1,601 research outputs found

    New metal-ceramic composites grown by metalorganic chemical vapour deposition

    Get PDF

    Construction of an optical test-bed for eLISA

    Get PDF
    In the planned eLISA mission a key part of the system is the optical bench that holds the interferometers for reading out the inter-spacecraft distance and the test mass position. We report on ongoing technology development for the eLISA optical system like the back-link between the optical benches and the science interferometer where the local beam is interfered with the received beam from the distant spacecraft. The focus will be on a setup to investigate the tilt-to-pathlength coupling in the science interferometer. To test the science interferometer in the lab a second bench providing a laser beam and a reference interferometer is needed. We present a setup with two ultra-stable low expansion glass benches and bonded optics. To suppress the tilt-to-pathlength coupling to the required level (few ÎĽm/rad) imaging optics are placed in front of the interferometer photo diodes

    Disclosure, Enforcement and the Valuation of Equity

    Get PDF
    Empirical evidence shows that higher levels of disclosure and enforcement do not consistently translate into higher firm valuations. This observation implies a real-life setting in which a richer information environment can shift investors’ risk premiums upwards or downwards. However economic literature does not convincingly explain why adverse effects can occur. To fill this gap in research, we provide a model beyond the standard principal-agent framework that can explain valuation effects from augmented disclosure and enforcement regulation. We also show that country differences in regulatory effectiveness do not align with the legal system, but instead with structural strengths or difficulties of an economy. In a six country setting, investigating Canada, France, Germany, Japan, the UK and the U.S., we systematically capture regulatory changes and document varying valuation effects from mandatory disclosure regulation. Our analysis shows that valuation effects are driven by the share of “bad news” firms, which is higher in economies with structural difficulties. Effects from higher levels of disclosure are thus neither generalizable across economies nor dependent on the legal system as previously hypothesized. Keywords: Equity Valuation; Disclosure; Enforcement; Panel data analysis. DOI: 10.7176/RJFA/10-8-04 Publication date: April 30th 201

    Towards an Appropriation Infrastructure: Supporting User Creativity in IT Adoption

    Get PDF
    Research on the adoption of information systems (IS) often stated technology as a fixed entity. Following the ’practical turn’ in IS we argue that information technology artefacts are mainly ’cultural artefacts’, which are shaped in a social process of appropriation where software usage is accompanied by processes of interpretation, negotiation or change in organizations. We elaborate on a (neo-)Marxian interpretation of appropriation from a design-oriented perspective in order to investigate the possibilities of technological support of activities of appropriation work. To capture the different facets of appropriation, we combine theoretical concepts of social capital and activity-based learning. With the help of this theoretical orientation, we systemize empirical evidence from several research projects in order to detect recurring patterns. We use these patterns to develop a generic architecture for actively supporting the social activity of appropriating the cultural artefact in context of its usage

    Detecting Malicious Code by Model Checking

    Get PDF
    Abstract. The ease of compiling malicious code from source code in higher programming languages has increased the volatility of malicious programs: The first appearance of a new worm in the wild is usually followed by modified versions in quick succession. As demonstrated by Christodorescu and Jha, however, classical detection software relies on static patterns, and is easily outsmarted. In this paper, we present a flexible method to detect malicious code patterns in executables by model checking. While model checking was originally developed to verify the correctness of systems against specifications, we argue that it lends itself equally well to the specification of malicious code patterns. To this end, we introduce the specification language CTPL (Computation Tree Predicate Logic) which extends the well-known logic CTL, and describe an efficient model checking algorithm. Our practical experiments demonstrate that we are able to detect a large number of worm variants with a single specification. Key words: Model Checking, Malware Detection.

    An amplicon sequencing protocol for attacker identification from DNA traces left on artificial prey

    Get PDF
    1. Clay model studies are a popular tool to identify predator–prey interactions that are challenging to observe directly in the field. But despite its wide use, the meth-od's applicability is limited by its low taxonomic resolution. Attack marks on clay models are usually identified visually, which only allows classification into higher taxonomic levels of predators. Thus, the method is often biased, lacks proof and, above all, standardization.2. Here, we tested whether precise identification of attackers can be provided by amplification and sequencing of mitochondrial DNA left in bite marks on clay models. We validated our approach in a controlled laboratory study as well as in a field experiment using clay models of a common European amphibian, the European fire salamander Salamandra salamandra. DNA-based taxonomic assign-ments were additionally compared to visual assessments of bite marks.3. We show that trace DNA of attackers can be routinely isolated and sequenced from bite marks, providing accurate species-level classification. In contrast, visual identification alone yielded a high number of unassigned predator taxa. We also highlight the sensitivity of the method and show likely sources of contamination as well as probable cases of secondary and indirect predation.4. Our standardized approach for species-level attacker identification opens up new possibilities far beyond the standard use of clay models to date, including food web studies at unprecedented detail, invasive species monitoring as well as biodi-versity inventories

    Growth and Characterization of Ce- Substituted Nd2Fe14B Single Crystals

    Full text link
    Single crystals of (Nd1-xCex)2Fe14B are grown out of Fe-(Nd,Ce) flux. Chemical and structural analysis of the crystals indicates that (Nd1-xCex)2Fe14B forms a solid solution until at least x = 0.38 with a Vegard-like variation of the lattice constants with x. Refinements of single crystal neutron diffraction data indicate that Ce has a slight site preference (7:3) for the 4g rare earth site over the 4f site. Magnetization measurements show that for x = 0.38 the saturation magnetization at 400 K, a temperature important to applications, falls from 29.8 for the parent Nd2Fe14B to 27.6 (mu)B/f.u., the anisotropy field decreases from 5.5 T to 4.7 T, and the Curie temperature decreases from 586 to 543 K. First principles calculations carried out within density functional theory are used to explain the decrease in magnetic properties due to Ce substitution. Though the presence of the lower-cost and more abundant Ce slightly affects these important magnetic characteristics, this decrease is not large enough to affect a multitude of applications. Ce-substituted Nd2Fe14B is therefore a potential high-performance permanent magnet material with substantially reduced Nd content.Comment: 11 Pages, 8 figures, 5 table
    • …
    corecore