3,947 research outputs found

    Current-induced torques due to compensated antiferromagnets

    Full text link
    We analyse the influence of current induced torques on the magnetization configuration of a ferromagnet in a circuit containing a compensated antiferromagnet. We argue that these torques are generically non-zero and support this conclusion with a microscopic NEGF calculation for a circuit containing antiferromagnetic NiMn and ferromagnetic Co layers. Because of symmetry dictated differences in the form of the current-induced torque, the phase diagram which expresses the dependence of ferromagnet configuration on current and external magnetic field differs qualitatively from its ferromagnet-only counterpart.Comment: 4 pages, 5 figure

    COBOL.NET Running Legacy COBOL Programs by Proxy: Working Paper Series--05-02

    Get PDF
    One response to the trend toward object orientation in programming languages has been the inclusion of object orientation to COBOL. Additionally, graphical user interfaces have been added to existing batch and interactive COBOL programs. This has been accomplished through COBOL compilers and the addition of GUIs created in other languages. An expansion of both of these additions to legacy COBOL programs has been the incorporation of COBOL into Microsoft's .NET Framework. Through this process old legacy COBOL programs can appear as if they were written in a contemporary language such as C#

    Data File Security Through Cryptography Using the Advanced Encryption Standard (RIJNDAEL): Working Paper Series--05-03

    Get PDF
    The use of cryptography, both the encryption and decryption of data is one response to the concerns of securing data files. The Rijndael cipher block, which has been adopted by the National Institute of Standards and technology as the advanced encryption standard, has been used in this study to encrypt and decrypt data. This has been accomplished by encrypting a plain text file and creating an encrypted file in one program, and decrypting the encrypted file back to a plain text file in another program. Both the encryption and decryption programs utilize the same secret key. If the key is lost decryption is not possible, and if the key is discovered the security of the data is compromised. Despite the risk, cryptography using the Rijndael cipher block adds considerable security to otherwise unsecured data

    Something Lost - Something Gained: From COBOL to Java to C# in Intermediate Programming Courses: Working Paper Series--03-05

    Get PDF
    The decision as to which programming language to use in intermediate business programming courses has become increasingly challenging. For many years COBOL has been the language used, but recently Java has become the language of choice. This has come with the benefit of the use of a language that is fully object-oriented, but has also come with some costs. Among the costs is a more awkward Graphical User Interface, but the primary cost is the loss of the scope of data file processing that existed with COBOL. The use of C# in intermediate programming courses provides all of the benefits of Java, as far as object-orientation, and also provides the data file processing available in COBOL, but with a much more intuitive Graphical User Interface. What was lost by going from COBOL to Java has been regained by going from Java to C

    An Evaluation of a Renewal-Mitigation Procedure for Inappropriate Mealtime Behavior

    Get PDF
    Renewal, the increase in problem behavior during extinction following a context change (e.g., transfer of intervention from clinic to home), may be particularly concerning during interventions for feeding disorders because multiple context changes are often necessary for intervention generality and maintenance (Podlesnik et al., 2017). In the current study, we tested for renewal and evaluated a renewal-mitigation procedure when we transferred the intervention from a therapist to a caregiver, from clinic to the home, and introduced Context A foods. We used an ABA arrangement to evaluate the generality of the renewal effect with 7 children with feeding disorders. Context A was functional reinforcement. Context B was function-based extinction during the control and mitigation conditions and our renewal-mitigation procedure in the mitigation condition. The renewal test was function-based extinction in Context A. We observed renewal of inappropriate mealtime behavior following an implementer, setting, and implementer plus setting change. Of the children for whom we observed renewal, our renewal-mitigation procedures were effective for 4 of 4 children

    .NET as a Teaching Tool: Working Paper Series--03-06

    Get PDF
    In the introductory business programming courses, the BASIC programming language was used for many years followed by Visual Basic more recently. In the intermediate and advanced business programming courses COBOL has been the language used for decades, but it has been replaced by Java more recently. This has come with the benefit of the use of objects, but has also come with the costs of a more awkward Graphical User Interface, and more cumbersome data file management than with COBOL. The use of .NET as a teaching tool solves this problem. The shift from VB to VB.NET in the introductory programming courses is a natural one, and the use of C# in the intermediate programming courses addresses the unwieldy nature of data file management in Java, but retains the benefits of object-orientation. The Graphical User Interface available in Visual Basic is retained in VB.NET, which is available for all languages used within .NET, including C#. The .NET development environment offers a seamless development environment for both introductory and intermediate programming courses

    Creating web services using ASP.NET: Working paper series--04-06

    Get PDF
    Web services have been advertised as the answer to enterprise application integration, reusability, and as a way to prolong the life of legacy applications. By developing applications as Web Services they become available (exposed) to other applications that use (consume) the service following open Web standards. These services can be exposed and consumed over an intranet, extranet, or the internet through standard Web technologies. These technologies include WSDL, an XML-based description format; SOAP, an application messaging protocol; and HTTP, a collection and transport protocol. Several simple Web Services were developed using ASP.NET technology. The Web Service applications were created using Visual Studio .NET. The services were published to a .NET server. A Web application was developed using Visual Studio .NET to consume the previously created Web Services. A definition of Web Services and descriptions of the technology that is used to create, expose, and consume the Web Services will be provided
    • …
    corecore