2,484 research outputs found

    QCD Flux Tubes as Sigma Model Relics

    Get PDF
    We describe flux tubes and their interactions in a low energy sigma model induced by SU(\NF) \goto SO(\NF) flavor symmetry breaking in SO(Nc)SO(N_c) QCD. Gauge confinement manifests itself in the low energy theory through flux tube interactions with unscreened sources. The flux tubes which mediate confinement also illustrate an interesting ambiguity in defining global Alice strings.Comment: 12 pages (REVTEX) plus one figur

    So what is a “Facility Level” Hazard Analysis Anyway?

    Get PDF
    PresentationHow can a “facility level” hazard analysis be conducted to ensure hazards of the operation are understood and managed, while at the same time optimizing the use of company resources to complete the analysis? Anadarko has framed these issues into a Facility Level Hazard Analysis (FLHA) Program for our Gulf of Mexico (GoM) facility operations. This FLHA program follows Anadarko’s Risk Management program guidelines and also meets the requirements of the BSEE Safety and Environmental Management System (SEMS) regulation and is consistent with American Petroleum Institute (API) guidance. Anadarko’s GoM FLHA program also provides flexibility to address the initial design, pre-startup, and post-startup hazard analysis needs of the organization

    Social-Costs Perspective Impacts of Cybercrime in World-Economy, Country-Wise: Policy-Guidance under Piecemeal Approach

    Get PDF
    Today’s technology-driven human-society(s) country-wise are counted more than ever before where UAE-society is no exception. Tech-users here compete for comparative time-saving options for marginalizing operating costs. It has resulted in huge data usages, a high number of users & devices, which has attracted criminals for taking advantage, which is called cybercrime. Addressing cybercrime, the UAE, like many countries, is not out of control by-laws. However, laws like cybercrime for its society are not always for absolutely eliminating the crime. Thus, besides cybercrime law in place, UAE needs a piecemeal approach in practice where one department may vary from approaches of other-department. With awareness about risky online behaviors & options, tech-users as defenders are needed to invest their efforts. This study has laid out the foundation of the proposal, Akim’s Model-2021, using the Theory of Consumer Choice & Behaviors and Welfare Analysis. Tech-user’s actual utility-received is the sum of utility-received from awareness & own-effort and utility-received from cybercrime-law. Any changes to services received from joint efforts may risk tech-user, to be a victim. Welfare analysis shows tech user's actions - awareness & own-effort, besides cybercrime-law can create, Net Social-gain, which largely depends on tech user's actions. Tech-user’s economic surplus is greater than government expenses for implementation of cybercrime law in UAE. Net-loss to the UAE is the sum of deadweight loss and net-loss to tech producers for underutilized resources
    • …
    corecore