30 research outputs found
Uniqueness and two shared set problems of meromorphic functions in a different angle
summary:The purpose of the paper is to represent the two shared set problems in an elaborative and convenient manner. In the main result of the paper, we have exhaustively treated the two shared set problem on the open complex plane. As a consequence of the main result, we have investigated the same problem in a different perspective, which has yet not been studied. Further, two examples have been exhibited in the paper to show the sharpness of some of these results
General Relativistic effects on the conversion of nuclear to two-flavour quark matter in compact stars
We investigate the General Relativistic (GR) effects on the conversion from
nuclear to two-flavour quark matter in compact stars, both static as well as
rotating. We find that GR effects lead to qualitative differences in rotating
stars, indicating the inadequacy of non-relativistic (NR) or even Special
Relativistic (SR) treatments for these cases.Comment: 4 pages, 4 figure
The conversion of Neutron star to Strange star : A two step process
The conversion of neutron matter to strange matter in a neutron star have
been studied as a two step process. In the first step, the nuclear matter gets
converted to two flavour quark matter. The conversion of two flavour to three
flavour strange matter takes place in the second step. The first process is
analysed with the help of equations of state and hydrodynamical equations,
whereas, in the second process, non-leptonic weak interaction plays the main
role. Velocities and the time of travel through the star of these two
conversion fronts have been analysed and compared.Comment: 18 pages including 9 figure
Substitution Bias and External Validity: Why an Innovative Anti-Poverty Program Showed No Net Impact
Suppressing Dimer Formation by Increasing Conformational Freedom in Multi-Carbazole Thermally Activated Delayed Fluorescence Emitters
Ideal emitters for organic light-emitting diodes (OLEDs) are capable of efficiently harvesting non-emissive triplet states, have high colour stabilities, and possess high photoluminescence quantum yields (PLQYs). Maintaining colour stability and PLQY is particularly challenging for multi-carbazole thermally activated delayed fluorescence (TADF) materials that form persistent dimers due to intermolecular interactions of their extended aromatic systems (with altered electronic states). Addressing this challenge, three new emitters are presented, which demonstrate that, somewhat counterintuitively, sterically uncrowded acceptor units can suppress these undesirable interactions. They do so by allowing the surrounding carbazole donors to be arranged with lower dihedral angles, which in turn limits their availability for dimerization. A new pyrazine-centered emitter 4CzPyz is contrasted directly with the cyanopyridine and terephthalonitrile analogues, 4CzCNPy and 4CzTPN respectively. The pyrazine derivative demonstrates enhanced colour stability in the solid-state compared to the cyanopyridine and terephthalonitrile acceptors, which we assign to its absence of intermolecular face-to-face aromatic interactions. This suppression of dimer formation is shared by two cyanopyrazine emitters 2Cz2CNPyz and 3CzCNPyz, each of which feature reduced steric pressure and flatter Cz-Pyz dihedral angles than non-heterocyclic analogues. Flatter dihedral angles consequently lead to C–H bonds of the Cz donors extending outwards at angles that prevent the stacking required for dimerization. This expanded understanding of dimer formation in TADF materials will guide future efforts to maintain colour stability in higher performance TADF materials by curbing the prevalence of face-to-face aromatic interactions
Can an Ego Defense Mechanism Model Help Explain Dysfunctional IS Security Behavior?
IS security behavior studies are becoming popular. To date, much of the research has been based on theories such as the Theory of Planned Behavior, Technology Adoption Model, Rational Choice theory and Theory of Reasoned Action. They view users as rational individuals making conscious utilitarian decisions when there is increasing evidence that security breaches are the result of human behavior such as carelessness, malicious intent, bad habits, and hostility. We propose the ego defense mechanism model, taken from the psychoanalytical world. This model makes no assumption of rationality and has been developed to help understand the roots of dysfunctional behavior such as fear, phobias, anger, forgetfulness, indifference and hostility. Our model shows that security threats trigger anxiety among users and the ego react by both functional and dysfunctional behavior. This could be the earliest if not the first paper to explore user behavior in IS security situations using this framework
Can Ego Defense Mechanism Help Explain IS Security Dysfunctional Behavior
IS security behavior studies are becoming popular. To date, much of the research has been based on theories such as the Theory of Planned Behavior, Technology Adoption Model, Rational Choice theory and Theory of Reasoned Action. They view users as rational individuals making conscious utilitarian decisions when there is increasing evidence that security breaches are the result of human behavior such as carelessness, malicious intent, bad habits, and hostility. We propose the ego defense mechanism model, taken from the psychoanalytical world. This model makes no assumption of rationality and has been developed to help understand the roots of dysfunctional behavior such as fear, phobias, anger, forgetfulness, indifference and hostility. Our model shows that security threats trigger anxiety among users and the ego react by both functional and dysfunctional behavior. This could be the earliest if not the first paper to explore user behavior in IS security situations using this framework
Bi unique range sets -a further study
The purpose of the paper is to obtain a new bi-unique range sets, as introduced
in [4] with smallest cardinalities ever for derivative of meromorphic functions. Our results will improve all the results in connection to the bi-unique range sets to a large extent. A number of examples have been exhibited to justify our certain claims. At last an open question have been posed for future investigations