819 research outputs found

    Gravitational waves from inflation

    Full text link
    The production of a stochastic background of gravitational waves is a fundamental prediction of any cosmological inflationary model. The features of such a signal encode unique information about the physics of the Early Universe and beyond, thus representing an exciting, powerful window on the origin and evolution of the Universe. We review the main mechanisms of gravitational-wave production, ranging from quantum fluctuations of the gravitational field to other mechanisms that can take place during or after inflation. These include e.g. gravitational waves generated as a consequence of extra particle production during inflation, or during the (p)reheating phase. Gravitational waves produced in inflation scenarios based on modified gravity theories and second-order gravitational waves are also considered. For each analyzed case, the expected power-spectrum is given. We discuss the discriminating power among different models, associated with the validity/violation of the standard consistency relation between tensor-to-scalar ratio rr and tensor spectral index nTn_{\rm T}. In light of the prospects for (directly/indirectly) detecting primordial gravitational waves, we give the expected present-day gravitational radiation spectral energy-density, highlighting the main characteristics imprinted by the cosmic thermal history, and we outline the signatures left by gravitational waves on the Cosmic Microwave Background and some imprints in the Large-Scale Structure of the Universe. Finally, current bounds and prospects of detection for inflationary gravitational waves are summarized.Comment: 85 pages, 4 tables, 9 figures; table 2 added, references added; matches published versio

    Strategi Lebanon Dalam Meningkatkan Keamanan Ruang Siber

    Get PDF
    Abstract   Cybersecurity has attracted attention in the study of international relations. This issue is important because most of life is connected to cyberspace. This research analyzes Lebanon's cybersecurity strategy in its official cybersecurity documents. The theoretical framework used in this study is the Three Perspective Theory of Cyber Sovereignty. The theory is explaining the division of layers in the context of sovereignty in cyberspace. The method used in this research is quantitative research obtained through the MAXQDA and GEPHI. The applications that are used in this research are to provide evidence of data in the Lebanese national strategy document. The results of this study indicate that the Lebanese security strategy documents tend to be exclusive. The Lebanese government is more dominant in discussing matters that are administrative, theoretical, principal, and planning.   Keywords: Cyber Security, Sovereignty, Strategy, Lebanon   Abstrak   cKeamanan siber merupakan salah satu isu yang menarik perhatian dalam studi hubungan internasional. Isu ini menjadi penting tatkala hampir sebagian besar unsur kehidupan terhubung ke ruang siber. Penelitian ini berupaya menganalisis strategi keamanan siber Lebanon dalam dokumen resmi kemananan sibernya.  Kerangka teori yang digunakan dalam dalam penelitian ini menggunakan Three Perspective Theory of Cyber Sovereignity yang menjelaskan pembagian lapisan dalam konteks kedaulatan di ruang siber. Metode yang digunakan ialah metode penelitian kuantitatif yang diperoleh melalui aplikasi MAXQDA dan GEPHI untuk memberikan bukti data dalam menganalisis dokumen strategi keamanan nasional Lebanon. Hasil penelitian ini menunjukkan bahwa dokumen strategi keamanan siber Lebanon cenderung bersifat eksklusif. Pemerintah Lebanon lebih dominan membahas hal-hal yang bersifat administratif, teoretis, prinsipil dan perencanaan.   Kata kunci: Keamanan Siber, Kedaulatan, Strategi, LebanonKeamanan siber merupakan salah satu isu yang menarik perhatian dalam studi hubungan internasional. Isu ini menjadi penting tatkala hampir sebagian besar unsur kehidupan terhubung ke ruang siber. Penelitian ini berupaya menganalisis strategi keamanan siber Lebanon dalam dokumen resmi kemananan sibernya.  Kerangka teori yang digunakan dalam dalam penelitian ini menggunakan Three Perspective Theory of Cyber Sovereignity yang menjelaskan pembagian lapisan dalam konteks kedaulatan di ruang siber. Metode yang digunakan ialah metode penelitian kuantitatif yang diperoleh melalui aplikasi MAXQDA dan GEPHI untuk memberikan bukti data dalam menganalisis dokumen strategi keamanan nasional Lebanon. Hasil penelitian ini menunjukkan bahwa dokumen strategi keamanan siber Lebanon cenderung bersifat eksklusif. Pemerintah Lebanon lebih dominan membahas hal-hal yang bersifat administratif, teoretis, prinsipil dan perencanaan

    LA RICCHEZZA PROVENIENTE DALLA MONTAGNA: GESTIONE DELLA RISORSA IDRICA ED INDIVIDUAZIONE DEI PROVENTI A FAVORE DELLE COMUNITĂ€ LOCALI.

    Get PDF
    Lo Stato è il gestore della risorsa idrica (conferisce le concessioni delle grandi derivazioni idroelettriche, organizza le politiche in vista del rifornimento energetico nazionale), ma il diritto alla risorsa non appartiene allo Stato ma alle collettività locali, quali espressione del loro diritto al territorio. In diretta attuazione dell’art. 44 della Costituzione è disposta l’adozione di provvedimenti legislativi a favore delle zone montane. In merito al regime giuridico delle acque, queste sono beni immobili suscettibili di appartenere sia all’Amministrazione pubblica, sia ai privati; le acque pubbliche sono comunque beni oggetto di proprietà pubblica, né possono appartenere a soggetti diversi dall’Amministrazione pubblica. Le acque pubbliche appartengono allo Stato (art. 822 del Codice civile, art. 1 T.U. n. 1775/1933 ) o alle Regioni a statuto speciale. L’eventuale necessità di soddisfare interessi di livello nazionale o comunque di attuare un programma di utilizzazione di risorse collettive, per ragioni di sviluppo economico nazionale o di ridistribuzione di ricchezza, importa la competenza statale a disporre delle acque pubbliche, esistenti nel territorio regionale, e conseguenzialmente l’inclusione nel demanio statale delle acque pubbliche utilizzate per servizi di competenza statale. La disciplina del demanio deriva, infatti, direttamente dalla scelta della collettività statale circa il suo rapporto con il territorio e con gli usi possibili di questo. Nel momento in cui l’utilizzo di quantità rilevanti di acqua è destinato alla produzione di energia elettrica, la legge riserva espressamente una parte dei proventi scaturenti da tali attività produttiva alle collettività locali. Il ritorno può avvenire attraverso il “sovracanone”. Il sovracanone per Bacini Imbriferi Montani (BIM) è previsto dall’art. 1 della legge n. 959 del 27 dicembre 1953. Il sovracanone è una prestazione patrimoniale imposta con scopo solidaristico per il sostegno delle autonomie locali nelle zone montane e costituisce un elemento della finanza comunale. Le risorse derivanti dal sovracanone appartengono esclusivamente ai Comuni e vengono gestite dai Consorzi BIM e reinvestite sui territori comunali. Il Consorzio BIM è un ente funzionale a carattere associativo e volontario previsto ex legge (art. 1 della legge n. 959 del 27 dicembre 1953) per la gestione dei fondi provenienti dal sovracanone. Proprio dal suo carattere associativo e volontario deriva il diritto per il Comune di non aderire al Consorzio

    Software customization to provide digital oscilloscope with enhanced period-measurement features

    Get PDF
    This paper tackles the problem of signal period measurements by means of oscilloscopes. First, the performance of two last-generation scopes, implementing a zero-crossing algorithm, is evaluated. Then, after a brief resume of alternative measurement techniques, a solution to enhance the period-measurement capability of scopes is proposed and implemented in the LeCroy WaveMaster 8620A software. Finally, the results of the tests carried out on different signal waveforms are reported and analyzed

    Cohort study of electronic cigarette use: effectiveness and safety at 24 months

    Get PDF
    OBJECTIVE: To evaluate the safety and effectiveness of e-cigarettes, by comparing users of only e-cigarettes, smokers of only tobacco cigarettes and dual users. DESIGN: Prospective cohort study. We update previous 12-month findings and report the results of the 24-month follow-up. DATA SOURCES: Direct contact and questionnaires by phone or via internet. METHODS: Adults (30-75 years) were classified as: (1) tobacco smokers, if they smoked ≥1 tobacco cigarette/day, (2) e-cigarette users, if they inhaled ≥50 puffs/week of any type of e-cigarette and (3) dual users, if they smoked tobacco cigarettes and also used e-cigarettes. Carbon monoxide levels were tested in 50% of those declaring tobacco smoking abstinence. Hospital discharge data were used to validate possibly related serious adverse events in 46.0% of the sample. MAIN OUTCOME MEASURES: Sustained abstinence from tobacco cigarettes and/or e-cigarettes after 24 months, the difference in the number of tobacco cigarettes smoked daily between baseline and 24 months, possibly related serious adverse events. RESULTS: Data at 24 months were available for 229 e-cigarette users, 480 tobacco smokers and 223 dual users (overall response rate 68.8%). Of the e-cigarette users, 61.1% remained abstinent from tobacco (while 23.1% and 26.0% of tobacco-only smokers and dual users achieved tobacco abstinence). The rate (18.8%) of stopping use of either product (tobacco and/or e-cigarettes) was not higher for e-cigarette users compared with tobacco smokers or dual users. Self-rated health and adverse events were similar between all groups. Among those continuing to smoke, there were no differences in the proportion of participants reducing tobacco cigarette consumption by 50% or more, the average daily number of cigarettes and the average self-rated health by baseline group. Most dual users at baseline abandoned e-cigarettes and continued to smoke tobacco. Those who continued dual using or converted from tobacco smoking to dual use during follow-up experienced significant improvements in the 3 outcomes compared with those who continued or switched to only smoking tobacco (p<0.001). CONCLUSIONS: E-cigarette use alone might support tobacco quitters remaining abstinent from smoking. However, dual use did not improve the likelihood of quitting tobacco or e-cigarette use, but may be helpful to reduce tobacco consumption. Adverse event data were scarce and must be considered preliminary. TRIAL REGISTRATION NUMBER: NCT01785537

    Automated cleaning of fan coil units with a natural detergent-disinfectant product

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Air conditioning systems represent one important source of microbial pollutants for indoor air. In the past few years, numerous strategies have been conceived to reduce the contamination of air conditioners, mainly in hospital settings. The biocidal detergent BATT2 represents a natural product obtained through extraction from brown seaweeds, that has been tested previously on multidrug-resistant microorganisms.</p> <p>Methods</p> <p>BATT2 has been utilized for the disinfection of fan coil units from four air conditioning systems located in hospital environments with a mean degree of risk. Samples were collected from the air supplied by the conditioning systems and from the surfaces of fan coil units, before and after sanitization procedures. Total microbial counts at 37°C and 22°C and mycotic count at 32°C were evaluated. <it>Staphylococci</it> and <it>Pseudomonas aeruginosa </it>were also detected on surfaces samples.</p> <p>Results</p> <p>The biodetergent was able to reduce up 50% of the microbial pollution of fan coil units surfaces and air supplied by the air conditioners.</p> <p>Conclusions</p> <p>BATT2 could be considered for cleaning/disinfection of air conditioning systems, that should be performed on the basis of accurate and verifiable sanitization protocols.</p

    E-Learning for Rare Diseases: An Example Using Fabry Disease

    Get PDF
    Rare diseases represent a challenge for physicians because patients are rarely seen, and they can manifest with symptoms similar to those of common diseases. In this work, genetic confirmation of diagnosis is derived from DNA sequencing. We present a tutorial for the molecular analysis of a rare disease using Fabry disease as an example

    Clustering of binary black hole mergers: a detailed analysis of the EAGLE+MOBSE simulation

    Full text link
    We perform a detailed study of the cosmological bias of gravitational gave (GW) events produced by binary black hole mergers (BBHM). We start from a BBHM distribution modeled inside the EAGLE hydrodyamical simulation using the population synthesis code MOBSE. We then compare our findings with predictions from different Halo Occupation Distribution (HOD) prescriptions and find overall agreement, provided that the modeled properties of host galaxies and halos in the semi-analytical treatment match those in the simulations. By highlighting the sources of these discrepancies, we provide the stepping stone to build future more robust models that prevent the shortcoming of both simulation-based and analytical models. Finally, we train a neural network to build a simulation-based HOD and perform feature importance analysis to gain intuition on which host halo/galaxy parameters are the most relevant in determining the actual distribution and power spectrum of BBHM. We find that the distribution of BBHM in a galaxy does not only depend on its size, star formation rate and metallicity, but also by its kinetic state
    • …
    corecore