407,740 research outputs found

    Common Origin of (-)^L, (-)^{3B}, and Strong CP Conservation

    Full text link
    The multiplicative conservation of both lepton and baryon numbers, i.e. (-)^L and (-)^{3B}, is connected to an axionic solution of the strong CP problem in a supersymmetric, unifiable model of quark and lepton interactions. New particles are predicted at the TeV scale, with verifiable consequences at the Large Hadron Collider.Comment: 9 pages, no figur

    A catalog of Kazarian galaxies

    Full text link
    The entire Kazarian galaxies (KG) catalog is presented which combines extensive new measurements of their optical parameters with a literature and database search. The measurements were made using images extracted from the STScI Digitized Sky Survey (DSS) of Jpg(blue), Fpg(red) and Ipg(NIR) band photographic sky survey plates obtained by the Palomar and UK Schmidt telescopes. We provide accurate coordinates, morphological type, spectral and activity classes, blue apparent diameters, axial ratios, position angles, red, blue and NIR apparent magnitudes, as well as counts of neighboring objects in a circle of radius 50 kpc from centers of KG. Special attention was paid to the individual descriptions of the galaxies in the original Kazarian lists, which clarified many cases of misidentifications of the objects, particularly among interacting systems. The total number of individual Kazarian objects in the database is now 706. We also include the redshifts which are now available for 404 galaxies and the 2MASS infrared magnitudes for 598 KG. The database also includes extensive notes, which summarize information about the membership of KG in different systems of galaxies, and about revised activity classes and redshifts. An atlas of several interesting subclasses of KG is also presented.Comment: 15 pages, 5 figures, 1 table, Accepted in Astrophysics, Vol. 53, No. 1, 2010 (English translation of Astrofizika

    From Large to Small Scales: Global Models of the ISM

    Full text link
    We review large scale modelling of the ISM with emphasis on the importance to include the disk-halo-disk duty cycle and to use a dynamical refinement of the grid (in regions where steep variations of density and pressure occur) for a realistic modelling of the ISM. We also discuss the necessity of convergence of the simulation results by comparing 0.625, 1.25 and 2.5 pc resolution simulations and show that a minimum grid resolution of 1.25 pc is required for quantitatively reliable results, as there is a rapid convergence for Delta x \leq 1.1 pc.Comment: 10 pages, 8 figures that include 2 simulation images (in jpeg format) and 6 plots (4 in ps and 2 in jpeg formats), to appear in the proceedings of ``From Observations to Self-Consistent Modelling of the ISM in Galaxies'', Kluwe

    Measuring an entropy in heavy ion collisions

    Get PDF
    We propose to use the coincidence method of Ma to measure an entropy of the system created in heavy ion collisions. Moreover we estimate, in a simple model, the values of parameters for which the thermodynamical behaviour sets in.Comment: LATTICE98(hightemp), 3 pages, LaTeX with two eps figure

    Gathering realistic authentication performance data through field trials

    Get PDF
    Most evaluations of novel authentication mechanisms have been conducted under laboratory conditions. We argue that the results of short-term usage under laboratory conditions do not predict user performance “in the wild”, because there is insufficient time between enrolment and testing, the number of authentications is low, and authentication is presented as a primary task, rather then the secondary task as it is “in the wild”. User generated reports of performance on the other hand provide subjective data, so reports on frequency of use, time intervals, and success or failure of authentication are subject to the vagaries of users ’ memories. Studies on authentication that provide objective performance data under real-world conditions are rare. In this paper, we present our experiences with a study method that tries to control frequency and timing of authentication, and collects reliable performance data, while maintaining ecological validity of the authentication context at the same time. We describe the development of an authentication server called APET, which allows us to prompt users enrolled in trial cohorts to authenticate at controlled intervals, and report our initial experiences with trials. We conclude by discussing remaining challenges in obtaining reliable performance data through a field trial method such as this one

    Human-centred identity - from rhetoric to reality

    Get PDF
    This paper presents a proposal for human-centred identity management. Even though the term ‘human-centred identity’ has been widely used in the past few years, the solutions either descritbe a technical system for managing identity, or describe an identity management solution that meets a particular administrative need. Our proposal, however, presents a set of propertis that have to be considered, and the choices have to be made for each property must satisfy the needs of both the individual and the organization that owns the identity management system. The properties were identified as a result of reviewing a range of national identity systems, and the problems that arise from them

    Users are not the enemy

    Get PDF
    Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security. In a recent study, we found that users may indeed compromise computer security mechanisms, such as password authentication, both knowing and unknowingly. A closer analysis, however, revealed that such behavior is often caused by the way in which security mechanisms are implemented, and users ’ lack of knowledge. We argue that to change this state of affairs, security departments need to communicate more with users, and adopt a user-centered design approach

    Participants’ reflections on being interviewed about risk and sexual behaviour: implications for collection of qualitative data on sensitive topics

    Get PDF
    In this article, we explore how those taking part in an interview about sex and risk reflected on their participation and what, if any, impact it had on them. All 22 individuals who were interviewed in an initial study were invited to document their thoughts and feelings about the research process in a short follow-up exercise. The data relating to the 11 people who shared their reflections on the interview were subjected to a thematic analysis. The themes that emerged describe the value participants placed on honest and open interaction within neutral and non-judgmental environments. They also illustrate how being interviewed about prior behaviour can facilitate a sense-making process and might provide some degree of cathartic benefit. The findings help improve our understanding of how individuals reflect on their interview participation, which can in turn help to inform the development of ethically sensitive qualitative data collection

    Addressing Minority Health Disparities in Richmond: Results from a Health Needs Assessment of a Southside Community

    Get PDF
    Background: Evidence shows the effectiveness of integrating community health workers (CHWs) into care models serving high-risk patients to reduce emergency department (ED) use, increase primary care use, and address adverse social determinants of health (SDH). The Southwood Resource Center, part of a network of clinics established by Richmond City Health Department, utilizes CHWs to address disparities affecting underserved populations through primary care referrals and additional resource linkages. Local student-volunteers in partnership with CHWs conducted a community needs assessment to identify patient resource gaps, aid in design and implementation of SDH interventions, and examine the relationship between chronic disease management and ED use reductions. Methods: English and Spanish-language surveys were conducted during patient visits to the SRC, in addition to other settings to facilitate representative sampling. A total of 134 responses were received, with Blacks (34%) and Hispanic/Latinos (65%) well represented. Results: Significant social determinants identified by the needs assessment included housing stability, and transportation and food access. Respondents indicated need for support managing chronic conditions including heart disease, diabetes, mental health and asthma. 1 in 3 respondents (31%) reported using the ED for primary care, and nearly 2 in 3 (66%) reported not having a family doctor. Barriers to health care included cost (35.6%), insurance status (50.4%) and transportation access (29.6%). Conclusions: CHWs play an important role in identifying community strengths and resource gaps and linking patients to additional resources. Opportunities for service improvements include bilingual care coordination, chronic care management, health insurance navigation, food subsistence resources, and transportation support.https://scholarscompass.vcu.edu/gradposters/1104/thumbnail.jp
    corecore