3,279 research outputs found

    An Introduction to Zoli Numbers

    Full text link
    There have been many theories about the paradoxes of numbers, but this is far and away more paradoxical than most. In this paper we will present the Zoli Numbers which have some innovative characteristics. The basic concept of these numbers is that they don't follow strictly any Mathematical rule. They are called Zoli from the names of Zotos and Litke. We are going to see some examples with the Zoli Programming Language and reveal the connection with other mathematical topics.Comment: 9 page

    Cryptography and Encryption

    Full text link
    In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge. This is usually done for secrecy, and typically for confidential communications. Encryption can also be used for authentication, digital signatures, digital cash e.t.c. In this paper we are going to examine and analyse all these topics in detail.Comment: 5 page

    A design for a reusable Ada library

    Get PDF
    A goal of the Ada language standardization effort is to promote reuse of software, implying the existence of substantial software libraries and the storage/retrieval mechanisms to support them. A searching/cataloging mechanism is proposed that permits full or partial distribution of the database, adapts to a variety of searching mechanisms, permits a changine taxonomy with minimal disruption, and minimizes the requirement of specialized cataloger/indexer skills. The important observation is that key words serve not only as indexing mechanism, but also as an identification mechanism, especially via concatenation and as support for a searching mechanism. By deliberately separating these multiple uses, the modifiability and ease of growth that current libraries require, is achieved

    Law Enforcement’s Use of Social Media: It is more then just a post

    Get PDF
    Social media has become a preferred way to communicate for many and can be a look into the user’s personal life. However, law enforcement also knows this. Law enforcement’s use of social media for investigations has been proven to be effective in monitoring gatherings and helping to solve crimes. While legal, law enforcement also has an ethical responsibility to the community and have strong policies in place to prevent misuse of this tool. This is not the only use of social media by law enforcement. Social media is also used to interact with the community. Reviewing the good and bad aspects of posting on social media helps build community support in a way to influence a positive reaction from the citizens. During a crisis law enforcement can send out press releases and provide information. To prepare for such an event the department should have plans that include pre-crisis, during crisis, and post-crisis. These plans will be used to provide information in a reliable fashion

    Application of Overburden Effects to the Elastic Scattering Limit for CDMSlite Run 3

    Get PDF
    Many different types of astronomical evidence suggest that most of the mass in the universe is attributable to a nonluminous matter, called dark matter by physicists. Dark matter is believed to be one or more new elementary particles with currently unknown properties. So far, the prevailing method for attempting to discern the properties of the new particle(s) is to observe a direct collision between dark matter and standard model particles. SuperCDMS is a direct detection experiment conducted underground that measures ionization and phonon energy in cryogenic germanium crystal detectors. While taking data in the CDMSlite configuration it can amplify the ionization signal, dramatically lowering the threshold for a detectable amount of energy deposited in the detector via a collision with a hypothetical dark matter particle. Previous analysis of data taken in the CDMSlite mode examining the elastic scattering limit disregarded any energy loss due to the dark matter passing through the earth and atmosphere to reach the detector. The practical effect of this energy loss is that any dark matter particles which have very high interaction cross sections with normal matter (∼ 10−30cm2) will have lost too much of their energy to be detectable by the experiment once they have reached it. This work will describe a method to account for this effect and present a re-analysis of the CDMSlite run 3 data, resulting in an adjusted sensitivity band, rather v than just a lower limit. The lower limit of the new band is consistent with the previously published lower limit obtained without incorporation of the overburden. The upper limit is consistent with the previous limits from other experiments, with an upper limit on the cross section of 10−31 cm2 for a 1.5 GeV WIMP

    The Minor Biblical Prereformers of the XV Century

    Get PDF
    We cannot speak of “Pre-reformers” unless we have a clear conception of the tem “reformation”. Too often we leave the Reformation historically unexplained as if it were a sudden upheaval in the life of the church, a change as sudden as the inversion of an hour glass. But no Reformer just drops from heaven. “In spite of its originality and freshness, the Reformation by no means interrupted the continuity of human affairs - on the contrary, it was, on the one hand, preceded and its way prepared by pious and enlightened men, who preached almost the very doctrines that distinguished the Reformers, while, on the other hand a very and considerable Christian and intellectual culture was possessed by numerous individuals and communities, and generally, there was a wide circle of susceptible minds which sympathized with the Reformers, and resigned themselves to their influence”

    Survey of the Minor Judiciary in Pennsylvania

    Get PDF
    corecore