Results are presented for 607 speckle interferometric observations of double stars, as well as 222 measures of single stars or unresolved pairs. All data were obtained in 2006 and 2007 at the Mount Wilson Observatory, using the 2.5 m Hooker telescope. Separations range from 0.06 to 6.31, with a median of 0.34. These three observing runs concentrated on binaries in need of confirmation (mainly Hipparcos and Tycho pairs), as well as systems in need of improved orbital elements. New orbital...

Topics: DTIC Archive, NAVAL OBSERVATORY WASHINGTON DC, *SPECKLE INTERFEROMETRY, *ORBITS, MOUNTS, STARS,...

Each Exercise has the following format: (1) Overview of the method, (2) problem statement; (3) Solution method; (4) Syntax summary; and (5) Pages for documenting the solution.

Topics: DTIC Archive, SOFTECH INC WALTHAM MA, *TRAINING, *COMPUTER PROGRAMMING, *INSTRUCTION MANUALS,...

The Harry Dym equation, which is related to the classical string problem, is derived in three different ways. An implicit cusp solitary wave solution is constructed via a simple direct method. The existing connections between the Harry Dym and the Korteweg-de Vries equations are uniformised and simplified, and transformations between their respective solutions are carried out explicitly. Whenever possible, physical insights are provided.

Topics: DTIC Archive, Hereman, W, WISCONSIN UNIV-MADISON CENTER FOR MATHEMATICAL SCIENCES, *WAVE EQUATIONS,...

What is Cursor-on-Target? In a nutshell, CoT is just a simplified messaging format that s rapidly gaining acceptance throughout the military as an enterprise integration solution. Today, there are more than a hundred systems that speak CoT either natively or through a third-party adaptor (called a plug-in). CoT s catching on quickly because it s simple to understand, simple to implement, simple to extend, and completely open.

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *MESSAGE PROCESSING, *PLUG IN UNITS, SIMPLIFICATION,...

In the present reporting period Tzavara's work concentrated in the study of self-similar viscous and fluid-dynamic limits. The invariance of hyperbolic systems of conservation laws under dilations of coordinates is a key property underlying much of the current theory. Viscous perturbations introduce an additional parabolic scale and this invariance is lost. Understanding how the two scales interact for small viscosities is an important step in the process of studying viscous limits for general...

Topics: DTIC Archive, Tzavaras, Athanasios E, WISCONSIN UNIV-MADISON, *VISCOSITY, SOLUTIONS(GENERAL),...

Results are presented for 299 speckle interferometric observations of double stars, obtained in 2008 at the USNO Flagstaff Station using the 1.55 m Kaj Strand Astrometric Reflector. Separations range from 0. 15 to 9. 88, with a median of 2. 22. This observing run concentrated on neglected systems, as well as systems in need of improved orbital elements; new orbital solutions have been determined for nine systems as a result.

Topics: DTIC Archive, NAVAL OBSERVATORY WASHINGTON DC, *ORBITS, *SPECKLE INTERFEROMETRY, ASTRONOMY,...

Pipelining is the major organizational technique that computers use to reach higher single-processor performance. A fundamental disadvantage of pipelining is the loss incurred due to branches that require stalling or flushing the pipeline. Both hardware solutions and architectural changes have been proposed to overcome these problems. This paper examines a range of schemes for reducing branch cost focusing on both static (compile-time) and dynamic (hardware-assisted) prediction of branches....

Topics: DTIC Archive, McFarling, Scott, STANFORD UNIV CA COMPUTER SYSTEMS LAB, *COMPUTER ARCHITECTURE,...

Here is a listing some of what this project has accomplished. We ve given a probabilistic explanation of why a previously proposed accelerated gossip algorithm works. We ve resolved the problem of automatically localizing a mobile autonomous agent using range-only measurements. We invented new tools for analyzing convergence rates for consensus and gossiping algorithms. We derived a complete solution to the problem of controlling a directed formation of triangular shape. We proved that for...

Topics: DTIC Archive, YALE UNIV NEW HAVEN CT, *ALGORITHMS, CONVERGENCE, GRAPHS, PROBABILITY,...

Most systems now provide multiple functions and multiple capabilities (MFMC) in a single solution. Yet, it has become increasingly challenging for managers to properly assess the development and acquisition of these systems to ensure the achievement of adequate system maturity. Moreover, such a challenge is compounded when the systems are not only comprised of MFMC but have multiple or competing technology and integration alternatives. This challenge then raises a fundamental question: How do...

Topics: DTIC Archive, STEVENS INST OF TECHNOLOGY HOBOKEN NJ, *SYSTEMS ANALYSIS, SOLUTIONS(GENERAL),...

A modified configuration for a THz stage has been designed, fabricated and assembled with the final goal to combine the THz spectrometer with a microfluidic platform for characterization of biological samples in solutions. The new stage accommodates a modified optical mounting system that focuses THz radiation on micro/nanofluidic chips with reduced size of 1.5 mm x 3.0 mm for the active region, encompassing 10 sample channels in parallel. Another important improvement to the stage is modified...

Topics: DTIC Archive, VIBRATESS LLC CHARLOTTESVILLE VA, *INTEGRATION, *SPECTROSCOPY, BIOLOGICAL DETECTION,...

The purpose of this paper is to briefly report on some new advances due to Brownawell on the problem of explicit (concretely computable) solutions to the Bezout equations, which are based on some recent developments in complex analysis due to Yger and the authors. Keywords: Polynomials; Variables; Integrals.

Topics: DTIC Archive, Berenstein, Carlos A, MARYLAND UNIV COLLEGE PARK, *INTEGRAL EQUATIONS, POLYNOMIALS,...

Most variational models for multi-phase image segmentation are non-convex and possess multiple local minima, which makes solving for a global solution an extremely difficult task. In this work, we provide a method for computing a global solution for the (non-convex) multi-phase piecewise constant Mumford-Shah (spatially continuous Potts) image segmentation problem. Our approach is based on using a specific representation of the problem due to Lie et al. [27]. We then rewrite this representation...

Topics: DTIC Archive, CALIFORNIA UNIV LOS ANGELES DEPT OF MATHEMATICS, *ALGORITHMS, *IMAGE PROCESSING,...

We study the solutions of the equation phi(Cm)/phi(Cn) = r where r is a xed rational number, Ck is the kth Catalan number and phi is the Euler function. We note that the number r = 4 is special for this problem and for it we construct solutions (m; n) to the above equation which are related to primes p such that 2p - 1 or 4p - 3 is also prime.

Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF APPLIED MATHEMATICS, *EULER EQUATIONS,...

This report discusses the feasibility of employing evolutionary algorithms for the automatic design of electro-optical systems for a wide variety of DoD applications. Evolutionary algorithms (EAs) can be utilized for automatic design provided potential solutions can be encoded mathematically, can be rapidly tested analytically, computationally, or experimentally, and can have their performance quantified mathematically. Importantly, EAs can be employed even when changes in system design lead to...

Topics: DTIC Archive, NAVAL RESEARCH LAB WASHINGTON DC, *ALGORITHMS, *ELECTROOPTICS, AUTOMATIC,...

The first algorithm for solving generalized linear programs was given by Dantzig. His algorithm assumes that a basic feasible solution of the generalized program to be solved exists and is given. If the initial basic feasible solution is non-degenerate, then his algorithm is guaranteed to converge. The purpose of this paper is to show how to find an initial basic feasible (possibly degenerate) solution of a generalized linear program by applying the same algorithm to a phase-one problem without...

Topics: DTIC Archive, Hu, Hui, STANFORD UNIV CA SYSTEMS OPTIMIZATION LAB, *LINEAR PROGRAMMING,...

This presentation gave an overview of the use of fixatives for use after a biological event. The presentation provided background, problem, current solution, advantages of fixatives, examples for radiological application, risk mitigation and rapid return to service, relative cost, potential for scale up, and challenges and possible solutions.

Topics: DTIC Archive, LAWRENCE LIVERMORE NATIONAL LAB CA, *BIOLOGICAL AGENTS, *BIOLOGICAL CONTAMINATION,...

For centuries, the peoples of Central Europe have suffered wars of conquest and internal repressions by rulers beyond their control. This history has shaped the attitudes of today's Central European voters -- masters of their own destiny virtually for the first time. The United States has an interest in stable security for the region, having been drawn into two major wars in this century stemming from instability there. At the same time, U.S. taxpayers are less and less willing to assume a...

Topics: DTIC Archive, Sutter, Eleanor B., ARMY WAR COLL CARLISLE BARRACKS PA, *FOREIGN POLICY*FOREIGN...

A program to perform coordinated research employing complementary electro-optical techniques to characterize optical and physical properties of the atmosphere are described in this report. Emphasis was on upgrading and operating the CO2 wind sensing lidar, upgrading and operating the Nd:YAG backscatter lidar, on working with the multichannel transmissometer, and on upgrading the MAPM system.

Topics: DTIC Archive, McNicholl, Patrick, PHOTOMETRICS INC WOBURN MA, *FOREIGN POLICY*FOREIGN POLICY,...

The goal of this project was to construct models for decision making and game theory that can deal with complex state spaces, resource-bounded and cognitively-limited agents, and nnforeseen contingencies in a robust way. A number of advances were made in three areas: 1. A general game-theoretic framework for reasoning about strategic agents performing possibly costly computation was developed. The framework provides psychologically appealing explanations for behavior in well-studied games, such...

Topics: DTIC Archive, CORNELL UNIV ITHACA NY, *DECISION MAKING, *GAME THEORY, AWARENESS, BEHAVIOR,...

System requirements and constraints specify how a system must look, feel and function; but it is the needs of the users and stakeholders that give the system its raison d'etre. If a valid solution system is to be delivered, the end-users needs must be correctly identified, within the stakeholders constraints. While this process forms an essential part of the concept phase of the engineering lifecycle, it is often left under-done, with needs attributed to the general, non-specific user . Since...

Topics: DTIC Archive, AEROSPACE CONCEPTS PTY LTD FYSHWICK ACT (AUSTRALIA), *SYSTEMS ENGINEERING, AUSTRALIA,...

This paper analyzes the quantitative and situational structure of algebra story problems, uses these materials to propose an interpretive framework for written problem-solving protocols, and then presents an exploratory study of the episodic structure of algebra story problem solving in a sizable group of mathematically competent subjects. Analyses of written protocols compare the strategic, tactical, and conceptual content of solution attempts, looking within these attempts at the interplay...

Topics: DTIC Archive, Hall, Rogers, CALIFORNIA UNIV IRVINE SCHOOL OF INFORMATION AND COMPUTER SCIENCE,...

Topics: DTIC Archive, AECOM LOS ANGELES CA, *SUPPLY DEPOTS, *VAPORS, AIR, INTRUSION, PRESSURE MEASUREMENT,...

The ISIS project has developed a distributed programming toolkit and a collection of higher level applications based on these tools. ISIS is now in use at more than 300 locations world-wide. Here, we discuss the lessons (and surprises) gained from this experience with the real world. ISIS differs from other process-group-based systems because it integrates group membership changes with communication, and because of the multicase communication primitives we call CBCAST and ABCAST. Virtual...

Topics: DTIC Archive, Birman, Kenneth, CORNELL UNIV ITHACA NY DEPT OF COMPUTER SCIENCE, *FAULTS, *COMPUTER...

This paper reviews some recent developments in the convex analysis approach to integer programming. These developments are based on viewing integer programs as disjunctive programs. i.e., linear programs with disjunctive constraints, an approach which seems to be fruitful for 0-1 programming both theoretically and practically. On the theoretical side, it provides structural characterizations which offer new insights. On the practical side, it produces a variety of cutting planes with desirable...

Topics: DTIC Archive, Balas,Egon, CARNEGIE-MELLON UNIV PITTSBURGH PA MANAGEMENT SCIENCES RESEARCH GROUP,...

For a solvable monotone complementarity problem it is shown that each feasible point which is not a solution of the problem provides simple numerical bounds for some or all components of all solution vectors. Consequently for a solvable differentiable convex program each primal-dual feasible point which is not optimal provides simple numerical bounds for some or all components of all primal-dual solution vectors. Also given is existence result and simple bounds for solutions of monotone...

Topics: DTIC Archive, Mangasarian,O L, WISCONSIN UNIV-MADISON MATHEMATICS RESEARCH CENTER, *Nonlinear...

This paper presents an iterative method to obtain a partial or complete solution of the general eigenproblem which does not require any preliminary modification to put it into the form of a special eigenvalue problem. The Rayleigh Quotient is minimized by the use of the conjugate gradient method to obtain the lowest eigenvalue and the associated eigenvector. The approach is extended to permit the intermediate eigenvalues and eigenvectors to be obtained by adapting a projection scheme which is...

Topics: DTIC Archive, Fox, R L, CASE WESTERN RESERVE UNIV CLEVELAND OH, *DYNAMICS, *STRUCTURAL MECHANICS,...

A divide-and-conquer method for solving symmetric tridiagonal eigenproblems has evolved from work by Cuppen, Dongarra, Sorensen, Tang, and most recently Gu and Eisenstadt. At the heart of their methods is the solution of a so-called Secular Equation. Proposed here is a more efficient organization of the equation-solving process, including some crucial implementation details.

Topics: DTIC Archive, CALIFORNIA UNIV BERKELEY DEPT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES,...

The diskette contains a USA FORTRAN ANSI x3.9-1978 implementation of the Rutishauser-Reinsch subspace iteration algorithm for partial solution of the algebraic eigenvalue problem for a real matrix symmetric relative to a prescribed inner product...Software Description: The program is written in FORTRAN 77 and FORTRAN 8x programming languages for implementation on an IBM/PC or compatible. Keywords: Eigenvalues, Eigenvectors, Subspace iteration, Computer software, Supercomputing, Diskette,...

Topics: DTIC Archive, AIR FORCE WRIGHT AERONAUTICAL LABS WRIGHT-PATTERSON AFB OH, *FORTRAN, *COMPUTER...

The Chinese Remainder Theorem is one of the most important results of elementary Number Theory as it was used by Kurt Goedel in one of his most fundamental papers in Logic. The paper uses the analogy with the theorem of polynomial interpolation to solve it in two different ways.

Topics: DTIC Archive, Schoenberg,Isaac J, WISCONSIN UNIV-MADISON MATHEMATICS RESEARCH CENTER, *POLYNOMIALS,...

The purpose of the Financial Management Career Program (FMCP) interview is to evaluate all registrants within the comptroller career program. However, as an interviewee, I have experienced many problems with the whole process. I find the evaluation process can be biased against an individual and the score does not always reflect the expert knowledge an individual may have. In addition, the current FMCP policy of keeping the criteria for the interview score from the interviewees is...

Topics: DTIC Archive, Shepard, John M., AIR WAR COLL MAXWELL AFB AL, *FINANCIAL MANAGEMENT, *CAREERS,...

A good indication of how much damage will result from a fire is the number of firemen fighting it. The more firemen fighting a fire, the more damage occurs. Therefore, in order to reduce the resulting damage, fewer firemen should be used to fight fires. This example illustrates how the wrong conclusion can be arrived at by taking a complex, nonlinear problem and oversimplifying it to fit a linear solution. Plotting the number of firemen versus the degree of damage will yield a linear graph from...

Topics: DTIC Archive, MARINE CORPS COMBAT DEVELOPMENT COMMAND QUANTICO VA, *RISK MANAGEMENT, GRAPHS,...

While the U.S. government has historically undertaken strategic reviews and produced numerous strategy documents, these have provided only very general directions for U.S. policymakers. They do not represent what might be called strategic planning: the definition of a strategy in which the means are prioritized to achieve an operationally defined strategic goal. Many would argue that the setting of priorities is impossible given the complexity of the world. Priorities can also limit the...

Topics: DTIC Archive, RAND CORP SANTA MONICA CA, *STRATEGY, *PLANNING, *COUNTERTERRORISM, *UNITED STATES...

We consider solving a (minimization) convex program by sequentially solving a (minimization) convex approximating subproblem and then executing a line search. Each subproblem is constructed from the current estimate of a solution of the given problem, possibly together with other information. Under mild conditions, solving the current subproblem generates a descent direction for an exact penalty function. Minimizing the exact penalty function along the current descent direction provides a new...

Topics: DTIC Archive, Rosenberg,Eric, STANFORD UNIV CALIF SYSTEMS OPTIMIZATION LAB, *MATHEMATICAL...

A generalization of the classic Towers of Hanoi problem permitting additional work pegs is considered. While the idea is not original, this form of generalization has not appeared in published literature to my knowledge. Several upper bounds and lower bounds are presented for various ranges of extra work pegs, improving on the work of Gacs. A general methodology of attack is also given, producing exact results in many cases.

Topics: DTIC Archive, Newman-Wolfe, Richard, ROCHESTER UNIV NY DEPT OF COMPUTER SCIENCE, *GAME THEORY,...

Optimization solvers should learn to improve their performance over time. By learning both during the course of solving an optimization problem as well as across multiple optimization problems, we have demonstrated significant advances in the state of the art in scheduling, packing and related resource constrained combinatorial optimization problems.

Topics: DTIC Archive, NATIONAL INFORMATION COMMUNICATION TECHNOLOGY AUSTRALIA LTD EVELEIGH,...

Scheduling deals with the allocation of resources over time to perform a collection of tasks. Scheduling problems arise in domains as diverse as manufacturing, computer processing, transportation, health care, space exploration, education, etc. Scheduling problems are conveniently formulated as Constraint Satisfaction Problems (CSPs) or Constrained Optimization Problems (COPs). A general paradigm for solving CSPs and COPs relies on the use of backtrack search. Within this paradigm, the...

Topics: DTIC Archive, CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, *JOB SHOP SCHEDULING,...

This paper is concerned with various questions about the existence and uniqueness of solutions of Hamilton-Jacobi equations in RN. The issues treated have to do with the interaction between structure properties of the Hamiltonian (in particular, continuity and growth properties), properties of the solutions and the existence and uniqueness. Uniqueness is exhibited in appropriate growth classes depending on the Hamiltonian and existence is exhibited in these classes when the assumptions are...

Topics: DTIC Archive, Crandall,Michael G, WISCONSIN UNIV-MADISON MATHEMATICS RESEARCH CENTER, *PARTIAL...

Topics: DTIC Archive, Wilkins, J. E., Jr., TECHNICAL INFORMATION SERVICE (AEC) OAK RIDGE TN, *TRANSPORT...

A class of vector-space bases is introduced for the sparse representation of discretizations of integral operators. An operator with a smooth, non-oscillatory kernel possessing a finite number of singularities in each row or column is represented in these bases as a sparse matrix, to high precision. A method is presented that employs these bases for the numerical solution of second-kind integral equations in time bounded by O(nlog squared n) , where n is the number of points in the...

Topics: DTIC Archive, Alpert, B, YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE, *NUMERICAL ANALYSIS,...

Error bounds are developed for a class of quadratic programming problems. The absolute error between an approximate feasible solution, generated via a dual formulation, and the true optimal solution is measured. Furthermore, these error bounds involve considerably less work computationally than existing estimates.

Topics: DTIC Archive, Charnes, A, TEXAS UNIV AT AUSTIN CENTER FOR CYBERNETIC STUDIES, *OPTIMIZATION,...

Two types of heuristic methods for solving polynomial programming (PP) problems were developed. The various algorithms were tested on randomly generated problems of up to 1000 variables and 200 constraints. Their performance in terms of computational time and effectiveness was investigated. The results were extremely encouraging. Optimal solutions were consistently obtained by some of the heuristic methods in over 50% of the problems solved. The effectiveness was on the average better than 99%...

Topics: DTIC Archive, Granot,Frieda, STANFORD UNIV CALIF DEPT OF OPERATIONS RESEARCH, *INTEGER PROGRAMMING,...

The purpose of this technical memorandum is to illustrate a procedure for calculating J sub n(z) and N sub n(z) which will extend the present computation capability to a somewhat larger range of n and z. This procedures is based on Taylor series solutions to Bessel's differential equation expanded about points near the argument desired for any particular J sub n(z) and N sub n(z).

Topics: DTIC Archive, Hedgcoxe,P G, TRACOR INC AUSTIN TEX, *TAYLORS SERIES, *BESSEL FUNCTIONS,...

The matrix problem considered in this paper arises when studying systems of ordinary differential equations in boundary-layer situations. A simple example is the behavior of solutions of epsilon y plus py' plus gy = 0 (*) as epsilon approaches 0. In the general situation, a system of first order equations is considered, A(epsilon)y' plus Cy = 0, where A,B are n x n matrices. The first step is to simplify the system using a similarity transformation, i.e., we set A = (1/T)z and multiply through...

Topics: DTIC Archive, Friedland,Shmuel, WISCONSIN UNIV-MADISON MATHEMATICS RESEARCH CENTER, *ANALYTIC...

Recent results in Compressive Sensing have shown that, under certain conditions the solution to an underdetermined system of linear equations with sparsity-based regularization can be accurately recovered by solving convex relaxations of the original problem. In this work, we present a novel primal-dual analysis on a class of sparsity minimization problems. We show that the Lagrangian bidual (i.e. the Lagrangian dual of the Lagrangian dual) of the sparsity minimization problems can be used to...

Topics: DTIC Archive, CALIFORNIA UNIV BERKELEY DEPT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE,...

Let g be a positive continuous prime function on IR which tends to zero at - infinity and which is not integrable over IR. The boundary-value problem -u' + g(u) = f, u'(+ or - infinity) = 0, is considered for f as an element of L1(IR). This problem can have a solution if and only if g is integrable at -infinity and if this is so then the problem is solvable precisely when the integral from + infinity to - infinity of f(t)dt 0. Some extensions of this result are also given.

Topics: DTIC Archive, Fisher,Stephen D, WISCONSIN UNIV-MADISON MATHEMATICS RESEARCH CENTER, *NONLINEAR...

A growing number of businesses use crowdsourcing that is, they outsource tasks to people outside the organization in a way that harnesses the capabilities and knowledge of external individuals on a mass scale to create innovative solutions. This article describes how Goldcorp, Incorporated, an international gold-mining company on the brink of collapse, used crowdsourcing via the Internet to turn its business around. The article then explores some challenges and successes behind crowdsourcing...

Topics: DTIC Archive, NATIONAL DEFENSE UNIV FORT MCNAIR DC, *INDUSTRIES, *MILITARY INTELLIGENCE, COMMERCE,...

The primary goal of this thesis is to investigate the use of the eXtensible Markup Language (XML) as a network configuration language. Network configuration is a difficult and time- consuming task. Current network configuration solutions are based on proprietary configuration languages and parsers. XML is a platform-neutral data representation language and worldwide standard. It is potentially advantageous to use XML to configure networks, however, XML was not developed for network...

Topics: DTIC Archive, Ababneh, Mohammad, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *NETWORKS, *CONFIGURATIONS,...

This note gives estimates of solutions to the Sylvester problem in three dimensions. These results suggest that the solutions in four and higher dimensions are very close to the solution for the n-dimensional sphere which is known. Keywords include: Sylvester Problem, Simulation.

Topics: DTIC Archive, Do,K A, STANFORD UNIV CA DEPT OF STATISTICS, *PROBLEM SOLVING, SIMULATION, ESTIMATES,...

Dantzig has asserted that his self-dual parametric algorithm for solving a linear program is equivalent to Lemke's method for solving a linear complementary problem when the latter is applied to solve a linear program. This paper formally proves that Dantzig's assertion is correct--specifically that the point reached along the solution path after 2t iterations of Lemke's method is identical with the point reached after t iterations of Dantzig's method. Keywords: Linear programming; Lemke's...

Topics: DTIC Archive, Lustig,Irvin J, STANFORD UNIV CA SYSTEMS OPTIMIZATION LAB, *LINEAR PROGRAMMING,...

Solutions of Fermats last equation are expressed in terms of Wright's generalized hypergeometric function. Some of the properties of these solutions are discussed and an equivalent form of Fermats conjecture is given in terms of them. Keywords: Transcendental numbers, Trinomial equation.

Topics: DTIC Archive, Miller, Allen R, NAVAL RESEARCH LAB WASHINGTON DC, *HYPERGEOMETRIC FUNCTIONS,...