9,390 research outputs found
The People’s Republic of China’s Short-Term Security in the Energy Sector Concerning Foreign Investment in Uranium
This work was an effort to provide an all-encompassing picture for the future of energy production in the People’s Republic of China with a focus on nuclear power and, more specifically, nuclear fission reactions that are uranium based. The numbers behind the research were gathered from different publicly accessible data sets. Some of the predictions and assumptions were not based in mathematics in the form of predictive statistical analyses but were made based on regional economic activity at and up to the time. With the research conducted I also hoped to give different actors that are still engaged in competition for energy production an idea of what the future of using finite resources for fueling growth looks like as well as a more optimal choice for being able to successfully see a better future for the planet. Nuclear fusion, generating energy from continuous magnetic fields, and ideas of this nature are the real way through which our species will be able to successfully evolve. When different governments and companies compete for finite resources there will always be the inevitable outcome of running out of those resources on a long enough time scale
Kayser-Roth, Joslyn, and the Problem of Parent Corporation Liability Under CERCLA
This article examines these issues by focusing on the responsibility of parent corporations as owners and as operators under section 107 of CERCLA. The scope of the analysis is limited to corporations that participate in the management of other corporations. Moreover, for the sake of simplicity, the reach of the analysis is limited to the situation in which a corporation owns one hundred percent of the stock of the subsidiary.
Part I provides a general overview of the principle of limited shareholder liability as it applies to parent corporations and of its economic underpinnings. Part II reviews judicial applications of CERCLA to parent corporations. My discussion focuses on two recent decisions - United States v. Kayser-Roth Corp. and Joslyn Mfg. Co. v. T.L. James & Co. - which represent the polar judicial views on shareholder liability and contain probably the best discussions in the case law thus far on this important issue. The district and appellate courts in Kayser-Roth found a parent corporation liable directly and indirectly under CERCLA. The courts in Joslyn, however, took the opposite position and declined to hold that CERCLA imposes direct liability on shareholders. Instead, they concluded that liability can only be imputed indirectly through piercing the corporate veil, and then only if the shareholder used the corporate form to avoid CERCLA liability.
Finally, Part III criticizes the Kayser-Roth decision, as well as other decisions finding parent corporations directly liable under CERCLA, on both legal and policy levels. I conclude that parent corporation liability cannot be sustained under CERCLA unless the parent has exploited the corporate form to such an extent that piercing the corporate veil is warranted
Superhumps in Low-Mass X-Ray Binaries
We propose a mechanism for the superhump modulations observed in optical
photometry of at least two black hole X-ray transients (SXTs). As in extreme
mass-ratio cataclysmic variables (CVs), superhumps are assumed to result from
the presence of the 3:1 orbital resonance in the accretion disc. This causes
the disc to become non-axisymmetric and precess. However the mechanism for
superhump luminosity variations in low mass X-ray binaries (LMXBs) must differ
from that in CVs, where it is attributed to a tidally-driven modulation of the
disc's viscous dissipation, varying on the beat between the orbital and disc
precession period. By contrast in LMXBs, tidal dissipation in the outer
accretion disc is negligible: the optical emission is overwhelming dominated by
reprocessing of intercepted central X-rays. Thus a different origin for the
superhump modulation is required. Recent observations and numerical simulations
indicate that in an extreme mass-ratio system the disc area changes on the
superhump period. We deduce that the superhumps observed in SXTs arise from a
modulation of the reprocessed flux by the changing area. Therefore, unlike the
situation in CVs, where the superhump amplitude is inclination-independent,
superhumps should be best seen in low-inclination LMXBs, whereas an orbital
modulation from the heated face of the secondary star should be more prominent
at high inclinations. Modulation at the disc precession period (10s of days)
may indicate disc asymmetries such as warping. We comment on the orbital period
determinations of LMXBs, and the possibility and significance of possible
permanent superhump LMXBs.Comment: 6 pages, 1 encapsulated figure. MNRAS in press; replaced to correct
typographical error
Two-Rowed Hecke Algebra Representations at Roots of Unity
In this paper, we initiate a study into the explicit construction of
irreducible representations of the Hecke algebra of type in
the non-generic case where is a root of unity. The approach is via the
Specht modules of which are irreducible in the generic case, and
possess a natural basis indexed by Young tableaux. The general framework in
which the irreducible non-generic -modules are to be constructed is set
up and, in particular, the full set of modules corresponding to two-part
partitions is described. Plentiful examples are given.Comment: LaTeX, 9 pages. Submitted for the Proceedings of the 4th
International Colloquium ``Quantum Groups and Integrable Systems,'' Prague,
22-24 June 199
Sino-Cyber Espionage: An Introduction to the Exploits of Units 61398 and 61486 in the People’s Liberation Army of China
This paper begins with an overview of the two most notorious hacking divisions of the People’s Liberation Army. It draws from several different articles concerning the state of the internet from Congress, CrowdStrike, Verizon, and Akamai as well as reports from the United States Department of Justice. The scope of this paper is limited because of the level of security clearance needed to access the real information on the exploits of the Chinese in the corporate sector, but the ramifications of said exploits are clear. The discussion provides examples from the Department of Justice on what the Chinese have done to American companies and some of the strategies that they have used. It also expounds on some of the repercussions of the strategies on the markets that were affected. Statistics are given from The Economist and Wired magazines that sourced the state of the internet reports from Verizon and Akamai. The recommendations are mainly ideas of International Relations to try to keep peace between the People’s Republic of China and the United States of America. Extreme measures must, however, be considered if there are any more exploited vulnerabilities in the federal sector. This paper mainly serves to inform the reader of the attacks that the Chinese use, who they target and why, and possible solutions to the problem of cyber corporate espionage
Input and Output Optimization in Linux for Appropriate Resource Allocation and Management
There is one evident area of operating systems that has enormous potential for growth and optimization. Only recently has focus been put on upgrading resources in the input/output (I/O) mechanisms of Linux operating systems. This focus has proven that there is no real optimal methodology for I/O scheduling devices in Linux. In order to allocate resources efficiently for time-intensive experiments on metadata and mobile devices, which both rely heavily on energy resources, Linux operating system developers must create new techniques for appropriately allocating these integral parts of computation. Advances must also be made to reduce the traffic in the file system alongside the optimization of energy resources in order to ensure that the system runs as efficiently as possible while aggregating different requests. Coupling the improvement of energy resources with that of request aggregation, as seen in the research presented in the collaboration of several national laboratories and universities, helps to maintain a higher throughput during run-time. With the advent of an ideal scheduler choice based on the I/O request, maximum energy efficiency methodologies, and the unification of I/O requests into a singular block, there are increases in the potential for throughput, execution time, state transition power consumption, and other expensive resources used by the Linux operating for their full capabilities. Even though these advancements are revolutionary and unique in many ways, they will only ultimately prove one thing: the process of diversification concerning research of I/O mechanisms in Linux plagues the majority of professionals in the field
Effects of exercise on appetite, food intake and the gastrointestinal hormones Ghrelin and Peptide YY
Gut hormones are implicated in the regulation of energy balance. The studies in this thesis have examined the effects exercise on gut hormones (acylated ghrelin and peptide YY3-36), appetite and food intake, over extended durations. Sixty-nine young, healthy, predominantly Caucasian males were recruited to six studies. The age, height and body mass of the participants were: 22.4 ± 0.3 y, 1.80 ± 0.1 m, 76.2 ± 1.0 kg (mean ± SEM).
In study one, 90 min of resistance exercise did not influence appetite or energy intake over 24 h of assessment, yet stimulated a latent preference for carbohydrate rich foods. Study two demonstrated that appetite was suppressed during 60 min of swimming but was elevated after consuming a post-exercise meal. Plasma acylated ghrelin was suppressed during swimming but was unaltered after. Energy/macronutrient intake remained unchanged. In study three, 60 min of brisk walking (45 ± 2% of max) did not influence appetite, energy/macronutrient intake or plasma concentrations of acylated ghrelin during an eight hour observation period. Study four showed that 90 min of treadmill running (69 ± 1% of max) transiently suppressed appetite and acylated ghrelin but did not influence these variables, or energy/macronutrient intake within 22.5 h after exercise. The findings of study five suggest that the suppression and subsequent rebound in plasma acylated ghrelin after exercise may be related to a delayed voluntary decision to eat after. Finally, study six showed that appetite, food intake and circulating concentrations of acylated ghrelin and peptide YY3-36 are responsive to acute deficits in energy induced by food restriction but are not sensitive to equivalent energy deficits induced by exercise.
This thesis has shown that exercise transiently alters circulating levels of acylated ghrelin and peptide YY3-36 in directions expected to inhibit appetite however no changes are seen after exercise. Conversely, food restriction elicits marked compensatory changes in circulating acylated ghrelin and peptide YY3-36. This thesis also demonstrates that resistance exercise, brisk walking and running do not stimulate appetite or energy intake over defined periods, even when the energy expenditure elicited is high. Swimming appears to increase appetite in the latter hours after exercise
- …