34,692 research outputs found

    Physics Opportunities with the FCC-hh Injectors

    Get PDF
    In this chapter we explore a few examples of physics opportunities using the existing chain of accelerators at CERN, including potential upgrades. In this context the LHC ring is also considered as a part of the injector system. The objective is to find examples that constitute sensitive probes of New Physics that ideally cannot be done elsewhere or can be done significantly better at theCERN accelerator complex. Some of these physics opportunities may require a more flexible injector complex with additional functionality than that just needed to inject protons into the FCC-hh at the right energy, intensity and bunch structure. Therefore it is timely to discuss these options concurrently with the conceptual design of the FCC-hh injector system.Comment: 13 pages, chapter 5 in Physics at the FCC-hh, a 100 TeV pp collide

    Recent results in nuclear astrophysics at the n_TOF facility at CERN

    Get PDF
    The neutron time of flight (n_TOF) facility at CERN is a spallation source characterized by a white neutron spectrum. The innovative features of the facility, in the two experimental areas, (20 m and 185 m), allow for an accurate determination of the neutron cross section for radioactive samples or for isotopes with small neutron capture cross section, of interest for Nuclear Astrophysics. The recent results obtained at n_TOF facility are presented

    Anxiety: An Epidemic Through the Lens of Social Media

    Get PDF
    Anxiety: An Epidemic was originally inspired by the mental health crisis in my hometown, Palo Alto, California, and evolved to specifically focus on social media-related anxiety. I examined the question: How has social media evolved over the last decade and what effect does the proliferation of social media have on the young adult population? I hypothesized that social media would have a predominately negative effect, especially on young women, and set out to create a theatrical piece inspired by my research. In my meta-analysis of studies conducted, I found that more data needs to be collected on the relatively new phenomena surrounding social media usage both as positive and negative forces. The research I conducted inspired two new artistic works: a physical theatre piece entitled MASKS: An Ode to Young Women, and a children’s story entitled “The King Who Lost His Smile” (both artistic works can be found in full in appendix A). I discovered that while more research needs to be conducted to definitively find if social media usage has a predominantly positive or negative effect, the artistic works I created can serve as a forum to start important conversations between young adults and their communities at large about their experiences with anxiety, stress, and depressive symptoms

    Looking for Shadows: The Cultural Myths of the Computer in the Classroom

    Get PDF
    This paper will draw its findings from a recent study (Lloyd, 2003) which sought to identify the cultural myths of the computer in the classroom through a case study of computer education in Queensland state schools from 1983 to 1997. This was a period marked by its consecutive, discrete, high-profile and politically-motivated projects to put computers in classrooms. The emergent myths were categorised within their source metanarratives and were also positioned within a critical cultural framework. The term "computer education" is given to mean any curricular or classroom-based use of computers. This study addressed a hitherto neglected area of educational research by looking beyond the rhetoric and highlighting where policy decisions have been made on the basis of mythic assumptions. The identification of the cultural myth(s) in this study was essentially a process of looking for shadows. Finding the twenty-seven pervasive myths which initiated and sustained the systemic policies, infrastructure programs and curricular decisions of the period under review involved rigorous processes of deconstruction, reconstruction, analysis and synthesis. The data sources were contemporary policy documents, Hansard entries, press releases and media statements, correspondence and interviews with stakeholders while the methodology employed was an adaptation of Descriptive Interpretational Analysis (Tesch, 1990)

    The Perilous Dialogue

    Get PDF
    The master metaphor in the national security dialogue is, indeed, “security or freedom”. It dominates the counterterrorist discourse both in the United States and abroad. Transcripts from debates in Ireland’s Dáil Éireann, Turkey’s Büyük Millet Meclisi, and Australia’s Parliament are filled with reference to the need to weigh the value of liberty against the threat posed by terrorism. Perhaps nowhere is this more pronounced than in the United Kingdom, where, for decades, counterterrorist debates have turned on this framing. Owing in part, though, to different constitutional structures, what “security or freedom” means in America differs from what it means in Britain. In the United States, we tend to treat “security” and “freedom” as distinct phenomena: policy considerations set against pre-existing, political rights. Security becomes linked to decisions taken by the executive to preserve life—e.g., heightening protection against terrorist attacks by restricting entitlements specified in the Bill of Rights. Thus, Judge Richard Posner argues that in dangerous times, we must adjust constitutional rights to meet the demands of security. Professors Adrian Vermeule and Eric Posner propose “a basic tradeoff between security and liberty.” As Professor Holmes points out, the tradeoff framework is not limited to those who come down more heavily on the security side of the equation; civil libertarians also refer to the framework, arguing for the protection of rights in the face of security demands. In the United Kingdom, in contrast, scholars and policy makers tend to consider security versus freedom as a case of competing rights: the right to life or the right to freedom from fear set against the right to move freely. As Prime Minister Tony Blair announced on 9/11, the exercise of state power would be necessary to protect “the basic civil liberty that people have to go about their business free form [sic] terror.” This framing—competing rights in tension—reflects Britain’s constitutional structure. Measures introduced by Parliament do not have to conform to a written constitution. While some documents, such as the 1215 Magna Carta, or the 1689 Bill of Rights, carry special significance, they are part of a broader system that encompasses legal and non-legal rules. The multiplicity and fluidity of rights, and the constant effort to balance them, reflect Britain’s relationship with Europe, where the European Convention on Human Rights (incorporated into British domestic law through the 1998 Human Rights Act) and European Communities law weave together to create a complex system of rights and rules protecting them. Despite the manner in which the United States and United Kingdom interpret “security or freedom,” reflective of their respective constitutional differences, in both countries the dichotomy between rights and security dominates the counterterrorist discourse. And in both regions, because the dichotomy ignores in its narrow terms of reference the far-reaching effects of counterterrorism, it stifles the debate. The “hydraulic” assumption inherent in the “security or freedom” framework overlooks the possibility that rules—indeed, the rule of law itself—provide security. There are multiple types of securities and liberties at stake. And the framework distorts the “real tradeoffs” that are being made, such as the risks inevitably entailed in the allocation of limited resources. Most importantly, “security or freedom” fails to capture the single most important characteristic of counterterrorist law: increased executive power that shifts the balance of power between the branches of government. This article suggests that at each point where the legislature would be expected to push back against the executive’s power—at the introduction of measures, at the renewal of temporary provisions, and in the exercise of oversight—its ability to do so is limited. The judiciary’s role is similarly restricted: constitutional structure and cultural norms narrow the courts’ ability to check the executive at anything but the margins. With the long-term political and economic effects of this expanded executive strength masked by the immediacy of the “security or freedom” dichotomy, the true costs of anti-terror legislation in the United States and in the United Kingdom have gone uncalculated. Over the past four decades, both countries have seen the relationship between governmental branches altered, individual rights narrowed, and the relationship of the citizens to the state changed. Counterterrorist law has alienated important domestic and international communities, created bureaucratic inefficiencies, and interrupted commercial activity. As these two countries set global counterterrorist norms through important multilateral and bilateral organizations, such as the United Nations (“UN”), the UN Security Council, the G7/G8, and the Financial Action Task Force, the risk increases that these detrimental effects will be transferred to other constitutional democracies. American and British provisions, moreover, have evolved outside the specter of terrorist groups actually using weapons of mass destruction to inflict mass casualties. The proliferation of weapons of mass destruction—and I would add biological weapons to Professor Holmes’s concern about fissile material—together with a growing willingness on the part of extremists to sacrifice themselves, may drive the two countries to take increasingly severe measures. Such provisions could lead to a shift in the basic constitutional structure of both countries

    Hydropyrolysis: implications for radiocarbon pre-treatment and characterization of Black Carbon

    Get PDF
    Charcoal is the result of natural and anthropogenic burning events, when biomass is exposed to elevated temperatures under conditions of restricted oxygen. This process produces a range of materials, collectively known as pyrogenic carbon, the most inert fraction of which is known as Black Carbon (BC). BC degrades extremely slowly, and is resistant to diagenetic alteration involving the addition of exogenous carbon making it a useful target substance for radiocarbon dating particularly of more ancient samples, where contamination issues are critical. We present results of tests using a new method for the quantification and isolation of BC, known as hydropyrolysis (hypy). Results show controlled reductive removal of non-BC organic components in charcoal samples, including lignocellulosic and humic material. The process is reproducible and rapid, making hypy a promising new approach not only for isolation of purified BC for 14C measurement but also in quantification of different labile and resistant sample C fractions
    • 

    corecore