585 research outputs found

    Playing with Fire: The Medieval Judicial Ordeals and their Downfall

    Get PDF
    Trials by ordeal in the Middle Ages prove to be some of the most complex secular trials in all of history. Both trial by fire, and trial by water looked to call God's judgment into play, hoping that He would make the decisions of guilt or innocence. God is all-knowing. He is all-powerful. Therefore He has all of the relevant information to determine the fates of those who go through the ordeals. Despite this, the theologians in the medieval Church looked to lessen clerical involvement in the ordeals. In 1215, the Fourth Lateran Council met, and the ordeals ceased to exist. Even though they were secular, the ordeals could not survive without the help of priests. Why is it that the theologians so desperately wanted to end the use of the ordeals in Europe?No embargoAcademic Major: Histor

    Playing with Fire: The Medieval Judicial Ordeals and their Downfall

    Get PDF
    Trials by ordeal in the Middle Ages prove to be some of the most complex secular trials in all of history. Both trial by fire, and trial by water looked to call God\u27s judgment into play, hoping that He would make the decisions of guilt or innocence. God is all-knowing. He is all-powerful. Therefore He has all of the relevant information to determine the fates of those who go through the ordeals. Despite this, the theologians in the medieval Church looked to lessen clerical involvement in the ordeals. In 1215, the Fourth Lateran Council met, and the ordeals ceased to exist. Even though they were secular, the ordeals could not survive without the help of priests. Why is it that the theologians so desperately wanted to end the use of the ordeals in Europe

    Actionable Intelligence-Oriented Cyber Threat Modeling Framework

    Get PDF
    Amid the growing challenges of cybersecurity, the new paradigm of cyber threat intelligence (or CTI) has gained momentum to better deal with cyber threats. There, however, has been one fundamental and very practical problem of information overload organizations face in constructing an effective CTI program. We developed a cyber threat intelligence prototype that automatically and dynamically performs the correlation of business assets, vulnerabilities, and cyber threat information in a scoped setting to remediate the challenge of information overload. Conveniently called TIME (for Threat Intelligence Modeling Environment), it repeats the cycle of: (1) collect internal asset data; (2) gather vulnerability and threat data; (3) correlate vulnerabilities with assets; and (4) derive CTI and alerts significant internal asset-related vulnerabilities in a timely manner. For this, it takes advantage of CTI reports produced by online sites and several NIST standards intended to formalize vulnerability and threat management

    Fire & Water: An Examination of the Technologies, Institutions, and Social Issues in Arms Control and Transboundary Water Resources Agreements

    Get PDF
    The world of environmental security is bringing the science of natural resources in ever-closer contact with the policy issues of international stability and foreign affairs. Many U.S. and international agencies-including the U.S. Departments of State and Defense, the North Atlantic Treaty Organization, and the Southern African Development Community--­ now analyze foreign policy in part through the lens of environmental resources

    Technologies, Institutions, and Social Issues in Arms Control and Transbounary Water-Resources Agreements

    Get PDF
    The world of environmental security is bringing the science of natural resources in ever-closer contact with the policy issues of international stability and foreign affairs. Many U.S. and international agencies—including the U.S. Departments of State and Defense, the North Atlantic Treaty Organization, and the Southern African Development Community— now analyze foreign policy in part through the lens of environmental resources. In October 2001, three organizations—the Pacific Institute for Studies in Development, Environment, and Security; the Department of Geosciences of Oregon State University; and the Cooperative Monitoring Center (CMC) at Sandia National Laboratories—sponsored a workshop designed to highlight the closeness of national security and environmental concerns through explicitly comparing the technologies, institutions, and social issues in two seemingly disparate fields: arms control and transboundary water resources. With generous support from the Carnegie Corporation of New York, “Fire & Water” workshop participants compared and contrasted these two fields and then identified questions for further analysis. Workshop sessions focused on three specific topics: (a) scientific and technological advances, (b) treaties and institutions, and (c) social and cultural issues

    Dynamical coupled-channel model of meson production reactions in the nucleon resonance region

    Get PDF
    A dynamical coupled-channel model is presented for investigating the nucleon resonances in the meson production reactions induced by pions and photons. The model is based on an energy-independent Hamiltonian which is derived from a set of Lagrangians by using a unitary transformation method. By applying the projection operator techniques,we derive a set of coupled-channel equations which satisfy the unitarity conditions within the channel space spanned by the considered two-particle meson-baryon states and the three-particle ππN\pi\pi N state. We present and explain in detail a numerical method based on a spline-function expansion for solving the resulting coupled-channel equations which contain logarithmically divergent one-particle-exchange driving terms resulted from the ππN\pi\pi N unitarity cut. We show that this driving term can generate rapidly varying structure in the reaction amplitudes associated with the unstable particle channels. It also has large effects in determining the two-pion production cross sections. Our results indicate that cautions must be taken to interpret the N∗N^* parameters extracted from using models which do not include ππN\pi\pi N cut effects.Comment: 73 pages, 20 figure

    Post Weaning Management of Heifer Calves Impacts ADG and Feed Efficiency as Pregnant Heifers

    Get PDF
    Replacement heifers were developed on cornstalks (Exp. 1, 2, and 3), dry lot (Exp. 1 and 2), or winter range (Exp. 3). In Exp. 1, pregnant heifers were individually fed during mid to late gestation. Heifers developed on cornstalks were more feed efficient than heifers developed in a dry lot. In Exp. 2 and 3, pregnant heifers grazed cornstalks during mid to late gestation. Heifers developed on cornstalks gained more and were more efficient, especially compared to heifers developed in a dry lot. These data provide evidence of an adaptive response to grazing low quality forages and may be beneficial in the critical period leading up to the first calving season

    Altruism, Commitment, and Leadership in High School Mentors

    Get PDF
    This study investigated the effects of mentoring on selected attributes among high school mentors. Three attributes were explored: altruism, commitment to school, and student leadership. Seventy-four high school juniors and seniors participated as mentors to high school freshmen students. Mentors participated in a leadership training program prior to beginning their mentoring activities. Pre- and post-test measures of the three attributes were administered. Results showed no significant increase in altruism or commitment scores. Unexpectedly, the mentoring experience produced a significant decrease in the perception of leadership scores. Implications for implementing a mentoring program in a high school setting are discussed

    Blur detection is unaffected by cognitive load

    Get PDF
    Blur detection is affected by retinal eccentricity, but is it also affected by attentional resources? Research showing effects of selective attention on acuity and contrast sensitivity suggests that allocating attention should increase blur detection. However, research showing that blur affects selection of saccade targets suggests that blur detection may be pre-attentive. To investigate this question, we carried out experiments in which viewers detected blur in real-world scenes under varying levels of cognitive load manipulated by the N-back task. We used adaptive threshold estimation to measure blur detection thresholds at 0°, 3°, 6°, and 9° eccentricity. Participants carried out blur detection as a single task, a single task with to-be-ignored letters, or an N-back task with four levels of cognitive load (0, 1, 2, or 3-back). In Experiment 1, blur was presented gaze-contingently for occasional single eye fixations while participants viewed scenes in preparation for an easy picture recognition memory task, and the N-back stimuli were presented auditorily. The results for three participants showed a large effect of retinal eccentricity on blur thresholds, significant effects of N-back level on N-back performance, scene recognition memory, and gaze dispersion, but no effect of N-back level on blur thresholds. In Experiment 2, we replicated Experiment 1 but presented the images tachistoscopically for 200 ms (half with, half without blur), to determine whether gaze-contingent blur presentation in Experiment 1 had produced attentional capture by blur onset during a fixation, thus eliminating any effect of cognitive load on blur detection. The results with three new participants replicated those of Experiment 1, indicating that the use of gaze-contingent blur presentation could not explain the lack of effect of cognitive load on blur detection. Thus, apparently blur detection in real-world scene images is unaffected by attentional resources, as manipulated by the cognitive load produced by the N-back task
    • 

    corecore