Configuration factors for ground level fireballs with shadowing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

proficiency level and factors fostering reticence in efl learners

according to cheng (1999), in recent esl/efl literature, asian (especially east asian) learners of english as a foreign/second language have been arguably reported as reticent and passive learners. the most common allegations are that these students are reluctant to participate in classroom discourse; they are unwilling to give responses; they do not ask questions; and they are passive and over...

15 صفحه اول

Fireballs with a Neutron Component

Standard GRB fireballs must carry free neutrons. This crucially changes the mechanism of fireball deceleration by an external medium. As the ion fireball decelerates, the coasting neutrons form a leading front. They gradually decay, leaving behind a relativistic trail of decay products mixed with the ambient medium. The ion fireball sweeps up the trail and drives a shock wave in it. Thus, obser...

متن کامل

Interaction of GRB fireballs with ambient medium

The customary picture of the fireball deceleration by an external medium neglects two physical agents in the problem that are important at radii R < 10 cm: a radiative precursor (the prompt GRB) and a relativistic front of free neutrons. The radiative precursor preaccelerates the medium and loads it with e pairs. This provides a new explanation for the early optical flashes in GRBs. The front o...

متن کامل

Diffeomorphisms with Periodic Shadowing

We show that if a diffeomorphism has the periodic shadowing property on the chain recurrent set, then the closure of the periodic set is the chain recurrent set. Mathematics Subject Classification: 37C50

متن کامل

SEEdit: SELinux Security Policy Configuration System with Higher Level Language

Security policy for SELinux is usually created by customizing a sample policy called refpolicy. However, describing and verifying security policy configurations is difficult because in refpolicy, there are more than 100,000 lines of configurations, thousands of elements such as permissions, macros and labels. The memory footprint of refpolicy which is around 5MB, is also a problem for resource ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Loss Prevention in the Process Industries

سال: 2018

ISSN: 0950-4230

DOI: 10.1016/j.jlp.2017.12.010