4,636 research outputs found

    Reconstruction of Zeff profiles at TEXTOR through Bayasian source separation

    Full text link
    The understanding of the behaviour of impurities is a critical issue in tokamak physics. The ion effective charge Zeff provides a measure for impurity concentration. On the TEXTOR tokamak (Julich, Germany), we run a diagnostic to determine Zeff from the bremsstrahlung emissivity E. From radial profiles of E, electron density ne and temperature Te, profiles for Zeff can be reconstructed. However, their interpretation is difficult outside the plasma centre, because of various uncertainties in E, ne and Te at the edge, which render the radial matching of the different profiles problematic. Conversely, if it were possible to obtain a set of line-integrated values for Zeff directly from the line-integrated measurements of E, ne and Te, then these problems would be avoided. Now, recent advances in the field of statistical signal processing allow the extraction of an unknown signal from a signal mixture. In particular, we describe a procedure for the single-channel Bayesian source separation of a line-integrated Zeff signal from a line-integrated emissivity source, using as a forward model a linearized version of the known functional dependence of Zeff on E, ne and Te. Here, a line-integral over a traditionally obtained Zeff profile may serve as a prior for the line-integrated Zeff signal. In this way, precise information on the electron density and temperature may even become superfluous for the determination of Zeff.Comment: 12th International Congress on Plasma Physics, 25-29 October 2004, Nice (France

    Asymmetric syntactic patterns in German-Dutch translation : a corpus-based study of the interaction between normalisation and shining through

    Get PDF
    The present study investigates how opposing translation universals (explanatory devices) as normalisation and shining through interact with each other. More particularly, we want to find out whether it is more likely to observe instantiations of shining through or (over-)normalisation in translations of contemporary literary fiction and whether the likelihood of these three explanatory devices varies according to translation direction. On the basis of a bidirectional comparable corpus of Dutch and German literary fictional texts (1975-2010), we investigated a case of syntactic variation that exists in both languages, viz. prepositional phrase (PP) placement. In both languages, a PP can be placed either in the middle field or in the postfield, but German presents a more outspoken preference for the middle field, thus making PP placement ideal for an investigation of the interaction between shining through and (over)normalisation. The results of the analyses show that (i) there is a strong form of shining through present in Dutch texts translated from German and (ii) a strong form of normalisation in German texts translated from Dutch. These results confirm Toury’s hypothesis that a less prestigious language such as Dutch is more tolerant towards higher frequencies of linguistic features which are typical of highly prestigious source languages as German than the other way around

    A study into students' interests in industrial design engineering using a gender pattern analysis

    Get PDF
    This paper describes first year students’ interest and motivation towards the field of Industrial Design Engineering (IDE) at the University of Twente during three years (2002-2004). Data was gathered systematically based on students’ interest to aspects of IDE: technology, styling, ergonomics and marketing. Students’ arguments were analysed with help of a theoretical framework, based on: 1. a basic phase model of product development (I/design-product-use/market) and 2. value patterns (virtuosity, economic, and user/need values). Results show varied and gender patterned interest in the mentioned four aspects of IDE. Significant gender differences were also found in type of arguments students used to motivate their rate of interest. Results of this paper can be used for a didactical educational review. They too may be relevant to enhance insight into the differentiating values of people in design practices

    Visualization of tokamak operational spaces through the projection of data probability distributions

    Get PDF
    Information visualization is becoming an increasingly important tool for making inferences from large and complex data sets describing tokamak operational spaces. Landmark MDS, a computationally efficient information visualization tool, well suited to the properties of fusion data, along with a comprehensive probabilistic data representation framework, is shown to provide a structured visual map of plasma confinement regimes, plasma disruption regions and plasma trajectories. This is aimed at contributing to the understanding of underlying physics of various plasma phenomena, while providing an intuitive tool for plasma monitoring

    Information security management : an empirical analysis of its constitution

    Full text link
    University of Technology, Sydney. School of Management, Faculty of Business.This thesis addresses the following research questions: How does analysis of the everyday discursive work of information security managers inform us about the phenomena that they constitute as 'information security?' What does it mean to 'do' information security? These questions are worth asking given the importance of information to organizations (Hong et al. 2003), the extent of current information security problems (Knapp et al. 2006a), a lack of empirical research on information security (Kotulic and Clark 2004), and a preponderance of research on technical solutions to information security problems conceived in technical terms (Dhillon and BaddJouse 2001) . In response to this situation some scholars propose simplistic "cultural' solutions, without empirical basis. To answer the research questions, and help address the abovementioned problems, I observed and recorded three months of weekly meetings of a group of information security managers at a large organization. The analysis of the data in order to develop answers to the research questions followed the reflexive interpretation approach advocated by Alvesson and Skoldberg (2000). The interpretive repertoire drawn upon Lo interpret the data and its relationship to my research questions centred on writings on power by Clegg (1989), Clegg et al. (2006a), Haugaard (1997), Hayward and Lukes (2008) and Lukes (2005), complemented by other resources. The reflexively interpreted data, informed by the abovementioned writings on power, suggested that an integral part of the managers' 'doing' of information security involves the management of excess responsibility relative to their power to achieve a secure state. This is an inevitable dilemma given that a fundamental information security management problem, aside from the damage breaches cause for organizations, is that its very definition implies an unrealisable state. No system is completely secure (Straub and Welke 1998; Stewart 2004). The management of responsibility took the form of devising authorised processes constituted by rules. The decision as to whether to act or not in relation to a potential information security problem is envisioned by the managers as a result of an application of rules, rather than individual agency. If an information security breach were to result (an ever present threat) the process would ideally be to blame, in effect absorbing the responsibility. However, rules require interpretation by agents (Clegg 1989) and are potentially subject to multiple interpretations. Agency and the management of its requisite responsibility cannot be escaped. A number of implications are developed as a result of this reflexive interpretation of the data, both theoretical and practical
    • …
    corecore