3,766 research outputs found
Alien Registration- Hall, Claude (Fort Fairfield, Aroostook County)
https://digitalmaine.com/alien_docs/36331/thumbnail.jp
Surprises in the suddenly-expanded infinite well
I study the time-evolution of a particle prepared in the ground state of an
infinite well after the latter is suddenly expanded. It turns out that the
probability density shows up quite a surprising behaviour:
for definite times, {\it plateaux} appear for which is
constant on finite intervals for . Elements of theoretical explanation are
given by analyzing the singular component of the second derivative
. Analytical closed expressions are obtained for some
specific times, which easily allow to show that, at these times, the density
organizes itself into regular patterns provided the size of the box in large
enough; more, above some critical time-dependent size, the density patterns are
independent of the expansion parameter. It is seen how the density at these
times simply results from a construction game with definite rules acting on the
pieces of the initial density.Comment: 24 pages, 14 figure
Logical Lego? Co-constructed perspectives on service design
In the era of ‘digital by default’, internet-borne services reach out into spaces and places. One example of such a service is home-based micro-payments using Internet Protocol Television (IPTV) that depends on reliable information-sharing practices between user and service providers. Traditional business modelling and brainstorming methods struggle to articulate the influences of space and place on service requirements, especially in terms of human-to-human and cultural relations. Shared modelling with Lego produces three-dimensional ‘rich pictures’ of relational services design showing the influences of space and place upon a situated service design. However, previous studies have merely presented results as photographs without annotations explaining model dynamics. Line drawings subsequently made by the authors, based on the model, succeed in extracted recursive patterns of spatially and temporally distributed social practices. These drawings, together with the model, are prime candidates for service designers to articulate the relational spaces and the demographics of target user-communities
Critical visualization:a case for rethinking how we visualize risk and security
In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important tool in the detection and prediction of risk and vulnerability in cybersecurity, but discussion tends to remain at the level of the usability of visualization tools and how to reduce the cognitive load on the consumers of the visualizations. This focus is rooted in a desire to simplify the complexity of cybersecurity. This article argues that while usability and simplification are important goals for the designers of visualizations, there is a much wider discussion that needs to take place about the underlying narratives upon which these visualizations are based. The authors take the position that the narratives on which cybersecurity visualizations are based ignore important aspects of cybersecurity and that their visual form causes the producers and users of these visualizations to focus too narrowly on adversarial security issues, ignoring important aspects of social and community-based security. By situating the discussion of security visualization in a larger socio-historical context, the limitations and implications of current ways of seeing risk become more apparent. Cybersecurity might also learn from other disciplines, specifically critiques of artificial intelligence and the discourse and methods of post-war urban planning. In this way, the article follows a humanities tradition of situating the focus of analysis in a broader tradition of scholarship and critiquing current practices from this wider context. The purpose of such critique is to stimulate reflection on underlying principles and the implications of different approaches to operationalizing those principles. Finally, case studies of participatory modelling and crowdsourcing projects are discussed that aim to foster resilience through social and spatial practices. These case studies illustrate the potential for a wider range of visualizations
Examining the Contribution of Critical Visualisation to Information Security
This paper examines the use of visualisations in the field of information security and in particular focuses on the practice of information security risk assessment. We examine the current roles of information security visualisations and place these roles in the wider information visualisation discourse.\ud
We present an analytic lens which divides visualisations into three categories: journalistic, scientic and critical visualisations. We then present a case study that uses these three categories of visualisations to further support information security practice.\ud
Two signicant results emerge from this case study: (1) visualisations that promote critical thinking and reflection (a form of critical visualisation) support the multi-stakeholder nature of risk assessment and (2) a preparatory stage in risk assessment is sometimes needed by service designers in order to establish the service design before conducting a formal risk assessment.\ud
The reader is invited to explore the images in the digital version of this paper where they can zoom in to particular aspects of the images and view the images in colour
Le volcan Mojanda (Equateur) : deux appareils contemporains aux dynamismes éruptifs, développements et caractères géochimiques différents
Deux centres volcaniques majeurs (Mojanda et Fuya Fuya) constituent ce qui était considéré comme le volcan Mojanda. Après la construction de volcans de base essentiellement laviques, les développements et dynamismes éruptifs de ces deux appareils contemporains diffèrent. Au Mojanda, un nouveau cône est formé par des coulées et des tephra basiques. Au Fuya-Fuya, l'activité est constamment en relation avec un magmatisme acide : deux cycles commençant chacun par une éruption plinienne cataclysmale rhyolitique et se poursuivant par une activité des dômes y sont remarquables. Ils sont suivis par un gigantesque évènement de type St Helens, dont la caldera d'avalanche est ensuite occupée par un dernier complexe de dômes, encore actif à l'Holocène. Ces deux terminaux de développement sont en relation avec deux lignées magmatiques aux signatures géochimiques différentes. (Résumé d'auteur
Holding on to dissensus: Participatory interactions in security design
Recent high-profile cyber-attacks affecting the National Health Service (NHS) in the UK have brought into focus the fact that data, devices, and people are so intermingled that we now need a new way of approaching everyday security that provides an account of place. The assumption until now has been that the security of the individual will follow from technical security and that designing for security requires purely technological solutions. Our creative engagement method puts the human security of actors in the foreground, ensuring that actors who may ordinarily be marginalized may have their perspectives taken into account. The creative methods used include participatory physical modelling to co-design representations of what constitutes ontological security in the everyday for communities. LEGO and other materials allow participants to physically model matters of concern as tangible scenarios, using colored bricks to encode actors, infrastructure, and the movement of data. In this paper, a single LEGO model, depicting an internet-protocol home-banking service, is described in detail. A number of playful and agonistic interactions between our participants are examined through a place-based lens, using descriptive concepts from ontological and autonomous design, an approach designed to tease apart different aspects of our results. This reveals how a community constructs place, the perspectives and horizons of actors, and networks of resilience. We find that participants achieve positive insight into these scenarios by testing out the ways in which they can be broken down by antagonists and adversaries. Participants sustain a space of contestation in which dissensus is established and anticipation of breakdown can be played with.Keywords: ontological design, autonomous design, ontological security, co-design, LEGO
Investigation of gamma-ray sensitivity of neutron detectors based on thin converter films
Currently, many detector technologies for thermal neutron detection are in
development in order to lower the demand for the rare 3He gas. Gas detectors
with solid thin film neutron converters readout by gas proportional counter
method have been proposed as an appropriate choice for applications where large
area coverage is necessary. In this paper, we investigate the probability for
gamma-rays to generate a false count in a neutron measurement. Simulated
results are compared to measurement with a 10B thin film prototype and a 3He
detector. It is demonstrated that equal gamma-ray rejection to that of 3He
tubes is achieved with the new technology. The arguments and results presented
here are also applicable to gas detectors with converters other than solid 10B
layers, such as 6Li layers and 10BF3 gas.Comment: Submitted to Journal of Instrumentatio
- …