thousand board feet, or about 55 percent, by 2000. Shipments are expected to rise about 30 percent by 1995 and then subside about 10 percent. These...

  2. Analyzing Grid Log Data with Affinity Propagation

    Modena, G.; van Someren, M.W.; Ali, M; Bosse, T.; Hindriks, K.V.; Hoogendoorn, M.; Jonker, C.M; Treur, J.


    In this paper we present an unsupervised learning approach to detect meaningful job traffic patterns in Grid log data. Manual anomaly detection on modern Grid environments is troublesome given their increasing complexity, the distributed, dynamic topology of the network and heterogeneity of the jobs

  3. Exploration and grade control neutron logging

    Eisler, P.L.


    Techniques used in neutron logging in boreholes are discussed. They include the application of neutron probes to porosity measurements, to lithological determinations based on macroscopic cross-section measurements and measurements of the concentration of chemical constituents in rocks and ores

  4. Explorations in statistics: the log transformation.

    Curran-Everett, Douglas


    Learning about statistics is a lot like learning about science: the learning is more meaningful if you can actively explore. This thirteenth installment of Explorations in Statistics explores the log transformation, an established technique that rescales the actual observations from an experiment so that the assumptions of some statistical analysis are better met. A general assumption in statistics is that the variability of some response Y is homogeneous across groups or across some predictor variable X. If the variability-the standard deviation-varies in rough proportion to the mean value of Y, a log transformation can equalize the standard deviations. Moreover, if the actual observations from an experiment conform to a skewed distribution, then a log transformation can make the theoretical distribution of the sample mean more consistent with a normal distribution. This is important: the results of a one-sample t test are meaningful only if the theoretical distribution of the sample mean is roughly normal. If we log-transform our observations, then we want to confirm the transformation was useful. We can do this if we use the Box-Cox method, if we bootstrap the sample mean and the statistic t itself, and if we assess the residual plots from the statistical model of the actual and transformed sample observations.

  5. Apache Flume distributed log collection for Hadoop

    D'Souza, Subas


    A starter guide that covers Apache Flume in detail.Apache Flume: Distributed Log Collection for Hadoop is intended for people who are responsible for moving datasets into Hadoop in a timely and reliable manner like software engineers, database administrators, and data warehouse administrators

  6. 47 CFR 80.409 - Station logs.


    ... primary office or available to the Commission via secured access to the licensee's Internet web site. Logs..., together with the time of such observation or occurrence and the position of the ship or other mobile unit... devices which do not have integral navigation receivers, including: VHF DSC, MF DSC, satellite EPIRB and...

  7. Geophysical logging for mineral exploration and development

    Plouffe, R.D.


    It is possible to retrieve from small-diameter holes geophysical data for qualitative interpretation in exploration and quantitative interpretation in the development of orebodies. The primary objectives in the exploration stage are to identify where, within a hole, economic minerals are, and to help in lithological interpretations. Other aspects, which are more quantitative, are the interpretation of downhole logs for parameters which can be used in surface geophysical methods (i.e. density for gravity surveys, acoustic velocities for seismic surveys, and magnetic susceptibility for airborne and ground magnetic surveys). Recent advances in equipment design, portability and durability have made downhole logging in exploration more inexpensive and reliable. This new equipment is being used to generate very precise quantitative results. This is especially true on uranium development projects. The interpretation of gamma logs for eU 3 O 8 values has finally become precise enough that they have begun to replace chemical values in reserve calculations. Another part of development data is density and equilibrium information, which, with today's technology, is being derived from downhole probing. In the years to come, the trends for many metals are toward neutron activation techniques, or in-situ assaying, and the use of multiple logs for better lithological and physical rock property determinations. (auth)

  8. Information needs for increasing log transport efficiency

    Timothy P. McDonald; Steven E. Taylor; Robert B. Rummer; Jorge Valenzuela


    Three methods of dispatching trucks to loggers were tested using a log transport simulation model: random allocation, fixed assignment of trucks to loggers, and dispatch based on knowledge of the current status of trucks and loggers within the system. This 'informed' dispatch algorithm attempted to minimize the difference in time between when a logger would...

  9. Root cause analysis with enriched process logs

    Suriadi, S.; Ouyang, C.; Aalst, van der W.M.P.; Hofstede, ter A.H.M.; La Rosa, M.; Soffer, P.


    n the field of process mining, the use of event logs for the purpose of root cause analysis is increasingly studied. In such an analysis, the availability of attributes/features that may explain the root cause of some phenomena is crucial. Currently, the process of obtaining these attributes from

  10. Mining process performance from event logs

    Adriansyah, A.; Buijs, J.C.A.M.; La Rosa, M.; Soffer, P.


    In systems where process executions are not strictly enforced by a predefined process model, obtaining reliable performance information is not trivial. In this paper, we analyzed an event log of a real-life process, taken from a Dutch financial institute, using process mining techniques. In

  11. Lianas and logging in West Africa

    Parren, M.P.E.


    The role of lianas in relation to logging activities is analysed in a lowland moist forest in Cameroon. Lianas are an abundant, diverse, and conspicuous growth form in nearly all tropical forests. Lianas are mostly seen as a nuisance by foresters. Cutting of liana stems is an important operation in

  12. Requirements-Driven Log Analysis Extended Abstract

    Havelund, Klaus


    Imagine that you are tasked to help a project improve their testing effort. In a realistic scenario it will quickly become clear, that having an impact is diffcult. First of all, it will likely be a challenge to suggest an alternative approach which is significantly more automated and/or more effective than current practice. The reality is that an average software system has a complex input/output behavior. An automated testing approach will have to auto-generate test cases, each being a pair (i; o) consisting of a test input i and an oracle o. The test input i has to be somewhat meaningful, and the oracle o can be very complicated to compute. Second, even in case where some testing technology has been developed that might improve current practice, it is then likely difficult to completely change the current behavior of the testing team unless the technique is obviously superior and does everything already done by existing technology. So is there an easier way to incorporate formal methods-based approaches than the full edged test revolution? Fortunately the answer is affirmative. A relatively simple approach is to benefit from possibly already existing logging infrastructure, which after all is part of most systems put in production. A log is a sequence of events, generated by special log recording statements, most often manually inserted in the code by the programmers. An event can be considered as a data record: a mapping from field names to values. We can analyze such a log using formal methods, for example checking it against a formal specification. This separates running the system for analyzing its behavior. It is not meant as an alternative to testing since it does not address the important in- put generation problem. However, it offers a solution which testing teams might accept since it has low impact on the existing process. A single person might be assigned to perform such log analysis, compared to the entire testing team changing behavior.

  13. Anomalous self potential (sp) log signatures observed in a water ...

    Geophysical logging was done after drilling had been completed in a water well at Okwudor, South Eastern Nigeria. Three electric logs were run viz: Self Potential (SP), Resistivity N16″ and N64″ logs. An anomaly was observed in the SP log. The SP results from this well show some deviation from the standard norm.

  14. Using Web Server Logs in Evaluating Instructional Web Sites.

    Ingram, Albert L.


    Web server logs contain a great deal of information about who uses a Web site and how they use it. This article discusses the analysis of Web logs for instructional Web sites; reviews the data stored in most Web server logs; demonstrates what further information can be gleaned from the logs; and discusses analyzing that information for the…

  15. Stress wave sorting of red maple logs for structural quality

    Xiping Wang; Robert J. Ross; David W. Green; Brian Brashaw; Karl Englund; Michael Wolcott


    Existing log grading procedures in the United States make only visual assessments of log quality. These procedures do not incorporate estimates of the modulus of elasticity (MOE) of logs. It is questionable whether the visual grading procedures currently used for logs adequately assess the potential quality of structural products manufactured from them, especially...

  16. Tradeoffs and interdependence in the Alaska cant and log markets.

    Donald Flora; Una Woller; Michael. Neergaard


    During the 1980s, log exports from Alaska have risen while cant (lumber) exports have declined. Eight explanations for the difference between cant and log market behavior are explored. It seems that declining demand for wood products in Japan and a surge of private-sector log harvests in Alaska are enough to account for the apparent substitution of logs for cants. It...

  17. Performance of sampling methods to estimate log characteristics for wildlife.

    Lisa J. Bate; Torolf R. Torgersen; Michael J. Wisdom; Edward O. Garton


    Accurate estimation of the characteristics of log resources, or coarse woody debris (CWD), is critical to effective management of wildlife and other forest resources. Despite the importance of logs as wildlife habitat, methods for sampling logs have traditionally focused on silvicultural and fire applications. These applications have emphasized estimates of log volume...

  18. Advanced of X-ray fluorescence logging technique in China

    Zhou Sichun; Ge Liangquan; Lai Wanchang; Yang Qiang


    The paper discuses principle of X-ray fluorescence logging, and introduces advanced of X-ray fluorescence logging technique in China. By 2009, third generation XRF logging instrument has been developed in China, and good logging result has been obtained in Lala copper mine. (authors)

  19. Logging utilization in Idaho: Current and past trends

    Eric A. Simmons; Todd A. Morgan; Erik C. Berg; Stanley J. Zarnoch; Steven W. Hayes; Mike T. Thompson


    A study of commercial timber-harvesting activities in Idaho was conducted during 2008 and 2011 to characterize current tree utilization, logging operations, and changes from previous Idaho logging utilization studies. A two-stage simple random sampling design was used to select sites and felled trees for measurement within active logging sites. Thirty-three logging...

  20. Energy Data Base: corporate author entries

    Hendricks, P.L.


    Corporate author entries provide a means for consistent citing of the names of organizations in bibliographic records in the data bases of the DOE Technical Information Center. These entries serve as guides for users of the DOE/RECON computerized data bases who want to locate information originating in particular organizations

  1. Strategic Entry Deterrence Modeling: Literature Review

    D. A. Seliverstov


    Full Text Available The prime focus in this article is on key findings concerning theoretical aspects of strategic behavior by incumbents to deter market entry of new firms. The author summarizes main lines of scientific research in the topic which give an insight into the patterns of the incumbent’s impact on the behavior of the entrants, the entry deterrence instruments and the consequences of these actions. Today the free entry markets are considered to be a rare phenomenon. The market entry of new firms is associated with significant entry costs, which allow the incumbents to take advantage of their dominant position and derive positive economic profits. In case of entry threat by potential competitors the incumbents take strategic actions aimed at deterring entry and preserving their dominant position. Among the most efficient strategic actions one can emphasize the erection of additional barriers to entry for the newcomers through producing the limit output and price, investments in sunk assets, capacity expansion and product differentiation. Meanwhile by taking strategic actions the incumbents are not always trying to affect the entrant’s costs and profit directly, they often aim at changing the entrant’s expectations regarding future intentions of the incumbents to preserve dominant position.

  2. 40 CFR 170.112 - Entry restrictions.


    ...-entry interval applies, including, but not limited to, soil, water, air, or surfaces of plants; and (2...-entry activity, the agricultural employer shall provide a decontamination site in accordance with § 170... running water for routine and emergency decontamination and mechanical devices that would reduce the...

  3. Entry and Competition in Differentiated Products Markets

    Schaumans, C.B.C.; Verboven, F.L.


    We propose a methodology for estimating the competition effects from entry when firms sell differentiated products. We first derive precise conditions under which Bres- nahan and Reiss'entry threshold ratios (ETRs) can be used to test for the presence and to measure the magnitude of competition

  4. On Entry Deterrence and Imperfectly Observable Commitment

    Poulsen, Anders


    We analyse a simple entry-deterrence game, where a `Potential Intruder' only imperfectly observes the decision of an `Incumbent' to commit or to not commit to fight any entry by the Potential Intruder. Our game generalises the one studied in Bonanno (1992) by allowing for a richer information tec...

  5. Foreign Entry and Heterogeneous Growth of Firms

    Deng, Paul Duo; Jefferson, Gary H.

    We adopt the framework of Schumpeterian creative destruction formalized by Aghion et al. (2009) to analyze the impact of foreign entry on the productivity growth of domestic firms. In the face of foreign entry, domestic firms exhibit heterogeneous patterns of growth depending on their technologic...... manufacturing. Our empirical results confirm that foreign entry indeed generates strong heterogeneous growth patterns among domestic firms.......We adopt the framework of Schumpeterian creative destruction formalized by Aghion et al. (2009) to analyze the impact of foreign entry on the productivity growth of domestic firms. In the face of foreign entry, domestic firms exhibit heterogeneous patterns of growth depending on their technological...... distance from foreign firms. Domestic firms with smaller technological distance from their foreign counterparts tend to experience faster productivity growth, while firms with larger technological distance tend to lag further behind. We test this hypothesis using a unique firm-level data of Chinese...

  6. Adaptive Text Entry for Mobile Devices

    Proschowsky, Morten Smidt

    The reduced size of many mobile devices makes it difficult to enter text with them. The text entry methods are often slow or complicated to use. This affects the performance and user experience of all applications and services on the device. This work introduces new easy-to-use text entry methods...... for mobile devices and a framework for adaptive context-aware language models. Based on analysis of current text entry methods, the requirements to the new text entry methods are established. Transparent User guided Prediction (TUP) is a text entry method for devices with one dimensional touch input. It can...... be touch sensitive wheels, sliders or similar input devices. The interaction design of TUP is done with a combination of high level task models and low level models of human motor behaviour. Three prototypes of TUP are designed and evaluated by more than 30 users. Observations from the evaluations are used...

  7. Limitations and developing directions of pulsed neutron logging

    Wu Wensheng; Xiao Lizhi


    The paper explains briefly the principle of pulsed neutron logging method, summarizes the system and uses of the method in petroleum logging. The paper points out the limitations of pulsed neutron logging such as low precise measurements, low logging speed, plenty of influence factors, low vertical resolution, bad adaptability, difficult logging interpretation and so on, and expounds its developing directions in hardware, software, method and principle. (authors)

  8. Quantifying medical student clinical experiences via an ICD Code Logging App.

    Rawlins, Fred; Sumpter, Cameron; Sutphin, Dean; Garner, Harold R


    The logging of ICD Diagnostic, Procedure and Drug codes is one means of tracking the experience of medical students' clinical rotations. The goal is to create a web-based computer and mobile application to track the progress of trainees, monitor the effectiveness of their training locations and be a means of sampling public health status. We have developed a web-based app in which medical trainees make entries via a simple and quick interface optimized for both mobile devices and personal computers. For each patient interaction, users enter ICD diagnostic, procedure, and drug codes via a hierarchical or search entry interface, as well as patient demographics (age range and gender, but no personal identifiers), and free-text notes. Users and administrators can review and edit input via a series of output interfaces. The user interface and back-end database are provided via dual redundant failover Linux servers. Students master the interface in ten minutes, and thereafter complete entries in less than one minute. Five hundred-forty 3rd year VCOM students each averaged 100 entries in the first four week clinical rotation. Data accumulated in various Appalachian clinics and Central American medical mission trips has demonstrated the public health surveillance utility of the application. PC and mobile apps can be used to collect medical trainee experience in real time or near real-time, quickly, and efficiently. This system has collected 75,596 entries to date, less than 2% of trainees have needed assistance to become proficient, and medical school administrators are using the various summaries to evaluate students and compare different rotation sites. Copyright © 2017. Published by Elsevier B.V.

  9. Computerized provider order entry systems.


    Computerized provider order entry (CPOE) systems are designed to replace a hospital's paper-based ordering system. They allow users to electronically write the full range of orders, maintain an online medication administration record, and review changes made to an order by successive personnel. They also offer safety alerts that are triggered when an unsafe order (such as for a duplicate drug therapy) is entered, as well as clinical decision support to guide caregivers to less expensive alternatives or to choices that better fit established hospital protocols. CPOE systems can, when correctly configured, markedly increase efficiency and improve patient safety and patient care. However, facilities need to recognize that currently available CPOE systems require a tremendous amount of time and effort to be spent in customization before their safety and clinical support features can be effectively implemented. What's more, even after they've been customized, the systems may still allow certain unsafe orders to be entered. Thus, CPOE systems are not currently a quick or easy remedy for medical errors. ECRI's Evaluation of CPOE systems--conducted in collaboration with the Institute for Safe Medication Practices (ISMP)--discusses these and other related issues. It also examines and compares CPOE systems from three suppliers: Eclipsys Corp., IDX Systems Corp., and Siemens Medical Solutions Health Services Corp. Our testing focuses primarily on the systems' interfacing capabilities, patient safeguards, and ease of use.

  10. Theoretical and Numerical Study of Seismoelectric Logs for Logging While Drilling (LWD

    Sun Xiang-Yang


    Full Text Available When the acoustic field propagates in the porous medium, the electromagnetic wave can be induced by the seismoelectric effects which can be used in the logging. This paper studies the seismoelectric wave field and deduces the formulations of the acoustic and electromagnetic field of the liquid in the well, and gives the acoustic and electromagnetic boundary conditions between the driller collar and the log liquid, when the driller collar is added. We also do the numerical simulation of the seismoelectric wave field excited by monopole source, study the velocity dispersion characteristics of the acoustic and electromagnetic field, and investigate the detective depth of the seismoelectric logs. Through the simulation we know the seismoelectric logs can avoid the interference of drill collar wave. This paper also provides theoretical guidance for the design of receiving antenna.

  11. Comparative analysis of nuclear magnetic resonance well logging and nuclear magnetic resonance mud logging

    Yuan Zugui


    The hydrogen atoms in oil and water are able to resonate and generate signals in the magnetic field, which is used by the NMR (nuclear magnetic resonance) technology in petroleum engineering to research and evaluate rock characteristics. NMR well logging was used to measure the physical property parameters of the strata in well bore, whereas NMR mud logging was used to analyze (while drilling) the physical property parameters of cores, cuttings and sidewall coring samples on surface (drilling site). Based on the comparative analysis of the porosity and permeability parameters obtained by NMR well logging and those from analysis of the cores, cuttings and sidewall coring samples by NMR mud logging in the same depth of 13 wells, these two methods are of certain difference, but their integral tendency is relatively good. (authors)

  12. CS model coil experimental log book

    Nishijima, Gen; Sugimoto, Makoto; Nunoya, Yoshihiko; Wakabayashi, Hiroshi; Tsuji, Hiroshi [Japan Atomic Energy Research Inst., Naka, Ibaraki (Japan). Naka Fusion Research Establishment


    Charging test of the ITER CS Model Coil which is the world's largest superconducting pulse coil and the CS Insert Coil had started at April 11, 2000 and had completed at August 18, 2000. In the campaign, total shot numbers were 356 and the size of the data file in the DAS (Data Acquisition System) was over 20 GB. This report is a database that consists of the log list and the log sheets of every shot. One can access the database, make a search, and browse results via Internet ( The database will be useful to quick search to choose necessary shots. (author)

  13. High resolution gamma spectroscopy well logging system

    Giles, J.R.; Dooley, K.J.


    A Gamma Spectroscopy Logging System (GSLS) has been developed to study sub-surface radionuclide contamination. The absolute counting efficiencies of the GSLS detectors were determined using cylindrical reference sources. More complex borehole geometries were modeled using commercially available shielding software and correction factors were developed based on relative gamma-ray fluence rates. Examination of varying porosity and moisture content showed that as porosity increases, and as the formation saturation ratio decreases, relative gamma-ray fluence rates increase linearly for all energies. Correction factors for iron and water cylindrical shields were found to agree well with correction factors determined during previous studies allowing for the development of correction factors for type-304 stainless steel and low-carbon steel casings. Regression analyses of correction factor data produced equations for determining correction factors applicable to spectral gamma-ray well logs acquired under non-standard borehole conditions

  14. Well logging system with linearity control

    Jones, J.M.


    Apparatus is described for controlling the gain of a nuclear well logging system comprising: (1) means for measuring the energy spectrum of gamma rays produced by earth formation materials surrounding a well borehole; (2) means for measuring the number of counts of a gamma rays having an energy falling within each of at least two predetermined energy band portions of the gamma ray energy spectrum; (3) means for generating a signal proportional to the ratio of the gamma ray counts and for comparing the ratio signal with at least one constant ratio calibration signal; (4) means for generating an error signal representative of the difference of the ratio signal and the constant ratio calibration signal; and (5) means for using the error signal to control the linearity of the well logging system. (author)

  15. Assessment of radiation safety in well logging

    Alles, A.; Pérez, Y.; Duménigo, C.


    Radiation safety assessments required by current regulations are a means to verify compliance with the requirements. Different methods have been used for this purpose. In the paper the results of applying the method of risk matrices, applied for the first time in the practice of well logging are exposed. For each initiating event frequency of occurrence, the severity of its consequences and the probability of failure of the barriers identified were evaluated. Starting from these assumptions, the risk associated is determined for each of the identified accident sequences, using for this the SEVRRA code 'Risk Assessment System', originally designed for use in radiotherapy. As an result sequences increased risk associated with the practice of well logging were identified, which is the starting point for the further implementation of a coherent program of dose optimization in practice. [es

  16. No chiral truncation of quantum log gravity?

    Andrade, Tomás; Marolf, Donald


    At the classical level, chiral gravity may be constructed as a consistent truncation of a larger theory called log gravity by requiring that left-moving charges vanish. In turn, log gravity is the limit of topologically massive gravity (TMG) at a special value of the coupling (the chiral point). We study the situation at the level of linearized quantum fields, focussing on a unitary quantization. While the TMG Hilbert space is continuous at the chiral point, the left-moving Virasoro generators become ill-defined and cannot be used to define a chiral truncation. In a sense, the left-moving asymptotic symmetries are spontaneously broken at the chiral point. In contrast, in a non-unitary quantization of TMG, both the Hilbert space and charges are continuous at the chiral point and define a unitary theory of chiral gravity at the linearized level.

  17. Modelo de custos logísticos

    José Vanderlei Silva Borba


    Full Text Available Em contexto de globalização, a distância física entre produtores de bens e de serviços e consumidores deixa de ser relevante. Isso determina que o gerenciamento de custos logísticos venha agregar valor relevante aos produtos comercializados, pois procura identificar e determinar a eficácia dos recursos consumidos internamente pela empresa e, externamente, procura fazer a análise da cadeia de valor. Nessa perspectiva, a definição das variáveis de custos está além de seus muros. Este trabalho propõe um modelo de apuração de custos logísticos, que atenda, simultaneamente, os custos de suprimentos e os custos de distribuição, com impactos sobre o processo de tomada de decisão.

  18. Development of a digital log ratemeter

    Domienikan, Claudio; Brito, Andreia; Toledo, Fabio de; Zahn, Guilherme S.


    A compact log ratemeter that measures and displays an average count rate through a microcomputer is presented. This ratemeter was developed to be used to monitor a laboratory of production of radioactive samples and also for teaching purposes. The main features are log measurement range from .1 to 1.000 counts/sec and adjustable level alarm. The electronic circuit uses a Geiger tube LND7224, and the processed signal is applied to a National Instruments Multifunction I/O USB-6008 connected to a PC through USB input. A program developed in LabView allows storage of data and real-time observation of the rate of radiation evolution. This ratemeter was designed and constructed in the IPEN-CNEN/SP. (author)

  19. Glass scintillator pair for compensation neutron logging

    Ji Changsong; Li Xuezhi; Yiu Guangduo


    Glass scintillator pair types ST 1604 and ST 1605 for compensation of neutron logging is developed. The neutron sensitive material used is multistick lithium glass scintillators 3 and 4 mm in diameter respectively. Thermoneutron detection efficiencies are 50-60% and 100% respectively. The detection efficiency for 60 Co γ ray is lower than 0.3%. The type ST 1604 and ST 1605 may also be used as high sensitive neutron detectors in an intensive γ ray field

  20. Log Gaussian Cox processes on the sphere

    Pacheco, Francisco Andrés Cuevas; Møller, Jesper

    We define and study the existence of log Gaussian Cox processes (LGCPs) for the description of inhomogeneous and aggregated/clustered point patterns on the d-dimensional sphere, with d = 2 of primary interest. Useful theoretical properties of LGCPs are studied and applied for the description of sky...... positions of galaxies, in comparison with previous analysis using a Thomas process. We focus on simple estimation procedures and model checking based on functional summary statistics and the global envelope test....

  1. Log-Concavity Properties of Minkowski Valuations

    Berg, Astrid; Parapatits, Lukas; Schuster, Franz E.; Weberndorfer, Manuel


    New Orlicz Brunn-Minkowski inequalities are established for rigid motion compatible Minkowski valuations of arbitrary degree. These extend classical log-concavity properties of intrinsic volumes and generalize seminal results of Lutwak and others. Two different approaches which refine previously employed techniques are explored. It is shown that both lead to the same class of Minkowski valuations for which these inequalities hold. An appendix by Semyon Alesker contains the proof of a new clas...

  2. Methods for calibrating radioactivity well logging tools

    Waggoner, J.A.; Turcotte, R.E.; Hunt-Grubbe, R.H.


    Field-calibrating of well-logging tools is achieved by means of a sleeve, which has radioactive material distributed therein, and which envelopes the portion of the tool housing containing the detector. Accurate calibration can be performed and the source can be made considerably weaker than those now in use as it can be brought very close to the detector thus lessening errors. (U.K.)

  3. SDSS Log Viewer: visual exploratory analysis of large-volume SQL log data

    Zhang, Jian; Chen, Chaomei; Vogeley, Michael S.; Pan, Danny; Thakar, Ani; Raddick, Jordan


    User-generated Structured Query Language (SQL) queries are a rich source of information for database analysts, information scientists, and the end users of databases. In this study a group of scientists in astronomy and computer and information scientists work together to analyze a large volume of SQL log data generated by users of the Sloan Digital Sky Survey (SDSS) data archive in order to better understand users' data seeking behavior. While statistical analysis of such logs is useful at aggregated levels, efficiently exploring specific patterns of queries is often a challenging task due to the typically large volume of the data, multivariate features, and data requirements specified in SQL queries. To enable and facilitate effective and efficient exploration of the SDSS log data, we designed an interactive visualization tool, called the SDSS Log Viewer, which integrates time series visualization, text visualization, and dynamic query techniques. We describe two analysis scenarios of visual exploration of SDSS log data, including understanding unusually high daily query traffic and modeling the types of data seeking behaviors of massive query generators. The two scenarios demonstrate that the SDSS Log Viewer provides a novel and potentially valuable approach to support these targeted tasks.

  4. Estimation of the non records logs from existing logs using artificial neural networks

    Mehdi Mohammad Salehi


    Full Text Available Finding the information of the hydrocarbon reservoirs from well logs is one of the main objectives of the engineers. But, missing the log records (due to many reasons such as broken instruments, unsuitable borehole and etc. is a major challenge to achieve it. Prediction of the density and resistivity logs (Rt, DT and LLS from the conventional wire-line logs in one of the Iranian southwest oil fields is the main purpose of this study. Multilayer neural network was applied to develop an intelligent predictive model for prediction of the logs. A total of 3000 data sets from 3 wells (A, B and C of the studied field were used. Among them, the data of A, B and C wells were used to constructing and testing the model, respectively. To evaluate the performance of the model, the mean square error (MSE and correlation coefficient (R2 in the test data were calculated. A comparison between the MSE of the proposed model and recently intelligent models shows that the proposed model is more accurate than others. Acceptable accuracy and using conventional well logging data are the highlight advantages of the proposed intelligent model.

  5. Chiral gravity, log gravity, and extremal CFT

    Maloney, Alexander; Song Wei; Strominger, Andrew


    We show that the linearization of all exact solutions of classical chiral gravity around the AdS 3 vacuum have positive energy. Nonchiral and negative-energy solutions of the linearized equations are infrared divergent at second order, and so are removed from the spectrum. In other words, chirality is confined and the equations of motion have linearization instabilities. We prove that the only stationary, axially symmetric solutions of chiral gravity are BTZ black holes, which have positive energy. It is further shown that classical log gravity--the theory with logarithmically relaxed boundary conditions--has finite asymptotic symmetry generators but is not chiral and hence may be dual at the quantum level to a logarithmic conformal field theories (CFT). Moreover we show that log gravity contains chiral gravity within it as a decoupled charge superselection sector. We formally evaluate the Euclidean sum over geometries of chiral gravity and show that it gives precisely the holomorphic extremal CFT partition function. The modular invariance and integrality of the expansion coefficients of this partition function are consistent with the existence of an exact quantum theory of chiral gravity. We argue that the problem of quantizing chiral gravity is the holographic dual of the problem of constructing an extremal CFT, while quantizing log gravity is dual to the problem of constructing a logarithmic extremal CFT.

  6. Gerencia logística y global

    Pablo Cesar Ocampo Vélez


    Full Text Available La logística es una filosofía que se encarga de aplicar las buenas pá¡cticas en los macroprocesos, procesos, procedimientos, tareas y productos dentro de una organización, con el fin de satisfacer las necesidades del cliente, quien es la razón de ser de la empresa. Existen entes internacionales que velan porque las compañias en todo el mundo utilicen y difundan las diferentes disciplinas logísticas en toda la red de valor y tengan un mismo enfoque estratégico.El objetivo de este artículo es explicar la existencia de procesos y macroprocesos de clase mundial en la logística, gracias a los cuales hay una gran oportunidad de mejora para los empresarios colombianos, con el fin de reestructurar los procesos estratégicos, tácticos y operacionales de cada Unidad de Negocio, para que sean organizaciones más competitivas, que puedan enfrentar los tratados de libre comercio, brindando mayor sostenibilidad y óptimo nivel de servicio.

  7. A history of nuclear well logging in the oil industry

    Tittle, C.W.


    Spurred by an interest in logging through steel casing γ-ray logging began in the late 1930s followed soon by neutron logging for porosity. These were the first two nuclear well logs. Gamma-gamma density logging was developed during the 1950s. Pulsed neutron lifetime logging appeared in the 1960s; the slim tools came in the early 1970s. Developments since then have included dual detector devices of several types which offered improved measurements or interpretation, γ-ray spectrometry logging (natural and neutron-induced) which identifies certain chemical elements, induced radioactivity logging, and the photoelectric absorption log, which, combined with the density log in a single tool, is known as litho-density logging. A combination of several γ-ray spectrometers in one tool, designed to determine 10 formation elements, was recently introduced, and a new neutron porosity tool measuring epithermal neutron die-away time has been developed. Digital transmission of logging data was a step forward in about 1975. Also, log interpretation techniques have greatly expanded since the advent of digital computers, and the microcomputer has had a distinct impact. It is now practical and economical to do iterative analysis on a suite of logs to obtain an optimum overall interpretation. (author)

  8. Entry, Descent, and Landing With Propulsive Deceleration

    Palaszewski, Bryan


    The future exploration of the Solar System will require innovations in transportation and the use of entry, descent, and landing (EDL) systems at many planetary landing sites. The cost of space missions has always been prohibitive, and using the natural planetary and planet s moons atmospheres for entry, descent, and landing can reduce the cost, mass, and complexity of these missions. This paper will describe some of the EDL ideas for planetary entry and survey the overall technologies for EDL that may be attractive for future Solar System missions.

  9. Technical Area 55 Entry Control System (ECS)

    Beaumont, A.; Brundige, E.; DesJardin, R.; Rivera, R.


    The exchange badge system which was used at the Plutonium Facility located in Technical Area 55 was replaced on a trial basis with an automated Entry Control System. As a result of the success of the trial system, a new system incorporating expanded features and increased reliability is being implemented. The new Entry Control System incorporates several features not previously available in relatively inexpensive entry systems. The reliability of the system is enhanced by redundant microprocessors incorporating bubble memory for nonvolatile storage of the system data base. The badge readers incorporate dual communication lines to two different controllers to further increase the total system reliability

  10. Physical security workshop summary: entry control

    Eaton, M.J.


    Entry control hardware has been used extensively in the past to assist security forces in separating the authorized from the unauthorized at the plant perimeter. As more attention is being focused on the insider threat, these entry control elements are being used to extend the security inspectors' presence into the plant by compartmentalizing access and monitoring vital components. This paper summarizes the experiences expressed by the participants at the March 16 to 19, 1982 INMM Physical Protection Workshop in utilizing access control and contraband detection hardware for plant wide entry control applications

  11. Unification of acoustic drillhole logging data

    Oehman, I.; Palmen, J.; Heikkinen, E.


    Posiva Oy prepares for disposal of spent nuclear fuel in bedrock in Olkiluoto, Eurajoki. This is in accordance of the application filed in 1999, the Decision-in-Principle of the State Council in 2000, and ratification by the Parliament in 2001. The site characterization at Olkiluoto has included comprehensive geological, hydrological, geochemical and geophysical investigations airborne, on ground and in drillholes since 1988. One of key techniques in geophysical drillhole surveys has been acoustic full waveform logging, which has been implemented since 1994. Various tools have been used in acquisition of acoustic data and several processing techniques have been applied. The logging work and processing to P and S wave velocities has been previously carried out on single drillhole basis. Comparisons to actual values and levels have not been made, and the results have not been calibrated. Therefore results for different drillholes have not been comparable. Resolution of the P and S wave velocity has been rather coarse, and depth correlation to the core data has been on tentative level. As the investigation data has been accumulating, it has become possible to correlate the results to geological and laboratory control data and to calibrate the results of separate measurement campaigns and different drillholes together onto same reference level and resolution. The presented technique has been applied for drillhole OL-KR29 onwards and has set the processing standard, settings and reference levels for later surveys. This approach will further assist the application of the method for mapping and numerical description of lithology variation and possible effect of alteration and deformation on it. Further on, the P and S wave velocity data together with density can be used in computing of dynamic in situ rock mechanical parameters, and possibly in correlating rock strength laboratory data to P and S wave velocity logging data. The acoustic logging data from drillholes OL-KR1

  12. Texting while driving: is speech-based text entry less risky than handheld text entry?

    He, J; Chaparro, A; Nguyen, B; Burge, R J; Crandall, J; Chaparro, B; Ni, R; Cao, S


    Research indicates that using a cell phone to talk or text while maneuvering a vehicle impairs driving performance. However, few published studies directly compare the distracting effects of texting using a hands-free (i.e., speech-based interface) versus handheld cell phone, which is an important issue for legislation, automotive interface design and driving safety training. This study compared the effect of speech-based versus handheld text entries on simulated driving performance by asking participants to perform a car following task while controlling the duration of a secondary text-entry task. Results showed that both speech-based and handheld text entries impaired driving performance relative to the drive-only condition by causing more variation in speed and lane position. Handheld text entry also increased the brake response time and increased variation in headway distance. Text entry using a speech-based cell phone was less detrimental to driving performance than handheld text entry. Nevertheless, the speech-based text entry task still significantly impaired driving compared to the drive-only condition. These results suggest that speech-based text entry disrupts driving, but reduces the level of performance interference compared to text entry with a handheld device. In addition, the difference in the distraction effect caused by speech-based and handheld text entry is not simply due to the difference in task duration. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. Entry Mode and Performance of Nordic Firms

    Wulff, Jesper


    including the proposed moderating effect, on average, yield higher post-entry performance. This study sheds light on inconsistent results found in previous research investigating the impact of international experience and has practical implications for managerial decision-making.......This study investigates whether the relationship between mode of international market entry and non-location bound international experience is weaker for firms that are large or have a high foreign to total sales ratio, labeled multinational experience. Empirical evidence based on 250 foreign...... market entries made by Norwegian, Danish and Swedish firms suggests that the association between equity mode choice and non-location bound international experience diminishes in the presence of higher levels of multinational experience. Furthermore, firms whose entry mode choice is predicted by the model...

  14. Border Crossing/Entry Data - Boarder Crossing

    Department of Transportation — Border Crossing/Entry Data provides summary statistics for incoming crossings at the U.S.-Canadian and the U.S.-Mexican border at the port level. Data are available...

  15. Market entry strategies into the BRIC countries

    Boyd, Britta; Dyhr Ulrich, Anna Marie


    Based on a sample of 177 exporting SMEs, this study investigates what market entry strategy is used by Danish family and non-family businesses. From a resource-based view, three critical internal factors (risk, flexibility and control) affecting the entry mode choice into the BRIC markets...... are analysed. The effective management of firms’ resources and capabilities is influenced by the perception of these internal factors when expanding into foreign markets. Our results confirmed that family firms build up longer lasting relationships in the host country by choosing high commitment entry modes...... when entering the BRIC markets. In contrast, family firms choose high commitment entry modes which involve high risk and low flexibility when entering the BRIC markets. Further implications discuss the suitability of export strategies to BRIC markets for managers of Danish family and non-family firms....

  16. Energy Information Data Base: corporate author entries


    One of the controls for information entered into the data bases created and maintained by the DOE Technical Information Center is the standardized name for the corporate entity or the corporate author. The purpose of Energy Information Data Base: Corporate Author Entries (TID-4585-R1) and this supplemental list of authorized or standardized corporate entries is to provide a means for the consistent citing of the names of organizations in bibliographic records. In general, an entry in Corporate Author Entries consists of the seven-digit code number assigned to the particular corporate entity, the two-letter country code, the largest element of the corporate name, the location of the corporate entity, and the smallest element of the corporate name (if provided). This supplement [DOE/TIC-4585-R1(Suppl.5)] contains additions to the base document (TID-4585-R1) and is intended to be used with that publication

  17. Tactile Data Entry System, Phase II

    National Aeronautics and Space Administration — Building on our successful Phase I Tactile Data Entry program, Barron Associates proposes development of a Glove-Enabled Computer Operations (GECO) system to permit...

  18. "Exclusive Dealing Contract and Inefficient Entry Threat"

    Noriyuki Yanagawa; Ryoko Oki


    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  19. Entry and exit decisions under uncertainty

    Kongsted, Hans Christian


    This paper establishes the general deterministic limit that corresponds to Dixit's model of entry and exit decisions under uncertainty. The interlinked nature of decisions is shown to be essential also in the deterministic limit. A numerical example illustrates the result......This paper establishes the general deterministic limit that corresponds to Dixit's model of entry and exit decisions under uncertainty. The interlinked nature of decisions is shown to be essential also in the deterministic limit. A numerical example illustrates the result...

  20. Generalized localization for the double trigonometric Fourier series and the Walsh-Fourier series of functions in L log +L log + log +L

    Bloshanskaya, S K; Bloshanskii, I L; Roslova, T Y


    For an arbitrary open set Ω subset of I 2 =[0,1) 2 and an arbitrary function f element of L log + L log + log + L(I 2 ) such that f=0 on Ω the double Fourier series of f with respect to the trigonometric system Ψ=E and the Walsh-Paley system Ψ=W is shown to converge to zero (over rectangles) almost everywhere on Ω. Thus, it is proved that generalized localization almost everywhere holds on arbitrary open subsets of the square I 2 for the double trigonometric Fourier series and the Walsh-Fourier series of functions in the class L log + L log + log + L (in the case of summation over rectangles). It is also established that such localization breaks down on arbitrary sets that are not dense in I 2 , in the classes Φ Ψ (L)(I 2 ) for the orthonormal system Ψ=E and an arbitrary function such that Φ E (u)=o(u log + log + u) as u→∞ or for Φ W (u)=u( log + log + u) 1-ε , 0<ε<1

  1. Simpler ISS Flight Control Communications and Log Keeping via Social Tools and Techniques

    Scott, David W.; Cowart, Hugh; Stevens, Dan


    The heart of flight operations control involves a) communicating effectively in real time with other controllers in the room and/or in remote locations and b) tracking significant events, decisions, and rationale to support the next set of decisions, provide a thorough shift handover, and troubleshoot/improve operations. International Space Station (ISS) flight controllers speak with each other via multiple voice circuits or loops, each with a particular purpose and constituency. Controllers monitor and/or respond to several loops concurrently. The primary tracking tools are console logs, typically kept by a single operator and not visible to others in real-time. Information from telemetry, commanding, and planning systems also plays into decision-making. Email is very secondary/tertiary due to timing and archival considerations. Voice communications and log entries supporting ISS operations have increased by orders of magnitude because the number of control centers, flight crew, and payload operations have grown. This paper explores three developmental ground system concepts under development at Johnson Space Center s (JSC) Mission Control Center Houston (MCC-H) and Marshall Space Flight Center s (MSFC) Payload Operations Integration Center (POIC). These concepts could reduce ISS control center voice traffic and console logging yet increase the efficiency and effectiveness of both. The goal of this paper is to kindle further discussion, exploration, and tool development.

  2. Permeability log using new lifetime measurements

    Dowling, D.J.; Boyd, J.F.; Fuchs, J.A.


    Comparative measurements of thermal neutron decay time are obtained for a formation after irradiation with a pulsed neutron source. Chloride ions in formation fluids are concentrated by the electrosmosis effect using charged poles on a well logging sonde. The formation is irradiated with fast neutrons and a first comparative measure of the thermal neutron decay time or neutron lifetime is taken. The chloride ions are then dispersed by acoustic pumping with a magnetostrictive transducer. The formation is then again irradiated with fast neutrons and a comparative measure of neutron lifetime is taken. The comparison is a function of the variation in chloride concentration between the two measurements which is related to formation permeability

  3. Pulsed neutron source well logging system

    Dillingham, M.E.


    A pulsed neutron source arrangement is provided in which a sealed cylindrical chamber encloses a rotatable rotor member carrying a plurality of elongated target strips of material which emits neutrons when bombarded with alpha particles emitted by the plurality of source material strips. The rotor may be locked in a so-called ON position by an electromagnetic clutch drive mechanism controllable from the earth's surface so as to permit the making of various types of logs utilizing a continuously emitting neutron source. (Patent Office Record)

  4. On conditional independence and log-convexity

    Matúš, František


    Roč. 48, č. 4 (2012), s. 1137-1147 ISSN 0246-0203 R&D Projects: GA AV ČR IAA100750603; GA ČR GA201/08/0539 Institutional support: RVO:67985556 Keywords : Conditional independence * Markov properties * factorizable distributions * graphical Markov models * log-convexity * Gibbs- Markov equivalence * Markov fields * Gaussian distributions * positive definite matrices * covariance selection model Subject RIV: BA - General Mathematics Impact factor: 0.933, year: 2012

  5. New radio meteor detecting and logging software

    Kaufmann, Wolfgang


    A new piece of software ``Meteor Logger'' for the radio observation of meteors is described. It analyses an incoming audio stream in the frequency domain to detect a radio meteor signal on the basis of its signature, instead of applying an amplitude threshold. For that reason the distribution of the three frequencies with the highest spectral power are considered over the time (3f method). An auto notch algorithm is developed to prevent the radio meteor signal detection from being jammed by a present interference line. The results of an exemplary logging session are discussed.

  6. Zope based electronic operation log system - Zlog

    Yoshii, K.; Satoh, Y.; Kitabayashi, T.


    Since January 2004, the Zope based electronic operation logging system, named Zlog, has been running at the KEKB and AR accelerator facilities. Since Zope is the python based open source web application server software and python language is familiar for the members in the KEKB accelerator control group, we have developed the Zlog system rapidly. In this paper, we report the development history and the present status of Zlog system. Also we show some general plug-in components, called Zope products, have been useful for our Zlog development. (author)

  7. Nipah virus entry can occur by macropinocytosis

    Pernet, Olivier; Pohl, Christine; Ainouze, Michelle; Kweder, Hasan; Buckland, Robin


    Nipah virus (NiV) is a zoonotic biosafety level 4 paramyxovirus that emerged recently in Asia with high mortality in man. NiV is a member, with Hendra virus (HeV), of the Henipavirus genus in the Paramyxoviridae family. Although NiV entry, like that of other paramyxoviruses, is believed to occur via pH-independent fusion with the host cell's plasma membrane we present evidence that entry can occur by an endocytic pathway. The NiV receptor ephrinB2 has receptor kinase activity and we find that ephrinB2's cytoplasmic domain is required for entry but is dispensable for post-entry viral spread. The mutation of a single tyrosine residue (Y304F) in ephrinB2's cytoplasmic tail abrogates NiV entry. Moreover, our results show that NiV entry is inhibited by constructions and drugs specific for the endocytic pathway of macropinocytosis. Our findings could potentially permit the rapid development of novel low-cost antiviral treatments not only for NiV but also HeV.

  8. Models of radon entry: A review

    Gadgil, A.J.


    This paper reviews existing models of radon entry into houses. The primary mechanism of radon entry in houses with high indoor concentrations is, in most cases, convective entry of radon bearing soil-gas from the surrounding soil. The driving force for this convective entry is the small indoor-outdoor pressure difference arising from the stack effect and other causes. Entry points for the soil-gas generally are the cracks or gaps in the building substructure, or though other parts of the building shell in direct contact with the soil, although entry may also occur by flow though permeable concrete or cinder block walls of the substructure. Models using analytical solutions to idealized geometrical configurations with simplified boundary conditions obtain analytical tractability of equations to be solved at the cost of severe approximations; their strength is in the insights they offer with their solutions. Models based on lumped parameters attempt to characterize the significant physical behavioral characteristics of the soil-gas and radon flow. When realistic approximations are desired for the boundary conditions and terms in the governing equations, numerical models must be used; these are usually based on finite difference or finite element solutions to the governing equations. Limited data are now available for experimental verification of model predictions. The models are briefly reviewed and their strengths and limitations are discussed

  9. Well logging. Acquisition and applications; Diagraphies. Acquisition et applications

    Serra, O.; Serra, L.


    This reference book on wire-line and LWD well logging covers all geophysical methods of underground survey in a synthetic, visual and dynamical way. It treats of: the physical principle of well logging measurements, the different types of existing probes, the factors that can influence the measurements, and the applications of these measurements. The following well-logging methods are reviewed: resistivity; electromagnetic wave propagation; magnetic susceptibility and magnetic field; spontaneous potential; nuclear logging: natural gamma radioactivity, density logging, photoelectric index, neutron emission probes, hydrogen index or neutron porosity, neutron induced gamma spectroscopy, neutron relaxation time, NMR; acoustic measurements: sonic logging, seismic profiles; texture, structure and stratigraphy data acquisition; borehole diameter measurement; temperature measurement; wire sampling methods; place and role of well-logging in petroleum exploration; well-logging programs. (J.S.)

  10. Shiitake mushroom production on small diameter oak logs in Ohio

    S.M. Bratkovich


    Yields of different strains of shiitake mushrooms (Lentinus edodes) were evaluated when produced on small diameter oak logs in Ohio. Logs averaging between 3-4 inches in diameter were inoculated with four spawn strains in 1985.

  11. Log and tree sawing times for hardwood mills

    Everette D. Rast


    Data on 6,850 logs and 1,181 trees were analyzed to predict sawing times. For both logs and trees, regression equations were derived that express (in minutes) sawing time per log or tree and per Mbf. For trees, merchantable height is expressed in number of logs as well as in feet. One of the major uses for the tables of average sawing times is as a bench mark against...

  12. Expert Opinion to Identify High-Risk Entry Routes of Canine Rabies into Papua New Guinea.

    Brookes, V J; Ward, M P


    The proximity of Papua New Guinea (PNG) to canine rabies-endemic countries in South-East Asia presents a risk of incursion of this disease into PNG and the rest of the Oceanic region. The objective of this study was to identify the highest risk routes for entry of dogs - associated with movement of people - into PNG from canine rabies-endemic countries. A structured, in-country expert-elicitation workshop was used, and 20 entry routes were identified. The highest risk routes were three land routes from Papua, Indonesia (hunters, traditional border crossers and unregulated, unchecked 'shopper-crossers') and two sea routes (fishing and logging). These results will be used to direct more detailed risk assessments to develop surveillance strategies and incursion response plans. © 2016 Blackwell Verlag GmbH.

  13. Log-Log Convexity of Type-Token Growth in Zipf's Systems

    Font-Clos, Francesc; Corral, Álvaro


    It is traditionally assumed that Zipf's law implies the power-law growth of the number of different elements with the total number of elements in a system—the so-called Heaps' law. We show that a careful definition of Zipf's law leads to the violation of Heaps' law in random systems, with growth curves that have a convex shape in log-log scale. These curves fulfill universal data collapse that only depends on the value of Zipf's exponent. We observe that real books behave very much in the same way as random systems, despite the presence of burstiness in word occurrence. We advance an explanation for this unexpected correspondence.

  14. Data Cleaning Methods for Client and Proxy Logs

    Weinreich, H.; Obendorf, H.; Herder, E.; Edmonds, A.; Hawkey, K.; Kellar, M.; Turnbull, D.


    In this paper we present our experiences with the cleaning of Web client and proxy usage logs, based on a long-term browsing study with 25 participants. A detailed clickstream log, recorded using a Web intermediary, was combined with a second log of user interface actions, which was captured by a

  15. Sediment transport and soil disturbance after postfire logging.

    James D. McIver


    Recently there has been considerable debate on the practice of postfire logging, in which burned forests are entered soon after fire to recover commercially valuable trees. Proponents of the practice argue that postfire logging is part of a 'restoration package' that can be used to control erosion (e.g., contour logging) and can help to mitigate costs of...

  16. Why, What, and How to Log? Lessons from LISTEN

    Mostow, Jack; Beck, Joseph E.


    The ability to log tutorial interactions in comprehensive, longitudinal, fine-grained detail offers great potential for educational data mining--but what data is logged, and how, can facilitate or impede the realization of that potential. We propose guidelines gleaned over 15 years of logging, exploring, and analyzing millions of events from…

  17. Economic incentives exist to support measures to reduce illegal logging

    J.A. Turner; J. Buongiorno; A. Katz; S. Zhu; R. Li


    Three studies of the global economic implications of eliminating illegal logging are summarized. Processors of illegally sourced wood would lose from the elimination of illegal logging through high prices for logs and decreased production of wood products. Associated with these changes could be losses in employment and income. Beyond these losses to the processing...

  18. A survey of animal-powered logging in Alabama

    Christopher W. Toms; Mark R. Dubois; John C. Bliss; John H. Wilhoit; Robert B. Rummer


    In a state with a very large, highly mechanized timber harvesting industry, animal-powered logging still occupies a niche in Alabama as a small-scale harvesting alternative. This article summarizes the results from a study that examined the extent of animal logging in Alabama. We investigated this topic by asking who is logging with animals, where are they working,...

  19. Interactive machine learning for postprocessing CT images of hardwood logs

    Erol Sarigul; A. Lynn Abbott; Daniel L. Schmoldt


    This paper concerns the nondestructive evaluation of hardwood logs through the analysis of computed tomography (CT) images. Several studies have shown that the commercial value of resulting boards can be increased substantially if log sawing strategies are chosen using prior knowledge of internal log defects. Although CT imaging offers a potential means of obtaining...

  20. Financial and Economic Analysis of Reduced Impact Logging

    Tom Holmes


    Concern regarding extensive damage to tropical forests resulting from logging increased dramatically after World War II when mechanized logging systems developed in industrialized countries were deployed in the tropics. As a consequence, tropical foresters began developing logging procedures that were more environmentally benign, and by the 1990s, these practices began...

  1. Environmental effects of postfire logging: literature review and annotated bibliography.

    James D. McIver; Lynn Starr


    The scientific literature on logging after wildfire is reviewed, with a focus on environmental effects of logging and removal of large woody structure. Rehabilitation, the practice of planting or seeding after logging, is not reviewed here. Several publications are cited that can be described as “commentaries,” intended to help frame the public debate. We review 21...

  2. Utilization and cost of log production from animal loging operations

    Suraj P. Shrestha; Bobby L. Lanford; Robert B. Rummer; Mark Dubois


    Forest harvesting with animals is a labor-intensive operation. It is expensive to use machines on smaller woodlots, which require frequent moves if mechanically logged. So, small logging systems using animals may be more cost effective. In this study, work sampling was used for five animal logging operations in Alabama to measure productive and non-productive time...

  3. Development of regional stump-to-mill logging cost estimators

    Chris B. LeDoux; John E. Baumgras


    Planning logging operations requires estimating the logging costs for the sale or tract being harvested. Decisions need to be made on equipment selection and its application to terrain. In this paper a methodology is described that has been developed and implemented to solve the problem of accurately estimating logging costs by region. The methodology blends field time...

  4. Ultrafast CT scanning of an oak log for internal defects

    Francis G. Wagner; Fred W. Taylor; Douglas S. Ladd; Charles W. McMillin; Fredrick L. Roder


    Detecting internal defects in sawlogs and veneer logs with computerized tomographic (CT) scanning is possible, but has been impractical due to the long scanning time required. This research investigated a new scanner able to acquire 34 cross-sectional log scans per second. This scanning rate translates to a linear log feed rate of 85 feet (25.91 m) per minute at one...

  5. Technology development for high temperature logging tools

    Veneruso, A.F.; Coquat, J.A.


    A set of prototype, high temperature logging tools (temperature, pressure and flow) were tested successfully to temperatures up to 275/sup 0/C in a Union geothermal well during November 1978 as part of the Geothermal Logging Instrumentation Development Program. This program is being conducted by Sandia Laboratories for the Department of Energy's Division of Geothermal Energy. The progress and plans of this industry based program to develop and apply the high temperature instrumentation technology needed to make reliable geothermal borehole measurements are described. Specifically, this program is upgrading existing sondes for improved high temperature performance, as well as applying new materials (elastomers, polymers, metals and ceramics) and developing component technology such as high temperature cables, cableheads and electronics to make borehole measurements such as formation temperature, flow rate, high resolution pressure and fracture mapping. In order to satisfy critical existing needs, the near term goal is for operation up to 275/sup 0/C and 7000 psi by the end of FY80. The long term goal is for operation up to 350/sup 0/C and 20,000 psi by the end of FY84.

  6. Public PCs: Log Out or Lose Out

    Computer Security Team


    Do you regularly use one of the public Windows or Linux terminals in the CERN library or in front of the Users' Office? Or do you often give presentations or run meetings, workshops or conferences? Did you recently attend a training session in the CERN Training Centre? If you answered at least once with “yes”, we have a plea for you: LOG OUT when done in order to protect your data!   You might recall that CERN considers that “Your Privacy is Paramount”. But this does not come for free. In the few past months, we have received several reports from vigilant people who have spotted open user sessions on public PCs at CERN. Those users simply forgot to log out once their work, training or meeting was over. Their session continued without them being present. Worse, with CERN using a central Single Sign-On (SSO) portal, their login credentials would allow a malicious person at CERN to use those credentials to access that user’s mailbox, DFS ...

  7. Dual excitation acoustic paramagnetic logging tool

    Vail, III, William B. (Bothell, WA)


    New methods and apparatus are disclosed which allow measurement of the presence of oil and water in gelogical formations using a new physical effect called the Acoustic Paramagnetic Logging Effect (APLE). The presence of petroleum in formation causes a slight increase in the earth's magnetic field in the vicinity of the reservoir. This is the phenomena of paramagnetism. Application of an acoustic source to a geological formation at the Larmor frequency of the nucleous present causes the paramagnetism of the formation to disappear. This results in a decrease in the earth's magnetic field in the vicinity of the oil bearing formation. Repetitively frequency sweeping the acoustic source through the Larmor frequency of the nucleons present (approx. 2 kHz) causes an amplitude modulation of the earth's magnetic field which is a consequence of the APLE. The amplitude modulation of the earth's magnetic field is measured with an induction coil gradiometer and provides a direct measure of the amount of oil and water in the excitation zone of the formation. The phase of the signal is used to infer the longitudinal relaxation times of the fluids present, which results in the ability in general to separate oil and water and to measure the viscosity of the oil present. Such measurements may be preformed in open boreholes and in cased well bores. The Dual Excitation Acoustic Paramagnetic Logging Tool employing two acoustic sources is also described.

  8. Radiation incident in oil well logging

    Lozada, J.A.


    On June 4th 1997 equipment failure and violation of approved procedures by a crew of workers initiated a series of events that resulted in the unnecessary exposure to neutron and gamma radiation, from a 666 GBq Am 241 Be source, of forty two workers from a well logging company in Venezuela. Due to the presence of dry mud or drilling fluids inside the logging tool, the nosepiece was screwed off the rest of the source holder; this piece was mistaken for the entire source holder thus leaving the source inside the tool. The tool was labelled for maintenance and electronic laboratory personal worked near the source for seven hours before they identify its presence. As soon as the incident was detected a contingency plan was implemented and the source could be retrieved from the tool and placed in its shipping container. The TLD badges indicate doses well below the annual limit of 20 mSv, and none of the workers involved in the incident seem to show serious health consequences from it. After the incident, in order to avoid the occurrence of similar situations, a better source and tool maintenance program was implemented, all the workers were re-trained, and area monitors were installed in all operations bases. (author)

  9. Medical student satisfaction, coping and burnout in direct-entry versus graduate-entry programmes.

    DeWitt, Dawn; Canny, Benedict J; Nitzberg, Michael; Choudri, Jennifer; Porter, Sarah


    There is ongoing debate regarding the optimal length of medical training, with concern about the cost of prolonged training. Two simultaneous tracks currently exist in Australia: direct entry from high school and graduate entry for students with a bachelor degree. Medical schools are switching to graduate entry based on maturity, academic preparedness and career-choice surety. We tested the assumption that graduate entry is better by exploring student preferences, coping, burnout, empathy and alcohol use. From a potential pool of 2188 participants, enrolled at five Australian medical schools, a convenience sample of 688 (31%) first and second year students completed a survey in the middle of the academic year. Participants answered questions about demographics, satisfaction and coping and completed three validated instruments. Over 90% of students preferred their own entry-type, though more graduate-entry students were satisfied with their programme (82.4% versus 65.3%, p students in self-reported coping or in the proportion of students meeting criteria for burnout (50.7% versus 51.2%). Direct-entry students rated significantly higher for empathy (concern, p = 0.022; personal distress, p = 0.031). Graduate-entry students reported significantly more alcohol use and hazardous drinking (30.0% versus 22.8%; p = 0.017). Our multi-institution data confirm that students are generally satisfied with their choice of entry pathway and do not confirm significant psychosocial benefits of graduate entry. Overall, our data suggest that direct-entry students cope with the workload and psychosocial challenges of medical school, in the first 2 years, as well as graduate-entry students. Burnout and alcohol use should be addressed in both pathways. Despite studies showing similar academic outcomes, and higher total costs, more programmes in Australia are becoming graduate entry. Further research on non-cognitive issues and outcomes is needed so that universities, government

  10. Rill erosion in burned and salvage logged western montane forests: Effects of logging equipment type, traffic level, and slash treatment

    J. W. Wagenbrenner; P. R. Robichaud; R. E. Brown


    Following wildfires, forest managers often consider salvage logging burned trees to recover monetary value of timber, reduce fuel loads, or to meet other objectives. Relatively little is known about the cumulative hydrologic effects of wildfire and subsequent timber harvest using logging equipment. We used controlled rill experiments in logged and unlogged (control)...

  11. Use of pulsed neutron logging to evaluate perforation washing

    Dimon, C.A.


    This invention relates to the use of pulsed neutron logging techniques before and after perforation washing operations are performed to evaluate the degree of success of the perforation washing operations. Well logging operations of a type designed to respond to the difference between a formation immediately behind the well sheath and voids in the formation are performed both before and after the perforation washing operation. differences between the two resulting logs are then indicative of voids created by perforation washing. In a preferred embodiment, pulsed neutron logging is used as the logging technique, while a weighted brine having a high absorption cross section to pulsed neutrons is used as the perforation washing fluid

  12. Study of the reservoirs of Jurassic and Cretaceous periods in the south-cast slope of Central Kara-Kum vault using combination of acoustic logging, neutron-gamma logging, gamma logging, and electrical logging

    Meredov, T.M.; Baranov, M.I.


    Considered is the possibility of application of the combination of neutron-gamma logging, gamma logging al partitioncoustic logging and electrical logging to lithologica of sections, discovery reservoir layers in carbonate and terrigeneous sections as well as quantitative estimation of the porosity coefficients values at prospecting areas in the south-east slope of Central Kara-Kum vault. Neutron-gamma logging mostly makes it possible to partition carbonate rocks into limestones, dolomites and their interstitial variaties and to indicate sand stone layers with different degree of carbonate content

  13. 19 CFR 151.41 - Information on entry summary.


    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Information on entry summary. 151.41 Section 151... Products § 151.41 Information on entry summary. On the entry summary for petroleum or petroleum products in.... If the exact volumetric quantity cannot be determined in advance, the entry summary may be made for...

  14. KFM 01A. Q-logging

    Barton, Nick


    The first Forsmark potential repository site borehole KFM 01A provided core from 101.8 to 1000.7 m depth. This was independently Q-logged during a two-day period (19th-20th February, 2003), without access to BORMAP results or regional jointing frequencies or orientations. The Q-logging was intended to be an independent check for subsequent BORMAP-derived Q-parameter estimation. The Q-logging was accomplished using the manually-recorded 'histogram method' which allows the logger to enter Q-parameter ranges and depths directly into the appropriate histograms, which facilitates subsequent data processing using Excel spreadsheets. Successive pairs of core boxes, which contain an average of 11 meters of core in ten rows, were the source of ten opinions of each of the six Q-parameters, giving a total of 4920 recordings of Q-parameter values for the 164 core boxes. Data processing was divided into several parts, with successively increasing detail. The report therefore contains Q-histograms for the whole core, for four identified fracture(d) zones combined as if one unit, and then for the whole core minus these fracture(d) zones. This background rock mass quality is subsequently divided into nine depth zones or slices, and trends of variation with depth are tabulated. The four identified fracture(d) zones, which are actually of reasonable quality, are also analysed separately, and similarities and subtle differences are discerned between them. The overall quality of this first core is very good to excellent, with Q(mean) of 48.4, and a most frequent Q-value of 100. The range of quality is from 2.1 to 2130, which is the complete upper half of the six order of magnitude Q scale. Even the relatively fracture(d) zones, representing some 13% of the 900 m cored, have a combined Q(mean) of 13.9 and a range of quality of 2.1 to 150

  15. Examples of detection of water flow by oxygen activation on pulsed neutron logs

    de Rosset, W.H.M.


    Upward flow of water in cased wellbores may be detected with pulsed neutron capture (PNC) and gamma ray (GR) tools. Water entering tubing, casing and flowing behind pipe may similarly be evaluated qualitatively. Gamma ray background anomalies in PNC data and elevation of GR tool response occur when water is flowing above threshold velocities and volumes. The technique requires logging the well under static and flow conditions or logging at different tools speeds in a flowing well. Oxygen activation results in increased gamma ray count rates at each detector. PNC far detector and GR well log curves from each log run (flowing well, static well) are overlain. The increases for each curve are offset from the point of water entry by a distance similar to tool source-detector spacing. These offsets in gamma increase are 15-20 ft. higher for the GR than for the PNC far detector and distinguish oxygen activation due to flowing water from common hot spots. The amount of gamma ray increase is controlled by the velocity of upward flow of water past the tool, the amount of water flowing, and the distance of the flow from the tool. Prior planning is important to gain usable information in flowing wells. The upward relative velocity imposes maximal and minimal tool speeds to produce significant gamma increases, and tool speed must be adjusted to optimize gamma changes. Use of the technique to answer actual production problems is illustrated with examples. Insight was gained which led to the correction of the problem in each case

  16. Entry control system for large populations

    Merillat, P.D.


    An Entry Control System has been developed which is appropriate for use at an installation with a large population requiring access over a large area. This is accomplished by centralizing the data base management and enrollment functions and decentralizing the guard-assisted, positive personnel identification and access functions. Current information pertaining to all enrollees is maintained through user-friendly enrollment stations. These stations may be used to enroll individuals, alter their area access authorizations, change expiration dates, and other similar functions. An audit trail of data base alterations is provided to the System Manager. Decentrailized systems exist at each area to which access is controlled. The central system provides these systems with the necessary entry control information to allow them to operate microprocessor-driven entry control devices. The system is comprised of commercially available entry control components and is structured such that it will be able to incorporate improved devices as technology porogresses. Currently, access is granted to individuals who possess a valid credential, have current access authorization, can supply a memorized personal identification number, and whose physical hand dimensions match their profile obtained during enrollment. The entry control devices report misuses as security violations to a Guard Alarm Display and Assessment System

  17. Financial Performance of Entry Mode Decisions

    Boyd, Britta; Dyhr Ulrich, Anna Marie; Hollensen, Svend


    Based on a survey of 170 Danish SMEs the paper examines influences on entry mode choices and the financial outcome of these decisions. The main research objectives are divided into two steps: Step 1: To determine the factors influencing the choice of foreign entry modes by Danish companies. Step ...... and implications are provided for companies willing to invest more into foreign markets in order to achieve a higher degree of control and better financial results.......Based on a survey of 170 Danish SMEs the paper examines influences on entry mode choices and the financial outcome of these decisions. The main research objectives are divided into two steps: Step 1: To determine the factors influencing the choice of foreign entry modes by Danish companies. Step 2......: To determine the relationship between the choice of entry mode and export performance, measured in terms of financial outcome. Drawing from transaction cost theory the authors develop and test a model where different factors affect the level of control chosen by the parent company. This study contributes...

  18. Metabolic Syndrome

    Metabolic syndrome is a group of conditions that put you at risk for heart disease and diabetes. These conditions ... agree on the definition or cause of metabolic syndrome. The cause might be insulin resistance. Insulin is ...

  19. Atmospheric Entry Studies for Venus Missions: 45 Sphere-Cone Rigid Aeroshells and Ballistic Entries

    Prabhu, Dinesh K.; Spilker, Thomas R.; Allen, Gary A., Jr.; Hwang, Helen H.; Cappuccio, Gelsomina; Moses, Robert W.


    The present study considers direct ballistic entries into the atmosphere of Venus using a 45deg sphere-cone rigid aeroshell, a legacy shape that has been used successfully in the past in the Pioneer Venus Multiprobe Mission. For a number of entry mass and heatshield diameter combinations (i.e., various ballistic coefficients) and entry velocities, the trajectory space in terms of entry flight path angles between skip out and -30deg is explored with a 3DoF trajectory code, TRAJ. From these trajectories, the viable entry flight path angle space is determined through the use of mechanical and thermal performance limits on the thermal protection material and science payload; the thermal protection material of choice is entry-grade carbon phenolic, for which a material thermal response model is available. For mechanical performance, a 200 g limit is placed on the peak deceleration load experienced by the science instruments, and 10 bar is assumed as the pressure limit for entry-grade carbon-phenolic material. For thermal performance, inflection points in the total heat load distribution are used as cut off criteria. Analysis of the results shows the existence of a range of critical ballistic coefficients beyond which the steepest possible entries are determined by the pressure limit of the material rather than the deceleration load limit.

  20. Method and apparatus for logging inclined earth boreholes

    Youmans, A.H.


    An improved technique is provided for comparing the velocity of an elongated well logging instrument traversing an inclined earth borehole with the playout velocity of the well logging cable at the earth's surface to control both the cable hoist drum rotation and the rate of movement of the subsurface instrument and thus insure cable playout is in equilibrium with the logging instrument movement. Method and apparatus are described for detecting any reduction in movement of the logging instrument through the borehole and for reducing the velocity of the logging cable playout in response thereto by reducing drum rotation. Further, when the velocity of cable playout slows to a preselected value, a monitoring circuit generates control signals which actuate a means of power attached to or integral with the logging instrument which, upon initiation, apply a force to move the logging instrument upward or downward within the borehole

  1. DOE-Grand Junction logging model data synopsis

    Mathews, M.A.; Koizumi, C.J.; Evans, H.B.


    This synopsis provides the available data concerning the logging models at the DoE-Grand Junction facility, to date (1976). Because gamma-ray logs are used in uranium exploration to estimate the grade (percent U 3 O 8 ) and the thickness of uranium ore zones in exploration drill holes, logging models are required to calibrate the gamma-ray logging equipment in order to obtain accuracy, uniformity, standardization, and repeatability during logging. This quality control is essential for accurate ore reserve calculations and for estimates of ore potential. The logging models at the DoE-Grand Junction facility are available for use by private industry in calibrating their gamma-ray logging equipment. 21 figures, 26 tables

  2. Applicability estimation of flowmeter logging for detecting hydraulic pass

    Miyakawa, Kimio; Tanaka, Yasuji; Tanaka, Kazuhiro


    Estimation of the hydraulic pass governing hydrogeological structure contributes significantly to the siting HLW repository. Flowmeter logging can detect hydraulic passes by measuring vertical flow velocity of groundwater in the borehole. We reviewed application of this logging in situ. The hydraulic pass was detected with combination of ambient flow logging, with pumping and/or injecting induced flow logging. This application showed that the flowmeter logging detected hydraulic passes conveniently and accurately compared with other hydraulic tests. Hydraulic conductivity by using flowmeter logging was assessed above 10 -6 m/sec and within one order from comparison with injection packer tests. We suggest that appropriate application of the flowmeter logging for the siting is conducted before hydraulic tests because test sections and monitoring sections are decided rationally for procurement of quantitative hydraulic data. (author)

  3. Acoustic--nuclear permeability logging system

    Dowling, D.J.; Arnold, D.M.


    A down hole logging tool featuring a neutron generator, an acoustic disturbance generator, and a radiation detection system is described. An array of acoustic magnetostriction transducers is arranged about the target of a neutron accelerator. Two gamma ray sensors are separated from the accelerator target by shielding. According to the method of the invention, the underground fluid at the level of a formation is bombarded by neutrons which react with oxygen in the fluid to produce unstable nitrogen 16 particles according to the reaction 16 O(n,p) 16 N. Acoustic pulses are communicated to the fluid, and are incident on the boundary of the borehole at the formation. The resulting net flow of fluid across the boundary is determined from radiation detection measurements of the decaying 16 N particles in the fluid. A measure of the permeability of the formation is obtained from the determination of net fluid flow across the boundary

  4. Logging-while-drilling (LWD) pressure test

    Thirud, Aase P.


    Statoil and Halliburton have completed a successful test of a new ground-breaking formation evaluation technology on the Norwegian shelf. An LWD formation tester, the GeoTapTM sensor, was used to quantify formation pressure during drilling operations. The inaugural job was completed by Halliburton's Sperry-Sun product service line onboard the Bideford Dolphin at the Borg Field while drilling a horizontal production well in the Vigdis Extension development. The GeoTap tool, part of Sperry-Sun's StellarTM MWD/LWT suite, was run in combination with a complete logging-while-drilling sensor package and the Geo-Pilot rotary steerable drilling system. Repeat formation pressures were taken and successfully transmitted to surface. This is the first time this type of technology has been successfully applied on the Norwegian shelf.

  5. Neutron die-away well logging

    Jacobson, L.A.


    Neutron die-away well logging is extensively used for the location and monitoring of hydrocarbon zones in cased wells. Casing prohibits the use of conventional open-hole electrical resistivity methods. Through an appropriate interpretation of the measured capture cross-section, it is possible to determine the fractional hydrocarbon content of the rock pore volume, provided that the interstitial water is moderately saline (Σ/sub w/ greater than or equal to .035 cm -1 ). Special sealed D-T accelerator tubes and high voltage supplies have been developed for this purpose. They must fit into a 25 mm design circle and operate at 175 0 C, producing approximately 10 8 neutron/sec average in repetitive bursts. In the Schlumberger method an electronic servo-system adjusts burst and measure-gate timing to minimize statistical uncertainty regardless of die-away time

  6. Water injection profiling by nuclear logging

    Arnold, D.M.


    This invention relates to nuclear logging techniques for determining the volume flow rates and flow directions of injected water moving behind a wellbore casing. The apparatus includes a sonde equipped with a neutron source and dual radiation detectors. Oxygen in the neutron irradiated water is transmitted to 16 N and the resultant primary and Compton scattered gamma rays are detected in two energy windows by both detectors. Count rate data is analysed in terms of the windows to obtain linear flow velocities for water flow within and behind the casing. Volume flow rates are determined for upward and downward flow, and horizontal volume flow into the surrounding formation is calculated. A complete injection profile may thus be obtained. (U.K.)

  7. Simulation Control Graphical User Interface Logging Report

    Hewling, Karl B., Jr.


    One of the many tasks of my project was to revise the code of the Simulation Control Graphical User Interface (SIM GUI) to enable logging functionality to a file. I was also tasked with developing a script that directed the startup and initialization flow of the various LCS software components. This makes sure that a software component will not spin up until all the appropriate dependencies have been configured properly. Also I was able to assist hardware modelers in verifying the configuration of models after they have been upgraded to a new software version. I developed some code that analyzes the MDL files to determine if any error were generated due to the upgrade process. Another one of the projects assigned to me was supporting the End-to-End Hardware/Software Daily Tag-up meeting.

  8. Modes and orders of market entry

    Ulhøi, John Parm


    (first-mover or follower). Invention is understood as the conversion of human creativity, time and financial resources into new ideas. Innovation in turn reflects the practical and financial return on such investments. While there is little disagreement about what an innovator strategy is, imitative......This paper focuses on the initial questions of how and when to enter a market from the perspective of a firm. By entry mode is meant a firm’s strategy (innovation or imitation) for entering the market in response to environmental changes. Entry order refers to the related issue of market timing...... strategies are more ambiguous. Based on a corporate technology and innovation strategy perspective, the paper reconceptualises and extends existing modes and orders of market entry, and in particular clarifies the ambiguity associated with imitative strategies. Four distinct imitator strategies...

  9. The role of metabolism in bacterial persistence

    Stephanie M. Amato


    Full Text Available Bacterial persisters are phenotypic variants with extraordinary tolerances toward antibiotics. Persister survival has been attributed to inhibition of essential cell functions during antibiotic stress, followed by reversal of the process and resumption of growth upon removal of the antibiotic. Metabolism plays a critical role in this process, since it participates in the entry, maintenance, and exit from the persister phenotype. Here, we review the experimental evidence that demonstrates the importance of metabolism to persistence, highlight the successes and potential for targeting metabolism in the search for anti-persister therapies, and discuss the current methods and challenges to understand persister physiology.

  10. Specific features of well logging of boreholes drilled on electrical nonconducting solutions

    Ruchkin, A.F.; Fomenko, V.G.


    Methods for identification of permeable strata and determination of their porosity and oil-gas saturation using standard combination of geophysical investigations in the boreholes drilled with nonaqueous and inert drilling fluids are considered. Geophysical combination consists of the methods indications of which are independent on electrical conductivity of drilling fluids. They are all modifications of radioactivity logging (gamma logging, neutron logging, neutron-gamma logging, gamma-gamma logging, pulsed neutron logging, nuclear-magnetic logging), acoustic logging and thermal logging

  11. Form, its meaning, and dictionary entries

    Violetta Koseska-Toszewa


    It is worth stressing that distinguishing between the form and its meaning in comparing the material 6 languages belonging to three different groups of Slavic languages (as is the case in the MONDILEX Project will allow us to avoid numeorus substantiva mistakes and erroneous conclusions. Hence dictionary entries should be verified and made uniform in that respect before they are “digitalized”... Distinction between the form and its meaning in a dictionary entry is fully possible, as shown by works of Z. Saloni (2002 and A.Przepiórkowski (2008.

  12. Automated Re-Entry System using FNPEG

    Johnson, Wyatt R.; Lu, Ping; Stachowiak, Susan J.


    This paper discusses the implementation and simulated performance of the FNPEG (Fully Numerical Predictor-corrector Entry Guidance) algorithm into GNC FSW (Guidance, Navigation, and Control Flight Software) for use in an autonomous re-entry vehicle. A few modifications to FNPEG are discussed that result in computational savings -- a change to the state propagator, and a modification to cross-range lateral logic. Finally, some Monte Carlo results are presented using a representative vehicle in both a high-fidelity 6-DOF (degree-of-freedom) sim as well as in a 3-DOF sim for independent validation.

  13. Development of an Intelligent System to Synthesize Petrophysical Well Logs

    Morteza Nouri Taleghani


    Full Text Available Porosity is one of the fundamental petrophysical properties that should be evaluated for hydrocarbon bearing reservoirs. It is a vital factor in precise understanding of reservoir quality in a hydrocarbon field. Log data are exceedingly crucial information in petroleum industries, for many of hydrocarbon parameters are obtained by virtue of petrophysical data. There are three main petrophysical logging tools for the determination of porosity, namely neutron, density, and sonic well logs. Porosity can be determined by the use of each of these tools; however, a precise analysis requires a complete set of these tools. Log sets are commonly either incomplete or unreliable for many reasons (i.e. incomplete logging, measurement errors, and loss of data owing to unsuitable data storage. To overcome this drawback, in this study several intelligent systems such as fuzzy logic (FL, neural network (NN, and support vector machine are used to predict synthesized petrophysical logs including neutron, density, and sonic. To accomplish this, the petrophysical well logs data were collected from a real reservoir in one of Iran southwest oil fields. The corresponding correlation was obtained through the comparison of synthesized log values with real log values. The results showed that all intelligent systems were capable of synthesizing petrophysical well logs, but SVM had better accuracy and could be used as the most reliable method compared to the other techniques.

  14. Pulsed neutron uranium borehole logging with prompt fission neutrons

    Bivens, H.M.; Smith, G.W.; Jensen, D.H.


    The gross count natural gamma log normally used for uranium borehole logging is seriously affected by disequilibrium. Methods for the direct measurement of uranium, such as neutron logging, which are not affected by disequilibrium have been the object of considerable effort in recent years. This paper describes a logging system for uranium which uses a small accelerator to generate pulses of 14 MeV neutrons to detect and assay uranium by the measurement of prompt fission neutrons in the epithermal energy range. After an initial feasibility study, a prototype logging probe was built for field evaluation which began in January 1976. Physical and operational characteristics of the prototype probe, the neutron tube-transformer assembly, and the neutron tube are described. In logging operations, only the epithermal prompt fission neutrons detected between 250 microseconds to 2500 microseconds following the excitation neutron pulse are counted. Comparison of corrected neutron logs with the conventional gross count natural gamma logs and the chemical assays of cores from boreholes are shown. The results obtained with this neutron probe clearly demonstrate its advantages over the gross count natural gamma log, although at this time the accuracy of the neutron log assay is not satisfactory under some conditions. The necessary correction factors for various borehole and formation parameters are being determined and, when applied, should improve the assay accuracy

  15. Intelligent approaches for the synthesis of petrophysical logs

    Rezaee, M Reza; Kadkhodaie-Ilkhchi, Ali; Alizadeh, Pooya Mohammad


    Log data are of prime importance in acquiring petrophysical data from hydrocarbon reservoirs. Reliable log analysis in a hydrocarbon reservoir requires a complete set of logs. For many reasons, such as incomplete logging in old wells, destruction of logs due to inappropriate data storage and measurement errors due to problems with logging apparatus or hole conditions, log suites are either incomplete or unreliable. In this study, fuzzy logic and artificial neural networks were used as intelligent tools to synthesize petrophysical logs including neutron, density, sonic and deep resistivity. The petrophysical data from two wells were used for constructing intelligent models in the Fahlian limestone reservoir, Southern Iran. A third well from the field was used to evaluate the reliability of the models. The results showed that fuzzy logic and artificial neural networks were successful in synthesizing wireline logs. The combination of the results obtained from fuzzy logic and neural networks in a simple averaging committee machine (CM) showed a significant improvement in the accuracy of the estimations. This committee machine performed better than fuzzy logic or the neural network model in the problem of estimating petrophysical properties from well logs

  16. One less trip : logging with less tripping, more protection

    Byfield, M.


    New logging technology by Datalog Technology Inc. was described. Logging-while-tripping (LWT) technology uses a slim petrophysical sensor package that is moved to the targeted geological formation through a drill pipe, which reduces the exposure to vibration and shock involved in logging-while-drilling (LWD). The equipment features standard components in a patented configuration and comes in 2 segments: the receiver sub and the sensor package electronics. A receiver sub is inserted into the bottomhole assembly at the end of the drill string. Drilling progresses with the LWT sub in the bottomhole assembly until the borehole approaches the logging depth. The sensor package and electronics are then lowered into the drill string. If the well is horizontal, rig pumps push the package into the drill string until it lands in the LWT sub. Drill pipes are moved across the zone of interest and logs are recorded on downhole memory contained within the LWT package. As the logging operation progresses, a depth recorder at the surface records depth information along with the downhole recorders. When logging is completed, downhole tools are retrieved, and data downloaded from the LWT onboard memory is merged with the surface depth information to generate well logs. Retrieval via the drill string greatly reduces the risk of losing the logging gear, which contains radioactive material. Federal officials now routinely insist on extensive fishing operations to retrieve lost tools. If a well gets a gas kick while logging is in progress, the operator can still pump down mud or close the blowout preventer rams if necessary, and save time in determining where to perforate shallow gas wells. Compensated neutron logs, gamma rays, spectrum gamma rays, and induction have been tested with the LWT system. It was concluded that Petro-Canada has deployed the logs recently and has achieved results that compared satisfactorily with conventional logs. 2 figs.

  17. Water saturation in shaly sands: logging parameters from log-derived values

    Miyairi, M.; Itoh, T.; Okabe, F.


    The methods are presented for determining the relation of porosity to formation factor and that of true resistivity of formation to water saturation, which were investigated through the log interpretation of one of the oil and gas fields of northern Japan Sea. The values of the coefficients ''a'' and ''m'' in porosity-formation factor relation are derived from cross-plot of porosity and resistivity of formation corrected by clay content. The saturation exponent ''n'' is determined from cross-plot of porosity and resistivity index on the assumption that the product of porosity and irreducible water saturation is constant. The relation of porosity to irreducible water saturation is also investigated from core analysis. The new logging parameters determined from the methods, a = 1, m = 2, n = 1.4, improved the values of water saturation by 6 percent in average, and made it easy to distinguish the points which belong to the productive zone and ones belonging to the nonproductive zone

  18. Rill erosion in burned and salvage logged western montane forests: Effects of logging equipment type, traffic level, and slash treatment

    Wagenbrenner, J. W.; Robichaud, P. R.; Brown, R. E.


    Following wildfires, forest managers often consider salvage logging burned trees to recover monetary value of timber, reduce fuel loads, or to meet other objectives. Relatively little is known about the cumulative hydrologic effects of wildfire and subsequent timber harvest using logging equipment. We used controlled rill experiments in logged and unlogged (control) forests burned at high severity in northern Montana, eastern Washington, and southern British Columbia to quantify rill overland flow and sediment production rates (fluxes) after ground-based salvage logging. We tested different types of logging equipment-feller-bunchers, tracked and wheeled skidders, and wheeled forwarders-as well as traffic levels and the addition of slash to skid trails as a best management practice. Rill experiments were done at each location in the first year after the fire and repeated in subsequent years. Logging was completed in the first or second post-fire year. We found that ground-based logging using heavy equipment compacted soil, reduced soil water repellency, and reduced vegetation cover. Vegetation recovery rates were slower in most logged areas than the controls. Runoff rates were higher in the skidder and forwarder plots than their respective controls in the Montana and Washington sites in the year that logging occurred, and the difference in runoff between the skidder and control plots at the British Columbia site was nearly significant (p = 0.089). Most of the significant increases in runoff in the logged plots persisted for subsequent years. The type of skidder, the addition of slash, and the amount of forwarder traffic did not significantly affect the runoff rates. Across the three sites, rill sediment fluxes were 5-1900% greater in logged plots than the controls in the year of logging, and the increases were significant for all logging treatments except the low use forwarder trails. There was no difference in the first-year sediment fluxes between the feller

  19. Foreign entry, cultural barriers and learning

    H.G. Barkema (Harry); J.H.J. Bell (John); J.M.E. Pennings


    textabstractThis paper examines the longevity of foreign entries. Hypotheses are developed on the mode (start-ups vs. acquisitions) and ownership structure (wholly owned vs. joint ventures) in relation to cultural distance. The hypotheses are tested within a framework of organizational learning,

  20. Entry modes of European firms in Vietnam

    Daniel Simonet


    Full Text Available Purpose: The purpose of the paper is to explore the entry modes of EU firms setting up operations in Vietnam. Design/methodology/approach: we use a case study approach on Haymarket, Cadbury, Creative Education, Fairchild, Aventis and Artemisinin and Farming International using interviews from managerial professionals in Vietnam. Findings: Despite the fact that Vietnam has been opening up for more than 20 years, licensing is the preferred entry mode because of the risks involved in venturing with local firms; that preference signals a low level commitment and a high perception of risk and state interference. In line with Vietnam transition to state - rather than private market - capitalism, a foreign company opting for a joint-venture will do so with a state-owned rather than privately-owned company. The choice of a subsidiary can be explained by the lack of trust in partners and institutions, not by improvement in the socio-political environment. Limitations: In determining the entry mode strategy, the paper focuses on the Uppsala school’s “psychic distance” (e.g. cultural distance, lack of trust rather than on firm-specific advantages (Rugman, 1980; 2006. Key-words: international entry mode; emerging markets; subsidiary; joint-venture; India; Vietnam

  1. Correlation Between Entry Requirements and Academic ...

    In this study, the investigator examines the correlation between entry requirements and academic performance of undergraduate students at the University of Buea. The quality of performance on the Cameroon General Certificate Examination at the Advanced Level is the predictor while the criterion is the cumulative grade ...

  2. Flavivirus cell entry and membrane fusion

    Smit, Jolanda M.; Moesker, Bastiaan; Rodenhuis-Zybert, Izabela; Wilschut, Jan


    Flaviviruses, such as dengue virus and West Nile virus, are enveloped viruses that infect cells through receptor-mediated endocytosis and fusion from within acidic endosomes. The cell entry process of flaviviruses is mediated by the viral E glycoprotein. This short review will address recent

  3. Women's Entry into Teaching: Myths and Realities.

    Russell, Dorothy S.


    The author reviews the entry of women into the teaching profession in nineteenth-century America, noting that, while the primary motivation for encouraging women to teach was that they could be paid less than men, this economic justification was obscured by sentimental pronouncements about women's superior moral and nurturant power. (SJL)

  4. Perceptions regarding strategic and structural entry barriers

    Lutz, C.H.M.; Kemp, R.G.M.; Dijkstra, S.G.


    This article uses factor analysis to identify the underlying dimensions of strategic and structural entry barriers. We find that, in the perception of firms, both types of barriers are important and that the effectiveness of strategic barriers depends on attributes of the market structure. Based on

  5. Perceptions regarding strategic and structural entry barriers

    Lutz, Clemens H. M.; Kemp, Ron G. M.; Dijkstra, S. Gerhard

    This article uses factor analysis to identify the underlying dimensions of strategic and structural entry barriers. We find that, in the perception of firms, both types of barriers are important and that the effectiveness of strategic barriers depends on attributes of the market structure. Based on

  6. Infectious Entry Pathway of Enterovirus B Species

    Varpu Marjomäki


    Full Text Available Enterovirus B species (EV-B are responsible for a vast number of mild and serious acute infections. They are also suspected of remaining in the body, where they cause persistent infections contributing to chronic diseases such as type I diabetes. Recent studies of the infectious entry pathway of these viruses revealed remarkable similarities, including non-clathrin entry of large endosomes originating from the plasma membrane invaginations. Many cellular factors regulating the efficient entry have recently been associated with macropinocytic uptake, such as Rac1, serine/threonine p21-activated kinase (Pak1, actin, Na/H exchanger, phospholipace C (PLC and protein kinase Cα (PKCα. Another characteristic feature is the entry of these viruses to neutral endosomes, independence of endosomal acidification and low association with acidic lysosomes. The biogenesis of neutral multivesicular bodies is crucial for their infection, at least for echovirus 1 (E1 and coxsackievirus A9 (CVA9. These pathways are triggered by the virus binding to their receptors on the plasma membrane, and they are not efficiently recycled like other cellular pathways used by circulating receptors. Therefore, the best “markers” of these pathways may be the viruses and often their receptors. A deeper understanding of this pathway and associated endosomes is crucial in elucidating the mechanisms of enterovirus uncoating and genome release from the endosomes to start efficient replication.

  7. Energy Information Data Base: corporate author entries


    The DOE Energy Information Data Base has been created and is maintained by the DOE Technical Information Center. One of the controls for information entered into the base is the standardized name of the corporate entity or the corporate author. The purpose of this list of authorized or standardized corporate entries is to provide a means for the consistent citing of the names of organizations in bibliographic records. It also serves as a guide for users who retrieve information from a bibliographic data base and who want to locate information originating in particular organizations. This authority is a combination of entries established by the Technical Information Center and the International Atomic Energy Agency's International Nuclear Information System (INIS). The format calls, in general, for the name of the organization represented by the literature being cataloged to be cited as follows: the largest element, the place, the smallest element, e.g., Brigham Young Univ., Provo, Utah (USA), Dept. of Chemical Engineering. Code numbers are assigned to each entry to provide manipulation by computer. Cross references are used to reflect name changes and invalid entries

  8. Radiation Database for Earth and Mars Entry


    state which mainly determines its polarizability . ∆r2 = r2u− r2l is the difference between Radiation Database for Earth and Mars Entry RTO-EN-AVT...NO A← X (0,0) band in the presence of argon and nitrogen. Journal of Quantitative Spectroscopy and Radiative Transfer, 47:375–390, 1992. Radiation

  9. 76 FR 15841 - Entry of Merchandise


    ... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection DEPARTMENT OF THE TREASURY 19 CFR Part 141 Entry of Merchandise CFR Correction In Title 19 of the Code of Federal Regulations, Parts 141 to 199, revised as of April 1, 2010, on page 6, the second general authority citation for part...

  10. Anthropologists and Broadcasting: Roles and Entry Strategies

    Eiselein, E. B.; Topper, Martin


    The article describes some of the roles open to anthropologists in radio and television. Entry strategies for occupying these roles include taking the first step in approaching the broadcast station, learning about broadcasting, and communicating anthropology to the broadcasters. (Author/NQ)

  11. Geophysical borehole logging in the unsaturated zone, Yucca Mountain, Nevada

    Schimschal, U.; Nelson, P.H.


    Borehole geophysical logging for site characterization in the volcanic rocks at the proposed nuclear waste repository at Yucca Mountain, Nevada, requires data collection under rather unusual conditions. Logging tools must operate in rugose, dry holes above the water table in the unsaturated zone. Not all logging tools will operate in this environment, therefore; careful consideration must be given to selection and calibration. A sample suite of logs is presented that demonstrates correlation of geological formations from borehole to borehole, the definition of zones of altered mineralogy, and the quantitative estimates of rock properties. The authors show the results of an exploratory calculation of porosity and water saturation based upon density and epithermal neutron logs. Comparison of the results with a few core samples is encouraging, particularly because the logs can provide continuous data in boreholes where core samples are not available

  12. Aespoe Hard Rock Laboratory. BIPS logging in borehole KAS09

    Gustafsson, Jaana; Gustafsson, Christer


    This report includes the data gained in BIPS logging performed at the Aespoe Hard Rock Laboratory. The logging operation presented here includes BIPS logging in the core drilled borehole KAS09. The objective for the BIPS logging was to observe the condition of KAS09 in order to restore the borehole in the hydrogeological monitoring programme.All measurements were conducted by Malaa Geoscience AB on October 9th 2009. The objective of the BIPS logging is to achieve information of the borehole including occurrence of rock types as well as determination of fracture distribution and orientation. This report describes the equipment used as well as the measurement procedures and data gained. For the BIPS survey, the result is presented as images. The basic conditions of the BIPS logging for geological mapping and orientation of structures are satisfying for borehole KAS09, although induced affects from the drilling on the borehole walls limit the visibility

  13. Aespoe Hard Rock Laboratory. BIPS logging in borehole KAS09

    Gustafsson, Jaana; Gustafsson, Christer (Malaa Geoscience AB (Sweden))


    This report includes the data gained in BIPS logging performed at the Aespoe Hard Rock Laboratory. The logging operation presented here includes BIPS logging in the core drilled borehole KAS09. The objective for the BIPS logging was to observe the condition of KAS09 in order to restore the borehole in the hydrogeological monitoring programme.All measurements were conducted by Malaa Geoscience AB on October 9th 2009. The objective of the BIPS logging is to achieve information of the borehole including occurrence of rock types as well as determination of fracture distribution and orientation. This report describes the equipment used as well as the measurement procedures and data gained. For the BIPS survey, the result is presented as images. The basic conditions of the BIPS logging for geological mapping and orientation of structures are satisfying for borehole KAS09, although induced affects from the drilling on the borehole walls limit the visibility

  14. Geophysical well logging operations and log analysis in Geothermal Well Desert Peak No. B-23-1

    Sethi, D.K.; Fertl, W.H.


    Geothermal Well Desert Peak No. B-23-1 was logged by Dresser Atlas during April/May 1979 to a total depth of 2939 m (9642 ft). A temperature of 209/sup 0/C (408/sup 0/F) was observed on the maximum thermometer run with one of the logging tools. Borehole tools rated to a maximum temperature of 204.4/sup 0/C (400/sup 0/F) were utilized for logging except for the Densilog tool, which was from the other set of borehole instruments, rated to a still higher temperature, i.e., 260/sup 0/C (500/sup 0/F). The quality of the logs recorded and the environmental effects on the log response have been considered. The log response in the unusual lithologies of igneous and metamorphic formations encountered in this well could be correlated with the drill cutting data. An empirical, statistical log interpretation approach has made it possible to obtain meaningful information on the rocks penetrated. Various crossplots/histograms of the corrected log data have been generated on the computer. These are found to provide good resolution between the lithological units in the rock sequence. The crossplotting techniques and the statistical approach were combined with the drill cutting descriptions in order to arrive at the lithological characteristics. The results of log analysis and recommendations for logging of future wells have been included.

  15. Scaling of Metabolic Scaling within Physical Limits

    Douglas S. Glazier


    Full Text Available Both the slope and elevation of scaling relationships between log metabolic rate and log body size vary taxonomically and in relation to physiological or developmental state, ecological lifestyle and environmental conditions. Here I discuss how the recently proposed metabolic-level boundaries hypothesis (MLBH provides a useful conceptual framework for explaining and predicting much, but not all of this variation. This hypothesis is based on three major assumptions: (1 various processes related to body volume and surface area exert state-dependent effects on the scaling slope for metabolic rate in relation to body mass; (2 the elevation and slope of metabolic scaling relationships are linked; and (3 both intrinsic (anatomical, biochemical and physiological and extrinsic (ecological factors can affect metabolic scaling. According to the MLBH, the diversity of metabolic scaling relationships occurs within physical boundary limits related to body volume and surface area. Within these limits, specific metabolic scaling slopes can be predicted from the metabolic level (or scaling elevation of a species or group of species. In essence, metabolic scaling itself scales with metabolic level, which is in turn contingent on various intrinsic and extrinsic conditions operating in physiological or evolutionary time. The MLBH represents a “meta-mechanism” or collection of multiple, specific mechanisms that have contingent, state-dependent effects. As such, the MLBH is Darwinian in approach (the theory of natural selection is also meta-mechanistic, in contrast to currently influential metabolic scaling theory that is Newtonian in approach (i.e., based on unitary deterministic laws. Furthermore, the MLBH can be viewed as part of a more general theory that includes other mechanisms that may also affect metabolic scaling.

  16. Circular induction accelerator for borehole logging

    Chen, F.K.; Bertozzi, W.; Corris, G.W.; Diamond, W.; Doucet, J.A.; Schweitzer, J.S.


    This patent describes a downhole logging sonde adapted to be moved through a borehole, a source of gamma rays in the sonde for irradiating earth formations traversed by the borehole, one or more gamma ray detectors for detecting gamma rays scattered back to the sonde from the irradiated earth formations, and means for transmitting signals representative of the detected gamma rays to the earth's surface for processing. This patent describes improvement in the gamma ray source comprises a magnetic induction particle accelerator, including: a magnetic circuit having a field magnet, generally circular opposed pole pieces, and a core magnet metal ions from the group consisting of Mn, Zn and Ni; an excitation circuit including a field coil surrounding the field magnet and the core magnet and a core coil surrounding the central axially leg of the core magnet; an annular acceleration chamber interposed between the pole pieces; means for applying time-varying acceleration voltage pulses across the primary excitation circuit; means for injecting charged particles into orbit within the acceleration chamber; means for compressing the particle orbits to trap particles within generally circular orbits within the acceleration chamber; means for generating a particle accelerating magnetic flux in the magnetic circuit; and means for ejecting charged particles from the generally circular orbits and into contact with a target to produce gamma ray photons

  17. Acoustic and Optical Televiewer Borehole Logging

    Ahmad Hasnulhadi Che Kamaruddin; Nik Marzukee Nik Ibrahim; Zaidi Ibrahim; Nurul Wahida Ahmad Khairuddin; Azmi Ibrahim


    This review paper is focused on Borehole Televiewer. Borehole Televiewer or (BHTV) was used to obtain high-resolution acoustical images from the borehole wall. A probe with a high resolution downward looking camera is used. The camera has specific optics (a conical mirror with a ring of bulbs) with just one shot needed to capture the entire borehole circumference as a 360 panoramic view. Settings similar to traditional cameras (exposure, quality, light, frame rate and resolution) make it effective in almost any type of borehole fluid. After each shot, a series of horizontal pixel strings are acquired, giving a rasterized RGB picture in real-time which is transmitted to the console and finally to a monitor. The orientation device embedded in the tool, which is made of 3 inclinometers and 3 magnetometers, allows the inclination and azimuth of the probe to be computed in real-time, correctly orienting the borehole images. Besides, Acoustic and Optical Televiewer has been introduced as its advanced in technological research. Its logging has been successfully applied to geotechnical investigations and mineral exploration (Schepers et al., 2001) due to advances in beam focusing, increased dynamic range, digital recording techniques, and digital data processing (Schepers, 1991). Thus, this paper will go through to the basic principle of (BHTV) as one type of data collection today. (author)

  18. MCNP capabilities for nuclear well logging calculations

    Forster, R.A.; Little, R.C.; Briesmeister, J.F.; Hendricks, J.S.


    The Los Alamos Radiation Transport Code System (LARTCS) consists of state-of-the-art Monte Carlo and discrete ordinates transport codes and data libraries. This paper discusses how the general-purpose continuous-energy Monte Carlo code MCNP (Monte Carlo neutron photon), part of the LARTCS, provides a computational predictive capability for many applications of interest to the nuclear well logging community. The generalized three-dimensional geometry of MCNP is well suited for borehole-tool models. SABRINA, another component of the LARTCS, is a graphics code that can be used to interactively create a complex MCNP geometry. Users can define many source and tally characteristics with standard MCNP features. The time-dependent capability of the code is essential when modeling pulsed sources. Problems with neutrons, photons, and electrons as either single particle or coupled particles can be calculated with MCNP. The physics of neutron and photon transport and interactions is modeled in detail using the latest available cross-section data

  19. Acoustic reflection log in transversely isotropic formations

    Ronquillo Jarillo, G.; Markova, I.; Markov, M.


    We have calculated the waveforms of sonic reflection logging for a fluid-filled borehole located in a transversely isotropic rock. Calculations have been performed for an acoustic impulse source with the characteristic frequency of tens of kilohertz that is considerably less than the frequencies of acoustic borehole imaging tools. It is assumed that the borehole axis coincides with the axis of symmetry of the transversely isotropic rock. It was shown that the reflected wave was excited most efficiently at resonant frequencies. These frequencies are close to the frequencies of oscillations of a fluid column located in an absolutely rigid hollow cylinder. We have shown that the acoustic reverberation is controlled by the acoustic impedance of the rock Z = Vphρs for fixed parameters of the borehole fluid, where Vph is the velocity of horizontally propagating P-wave; ρs is the rock density. The methods of waveform processing to determine the parameters characterizing the reflected wave have been discussed.

  20. Cost of skid roads for arch logging in West Virginia

    George R., Jr. Trimble; Carl R. Barr


    In the mountain hardwood country of the northern Appalachians, tree-length skidding with tractor and arch has proved to be economical logging. One essential part of this type of logging is that tree-length logs are winched to the skid roads: tractor and arch do not run around through the woods. Winching distance is commonly 200 to 300 feet; and occasionally an extra...

  1. Western tight gas sands advanced logging workshop proceedings

    Jennings, J B; Carroll, Jr, H B [eds.


    An advanced logging research program is one major aspect of the Western Tight Sands Program. Purpose of this workshop is to help BETC define critical logging needs for tight gas sands and to allow free interchange of ideas on all aspects of the current logging research program. Sixteen papers and abstracts are included together with discussions. Separate abstracts have been prepared for the 12 papers. (DLC)

  2. An artificial intelligence approach to well log correlation

    Startzman, R.A.; Kuo, T.B.


    This paper shows how an expert computer system was developed to correlate two well logs in at least moderately difficult situations. A four step process was devised to process log trace information and apply a set of rules to identify zonal correlations. Some of the advantages and problems with the artificial intelligence approach are shown using field logs. The approach is useful and, if properly and systematically applied, it can result in good correlations

  3. Towards an entropy-based analysis of log variability

    Back, Christoffer Olling; Debois, Søren; Slaats, Tijs


    the development of hybrid miners: given a (sub-)log, can we determine a priori whether the log is best suited for imperative or declarative mining? We propose using the concept of entropy, commonly used in information theory. We consider different measures for entropy that could be applied and show through...... experimentation on both synthetic and real-life logs that these entropy measures do indeed give insights into the complexity of the log and can act as an indicator of which mining paradigm should be used....

  4. Towards an Entropy-based Analysis of Log Variability

    Back, Christoffer Olling; Debois, Søren; Slaats, Tijs


    the development of hybrid miners: given a log, can we determine a priori whether the log is best suited for imperative or declarative mining? We propose using the concept of entropy, commonly used in information theory. We consider different measures for entropy that could be applied and show through...... experimentation on both synthetic and real-life logs that these entropy measures do indeed give insights into the complexity of the log and can act as an indicator of which mining paradigm should be used....

  5. Real Time Face Quality Assessment for Face Log Generation

    Kamal, Nasrollahi; Moeslund, Thomas B.


    Summarizing a long surveillance video to just a few best quality face images of each subject, a face-log, is of great importance in surveillance systems. Face quality assessment is the back-bone for face log generation and improving the quality assessment makes the face logs more reliable....... Developing a real time face quality assessment system using the most important facial features and employing it for face logs generation are the concerns of this paper. Extensive tests using four databases are carried out to validate the usability of the system....

  6. Systematic logging utilizing a log sheet designed for drill core descriptions. An example in uranium exploration activities

    Sasao, Eiji; Tsuruta, Tadahiko; Iida, Yoshimasa


    We describe the log sheets used during uranium exploration activities for unconformity-related uranium deposits by JNC. The purpose of using the logging sheets is to standardize the objects which all geologists must observe and for data quality assurance. The log sheets are a three-part set describing basement lithology, sandstone lithology and geotechnics. We devised our own log sheets to describe both the sandstone and the underlying basement rock when we started exploration in Athabasca Basin, Canada. We modified the sheets to gain a better understanding of the geological features related to uranium mineralization, and made final improvements to satisfy required quality based on the criteria of descriptive objects and accuracy. Use of the log sheets resulted in effective performance of core logging and improvement in the display of data. (author)

  7. An Analysis of the Feasible Entry Mode for Tottenham Hotspur’s Entry into China

    Zhang, Lei


    An increasing number of European football clubs has developed global strategies with an emphasis on the Chinese market, which seems to be a shortcut to their global success. In order to achieve an effective expansion, the selection of appropriate entry modes should be conducted cautiously. This paper aims to select feasible entry modes for Tottenham Hotspur F.C., an emerging power in the Premier League, to enter into the Chinese market. A framework that combines different theories based ...

  8. Market Entry Strategies : Case: McDonald's entry on the Russian market

    Karataev, Oleg


    The thesis considers the entry strategy and development of the company McDonald's into international markets. The theoretical aspects of the entry strategy of the company into the international markets. Analyzes the key features of the development of McDonald's in Russia. Investigated the prospects of the company in international markets. In theoretic part there was regarded some important aspects of international strategic management, such as: strategic alternatives, elements and levels o...

  9. Variable Entry Biased Paracentric Hemispherical Deflector: Experimental results on energy resolution for different entry positions

    Dogan, Mevlut; Ulu, Melike; Gennerakis, Giannis; Zouros, Theo J. M.


    A new hemispherical deflector analyzer (HDA) which is designed for electron energy analysis in atomic collisions has been constructed and tested. Using the crossed beam technique at the electron spectrometer, test measurements were performed for electron beam (200 eV) - Helium atoms interactions. These first experimental results show that the paracentric entries give almost twice as good resolution as that for the conventional entry. Supporting simulations of the entire lens+HDA spectrometer are found in relatively good agreement with experiment.

  10. Static dictionaries on AC0 RAMs: query time (√log n/log log n) is necessary and sufficient

    Andersson, Arne; Miltersen, Peter Bro; Riis, Søren


    ) on the time for answering membership queries in a set of size n when reasonable space is used for the data structure storing the set; the upper bound can be obtained using O(n) space, and the lower bound holds even if we allow space 2polylog n. Several variations of this result are also obtained. Among others......, we show a tradeoff between time and circuit depth under the unit-cost assumption: any RAM instruction set which permits a linear space, constant query time solution to the static dictionary problem must have an instruction of depth Ω(log w/log log to), where w is the word size of the machine (and log...

  11. Regulation of capacitative and non-capacitative Ca2+ entry in A7r5 vascular smooth muscle cells



    Full Text Available A capacitative Ca2+ entry (CCE pathway, activated by depletion of intracellular Ca2+ stores, is thought to mediate much of the Ca2+ entry evoked by receptors that stimulate phospholipase C (PLC. However, in A7r5 vascular smooth muscle cells, vasopressin, which stimulates PLC, empties intracellular Ca2+ stores but simultaneously inhibits their ability to activate CCE. The diacylglycerol produced with the IP3 that empties the stores is metabolized to arachidonic and this leads to activation of nitric oxide (NO synthase, production of NO and cyclic GMP, and consequent activation of protein kinase G. The latter inhibits CCE. In parallel, NO directly activates a non-capacitative Ca2+ entry (NCCE pathway, which is entirely responsible for the Ca2+ entry that occurs in the presence of vasopressin. This reciprocal regulation of two Ca2+ entry pathways ensures that there is sequential activation of first NCCE in the presence of vasopressin, and then a transient activation of CCE when vasopressin is removed. We suggest that the two routes for Ca2+ entry may selectively direct Ca2+ to processes that mediate activation and then recovery of the cell.

  12. Effect of radon transport in groundwater upon gamma-ray borehole logs

    Nelson, P.H.; Rachiele, R.; Smith, A.


    Granitic rock at an experimental waste storage site at Stripa, Sweden, is unusually high in natural radioelements (40 ppM uranium) with higher concentrations occurring locally in thin chloritic zones and fractures. Groundwater seeping through fractures into open boreholes is consequently highly anomalous in its radon content, with activity as high as one microcurie per liter. When total count gamma-ray logs are run in boreholes where groundwater inflow is appreciable, the result is quite unusual: the radon daughter activity in the water adds considerably to the contribution from the rock, and in fact often dominates the log response. The total gamma activity increases where radon-charged groundwater enters a borehole, and remains at a high level as the water flows along the hole in response to the hydraulic gradient. As a consequence, the gamma log serves as a flow profile, locating zones of water entry (or loss) by an increase (or decrease) in the total gamma activity. A simple model has been developed for flow through a thin crack emanating radon at a rate E showing that the radon concentration of water entering a hole is E/Λh, where Λ is the radon decay rate and h the crack aperture, assuming that the flow rate and crack source area are such that an element of water resides within the source area for several radon half-lives or more. Concentration measurements can provide a measurement of the inflow rate. Data from the 127-mm holes in the time-scale drift behave in this fashion

  13. What is Metabolic Syndrome?

    ... Intramural Research Home / Metabolic Syndrome Metabolic Syndrome Also known as What Is Metabolic syndrome ... metabolic risk factors to be diagnosed with metabolic syndrome. Metabolic Risk Factors A Large Waistline Having a large ...

  14. In Situ Magnetohydrodynamic Energy Generation for Planetary Entry Vehicles

    Ali, H. K.; Braun, R. D.


    This work aims to study the suitability of multi-pass entry trajectories for harnessing of vehicle kinetic energy through magnetohydrodynamic power generation from the high temperature entry plasma. Potential mission configurations are analyzed.

  15. 15 CFR 2011.204 - Entry of specialty sugars.


    ... UNITED STATES TRADE REPRESENTATIVE ALLOCATION OF TARIFF-RATE QUOTA ON IMPORTED SUGARS, SYRUPS AND... present a certificate to the appropriate customs official at the date of entry of specialty sugars. Entry...

  16. Logging a roadside stand to protect scenic values

    Philip M. McDonald; Raymond V. Whiteley


    A case study on the Challenge Experimental Forest, California, demonstrated that logging along roadsides need not despoil roadside stands. Nearly every tree was "viewed" before marking. Because of the "special-care" procedures followed, combined logging and slash-disposal cost was about twice that of a single-tree selection cut.

  17. Condition and fate of logged forests in the Brazilian Amazon.

    Gregory P. Asner; Eben N. Broadbent; Paulo J. C. Oliveira; Michael Keller; David E. Knapp; Jose N. M. Silva


    The long-term viability of a forest industry in the Amazon region of Brazil depends on the maintenance of adequate timber volume and growth in healthy forests. Using extensive high-resolution satellite analyses, we studied the forest damage caused by recent logging operations and the likelihood that logged forests would be cleared within 4 years after timber harvest....

  18. Veneer-log production and receipts, North Central Region, 1976.

    James E. Blyth; Jerold T. Hahn


    Shows 1976 veneer-log production and receipts by species in the Lake States (Michigan, Minnesota, and Wisconsin) and in the Central States (Illinois, Indiana, Iowa, and Missouri). Comparisons are made with similar data for 1974. Includes tables showing veneer-log production and receipts (for selected years) since 1946 in the Lake States and since 1956 in the Central...

  19. Veneer-log production and receipts, North Central Region, 1974.

    James E. Blyth; Jerold T. Hahn


    Shows 1974 veneer-log production and receipts by species in the Lake States (Michigan, Minnesota, and Wisconsin) and in the Central States (Illinois, Indiana, Iowa, and Missouri). Comparisons are made with similar data for 1972. Includes tables showing veneer-log production and receipts (for selected years) since 1946 in the Lake States and since 1956 in the Central...

  20. A selective logging mechanism for hardware transactional memory systems

    Lupon Navazo, Marc; Magklis, Grigorios; González Colás, Antonio María


    Log-based Hardware Transactional Memory (HTM) systems offer an elegant solution to handle speculative data that overflow transactional L1 caches. By keeping the pre-transactional values on a software-resident log, speculative values can be safely moved across the memory hierarchy, without requiring expensive searches on L1 misses or commits.

  1. Teaching an Old Log New Tricks with Machine Learning.

    Schnell, Krista; Puri, Colin; Mahler, Paul; Dukatz, Carl


    To most people, the log file would not be considered an exciting area in technology today. However, these relatively benign, slowly growing data sources can drive large business transformations when combined with modern-day analytics. Accenture Technology Labs has built a new framework that helps to expand existing vendor solutions to create new methods of gaining insights from these benevolent information springs. This framework provides a systematic and effective machine-learning mechanism to understand, analyze, and visualize heterogeneous log files. These techniques enable an automated approach to analyzing log content in real time, learning relevant behaviors, and creating actionable insights applicable in traditionally reactive situations. Using this approach, companies can now tap into a wealth of knowledge residing in log file data that is currently being collected but underutilized because of its overwhelming variety and volume. By using log files as an important data input into the larger enterprise data supply chain, businesses have the opportunity to enhance their current operational log management solution and generate entirely new business insights-no longer limited to the realm of reactive IT management, but extending from proactive product improvement to defense from attacks. As we will discuss, this solution has immediate relevance in the telecommunications and security industries. However, the most forward-looking companies can take it even further. How? By thinking beyond the log file and applying the same machine-learning framework to other log file use cases (including logistics, social media, and consumer behavior) and any other transactional data source.

  2. The log-linear return approximation, bubbles, and predictability

    Engsted, Tom; Pedersen, Thomas Quistgaard; Tanggaard, Carsten

    We study in detail the log-linear return approximation introduced by Campbell and Shiller (1988a). First, we derive an upper bound for the mean approximation error, given stationarity of the log dividendprice ratio. Next, we simulate various rational bubbles which have explosive conditional expec...

  3. The Log-Linear Return Approximation, Bubbles, and Predictability

    Engsted, Tom; Pedersen, Thomas Quistgaard; Tanggaard, Carsten


    We study in detail the log-linear return approximation introduced by Campbell and Shiller (1988a). First, we derive an upper bound for the mean approximation error, given stationarity of the log dividend-price ratio. Next, we simulate various rational bubbles which have explosive conditional expe...

  4. Predictive models of forest logging residues of Triplochiton ...

    The model developed indicated that logarithmic functions performed better than other form of equation. The findings of this study revealed that there is significant logging residues left to waste in the forest after timber harvest and quantifying this logging residue in terms of biomass model can serve as management tools in ...

  5. Secure Audit Logging with Tamper-Resistant Hardware

    Chong, C.N.; Peng, Z.; Peng, Z.; Hartel, Pieter H.; Gritzalis, D.; De Capitani di Vimercati, S.; Katsikas, S.K.; Samarati, P.

    Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user's actions on content and enables detection of some forms of tampering with

  6. Ubiquitous Learning Project Using Life-Logging Technology in Japan

    Ogata, Hiroaki; Hou, Bin; Li, Mengmeng; Uosaki, Noriko; Mouri, Kosuke; Liu, Songran


    A Ubiquitous Learning Log (ULL) is defined as a digital record of what a learner has learned in daily life using ubiquitous computing technologies. In this paper, a project which developed a system called SCROLL (System for Capturing and Reusing Of Learning Log) is presented. The aim of developing SCROLL is to help learners record, organize,…

  7. 14 CFR 125.407 - Maintenance log: Airplanes.


    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Maintenance log: Airplanes. 125.407 Section... OPERATIONS: AIRPLANES HAVING A SEATING CAPACITY OF 20 OR MORE PASSENGERS OR A MAXIMUM PAYLOAD CAPACITY OF 6... Maintenance log: Airplanes. (a) Each person who takes corrective action or defers action concerning a reported...

  8. Ontology-driven extraction of event logs from relational databases

    Calvanese, Diego; Montali, Marco; Syamsiyah, Alifah; van der Aalst, Wil M P; Reichert, M.; Reijers, H.A.


    Process mining is an emerging discipline whose aim is to discover, monitor and improve real processes by extracting knowledge from event logs representing actual process executions in a given organizational setting. In this light, it can be applied only if faithful event logs, adhering to accepted

  9. Prediction of Log "P": ALOGPS Application in Medicinal Chemistry Education

    Kujawski, Jacek; Bernard, Marek K.; Janusz, Anna; Kuzma, Weronika


    Molecular hydrophobicity (lipophilicity), usually quantified as log "P" where "P" is the partition coefficient, is an important molecular characteristic in medicinal chemistry and drug design. The log "P" coefficient is one of the principal parameters for the estimation of lipophilicity of chemical compounds and pharmacokinetic properties. The…

  10. Log-periodic dipole antenna with low cross-polarization

    Pivnenko, Sergey


    In this work, log-periodic antennas with improved cross-polarization level were studied. It was found that some modifications of the traditional design lead to an essential improvement of the co-to-cross polarization ratio up to 40 dB. An improved design of a log-periodic dipole antenna with low...

  11. The analog CTS communication interface in nuclear logging

    Li Min


    The author introduced a micro-controller-based CTS communication interface in nuclear logging, which provided convenience for the overhaul and regulation of the logging tool in CTS communication system. The use of micro-controller simplified the hardware structure of the interface, made the soft structure more rational and the whole system more flexible to control

  12. 21 CFR 211.182 - Equipment cleaning and use log.


    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Equipment cleaning and use log. 211.182 Section 211.182 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Reports § 211.182 Equipment cleaning and use log. A written record of major equipment cleaning...

  13. Logging residues under different stand and harvesting conditions, Rocky Mountains

    Robert E. Benson; Cameron M. Johnston


    Volume and characteristics of logging residues from 34 harvest areas are presented. Clearcuts and partial cuts logged to conventional utilization levels and to close utilization levels are included. Residue volumes ranged from almost 3, 600 ft3 /acre of wood 3-inches-plus down to about 550 ft3 /acre, depending on treatment. More than 60 percent of the residues were...

  14. Fates of trees damaged by logging in Amazonian Bolivia

    Shenkin, A.; Bolker, B.; Peña Claros, M.; Licona, J.C.; Putz, F.E.


    Estimation of carbon losses from trees felled and incidentally-killed during selective logging of tropical forests is relatively straightforward and well-documented, but less is known about the fates of collaterally-damaged trees that initially survive. Tree response to logging damage is an

  15. Dependency of radon entry on pressure difference

    Kokotti, H.; Kalliokoski, P.


    Radon levels, ventilation rate and pressure differences were monitored continuously in four apartment houses with different ventilation systems. Two of them were ventilated by mechanical exhaust, one by mechanical supply and exhaust, and one by natural ventilation. The two-storey houses were constructed from concrete elements on a slab and located on a gravel esker. It was surprising to find that increasing the ventilation rate increased levels of radon in the apartments. Increased ventilation caused increased outdoor-indoor pressure difference, which in turn increased the entry rate of radon and counteracted the diluting effect of ventilation. The increase was significant when the outdoor-indoor pressure difference exceeded 5 Pa. Especially in the houses with mechanical exhaust ventilation the pressure difference was the most important factor of radon entry rate, and contributed up to several hundred Bq m -3 h -1 . (Author)

  16. Summary analysis of the Gemini entry aerodynamics

    Whitnah, A. M.; Howes, D. B.


    The aerodynamic data that were derived in 1967 from the analysis of flight-generated data for the Gemini entry module are presented. These data represent the aerodynamic characteristics exhibited by the vehicle during the entry portion of Gemini 2, 3, 5, 8, 10, 11, and 12 missions. For the Gemini, 5, 8, 10, 11, and 12 missions, the flight-generated lift-to-drag ratios and corresponding angles of attack are compared with the wind tunnel data. These comparisons show that the flight generated lift-to-drag ratios are consistently lower than were anticipated from the tunnel data. Numerous data uncertainties are cited that provide an insight into the problems that are related to an analysis of flight data developed from instrumentation systems, the primary functions of which are other than the evaluation of flight aerodynamic performance.

  17. Lunar Entry Downmode Options for Orion

    Smith, Kelly M.; Rea, Jeremy


    For Exploration Missions 1 and 2, the Orion capsules will be entering the Earth's atmosphere with speeds in excess of 11 km/s. In the event of a degraded Guidance, Navigation, and Control system, attempting the nominal guided entry may be inadvisable due to the potential for failures that result in a loss of vehicle (or crew, when crew are aboard). In such a case, a method of assuring Earth capture, water landing, and observence of trajectory constraints (heating, loads) is desired. Such a method should also be robust to large state uncertainty and variations in entry interface states. This document will explore four approaches evaluated and their performance in ensuring a safe return of the Orion capsule in the event of onboard system degradation.

  18. Available hardware for automated entry control

    Holmes, J.P.


    Automated entry control has become an increasingly important issue at facilities where budget constraints are limiting options for manned entry control points. Ongoing work at Sandia National Laboratories is attempting to establish a data base for use by facility security managers working the problem of how to maintain security on a limited budget. Sandia National Laboratories conducted a performance test of the following biometric verifiers: (1) voice verifier by Alpha Microsystems of Santa Ana, California; (2) signature dynamics verifier by Autosig Systems of Irving, Texas; (3) voice verifier by Ecco Industries of Danvers, Massachusetts (now International Electronics); (4) retinal pattern verifier by EyeDentify of Portland, Oregon; (5) fingerprint verifier by Identix of Sunnyvale, California; and (6) hand geometry verifier by Recognition Systems of San Jose, California

  19. Cell entry of hepatitis C virus

    Bartosch, Birke; Cosset, Francois-Loic


    Hepatitis C virus (HCV), an important human pathogen, is an enveloped, positive-stranded RNA virus classified in the hepacivirus genus of the Flaviviridae family. Cell attachment of flaviviruses generally leads to endocytosis of bound virions. Systems that support HCV replication and particle formation in vitro are emerging only now, 16 years after the discovery of the virus. Albeit this limitation, the route of HCV cell entry as well as 'capture' molecules involved in low-affinity interactions for the initial contact of HCV with target cells and potential high-affinity receptor candidates that may mediate HCV trafficking and fusion has been described. The objective of this review is to summarize the contribution of different HCV model systems to our current knowledge about structure of the HCV GPs E1 and E2 and their roles in cell entry comprising cell attachment, interactions with cellular receptors, endocytosis, and fusion

  20. Guessing lexicon entries using finite-state methods

    Koskenniemi, Kimmo Matti


    A practical method for interactive guessing of LEXC lexicon entries is presented. The method is based on describing groups of similarly inflected words using regular expressions. The patterns are compiled into a finite-state transducer (FST) which maps any word form into the possible LEXC lexicon entries which could generate it. The same FST can be used (1) for converting conventional headword lists into LEXC entries, (2) for interactive guessing of entries, (3) for corpus-assisted interactiv...

  1. RITD - Re-entry: Inflatable Technology Development in Russian Collaboration

    Heilimo, J.; Harri, A.-M.; Aleksashkin, S.; Koryanov, V.; Arruego, I.; Schmidt, W.; Haukka, H.; Finchenko, V.; Martynov, M.; Ostresko, B.; Ponomarenko, A.; Kazakovtsev, V.; Martin, S.; Siili, T.


    A new generation of inflatable Entry, Descent and Landing System (EDLS) for Mars has been developed. It is used in both the initial atmospheric entry and atmospheric descent before the semi-hard impact of the penetrator into Martian surface. The EDLS applicability to Earth's atmosphere is studied by the EU/RITD [1] project. Project focuses on the analysis and tests of the transonic behaviour of this compact and light weight payload entry system at the Earth re-entry.

  2. Entry Regulations, Product Differentiation and Determinants of Market Structure

    Maican, Florin; Orth, ´Matilda


    We use a dynamic oligopoly model of entry and exit to evaluate how entry regulations affect profitability and market structure in retail. The model incorporates demand and store-level heterogeneity. Based on unique data for all retail food stores in Sweden, we find that the average entry costs for small and large stores are 10 and 18 percent lower, respectively, in markets with liberal compared with restrictive regulations. Counterfactual simulations show that lower entry costs in restrictive...

  3. Entry regulations, welfare and determinants of market structure

    Maican, Florin; Orth, Matilda


    We use a dynamic oligopoly model of entry and exit with store-type differentiation to evaluate how entry regulations affect profitability, market structure and welfare. Based on unique data for all retail food stores in Sweden, we estimate demand, recover variable profits, and estimate entry costs and fixed costs by store type. Counterfactual policy experiments show that welfare increases when competition is enhanced by lower entry costs. Protecting small stores by imposing licensing fees on ...

  4. Incumbent innovation and entry by spinoff

    Falck, Oliver; Heblich, Stephan


    This paper takes a different perspective toward the escape entry incentive of incumbent firms to innovate. New entrants spawned from incumbents are not necessarily a threat; they can complement incumbents' production by commercializing knowledge incumbents are not willing or able to exploit. Accordingly, incumbent innovation determines exploitable knowledge externalities for spinoffs while, at the same time, spinoffs are expected to influence incumbent innovation. To overcome this problem of ...

  5. Advertising, Competition and Entry in Media Industries

    Crampes, Claude; Haritchabalet, Carole; Jullien, Bruno


    This paper presents a model of media competition with free entry when media operators are financed both from advertisers and customers. The relation between advertising receipts and sales receipts, which are both complementary and antagonist, is different if media operators impose a price or a quantity to advertisers. When consumers dislike advertising, media operators are better off setting an advertising price than an advertising quantity. We establish a relationship between the equilibrium...

  6. System for histogram entry, retrieval, and plotting

    Kellogg, M.; Gallup, J.M.; Shlaer, S.; Spencer, N.


    This manual describes the systems for producing histograms and dot plots that were designed for use in connection with the Q general-purpose data-acquisition system. These systems allow for the creation of histograms; the entry, retrieval, and plotting of data in the form of histograms; and the dynamic display of scatter plots as data are acquired. Although the systems are designed for use with Q, they can also be used as a part of other applications. 3 figures

  7. Inversion of a lateral log using neural networks

    Garcia, G.; Whitman, W.W.


    In this paper a technique using neural networks is demonstrated for the inversion of a lateral log. The lateral log is simulated by a finite difference method which in turn is used as an input to a backpropagation neural network. An initial guess earth model is generated from the neural network, which is then input to a Marquardt inversion. The neural network reacts to gross and subtle data features in actual logs and produces a response inferred from the knowledge stored in the network during a training process. The neural network inversion of lateral logs is tested on synthetic and field data. Tests using field data resulted in a final earth model whose simulated lateral is in good agreement with the actual log data

  8. Cased-hole log analysis and reservoir performance monitoring

    Bateman, Richard M


    This book addresses vital issues, such as the evaluation of shale gas reservoirs and their production. Topics include the cased-hole logging environment, reservoir fluid properties; flow regimes; temperature, noise, cement bond, and pulsed neutron logging; and casing inspection. Production logging charts and tables are included in the appendices. The work serves as a comprehensive reference for production engineers with upstream E&P companies, well logging service company employees, university students, and petroleum industry training professionals. This book also: ·       Provides methods of conveying production logging tools along horizontal well segments as well as measurements of formation electrical resistivity through casing ·       Covers new information on fluid flow characteristics in inclined pipe and provides new and improved nuclear tool measurements in cased wells ·       Includes updates on cased-hole wireline formation testing  

  9. Toward an Automated Labeling of Event Log Attributes

    Abbad Andaloussi, Amine; Burattin, Andrea; Weber, Barbara


    information systems often do not comply with the required maturity level, since they lack the notion of process instance, also referred in process mining as “case id”. Without a proper identification of the case id attribute in log files, the outcome of process mining algorithms is unpredictable. This paper...... proposes a new approach that aims to overcome this challenge by automatically inferring the case id attribute from log files. The approach has been implemented as a ProM plugin and evaluated with several real-world event logs. The results demonstrate a high accuracy in inferring the case id attribute.......Process mining aims at exploring the data produced by executable business processes to mine the underlying control-flow and dataflow. Most of the process mining algorithms assume the existence of an event log with a certain maturity level. Unfortunately, the logs provided by process unaware...

  10. Rock mass characterization for Copenhagen Metro using face logs

    Hansen, Sanne Louise; Galsgaard, Jens; Foged, Niels Nielsen


    An extension of the existing Metro in central Copenhagen is currently under construction. We present a comparison of the different field logging techniques available from a large number of borehole logs and face logs carried out during the construction in cooperation with the constructor and client......, describing rock mass characteristics using detailed face logging with geological description and recording of induration and fracturing, giving a field RQD value during excavation, combined with televiewer logs, when available, has shown to be a valuable tool for rock mass characterization compared......’s representatives, which illustrate and approve the applied methods. The new ‘Cityringen’ Metro will consist of two 16 km single track tunnels, with 17 stations and 3 construction and ventilation shafts. The geological ground conditions are dominated by glacial and postglacial deposits overlying Paleocene Greensand...

  11. Filovirus tropism: Cellular molecules for viral entry

    Ayato eTakada


    Full Text Available In human and nonhuman primates, filoviruses (Ebola and Marburg viruses cause severe hemorrhagic fever.Recently, other animals such as pigs and some species of fruit bats have also been shown to be susceptible to these viruses. While having a preference for some cell types such as hepatocytes, endothelial cells, dendritic cells, monocytes, and macrophages, filoviruses are known to be pantropic in infection of primates. The envelope glycoprotein (GP is responsible for both receptor binding and fusion of the virus envelope with the host cell membrane. It has been demonstrated that filovirus GP interacts with multiple molecules for entry into host cells, whereas none of the cellular molecules so far identified as a receptor/coreceptor fully explains filovirus tissue tropism and host range. Available data suggest that the mucin-like region (MLR on GP plays an important role in attachment to the preferred target cells, whose infection is likely involved in filovirus pathogenesis, whereas the MLR is not essential for the fundamental function of the GP in viral entry into cells in vitro. Further studies elucidating the mechanisms of cellular entry of filoviruses may shed light on the development of strategies for prophylaxis and treatment of Ebola and Marburg hemorrhagic fevers.

  12. 31 CFR 337.6 - Conversions to book-entry.


    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Conversions to book-entry. 337.6... HOUSING ADMINISTRATION DEBENTURES Certificated Debentures § 337.6 Conversions to book-entry. Upon implementation of the book-entry debenture system, to be announced in advance by separate public notice, all new...

  13. 32 CFR 643.11 - Rights of entry.


    ... 32 National Defense 4 2010-07-01 2010-07-01 true Rights of entry. 643.11 Section 643.11 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE General § 643.11 Rights of entry. Pending the signing of the formal instrument, no right of entry will be...

  14. 19 CFR 141.18 - Entry by nonresident corporation.


    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Entry by nonresident corporation. 141.18 Section....18 Entry by nonresident corporation. A nonresident corporation (i.e., one which is not incorporated... entry is located who is authorized to accept service of process against that corporation or, in the case...

  15. 19 CFR 151.63 - Information on entry summary.


    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Information on entry summary. 151.63 Section 151.63 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... Information on entry summary. Each entry summary covering wool or hair subject to duty at a rate per clean...

  16. Log-concavity property for some well-known distributions

    G. R. Mohtashami Borzadaran


    Full Text Available Interesting properties and propositions, in many branches of science such as economics have been obtained according to the property of cumulative distribution function of a random variable as a concave function. Caplin and Nalebuff (1988,1989, Bagnoli and Khanna (1989 and Bagnoli and Bergstrom (1989 , 1989, 2005 have discussed the log-concavity property of probability distributions and their applications, especially in economics. Log-concavity concerns twice differentiable real-valued function g whose domain is an interval on extended real line. g as a function is said to be log-concave on the interval (a,b if the function ln(g is a concave function on (a,b. Log-concavity of g on (a,b is equivalent to g'/g being monotone decreasing on (a,b or (ln(g" 6] have obtained log-concavity for distributions such as normal, logistic, extreme-value, exponential, Laplace, Weibull, power function, uniform, gamma, beta, Pareto, log-normal, Student's t, Cauchy and F distributions. We have discussed and introduced the continuous versions of the Pearson family, also found the log-concavity for this family in general cases, and then obtained the log-concavity property for each distribution that is a member of Pearson family. For the Burr family these cases have been calculated, even for each distribution that belongs to Burr family. Also, log-concavity results for distributions such as generalized gamma distributions, Feller-Pareto distributions, generalized Inverse Gaussian distributions and generalized Log-normal distributions have been obtained.

  17. Atmospheric Entry Studies for Venus Missions: 45 deg Sphere-Cone Rigid Aeroshells and Ballistic Entries

    Prabu, Dinesh K.; Allen, Gary A., Jr.; Cappuccio, Gelsomina; Spilker, Thomas R.; Hwang, Helen H.; Moses, Robert W.


    The present study considers ballistic entries into the atmosphere of Venus using a 45deg sphere-cone rigid aeroshell, a legacy shape that has been used successfully in the past in the Pioneer Venus Multiprobe Mission. For a number of entry mass and capsule diameter combinations (i.e., various ballistic coefficients) and entry velocities, the trajectory space in terms of entry flight path angles between skip out and -30 is explored with a 3DOF trajectory code, TRAJ. Assuming that the thermal protection material of choice is carbon phenolic of flight heritage, the entry flight path angle space is constrained a posteriori by the mechanical and thermal performance parameters of the material. For mechanical performance, a 200 g limit is placed on the peak deceleration load and 10 bar is assumed as the limit for heritage carbon-phenolic material. It is shown that both constraints cannot be active simultaneously. For thermal performance, a heat flux 2.5 kW/sq cm is utilized as a threshold below which the heritage carbon phenolic is considered mass inefficient. Using these constraints, viable entry flight path angle corridors are determined. Analysis of the results also hints at the existence of a range of "critical" ballistic coefficients beyond which the steepest possible entries are determined by the pressure limit of 10 bar. The results are verified against known performance of the various probes used in the Pioneer Venus mission. It is anticipated that the results presented here will serve as a baseline in the development of a new class of ablative materials for future Venus missions.

  18. Attacking 22 entries in rugby union: running demands and differences between successful and unsuccessful entries.

    Tierney, P; Tobin, D P; Blake, C; Delahunt, E


    Global Positioning System (GPS) technology is commonly utilized in team sports, including rugby union. It has been used to describe the average running demands of rugby union. This has afforded an enhanced understanding of the physical fitness requirements for players. However, research in team sports has suggested that training players relative to average demands may underprepare them for certain scenarios within the game. To date, no research has investigated the running demands of attacking 22 entries in rugby union. Additionally, no research has been undertaken to determine whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries in rugby union. The first aim of this study was to describe the running intensity of attacking 22 entries. The second aim of this study was to investigate whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries. Running intensity was measured using meters per minute (m min -1 ) for (a) total distance, (b) running distance, (c) high-speed running distance, and (d) very high-speed running distance. This study provides normative data for the running intensity of attacking 22 entries in rugby union. Forwards achieved greater high-speed running intensity in successful (3.6 m min -1 ) compared to unsuccessful (1.8 m min -1 ) attacking 22 entries. Forwards should try and achieve greater high-speed running intensity in attacking 22 entries to increase the likelihood of successful outcomes during this period of gameplay. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  19. Influence of borehole-eccentred tools on wireline and logging-while-drilling sonic logging measurements

    Pardo, David


    We describe a numerical study to quantify the influence of tool-eccentricity on wireline (WL) and logging-while-drilling (LWD) sonic logging measurements. Simulations are performed with a height-polynomial-adaptive (hp) Fourier finite-element method that delivers highly accurate solutions of linear visco-elasto-acoustic problems in the frequency domain. The analysis focuses on WL instruments equipped with monopole or dipole sources and LWD instruments with monopole excitation. Analysis of the main propagation modes obtained from frequency dispersion curves indicates that the additional high-order modes arising as a result of borehole-eccentricity interfere with the main modes (i.e., Stoneley, pseudo-Rayleigh and flexural). This often modifies (decreases) the estimation of shear and compressional formation velocities, which should be corrected (increased) to account for borehole-eccentricity effects. Undesired interferences between different modes can occur at different frequencies depending upon the properties of the formation and fluid annulus size, which may difficult the estimation of the formation velocities. © 2013 European Association of Geoscientists & Engineers.

  20. Lithologic log and interpretation of instrument logs NURE project, Carson Sink, Nevada, borehole

    Horton, R.C.


    No uranium mineralization was penetrated by the drilling. The uranium content of the rock units are within the usual range for unmineralized rocks of the types penetrated. Although the instrument logs indicated ample porosity in the sedimentary section, drill-stem tests in the intervals 699 to 722 ft, 3,692 to 3,734 ft, and 3,920 to 3,995 ft failed to recover any formation fluid. The instrument logs generally indicated low porosity and permeability in the volcanic rocks. The low permeability may have prohibited the circulation of ground water and possible supergene enrichment. The Carson Sink is a closed basin and all water is lost by evaporation, although there may be minor subsurface interbasin transfer. As the basin subsided dense connate water (brines) may have been trapped within the sediments making circulation of less dense water impossible. At present, nonsaline water is found only at shallow depths and is underlain by saline water. The hydrologic regime of the basin is complex and general assumptions should be made with care. Detailed analysis of hydrologic data may reveal zones of deep circulation. Reducing conditions, as evidenced by thin beds of organic rich material and pyrite, are present at depth. However, the unconsolidated sediments are young (Pleistocene to Recent) and perhaps too youthful for substantial mineralization to have occurred. No further deep drilling is recommended until the complex prehistoric hydrologic regime is studied. The study should include the geologic structural history of the basin and influence of Pleistocene and earlier pluvial cycles

  1. [Metabolic acidosis].

    Regolisti, Giuseppe; Fani, Filippo; Antoniotti, Riccardo; Castellano, Giuseppe; Cremaschi, Elena; Greco, Paolo; Parenti, Elisabetta; Morabito, Santo; Sabatino, Alice; Fiaccadori, Enrico


    Metabolic acidosis is frequently observed in clinical practice, especially among critically ill patients and/or in the course of renal failure. Complex mechanisms are involved, in most cases identifiable by medical history, pathophysiology-based diagnostic reasoning and measure of some key acid-base parameters that are easily available or calculable. On this basis the bedside differential diagnosis of metabolic acidosis should be started from the identification of the two main subtypes of metabolic acidosis: the high anion gap metabolic acidosis and the normal anion gap (or hyperchloremic) metabolic acidosis. Metabolic acidosis, especially in its acute forms with elevated anion gap such as is the case of lactic acidosis, diabetic and acute intoxications, may significantly affect metabolic body homeostasis and patients hemodynamic status, setting the stage for true medical emergencies. The therapeutic approach should be first aimed at early correction of concurrent clinical problems (e.g. fluids and hemodynamic optimization in case of shock, mechanical ventilation in case of concomitant respiratory failure, hemodialysis for acute intoxications etc.), in parallel to the formulation of a diagnosis. In case of severe acidosis, the administration of alkalizing agents should be carefully evaluated, taking into account the risk of side effects, as well as the potential need of renal replacement therapy.

  2. Exporting Complex Digital Products: Motives and Entry Modes

    Rask, Morten


    When the product is digital, it will most often be distributed directly to the customer through the Internet, and therefore the entry modes, considered in this paper, are different flavors of the entry mode called direct export: Virtual export channel are generally understood as the entry mode fo...... for digital product providers. However other types of entry modes like what wee call direct digital export with F2F-sales, direct digital export with F2F-support and virtual sales subsidiary are entry modes that respond to a higher degree of pre- and after-sales complexity....

  3. Review of the Czubek--Jonas gamma-log program

    Matthews, M.


    Several gamma-ray logs were computer processed using the Czubek--Jones and DOE's MDDAT gamma-log programs. Both of these programs convert counts per second from the gamma-ray logs to percent eU 3 O 8 . The results of these programs were compared to each other and to the core analysis (percent U 3 O 8 ) of the logged boreholes. The two gamma-log programs produced similar results. The core analysis did not compare favorably with the results of either gamma-log program. This unfavorable comparison is probably due to an incorrect assumption of secular equilibrium for the ore surrounding the boreholes. The Czubek--Jonas program requires a knowledge of the linear attenuation coefficient of the rocks surrounding a borehole. This limits the usefulness of the program because this coefficient is generally not known and varies for different gamma-ray energies. It is recommended that the MDDAT program continue to be used for estimating the grade (percent eU 3 O 8 ) from gamma-log data and not be replaced by the Czubek--Jonas program

  4. Dual detector neutron lifetime log: theory and practical applications

    Serpas, C.J.; Wichmann, P.A.; Fertl, W.H.; DeVries, M.R.; Rndall, R.R.


    The Neutron Lifetime Log instrumentation has continued to evolve and now is equipped with dual detectors for increased ease in gas detection and also a ratio response for a simultaneous porosity determination. A good deal of experimentation was involved to minimize both lithology and salinity effects on the porosity indication. This paper contains a discussion of the theory and concepts related to the application of the Dual Detector Neutron Lifetime Log (DNLL). It is important to note that with these advances the recording of thermal neutron capture cross section (Σ) remains consistent with the past measurements of earlier generations of instruments as the most accurate determination of this parameter. A number of field examples of the newly logged results are shown. These field cases include Dual Detector NLL's run thru the drill strings of highly deviated holes when difficulties were encountered in getting conventional open hole logs to bottom, logs thru open perforations and hot radioactive zones, comparisons of the large and small diameter instruments, logs with anomalous fluids in the annulus, logs thru multiple casing strings, and a number of other examples

  5. Numerical simulation of responses for cased-hole density logging

    Wu, Wensheng; Fu, Yaping; Niu, Wei


    Stabilizing or stimulating oil production in old oil fields requires density logging in cased holes where open-hole logging data are either missing or of bad quality. However, measured values from cased-hole density logging are more severely influenced by factors such as fluid, casing, cement sheath and the outer diameter of the open-hole well compared with those from open-hole logging. To correctly apply the cased-hole formation density logging data, one must eliminate these influences on the measured values and study the characteristics of how the cased-hole density logging instrument responds to these factors. In this paper, a Monte Carlo numerical simulation technique was used to calculate the responses of the far detector of a cased-hole density logging instrument to in-hole fluid, casing wall thickness, cement sheath density and the formation and thus to obtain influence rules and response coefficients. The obtained response of the detector is a function of in-hole liquid, casing wall thickness, the casing's outer diameter, cement sheath density, open-hole well diameter and formation density. The ratio of the counting rate of the detector in the calibration well to that in the measurement well was used to get a fairly simple detector response equation and the coefficients in the equation are easy to acquire. These provide a new way of calculating cased-hole density through forward modelling methods. (paper)

  6. Extracting the Textual and Temporal Structure of Supercomputing Logs

    Jain, S; Singh, I; Chandra, A; Zhang, Z; Bronevetsky, G


    Supercomputers are prone to frequent faults that adversely affect their performance, reliability and functionality. System logs collected on these systems are a valuable resource of information about their operational status and health. However, their massive size, complexity, and lack of standard format makes it difficult to automatically extract information that can be used to improve system management. In this work we propose a novel method to succinctly represent the contents of supercomputing logs, by using textual clustering to automatically find the syntactic structures of log messages. This information is used to automatically classify messages into semantic groups via an online clustering algorithm. Further, we describe a methodology for using the temporal proximity between groups of log messages to identify correlated events in the system. We apply our proposed methods to two large, publicly available supercomputing logs and show that our technique features nearly perfect accuracy for online log-classification and extracts meaningful structural and temporal message patterns that can be used to improve the accuracy of other log analysis techniques.

  7. Sample size calculation in metabolic phenotyping studies.

    Billoir, Elise; Navratil, Vincent; Blaise, Benjamin J


    The number of samples needed to identify significant effects is a key question in biomedical studies, with consequences on experimental designs, costs and potential discoveries. In metabolic phenotyping studies, sample size determination remains a complex step. This is due particularly to the multiple hypothesis-testing framework and the top-down hypothesis-free approach, with no a priori known metabolic target. Until now, there was no standard procedure available to address this purpose. In this review, we discuss sample size estimation procedures for metabolic phenotyping studies. We release an automated implementation of the Data-driven Sample size Determination (DSD) algorithm for MATLAB and GNU Octave. Original research concerning DSD was published elsewhere. DSD allows the determination of an optimized sample size in metabolic phenotyping studies. The procedure uses analytical data only from a small pilot cohort to generate an expanded data set. The statistical recoupling of variables procedure is used to identify metabolic variables, and their intensity distributions are estimated by Kernel smoothing or log-normal density fitting. Statistically significant metabolic variations are evaluated using the Benjamini-Yekutieli correction and processed for data sets of various sizes. Optimal sample size determination is achieved in a context of biomarker discovery (at least one statistically significant variation) or metabolic exploration (a maximum of statistically significant variations). DSD toolbox is encoded in MATLAB R2008A (Mathworks, Natick, MA) for Kernel and log-normal estimates, and in GNU Octave for log-normal estimates (Kernel density estimates are not robust enough in GNU octave). It is available at, with a tutorial at © The Author 2015. Published by Oxford University Press. For Permissions, please email:

  8. Construction and validation of a Tamil logMAR chart.

    Varadharajan, Srinivasa; Srinivasan, Krithica; Kumaresan, Brindha


    To design, construct and validate a new Tamil logMAR visual acuity chart based on current recommendations. Ten Tamil letters of equal legibility were identified experimentally and were used in the chart. Two charts, one internally illuminated and one externally illuminated, were constructed for testing at 4 m distance. The repeatability of the two charts was tested. For validation, the two charts were compared with a standard English logMAR chart (ETDRS). When compared to the ETDRS chart, a difference of 0.06 +/- 0.07 and 0.07 +/- 0.07 logMAR was found for the internally and externally illuminated charts respectively. Limits of agreement between the internally illuminated Tamil logMAR chart and ETDRS chart were found to be (-0.08, 0.19), and (-0.07, 0.20) for the externally illuminated chart. The test - retest results showed a difference of 0.02 +/- 0.04 and 0.02 +/- 0.06 logMAR for the internally and externally illuminated charts respectively. Limits of agreement for repeated measurements for the internally illuminated Tamil logMAR chart were found to be (-0.06, 0.10), and (-0.10, 0.14) for the externally illuminated chart. The newly constructed Tamil logMAR charts have good repeatability. The difference in visual acuity scores between the newly constructed Tamil logMAR chart and the standard English logMAR chart was within acceptable limits. This new chart can be used for measuring visual acuity in the literate Tamil population.

  9. Analysis and Optimization of Entry Stability in Underground Longwall Mining

    Yubing Gao


    Full Text Available For sustainable utilization of limited coal resources, it is important to increase the coal recovery rate and reduce mine accidents, especially those occurring in the entry (gateroad. Entry stabilities are vital for ventilation, transportation and other essential services in underground coal mining. In the present study, a finite difference model was built to investigate stress evolutions around the entry, and true triaxial tests were carried out at the laboratory to explore entry wall stabilities under different mining conditions. The modeling and experimental results indicated that a wide coal pillar was favorable for entry stabilities, but oversize pillars caused a serious waste of coal resources. As the width of the entry wall decreased, the integrated vertical stress, induced by two adjacent mining panels, coupled with each other and experienced an increase on the entry wall, which inevitably weakened the stability of the entry. Therefore, mining with coal pillars always involves a tradeoff between economy and safety. To address this problem, an innovative non-pillar mining technique by optimizing the entry surrounding structures was proposed. Numerical simulation showed that the deformation of the entry roof decreased by approximately 66% after adopting the new approach, compared with that using the conventional mining method. Field monitoring indicated that the stress condition of the entry was significantly improved and the average roof pressure decreased by appropriately 60.33% after adopting the new technique. This work provides an economical and effective approach to achieve sustainable exploitation of underground coal resources.

  10. Drug Metabolism

    Home; Journals; Resonance – Journal of Science Education; Volume 19; Issue 3. Drug Metabolism: A Fascinating Link Between Chemistry and Biology. Nikhil Taxak Prasad V Bharatam. General Article Volume 19 Issue 3 March 2014 pp 259-282 ...

  11. Drug Metabolism

    IAS Admin

    behind metabolic reactions, importance, and consequences with several ... required for drug action. ... lism, which is catalyzed by enzymes present in the above-men- ... catalyze the transfer of one atom of oxygen to a substrate produc-.

  12. Competitive Dynamics of Market Entry: Scale and Survival

    John W. UPSON


    Full Text Available Market entry is the essence of strategy and is largely viewed as a dichotomous event: entry or no entry. What has not been acknowledged is the uniqueness of each market entry. Our study highlights the scale of market entry in the context of multipoint competition. We assert that entry scale varies based on the risk of market incumbent retaliation. Theory suggests that when risk associated with retaliation are low, firms enter with large scale and when associated risks are high, firms enter with low scale. Further, survival is viewed as dependent on following theory. We argue and find supporting evidence that firms behave in the opposite manner and do so to their own benefit, thereby revealing a unique discrepancy between theory and practice among 75 product market entries by 27 firms.

  13. Hepatitis C virus utilizes VLDLR as a novel entry pathway.

    Ujino, Saneyuki; Nishitsuji, Hironori; Hishiki, Takayuki; Sugiyama, Kazuo; Takaku, Hiroshi; Shimotohno, Kunitada


    Various host factors are involved in the cellular entry of hepatitis C virus (HCV). In addition to the factors previously reported, we discovered that the very-low-density lipoprotein receptor (VLDLR) mediates HCV entry independent of CD81. Culturing Huh7.5 cells under hypoxic conditions significantly increased HCV entry as a result of the expression of VLDLR, which was not expressed under normoxic conditions in this cell line. Ectopic VLDLR expression conferred susceptibility to HCV entry of CD81-deficient Huh7.5 cells. Additionally, VLDLR-mediated HCV entry was not affected by the knockdown of cellular factors known to act as HCV receptors or HCV entry factors. Because VLDLR is expressed in primary human hepatocytes, our results suggest that VLDLR functions in vivo as an HCV receptor independent of canonical CD81-mediated HCV entry.

  14. Geothermal well log interpretation state of the art. Final report

    Sanyal, S.K.; Wells, L.E.; Bickham, R.E.


    An in-depth study of the state of the art in Geothermal Well Log Interpretation has been made encompassing case histories, technical papers, computerized literature searches, and actual processing of geothermal wells from New Mexico, Idaho, and California. A classification scheme of geothermal reservoir types was defined which distinguishes fluid phase and temperature, lithology, geologic province, pore geometry, salinity, and fluid chemistry. Major deficiencies of Geothermal Well Log Interpretation are defined and discussed with recommendations of possible solutions or research for solutions. The Geothermal Well Log Interpretation study and report has concentrated primarily on Western US reservoirs. Geopressured geothermal reservoirs are not considered.

  15. Application of computer data processing of well logging in Azerbaijan

    Vorob'ev, Yu.A.; Shilov, G.Ya.; Samedova, A.S.


    Transition from the mannal quantitative interpretation of materials of well-logging study (WLS) to application of computer in production association (PA) Azneftegeologiya is described. WLS materials were processed manually in PA till 1986. Later on interpretation was conducted with the use of computer in order to determine clayiness, porosity, oil and gas saturation, fluid of strata. Examples of presentation of results of computer interpretation of WLS data (including gamma-logging and neutron-gamma-logging) for determining porosity and oil saturation of sandy mudrocks are given

  16. Screening efficacy of a simplified logMAR chart

    Naganathan Muthuramalingam


    Aim: This study evaluates the efficacy of a simplified logMAR chart, designed for VA testing over the conventional Snellen chart, in a school-based vision-screening programme. Methods: We designed a simplified logMAR chart by employing the principles of the Early Treatment Diabetic Retinopathy Study (ETDRS chart in terms of logarithmic letter size progression, inter-letter spacing, and inter-line spacing. Once the simplified logMAR chart was validated by students in the Elite school vision-screening programme, we set out to test the chart in 88 primary and middle schools in the Tiruporur block of Kancheepuram district in Tamil Nadu. One school teacher in each school was trained to screen a cross-sectional population of 10 354 primary and secondary school children (girls: 5488; boys: 4866 for VA deficits using a new, simplified logMAR algorithm. An experienced paediatric optometrist was recruited to validate the screening methods and technique used by the teachers to collect the data. Results: The optometrist screened a subset of 1300 school children from the total sample. The optometrist provided the professional insights needed to validate the clinical efficacy of the simplified logMAR algorithm and verified the reliability of the data collected by the teachers. The mean age of children sampled for validation was 8.6 years (range: 9–14 years. The sensitivity and the specificity of the simplified logMAR chart when compared to the standard logMAR chart were found to be 95% and 98%, respectively. Kappa value was 0.97. Sensitivity of the teachers’ screening was 66.63% (95% confidence interval [CI]: 52.73–77.02 and the specificity was 98.33% (95% CI: 97.49–98.95. Testing of VA was done under substandard illumination levels in 87% of the population. A total of 10 354 children were screened, 425 of whom were found to have some form of visual and/or ocular defect that was identified by the teacher or optometrist. Conclusion: The simplified logMAR testing algorithm

  17. Perfil logístico del sector cemento en Colombia

    Hernández Calderón, Miguel Ángel; Nieves de la Hoz, Celia Elena


    Este proyecto caracteriza la logística del sector cemento en Colombia al identificar y describir los principales actores, procesos y materiales involucrados en la cadena de suministros del sector. Este documento compila la información logística relevante para la producción de cemento en Colombia. Esta información se obtuvo sintetizando estudios y reportes acerca de las prácticas logísticas y las condiciones en las que éstas se desarrollan. Adicionalmente se realizaron visitas empresariales en...

  18. Development of interpretation models for PFN uranium log analysis

    Barnard, R.W.


    This report presents the models for interpretation of borehole logs for the PFN (Prompt Fission Neutron) uranium logging system. Two models have been developed, the counts-ratio model and the counts/dieaway model. Both are empirically developed, but can be related to the theoretical bases for PFN analysis. The models try to correct for the effects of external factors (such as probe or formation parameters) in the calculation of uranium grade. The theoretical bases and calculational techniques for estimating uranium concentration from raw PFN data and other parameters are discussed. Examples and discussions of borehole logs are included

  19. Nuclear cross section library for oil well logging analysis

    Kodeli, I.; Kitsos, S.; Aldama, D.L.; Zefran, B.


    As part of the IRTMBA (Improved Radiation Transport Modelling for Borehole Applications) Project of the EU Community's 5 th Programme a special purpose multigroup cross section library to be used in the deterministic (as well as Monte Carlo) oil well logging particle transport calculations was prepared. This library is expected to improve the prediction of the neutron and gamma spectra at the detector positions of the logging tool, and their use for the interpretation of the neutron logging measurements was studied. Preparation and testing of this library is described. (author)

  20. Physical and measuring principles of nuclear well logging techniques

    Loetzsch, U.; Winkler, R.


    Proceeding from the general task of nuclear geophysics as a special discipline of applied geophyscis, the essential physical problems of nuclear well logging techniques are considered. Particularly, the quantitative relationship between measured values and interesting geologic parameters to be determined are discussed taking into account internal and external perturbation parameters. Resulting from this study, the technological requirements for radiation sources and their shielding, for detectors, electronic circuits in logging tools, signal transmission by cable and recording equipment are derived, and explained on the basis of examples of gamma-gamma and neutron-neutron logging. (author)

  1. Metabolism and toxicology of the uranium compounds

    Salomon, A.P.


    Three important points to be considered in the metabolic behaviour of uranium are: 1) ionic behaviour which depends only on its chemical characteristics; 2) behaves in the organism as a unique element and has no metabolism similar to others like for example Sr-90 and Ba-140 which are akin to Ca; and 3) metabolism is identical for the three isotopes of uranium and has no isotopic effect. The metabolic decomposition undergoes three phases namely: 1) absorption of the components up to the blood streams; 2) distribution through the blood into the organs; and 3) elimination. The mode of entry in the organism is through inhalation, ingestion, wounds, absorption through the skin, and entry by the eyes. Uranium decomposes in the blood after its entry, disperses in the extracellular medium and deposits in the different organs of the body. However, it has no definite fixation and the different compartments are always in equilibrium with each other. Elimination of contamination is through the feces and urine. In case of massive absorption, that is either acute or sub-acute toxicity, the following are the subsequent effects: a) clinical effects major lesion in the kidneys whatever the mode of entry may be and feebleness of the muscles, apathy and nausea are noted; b) lesions in the renal region-yellowish gray in the medular and critical region; c) biological effects-appearance of proteinuria and catalysuria, cellular wastes in the urine and a change in the capacity to reabsorb Na + , Cl - , and glucose. The lethal dose is 1 mg U-nat/kg.wt. The dose provoking renal lesion is 0.1mg U/kg.wt. The maximum permissible dose is: a) annual dose 40 mg U-nat/yr; b) Inhalation 2.5 mg/day; c) Ingestion 150 mg/2 days consecutive (soluble = 4.7x10 -1 μCi, insoluble = 3.4x10 -2 μCi

  2. Metabolic Myopathies.

    Tarnopolsky, Mark A


    Metabolic myopathies are genetic disorders that impair intermediary metabolism in skeletal muscle. Impairments in glycolysis/glycogenolysis (glycogen-storage disease), fatty acid transport and oxidation (fatty acid oxidation defects), and the mitochondrial respiratory chain (mitochondrial myopathies) represent the majority of known defects. The purpose of this review is to develop a diagnostic and treatment algorithm for the metabolic myopathies. The metabolic myopathies can present in the neonatal and infant period as part of more systemic involvement with hypotonia, hypoglycemia, and encephalopathy; however, most cases present in childhood or in adulthood with exercise intolerance (often with rhabdomyolysis) and weakness. The glycogen-storage diseases present during brief bouts of high-intensity exercise, whereas fatty acid oxidation defects and mitochondrial myopathies present during a long-duration/low-intensity endurance-type activity or during fasting or another metabolically stressful event (eg, surgery, fever). The clinical examination is often normal between acute events, and evaluation involves exercise testing, blood testing (creatine kinase, acylcarnitine profile, lactate, amino acids), urine organic acids (ketones, dicarboxylic acids, 3-methylglutaconic acid), muscle biopsy (histology, ultrastructure, enzyme testing), MRI/spectroscopy, and targeted or untargeted genetic testing. Accurate and early identification of metabolic myopathies can lead to therapeutic interventions with lifestyle and nutritional modification, cofactor treatment, and rapid treatment of rhabdomyolysis.

  3. Animal metabolism

    Walburg, H.E.


    Studies on placental transport included the following: clearance of tritiated water as a baseline measurement for transport of materials across perfused placentas; transport of organic and inorganic mercury across the perfused placenta of the guinea pig in late gestation; and transport of cadmium across the perfused placenta of the guinea pig in late gestation. Studies on cadmium absorption and metabolism included the following: intestinal absorption and retention of cadmium in neonatal rats; uptake and distribution of an oral dose of cadmium in postweanling male and female, iron-deficient and normal rats; postnatal viability and growth in rat pups after oral cadmium administration during gestation; and the effect of calcium and phosphorus on the absorption and toxicity of cadmium. Studies on gastrointestinal absorption and mineral metabolism included: uptake and distribution of orally administered plutonium complex compounds in male mice; gastrointestinal absorption of 144 Ce in the newborn mouse, rat, and pig; and gastrointestinal absorption of 95 Nb by rats of different ages. Studies on iodine metabolism included the following: influence of thyroid status and thiocyanate on iodine metabolism in the bovine; effects of simulated fallout radiation on iodine metabolism in dairy cattle; and effects of feeding iodine binding agents on iodine metabolism in the calf

  4. Aerothermodynamics of blunt body entry vehicles

    Hollis, Brian R.; Borrelli, Salvatore


    In this chapter, the aerothermodynamic phenomena of blunt body entry vehicles are discussed. Four topics will be considered that present challenges to current computational modeling techniques for blunt body environments: turbulent flow, non-equilibrium flow, rarefied flow, and radiation transport. Examples of comparisons between computational tools to ground and flight-test data will be presented in order to illustrate the challenges existing in the numerical modeling of each of these phenomena and to provide test cases for evaluation of computational fluid dynamics (CFD) code predictions.

  5. PDBsum: Structural summaries of PDB entries

    Laskowski, Roman A.; Jabłońska, Jagoda; Pravda, Lukáš; Vařeková, Radka Svobodová; Thornton, Janet M.


    Abstract PDBsum is a web server providing structural information on the entries in the Protein Data Bank (PDB). The analyses are primarily image‐based and include protein secondary structure, protein‐ligand and protein‐DNA interactions, PROCHECK analyses of structural quality, and many others. The 3D structures can be viewed interactively in RasMol, PyMOL, and a JavaScript viewer called 3Dmol.js. Users can upload their own PDB files and obtain a set of password‐protected PDBsum analyses for e...

  6. The Timing of Entry into New Markets

    Debra J. Aron


    Under what circumstances will a successful incumbent in a related market be the first to enter a new market? We present a model in which the order of entry into new markets has long run effects on the firms' profits. We assume that a firm that is successfully producing in a related market has valuable information about the demand in the new market. By his choice of location in product space in the new market the incumbent reveals information about the demand to the potential entrant. Thus, th...

  7. PDBsum: Structural summaries of PDB entries.

    Laskowski, Roman A; Jabłońska, Jagoda; Pravda, Lukáš; Vařeková, Radka Svobodová; Thornton, Janet M


    PDBsum is a web server providing structural information on the entries in the Protein Data Bank (PDB). The analyses are primarily image-based and include protein secondary structure, protein-ligand and protein-DNA interactions, PROCHECK analyses of structural quality, and many others. The 3D structures can be viewed interactively in RasMol, PyMOL, and a JavaScript viewer called 3Dmol.js. Users can upload their own PDB files and obtain a set of password-protected PDBsum analyses for each. The server is freely accessible to all at: © 2017 The Protein Society.

  8. Business entry and window of opportunity

    Tegtmeier, Silke; Kurczewska, Agnieszka


    with a positive influence, namely having an entrepreneurial role model and having attended seminars about starting a business. In our model, these factors support waiting longer before starting a business. In light of these results, we call for a more experimental approach in entrepreneurship education.......This paper explores the nascence period - the time between idea generation and business entry -among women entrepreneurs with a graduate degree. To address this research problem and to better understand the specifics of a window of opportunity, we combine selected theories of human and social...

  9. Methods for processing of pulsed neutron logging data

    Iskenderov, V.G.


    Conditions were examined for calculating the lifetime of thermal neutrons in neutron-neutron logging by selecting optimum values for the time lag. The dispersion and mean square error of the calculated lifetime values for thermal neutrons are evaluated

  10. Logging cuts the functional importance of invertebrates in tropical rainforest.

    Ewers, Robert M; Boyle, Michael J W; Gleave, Rosalind A; Plowman, Nichola S; Benedick, Suzan; Bernard, Henry; Bishop, Tom R; Bakhtiar, Effendi Y; Chey, Vun Khen; Chung, Arthur Y C; Davies, Richard G; Edwards, David P; Eggleton, Paul; Fayle, Tom M; Hardwick, Stephen R; Homathevi, Rahman; Kitching, Roger L; Khoo, Min Sheng; Luke, Sarah H; March, Joshua J; Nilus, Reuben; Pfeifer, Marion; Rao, Sri V; Sharp, Adam C; Snaddon, Jake L; Stork, Nigel E; Struebig, Matthew J; Wearn, Oliver R; Yusah, Kalsum M; Turner, Edgar C


    Invertebrates are dominant species in primary tropical rainforests, where their abundance and diversity contributes to the functioning and resilience of these globally important ecosystems. However, more than one-third of tropical forests have been logged, with dramatic impacts on rainforest biodiversity that may disrupt key ecosystem processes. We find that the contribution of invertebrates to three ecosystem processes operating at three trophic levels (litter decomposition, seed predation and removal, and invertebrate predation) is reduced by up to one-half following logging. These changes are associated with decreased abundance of key functional groups of termites, ants, beetles and earthworms, and an increase in the abundance of small mammals, amphibians and insectivorous birds in logged relative to primary forest. Our results suggest that ecosystem processes themselves have considerable resilience to logging, but the consistent decline of invertebrate functional importance is indicative of a human-induced shift in how these ecological processes operate in tropical rainforests.

  11. Logging cuts the functional importance of invertebrates in tropical rainforest

    Ewers, Robert M.; Boyle, Michael J. W.; Gleave, Rosalind A.; Plowman, Nichola S.; Benedick, Suzan; Bernard, Henry; Bishop, Tom R.; Bakhtiar, Effendi Y.; Chey, Vun Khen; Chung, Arthur Y. C.; Davies, Richard G.; Edwards, David P.; Eggleton, Paul; Fayle, Tom M.; Hardwick, Stephen R.; Homathevi, Rahman; Kitching, Roger L.; Khoo, Min Sheng; Luke, Sarah H.; March, Joshua J.; Nilus, Reuben; Pfeifer, Marion; Rao, Sri V.; Sharp, Adam C.; Snaddon, Jake L.; Stork, Nigel E.; Struebig, Matthew J.; Wearn, Oliver R.; Yusah, Kalsum M.; Turner, Edgar C.


    Invertebrates are dominant species in primary tropical rainforests, where their abundance and diversity contributes to the functioning and resilience of these globally important ecosystems. However, more than one-third of tropical forests have been logged, with dramatic impacts on rainforest biodiversity that may disrupt key ecosystem processes. We find that the contribution of invertebrates to three ecosystem processes operating at three trophic levels (litter decomposition, seed predation and removal, and invertebrate predation) is reduced by up to one-half following logging. These changes are associated with decreased abundance of key functional groups of termites, ants, beetles and earthworms, and an increase in the abundance of small mammals, amphibians and insectivorous birds in logged relative to primary forest. Our results suggest that ecosystem processes themselves have considerable resilience to logging, but the consistent decline of invertebrate functional importance is indicative of a human-induced shift in how these ecological processes operate in tropical rainforests. PMID:25865801

  12. Log-Normal Turbulence Dissipation in Global Ocean Models

    Pearson, Brodie; Fox-Kemper, Baylor


    Data from turbulent numerical simulations of the global ocean demonstrate that the dissipation of kinetic energy obeys a nearly log-normal distribution even at large horizontal scales O (10 km ) . As the horizontal scales of resolved turbulence are larger than the ocean is deep, the Kolmogorov-Yaglom theory for intermittency in 3D homogeneous, isotropic turbulence cannot apply; instead, the down-scale potential enstrophy cascade of quasigeostrophic turbulence should. Yet, energy dissipation obeys approximate log-normality—robustly across depths, seasons, regions, and subgrid schemes. The distribution parameters, skewness and kurtosis, show small systematic departures from log-normality with depth and subgrid friction schemes. Log-normality suggests that a few high-dissipation locations dominate the integrated energy and enstrophy budgets, which should be taken into account when making inferences from simplified models and inferring global energy budgets from sparse observations.

  13. Irrationality measures of $\\log 2$ and $\\pi/\\sqrt{3}$

    Brisebarre, Nicolas


    Using a class of polynomials that generalizes Legendre polynomials, we unify previous works of E. A. Rukhadze, A. K. Dubitskas, M. Hata, D. V. and G. V. Chudnovsky about irrationality measures of $\\log 2$ and $\\pi/\\sqrt{3}$

  14. Logging technique for assaying for uranium in rocks

    Givens, W.W.


    A uranium exploration technique is described for determining the uranium content of a formation traversed by borehole. A delayed fission neutron assay log is obtained by irradiating the formation with repetitive bursts of fast neutrons and detecting delayed neutrons resulting from neutron fission of uranium at time intervals between the fast neutron bursts and after dissipation of the neutrons originating in the bursts. In addition, a response log is obtained by irradiating the formation with a source of fast neutrons whereby the neutrons from this source are moderated in the formation to lower energy levels and are subject to absorption. Secondary radiation attendant to these lower energy neutrons is recorded in order to obtain a log representative of the response of the formation to moderation and absorption of the neutrons. The two logs thus obtained are correlated in order to determine a corrected value of uranium content of the formation. (author)

  15. Cross-system log file analysis for hypothesis testing

    Glahn, Christian


    Glahn, C. (2008). Cross-system log file analysis for hypothesis testing. Presented at Empowering Learners for Lifelong Competence Development: pedagogical, organisational and technological issues. 4th TENCompetence Open Workshop. April, 10, 2008, Madrid, Spain.

  16. Modelling discontinuous well log signal to identify lithological ...

    1Indian School of Mines (ISM), Dhanbad 826 004, India. ... new wavelet transform-based algorithm to model the abrupt discontinuous changes from well log data by taking care of ...... the 11th ACM International Conference on Multimedia,.

  17. Assessment of procurement systems for unutilized logging residues ...

    ... in the forest after clear-cutting operation with cutto- length harvesting method. ... as system-2 can be preferable for the initial supply chain configuration in Turkey. ... Key words: logging residue, forest biomass, chipping, supply cost, biomass ...

  18. Midwest Logging Firm Perspectives: Harvesting on Increasingly Parcelized Forestlands

    Shorna Allred


    Full Text Available Loggers play a critical role in the sustainable production of wood and paper products, and harvesting activities contribute to economic health and viability of many Upper Midwest communities in the United States. If the logging sector is unable to procure wood efficiently and economically from an increasingly parcelized land base, the competitive ability of the forest industry could be jeopardized. Little is known about the functions of the logging sector related to the forest resource land base on which they depend, and it is imperative to improve our understanding of this important part of the forest industry. The purpose of this study was to determine prospective attitudes about the future of the logging industry and how trends in forestland parcelization and harvesting mechanization are impacting the logging industry, especially as it relates to smaller tracts of land.

  19. Log-concave Probability Distributions: Theory and Statistical Testing

    An, Mark Yuing


    This paper studies the broad class of log-concave probability distributions that arise in economics of uncertainty and information. For univariate, continuous, and log-concave random variables we prove useful properties without imposing the differentiability of density functions. Discrete...... and multivariate distributions are also discussed. We propose simple non-parametric testing procedures for log-concavity. The test statistics are constructed to test one of the two implicati ons of log-concavity: increasing hazard rates and new-is-better-than-used (NBU) property. The test for increasing hazard...... rates are based on normalized spacing of the sample order statistics. The tests for NBU property fall into the category of Hoeffding's U-statistics...

  20. A Method for Visualizing Transaction Logs of a Faceted OPAC

    Xi Niu


    Full Text Available The authors introduce a method for visualizing user transaction logs from a library catalog application. Simple visualization supporting intuitive or qualitative analysis to quickly make sense of complicated patterns can be a useful supplement or alternative to more common quantitative analysis. To this end, a visual flowchart is created illustrating an individual user session. This visualization can be used to qualitatively grasp user behavior within the application, possibly as an aid to identifying patterns or clusters of use. These flowcharts are created by automatically pre-processing apache transaction logs into an XML representation of meaningful user actions, which are then converted via JavaScript in a web browser to HTML table based flowcharts. The particular toolkit introduced is named Visualization for Understanding Transaction Logs (VUTL, and is available with an open source license. The toolkit has been prototyped with logs from the catalog applications of several academic and one public library.

  1. Ordinal Log-Linear Models for Contingency Tables

    Brzezińska Justyna


    Full Text Available A log-linear analysis is a method providing a comprehensive scheme to describe the association for categorical variables in a contingency table. The log-linear model specifies how the expected counts depend on the levels of the categorical variables for these cells and provide detailed information on the associations. The aim of this paper is to present theoretical, as well as empirical, aspects of ordinal log-linear models used for contingency tables with ordinal variables. We introduce log-linear models for ordinal variables: linear-by-linear association, row effect model, column effect model and RC Goodman’s model. Algorithm, advantages and disadvantages will be discussed in the paper. An empirical analysis will be conducted with the use of R.

  2. Logging, arboricide treatments and regeneration at Budongo Forest

    activity was gradually replaced by the taungya system introduced in ... of this study were to: (i) assess the impact of past logging and arboricide .... effects on Budongo forest. ..... Large size individuals such as Croton, Cordia milenii and.

  3. Opportunities to reduce risk associated with nuclear logging techniques

    Wraight, P.D.; Robinson, E.; de Fleurieu, R.


    Nuclear logging provides petroleum exploration and production companies with data that are critical to their decisions and operations. Because this type data is so important, environmentally conscious well-logging and service companies are constantly reviewing the risks to people and environment associated with nuclear sources with the ALARA (as low as reasonably achievable) principle in mind. Opportunities to additionally reduce risks, which can be accomplished only with the active involvement of oil companies, are proposed in this paper

  4. Fluid-Rock Characterization and Interactions in NMR Well Logging

    Hirasaki, George J.; Mohanty, Kishore K.


    The objective of this project was to characterize the fluid properties and fluid-rock interactions which are needed for formation evaluation by NMR well logging. NMR well logging is finding wide use in formation evaluation. The formation parameters commonly estimated were porosity, permeability, and capillary bound water. Special cases include estimation of oil viscosity, residual oil saturation, location of oil/water contact, and interpretation on whether the hydrocarbon is oil or gas.

  5. Some properties of the log-Laplace distribution

    Uppuluri, V.R.R.


    A random variable Y is said to have the Laplace distribution or the double exponential distribution whenever its probability density function is given by lambda exp(-lambda abs. value y), where -infinity 0. The random variable X = exp(Y) is said to have the log-Laplace distribution. With the problem of extrapolation to low doses in dose response curves as motivation, an axiomatic characterization of the log-Laplace distribution is obtained. 1 figure

  6. Development of slimline logging systems for coal and mineral exploration

    Reeves, D.R.


    Recently, interest shown by multinational oil companies in mining prospecting has led to the requirement for more sophisticated slimline logging units, capable of given comparable results to conventional systems. Aspects of operating conditions and logging requirements are discussed, with particular reference to the effect on equipment design. Special consideration is given to the design and calibration of gamma ray, density, neutron, caliper and resistivity tools. Methods of handling data are discussed and the general application of these techniques to mineral work is considered

  7. MCEM algorithm for the log-Gaussian Cox process

    Delmas, Celine; Dubois-Peyrard, Nathalie; Sabbadin, Regis


    Log-Gaussian Cox processes are an important class of models for aggregated point patterns. They have been largely used in spatial epidemiology (Diggle et al., 2005), in agronomy (Bourgeois et al., 2012), in forestry (Moller et al.), in ecology (sightings of wild animals) or in environmental sciences (radioactivity counts). A log-Gaussian Cox process is a Poisson process with a stochastic intensity depending on a Gaussian random eld. We consider the case where this Gaussian random eld is ...

  8. Data logging and online reconstruction in H1

    Fuhrmann, P.; Gerhards, R.; Kruener-Marquis, U.; Olsson, J.E.; Szkutnik, Z.


    In spring 1992, the H1 detector at the HERA electron proton collider at DESY came into operation. The high bunch crossing rate and, correspondingly, the large data volumes are placing demanding requirements on the data logging and event reconstruction. Both tasks are performed on an SGI Challenge series computer. This note reviews the development and the experience with the data logging and online reconstruction in H1

  9. Some properties of the log-Laplace distribution

    Uppuluri, V.R.R.


    A random variable γ is said to have the Laplace distribution or the double exponential distribution whenever its probability density function is given by lambda exp(-lambda absolute value (y)), where -infinity 0. The random variable X = exp(γ) is said to have the log-Laplace distribution. With the problem of extrapolation to low doses in dose response curves as a motivation, an axiomatic characterization of the log-Laplace distribution is obtained. 1 figure

  10. Log-periodic self-similarity: an emerging financial law?

    S. Drozdz; F. Grummer; F. Ruf; J. Speth


    A hypothesis that the financial log-periodicity, cascading self-similarity through various time scales, carries signatures of a law is pursued. It is shown that the most significant historical financial events can be classified amazingly well using a single and unique value of the preferred scaling factor lambda=2, which indicates that its real value should be close to this number. This applies even to a declining decelerating log-periodic phase. Crucial in this connection is identification o...

  11. Fluid-Rock Characterization and Interactions in NMR Well Logging

    Hirasaki, George J.; Mohanty, Kishore K.


    The objective of this project was to characterize the fluid properties and fluid-rock interactions that are needed for formation evaluation by NMR well logging. The advances made in the understanding of NMR fluid properties are summarized in a chapter written for an AAPG book on NMR well logging. This includes live oils, viscous oils, natural gas mixtures, and the relation between relaxation time and diffusivity.

  12. Make Log Yield Analysis Part of Your Daily Routine

    Jan Wiedenbeck; Jeff Palmer; Robert Mayer


    You haven't been conducting regular log yield studies because you don't have extra people to assign to the task. Besides, you've been around sawmills your whole life and have an innate sense of how your logs are yielding relative to the price you paid for them. Right? At the USDA Forest Service's hardwood marketing and utilization research lab in...

  13. Potential cellular receptors involved in hepatitis C virus entry into cells

    Muellhaupt Beat


    Full Text Available Abstract Hepatitis C virus (HCV infects hepatocytes and leads to permanent, severe liver damage. Since the genomic sequence of HCV was determined, progress has been made towards understanding the functions of the HCV-encoded proteins and identifying the cellular receptor(s responsible for adsorption and penetration of the virus particle into the target cells. Several cellular receptors for HCV have been proposed, all of which are associated with lipid and lipoprotein metabolism. This article reviews the cellular receptors for HCV and suggests a general model for HCV entry into cells, in which lipoproteins play a crucial role.

  14. Mitigating Hillslope Erosion After Post-fire Salvage Logging Operations

    Robichaud, P. R.; Bone, E. D.; Brown, R. E.


    In the past decades, wildfires around the world have continued to increase in size, severity, and cost. Major concerns after wildfires are the increased runoff and erosion due to loss of the protective forest floor layer, loss of water storage, and creation of water repellent soil conditions. Salvage logging is often a post-fire forest management action to recoup the economic loss of the burned timber, yet concerns arise on the impacts of this activity on water quality. Recently, several studies have been conducted to determine the effect of salvage logging on hillslope erosion. Logging skid trails have been cited as being the cause of high erosion during and after salvage operations. We investigated the impacts of adding operational logging slash to skid trails to reduce hillslope erosion after salvage operations on the 2015 North Star Fire, Washington. We implemented well-designed rapid response approach to compare slash treatment effectiveness by monitoring sediment yield and runoff response from hillslopes with a concentrated flow (rill) experiment. Various runoff amounts are incrementally added to 4 m hillslope plots with and without slash treatments. Our initial results suggest that adding logging slash increased ground cover significantly which contributed to an order of magnitude decrease in hillslope erosion. Integrating erosion mitigation strategies into salvage logging operations should be commonplace when hillslope erosion is a concern.

  15. Generating porosity spectrum of carbonate reservoirs using ultrasonic imaging log

    Zhang, Jie; Nie, Xin; Xiao, Suyun; Zhang, Chong; Zhang, Chaomo; Zhang, Zhansong


    Imaging logging tools can provide us the borehole wall image. The micro-resistivity imaging logging has been used to obtain borehole porosity spectrum. However, the resistivity imaging logging cannot cover the whole borehole wall. In this paper, we propose a method to calculate the porosity spectrum using ultrasonic imaging logging data. Based on the amplitude attenuation equation, we analyze the factors affecting the propagation of wave in drilling fluid and formation and based on the bulk-volume rock model, Wyllie equation and Raymer equation, we establish various conversion models between the reflection coefficient β and porosity ϕ. Then we use the ultrasonic imaging logging and conventional wireline logging data to calculate the near-borehole formation porosity distribution spectrum. The porosity spectrum result obtained from ultrasonic imaging data is compared with the one from the micro-resistivity imaging data, and they turn out to be similar, but with discrepancy, which is caused by the borehole coverage and data input difference. We separate the porosity types by performing threshold value segmentation and generate porosity-depth distribution curves by counting with equal depth spacing on the porosity image. The practice result is good and reveals the efficiency of our method.

  16. A comparison between elemental logs and core data

    Kerr, S.A.; Grau, J.A.; Schweitzer, J.S.


    Neutron-induced gamma-ray spectroscopy, of prompt capture and delayed activation, together with natural gamma-ray measurements, provides a borehole elemental analysis to characterize rock matrix composition. This study involved extensive core and log data in two wells. One well was drilled with a barite-weighted oil-based mud through a shallow marine sand. The other was drilled with fresh water-based mud through a channel sand, mudstone sequence overlying limestone. The results illustrate the importance of a suitable core sampling strategy and the problems associated with matching core to log data. Possible inaccuracies from the modelling of Ca-, Fe- and S-bearing minerals have been determined. A method for correcting the total measured aluminium concentration for that due to the borehole mud has been successfully tested against aluminium concentrations measured in the cleaned core samples. Estimates of the overall accuracy and precision of the elemental logging concentrations are obtained by comparing the log results with those obtained from the laboratory core analysis. A comprehensive core elemental analysis can also provide useful insight into the way other logs, such as the photoelectric factor or formation thermal neutron macroscopic absorption cross section, are influenced by minor and trace elements. Differences between calculated values from elemental logs and measured macroscopic parameters provide additional data for a more detailed understanding of the rock properties. (Author)

  17. Latent log-linear models for handwritten digit classification.

    Deselaers, Thomas; Gass, Tobias; Heigold, Georg; Ney, Hermann


    We present latent log-linear models, an extension of log-linear models incorporating latent variables, and we propose two applications thereof: log-linear mixture models and image deformation-aware log-linear models. The resulting models are fully discriminative, can be trained efficiently, and the model complexity can be controlled. Log-linear mixture models offer additional flexibility within the log-linear modeling framework. Unlike previous approaches, the image deformation-aware model directly considers image deformations and allows for a discriminative training of the deformation parameters. Both are trained using alternating optimization. For certain variants, convergence to a stationary point is guaranteed and, in practice, even variants without this guarantee converge and find models that perform well. We tune the methods on the USPS data set and evaluate on the MNIST data set, demonstrating the generalization capabilities of our proposed models. Our models, although using significantly fewer parameters, are able to obtain competitive results with models proposed in the literature.

  18. The human factors of implementing shift work in logging operations.

    Mitchell, D L; Gallagher, T V; Thomas, R E


    A fairly recent development in the forest industry is the use of shift work in logging in the southeastern U.S. Logging company owners are implementing shift work as an opportunity to increase production and potentially reduce the cost of producing each unit of wood, without consideration of the potential impacts on the logging crew. There are many documented physiological and psychological impacts on workers from shift work in a variety of industries, although few address forestry workers in the U.S. Semi-structured interviews were performed to gather information about how logging company owners were implementing shift work in seven southeastern states. Data collected during the interviews included employee turnover, shift hours, shift scheduling, safety considerations, and production impacts. Various work schedules were employed. The majority of the schedules encompassed less than 24 hours per day. Permanent and rotating shift schedules were found. None of the logging company owners used more than two crews in a 24-hour period. Additional safety precautions were implemented as a result of working after dark. No in-woods worker accidents or injuries were reported by any of those interviewed. Results indicate that a variety of work schedules can be successfully implemented in the southeastern logging industry.

  19. PUMA Internet Task Logging Using the IDAC-1

    K. N. Tarchanidis


    Full Text Available This project uses an IDAC-1 board to sample the joint angle position of the PUMA 76 1 robot and log the results on a computer. The robot is at the task location and the logging computer is located in a different one. The task the robot is performing is based on a Pseudo Stereo Vision System (PSVS. Internet is the transport media. The protocol used in this project is UDP/IP. The actual angle is taken straight from the PUMA controller. High-resolution potentiometers are connected on each robot joint and are buffered and sampled as potential difference on an A/D converter integrated on the IDAC-1. The logging computer through the Internet acting as client asks for the angle set, the IDAC-1 responds as server with the 10-bit resolution sampling of the joint position. The whole task is logged in a file on the logging computer. This application can give the ability to the Internet user to monitor and log the robot tasks anywhere in the Word Wide Web (www.

  20. Text Entry by Gazing and Smiling

    Outi Tuisku


    Full Text Available Face Interface is a wearable prototype that combines the use of voluntary gaze direction and facial activations, for pointing and selecting objects on a computer screen, respectively. The aim was to investigate the functionality of the prototype for entering text. First, three on-screen keyboard layout designs were developed and tested (n=10 to find a layout that would be more suitable for text entry with the prototype than traditional QWERTY layout. The task was to enter one word ten times with each of the layouts by pointing letters with gaze and select them by smiling. Subjective ratings showed that a layout with large keys on the edge and small keys near the center of the keyboard was rated as the most enjoyable, clearest, and most functional. Second, using this layout, the aim of the second experiment (n=12 was to compare entering text with Face Interface to entering text with mouse. The results showed that text entry rate for Face Interface was 20 characters per minute (cpm and 27 cpm for the mouse. For Face Interface, keystrokes per character (KSPC value was 1.1 and minimum string distance (MSD error rate was 0.12. These values compare especially well with other similar techniques.

  1. Energy Data Base corporate author entries

    Hendricks, P.L.


    The US Department of Energy is one of three agencies funding the major portion of government-supported research. One of the ways to locate the results of this research is to find reports in the Energy Data Base (EDB), the comprehensive data base of the Office of Scientific and Technical Information, Technical Information Center, and in publications derived therefrom by referring to the corporate organization performing the research. This information field has been established as an index point retrievable in on-line searching and is included as an index in printed publications. To provide consistent citing of names in bibliographic entries, this authority has been created and maintained as a means of entry of corporate names into the EDB. To locate such information, one can (1) use the seven-digit code number assigned to the corporate entity of interest (enter, for example, IC=9506086) or (2) use one word at a time from the corporate name given (enter, for example, CS=Dominion)

  2. [Metabolic myopathies].

    Papazian, Óscar; Rivas-Chacón, Rafael


    To review the metabolic myopathies manifested only by crisis of myalgias, cramps and rigidity of the muscles with decreased voluntary contractions and normal inter crisis neurologic examination in children and adolescents. These metabolic myopathies are autosomic recessive inherited enzymatic deficiencies of the carbohydrates and lipids metabolisms. The end result is a reduction of intra muscle adenosine triphosphate, mainly through mitochondrial oxidative phosphorylation, with decrease of available energy for muscle contraction. The one secondary to carbohydrates intra muscle metabolism disorders are triggered by high intensity brief (fatty acids metabolism disorders are triggered by low intensity prolonged (> 10 min) exercises. The conditions in the first group in order of decreasing frequency are the deficiencies of myophosforilase (GSD V), muscle phosphofructokinase (GSD VII), phosphoglycerate mutase 1 (GSD X) and beta enolase (GSD XIII). The conditions in the second group in order of decreasing frequency are the deficiencies of carnitine palmitoyl transferase II and very long chain acyl CoA dehydrogenase. The differential characteristics of patients in each group and within each group will allow to make the initial presumptive clinical diagnosis in the majority and then to order only the necessary tests to achieve the final diagnosis. Treatment during the crisis includes hydration, glucose and alkalinization of urine if myoglobin in blood and urine are elevated. Prevention includes avoiding exercise which may induce the crisis and fasting. The prognosis is good with the exception of rare cases of acute renal failure due to hipermyoglobinemia because of severe rabdomyolisis.

  3. 75 FR 82241 - Technical Correction: Completion of Entry and Entry Summary-Declaration of Value


    ... Entry Summary-- Declaration of Value AGENCY: Customs and Border Protection, Department of Homeland... manner by which the declared transaction value on imported merchandise was determined. This requirement... whether the transaction value of imported merchandise is determined on the basis of the price paid by the...

  4. The frequency and level of sweep in mixed hardwood saw logs in the eastern United States

    Peter Hamner; Marshall S. White; Philip A. Araman


    Hardwood sawmills traditionally saw logs in a manner that either orients sawlines parallel to the log central axis (straight sawing) or the log surface (allowing for taper). Sweep is characterized as uniform curvature along the entire length of a log. For logs with sweep, lumber yield losses from straight and taper sawing increase with increasing levels of sweep. Curve...

  5. Modeling and validating the grabbing forces of hydraulic log grapples used in forest operations

    Jingxin Wang; Chris B. LeDoux; Lihai Wang


    The grabbing forces of log grapples were modeled and analyzed mathematically under operating conditions when grabbing logs from compact log piles and from bunch-like log piles. The grabbing forces are closely related to the structural parameters of the grapple, the weight of the grapple, and the weight of the log grabbed. An operational model grapple was designed and...

  6. 40 CFR 146.66 - Logging, sampling, and testing prior to new well operation.


    ... cement bond and variable density log, and a temperature log after the casing is set and cemented. (ii..., gamma ray, and fracture finder logs before the casing is installed; and (B) A cement bond and variable density log, and a temperature log after the casing is set and cemented. (iii) The Director may allow the...

  7. Regeneration and management of lesser known timber species in the Peruvian Amazon following disturbance by logging

    Karsten, Rune Juelsborg; Meilby, Henrik; Larsen, Jørgen Bo


    Following the principles of Reduced Impact Logging (RIL) the construction of roads and log landings together with logging gaps are the most profound direct impacts that a forest operation has on the forest. While the effects of logging gaps have been studied in detail, the impacts of road and log...

  8. Analytic Development of a Reference Profile for the First Entry in a Skip Atmospheric Entry

    Garcia-Llama, Eduardo


    This note shows that a feasible reference drag profile for the first entry portion of a skip entry can be generated as a polynomial expression of the velocity. The coefficients of that polynomial are found through the resolution of a system composed of m + 1 equations, where m is the degree of the drag polynomial. It has been shown that a minimum of five equations (m = 4) are required to establish the range and the initial and final conditions on velocity and flight path angle. It has been shown that at least one constraint on the trajectory can be imposed through the addition of one extra equation in the system, which must be accompanied by the increase in the degree of the drag polynomial. In order to simplify the resolution of the system of equations, the drag was considered as being a probability density function of the velocity, with the velocity as a distribution function of the drag. Combining this notion with the introduction of empirically derived constants, it has been shown that the system of equations required to generate the drag profile can be successfully reduced to a system of linear algebraic equations. For completeness, the resulting drag profiles have been flown using the feedback linearization method of differential geometric control as a guidance law with the error dynamics of a second order homogeneous equation in the form of a damped oscillator. Satisfactory results were achieved when the gains in the error dynamics were changed at a certain point along the trajectory that is dependent on the velocity and the curvature of the drag as a function of the velocity. Future work should study the capacity to update the drag profile in flight when dispersions are introduced. Also, future studies should attempt to link the first entry, as presented and controlled in this note, with a more standard control concept for the second entry, such as the Apollo entry guidance, to try to assess the overall skip entry performance. A guidance law that includes

  9. Closed expressions for $\\int_{0}^{1} t^{-1} log^{n-1}t log^{p}(1 - t) dt$

    Kölbig, Kurt Siegfried


    Closed expressions for the integral integral /sub 0//sup 1/ t/sup -1/ log/sup n-1/t log/sup p/(1-t)dt, whose general form is given elsewhere, are listed for n=1(1)9, p=1(1)9. A formula is derived which allows an easy evaluation of these expressions by formula manipulation on a computer. The majority of the above expressions are given in a microfiche supplement to the paper.

  10. Monte Carlo Numerical Models for Nuclear Logging Applications

    Fusheng Li


    Full Text Available Nuclear logging is one of most important logging services provided by many oil service companies. The main parameters of interest are formation porosity, bulk density, and natural radiation. Other services are also provided from using complex nuclear logging tools, such as formation lithology/mineralogy, etc. Some parameters can be measured by using neutron logging tools and some can only be measured by using a gamma ray tool. To understand the response of nuclear logging tools, the neutron transport/diffusion theory and photon diffusion theory are needed. Unfortunately, for most cases there are no analytical answers if complex tool geometry is involved. For many years, Monte Carlo numerical models have been used by nuclear scientists in the well logging industry to address these challenges. The models have been widely employed in the optimization of nuclear logging tool design, and the development of interpretation methods for nuclear logs. They have also been used to predict the response of nuclear logging systems for forward simulation problems. In this case, the system parameters including geometry, materials and nuclear sources, etc., are pre-defined and the transportation and interactions of nuclear particles (such as neutrons, photons and/or electrons in the regions of interest are simulated according to detailed nuclear physics theory and their nuclear cross-section data (probability of interacting. Then the deposited energies of particles entering the detectors are recorded and tallied and the tool responses to such a scenario are generated. A general-purpose code named Monte Carlo N– Particle (MCNP has been the industry-standard for some time. In this paper, we briefly introduce the fundamental principles of Monte Carlo numerical modeling and review the physics of MCNP. Some of the latest developments of Monte Carlo Models are also reviewed. A variety of examples are presented to illustrate the uses of Monte Carlo numerical models

  11. An automated entry control system for nuclear facilities

    Ream, W.K.; Espinoza, J.


    An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized

  12. Orthopoxvirus species and strain differences in cell entry

    Bengali, Zain; Satheshkumar, P.S. [Laboratory of Viral Diseases, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Bethesda, MD 20892-3210 (United States); Moss, Bernard, E-mail: [Laboratory of Viral Diseases, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Bethesda, MD 20892-3210 (United States)


    Vaccinia virus (VACV) enters cells by a low pH endosomal route or by direct fusion with the plasma membrane. We previously found differences in entry properties of several VACV strains: entry of WR was enhanced by low pH, reduced by bafilomycin A1 and relatively unaffected by heparin, whereas entry of IHD-J, Copenhagen and Elstree were oppositely affected. Since binding and entry modes may have been selected by specific conditions of in vitro propagation, we now examined the properties of three distinct, recently isolated cowpox viruses and a monkeypox virus as well as additional VACV and cowpox virus strains. The recent isolates were more similar to WR than to other VACV strains, underscoring the biological importance of endosomal entry by orthopoxviruses. Sequence comparisons, gene deletions and gene swapping experiments indicated that viral determinants, other than or in addition to the A26 and A25 'fusion-suppressor' proteins, impact entry properties.

  13. Local regularity analysis of strata heterogeneities from sonic logs

    S. Gaci


    Full Text Available Borehole logs provide geological information about the rocks crossed by the wells. Several properties of rocks can be interpreted in terms of lithology, type and quantity of the fluid filling the pores and fractures.

    Here, the logs are assumed to be nonhomogeneous Brownian motions (nhBms which are generalized fractional Brownian motions (fBms indexed by depth-dependent Hurst parameters H(z. Three techniques, the local wavelet approach (LWA, the average-local wavelet approach (ALWA, and Peltier Algorithm (PA, are suggested to estimate the Hurst functions (or the regularity profiles from the logs.

    First, two synthetic sonic logs with different parameters, shaped by the successive random additions (SRA algorithm, are used to demonstrate the potential of the proposed methods. The obtained Hurst functions are close to the theoretical Hurst functions. Besides, the transitions between the modeled layers are marked by Hurst values discontinuities. It is also shown that PA leads to the best Hurst value estimations.

    Second, we investigate the multifractional property of sonic logs data recorded at two scientific deep boreholes: the pilot hole VB and the ultra deep main hole HB, drilled for the German Continental Deep Drilling Program (KTB. All the regularity profiles independently obtained for the logs provide a clear correlation with lithology, and from each regularity profile, we derive a similar segmentation in terms of lithological units. The lithological discontinuities (strata' bounds and faults contacts are located at the local extrema of the Hurst functions. Moreover, the regularity profiles are compared with the KTB estimated porosity logs, showing a significant relation between the local extrema of the Hurst functions and the fluid-filled fractures. The Hurst function may then constitute a tool to characterize underground heterogeneities.

  14. Lithostratigraphy from downhole logs in Hole AND-1B, Antarctica

    Williams, Trevor; Morin, Roger H.; Jarrard, Richard D.; Jackolski, Chris L.; Henrys, Stuart A.; Niessen, Frank; Magens, Diana; Kuhn, Gerhard; Monien, Donata; Powell, Ross D.


    The ANDRILL (Antarctic Drilling Project) McMurdo Ice Shelf (MIS) project drilled 1285 m of sediment in Hole AND–1B, representing the past 12 m.y. of glacial history. Downhole geophysical logs were acquired to a depth of 1018 mbsf (meters below seafloor), and are complementary to data acquired from the core. The natural gamma radiation (NGR) and magnetic susceptibility logs are particularly useful for understanding lithological and paleoenvironmental change at ANDRILL McMurdo Ice Shelf Hole AND–1B. NGR logs cover the entire interval from the seafloor to 1018 mbsf, and magnetic susceptibility and other logs covered the open hole intervals between 692 and 1018 and 237–342 mbsf. In the upper part of AND–1B, clear alternations between low and high NGR values distinguish between diatomite (lacking minerals containing naturally radioactive K, U, and Th) and diamictite (containing K-bearing clays, K-feldspar, mica, and heavy minerals). In the lower open hole logged section, NGR and magnetic susceptibility can also distinguish claystones (rich in K-bearing clay minerals, relatively low in magnetite) and diamictites (relatively high in magnetite). Sandstones can be distinguished by their high resistivity values in AND–1B. On the basis of these three downhole logs, diamictite, claystones, and sandstones can be predicted correctly for 74% of the 692–1018 mbsf interval. The logs were then used to predict facies for the 6% of this interval that was unrecovered by coring. Given the understanding of the physical property characteristics of different facies, it is also possible to identify subtle changes in lithology from the physical properties and help refine parts of the lithostratigraphy, for example, the varying terrigenous content of diatomites and the transitions from subice diamictite to open-water diatomite.

  15. The application of radiation logs to groundwater hydrology

    Scott Keys, W [United States Geological Survey, Denver, CO (United States)


    The drilling of exploratory holes to determine the availability of groundwater and to plan the most economical methods of water development is expensive. The only technique available at present for obtaining geological and hydrological information through the casing of pre-existing water wells and other boreholes is by radiation logging. Up to now these logging techniques have been little used in groundwater hydrology. This report describes inexpensive portable radiation logging equipment that is available or has been developed for groundwater studies in connection with a general research project on the application of borehole geophysics in groundwater hydrology. It is possible to obtain data on the following: the source, velocity, and chemical quality of groundwater; the location, extent, geometry, bulk density, porosity, permeability, and specific yield of aquifers and associated strata; and the position of casings, casing collars, leaks, perforations, and cement. The radiation logs employed include natural gamma, gamma-gamma, neutron-gamma. neutron epithermal-neutron. and radioactive tracer. The following radioisotopes are utilized: cobalt-60, plutonium-239, americium-241, and iodine-131. Typical radiation logs obtained by the various techniques are described and examples are given of practical applications of radiation logging to groundwater investigations. The applications cited are studies of perched water in basaltic rocks and associated sedimentary strata; the porosity, moisture content, and position of zones into which water was injected in volcanic tuff; the position of the interface between brine and fresh water in fine-grained carbonate rocks and associated fine clastic rocks; the interpretation of porosity from a neutron log; and the location by means of a radioactive tracer of the more permeable fracture zones in a well penetrating crystalline rock. (author)

  16. Characterization of reservoir fractures using conventional geophysical logging

    Paitoon Laongsakul


    Full Text Available In hydrocarbon exploration fractures play an important role as possible pathways for the hydrocarbon flow and bythis enhancing the overall formation’s permeability. Advanced logging methods for fracture analysis, like the boreholeacoustic televiewer and Formation Microscanner (FMS are available, but these are additional and expensive tools. However,open and with water or hydrocarbon filled fractures are also sensitive to electrical and other conventional logging methods.For this study conventional logging data (electric, seismic, etc were available plus additional fracture information from FMS.Taking into account the borehole environment the results show that the micro-spherically focused log indicates fractures byshowing low resistivity spikes opposite open fractures, and high resistivity spikes opposite sealed ones. Compressional andshear wave velocities are reduced when passing trough the fracture zone, which are assumed to be more or less perpendicularto borehole axis. The photoelectric absorption curve exhibit a very sharp peak in front of a fracture filled with bariteloaded mud cake. The density log shows low density spikes that are not seen by the neutron log, usually where fractures,large vugs, or caverns exist. Borehole breakouts can cause a similar effect on the logging response than fractures, but fracturesare often present when this occurs. The fracture index calculation by using threshold and input weight was calculatedand there was in general a good agreement with the fracture data from FMS especially in fracture zones, which mainlycontribute to the hydraulic system of the reservoir. Finally, the overall results from this study using one well are promising,however further research in the combination of different tools for fracture identification is recommended as well as the useof core for further validation.

  17. Denying Foreign Bank Entry: Implications For Bank Interest Margins

    Ross Levine


    This paper examines the impact of restricting foreign bank entry on bank net interest margins while controlling for (a) impediments to domestic bank entry, (b) the degree of foreign bank ownership of the domestic banking industry, (c) an array of bank-specific characteristics, (c) banking sectorconcentration, and (d) various country traits. Using data on almost 1200 banks across 47 countries, the results suggest that restricting foreign bank entry boosts bank net interest margins. Also, restr...

  18. The Internationalization of Chinese Firms: Entry Mode Choice

    Zhang, Xu


    Chinese firms and other emerging markets firms aim to select a favourable entry mode to start or expand their international business, thus this is significant issue for research. This study demonstrates that the Chinese firms’ choice of entry mode is determined by internal-factors, external-factors and transaction cost factors. This is illustrated through the investigation of a case study of the Haier Group’s choice of entry mode and internationalization. Therefore, four processes of choice o...

  19. Entry Restrictions, Corruption and Extortion in the Context of Transition

    Inna Cabelkova


    This paper argues that even temporary barriers to entry present at the very beginning of transition may lead to permanent extortion development. Entry restrictions, if binding, lead to excess profits, which create an incentive to extort. The emergence of extortionists reduces the expected profit from production, making producers expect extortion in the future. If, after this adaptation of expectations, the government removes the barriers to entry, only a few new firms will enter the market. H...

  20. Tethered to the EHR: Primary Care Physician Workload Assessment Using EHR Event Log Data and Time-Motion Observations.

    Arndt, Brian G; Beasley, John W; Watkinson, Michelle D; Temte, Jonathan L; Tuan, Wen-Jan; Sinsky, Christine A; Gilchrist, Valerie J


    Primary care physicians spend nearly 2 hours on electronic health record (EHR) tasks per hour of direct patient care. Demand for non-face-to-face care, such as communication through a patient portal and administrative tasks, is increasing and contributing to burnout. The goal of this study was to assess time allocated by primary care physicians within the EHR as indicated by EHR user-event log data, both during clinic hours (defined as 8:00 am to 6:00 pm Monday through Friday) and outside clinic hours. We conducted a retrospective cohort study of 142 family medicine physicians in a single system in southern Wisconsin. All Epic (Epic Systems Corporation) EHR interactions were captured from "event logging" records over a 3-year period for both direct patient care and non-face-to-face activities, and were validated by direct observation. EHR events were assigned to 1 of 15 EHR task categories and allocated to either during or after clinic hours. Clinicians spent 355 minutes (5.9 hours) of an 11.4-hour workday in the EHR per weekday per 1.0 clinical full-time equivalent: 269 minutes (4.5 hours) during clinic hours and 86 minutes (1.4 hours) after clinic hours. Clerical and administrative tasks including documentation, order entry, billing and coding, and system security accounted for nearly one-half of the total EHR time (157 minutes, 44.2%). Inbox management accounted for another 85 minutes (23.7%). Primary care physicians spend more than one-half of their workday, nearly 6 hours, interacting with the EHR during and after clinic hours. EHR event logs can identify areas of EHR-related work that could be delegated, thus reducing workload, improving professional satisfaction, and decreasing burnout. Direct time-motion observations validated EHR-event log data as a reliable source of information regarding clinician time allocation. © 2017 Annals of Family Medicine, Inc.

  1. The cell surface expressed nucleolin is a glycoprotein that triggers calcium entry into mammalian cells

    Losfeld, Marie-Estelle; Khoury, Diala El; Mariot, Pascal; Carpentier, Mathieu; Krust, Bernard; Briand, Jean-Paul; Mazurier, Joel; Hovanessian, Ara G.; Legrand, Dominique


    Nucleolin is an ubiquitous nucleolar phosphoprotein involved in fundamental aspects of transcription regulation, cell proliferation and growth. It has also been described as a shuttling molecule between nucleus, cytosol and the cell surface. Several studies have demonstrated that surface nucleolin serves as a receptor for various extracellular ligands implicated in cell proliferation, differentiation, adhesion, mitogenesis and angiogenesis. Previously, we reported that nucleolin in the extranuclear cell compartment is a glycoprotein containing N- and O-glycans. In the present study, we show that glycosylation is an essential requirement for surface nucleolin expression, since it is prevented when cells are cultured in the presence of tunicamycin, an inhibitor of N-glycosylation. Accordingly, surface but not nuclear nucleolin is radioactively labeled upon metabolic labeling of cells with [ 3 H]glucosamine. Besides its well-demonstrated role in the internalization of specific ligands, here we show that ligand binding to surface nucleolin could also induce Ca 2+ entry into cells. Indeed, by flow cytometry, microscopy and patch-clamp experiments, we show that the HB-19 pseudopeptide, which binds specifically surface nucleolin, triggers rapid and intense membrane Ca 2+ fluxes in various types of cells. The use of several drugs then indicated that Store-Operated Ca 2+ Entry (SOCE)-like channels are involved in the generation of these fluxes. Taken together, our findings suggest that binding of an extracellular ligand to surface nucleolin could be involved in the activation of signaling pathways by promoting Ca 2+ entry into cells

  2. Free Entry and Social Inefficiency under Co-opetition

    Hattori, Keisuke; Yoshikawa, Takeshi


    We investigate the social desirability of free entry in the co-opetition model in which firms compete in a homogeneous product market while sharing common property resources that affect market size or consumers' willingness to pay for products. We show that free entry leads to socially excessive or insufficient entry into the market in the case of non-commitment co-opetition, depending on the magnitude of "business stealing" and "common property" effects of entry. On the other hand, in the ca...

  3. The choice of foreign entry modes in a control perspective

    Dyhr Ulrich, Anna Marie; Boyd, Britta; Hollensen, Svend

    The aim of this article is to investigate the choice of entry modes for international markets in a control perspective. A survey from The Confederation of Danish Industry with 234 Danish small- and medium sized enterprises served as a data base. The entry modes are categorized into three groups...... depending on the control that the company has over its activities abroad. The paper examines selected factors that influence the ‘entry modes’ of Danish SMEs in different strategic settings. Results show that the most deciding factor for the choice of high control entry mode (subsidiary) was the factor...

  4. Methodological aspects of journaling a dynamic adjusting entry model

    Vlasta Kašparovská


    Full Text Available This paper expands the discussion of the importance and function of adjusting entries for loan receivables. Discussion of the cyclical development of adjusting entries, their negative impact on the business cycle and potential solutions has intensified during the financial crisis. These discussions are still ongoing and continue to be relevant to members of the professional public, banking regulators and representatives of international accounting institutions. The objective of this paper is to evaluate a method of journaling dynamic adjusting entries under current accounting law. It also expresses the authors’ opinions on the potential for consistently implementing basic accounting principles in journaling adjusting entries for loan receivables under a dynamic model.

  5. Nucleotide Metabolism

    Martinussen, Jan; Willemoës, M.; Kilstrup, Mogens


    Metabolic pathways are connected through their utilization of nucleotides as supplier of energy, allosteric effectors, and their role in activation of intermediates. Therefore, any attempt to exploit a given living organism in a biotechnological process will have an impact on nucleotide metabolis...

  6. Regulated portals of entry into the cell

    Conner, Sean D.; Schmid, Sandra L.


    The plasma membrane is the interface between cells and their harsh environment. Uptake of nutrients and all communication among cells and between cells and their environment occurs through this interface. `Endocytosis' encompasses several diverse mechanisms by which cells internalize macromolecules and particles into transport vesicles derived from the plasma membrane. It controls entry into the cell and has a crucial role in development, the immune response, neurotransmission, intercellular communication, signal transduction, and cellular and organismal homeostasis. As the complexity of molecular interactions governing endocytosis are revealed, it has become increasingly clear that it is tightly coordinated and coupled with overall cell physiology and thus, must be viewed in a broader context than simple vesicular trafficking.

  7. Access, entry and researcher-participant position

    Louw, Arnt Vestergaard


    This article reports on methodological experiences obtained in an anthropologically inspired qualitative study among students of carpentry in Denmark. On the one hand the article deals with methodological issues of doing anthropological research among students of carpentry, while on the other...... it deals with the research findings that such a research design produced. As well as the methodological issues of researcher access, entry and participant position in the field, this article reports on the following questions: What kinds of implicit expectations of the students are embedded in the way...... the school introduces and initiates the programme? What kinds of effects does this have on the motivation of the students? How do the terms and professional language of the profession work on the individual students in including and excluding ways? These specific descriptions of classroom pedagogy, inspired...

  8. Radon entry into a simple test structure

    Andersen, C.E.; Søgaard-Hansen, J.; Majborn, B.


    A simple test structure for studies of radon entry into houses has been constructed at a field site at Riso National Laboratory. It consists of a 40 1, stainless-steel cylinder placed in a 0.52 m deep quadratic excavation with a side length of 2.4 m. The excavation is lined with an airtight...... membrane, and soil gas enters the cylinder through a changeable interface in the bottom. The depressurisation of the cylinder is controlled by a mass-flow controller, thereby limiting the influence of natural driving forces. Pressures, temperatures and radon concentrations are measured continuously...... in the cylinder and in selected locations in the soil. In this paper, the test structure is described, and initial results concerning the transport of soil gas and radon under steady-state conditions are reported. It is found that the soil in the vicinity of the structure is partially depleted with respect...

  9. Well log characterization of natural gas-hydrates

    Collett, Timothy S.; Lee, Myung W.


    In the last 25 years there have been significant advancements in the use of well-logging tools to acquire detailed information on the occurrence of gas hydrates in nature: whereas wireline electrical resistivity and acoustic logs were formerly used to identify gas-hydrate occurrences in wells drilled in Arctic permafrost environments, more advanced wireline and logging-while-drilling (LWD) tools are now routinely used to examine the petrophysical nature of gas-hydrate reservoirs and the distribution and concentration of gas hydrates within various complex reservoir systems. Resistivity- and acoustic-logging tools are the most widely used for estimating the gas-hydrate content (i.e., reservoir saturations) in various sediment types and geologic settings. Recent integrated sediment coring and well-log studies have confirmed that electrical-resistivity and acoustic-velocity data can yield accurate gas-hydrate saturations in sediment grain-supported (isotropic) systems such as sand reservoirs, but more advanced log-analysis models are required to characterize gas hydrate in fractured (anisotropic) reservoir systems. New well-logging tools designed to make directionally oriented acoustic and propagation-resistivity log measurements provide the data needed to analyze the acoustic and electrical anisotropic properties of both highly interbedded and fracture-dominated gas-hydrate reservoirs. Advancements in nuclear magnetic resonance (NMR) logging and wireline formation testing (WFT) also allow for the characterization of gas hydrate at the pore scale. Integrated NMR and formation testing studies from northern Canada and Alaska have yielded valuable insight into how gas hydrates are physically distributed in sediments and the occurrence and nature of pore fluids(i.e., free water along with clay- and capillary-bound water) in gas-hydrate-bearing reservoirs. Information on the distribution of gas hydrate at the pore scale has provided invaluable insight on the mechanisms

  10. Logs of Paleoseismic Excavations Across the Central Range Fault, Trinidad

    Crosby, Christopher J.; Prentice, Carol S.; Weber, John; Ragona, Daniel


    This publication makes available maps and trench logs associated with studies of the Central Range Fault, part of the South American-Caribbean plate boundary in Trinidad. Our studies were conducted in 2001 and 2002. We mapped geomorphic features indicative of active faulting along the right-lateral, Central Range Fault, part of the South American-Caribbean plate boundary in Trinidad. We excavated trenches at two sites, the Samlalsingh and Tabaquite sites. At the Samlalsingh site, sediments deposited after the most recent fault movement bury the fault, and the exact location of the fault was unknown until we exposed it in our excavations. At this site, we excavated a total of eleven trenches, six of which exposed the fault. The trenches exposed fluvial sediments deposited over a strath terrace developed on Miocene bedrock units. We cleaned the walls of the excavations, gridded the walls with either 1 m X 1 m or 1 m X 0.5 m nail and string grid, and logged the walls in detail at a scale of 1:20. Additionally, we described the different sedimentary units in the field, incorporating these descriptions into our trench logs. We mapped the locations of the trenches using a tape and compass. Our field logs were scanned, and unit contacts were traced in Adobe Illustrator. The final drafted logs of all the trenches are presented here, along with photographs showing important relations among faults and Holocene sedimentary deposits. Logs of south walls were reversed in Illustrator, so that all logs are drafted with the view direction to the north. We collected samples of various materials exposed in the trench walls, including charcoal samples for radiocarbon dating from both faulted and unfaulted deposits. The locations of all samples collected are shown on the logs. The ages of seventeen of the charcoal samples submitted for radiocarbon analysis at the University of Arizona Accelerator Mass Spectrometry Laboratory in Tucson, Ariz., are given in Table 1. Samples found in

  11. Biological legacies buffer local species extinction after logging.

    Rudolphi, Jörgen; Jönsson, Mari T; Gustafsson, Lena; Bugmann, H


    Clearcutting has been identified as a main threat to forest biodiversity. In the last few decades, alternatives to clearcutting have gained much interest. Living and dead trees are often retained after harvest to serve as structural legacies to mitigate negative effects of forestry. However, this practice is widely employed without information from systematic before-after control-impact studies to assess the processes involved in species responses after clearcutting with retention. We performed a large-scale survey of the occurrence of logging-sensitive and red-listed bryophytes and lichens before and after clearcutting with the retention approach. A methodology was adopted that, for the first time in studies on retention approaches, enabled monitoring of location-specific substrates. We used uncut stands as controls to assess the variables affecting the survival of species after a major disturbance. In total, 12 bryophyte species and 27 lichen species were analysed. All were classified as sensitive to logging, and most species are also currently red-listed. We found that living and dead trees retained after final harvest acted as refugia in which logging-sensitive species were able to survive for 3 to 7 years after logging. Depending on type of retention and organism group, between 35% and 92% of the species occurrences persisted on retained structures. Most species observed outside retention trees or patches disappeared. Larger pre-harvest population sizes of bryophytes on dead wood increased the survival probability of the species and hence buffered the negative effects of logging. Synthesis and applications . Careful spatial planning of retention structures is required to fully embrace the habitats of logging-sensitive species. Bryophytes and lichens persisted to a higher degree in retention patches compared to solitary trees or in the clearcut area. Retaining groups of trees in logged areas will help to sustain populations of species over the clearcut phase

  12. Passive Earth Entry Vehicle Landing Test

    Kellas, Sotiris


    Two full-scale passive Earth Entry Vehicles (EEV) with realistic structure, surrogate sample container, and surrogate Thermal Protection System (TPS) were built at NASA Langley Research Center (LaRC) and tested at the Utah Test and Training Range (UTTR). The main test objective was to demonstrate structural integrity and investigate possible impact response deviations of the realistic vehicle as compared to rigid penetrometer responses. With the exception of the surrogate TPS and minor structural differences in the back shell construction, the two test vehicles were identical in geometry and both utilized the Integrated Composite Stiffener Structure (ICoSS) structural concept in the forward shell. The ICoSS concept is a lightweight and highly adaptable composite concept developed at NASA LaRC specifically for entry vehicle TPS carrier structures. The instrumented test vehicles were released from a helicopter approximately 400 m above ground. The drop height was selected such that at least 98% of the vehicles terminal velocity would be achieved. While drop tests of spherical penetrometers and a low fidelity aerodynamic EEV model were conducted at UTTR in 1998 and 2000, this was the first time a passive EEV with flight-like structure, surrogate TPS, and sample container was tested at UTTR for the purpose of complete structural system validation. Test results showed that at a landing vertical speed of approximately 30 m/s, the test vehicle maintained structural integrity and enough rigidity to penetrate the sandy clay surface thus attenuating the landing load, as measured at the vehicle CG, to less than 600 g. This measured deceleration was found to be in family with rigid penetrometer test data from the 1998 and 2000 test campaigns. Design implications of vehicle structure/soil interaction with respect to sample container and sample survivability are briefly discussed.

  13. Two Bistable Switches Govern M Phase Entry.

    Mochida, Satoru; Rata, Scott; Hino, Hirotsugu; Nagai, Takeharu; Novák, Béla


    The abrupt and irreversible transition from interphase to M phase is essential to separate DNA replication from chromosome segregation. This transition requires the switch-like phosphorylation of hundreds of proteins by the cyclin-dependent kinase 1 (Cdk1):cyclin B (CycB) complex. Previous studies have ascribed these switch-like phosphorylations to the auto-activation of Cdk1:CycB through the removal of inhibitory phosphorylations on Cdk1-Tyr15 [1, 2]. The positive feedback in Cdk1 activation creates a bistable switch that makes mitotic commitment irreversible [2-4]. Here, we surprisingly find that Cdk1 auto-activation is dispensable for irreversible, switch-like mitotic entry due to a second mechanism, whereby Cdk1:CycB inhibits its counteracting phosphatase (PP2A:B55). We show that the PP2A:B55-inhibiting Greatwall (Gwl)-endosulfine (ENSA) pathway is both necessary and sufficient for switch-like phosphorylations of mitotic substrates. Using purified components of the Gwl-ENSA pathway in a reconstituted system, we found a sharp Cdk1 threshold for phosphorylation of a luminescent mitotic substrate. The Cdk1 threshold to induce mitotic phosphorylation is distinctly higher than the Cdk1 threshold required to maintain these phosphorylations-evidence for bistability. A combination of mathematical modeling and biochemical reconstitution show that the bistable behavior of the Gwl-ENSA pathway emerges from its mutual antagonism with PP2A:B55. Our results demonstrate that two interlinked bistable mechanisms provide a robust solution for irreversible and switch-like mitotic entry. Copyright © 2016 Elsevier Ltd. All rights reserved.


    Robinson, Maxine F; Mihalopoulos, Cathrine; Merlin, Tracy; Roughead, Elizabeth


    Australia relies on managed entry agreements (MEAs) for many medicines added to the national Pharmaceutical Benefits Scheme (PBS). Previous studies of Australian MEAs examined public domain documents and were not able to provide a comprehensive assessment of the types and operation of MEAs. This study used government documents approved for release to examine the implementation and administration of MEAs implemented January 2012 to May 2016. We accessed documents for medicines with MEAs on the PBS between January 2012 and May 2016. Data were extracted on Anatomical Therapeutic Classification (ATC), type of MEA (financial, financial with outcomes, outcomes, and subcategories within each group), implementation and administration methods, source of MEA recommendation, and type of economic analysis. Of all medication indication pairs (MIPs) recommended for listing, one-third had MEAs implemented. Our study of eighty-seven MIPs had 170 MEAs in place. The Government's expert health technology assessment (HTA) committee recommended MEAs for 90 percent of the eighty-seven MIPs. A total of 81 percent of MEAs were simple financial agreements: the majority either discounts (32 percent) or reimbursement caps (43 percent). Outcome-based MEAs were least common (5 percent). Ninety-two percent of MEAs were implemented and operated through legal agreements. Approximately half of the MIPs were listed on the basis of accepted claims of cost-minimization. Forty-nine percent of medicines were in ATC L group. Advice from HTA evaluations strongly influences the implementation of ways to manage uncertainties while providing access to medicines. The government relied primarily on simple financial agreements for the managed entry of medicines for which there were perceived risks.

  15. Athabasca tar sand reservoir properties derived from cores and logs

    Woodhouse, R.


    Log interpretation parameters for the Athabasca Tar Sand Lease No. 24 have been determined by careful correlation with Dean and Stark core analysis data. Significant expansion of Athabasca cores occurs as overburden pressure is removed. In the more shaly sands the core analysis procedures remove adsorbed water from the clays leading to further overestimation of porosity and free water volume. Log interpretation parameters (R/sub w/ = 0.5 ohm . m and m = n = 1.5) were defined by correlation with the weight of tar as a fraction of the weight of rock solids (grain or dry weight fraction of tar). This quantity is independent of the water content of the cores, whereas porosity and the weight of tar as a fraction of the bulk weight of fluids plus solids (bulk weight fraction) are both dependent on water content. Charts are provided for the conversion of bulk weight fraction of fluids to porosity; grain weight fraction of fluids to porosity; log derived porosity and core grain weight tar to water saturation. Example results show that the core analysis grain weight fraction of tar is adequately matched by the log analyses. The log results provide a better representation of the reservoir fluid volumes than the core analysis data

  16. Research on Test-bench for Sonic Logging Tool

    Xianping Liu


    Full Text Available In this paper, the test-bench for sonic logging tool is proposed and designed to realize automatic calibration and testing of the sonic logging tool. The test-bench System consists of Host Computer, Embedded Controlling Board, and functional boards. The Host Computer serves as the Human Machine Interface (HMI and processes uploaded data. The software running on Host Computer is designed on VC++, which is developed based on multithreading, Dynamic Linkable Library (DLL and Multiple Document Interface (MDI techniques. The Embedded Controlling Board uses ARM7 as the microcontroller and communicates with Host Computer via Ethernet. The Embedded Controlling Board software is realized based on embedded uclinux operating system with a layered architecture. The functional boards are designed based on Field Programmable Gate Array (FPGA and provide test interfaces for the logging tool. The functional board software is divided into independent sub-modules that can repeatedly be used by various functional boards and then integrated those sub-modules in the top layer. With the layered architecture and modularized design, the software system is highly reliable and extensible. With the help of designed system, a test has been conducted quickly and successfully on the electronic receiving cabin of the sonic logging tool. It demonstrated that the system could greatly improve the production efficiency of the sonic logging tool.

  17. Radiation protection in well logging: case studies in the Sudan

    Eltayeb, B. A.


    This study is performed to improve radiation protection level in well logging include tow case studies in Sudan (Lost or misplaced sources). General review of radiation and radiation protection basic concept is highlighted discussed. Also preview of well logging practice and source of radiation use in well logging, safety of radiation sources, storage and manage of not use sources (weak sources) and protection of worker and potential exposure for public and worker, investigations in cause of lost or misplaced sources in well. Assessment was made in well logging using checklist prepared in accordance with the International Atomic Energy Agency IAEA basic safety standard, International Committee for Radiological Protection ICRP and safety in transport of radiation sources. The checklist includes all requirement of radiation protection. It is found that all requirement was present except the delay of calibration of radiation detectors, the movement of radiation sources form storage to base of manipulated area need adequate care for shielding and safe transport and personal monitoring service must be provide in Sudan. Investigation was made in cause of lose of nine radiation source in well it is found that all those sources were loss in different depth in the well and with deferent location and there was no risk because there was no contamination of fluids which caused by damage of loss sources. Some recommendations were stated that, if implemented could improve the status of radiation protection in well logging. (Author)

  18. [Using log-binomial model for estimating the prevalence ratio].

    Ye, Rong; Gao, Yan-hui; Yang, Yi; Chen, Yue


    To estimate the prevalence ratios, using a log-binomial model with or without continuous covariates. Prevalence ratios for individuals' attitude towards smoking-ban legislation associated with smoking status, estimated by using a log-binomial model were compared with odds ratios estimated by logistic regression model. In the log-binomial modeling, maximum likelihood method was used when there were no continuous covariates and COPY approach was used if the model did not converge, for example due to the existence of continuous covariates. We examined the association between individuals' attitude towards smoking-ban legislation and smoking status in men and women. Prevalence ratio and odds ratio estimation provided similar results for the association in women since smoking was not common. In men however, the odds ratio estimates were markedly larger than the prevalence ratios due to a higher prevalence of outcome. The log-binomial model did not converge when age was included as a continuous covariate and COPY method was used to deal with the situation. All analysis was performed by SAS. Prevalence ratio seemed to better measure the association than odds ratio when prevalence is high. SAS programs were provided to calculate the prevalence ratios with or without continuous covariates in the log-binomial regression analysis.

  19. Automatic Data Logging and Quality Analysis System for Mobile Devices

    Yong-Yi Fanjiang


    Full Text Available The testing phase of mobile device products includes two important test projects that must be completed before shipment: the field trial and the beta user trial. During the field trial, the product is certified based on its integration and stability with the local operator’s system, and, during the beta user trial, the product is certified by multiple users regarding its daily use, where the goal is to detect and solve early problems. In the traditional approach used to issue returns, testers must log into a web site, fill out a problem form, and then go through a browser or FTP to upload logs; however, this is inconvenient, and problems are reported slowly. Therefore, we propose an “automatic logging analysis system” (ALAS to construct a convenient test environment and, using a record analysis (log parser program, automate the parsing of log files and have questions automatically sent to the database by the system. Finally, the mean time between failures (MTBF is used to establish measurement indicators for the beta user trial.

  20. Preliminary report on NTS spectral gamma logging and calibration models

    Mathews, M.A.; Warren, R.G.; Garcia, S.R.; Lavelle, M.J.


    Facilities are now available at the Nevada Test Site (NTS) in Building 2201 to calibrate spectral gamma logging equipment in environments of low radioactivity. Such environments are routinely encountered during logging of holes at the NTS. Four calibration models were delivered to Building 2201 in January 1985. Each model, or test pit, consists of a stone block with a 12-inch diameter cored borehole. Preliminary radioelement values from the core for the test pits range from 0.58 to 3.83% potassium (K), 0.48 to 29.11 ppm thorium (Th), and 0.62 to 40.42 ppm uranium (U). Two satellite holes, U19ab number2 and U19ab number3, were logged during the winter of 1984-1985. The response of these logs correlates with contents of the naturally radioactive elements K. Th. and U determined in samples from petrologic zones that occur within these holes. Based on these comparisons, the spectral gamma log aids in the recognition and mapping of subsurface stratigraphic units and alteration features associated with unusual concentration of these radioactive elements, such as clay-rich zones