13,192 research outputs found
Morphological budgeting in the Motueka River: an analysis of technique
Morphological budgeting is a key method for monitoring and studying sediment transfers within gravelly rivers. We assess the utility of traditional crossâsection approaches to budgeting using Digital Elevation Model (DEM) analysis. DEMs give a more accurate volume calculation within the
constraint of sampling frequency compared with cross sections, since a greater area of river bed is sampled. DEM volume calculation within the 1.7 km âThree Beachesâ reach in the upper Motueka revealed a net loss of 3219 m3 in this reach between 2008â2009. Comparisons of this value with cross sectionâbased volume calculations at a range of section spacing using (i) Mean Bed Level (MBL) analysis and (ii) DEMs generated from cross section data, suggest accuracy of the budget is maximised at a critical cross section spacing not exceeding 90 m. Careful positioning of cross sections could lengthen this distance further and is essential to accurately represent river channel morphology. MBL analysis using crossâsections in the reach monumented by Tasman District Council (TDC) for river monitoring underestimates the magnitude of net sediment transfers by c. 30%
Neutrino Capture and r-Process Nucleosynthesis
We explore neutrino capture during r-process nucleosynthesis in
neutrino-driven ejecta from nascent neutron stars. We focus on the interplay
between charged-current weak interactions and element synthesis, and we
delineate the important role of equilibrium nuclear dynamics. During the period
of coexistence of free nucleons and light and/or heavy nuclei, electron
neutrino capture inhibits the r-process. At all stages, capture on free
neutrons has a larger impact than capture on nuclei. However, neutrino capture
on heavey nuclei by itself, if it is very strong, is also detrimental to the
r-process until large nuclear equilibrium clusters break down and the classical
neutron-capture phase of the r-process begins. The sensitivity of the r-process
to neutrino irradiation means that neutrino-capture effects can strongly
constrain the r-process site, neutrino physics, or both. These results apply
also to r-process scenarios other than neutrino-heated winds.Comment: 20 pages, 17 figures, Submitted to Physical Review
Recommended from our members
Business Models and Technological Innovation
Business models are fundamentally linked with technological innovation, yet the business model construct is essentially separable from technology. We define the business model as a system that solves the problem of identifying who is (or are) the customer(s), engaging with their needs, delivering satisfaction, and monetizing the value. The framework depicts the business model system as a model containing cause and effect relationships, and it provides a basis for classification. We formulate the business model relationship with technology in a two-way manner. First, business models mediate the link between technology and firm performance. Secondly, developing the right technology is a matter of a business model decision regarding openness and user engagement. We suggest research questions both for technology management and innovation, as well as strategy
Neutrino-Neutrino Scattering and Matter-Enhanced Neutrino Flavor Transformation in Supernovae
We examine matter-enhanced neutrino flavor transformation
() in the region above the neutrino
sphere in Type II supernovae. Our treatment explicitly includes contributions
to the neutrino-propagation Hamiltonian from neutrino-neutrino forward
scattering. A proper inclusion of these contributions shows that they have a
completely negligible effect on the range of - vacuum
mass-squared difference, , and vacuum mixing angle, , or
equivalently , required for enhanced supernova shock re-heating.
When neutrino background effects are included, we find that -process
nucleosynthesis from neutrino-heated supernova ejecta remains a sensitive probe
of the mixing between a light and a with a
cosmologically significant mass. Neutrino-neutrino scattering contributions are
found to have a generally small effect on the
parameter region probed by -process nucleosynthesis. We point out that the
nonlinear effects of the neutrino background extend the range of sensitivity of
-process nucleosynthesis to smaller values of .Comment: 38 pages, tex, DOE/ER/40561-150-INT94-00-6
Modulus Computational Entropy
The so-called {\em leakage-chain rule} is a very important tool used in many
security proofs. It gives an upper bound on the entropy loss of a random
variable in case the adversary who having already learned some random
variables correlated with , obtains some further
information about . Analogously to the information-theoretic
case, one might expect that also for the \emph{computational} variants of
entropy the loss depends only on the actual leakage, i.e. on .
Surprisingly, Krenn et al.\ have shown recently that for the most commonly used
definitions of computational entropy this holds only if the computational
quality of the entropy deteriorates exponentially in
. This means that the current standard definitions
of computational entropy do not allow to fully capture leakage that occurred
"in the past", which severely limits the applicability of this notion.
As a remedy for this problem we propose a slightly stronger definition of the
computational entropy, which we call the \emph{modulus computational entropy},
and use it as a technical tool that allows us to prove a desired chain rule
that depends only on the actual leakage and not on its history. Moreover, we
show that the modulus computational entropy unifies other,sometimes seemingly
unrelated, notions already studied in the literature in the context of
information leakage and chain rules. Our results indicate that the modulus
entropy is, up to now, the weakest restriction that guarantees that the chain
rule for the computational entropy works. As an example of application we
demonstrate a few interesting cases where our restricted definition is
fulfilled and the chain rule holds.Comment: Accepted at ICTS 201
Vascular risk factors and diabetic neuropathy
Background: Other than glycemic control, there are no treatments for diabetic neuropathy. Thus, identifying potentially modifiable risk factors for neuropathy is crucial. We studied risk factors for the development of distal symmetric neuropathy in 1172 patients with type 1 diabetes mellitus from 31 centers participating in the European Diabetes (EURODIAB) Prospective Complications Study.
Methods: Neuropathy was assessed at baseline (1989 to 1991) and at follow-up (1997 to 1999), with a mean (±SD) follow-up of 7.3±0.6 years. A standardized protocol included clinical evaluation, quantitative sensory testing, and autonomic-function tests. Serum lipids and lipoproteins, glycosylated hemoglobin, and the urinary albumin excretion rate were measured in a central laboratory.
Results: At follow-up, neuropathy had developed in 276 of 1172 patients without neuropathy at baseline (23.5 percent). The cumulative incidence of neuropathy was related to the glycosylated hemoglobin value and the duration of diabetes. After adjustment for these factors, we found that higher levels of total and low-density lipoprotein cholesterol and triglycerides, a higher body-mass index, higher von Willebrand factor levels and urinary albumin excretion rate, hypertension, and smoking were all significantly associated with the cumulative incidence of neuropathy. After adjustment for other risk factors and diabetic complications, we found that duration of diabetes, current glycosylated hemoglobin value, change in glycosylated hemoglobin value during the follow-up period, body-mass index, and smoking remained independently associated with the incidence of neuropathy. Cardiovascular disease at baseline was associated with double the risk of neuropathy, independent of cardiovascular risk factors.
Conclusions: This prospective study indicates that, apart from glycemic control, the incidence of neuropathy is associated with potentially modifiable cardiovascular risk factors, including a raised triglyceride level, body-mass index, smoking, and hypertension
Recommended from our members
Sparrow therapeutics exit strategy
The case focuses on Ken Powers, cofounder and chief executive officer of Sparrow Therapeutics, whose young biotechnology company has reached a critical stage where he has to decide whether or not to sell. The company's three main sets of investors have different priorities: (1) a quick cash sale now, (2) delay sale for about a year if returns are greater, and (3) delay sale for 2 years, build company value, and retain autonomy. What choice would be best for the company, for its investors-and for Ken himself? And when would be the best time to implement the exit strategy
Characterising an implementation intervention in terms of behaviour change techniques and theory: the 'Sepsis Six' clinical care bundle
Sepsis is a major cause of death from infection, with a mortality rate of 36Â %. This can be halved by implementing the 'Sepsis Six' evidence-based care bundle within 1Â h of presentation. A UK audit has shown that median implementation rates are 27-47Â % and interventions to improve this have demonstrated minimal effects. In order to develop more effective implementation interventions, it is helpful to obtain detailed characterisations of current interventions and to draw on behavioural theory to identify mechanisms of change. The aim of this study was to illustrate this process by using the Behaviour Change Wheel; Behaviour Change Technique (BCT) Taxonomy; Capability, Opportunity, Motivation model of behaviour; and Theoretical Domains Framework to characterise the content and theoretical mechanisms of action of an existing intervention to implement Sepsis Six
Recommended from our members
Strategies for Competing in the Automotive Industryâs Software Ecosystem: Standards and Bottlenecks
The automotive industry includes many actors engaged in software that span small and large companies within old and new sectors. This paper focuses on the controlling position of car manufacturers in the automotive software ecosystem and suggests three strategies for participating software innovators â contesting, cooperating and circumventing. The strategies are exemplified with current cases: Tesla as contestation, Bosch cooperation with a car manufacturer in a data collection project as a basis for future services, and circumventing in a project based on the mobile Internet
- âŠ