4,874 research outputs found
Reshaping the field: building restorative capital
Restorative justice is best known as an alternative approach for dealing with crime and wrongdoing. Yet as the restorative movement has grown it is increasingly being deployed in different arenas. Based on a two-year study funded by the UK National Lottery, this article provides an early glimpse into how people experience the introduction of restorativeness as cultural change within an organisational context. Using a combination of observation, in-depth interviews and focus groups, this research explores how different staff groups react to, adapt to and resist the introduction of a new ethos and language within their organisation. Drawing on the ideas of Bourdieu (1986), it appears that a new form of restorative cultural capital is emerging that threatens the very integrity of the values restorative justice claims to uphold
Gauge Mediated Mini-Split
We propose a simple model of split supersymmetry from gauge mediation. This
model features gauginos that are parametrically a loop factor lighter than
scalars, accommodates a Higgs boson mass of 125 GeV, and incorporates a simple
solution to the problem. The gaugino mass suppression can be
understood as resulting from collective symmetry breaking. Imposing collider
bounds on and requiring viable electroweak symmetry breaking implies
small -terms and small -- the stop mass ranges from to
10^8 \mbox{ GeV}. In contrast with models with anomaly + gravity mediation
(which also predict a one-loop loop suppression for gaugino masses), our gauge
mediated scenario predicts aligned squark masses and a gravitino LSP. Gluinos,
electroweakinos and Higgsinos can be accessible at the LHC and/or future
colliders for a wide region of the allowed parameter space.Comment: 16 pages, 1 figure. Journal version, references adde
Large coupling behaviour of the Lyapunov exponent for tight binding one-dimensional random systems
Studies the Lyapunov exponent gamma lambda (E) of (hu)(n)=u(n+1)+u(n-1)+ lambda V(n)u(n) in the limit as lambda to infinity where V is a suitable random potential. The authors prove that gamma lambda (E) approximately ln lambda as lambda to infinity uniformly as E/ lambda runs through compact sets. They also describe a formal expansion (to order lambda -2) for random and almost periodic potentials
Modeling of the heat transfer in bypass transitional boundary-layer flows
A low Reynolds number k-epsilon turbulence model and conditioned momentum, energy and turbulence equations were used to predict bypass transition heat transfer on a flat plate in a high-disturbance environment with zero pressure gradient. The use of conditioned equations was demonstrated to be an improvement over the use of the global-time-averaged equations for the calculation of velocity profiles and turbulence intensity profiles in the transition region of a boundary layer. The approach of conditioned equations is extended to include heat transfer and a modeling of transition events is used to predict transition onset and the extent of transition on a flat plate. The events, which describe the boundary layer at the leading edge, result in boundary-layer regions consisting of: (1) the laminar, (2) pseudolaminar, (3) transitional, and (4) turbulent boundary layers. The modeled transition events were incorporated into the TEXSTAN 2-D boundary-layer code which is used to numerically predict the heat transfer. The numerical predictions in general compared well with the experimental data and revealed areas where additional experimental information is needed
The Vector-like Twin Higgs
We present a version of the twin Higgs mechanism with vector-like top
partners. In this setup all gauge anomalies automatically cancel, even without
twin leptons. The matter content of the most minimal twin sector is therefore
just two twin tops and one twin bottom. The LHC phenomenology, illustrated with
two example models, is dominated by twin glueball decays, possibly in
association with Higgs bosons. We further construct an explicit
four-dimensional UV completion and discuss a variety of UV completions relevant
for both vector-like and fraternal twin Higgs models.Comment: 39 pages; v2 published versio
Tumour targeting with indium and silver labelled macrocycles
Monoclonal antibodies which recognise tumour associated antigens provide a means of targeting radionuclides selectively to tumour cells. Work has been directed towards the synthesis of functionalised macrocyclic ligands to bind indium(III) [(^111)In:- γ-emitter] and gallium(III) [(^67)Ga:- γ-emitter] for use in radioimmunoscintigraphy and silver(I) [(^111)Ag:- β-emitter] for use in radioimmunotherapy. Macrocyclic ligands have been selected to bind the respective radionuclides rapidly, under mild conditions, to form complexes which are kinetically inert in vivo. Four tribasic hexadentate macrocyclic ligands (9, 10, 11 and 12-membered rings) have been synthesised to bind indium and gallium. Comparison of the rate of (^111)In uptake under mild conditions at low concentration (10-100 µM) revealed that the nine-membered triaza-triacid was the most effective. The X-ray crystal structures of the indium and gallium complexes of the [9]-N(_3)-triacid have been determined. A C-functionalised derivative of the [9]-N(_3)-triacid has been synthesised by two routes, both starting from (2S)-Lysine. The syntheses of two N-functionalised derivatives of the [9]-N(_3)-triacid are also described. Antibody linkage has been effected (in collaborative work with Celltech Ltd.) by reacting the functionalised macrocycle with a heterobifunctional linker molecule (maleimide ester) followed by incubation with the antibody (previously treated with 2-iminothiolane).Three new nitrogen and sulphur donor macrocyclic ligands have been synthesised to bind silver(I) and the 1:1 silver complexes have been isolated as crystalline solids and characterised by FAB mass spectrometry and (^1)H nmr. Silver(I) complexes of two of the ligands have been characterised by X-ray crystallographic analysis. The stability constants (log K(_s), MeOH) for the silver(1) complexes of the[18]-membered N(_4)S(_2) and N(_4)S(_2)Me(_4) macrocyclic ligands (14.1 and 14.6respectively) are the highest recorded for monocyclic ligands
Improving the worthiness of the Elder problem as a benchmark for buoyancy driven convection models
An important trapping mechanism associated with the geosequestration of CO~2~ is that of dissolution into the formation water. Although supercritical CO~2~ is significantly less dense than water, experimental data reported in the literature show that the density of an aqueous solution of CO~2~ could be slightly greater. Under normal situations, the transfer of gas to solution is largely controlled by the relatively slow process of molecular diffusion. However, the presence of variable densities can trigger off gravity instabilities leading to much larger-scale convection processes. Such processes can potentially enhance rates of dissolution by an order of magnitude. Consequently there is a need for future performance assessment models to incorporate buoyancy driven convection (BDC). A major issue associated with BDC models is that of grid convergence when benchmarking to the Elder problem. The Elder problem originates from a heat convection experiment whereby a rectangular Hele-Shaw cell was heated over the central half of its base. A quarter of the way through the experiment, Elder (1967) observed six plumes, with four narrow plumes in the center and two larger plumes at the edges. As the experiment progressed, only four plumes remained. The issue is that depending on the grid resolution used when seeking to model this problem, modelers have found that different schemes yield steady states with either one, two or three plumes. The aim of this paper is to clarify and circumvent the issue of multiple steady state solutions in the Elder problem using a pseudospectral method
Honeypots: How do you know when you are inside one?
This paper will discuss honeypots and their use and effectiveness as a security measure in an IT environment. It will specifically discuss various methods of honeypot implementations. Furthermore, this paper will look into the weaknesses within a honeypot system. This will include attacks against honeypots and methods a hacker may use to detect the presence of a honeypot or the fact that he/she is actually inside one. Finally this paper will discuss methods of further securing honeypots and ways the community is dealing with security flaws as they are identifie
- …