6,087 research outputs found
Catherine Mary White Foster\u27s Eyewitness Account of the Battle of Gettysburg, with Background on the Foster Family Union Soldiers
Catherine Mary White Foster lived with her elderly parents in the red brick house on the northwest corner of Washington and High Streets in Gettysburg at the time of the battle, 1-3 July 1863. She was the only child of James White Foster and Catherine (nee Swope) Foster (a former resident of Lancaster county), who married on 11 May 1817 and settled in Gettysburg, Adams county, Pennsylvania. Her father, James White Foster, had served his country as a first lieutenant in the War of 1812. Her grandparents, James Foster and Catherine (nee White) Foster, had emigrated with her father and five older children from county Donegal, Ireland, in 1790, and settled near New Alexandria, Westmoreland county, Pennsylvania. [excerpt
On spatially-averaged electrokinetics of point charges and Maxwell's equations
Maxwell-like field relations which describe spatially-averaged kinematic behaviour of electrons and atomic nuclei (modelled as point charges) are obtained at any prescribed scale using weighting function methodology. Upon appeal to the experimental laws of Coulomb and Biot-Savart, and to dimensional considerations, these relations yield the macroscopic Maxwell equations as they pertain to electrostatics and magnetostatics. Generalisation to classical macroscopic electrodynamics is effected by taking account of signal transmission delay and selection of appropriate retardation potentials. Unlike previous derivations, no appeal is made to the microscopic field relations of Lorentz
Pamphlet for Hapgoods Incorporated.
Pamphlet detailing the services provided by Hapgoods Incorporated
Dovetail: Stronger Anonymity in Next-Generation Internet Routing
Current low-latency anonymity systems use complex overlay networks to conceal
a user's IP address, introducing significant latency and network efficiency
penalties compared to normal Internet usage. Rather than obfuscating network
identity through higher level protocols, we propose a more direct solution: a
routing protocol that allows communication without exposing network identity,
providing a strong foundation for Internet privacy, while allowing identity to
be defined in those higher level protocols where it adds value.
Given current research initiatives advocating "clean slate" Internet designs,
an opportunity exists to design an internetwork layer routing protocol that
decouples identity from network location and thereby simplifies the anonymity
problem. Recently, Hsiao et al. proposed such a protocol (LAP), but it does not
protect the user against a local eavesdropper or an untrusted ISP, which will
not be acceptable for many users. Thus, we propose Dovetail, a next-generation
Internet routing protocol that provides anonymity against an active attacker
located at any single point within the network, including the user's ISP. A
major design challenge is to provide this protection without including an
application-layer proxy in data transmission. We address this challenge in path
construction by using a matchmaker node (an end host) to overlap two path
segments at a dovetail node (a router). The dovetail then trims away part of
the path so that data transmission bypasses the matchmaker. Additional design
features include the choice of many different paths through the network and the
joining of path segments without requiring a trusted third party. We develop a
systematic mechanism to measure the topological anonymity of our designs, and
we demonstrate the privacy and efficiency of our proposal by simulation, using
a model of the complete Internet at the AS-level
Transparency Enhancing Technologies to Make Security Protocols Work for Humans
As computer systems are increasingly relied on to make decisions that will have significant consequences, it has also become important to provide not only standard security guarantees for the computer system but also ways of explaining the output of the system in case of possible errors and disputes. This translates to new security requirements in terms of human needs rather than technical properties. For some context, we look at prior disputes regarding banking security and the ongoing litigation concerning the Post Office’s Horizon system, discussing the difficulty in achieving meaningful transparency and how to better evaluate available evidence
Murdoch and the End of Ideology
Iris Murdoch had a lifelong interest in politics and she reflected upon the nature of ideology throughout her career. What she had to say on the subject developed during her career and relates to general academic discussions on the nature of ideology. At the outset of her career she was a committed socialist. She recognised that political ideology was in retreat after the Second World War but sought to contribute to socialist ideology. Later in her career she became sceptical of radical utopian ideologies, including socialism and developed a theory of politics that prioritised safeguarding individual liberty and security. However, she imagined that political thought would continue to develop and offer new possibilities and so she did not call for the end of ideology but continued to value political ideas
Understanding the production of dual BEC with sympathetic cooling
We show, both experimentally and theoretically, that sympathetic cooling of
Rb atoms in the state by evaporatively cooled atoms in the
state can be precisely controlled to produce dual or single
condensate in either state. We also study the thermalization rate between two
species. Our model renders a quantitative account of the observed role of the
overlap between the two clouds and points out that sympathetic cooling becomes
inefficient when the masses are very different. Our calculation also yields an
analytical expression of the thermalization rate for a single species.Comment: 3 figure
Stability of binary nanocrystalline alloys against grain growth and phase separation
Grain boundary segregation has been established through both simulation and experiments as a successful approach to stabilize nanocrystalline materials against grain growth. However, relatively few alloy systems have been studied in this context; these vary in their efficacy, and in many cases the stabilization effect is compromised by second phase precipitation. Here we address the open-ended design problem of how to select alloy systems that may be stable in a nanocrystalline state. We continue the development of a general “regular nanocrystalline solution” model to identify the conditions under which binary nanocrystalline alloy systems with positive heats of mixing are stable with respect to both grain growth (segregation removes the grain boundary energy penalty) and phase separation (the free energy of the nanocrystalline system is lower than the common tangent defining the bulk miscibility gap). We calculate a “nanostructure stability map” in terms of alloy thermodynamic parameters. Three main regions are delineated in these maps: one where grain boundary segregation does not result in a stabilized nanocrystalline structure, one in which macroscopic phase separation would be preferential (despite the presence of a nanocrystalline state stable against grain growth) and one for which the nanocrystalline state is stable against both grain growth and phase separation. Additional details about the stabilized structures are also presented in the map, which can be regarded as a tool for the design of stable nanocrystalline alloys.United States. Army Research Office (Contract W911NF-09-1-0422)United States. Dept. of Energy. Office of Science (Solid-State Solar-Thermal Energy Conversion Center DE-SC0001299
How can marketing theory be applied to policy design to deliver on sustainable agriculture in England?
Marketing theory was applied to develop a qualitative tool to predict levels of compliance based on involvement with the issue (policy objective) and involvement with the intervention (regulation). Based on an understanding farmer decision-making, the I3 Response Framework can help identify strategies that can strongly influence compliance, providing more efficient targeting of resources for policy. We report on further testing by application to the issue of water quality and the regulations around slurry storage as part of the Nitrate Pollution Prevention Regulations 2008 as applicable to dairy farmers in the Derwent catchment of North Yorkshire, EnglandPolicy, I3 Response Framework, involvement, water quality, slurry storage, Nitrogen Vulnerable Zone, regulation, Nitrate Pollution Prevention Regulations 2008, NPPR2008, Agricultural and Food Policy,
- …