3,766 research outputs found

    Alien Registration- Hall, Claude (Fort Fairfield, Aroostook County)

    Get PDF
    https://digitalmaine.com/alien_docs/36331/thumbnail.jp

    Surprises in the suddenly-expanded infinite well

    Full text link
    I study the time-evolution of a particle prepared in the ground state of an infinite well after the latter is suddenly expanded. It turns out that the probability density ∣Ψ(x,t)∣2|\Psi(x, t)|^{2} shows up quite a surprising behaviour: for definite times, {\it plateaux} appear for which ∣Ψ(x,t)∣2|\Psi(x, t)|^{2} is constant on finite intervals for xx. Elements of theoretical explanation are given by analyzing the singular component of the second derivative ∂xxΨ(x,t)\partial_{xx}\Psi(x, t). Analytical closed expressions are obtained for some specific times, which easily allow to show that, at these times, the density organizes itself into regular patterns provided the size of the box in large enough; more, above some critical time-dependent size, the density patterns are independent of the expansion parameter. It is seen how the density at these times simply results from a construction game with definite rules acting on the pieces of the initial density.Comment: 24 pages, 14 figure

    Logical Lego? Co-constructed perspectives on service design

    Get PDF
    In the era of ‘digital by default’, internet-borne services reach out into spaces and places. One example of such a service is home-based micro-payments using Internet Protocol Television (IPTV) that depends on reliable information-sharing practices between user and service providers. Traditional business modelling and brainstorming methods struggle to articulate the influences of space and place on service requirements, especially in terms of human-to-human and cultural relations. Shared modelling with Lego produces three-dimensional ‘rich pictures’ of relational services design showing the influences of space and place upon a situated service design. However, previous studies have merely presented results as photographs without annotations explaining model dynamics. Line drawings subsequently made by the authors, based on the model, succeed in extracted recursive patterns of spatially and temporally distributed social practices. These drawings, together with the model, are prime candidates for service designers to articulate the relational spaces and the demographics of target user-communities

    Critical visualization:a case for rethinking how we visualize risk and security

    Get PDF
    In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important tool in the detection and prediction of risk and vulnerability in cybersecurity, but discussion tends to remain at the level of the usability of visualization tools and how to reduce the cognitive load on the consumers of the visualizations. This focus is rooted in a desire to simplify the complexity of cybersecurity. This article argues that while usability and simplification are important goals for the designers of visualizations, there is a much wider discussion that needs to take place about the underlying narratives upon which these visualizations are based. The authors take the position that the narratives on which cybersecurity visualizations are based ignore important aspects of cybersecurity and that their visual form causes the producers and users of these visualizations to focus too narrowly on adversarial security issues, ignoring important aspects of social and community-based security. By situating the discussion of security visualization in a larger socio-historical context, the limitations and implications of current ways of seeing risk become more apparent. Cybersecurity might also learn from other disciplines, specifically critiques of artificial intelligence and the discourse and methods of post-war urban planning. In this way, the article follows a humanities tradition of situating the focus of analysis in a broader tradition of scholarship and critiquing current practices from this wider context. The purpose of such critique is to stimulate reflection on underlying principles and the implications of different approaches to operationalizing those principles. Finally, case studies of participatory modelling and crowdsourcing projects are discussed that aim to foster resilience through social and spatial practices. These case studies illustrate the potential for a wider range of visualizations

    Examining the Contribution of Critical Visualisation to Information Security

    Get PDF
    This paper examines the use of visualisations in the field of information security and in particular focuses on the practice of information security risk assessment. We examine the current roles of information security visualisations and place these roles in the wider information visualisation discourse.\ud We present an analytic lens which divides visualisations into three categories: journalistic, scientic and critical visualisations. We then present a case study that uses these three categories of visualisations to further support information security practice.\ud Two signicant results emerge from this case study: (1) visualisations that promote critical thinking and reflection (a form of critical visualisation) support the multi-stakeholder nature of risk assessment and (2) a preparatory stage in risk assessment is sometimes needed by service designers in order to establish the service design before conducting a formal risk assessment.\ud The reader is invited to explore the images in the digital version of this paper where they can zoom in to particular aspects of the images and view the images in colour

    Le volcan Mojanda (Equateur) : deux appareils contemporains aux dynamismes éruptifs, développements et caractères géochimiques différents

    Get PDF
    Deux centres volcaniques majeurs (Mojanda et Fuya Fuya) constituent ce qui était considéré comme le volcan Mojanda. Après la construction de volcans de base essentiellement laviques, les développements et dynamismes éruptifs de ces deux appareils contemporains diffèrent. Au Mojanda, un nouveau cône est formé par des coulées et des tephra basiques. Au Fuya-Fuya, l'activité est constamment en relation avec un magmatisme acide : deux cycles commençant chacun par une éruption plinienne cataclysmale rhyolitique et se poursuivant par une activité des dômes y sont remarquables. Ils sont suivis par un gigantesque évènement de type St Helens, dont la caldera d'avalanche est ensuite occupée par un dernier complexe de dômes, encore actif à l'Holocène. Ces deux terminaux de développement sont en relation avec deux lignées magmatiques aux signatures géochimiques différentes. (Résumé d'auteur

    Holding on to dissensus: Participatory interactions in security design

    Get PDF
    Recent high-profile cyber-attacks affecting the National Health Service (NHS) in the UK have brought into focus the fact that data, devices, and people are so intermingled that we now need a new way of approaching everyday security that provides an account of place. The assumption until now has been that the security of the individual will follow from technical security and that designing for security requires purely technological solutions. Our creative engagement method puts the human security of actors in the foreground, ensuring that actors who may ordinarily be marginalized may have their perspectives taken into account. The creative methods used include participatory physical modelling to co-design representations of what constitutes ontological security in the everyday for communities. LEGO and other materials allow participants to physically model matters of concern as tangible scenarios, using colored bricks to encode actors, infrastructure, and the movement of data. In this paper, a single LEGO model, depicting an internet-protocol home-banking service, is described in detail. A number of playful and agonistic interactions between our participants are examined through a place-based lens, using descriptive concepts from ontological and autonomous design, an approach designed to tease apart different aspects of our results. This reveals how a community constructs place, the perspectives and horizons of actors, and networks of resilience. We find that participants achieve positive insight into these scenarios by testing out the ways in which they can be broken down by antagonists and adversaries. Participants sustain a space of contestation in which dissensus is established and anticipation of breakdown can be played with.Keywords: ontological design, autonomous design, ontological security, co-design, LEGO

    Investigation of gamma-ray sensitivity of neutron detectors based on thin converter films

    Full text link
    Currently, many detector technologies for thermal neutron detection are in development in order to lower the demand for the rare 3He gas. Gas detectors with solid thin film neutron converters readout by gas proportional counter method have been proposed as an appropriate choice for applications where large area coverage is necessary. In this paper, we investigate the probability for gamma-rays to generate a false count in a neutron measurement. Simulated results are compared to measurement with a 10B thin film prototype and a 3He detector. It is demonstrated that equal gamma-ray rejection to that of 3He tubes is achieved with the new technology. The arguments and results presented here are also applicable to gas detectors with converters other than solid 10B layers, such as 6Li layers and 10BF3 gas.Comment: Submitted to Journal of Instrumentatio
    • …
    corecore