5,573 research outputs found

    Noncontact temperature pattern measuring device

    Get PDF
    Laser pyrometer techniques are utilized to accurately image a true temperature distribution on a given target without touching the target and without knowing the localized emissivity of the target. The pyrometer utilizes a very high definition laser beam and photodetector, both having a very narrow focus. The pyrometer is mounted in a mechanism designed to permit the pyrometer to be aimed and focused at precise localized points on the target surface. The pyrometer is swept over the surface area to be imaged, temperature measurements being taken at each point of focus

    Research, When You Know What You’re Doing: A Review of Essentials of Qualitative Inquiry

    Get PDF
    Maria J. Mayan’s publication of Essentials of Qualitative Inquiry (2009) provides a broad introduction to the scope and process of conducting qualitative research. The author used many of the same concepts in his dissertation and continues to conduct qualitative inquiry, often times using Mayan’s book as a useful resource in structuring his research. The book outlined qualitative philosophies, methodologies, and data analysis procedures used in qualitative research

    Learning Autoethnography: A Review of Autoethnography: Understanding Qualitative Research

    Get PDF
    Tony E. Adams, Stacy Jones, and Carolyn Ellis’ publication of Autoethnography explains the scope and process of conducting autoethnographic research and its uses of self-examination and society. As a recent graduate, the author examined his own experiences in graduate school and the debates over quantitative and qualitative research methodologies as he read the text. The book outlined the purposes, procedures, and methods to determine validity in autoethnographic research by proffering personal examples and narratives to elucidate the research paradigm

    Bounded-time fault-tolerant rule-based systems

    Get PDF
    Two systems concepts are introduced: bounded response-time and self-stabilization in the context of rule-based programs. These concepts are essential for the design of rule-based programs which must be highly fault tolerant and perform in a real time environment. The mechanical analysis of programs for these two properties is discussed. The techniques are used to analyze a NASA application

    A Taxonomy of Phishing: Attack Types Spanning Economic, Temporal, Breadth, and Target Boundaries

    Get PDF
    Phishing remains a pernicious problem for organizations. Phishing attacks are increasing in sophistication, which hinders the ability of cybersecurity functions to effectively defend against them. These attacks are becoming increasingly complex, dynamic, and multifaceted to evade the organizational, individual, and technical countermeasures employed in a cybersecurity ecosystem. Information security (ISec) phishing research and practice have provided an understanding of generalized phishing attacks and their subsequent defense. Yet by applying generalized phishing rules to these studies, it may not be sufficient to understand and defend escalated forms of phishing. This study seeks to develop a taxonomy of phishing to provide a more nuanced understanding of this phenomena. This taxonomy may assist ISec research in providing theoretical guidance for the understanding and defense of the various forms of phishing

    Time Averaged Quantum Dynamics and the Validity of the Effective Hamiltonian Model

    Full text link
    We develop a technique for finding the dynamical evolution in time of an averaged density matrix. The result is an equation of evolution that includes an Effective Hamiltonian, as well as decoherence terms in Lindblad form. Applying the general equation to harmonic Hamiltonians, we confirm a previous formula for the Effective Hamiltonian together with a new decoherence term which should in general be included, and whose vanishing provides the criteria for validity of the Effective Hamiltonian approach. Finally, we apply the theory to examples of the AC Stark Shift and Three- Level Raman Transitions, recovering a new decoherence effect in the latter.Comment: 7 pages, 2 figure

    Classificiation of Atrial Fibrillation Prone Patients Using Electrocardiographic Parameters in Neuro-Fuzzy Modeling,

    Get PDF
    Atrial Fibrillation (AF) is a significant clinical problem and the complications of cardiovascular postoperative AF often lead to longer hospital stays and higher heath care costs. The literature showed that AF may be preceded by changes in electrocardiogram (ECG) characteristics such as premature atrial activity, heart rate variability (HRV), and P-wave morphology. We hypothesize that the limitations of statistics-based attempts to predict AF occurrence may be overcome using a hybrid neuro-fuzzy prediction model that is better capable of uncovering complex, non-linear interactions between ECG parameters. We created a neuro-fuzzy network that was able to classify the patients into the control and AF groups with the performances: 99.42% sensitivity, 99.89% specificity, and 99.74% accuracy for 30 minutes just before AF onset

    Basic and Advanced Competence in Collaborating With Clergy

    Full text link
    Some of the stories of psychologists and clergy working together have happy endings, and some do not. Twenty psychologists and clergy who work together well were interviewed, and 94 clergy (53% response rate) and 145 psychologists (76% response rate) were surveyed. A 2-tiered schema for working well with clergy is proposed. Basic collaborative qualifications, such as respect for clergy and communication with clergy as needed, should be considered minimal competence for all professional psychologists. Additional qualifications, such as awareness of religious spirituality and shared values, are necessary for more advanced forms of collaboration

    Role of iron in the tubulo-interstitial injury in nephrotoxic serum nephritis

    Get PDF
    Role of iron in the tubulo-interstitial injury in nephrotoxic serum nephritis. We studied the possibility that tubule fluid iron could be involved in the pathogenesis of the tubulo-interstitial injury associated with primary glomerular disease. Tubule fluid iron is determined by the magnitude of the glomerular leak for transferrin and the iron saturation of transferrin. To minimize tubule fluid iron in an experimental model of glomerulonephritis, iron deficiency was induced in rats prior to the induction of nephrotoxic serum nephritis. Iron deficiency did not effect the development of glomerular disease as determined by proteinuria, but had a marked effect on preventing the development of tubulo-interstitial disease and renal functional deterioration. There was also a strong correlation between the amount of functional deterioration and extent of tubulo-interstitial disease and urinary iron excretion in both the control and iron deficient animals. It is proposed that injury results from iron being dissociated from transferrin at the more acid pH of the tubule fluid. Iron, a transition element, is able to catalyze the Haber-Weiss reaction with the formation of free hydroxyl radicals which causes renal tubule cell injury. This tubulo-interstitial injury is the major determinate of progressive renal functional deterioration in this experimental model of glomerulonephritis
    • …
    corecore