3,931 research outputs found
Stamping single wall nanotubes for circuit quantum electrodynamics
We report on a dry transfer technique for single wall carbon nanotube devices
which allows to embed them in high finesse microwave cavity. We demonstrate the
ground state charge readout and a quality factor of about 3000 down to the
single photon regime. This technique allows to make devices such as double
quantum dots which could be instrumental for achieving the strong spin photon
coupling. It can easily be extended to generic carbon nanotube based microwave
devices.Comment: Version similar to the one accepte
Sustainable alkali binders: Waste activating wastes
Alkaline binders usually requires two main components, namely the solid precursor, rich in alumina and silica (preferably in an amorphous state); and the activator solution, based on an alkali metal (usually sodium or potassium). The role of the precursor is commonly assumed by a residue, usually fly ash or blast furnace slag with significant economic and environmental benefits. However the activator is frequently prepared with first grade commercial reagents (usually sodium or potassium hydroxide and sodium or potassium silicate), which significantly increases the financial costs and severely dilutes the environmental initial advantages, due to the high CO2-eq released during the production of the reagents. These drawbacks associated with the activator severely hinder the wide spreading of this technology severely making the development of low cost activators a major research target. Therefore, a strong expectation regarding the application of industrial residues as the main (or even the sole) constituent of the activators – and not just as the precursor – is rapidly growing. The aim of the present paper is thus to analyse the potential application of some by-products, in this case from the aluminium foundry industry, as the alkali activator of two different precursors: fly ash type F (FA) and blast furnace slag (BFS)
Recommended from our members
Does Diversity, Equity and Inclusion Include Everyone? A Phenomenological Case Study of Underrepresented Minority Professional Staff in Higher Education
The proportion of professional staff on higher education campuses has significantly grown in recent decades. Despite this growth, the racial makeup of this employee population still does not reflect the increasing diversity of students in higher education. While higher education institutions pronounce their commitments to developing diversity, equity, and inclusion (DEI) practices among their campuses, very little research has focused on the individuals carrying out those institutional commitments: professional staff. Even more problematic is that many DEI efforts fail to be inclusive of professional staff. Much of the focus of these efforts primarily revolves around students. The purpose of my study was to explore if, and how, institutional DEI efforts impact the experiences of underrepresented minority (URM) professional staff and influence their retention as employees. This study specifically asked the research questions: “Are higher education institutions inclusive of URM staff in their campus’ DEI efforts? How?” and “Do institutional DEI efforts promote or hinder URM staff retention?” with the aim to address a void in current research regarding retention of URM professional staff in higher education institutions. Data for this phenomenological case study was collected through a dual-method approach consisting of a document analysis of institutional artifacts outlining DEI efforts and semi-structured interviews with 17 URM staff members of a higher education campus. Findings from the research present that despite staff being included in the institutional documents addressing DEI goals, the perceptions and experiences shared by URM professional staff in this study indicate a less than welcoming and supportive environment that hindered URM staff retention. Four themes were presented based on the study’s findings that discuss a climate of symbolic inclusion, recruitment and retention, lack of communication and responsibility of campus DEI efforts. Key recommendations constructed from the findings indicate the need to establish broader organizational beliefs, define what a welcoming and supportive environment is, implement of a two-way communication plan, along with several other recommendations.Keywords: Underrepresented minority (URM), Diversity, Equity, and Inclusion (DEI), professional staff, recruitment, retentio
Soluciones administrativas y técnicas para proteger los recursos computacionales de personal interno-insiders
Key words: Administrative solutions, computational security, culture of security, protection tools, technical solutionsAbstract. Nowadays the organizations know that the computational security in logical, physical, environment security of hardware, software, process of business, data bases, telecommunications, butt in other, are essential not solely for the continuity of the daily operations of the businesses, but also to obtain strategic advantages. If the organization does not worry to place policies of computational security, that does not have control computational security, that does not invest in protection tools, does not update itself in the new problems ofinternal attacks and that a culture in computational security does not foment, among other aspects, more likely this in a high risk of which some computational resource can be affected by internal personnel and in consequence part or all the Business can let operate. It is necessary to remember that the internal personnel of the areas of information technology or systems intentional business or not intentionally they can damage the computational resources since they have knowledge of the vulnerabilities that have the computationalresources. I am made east summary with the purpose of which the people who read it have This paper has the aim to create a TI Resources Security Culture and to present some administrative and technical elements to protect the computational resources of from internalinsiders personnel.Palabras claves: Cultura de seguridad, herramientas de protección, seguridadcomputacional, soluciones administrativas, soluciones técnicasResumen. Hoy en día las organizaciones aceptan que los controles en seguridadcomputacional – lógica, física y ambiental en hardware, software, procesos de negocio, bases de datos, telecomunicaciones, entre otros - son esenciales para darle continuidad a las operaciones diarias de los negocios, así como y también para obtener ventajas estratégicas. Una organización que no se preocupa por aplicar políticas de seguridad computacional, establecer controles de seguridad, invertir en herramientas de protección, actualizarse en los nuevos problemas de ataques internos fomentar una cultura en seguridad computacional, etcétera, tiene mayor probabilidad de correr un alto riesgo, porque algún recurso computacional puede ser afectado por personal interno y en consecuencia una parte o todo el negocio puede dejar de operar, trayendo como consecuencia que la imagen de éste pueda ser dañada y que sus clientes pierdan la confianza. Hay que recordar que el personal interno de las áreas de tecnología de información o sistemas pueden dañar los recursos computacionales ya que ellos poseen conocimiento de las vulnerabilidades que poseen éstos últimos; también los usuarios de las diferentes áreas de forma intencional o no pueden también hacer daño. Por lo anterior, se proponen presentan en este artículo la implementación de una Cultura en Seguridad Computacional, así como soluciones administrativas y técnicas con la finalidad de disminuir los riesgos computacionales contra ataques interno
Química de los cementos
En la presente comunicación se describen los resultados mas relevantes obtenidos a lo largo del tiempo en torno a algunas de las líneas de trabajo mas importantes que se desarrollan en el seno del grupo de investigación “Química del Cemento” del Instituto de Ciencias de la Construcción Eduardo Torroja (IETcc-CSIC).Edición financiada por el Ministerio de Educación y Ciencia con cargo al "Plan Nacional de I+D+I 2004-2007".Peer reviewe
Bases psicobiológicas de la adicción a cocaína
El principal mecanismo de acción de la cocaína es la inhibición de la recaptación de dopamina y noradrenalina, produciendo un aumento de estos neurotransmisores en la sinapsis. El consumo agudo de cocaína produce una serie de cambios bastante conocidos en el sistema cerebral de recompensa. Sin embargo, el consumo crónico, produce, además, otra serie de cambios a nivel molecular que llevan al sujeto desde una situación de consumo puntual, a una situación de dependencia. Se han propuesto diferentes teorías explicativas de este fenómeno como la sensibilización del incentivo, o la homeostasis y alostasis neuroquímica, planteamientos basados en el condicionamiento clásico y operante. Por otra parte, se ha señalado la intervención de diferentes moléculas y vías de segundos mensajeros, que producen, en última instancia, una serie de cambios neuronales mantenidos a muy largo plazo, probablemente permanentes, que se podrían relacionar con la vulnerabilidad a las recaídas, propia de la adicción a cocaína, incluso años después de abandonar el consumo
Los revocos de Medina Azahara. Parte I: Caracterización del material y procesos de alteración
Rendering mortars, which are still exposed to the open air on some of the walls of Medina Azahara, are studied and characterized in this work. Some repairing mortars used in different previous restorations are also characterized.
Those rendering mortars are of different make considering the composition of their binder: lime, gypsum and mixed lime/ gypsum. Repairing mortars used in previous interventions are made of lime, excepting for a portland cement used by Félix Hernández in the restoration of one of the rooms back in the 50's.
Biological colonization is the main cause of decay in lime mortars, while in mortars made of gypsum, decay is a result of the solubilizating action of rain water.En este trabajo se analizan y caracterizan los revocos que, todavía hoy, permanecen sobre algunos paramentos de los muros de la ciudad de Medina Azahara, expuestos a la intemperie. También se caracterizan algunos de los molleros de reparación aplicados en las distintas restauraciones de los revocos.
Los revocos están formados por tres clase de morteros, atendiendo a la composición de su ligante: de cal, de yeso y bastardos de cal y yeso. Los morteros de reparación que se han utilizado son de cal, a excepción del utilizado en la restauración de Félix Hernández (década de 1950), en una de las salas, que es de cemento portland.
La colonización biológica es la principal causa de deterioro de los morteros de cal, en tanto que la solubilización por las aguas de lluvia lo es en los morteros que contienen yeso
Cosmological solutions from fake N=2 EYM supergravity
We characterise the (fake) supersymmetric solutions of Wick-rotated N=2 d=4
gauged supergravity coupled to non-Abelian vector multiplets. In the time-like
case we obtain generalisations of Kastor & Traschen's cosmological black holes:
they have a specific time-dependence and the base-space must be 3-dimensional
hyperCR/Gauduchon-Tod space. In the null-case, we find that the metric has a
holonomy contained in Sim(2), give a general characterisation of the solutions,
and give some examples. Finally, we point out that in some cases the solutions
we found are non-BPS solutions to N=2 d=4 supergravity coupled to vector
multiplets.Comment: 30 pages. Comments and references added, typos correcte
- …