4,358 research outputs found

    Basal-plane metallography of deformed pyrolytic carbon

    Get PDF
    Cleavage technique is recommended over the normal polishing technique in preparing pyrolytic carbon for metallographic examination of basal-plane surfaces. After careful removal of torn basal-plane fragments and other cleavage debris with cellulose tape, the true structure is clearly revealed

    Pore fluid constraints on deep ocean temperature and salinity during the Last Glacial Maximum

    Get PDF
    Pore water records of δ^(18)O and [Cl] from ODP Site 1063A on the Bermuda Rise constrain the change in seawater δ^(18)O and salinity from the Last Glacial Maximum (LGM) to the Holocene to be 0.75±0.05‰ and 2.5±0.1% respectively. Coupled with a measured benthic foraminiferal δ^(18)O change, this result means that bottom waters were 4.6±0.8°C cooler than the Holocene at the LGM and therefore at or near the seawater freezing point. Coupled δ^(18)O and chlorinity results give an extrapolated mean ocean LGM to Holocene change in δ^(18)O of 0.95±0.09‰. These data also constrain the past southern source deep‐water salinity to be 35.76±0.04 psu, which is within error of the mean deep ocean value for this time

    The quantization of exotic states in SU(3) soliton models: A solvable quantum mechanical analog

    Full text link
    The distinction between the rigid rotor and Callan-Klebanov approaches to the quantization of SU(3) solitons is considered in the context of exotic baryons. A numerically tractable quantum mechanical analog system is introduced to test the reliability of the two quantization schemes. We find that in the equivalent of the large N_c limit of QCD, the Callan-Klebanov approach agrees with a numerical solution of the quantum mechanical analog. Rigid rotor quantization generally does not. The implications for exotic baryons are briefly discussed.Comment: 8 pages; 3 figures; minor corrections; reference adde

    Biometrics: Weighing Convenience and National Security against Your Privacy

    Get PDF
    The biometric identifier relies on an individual\u27s unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a one-to-one match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal privacy

    The destruction of the Trinity River, California (1848--1964).

    Get PDF
    Abstract not available

    Biometrics: Weighing Convenience and National Security against Your Privacy

    Get PDF
    The biometric identifier relies on an individual\u27s unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a one-to-one match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal privacy

    Novel method and system for monitoring CPV cell and module temperature

    Get PDF
    This paper presents a novel system for accurate monitoring of photovoltaic cell temperature, allowing the introduction of thermal management strategies critical to maintaining high efficiencies and cell lifetimes. The sensor device outlined consists of a junction diode formed on the surface of a cell; a metallic contact is deposited onto the cell during manufacture forming a Schottky barrier diode. The additional metal-semiconductor junction is formed by the evaporation of a metal contact with suitable work function. A wire is then bonded to the contact for connection to an external monitoring/control circuit. Furthermore, the reverse leakage current of the Schottky diode is temperature dependent, and can be used as part of a feedback system to monitor and control the device temperature, either by controlling the movement of the module tracking so that the device is no longer in direct light or by switching in an active cooling device such as a fan if required. © 2010 IEEE

    Patient Education: Sodium Awareness in Bomoseen, VT

    Get PDF
    Many patients in the outpatient setting are placed on diets with sodium restrictions by their primary care physician for management of a variety of chronic diseases. Patients often have difficulties adhering to these diets, a primary reason being unawareness of the sodium content of many foods that make up the American diet. This project aims to increase awareness for these patients and to provide education for them to make more informed decisions about their health. A poster was made for providers to display in their practice that illustrates the sodium content of various food groups. The foods were selected based on recommendations and research from the CDC and American Heart Association. Future evaluation of the efficacy of this project would be elicited by a patient and provider questionnaire after the posters have been displayed for 6 months or more. This questionnaire could then be used to modify the posters to better fit this specific population and assist providers in this facet of patient education.https://scholarworks.uvm.edu/fmclerk/1332/thumbnail.jp

    The soft-energy region in the radiative decay of bound states

    Full text link
    The orthopositronium decay to three photons is studied in the phase-space region where one of the photons has an energy comparable to the relative three-momentum of the e+e- system (w ~ m alpha). The NRQED computation in this regime shows that the dominant contribution arises from distances ~ 1/(mw)^(1/2), which allows to treat the Coulomb interaction perturbatively. The small-photon energy expansion of the 1-loop decay spectrum from full QED yields the same result as the effective theory. By doing the threshold expansion of the 1-loop QED amplitude we confirm that the leading term arises from a loop-momentum region where q^0 ~ q^2/m ~ w. This corresponds to a new non-relativistic loop-momentum region, which has to be taken into account for the description of a non-relativistic particle-antiparticle system that decays through soft photon emission.Comment: 28 pages, 5 figures; typos corrected, one reference added, published versio
    corecore