8,536 research outputs found

    Influence of a solar proton event on stratospheric ozone

    Get PDF
    Ozone depletion in the stratosphere associated with the solar proton event of August 4, 1972, was observed with the backscattered ultraviolet experiment on the Nimbus 4 satellite. An abrupt ozone decrease in the 75-80 deg N zone of about 0.002 atm-cm above 4 mb was observed to persist throughout the month of August. A decrease was noted in the 55-65 deg N zone on days 219 and 220, but recovery occurred on day 221. Thereafter, a more gradual decrease was observed. The equatorial zone also showed gradual decrease after day 218, but these were not uniquely distinguished from seasonal variations. The observed change in total ozone following the event was -0.003 atm-cm for the 75-80 deg N zone, corresponding to a 1.3 percent reduction in the 0.305 atm-cm zonal average, but within the 0.019 atm-cm standard deviation. Above the 10 mb surface in the 75-80 deg N zone however, a decrease of 0.004 atm-cm may be compared with a standard deviation of 0.001 atm-cm

    Variations in the stratospheric ozone field inferred from Nimbus satellite observations

    Get PDF
    The ultraviolet earth radiance data from the Backscatter Ultraviolet Experiment on Nimbus 4 have been inverted to infer ozone profiles using a single Rayleigh scattering model. Two methods of solution give essentially the same results. Comparisons of these profiles with simultaneous rocket sounding data shows satisfactory agreement at low and middle latitudes. Vertical cross sections of ozone mixing ratio along the orbital tracks indicate that while the gross characteristics of the ozone field above 10 mb are under photochemical control, the influence of atmospheric motions can be found up to the 4 mb level

    Generating resources through co-evolution of entrepreneurs and ecosystems

    Get PDF
    Purpose – The emerging perspectives of entrepreneurial ecosystems, bricolage and effectuationhighlight the interaction between the entrepreneur and the surrounding community, and its potentialfor creative resource acquisition and utilization. However, empirical work on how this process actuallyunfolds remains scarce. This paper aims to study the interaction between the opportunity constructionprocess and the development of resources in the surrounding ecosystem. Design/methodology/approach – This paper is a qualitative analysis of the extreme case of AaltoEntrepreneurship Society (Aaltoes), a newly founded organization successfully promotingentrepreneurship within a university merger with virtually no resources, based on interviews of six keycontributors and four stakeholder organisations. Findings – The opportunity construction process both supported and was supported by two keyresource generating mechanisms. Formulating and opportunistically reformulating the agenda forincreasing potential synergy laid the groundwork for mutual benefit. Proactive concretization enhancedboth initial resource allocation and sustaining input to the process through offering tangible instancesof specific opportunities and feedback. Research limitations/implications – Although based on a single case study in a university setting,proactive concretization emerges as a promising direction for further investigations of the benefits anddynamics of entrepreneur– ecosystem interaction in the opportunity construction process. Practical implications – Intentionally creating beneficial entrepreneur– ecosystem interaction andteaching proactive concretization becomes a key goal for educators of entrepreneurship. Originality/value – The paper extends an understanding of creative resource generation and utilizationin the opportunity construction process. The role of proactive concretization was emphasized in theinteraction of the entrepreneur and the ecosystem, creating virtuous spirals of entrepreneurial activity.Peer reviewe

    A Memory Bandwidth-Efficient Hybrid Radix Sort on GPUs

    Full text link
    Sorting is at the core of many database operations, such as index creation, sort-merge joins, and user-requested output sorting. As GPUs are emerging as a promising platform to accelerate various operations, sorting on GPUs becomes a viable endeavour. Over the past few years, several improvements have been proposed for sorting on GPUs, leading to the first radix sort implementations that achieve a sorting rate of over one billion 32-bit keys per second. Yet, state-of-the-art approaches are heavily memory bandwidth-bound, as they require substantially more memory transfers than their CPU-based counterparts. Our work proposes a novel approach that almost halves the amount of memory transfers and, therefore, considerably lifts the memory bandwidth limitation. Being able to sort two gigabytes of eight-byte records in as little as 50 milliseconds, our approach achieves a 2.32-fold improvement over the state-of-the-art GPU-based radix sort for uniform distributions, sustaining a minimum speed-up of no less than a factor of 1.66 for skewed distributions. To address inputs that either do not reside on the GPU or exceed the available device memory, we build on our efficient GPU sorting approach with a pipelined heterogeneous sorting algorithm that mitigates the overhead associated with PCIe data transfers. Comparing the end-to-end sorting performance to the state-of-the-art CPU-based radix sort running 16 threads, our heterogeneous approach achieves a 2.06-fold and a 1.53-fold improvement for sorting 64 GB key-value pairs with a skewed and a uniform distribution, respectively.Comment: 16 pages, accepted at SIGMOD 201

    Declines in prevalence of adolescent substance use disorders and delinquent behaviors in the USA: A unitary trend?

    Get PDF
    AbstractBackgroundDownward trends in a number of adolescent risk behaviors including violence, crime, and drug use have been observed in the USA in recent years. It is unknown whether these are separate trends or whether they might relate to a general reduction in propensity to engage in such behaviors. Our objectives were to quantify trends in substance use disorders (SUDs) and delinquent behaviors over the 2003–2014 period and to determine whether they might reflect a single trend in an Externalizing-like trait.MethodsWe analyzed data from 12 to 17 year old participants from the National Survey on Drug Use and Health, a representative survey of the household dwelling population of the USA, across the 2003–2014 period (N = 210 599). Outcomes included past-year prevalence of six categories of substance use disorder and six categories of delinquent behavior.ResultsTrend analysis suggested a net decline of 49% in mean number of SUDs and a 34% decline in delinquent behaviors over the 12-year period. Item Response Theory models were consistent with the interpretation that declines in each set of outcomes could be attributed to changes in mean levels of a latent, Externalizing-like trait.ConclusionsOur findings suggest that declines in SUDs and some delinquent behaviors reflect a single trend related to an Externalizing-like trait. Identifying the factors contributing to this trend may facilitate continued improvement across a spectrum of adolescent risk behaviors.</jats:sec

    Surface-induced charge state conversion of nitrogen-vacancy defects in nanodiamonds

    Full text link
    We present a study of the charge state conversion of single nitrogen-vacancy (NV) defects hosted in nanodiamonds (NDs). We first show that the proportion of negatively-charged NV−^{-} defects, with respect to its neutral counterpart NV0^{0}, decreases with the size of the ND. We then propose a simple model based on a layer of electron traps located at the ND surface which is in good agreement with the recorded statistics. By using thermal oxidation to remove the shell of amorphous carbon around the NDs, we demonstrate a significant increase of the proportion of NV−^{-} defects in 10-nm NDs. These results are invaluable for further understanding, control and use of the unique properties of negatively-charged NV defects in diamondComment: 6 pages, 4 figure

    Room-temperature near-infrared silicon carbide nanocrystalline emitters based on optically aligned spin defects

    Full text link
    Bulk silicon carbide (SiC) is a very promising material system for bio-applications and quantum sensing. However, its optical activity lies beyond the near infrared spectral window for in-vivo imaging and fiber communications due to a large forbidden energy gap. Here, we report the fabrication of SiC nanocrystals and isolation of different nanocrystal fractions ranged from 600 nm down to 60 nm in size. The structural analysis reveals further fragmentation of the smallest nanocrystals into ca. 10-nm-size clusters of high crystalline quality, separated by amorphization areas. We use neutron irradiation to create silicon vacancies, demonstrating near infrared photoluminescence. Finally, we detect, for the first time, room-temperature spin resonances of these silicon vacancies hosted in SiC nanocrystals. This opens intriguing perspectives to use them not only as in-vivo luminescent markers, but also as magnetic field and temperature sensors, allowing for monitoring various physical, chemical and biological processes.Comment: 5 pages, 4 figure

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users
    • …
    corecore