6,087 research outputs found

    Catherine Mary White Foster\u27s Eyewitness Account of the Battle of Gettysburg, with Background on the Foster Family Union Soldiers

    Full text link
    Catherine Mary White Foster lived with her elderly parents in the red brick house on the northwest corner of Washington and High Streets in Gettysburg at the time of the battle, 1-3 July 1863. She was the only child of James White Foster and Catherine (nee Swope) Foster (a former resident of Lancaster county), who married on 11 May 1817 and settled in Gettysburg, Adams county, Pennsylvania. Her father, James White Foster, had served his country as a first lieutenant in the War of 1812. Her grandparents, James Foster and Catherine (nee White) Foster, had emigrated with her father and five older children from county Donegal, Ireland, in 1790, and settled near New Alexandria, Westmoreland county, Pennsylvania. [excerpt

    On spatially-averaged electrokinetics of point charges and Maxwell's equations

    Get PDF
    Maxwell-like field relations which describe spatially-averaged kinematic behaviour of electrons and atomic nuclei (modelled as point charges) are obtained at any prescribed scale using weighting function methodology. Upon appeal to the experimental laws of Coulomb and Biot-Savart, and to dimensional considerations, these relations yield the macroscopic Maxwell equations as they pertain to electrostatics and magnetostatics. Generalisation to classical macroscopic electrodynamics is effected by taking account of signal transmission delay and selection of appropriate retardation potentials. Unlike previous derivations, no appeal is made to the microscopic field relations of Lorentz

    Pamphlet for Hapgoods Incorporated.

    Get PDF
    Pamphlet detailing the services provided by Hapgoods Incorporated

    Dovetail: Stronger Anonymity in Next-Generation Internet Routing

    Full text link
    Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than obfuscating network identity through higher level protocols, we propose a more direct solution: a routing protocol that allows communication without exposing network identity, providing a strong foundation for Internet privacy, while allowing identity to be defined in those higher level protocols where it adds value. Given current research initiatives advocating "clean slate" Internet designs, an opportunity exists to design an internetwork layer routing protocol that decouples identity from network location and thereby simplifies the anonymity problem. Recently, Hsiao et al. proposed such a protocol (LAP), but it does not protect the user against a local eavesdropper or an untrusted ISP, which will not be acceptable for many users. Thus, we propose Dovetail, a next-generation Internet routing protocol that provides anonymity against an active attacker located at any single point within the network, including the user's ISP. A major design challenge is to provide this protection without including an application-layer proxy in data transmission. We address this challenge in path construction by using a matchmaker node (an end host) to overlap two path segments at a dovetail node (a router). The dovetail then trims away part of the path so that data transmission bypasses the matchmaker. Additional design features include the choice of many different paths through the network and the joining of path segments without requiring a trusted third party. We develop a systematic mechanism to measure the topological anonymity of our designs, and we demonstrate the privacy and efficiency of our proposal by simulation, using a model of the complete Internet at the AS-level

    Transparency Enhancing Technologies to Make Security Protocols Work for Humans

    Get PDF
    As computer systems are increasingly relied on to make decisions that will have significant consequences, it has also become important to provide not only standard security guarantees for the computer system but also ways of explaining the output of the system in case of possible errors and disputes. This translates to new security requirements in terms of human needs rather than technical properties. For some context, we look at prior disputes regarding banking security and the ongoing litigation concerning the Post Office’s Horizon system, discussing the difficulty in achieving meaningful transparency and how to better evaluate available evidence

    Murdoch and the End of Ideology

    Get PDF
    Iris Murdoch had a lifelong interest in politics and she reflected upon the nature of ideology throughout her career. What she had to say on the subject developed during her career and relates to general academic discussions on the nature of ideology. At the outset of her career she was a committed socialist. She recognised that political ideology was in retreat after the Second World War but sought to contribute to socialist ideology. Later in her career she became sceptical of radical utopian ideologies, including socialism and developed a theory of politics that prioritised safeguarding individual liberty and security. However, she imagined that political thought would continue to develop and offer new possibilities and so she did not call for the end of ideology but continued to value political ideas

    Understanding the production of dual BEC with sympathetic cooling

    Full text link
    We show, both experimentally and theoretically, that sympathetic cooling of 87^{87}Rb atoms in the F=2,mF=2>|F=2,m_F=2> state by evaporatively cooled atoms in the F=1,mF=1>|F=1,m_F=-1> state can be precisely controlled to produce dual or single condensate in either state. We also study the thermalization rate between two species. Our model renders a quantitative account of the observed role of the overlap between the two clouds and points out that sympathetic cooling becomes inefficient when the masses are very different. Our calculation also yields an analytical expression of the thermalization rate for a single species.Comment: 3 figure

    Stability of binary nanocrystalline alloys against grain growth and phase separation

    Get PDF
    Grain boundary segregation has been established through both simulation and experiments as a successful approach to stabilize nanocrystalline materials against grain growth. However, relatively few alloy systems have been studied in this context; these vary in their efficacy, and in many cases the stabilization effect is compromised by second phase precipitation. Here we address the open-ended design problem of how to select alloy systems that may be stable in a nanocrystalline state. We continue the development of a general “regular nanocrystalline solution” model to identify the conditions under which binary nanocrystalline alloy systems with positive heats of mixing are stable with respect to both grain growth (segregation removes the grain boundary energy penalty) and phase separation (the free energy of the nanocrystalline system is lower than the common tangent defining the bulk miscibility gap). We calculate a “nanostructure stability map” in terms of alloy thermodynamic parameters. Three main regions are delineated in these maps: one where grain boundary segregation does not result in a stabilized nanocrystalline structure, one in which macroscopic phase separation would be preferential (despite the presence of a nanocrystalline state stable against grain growth) and one for which the nanocrystalline state is stable against both grain growth and phase separation. Additional details about the stabilized structures are also presented in the map, which can be regarded as a tool for the design of stable nanocrystalline alloys.United States. Army Research Office (Contract W911NF-09-1-0422)United States. Dept. of Energy. Office of Science (Solid-State Solar-Thermal Energy Conversion Center DE-SC0001299

    How can marketing theory be applied to policy design to deliver on sustainable agriculture in England?

    Get PDF
    Marketing theory was applied to develop a qualitative tool to predict levels of compliance based on involvement with the issue (policy objective) and involvement with the intervention (regulation). Based on an understanding farmer decision-making, the I3 Response Framework can help identify strategies that can strongly influence compliance, providing more efficient targeting of resources for policy. We report on further testing by application to the issue of water quality and the regulations around slurry storage as part of the Nitrate Pollution Prevention Regulations 2008 as applicable to dairy farmers in the Derwent catchment of North Yorkshire, EnglandPolicy, I3 Response Framework, involvement, water quality, slurry storage, Nitrogen Vulnerable Zone, regulation, Nitrate Pollution Prevention Regulations 2008, NPPR2008, Agricultural and Food Policy,
    corecore