approximate location
Recently Published Documents


TOTAL DOCUMENTS

71
(FIVE YEARS 14)

H-INDEX

12
(FIVE YEARS 2)

2021 ◽  
Vol 5 (11) ◽  
pp. 11-19
Author(s):  
Edward Frederick Block IV
Keyword(s):  

2021 ◽  
Vol 19 (3) ◽  
pp. 351-358
Author(s):  
Jorge Javier Gimenez Ledesma ◽  
Leandro Ramos de Araujo ◽  
Ribeiro Penido de Araujo Ribeiro Penido de Araujo

Author(s):  
Lyudmila Kazacenko ◽  
Dmytro Kazacenko

Аbstract. Problem. Nowadays, GIS-technologies allow you to store various data stores. The existing state cadastral administration systems in Ukraine need to be linked. Today, cadastre systems are distinguished – state land cadastre, natural resource cadastre, real estate cadastre, urban planning cadastre, environmental cadastre, mineral cadastre, water cadastre. Goal. All these administration systems have their own databases, but do not have a common administration system. So in the state cadastre of natural resources there are objects of the natural reserve fund, their area, approximate location is listed, but there is no information in the state land cadastre about the location of such objects, there are no geodetic coordinates, these objects are not displayed on the public cadastral map of Ukraine. We investigated the Kuplevatsky natural reserve fund in the Barvenkovsky district of the Kharkiv region, which has been listed as an NRF object since 1992, but there is no information about this object in the state cadastral administration system. Methodology. Our research, after geodetic survey of the territory and computer processing of the results, obtained a digital cartographic image of the NRF object in the Digitals software package. Results. Afterthat, we entered into the information layers of the administration of the state land cadastre information about the NRF object and linked it with the ecological cadastral system.


2021 ◽  
Vol 2021 (3) ◽  
pp. 227-245
Author(s):  
Alexander Heinrich ◽  
Milan Stute ◽  
Tim Kornhuber ◽  
Matthias Hollick

Abstract Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world’s largest crowd-sourced location tracking network called o~ine finding (OF). OF leverages online finder devices to detect the presence of missing o~ine devices using Bluetooth and report an approximate location back to the owner via the Internet. While OF is not the first system of its kind, it is the first to commit to strong privacy goals. In particular, OF aims to ensure finder anonymity, prevent tracking of owner devices, and confidentiality of location reports. This paper presents the first comprehensive security and privacy analysis of OF. To this end, we recover the specifications of the closed-source OF protocols by means of reverse engineering. We experimentally show that unauthorized access to the location reports allows for accurate device tracking and retrieving a user’s top locations with an error in the order of 10 meters in urban areas. While we find that OF’s design achieves its privacy goals, we discover two distinct design and implementation flaws that can lead to a location correlation attack and unauthorized access to the location history of the past seven days, which could deanonymize users. Apple has partially addressed the issues following our responsible disclosure. Finally, we make our research artifacts publicly available.


2021 ◽  
Vol 98 (2) ◽  
pp. 74-99
Author(s):  
Michele M. Tobias ◽  
Darcy J. Bostic ◽  
Scott S. Sibbett

The approximate location of the first railroad to reach California from the east had its origins in the congressional debate over slavery prior to the Civil War. The precise location of track took years to define. By comparing two sets of historical maps in the California State Archives, this article examines how the route of the Central Pacific Railroad evolved from a plausible engineering concept to the busy track it is today. This occurred at the hands of Congress, a pharmacist, an engineer, and the engineer’s assistant, in response to national politics, local business concerns, balance sheets, and the limits of railway construction technology in the 1860s.


Author(s):  
Ingrid Robeyns ◽  
Vincent Buskens ◽  
Arnout van de Rijt ◽  
Nina Vergeldt ◽  
Tanja van der Lippe

AbstractIs it possible to identify a ‘riches line’, distinguishing the ‘rich’ from the ‘super-rich’? Recent work in political philosophy suggests that this is theoretically possible. This study examines for the first time the empirical plausibility of a riches line, based on novel data collected from a representative sample of the Dutch population. The data reveal that the Dutch indeed draw such a line, namely between 1 and 3 million euros. Strikingly, respondents agree on its approximate location irrespective of their own income and education. Although most do not consider extreme wealth itself a severe problem and object to the government’s enforcement of limits to wealth and income, widespread support exists for increased taxation of the super-rich if that would improve the quality of life of the most vulnerable members of society.


2020 ◽  
Author(s):  
Madeline Pelz ◽  
Laura Schulz ◽  
Julian Jara-Ettinger

From minimal observable action, humans make fast, intuitive judgments about what other people think, want, and feel (Heider & Simmel, 1944). Even when no agent is visible, children can infer the presence of intentional agents based on the environmental traces that only agents could leave behind (Saxe et al., 2005; Newman et al., 2010). Here we show that, beyond inferring the presence of agents, four- to six-year-olds can also determine the mental states that best explain an environmental trace. Participants (N = 35, M: 5.6 years, range:4.0 − 6.8 years) saw pairs of dresser drawers with different numbers and orientations of open drawers, and they were asked to de- termine which static scenes was generated by an agent with a given knowledge state (whether the agent wasn’t searching at all but was just playing, knew exactly where an object was hidden, knew the approximate location, had no idea where it was hidden, or at first didn’t know and then remembered). We compare children’s performance to a computational model that extends models of mental-state attribution to consider cases where the behavior is not observed but must be inferred from the structure of the environment. We find that children’s graded pattern of responded shows quantitative similarity to the predictions made by our model


2020 ◽  
Author(s):  
David E Smith ◽  
Maria T Zuber ◽  
Sander J Goossens ◽  
Gregory A Neumann ◽  
Erwan Mazarico

<p>The large anomalies in the lunar gravity field are in most cases the result of large impacts that occurred more than 3 billion years ago.  Today those anomalies provide the stability of the lunar rotation and if removed would cause a change in the position of the intersection of the spin pole with the lithosphere. Thus, extracting a gravity anomaly from today’s gravity field can provide the approximate location of the pole of rotation prior to the impact that caused the anomaly.  By removing the gravity field of each anomaly in order of age, youngest first, we can estimate the path of the lunar pole back 3 to 4 billion years, to the beginning of the time of heavy bombardment.</p><p>Starting from the GRAIL gravity model we selectively remove large gravity anomalies by first determining the center and dimensions of the anomaly from the Bouguer gravity and then deriving the average free air gravity for the Bouguer location and dimensions. The anomaly field is expanded into spherical harmonics and the degree 2 terms used to derive the change in pole position caused by the anomaly. Removing each anomaly in order of increasing age provides an estimate of the pole path from before the time of the first anomaly, SP-A.  Since the pole path depends on the order of the gravity anomalies being created it is important to know when each impact induced anomaly occurred.  The results suggest the re-constructed motion of the lunar pole of rotation is within approximately 10 dgerees of the present pole.</p>


2020 ◽  
Author(s):  
Harsha Bhat ◽  
Jorge Jara ◽  
Lucile Bruhat ◽  
Solene Antoine ◽  
Kurama Okubo ◽  
...  

<p>Supershear earthquakes are rare but powerful ruptures with devastating consequences. How quickly an earthquake rupture attains this speed, or for that matter decelerates from it, strongly affects high-frequency ground motion and the spatial extent of coseismic off-fault damage. Traditionally, studies of supershear earthquakes have focused on determining which fault segments sustained fully-grown supershear ruptures. Knowing that the rupture first propagated at subshear rupture speeds, these studies usually guessed an approximate location for the transition from subshear to supershear regimes. The rarity of confirmed supershear ruptures, combined with the fact that conditions for supershear transition are still debated, complicates the investigation of supershear transition in real earthquakes. Here, we find a unique signature of the location of a supershear transition: we show that, when a rupture accelerates towards supershear speed, the stress concentration abruptly shrinks, limiting the off-fault damage and aftershock productivity. First, we use theoretical fracture mechanics to demonstrate that, before transitioning to supershear, the stress concentration around the rupture tip shrinks, confining the region where damage & aftershocks are expected. Then, employing two different dynamic rupture modeling approaches, we confirm such reduction in stress concentration, further validating the expected signature in the transition region. We contrast these numerical and theoretical results with high-resolution aftershock catalogs for three natural supershear earthquakes, where we identify a small region with lower aftershock density near the supershear transition. Finally, using satellite optical image correlation techniques, we show that, for a fourth event, the transition zone is characterized by a diminution in the width of the damage zone. Our results demonstrate that the transition from subshear to supershear rupture can be clearly identified by a localized absence of aftershocks, and a decrease in off-fault damage, due to a transient reduction of the stress intensity at the rupture tip.</p>


2020 ◽  
Vol 2 (1) ◽  
Author(s):  
H I Weller ◽  
A M Olsen ◽  
A L Camp ◽  
A R Manafzadeh ◽  
L P Hernandez ◽  
...  

Synopsis Most predatory ray-finned fishes swallow their food whole, which can pose a significant challenge, given that prey items can be half as large as the predators themselves. How do fish transport captured food from the mouth to the stomach? Prior work indicates that, in general, fish use the pharyngeal jaws to manipulate food into the esophagus, where peristalsis is thought to take over. We used X-Ray Reconstruction of Moving Morphology to track prey transport in channel catfish (Ictalurus punctatus). By reconstructing the 3D motions of both the food and the catfish, we were able to track how the catfish move food through the head and into the stomach. Food enters the oral cavity at high velocities as a continuation of suction and stops in the approximate location of the branchial basket before moving in a much slower, more complex path toward the esophagus. This slow phase coincides with little motion in the head and no substantial mouth opening or hyoid depression. Once the prey is in the esophagus, however, its transport is surprisingly tightly correlated with gulping motions (hyoid depression, girdle retraction, hypaxial shortening, and mouth opening) of the head. Although the transport mechanism itself remains unknown, to our knowledge, this is the first description of synchrony between cranial expansion and esophageal transport in a fish. Our results provide direct evidence of prey transport within the esophagus and suggest that peristalsis may not be the sole mechanism of esophageal transport in catfish.


Sign in / Sign up

Export Citation Format

Share Document