Abstract
A model for the forest fire consequences assessment based on integrated processing of multispectral space imagery and ground survey data is presented. The focus is on the following steps: ...initial data gathering for further automated clustering of landscape elements; clustering; and cross-validation of the results of the forest fire consequences assessment. The modelling assesses the following indicators: the burned area size, forest fire type, and the main burned plant community types.
A system of four magnets which is a part of the SPASCHARM experimental setup at the U-70 accelerator facility for the study of spin effects in hadronic interactions is described. An unique magnet ...with the field of 2.4 T and a field uniformity at the level of 10
–4
in a working volume of 60 cm
3
is used to pump up and hold polarization in a polarized proton frozen target. A special wide-aperture magnet is the central part of the spectrometer of the setup based on the drift tubes. For precision steering the beam to the center of the target, two small magnets correctors developed by the Efremov Research Institute of Electrophysical Equipment have been manufactured and introduced into the setup.
Summary
Background
The Trichophyton rubrum species group consists of prevalent causative agents of human skin, nail and hair infections, including T rubrum sensu stricto and T violaceum, as well as ...other less well‐established or debatable taxa like T soudanense, T kuryangei and T megninii. Our previous study provided limited evidence in favour of the existence of two genetic lineages in the Russian T rubrum sensu stricto population.
Objectives
We aimed to study the genetic structure of the Russian population of T rubrum and to identify factors shaping this structure.
Methods
We analysed the polymorphism of 12 simple sequence repeat (SSR or microsatellite) markers and single nucleotide polymorphism in the TERG_02941 protein‐coding gene in 70 T rubrum isolates and performed a phylogenomic reconstruction.
Results
All three types of data provided conclusive evidence that the population consists of two genetic lineages. Clustering, performed by means of microsatellite length polymorphism analysis, was strongly dependent on the number of nucleotide repeats in the 5’‐area of the fructose‐1,6‐bisphosphate aldolase gene. Analysis of molecular variance (AMOVA) on the basis of SSR typing data indicated that 22%‐48% of the variability was among groups within T rubrum. There was no clear connection of population structure with types of infection, places of geographic origin, aldolase gene expression or urease activity.
Conclusion
Our results suggest that the Russian population of T rubrum consists of two cosmopolitan genetic lineages.
Abstract
The stabilization of the beams of large-sized multi-beam hybrid mirror antenna (MBHMA), the reflector profile of which is subject to distortion due to changing operational factors, is a ...complicated technical task. One of the ways to maintain energy efficiency of the satellite communications system in these circumstances is to adapt the amplitude-phase distribution of the clusters of the antenna array to random deformations of the reflector. By statistical modeling, the potentially achievable characteristics of the system are evaluated. Three variants of adaptation of cluster excitation were modeled: a) for fixed clusters, b) for adaptation of excitation, c) for adaptation of weights and position of clusters, d) for adaptation of weights and cluster configurations. For multivariate calculations, we use the simplified model of MBHMA that we have proposed. Comparison with calculations in Ticra Grasp environment confirmed the correctness of the model. Not only radiation patterns, but also focal spots on the antenna array we calculated to determine the rational composition of cluster elements and the vector of their excitation coefficients. Beams gain within the service area for reflector deformations were the subject of analysis. The studies showed that gain decrease can be reduced to 0.1 … 0.2 dB instead of 1.6 dB taking place without adaptation.
High precision measurements of the differential cross sections for π0 photoproduction at forward angles for two nuclei, 12C and 208Pb, have been performed for incident photon energies of 4.9-5.5 GeV ...to extract the π0→γγ decay width. The experiment was done at Jefferson Lab using the Hall B photon tagger and a high-resolution multichannel calorimeter. The π0→γγ decay width was extracted by fitting the measured cross sections using recently updated theoretical models for the process. The resulting value for the decay width is Γ(π0→γγ)=7.82±0.14(stat)±0.17(syst) eV. With the 2.8% total uncertainty, this result is a factor of 2.5 more precise than the current Particle Data Group average of this fundamental quantity, and it is consistent with current theoretical predictions.
—
A high-resolution scintillating fiber hodoscope comprising multi-anode photomultiplier tubes is presented. The technologies for manufacturing fiber bundles and mounting them into the detector ...housing are described in detail. The functional diagram of the anode-signal discriminator and the characteristics of the hodoscope operating as the part of an experimental setup at the beamline 14 of the U-70 accelerator complex are presented.
This paper introduces formal approaches to an integration of the program components of a distributed application using an Object Request Broker (ORB) of the Common Object Request Broker Architecture ...(CORBA) standard for distributed computing. The authors develop a system of functional models in order to analyze the interaction algorithms of distributed system elements.
First results on
-dependence measurements in inclusive
meson production in
interactions (
, Al, Cu, Sn, and W) are presented at
GeV/
c
. The ratios of the differential cross sections of four of these ...nuclei to the differential cross section on aluminum were measured and the dependence of these cross sections on the atomic of the nucleus was studied. The measurements were carried out in the kinematic region of the Feynman variable
and transverse momentum
GeV/
c
.
mesons were detected in the decay mode
at the SPASCHARM experimental setup using negative charged beams at beamline 14 of the U-70 accelerator complex.
The direct reconstruction of pp elastic scattering amplitudes at the SPASCHARM experiment is discussed. The observables are expressed in terms of invariant amplitudes. These amplitudes are deduced ...analytically by solving bilinear relations. Monte-Carlo simulations of elastic scattering as well background reactions were carried out. Elastic and diffraction interactions of protons were simulated by using PYTHIA generator for 16 GeV incident protons, designed Setup geometry and the resolution of the detectors. The criteria to select elastic processes are discussed and presented. Two-dimensional distributions of the product of the tangents of the polar angles of the recoil particle and the scattered particle versus difference of the azimuth angles of these particles, were obtained. The estimated ratio of the signal to background S/(S+B) is about 0.99.
The purpose of this article
is to develop students’ critical thinking
for solving problems in the field of information security by using the method of problem learning in teaching the discipline ...“Information Security”. The role of this method in the development of critical
thinking, research creativity of students and their achievement of a
better
understanding
of
educational
material
in
the
field
of
information
security is emphasized.
Materials and research methods.
The main conditions for the effectiveness of problem learning in the study of the discipline
“Information
Security”
are
highlighted
by
the
method
of
analysis
of
the
subject
area:
motivation
of
students,
the
feasibility
and
significance
of
problem
situations
offered
to
students
on
various
aspects
of
information
security, dialogical friendly communication between lecturer and
students. As research materials, an example of using the method of
problem learning in solving the task of information protection in state
information systems with terminal access devices is considered. The
e
xam
ple
prese
n
ts
t
h
e
proble
m
o
f
i
n
cre
a
si
n
g
t
h
e
efficie
n
c
y
o
f
i
n
for
ma
tio
n
protection in state information systems with terminal access devices,
i.e. state information systems using the “thin client” architecture,
as well as a way to solve it by assessing threats and improving the relevant mechanisms for ensuring information security, presented in
the regulatory documents governing the requirements for information
protection in state information systems with terminal access devices.
Results.
The paper considers the practical task of creating and
resolving a problem situation for the protection of information in
state information systems with terminal access devices, which can be
used in the educational process to solve similar tasks by the method
of problem learning.
The creation of a problematic situation is based on the existing
contradictions
in the regulations governing the functioning and
protection
of
information
of
this
type
of
systems
in
which
the
protected
information
is
processed
in
order
to
comply
with
legislation
and
ensure
the
functioning
of
authorities.
As
a result of using a systematic approach, which involves considering the process of information protection in
the
form
of
a set of stages in the formation of requirements for state
information
systems
using
the
architecture
of
the
“thin
client”,
improving
the
regul
a
tor
y
fr
amew
o
rk,
t
he
tr
ain
ees
fo
rm
propos
al
s
for
t
h
e
protectio
n
of
information
in
state
information
systems
using
the
architecture
of
the
“thin
client”
to
ensure
the
design
security
of
state
information systems,
taking
into
account
the
complex
of
urgent
threats
to
information
security.
The presented solution to the problem situation in the considered
task requires from the trainees general cultural competencies, such
as: identifying contradictions, colliding opposing points of view,
comparing facts, considering the problem from different points of
view, generalizing, concretizing facts, etc.
Conclusions.
Thus, the paper substantiates the method of problem
learning in the study of the discipline “Information Security” and
presents an example of its use in solving the problem of information
protection in state information systems with terminal access devices.
As a result, the trainees must identify threats that are absent in
the information security threat databank of the Federal Service for
Technical and Export Control of the Russian Federation (FSTEC of Russia) and determine the directions for further development of information security and information protection in state information systems with terminal access devices. The practical solution of this problem by a group of students within the framework of the study of the discipline “Information Security” showed a high level of competence development.