333 research outputs found

    A new sound mode in liquid Helium 4?

    Full text link
    This letter is based on the hypothesis of a small entropy content of the superfluid fraction of liquid helium. We show that such a superfluid entropy gives rise to a new sound mode in a ring-shaped superleak. This mode is named sixth sound. We propose an experiment by which its sound velocity and thereby the superfluid entropy can be measured. A negative experiment would yield a new upper limit for the superfluid entropy.Comment: 9 pages, latex, published in Phys. Lett. A 187 (1994) 8

    Tindebestigersker og andre JĂŠttekvinder

    Get PDF
    Although women have been climbing mountains in Norway for more than 150 years, their history is mostly silent. The ideal of femininity which held that a woman should be weak, delicate and submissive, was challenged by mountaineering women, which again were met with strong resistance and dismay. In my sources, the Norwegian Tourist AssociationĂąs (DNT) yearbooks, female climbers are only acknowledged in condescending terms, and it was assumed that a man would always be in charge of the climbing parties. These patronizing attitudes are grounded in the male belief in female inferiority. Thus, there can be are no good women climbers, they either arenĂąt good climbers or they arenĂąt real women. This article explores the reasons for the strong resistance climbing females are met with, grounded in BourdieusĂą theories on the symbolic order in society. I argue that climbing, an activity created by and for men, is a focal point for discourses on masculinity, femininity and sex roles, and an area which facilitates an alternative sex-enactment for women, but at a cost

    On-site communication measures as a tool in outdoor recreation management: a systematic map protocol

    Get PDF
    Background: Communication is a central tool in managing the balance between outdoor recreation and environmental protection. Several studies have evaluated diferent communication measures in nature area case studies, but rarely are these measures compared across contexts. We systematically map the literature guided by the question, what is the evidence base of on-site communication in outdoor recreation to change human behavior towards a more sustainable direction? Taking vulnerable natural areas as our starting point, we map distribution and abundance of communication measures, study design and outcome-related themes. Methods: The target population for our mapping review (hereafter review) are outdoor recreationists and naturebased tourists who visit natural or near-natural settings. We will examine the studies that have crafted written, oral and visual intervention measures to change behavior by using persuasion, education and information instead of legal restrictions or bans. Some examples of challenges addressed with communication measures are proper waste disposal, using designated trails, minimizing wear and tear at campsites, avoid disturbing wildlife, and encouraging appropriate and safe behavior. No geographic restrictions will be applied but we will focus on protected areas. We will search publication databases for peer-reviewed published articles using internet and specialist searches to identify grey literature in English. We will screen frst by title, followed by abstract and fnally full text. For each article selected for full-text screening, metadata will be extracted on key variables of interest. The extracted data from the coding will be used to group and compare the studies to reveal knowledge gaps and knowledge clusters. We will briefy describe fndings from the included studies. The review will help identify what type of human behavior researchers have addressed with communication in nature management and conservation. In addition it will highlight which communication measures are frequently used in each behavioral context. It will identify which frameworks and communication theories have been the basis for designing intervention measures and provide support to practitioners and researchers in future framing and implementation of communication measures in natural settings. Messaging studies, Persuasion, Human behavior, Nature-based tourism, Visitor management in national parks, Communication theorypublishedVersio

    D-XY Critical Behavior in Cuprate Superconductors

    Full text link
    We outline the universal and finite temperature critical properties of the 3D-XY model, extended to anisotropic extreme type-II superconductors, as well as the universal quantum critical properties in 2D. On this basis we review: (i) the mounting evidence for 3D-XY behavior in optimally doped cuprate superconductors and the 3D to 2D crossover in the underdoped regime; (ii) the finite size limitations imposed by inhomogeneities; (iii) the experimental evidence for a 2D-XY quantum critical point in the underdoped limit, where the superconductor to insulator transition occurs; (iv) the emerging implications and constraints for microscopic models.Comment: 5 pages, 6 figure

    Digital sikkerhetskultur i kraftsektoren – en studie av kjennetegn ved den digitale sikkerhetskulturen i kraftsektoren

    Get PDF
    Sammendrag VÄrt moderne samfunn preges av i stor grad av digitalisering. Digitalisering handler enkelt sagt om Ä bruke teknologi til Ä forbedre og fornye vÄre virksomheter i samfunnet, samtidig som man ivaretar god sikkerhet. Norske virksomheter opplever digitale angrep tett pÄ kroppen daglig, og det har vÊrt flere eksempler pÄ alvorlige dataangrep i Norge de siste Ärene. Dette stiller nye krav til hvordan virksomhetene driver sitt sikkerhets- og beredskaps arbeid. Det digitale sikkerhetsarbeidet mÄ stÄ i stil til hvilken digital risiko virksomhetene blir utsatt for. Nasjonale risikovurderinger peker spesielt mot mennesket som et yndet mÄl for dem som prÞver Ä trenge igjennom digitale systemer. Ettersom mennesket alltid vil vÊre brukeren av de digitale lÞsningene, betyr det at de ogsÄ kan pÄvirkes i ulik retning til Ä gjÞre feil eller dele sensitiv informasjon om virksomheten. VÄre samfunnskritiske virksomheter, som kraftsektoren, vil alltid vÊre utsatt for stÞrre digital risiko siden de arbeider med vÄre grunnleggende verdier. PÄ bakgrunn av dette har vi valgt Ä ta for oss de menneskelige og organisatoriske faktorene som spiller inn pÄ arbeidet med Ä skape en god digital sikkerhetskultur i virksomhetene i kraftsektoren. Vi kom frem til fÞlgende problemstilling: Hva kjennetegner norske kraftvirksomheter sitt arbeid med digital sikkerhetskultur, sett fra fagansatte og ledelsen sitt perspektiv. Litteraturen i studien har vi hentet fra tradisjonelle teorier rundt menneskeskapte og hÞypÄlitelige organisasjoner og sikkerhetskultur. Digital sikkerhetskultur er et relativt nytt begrep og dermed er de tradisjonelle teoriene viktige for Ä beskrive fenomenet. Vi har ogsÄ benyttet oss av nyere nasjonal og internasjonal forskning pÄ digital sikkerhetskultur. I tillegg har vi trukket inn offentlige dokumenter som beskriver hvordan nasjonale myndigheter tilnÊrmer seg digital sikkerhetskultur. Norske kraftselskaper er i all hovedsak eid av offentlig sektor, og dermed mÄ de forholde seg til nasjonale fÞringer pÄ omrÄdet og er underlagt norske lover og regler. Forskningsprosjektet vÄrt ble gjennomfÞrt som en deskriptiv flercasestudie, med deltakelse fra to ulike kraftvirksomheter. Datainnsamlingen ble gjennomfÞrt ved bruk av kvalitativ metode inspirert av Grounded Theory og stegvis-deduktiv induktiv metode, og vi gjennomfÞrte totalt 11 intervjuer av fagansatte og ledere i to forskjellige kraftvirksomheter. Videre transkriberte vi alle intervjuene, kodet dem og kategoriserte dem med bruk av analyseprogrammet NVivo. Etter en omfattende prosess med koding satt vi igjen med bredt datamaterialet som dannet grunnlaget for tre hovedkategorier av empiriske funn: «digital sikkerhet», «digital sikkerhetskultur» og «barrierer». Disse kategoriene dannet grunnlaget for vÄr drÞftelse og konklusjon i studien. Forskningsprosjektet har som formÄl Ä bidra til innsikt i hva som kjennetegner den digitale sikkerhetskulturen sett fra ledelse og fagansatte i kraftsektoren. Gjennom vÄr analyse og drÞfting har vi funnet direkte knytninger mellom oppgavens empiriske funn og eksisterende litteratur pÄ omrÄdet. RisikoforstÄelse, ledelsens pÄvirkning og forebyggende arbeid pÄvirker hverandre gjensidig og spiller en viktig rolle for Ä utvikle en god digital sikkerhetskultur. VÄr konklusjon er at for Ä skape en god digital sikkerhetskultur i kraftbransjen kreves det god bevissthet rundt digital sikkerhet hos de ansatte gjennom kunnskap og risikoforstÄelse. Ledelsen spiller en sentral rolle i organiseringen og forankringen av digitalt sikkerhetsarbeid i virksomhetene. De bÞr selv gÄ frem som gode rollemodeller for Ä Þke tilliten til de ansatte. Forebyggende arbeid gjennom myke barrierer mÄ prioriteres for Ä endre holdninger og kunnskap de ansatte har til digital sikkerhet.Our modern society is characterized by a large degree of digitalisation. Digitization is simply about using technology to improve and renew our businesses in society, while ensuring good security. Norwegian businesses experience digital attacks on a daily basis, and there have been several examples of serious data attacks in Norway in recent years. This places new demands on how businesses conduct their security and preparedness work. The digital security work must be in line with the digital risk the businesses are exposed to. National risk assessments point in particular to humans as a favorite target for those who try to penetrate digital systems. As the person will always be the user of the digital solutions, this means that they can also be influenced in different directions to make mistakes or share sensitive information about the business. Our businesses critical to the function of our society, such as the power sector, will always be exposed to greater digital risk since they work with our fundamental services. Based on this, we have chosen to address the human and organizational factors that play a role in the work to create a good digital safety culture in businesses in the power sector. We arrived at the following problem: What characterizes Norwegian power companies work with digital safety culture, seen from the perspective of professional employees and management? We have used literature in the study from traditional theories around man-made and highly reliable organizations and safety culture. Digital security culture is a relatively new term and thus the traditional theories are important to describe the phenomenon. We have also made use of recent national and international research on digital security culture. In addition, we have included public documents which describes how national authorities approach digital security culture. Norwegian power companies are mainly owned by the public sector, and they must comply with national guidelines and are subject to Norwegian laws and regulations.Our research project was carried out as a descriptive multiple case study, with participation from two different power companies. The data collection was carried out using a qualitative method inspired by Grounded theory and a step-by-step deductive inductive method, and we conducted a total of 11 interviews of specialist employees and managers in two different power companies. Furthermore, we transcribed all the interviews, coded them and categorized them using the analysis program NVivo. After an extensive process of coding, we were left with broad data material that formed the basis for three main categories of empirical findings: "digital security", "digital security culture" and "barriers". These categories formed the basis for our discussion and conclusion in the study. The purpose of the research project is to contribute to insight into what characterizes the digital safety culture from the perspective of management and specialist employees in the power sector. Through our analysis and discussion, we have found direct connections between the thesis' empirical findings and existing literature on the subject. Risk understanding, management's influence and preventive work mutually influence each other and play an important role in developing a good digital security culture. Our conclusion is that in order to create a good digital security culture in the power industry, a good awareness of digital security is required among employees through an understanding of risk and knowledge. The management plays a central role in the organization and in the anchoring of digital security work in the businesses. They themselves should act as good role models to increase trust in the employees. Preventive work through soft barriers must be prioritized in order to change employees' attitudes and knowledge of digital security

    The two-fluid model with superfluid entropy

    Full text link
    The two-fluid model of liquid helium is generalized to the case that the superfluid fraction has a small entropy content. We present theoretical arguments in favour of such a small superfluid entropy. In the generalized two-fluid model various sound modes of He  \;II are investigated. In a superleak carrying a persistent current the superfluid entropy leads to a new sound mode which we call sixth sound. The relation between the sixth sound and the superfluid entropy is discussed in detail.Comment: 22 pages, latex, published in Nuovo Cimento 16 D (1994) 37

    Revidert forvaltningsplan for lirype i Åfjord statsallmenning

    Get PDF
    Etter flere Ă„r med datainnsamling og erfaringer med praktisk bruk av den fĂžrste driftsplanen for smĂ„vilt i Åfjord (2014), er det nĂ„ utarbeidet en revidert plan. Dette dokumentet er i stĂžrre grad en ren forvaltningsplan og fokuserer kun pĂ„ lirype. Rapporten er ment Ă„ stĂ„ som faglig bakgrunn for fjellstyrets avgjĂžrelser omkring jaktuttak og andre beslutninger knyttet til lirypeforvaltningen

    Five-loop additive renormalization in the phi^4 theory and amplitude functions of the minimally renormalized specific heat in three dimensions

    Full text link
    We present an analytic five-loop calculation for the additive renormalization constant A(u,epsilon) and the associated renormalization-group function B(u) of the specific heat of the O(n) symmetric phi^4 theory within the minimal subtraction scheme. We show that this calculation does not require new five-loop integrations but can be performed on the basis of the previous five-loop calculation of the four-point vertex function combined with an appropriate identification of symmetry factors of vacuum diagrams. We also determine the amplitude functions of the specific heat in three dimensions for n=1,2,3 above T_c and for n=1 below T_c up to five-loop order. Accurate results are obtained from Borel resummations of B(u) for n=1,2,3 and of the amplitude functions for n=1. Previous conjectures regarding the smallness of the resummed higher-order contributions are confirmed. Borel resummed universal amplitude ratios A^+/A^- and a_c^+/a_c^- are calculated for n=1.Comment: 30 pages REVTeX, 3 PostScript figures, submitted to Phys. Rev.

    Singularity in the boundary resistance between superfluid 4^4He and a solid surface

    Full text link
    We report new measurements in four cells of the thermal boundary resistance RR between copper and 4^4He below but near the superfluid-transition temperature TλT_\lambda. For 10−7≀t≡1−T/Tλ≀10−410^{-7} \leq t \equiv 1 - T/T_\lambda \leq 10^{-4} fits of R=R0txb+B0R = R_0 t^{x_b} + B_0 to the data yielded xb≃0.18x_b \simeq 0.18, whereas a fit to theoretical values based on the renormalization-group theory yielded xb=0.23x_b = 0.23. Alternatively, a good fit of the theory to the data could be obtained if the {\it amplitude} of the prediction was reduced by a factor close to two. The results raise the question whether the boundary conditions used in the theory should be modified.Comment: 4 pages, 4 figures, revte

    Minimal renormalization without \epsilon-expansion: Three-loop amplitude functions of the O(n) symmetric \phi^4 model in three dimensions below T_c

    Full text link
    We present an analytic three-loop calculation for thermodynamic quantities of the O(n) symmetric \phi^4 theory below T_c within the minimal subtraction scheme at fixed dimension d=3. Goldstone singularities arising at an intermediate stage in the calculation of O(n) symmetric quantities cancel among themselves leaving a finite result in the limit of zero external field. From the free energy we calculate the three-loop terms of the amplitude functions f_phi, F+ and F- of the order parameter and the specific heat above and below T_c, respectively, without using the \epsilon=4-d expansion. A Borel resummation for the case n=2 yields resummed amplitude functions f_phi and F- that are slightly larger than the one-loop results. Accurate knowledge of these functions is needed for testing the renormalization-group prediction of critical-point universality along the \lambda-line of superfluid He(4). Combining the three-loop result for F- with a recent five-loop calculation of the additive renormalization constant of the specific heat yields excellent agreement between the calculated and measured universal amplitude ratio A+/A- of the specific heat of He(4). In addition we use our result for f_phi to calculate the universal combination R_C of the amplitudes of the order parameter, the susceptibility and the specific heat for n=2 and n=3. Our Borel-resummed three-loop result for R_C is significantly more accurate than the previous result obtained from the \epsilon-expansion up to O(\epsilon^2).Comment: 29 pages LaTeX including 3 PostScript figures, to appear in Nucl. Phys. B [FS] (1998
    • 

    corecore