3,222 research outputs found

    A Correlative Study of the News and Advertising of a Weekly Country Newspaper

    Get PDF
    To analyze in detail the growth and progress of numerous country weekly newspapers would present a far too stupendous a task for the immediate need of this treatise and would result in no accurate and acceptable conclusion to apply to each established weekly newspaper. The weeklies must vary with the individual publisher, policy, locality, type of readers and equipment and finances

    Confessions of a Young Workaholic: A Letter to My Future Self

    Get PDF
    How a child is raised is often the main impact on their future endeavors and behaviors. In this short letter, I assess how my upbringing affected my current attitudes and how I wish to better myself for the future

    Frankenstein in the Twenty-First Century

    Get PDF
    Analyzes the science and ethics of Mary Shelley\u27s Frankenstein. It utilizes historical and literary analyses, as well as a close reading of the text, to demonstrate the impact of eighteenth century science and how it leads to Frankenstein\u27s immorality

    Novel Scaling Behavior for the Multiplicity Distribution under Second-Order Quark-Hadron Phase Transition

    Full text link
    Deviation of the multiplicity distribution PqP_q in small bin from its Poisson counterpart pqp_q is studied within the Ginzburg-Landau description for second-order quark-hadron phase transition. Dynamical factor dq≡Pq/pqd_q\equiv P_q/p_q for the distribution and ratio Dq≡dq/d1D_q\equiv d_q/d_1 are defined, and novel scaling behaviors between DqD_q are found which can be used to detect the formation of quark-gluon plasma. The study of dqd_q and DqD_q is also very interesting for other multiparticle production processes without phase transition.Comment: 4 pages in revtex, 5 figures in eps format, will be appeared in Phys. Rev.

    Point-wise mutual information-based video segmentation with high temporal consistency

    Full text link
    In this paper, we tackle the problem of temporally consistent boundary detection and hierarchical segmentation in videos. While finding the best high-level reasoning of region assignments in videos is the focus of much recent research, temporal consistency in boundary detection has so far only rarely been tackled. We argue that temporally consistent boundaries are a key component to temporally consistent region assignment. The proposed method is based on the point-wise mutual information (PMI) of spatio-temporal voxels. Temporal consistency is established by an evaluation of PMI-based point affinities in the spectral domain over space and time. Thus, the proposed method is independent of any optical flow computation or previously learned motion models. The proposed low-level video segmentation method outperforms the learning-based state of the art in terms of standard region metrics

    SAFEGUARDING THE FUTURE OF HOMELAND SECURITY

    Get PDF
    Homeland security is both a complex and a dynamic field, which involves a wide-variety of professions and information technology skill sets. Information security remains a primary concern for the National Security Agency (NSA) and the Department of Homeland Security. Continued challenges to the confidentiality, integrity, and availability of distributed computing drove the innovation of a new concentration in Homeland Security within the B.S. in Information Technology program at Middle Georgia State College. This paper will present the educational components of the Homeland Security concentration as well as discuss modifications to the Information Security and Assurance program. The programs design takes into account the outcomes from the Center of Excellence in Information Assurance Education (CAE) with the intent of moving the institution into a recognized status

    AVOIDING DISASTER IN ONSITE INCIDENT RESPONSE PLANNING: A CASE STUDY

    Get PDF
    An effective security policy is a detrimental part of any organization’s sustainability, and can mean the difference between success and failure for the organization should a disaster occur. The main components of the security policy are the incidence response plan and the disaster recovery plan. Many organizations, however, do not know how to go about incorporating these plans into their policies and standards. The workshop discusses best practices in gathering requirements for the development of Incident Response Planning, paying particular attention to issues that are unique in an online learning system. An actual organization in need of these plans was selected and participated in this study. Issues to discuss include physical walkthroughs of facilities, obtaining knowledge of the procedures and policies already in place at organizations, methods of interviewing key people in the organization, analyzing the organization’s strengths and weaknesses as they relate to physical and logical security, and legal requirements that should be followed. With this information, the workshop will then demonstrate how to devise a comprehensive plan to assist an organization in meeting minimum-security standards through implementation of best practices as outlined by the National Institute of Science and Technology (NIST)

    High-Risk Wildlife Strike Regions: An In-depth Visual Representation of Wildlife Strikes at and Around Part 139 Airports in Florida.

    Get PDF
    Wildlife strikes with aircraft have been and continue to be a problem in the aviation industry costing millions of dollars in both damage and delays. This study used the geoprocessing information system ArcGIS to depict wildlife strikes at Florida’s 26 Part 139 Airports from 2012 to 2021. Importing reports from the National Wildlife Strike Database into ArcGIS, this study used symbology and geoprocessing tools to create a color/ size gradient that depicts the risk (number of damaging strikes out of known strikes) at each airport. Using an interactive map with ArcGIS Online viewers can observe then select each airports vector point and view a table containing the important information on that airports strike data. Data like number of strikes during time of the day, strikes per weather conditions, and whether the strikes were damaging or not, are contained in the online resource. Attempts to study and depict wildlife strikes are limited, the industry and researchers need to continue research on a localized scale to help mitigate wildlife strikes

    Factorial Moments of Continuous Order

    Full text link
    The normalized factorial moments FqF_q are continued to noninteger values of the order qq, satisfying the condition that the statistical fluctuations remain filtered out. That is, for Poisson distribution Fq=1F_q = 1 for all qq. The continuation procedure is designed with phenomenology and data analysis in mind. Examples are given to show how FqF_q can be obtained for positive and negative values of qq. With qq being continuous, multifractal analysis is made possible for multiplicity distributions that arise from self-similar dynamics. A step-by-step procedure of the method is summarized in the conclusion.Comment: 15 pages + 9 figures (figures available upon request), Late

    The random case of Conley's theorem

    Full text link
    The well-known Conley's theorem states that the complement of chain recurrent set equals the union of all connecting orbits of the flow ϕ\phi on the compact metric space XX, i.e. X−CR(ϕ)=⋃[B(A)−A]X-\mathcal{CR}(\phi)=\bigcup [B(A)-A], where CR(ϕ)\mathcal{CR}(\phi) denotes the chain recurrent set of ϕ\phi, AA stands for an attractor and B(A)B(A) is the basin determined by AA. In this paper we show that by appropriately selecting the definition of random attractor, in fact we define a random local attractor to be the ω\omega-limit set of some random pre-attractor surrounding it, and by considering appropriate measurability, in fact we also consider the universal σ\sigma-algebra Fu\mathcal F^u-measurability besides F\mathcal F-measurability, we are able to obtain the random case of Conley's theorem.Comment: 15 page
    • …
    corecore