abstract: The current work considers solutions to the wave equation on asymptotically flat, stationary, Lorentzian spacetimes in $(1+3)$ dimensions. We investigate the relationship between the rate at which the geometry tends to flat and the pointwise decay rate of solutions. The case where the spacetime tends toward flat at a rate of $$|x|^{-1}$$ was studied by Tataru (2013), where a $$t^{-3}$$ pointwise decay rate was established. Here we extend the result to geometries tending toward flat at a rate of $$|x|^{-\kappa}$$ and establish a pointwise decay rate of $$t^{-\kappa-2}$$ for $$\kappa\in\Bbb{N}$$ with $$\kappa\ge 2$$. We assume a weak local energy decay estimate holds, which restricts the geodesic trapping allowed on the underlying geometry. We use the resolvent to connect the time Fourier Transform of a solution to the Cauchy data. Ultimately the rate of pointwise wave decay depends on the low frequency behavior of the resolvent, which is sensitive to the rate at which the background geometry tends to flat.
more »
« less
On an inverse problem of nonlinear imaging with fractional damping
This paper considers the attenuated Westervelt equation in pressure formulation. The attenuation is by various models proposed in the literature and characterised by the inclusion of non-local operators that give power law damping as opposed to the exponential of classical models. The goal is the inverse problem of recovering a spatially dependent coefficient in the equation, the parameter of nonlinearity κ ( x ) \kappa (x) , in what becomes a nonlinear hyperbolic equation with non-local terms. The overposed measured data is a time trace taken on a subset of the domain or its boundary. We shall show injectivity of the linearised map from κ \kappa to the overposed data and from this basis develop and analyse Newton-type schemes for its effective recovery.
more »
« less
- Award ID(s):
- 2111020
- PAR ID:
- 10324322
- Date Published:
- Journal Name:
- Mathematics of Computation
- Volume:
- 91
- Issue:
- 333
- ISSN:
- 0025-5718
- Page Range / eLocation ID:
- 245 to 276
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Abstract A search for the Higgs boson decaying into a pair of charm quarks is presented. The analysis uses proton–proton collisions to target the production of a Higgs boson in association with a leptonically decaying W or Z boson. The dataset delivered by the LHC at a centre-of-mass energy of "Equation missing" and recorded by the ATLAS detector corresponds to an integrated luminosity of 139 $$\text{ fb}^{-1}$$ fb - 1 . Flavour-tagging algorithms are used to identify jets originating from the hadronisation of charm quarks. The analysis method is validated with the simultaneous measurement of WW , WZ and ZZ production, with observed (expected) significances of 2.6 (2.2) standard deviations above the background-only prediction for the $$(W/Z)Z(\rightarrow c{\bar{c}})$$ ( W / Z ) Z ( → c c ¯ ) process and 3.8 (4.6) standard deviations for the $$(W/Z)W(\rightarrow cq)$$ ( W / Z ) W ( → c q ) process. The $$(W/Z)H(\rightarrow c {\bar{c}})$$ ( W / Z ) H ( → c c ¯ ) search yields an observed (expected) upper limit of 26 (31) times the predicted Standard Model cross-section times branching fraction for a Higgs boson with a mass of "Equation missing" , corresponding to an observed (expected) constraint on the charm Yukawa coupling modifier $$|\kappa _c| < 8.5~(12.4)$$ | κ c | < 8.5 ( 12.4 ) , at the 95% confidence level. A combination with the ATLAS $$(W/Z)H, H\rightarrow b{\bar{b}}$$ ( W / Z ) H , H → b b ¯ analysis is performed, allowing the ratio $$\kappa _c / \kappa _b$$ κ c / κ b to be constrained to less than 4.5 at the 95% confidence level, smaller than the ratio of the b- and c-quark masses, and therefore determines the Higgs-charm coupling to be weaker than the Higgs-bottom coupling at the 95% confidence level.more » « less
-
We prove a strong dichotomy result for countably-infinite oriented graphs; that is, we prove that for all countably-infinite oriented graphs , either (i) there is a countably-infinite tournament such that , or (ii) every countably-infinite tournament contains aspanningcopy of . Furthermore, we are able to give a concise characterization of such oriented graphs. Our characterization becomes even simpler in the case of transitive acyclic oriented graphs (i.e. strict partial orders). For uncountable oriented graphs, we are able to extend the dichotomy result mentioned above to all regular cardinals ; however, we are only able to provide a concise characterization in the case when .more » « less
-
A controlled vocabulary list that was originally developed for the automotive assembly environment was modified for home appliance assembly in this study. After surveying over 700 assembly tasks with the original vocabulary, additions were made to the vocabulary list as necessary. The vocabulary allowed for the transformation of work instructions in approximately 90% of cases, with the most discrepancies occurring during the inspection phase of the transfer line. The modified vocabulary list was then tested for coder reliability to ensure broad usability and was found to have Cohen’s kappa values of 0.671 < κ < 0.848 between coders and kappa values of 0.731 < κ < 0.875 within coders over time. Using this analysis, it was demonstrated that this original automotive vocabulary could be applied to the non-automotive context with a high degree of reliability and consistency.more » « less
-
Abstract We present a randomized approach for wait-free locks with strong bounds on time and fairness in a context in which any process can be arbitrarily delayed. Our approach supports a tryLock operation that is given a set of locks, and code to run when all the locks are acquired. A tryLock operation may fail if there is contention on the locks, in which case the code is not run. Given an upper bound$$\kappa $$ known to the algorithm on the point contention of any lock, and an upper boundLon the number of locks in a tryLock’s set, a tryLock will succeed in acquiring its locks and running the code with probability at least$$1/(\kappa L)$$ . It is thus fair. Furthermore, if the maximum step complexity for the code in any lock isT, the operation will take$$O(\kappa ^2 L^2 T)$$ steps, regardless of whether it succeeds or fails. The operations are independent, thus if the tryLock is repeatedly retried on failure, it will succeed in$$O(\kappa ^3 L^3 T)$$ expected steps. If the algorithm does not know the bounds$$\kappa $$ andL, we present a variant that can guarantee a probability of at least$$1/\kappa L\log (\kappa L T)$$ of success. We assume an oblivious adversarial scheduler, which does not make decisions based on the operations, but can predetermine any schedule for the processes, which is unknown to our algorithm. Furthermore, to account for applications that change their future requests based on the results of previous tryLock operations, we strengthen the adversary by allowing decisions of the start times and lock sets of tryLock operations to be made adaptively, given the history of the execution so far.more » « less
An official website of the United States government

