4,414 research outputs found
Basal-plane metallography of deformed pyrolytic carbon
Cleavage technique is recommended over the normal polishing technique in preparing pyrolytic carbon for metallographic examination of basal-plane surfaces. After careful removal of torn basal-plane fragments and other cleavage debris with cellulose tape, the true structure is clearly revealed
Pore fluid constraints on deep ocean temperature and salinity during the Last Glacial Maximum
Pore water records of δ^(18)O and [Cl] from ODP Site 1063A on the Bermuda Rise constrain the change in seawater δ^(18)O and salinity from the Last Glacial Maximum (LGM) to the Holocene to be 0.75±0.05‰ and 2.5±0.1% respectively. Coupled with a measured benthic foraminiferal δ^(18)O change, this result means that bottom waters were 4.6±0.8°C cooler than the Holocene at the LGM and therefore at or near the seawater freezing point. Coupled δ^(18)O and chlorinity results give an extrapolated mean ocean LGM to Holocene change in δ^(18)O of 0.95±0.09‰. These data also constrain the past southern source deep‐water salinity to be 35.76±0.04 psu, which is within error of the mean deep ocean value for this time
The quantization of exotic states in SU(3) soliton models: A solvable quantum mechanical analog
The distinction between the rigid rotor and Callan-Klebanov approaches to the
quantization of SU(3) solitons is considered in the context of exotic baryons.
A numerically tractable quantum mechanical analog system is introduced to test
the reliability of the two quantization schemes. We find that in the equivalent
of the large N_c limit of QCD, the Callan-Klebanov approach agrees with a
numerical solution of the quantum mechanical analog. Rigid rotor quantization
generally does not. The implications for exotic baryons are briefly discussed.Comment: 8 pages; 3 figures; minor corrections; reference adde
Biometrics: Weighing Convenience and National Security against Your Privacy
The biometric identifier relies on an individual\u27s unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a one-to-one match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal privacy
The destruction of the Trinity River, California (1848--1964).
Abstract not available
Biometrics: Weighing Convenience and National Security against Your Privacy
The biometric identifier relies on an individual\u27s unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a one-to-one match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal privacy
Novel method and system for monitoring CPV cell and module temperature
This paper presents a novel system for accurate monitoring of photovoltaic cell temperature, allowing the introduction of thermal management strategies critical to maintaining high efficiencies and cell lifetimes. The sensor device outlined consists of a junction diode formed on the surface of a cell; a metallic contact is deposited onto the cell during manufacture forming a Schottky barrier diode. The additional metal-semiconductor junction is formed by the evaporation of a metal contact with suitable work function. A wire is then bonded to the contact for connection to an external monitoring/control circuit. Furthermore, the reverse leakage current of the Schottky diode is temperature dependent, and can be used as part of a feedback system to monitor and control the device temperature, either by controlling the movement of the module tracking so that the device is no longer in direct light or by switching in an active cooling device such as a fan if required. © 2010 IEEE
Patient Education: Sodium Awareness in Bomoseen, VT
Many patients in the outpatient setting are placed on diets with sodium restrictions by their primary care physician for management of a variety of chronic diseases. Patients often have difficulties adhering to these diets, a primary reason being unawareness of the sodium content of many foods that make up the American diet. This project aims to increase awareness for these patients and to provide education for them to make more informed decisions about their health. A poster was made for providers to display in their practice that illustrates the sodium content of various food groups. The foods were selected based on recommendations and research from the CDC and American Heart Association. Future evaluation of the efficacy of this project would be elicited by a patient and provider questionnaire after the posters have been displayed for 6 months or more. This questionnaire could then be used to modify the posters to better fit this specific population and assist providers in this facet of patient education.https://scholarworks.uvm.edu/fmclerk/1332/thumbnail.jp
The soft-energy region in the radiative decay of bound states
The orthopositronium decay to three photons is studied in the phase-space
region where one of the photons has an energy comparable to the relative
three-momentum of the e+e- system (w ~ m alpha). The NRQED computation in this
regime shows that the dominant contribution arises from distances ~
1/(mw)^(1/2), which allows to treat the Coulomb interaction perturbatively. The
small-photon energy expansion of the 1-loop decay spectrum from full QED yields
the same result as the effective theory. By doing the threshold expansion of
the 1-loop QED amplitude we confirm that the leading term arises from a
loop-momentum region where q^0 ~ q^2/m ~ w. This corresponds to a new
non-relativistic loop-momentum region, which has to be taken into account for
the description of a non-relativistic particle-antiparticle system that decays
through soft photon emission.Comment: 28 pages, 5 figures; typos corrected, one reference added, published
versio
- …