1,171 research outputs found

    Differential spectrum modeling and sensitivity for keV sterile neutrino search at KATRIN

    Get PDF
    Starting in 2026, the KATRIN experiment will conduct a high-statistics measurement of the differential tritium β\beta-spectrum to energies deep below the kinematic endpoint. This enables the search for keV sterile neutrinos with masses less than the kinematic endpoint energy m4E0=18.6keVm_\mathrm{4} \leq E_0 = 18.6\,\mathrm{keV}, aiming for a statistical sensitivity of Ue42=sin2θ106|U_\mathrm{e4}|^2=\sin^2\theta\sim 10^{-6} for the mixing amplitude. The differential spectrum is obtained by decreasing the retarding potential of KATRIN\u27s main spectrometer, and by determining the β\beta-electron energies by their energy deposition in the new TRISTAN SDD array. In this mode of operation, the existing integral model of the tritium spectrum is insufficient, and a novel differential model is developed in this work. The new model (TRModel) convolves the differential tritium spectrum using responese matrices to predict the energy spectrum of registered events after data acquisition. Each response matrix encodes the spectral spectral distrortion from individual experimental effects, which depend on adjustable systematic parameters. This approach allows to efficiently assess the sensitivity impact of each systematics individually or in combination with others. The response matrices are obtained from monte carlo simulations, numerical convolution, and analytical computation. In this work, the sensitivity impact of 20 systematic parameters is assessed for the TRISTAN Phase-1 measurement for which nine TRISTAN SDD modules are integrated into the KATRIN beamline. Furthermore, it is demonstrated that the sensitivity impact is significantly mitigated with several beamline field adjustments and minimal hardware modifications

    Information actors beyond modernity and coloniality in times of climate change:A comparative design ethnography on the making of monitors for sustainable futures in Curaçao and Amsterdam, between 2019-2022

    Get PDF
    In his dissertation, Mr. Goilo developed a cutting-edge theoretical framework for an Anthropology of Information. This study compares information in the context of modernity in Amsterdam and coloniality in Curaçao through the making process of monitors and develops five ways to understand how information can act towards sustainable futures. The research also discusses how the two contexts, that is modernity and coloniality, have been in informational symbiosis for centuries which is producing negative informational side effects within the age of the Anthropocene. By exploring the modernity-coloniality symbiosis of information, the author explains how scholars, policymakers, and data-analysts can act through historical and structural roots of contemporary global inequities related to the production and distribution of information. Ultimately, the five theses propose conditions towards the collective production of knowledge towards a more sustainable planet

    Measuring the impact of COVID-19 on hospital care pathways

    Get PDF
    Care pathways in hospitals around the world reported significant disruption during the recent COVID-19 pandemic but measuring the actual impact is more problematic. Process mining can be useful for hospital management to measure the conformance of real-life care to what might be considered normal operations. In this study, we aim to demonstrate that process mining can be used to investigate process changes associated with complex disruptive events. We studied perturbations to accident and emergency (A &E) and maternity pathways in a UK public hospital during the COVID-19 pandemic. Co-incidentally the hospital had implemented a Command Centre approach for patient-flow management affording an opportunity to study both the planned improvement and the disruption due to the pandemic. Our study proposes and demonstrates a method for measuring and investigating the impact of such planned and unplanned disruptions affecting hospital care pathways. We found that during the pandemic, both A &E and maternity pathways had measurable reductions in the mean length of stay and a measurable drop in the percentage of pathways conforming to normative models. There were no distinctive patterns of monthly mean values of length of stay nor conformance throughout the phases of the installation of the hospital’s new Command Centre approach. Due to a deficit in the available A &E data, the findings for A &E pathways could not be interpreted

    Remote file access over low-speed lines

    Get PDF
    A link between microcomputer and mainframe can be useful in several ways, even when, as is usually the case, the link is only a normal terminal line. One interesting example is the ‘Integrated application’, which divides a task between microcomputer and mainframe and can offer several benefits; in particular, reducing load on the mainframe and permitting a more advanced user interface than possible on a conventional terminal. Because integrated applications consist of two co-operating programs, they are much more difficult to construct than a single program. It would be much easier to implement integrated applications concerned with the display and/or modification of data in mainframe files if the microcomputer could confine its dealings with the mainframe to a suitable file server. However, file servers do not appear practical for use over slow (compared to disc access speed) terminal lines. It was proposed to alleviate the problems caused by the slow link with extended file operations, which would allow time-consuming file operations such as searching or copying between files to be done in the file server. It was discovered after attempting such a system that extended file operations are not, by themselves, sufficient; but, allied to a record-based file model and asynchronous operations (i.e. file operations that do not suspend the user program until they complete), useful results could be obtained. This thesis describes FLAP, a file server for use over terminal lines which incorporates these ideas, and MMMS, an inter-application transport protocol used by FLAP for communication between the microcomputer file interface and the mainframe server. Two simple FLAP applications are presented, a customer records maintenance program and a screen editor. Details are given of their construction and response time in use at various line speeds

    A Direct-Style Effect Notation for Sequential and Parallel Programs

    Get PDF
    Modeling sequential and parallel composition of effectful computations has been investigated in a variety of languages for a long time. In particular, the popular do-notation provides a lightweight effect embedding for any instance of a monad. Idiom bracket notation, on the other hand, provides an embedding for applicatives. First, while monads force effects to be executed sequentially, ignoring potential for parallelism, applicatives do not support sequential effects. Composing sequential with parallel effects remains an open problem. This is even more of an issue as real programs consist of a combination of both sequential and parallel segments. Second, common notations do not support invoking effects in direct-style, instead forcing a rigid structure upon the code. In this paper, we propose a mixed applicative/monadic notation that retains parallelism where possible, but allows sequentiality where necessary. We leverage a direct-style notation where sequentiality or parallelism is derived from the structure of the code. We provide a mechanisation of our effectful language in Coq and prove that our compilation approach retains the parallelism of the source program

    Musiktheorie als interdisziplinäres Fach: 8. Kongress der Gesellschaft für Musiktheorie Graz 2008

    Get PDF
    Im Oktober 2008 fand an der Universität für Musik und darstellende Kunst Graz (KUG) der 8. Kongress der Gesellschaft für Musiktheorie (GMTH) zum Thema »Musiktheorie als interdisziplinäres Fach« statt. Die hier vorgelegten gesammelten Beiträge akzentuieren Musiktheorie als multiperspektivische wissenschaftliche Disziplin in den Spannungsfeldern Theorie/Praxis, Kunst/Wissenschaft und Historik/Systematik. Die sechs Kapitel ergründen dabei die Grenzbereiche zur Musikgeschichte, Musikästhetik, zur Praxis musikalischer Interpretation, zur kompositorischen Praxis im 20. und 21. Jahrhundert, zur Ethnomusikologie sowie zur Systematischen Musikwissenschaft. Insgesamt 45 Aufsätze, davon 28 in deutscher, 17 in englischer Sprache, sowie die Dokumentation einer Podiumsdiskussion zeichnen in ihrer Gesamtheit einen höchst lebendigen und gegenwartsbezogenen Diskurs, der eine einzigartige Standortbestimmung des Fachs Musiktheorie bietet.The 8th congress of the Gesellschaft für Musiktheorie (GMTH) took place in October 2008 at the University for Music and Dramatic Arts Graz (KUG) on the topic »Music Theory and Interdisciplinarity«. The collected contributions characterize music theory as a multi-faceted scholarly discipline at the intersection of theory/practice, art/science and history/system. The six chapters explore commonalties with music history, music aesthetics, musical performance, compositional practice in twentieth- and twenty-first-century music, ethnomusicology and systematic musicology. A total of 45 essays (28 in German, 17 in English) and the documentation of a panel discussion form a vital discourse informed by contemporaneous issues of research in a broad number of fields, providing a unique overview of music theory today. A comprehensive English summary appears at the beginning of all contributions

    Security Elites in Egypt and Jordan after the Arab Spring : A Case Study on Securocracies’ Role on National Security, Domestic Power Politics, Regional Order and Middle Eastern Alliance Making between 2011 and 2021

    Get PDF
    The doctoral dissertation studied changes in the balance of power, alliance making and the hegemonic struggles of security elites within a Middle Eastern regional context over a ten year reference period between 2011 and 2021. The study focused on two case study countries: Egypt and Jordan. The results were compared within a historical context to the pre-Arab Spring era. The theoretical approach combined the English School of Thought and Middle Eastern Studies with a conceptual model of securocracy developed by the author. The primary contribution of the research is the realization of the core importance of securocracy within autocratic state systems. Inside securocracies there exists rivalling groups and organisations that counterbalance each other. The study points to the fact that the power struggle between executive powers – either purely domestic one or supported by foreign involvement, is the main driver behind why case study countries were in varying degrees dragged into instability and turmoil in the aftermath of the Arab Spring. Securocracies can be divided into two main types: centralised and decentralised. The centralised model occurs when different elites groups have the same ”distance” to the ruler while having equal privileges and equal access to political power. The model predicts durability and stability of the regime (status quo). In the de-centralised model, there is an ongoing struggle amongst elite groups and “distances” to ruler are not equal, neither are the privileges. In Egypt the hegemonic struggle amongst elites took precedence over the interests and stability of the state after the Arab Spring and has continued since then. The situation at the end of 2021 is a de-centralised model where all executive powers are concentrated within President al-Sisi’s family dynasty (palace) and the leadership of military intelligence. This de-centralised type of securocracy makes Egypt’s situation fragile. Any impact from the outside, such as the Biden administration’s decision to impose additional conditions on U.S. financial military aid, could lead to a new hegemonic struggle challenging al-Sisi’s power. The securocracy’s survival strategy found in the study was the use of vertical power at all levels of the state hierarchy (” the winner takes it all”). In the situation of a power struggle, the ruler uses omni-balancing i.e., alliance making with powerful foreign states in order to gain an advantage against domestic rivals and revisionist regional states. The Egyptian example is al-Sisi’s rapprochement with Russia’s President Putin and his distancing of Egypt from its previous role of being the United States’ loyal Middle Eastern ally. The Jordanian example however, is the opposite, resulting in even closer relations with the United States since January 2021 when the two countries signed an updated Status of Forces Agreement (SOFA). The study also highlights that decisions concerning ruler succession in authoritarian states take place behind-the-scenes amongst the securocracy as it, per rule, prefers to choose a member inside its own interest group or alternatively a political figurehead that commits to protect securocracy’s privileged interests in exchange of their own power position. Within the Middle East, the recent U.S. pivot to Asia-Pacific created an opportunity for Russia to make a come-back. Russia, however, does not have the resources to compensate for the loss of U.S. financial military aid to the security elites. This in turn, and with Russia’s consent, has given space for regional state actors, particularly, the United Arab Emirates and Saudi-Arabia, to increase their influence. Gulf support to the regional clients is not free of charge: they request their clients adopt their own threat perceptions, take sides in armed conflicts and contribute to military capabilities which support the sponsors’ regional foreign and security policy goals.Väitöstutkimuksessa tarkasteltiin kymmenen vuoden ajanjaksolla voimatasapainon muutosta Lähi-idän alueellisessa valtarakenteessa, liittolaissuhteiden muutoksia sekä turvallisuuseliittien roolia maan sisäisessä valtataistelussa. Tuloksia verrattiin historiallisessa kontekstissa arabikevättä edeltävään aikaan kahdessa tapaustutkimusmaassa: Egyptissä ja Jordaniassa. Teoriaviitekehyksenä sovellettiin Englantilaisen koulukunnan ja Lähi-idän tutkimuksen teoriamalleja, sekä tutkijan kehittelemää sekurokratian konseptuaalista mallia. Tutkimuksen keskeinen tulos on havainto sekurokratian merkittävästä roolista osana autoritaarista valtiomallia. Sekurokratian sisälle on luotu useita toinen toistaan tasapainottavia ryhmittymiä. Tapaustutkimusmaiden arabikevään jälkeisen turvallisuustilanteen muutoksia selittävien tekijöiden joukossa turvallisuuseliittien valtakamppailu nousi merkittävään rooliin. Valtakamppailua käytiin eliittien kesken joko pelkästään maan sisällä tai vaihtoehtoisesti osin myös valtion ulkopuolisten voimien tukemana. Tutkimuksen perusteella sekurokratiat voidaan jakaa kahteen päätyyppiin: keskitettyyn ja hajautettuun malliin. Jos eri turvallisuuseliitti-ryhmien edut, vallankäyttö ja etäisyys vallan keskipisteeseen ovat tasapainossa puhutaan keskitetyn sekurokratian mallista, mikä ennustaa vallassa olevan regiimin pysyvyyttä ja vakautta. Jos taas sekurokratian rakenne on hajautetun mallin mukainen, sen valtakamppailu voi johtaa yhden osan pyrkimyksiin hegemonia-asemasta. Egyptin tapauksessa arabikevään jälkeinen turvallisuuseliittien valtakamppailu asetettiin maan vakauden edelle ja eliittien valtakamppailu on jatkunut tähän päivään. Tilanteessa vuoden 2021 lopussa valta on al-Sisin perhedynastialla ja sotilastiedustelun eliitillä (hajautettu malli). Hajautettu malli ei ennusta pitkäaikaista vallassa pysymistä; vahva ulkopuolinen heräte, esimerkiksi Bidenin hallinnon sotilaallisen talousavun lopettaminen voisi johtaa uuteen valtakamppailuun ja al-Sisin valta-aseman haastamiseen. Tutkimustulokset osoittavat, että sekurokratoiden selviytymisstrategiana on vallanvertikaalin käyttö valtiohallinnon eri tasoilla. Valtakamppailun tilanteessa käytetään tasapainotusstrategiaa (omni-balancing), missä alueellisia vahvoja valtioita ja suurvaltoja pyritään yhdistämään hallitsijan puolelle kilpailevia eliittiryhmittymiä tai revisionistisia ulkovaltoja vastaan. Egyptissä presidentti al-Sisin valtaannousu johti maan lähentymiseen presidentti Putinin Venäjän kanssa sekä etääntymiseen aiemmasta Yhdysvalloille uskollisen Lähi-idän liittolaisen roolista. Jordaniassa puolestaan maa on nyt entistä tiiviimmin liittoutunut Yhdysvaltojen kanssa. Esimerkkinä tästä on tammikuussa 2021 maiden kesken solmittu sotilasyhteistyötä ja jordanialaisten tukikohtien käyttöä säätelevä isäntämaatuki-sopimus. Tutkimustulosten valossa autoritaariselle vallanperimykselle tyypillistä on se, että julkisuuteen näkymättömän sisäisen valtakamppailun jälkeen uudeksi valtionpäämieheksi pyritään nostamaan sekurokratian sisältä sen oman intressiryhmän edustaja, tai vaihtoehtoisesti sekurokratian valitsema ulkopuolinen poliitikko, jonka vastuulle korporaation intressien vaaliminen lankeaa vastapalveluksena sekurokratian tuesta keulakuva-poliitikon vallassa pitämiseksi. Alueellisen turvallisuusjärjestyksen osalta tutkimuksen tulokset osoittavat sen, että Yhdysvaltojen painopisteen siirto Tyynellemerelle vii ja Aasiaan on antanut Venäjälle mahdollisuuden palauttaa vaikutusvaltaansa Lähiitään. Venäjällä ei kuitenkaan ole resursseja kompensoida Yhdysvaltojen arabivaltioiden turvallisuuseliiteille allokoimaa taloudellista tukea. Tämä on antanut tilaa alueellisten toimijoiden kuten Yhdistyneiden arabiemiirikuntien ja Saudi-Arabian vaikutusvallan kasvattamiselle - tosin Venäjän hyväksynnällä. Tuki ei myöskään tule ilmaiseksi, sillä sponsorit edellyttävät, että niille alisteisessa asemassa olevat maat omaksuvat tukijavaltioidensa uhkakuvat, sekä konfliktitilanteissa kontribuoivat sotilaallisia kyvykkyyksiä näiden valtioiden ulko- ja turvallisuuspoliittisten päämäärien saavuttamiseksi

    BETWEEN RUSSIA, CHINA, AND THE US: WHY DOES AUTHORITARIANISM PREVAIL IN KAZAKHSTAN?

    Get PDF
    Abstract The significance of the external influence of Russia and China on the strengthening of authoritarianism in Kazakhstan has yet to be revealed due to the lack of a theory of the interaction of external influence and domestic political regimes. In my research, I sought to show that the authoritarian regimes of the Eurasian states have a common political legacy that unites the states that have joined them into a single political world. Their main actors are the supporting states interested in preserving kindred regimes throughout the common political space. Using tracing process analysis, I have mapped out causal relationships through the survival mechanism of kinship regimes and restoration of interdependence between pivotal and non-pivotal actors that determine how key states, such as Russia and China, react to external factors—geopolitical threats. The most important conclusion of my research is that the weakening of an authoritarian regime in one of the non-pivotal states poses a threat to regimes in core states such as China and Russia and triggers their survival reaction through increased foreign policy towards non-core states. In addition, my research has shown that political regimes that share a common legacy are interdependent and that the external influence of the central states of a common political space is primary in maintaining internal regimes throughout its entire length. Therefore, pivotal states of other political legacies can influence political regime change when the causal mechanism fails

    Model-Predictive Control in Communication Networks

    Get PDF
    This dissertation consists of 8 papers, separated into 3 groups. The first 3 papers show, how model-predictive control can be applied to queueing networks and contain a detailed proof of throughput optimality. Additionally, numerous network examples are discussed, and a connection between the stability properties of assembly queues and random walks on quotient spaces is established. The next two papers develop algorithms, with which robust forecasts of delay can be obtained in queueing networks. To that end, a notion of robustness is proposed, and the network control policy is designed to meet this goal. For the last 3 papers, focus is shifted towards Age-of-Information. Two main contributions are the derivation of the distribution of the Age-of-Information values in networks with clocked working cycles and an algorithm for the exact numerical evaluation of the Age-of-Information state-space in a similar set-up
    corecore