1,253 research outputs found

    Mount makes liquid nitrogen-cooled gamma ray detector portable

    Get PDF
    Liquid nitrogen-cooled gamma ray detector system is made portable by attaching the detector to a fixture which provides a good thermal conductive path between the detector and the liquid nitrogen in a dewar flask and a low heat leak path between the detector and the external environment

    WETAIR: A computer code for calculating thermodynamic and transport properties of air-water mixtures

    Get PDF
    A computer program subroutine, WETAIR, was developed to calculate the thermodynamic and transport properties of air water mixtures. It determines the thermodynamic state from assigned values of temperature and density, pressure and density, temperature and pressure, pressure and entropy, or pressure and enthalpy. The WETAIR calculates the properties of dry air and water (steam) by interpolating to obtain values from property tables. Then it uses simple mixing laws to calculate the properties of air water mixtures. Properties of mixtures with water contents below 40 percent (by mass) can be calculated at temperatures from 273.2 to 1497 K and pressures to 450 MN/sq m. Dry air properties can be calculated at temperatures as low as 150 K. Water properties can be calculated at temperatures to 1747 K and pressures to 100 MN/sq m. The WETAIR is available in both SFTRAN and FORTRAN

    Operational amplifiers for use in nuclear spectroscopy

    Get PDF
    Operational amplifiers for nuclear spectroscop

    Radiofrequency system analysis of the Lewis cyclotron modification

    Get PDF
    Computer code for analyzing radio frequency system of modified cyclotro

    Misconstruals Miss the Mark: A Reply to El Guindi and Read

    Get PDF

    User's guide to SFTRAN/1100

    Get PDF
    Extensions and improvements were made to SFTRAN, a structured programming language. This language was implemented as a precompiler that translates from SFTRAN to FORTRAN. It was available to batch and conversational users of the UNIVAC 1100 computer system. The SFTRAN language and its use are described. In addition, conversational time-sharing system command subroutines were implemented that eliminated the complications of dealing with extra files and processing steps that the use of a precompiler would otherwise require. These command subroutines are reported, and their use is illustrated by examples

    User's guide for SFTRAN/360

    Get PDF
    Extension and improvements made to SFTRAN, a structured-programming language are discussed. This improved language is implemented as a precompiler that translates from SFTRAN to FORTRAN. The SFTRAN language and its use are described. Time-Sharing System (TSS) command procedures were implemented that eliminate the complications of dealing with extra files and processing steps which the use of a precompiler would otherwise require. These command procedures are described and their use is illustrated by examples

    Method of forming thin window drifted silicon charged particle detector Patent

    Get PDF
    Method of forming thin window drifted silicon charged particle detecto

    Assets at risk:menstrual cycle variation in the envisioned formidability of a potential sexual assailant reveals a component of threat assessment

    Get PDF
    Abstract Situations of potential agonistic conflict demand rapid and effective deci-sion-making. The process of threat assessment includes assessments of relative fighting capacity, assessments of the likelihood of attack, and assessments of the extent to which one′s assets are at risk. The dimensions of physical size and strength appear to serve as key parameters in a cognitive representation summarizing multiple constituents of threat assessment. Here, we examine the thesis that this same representation summa-rizes asset risk. The fitness costs of sexual assault are in part a function of conception risk, as pregnancy due to assault compromises female choice and imperils existing and subsequent male investment. Prior research indicates that women′s attitudes and behaviors vary systematically across the menstrual cycle in a manner that would have reduced the likelihood of sexual assault during periods of greatest fertility in ancestral women. If the envisioned size and strength of a potential antagonist is used to represent asset risk, and if the threat that sexual assault poses to a woman′s reproductive assets is in part a product of her fertility, then the conceptualized size and strength of a potential sexual assailant should be a function of conception risk. We find support for thi
    • …
    corecore