1,272 research outputs found

    High-Sensitivity Magnetic Sensors Based on GMI Microwire-SAW IDT Design

    Get PDF
    This work presents a design approach for a highly sensitive, miniaturized magnetic sensor. The design makes use of GMI microwires and a multi-electrode SAW IDT. The use of SAW IDTs allows for the magnetic effect of the GMI microwire to be measured through the transduction process. This approach permits simultaneous measurement at different frequencies of operation, enabling highly sensitive measurement over a wide range of magnetic fields. This technique may find application in magnetic sensing for non-invasive battery SOC measurement

    Order-alpha_s^2 corrections to one-particle inclusive processes in DIS

    Full text link
    We analyze the order-αs2\alpha_s^2 QCD corrections to semi-inclusive deep inelastic scattering and present results for processes initiated by a gluon. We focus in the most singular pieces of these corrections in order to obtain the hitherto unknown NLO evolution kernels relevant for the non homogeneous QCD scale dependence of these cross sections, and to check explicitly factorization at this order. In so doing we discuss the prescription of overlapping singularities in more than one variable.Comment: 16 pages, 9 eps figures. Uses revtex4 and feynm

    Quantitative penetration testing with item response theory (extended version)

    Get PDF
    Existing penetration testing approaches assess the vulnerability of a system by determining whether certain attack paths are possible in practice. Therefore, penetration testing has thus far been used as a qualitative research method. To enable quantitative approaches to security risk management, including decision support based on the cost-effectiveness of countermeasures, one needs quantitative measures of the feasibility of an attack. Also, when physical or social attack steps are involved, the binary view on whether a vulnerability is present or not is insucient, and one needs some viability metric. When penetration tests are performed anyway, it is very easy for the testers to keep track of, for example, the time they spend on each attack step. Therefore, this paper proposes the concept of quantitative penetration testing to determine the diculty rather than the possibility of attacks. We do this by step-wise updates of expected time and probability of success for all steps in an attack scenario. Also, the skill of the testers can be included to improve the accuracy of the metrics, based on the framework of Item Response Theory (Elo ratings). We show the feasibility of the approach by means of simulations, and discuss application possibilities

    NLO distributions for Higgs production at the LHC

    Full text link
    We report on results for the NLO corrected differential distributions dσ/dpTd\sigma/dp_T and dσ/dyd\sigma/dy for the process p+pH+Xp + p\to H + 'X', where pTp_T and yy are the transverse momentum and rapidity of the Higgs-boson HH respectively and XX denotes the inclusive hadronic state. All QCD partonic subprocesses have been included. The computation is carried out in the limit that the top-quark mass mtm_t \to \infty. Our calculations reveal that the dominant subprocess is given by g+gH+Xg + g \to H + 'X' but the reaction g+q(qˉ)H+Xg + q(\bar q) \to H + 'X' is not negligible. Also the KK-factor representing the ratio between the next-to-leading order and leading order differential distributions varies from 1.4 to 1.7 depending on the kinematic region and choice of parton densities.Comment: 4 pages, Latex, 4 postscript figures, Contribution to Radcor0

    Helicity Parton Distributions from Spin Asymmetries in W-Boson Production at RHIC

    Full text link
    We present a next-to-leading order QCD calculation of the cross section and longitudinal spin asymmetry in single-inclusive charged-lepton production, pp -> l X, at RHIC, where the lepton is produced in the decay of an electroweak gauge boson. Our calculation is presented in terms of a multi-purpose Monte-Carlo integration program that may be readily used to include experimental spin asymmetry data in a global analysis of helicity parton densities. We perform a toy global analysis, studying the impact of anticipated RHIC data on our knowledge about the polarized anti-quark distributions.Comment: 22 pages, 13 figures included. Typos in Figs 2, 6, 8 and scales correcte

    Nach der Unendlichkeit. Metaphysik, Bildung und eine Kritik der Einbildungskraft

    Get PDF
    Es war Platon, der als erster Philosoph den Menschen als ein Wesen im Übergang zum Göttlichen beschrieben und damit ein ausgearbeitetes philosophisches Bildungsprogramm verbunden hat. In einer "Angleichung an das Göttliche nach dem Vermögen bzw. dem Möglichen" (homoíōsis theō kata to dynatón) solle der Mensch im und durch den Geist seine Endlichkeit hinter sich lassen, um erst noch zu werden, was er als Moment des unendlichen Geistes bereits sei. Entsprechend prägt die Philosophie seit Platon das Paradox eines transhumanen Humanismus und dessen Dilemma: Der traditionelle Mythos soll durch einen philosophischen Logos aufgehoben werden, der entweder zur buchstäblichen Tautologie gerät oder aber der "Eigenlogik des Mythos" letztlich nicht entraten kann. Namentlich dieses Ineinander-Umschlagen von Mythos und Logos macht dabei auf ein fundamentales Problem aufmerksam, das sich insbesondere in einer deutschsprachigen "Metaphysik(-Kritik) der Bildung" ausgehend von Meister Eckhart über den Deutschen Idealismus bis hin zu Martin Heidegger immer wieder von Neuem stellt. Auf der Scheide zwischen Endlichkeit und Unendlichkeit stehend, spaltet ein Antagonismus von Einbildungskraft und Vernunft das philosophische Denken. Vermag die Einbildungskraft schließlich zur Vernunft zu kommen oder ist eine reine Vernunft vielleicht selbst nur eine Einbildung? Der geschichtliche Werdegang legt nahe, dass Platons Träume von einer philosophischen Selbstvergöttlichung auf unerwartete Weise Wirklichkeit geworden sind. Das Bildungsprojekt eines transhumanen Humanismus mündet heute in Fragen des künstlichen Lebens und der künstlichen Intelligenz

    Prediction of performance and cutter wear in rock TBM: Application to Koralm tunnel project

    Get PDF
    Excavation by Tunnel Boring Machines is the tunnelling method most frequently used nowadays in long infrastructural projects, in a wide range of geological conditions. In the last 40 years, many prediction models were developed to estimate TBM performance and cutter wear, using as input geological parameters. The research gives an overview of the existing penetration models for hard rock TBMs, identifies the most frequently used input parameters and summarizes the characteristics of the datasets on which the models are based on. Theoretical background is tested through the example of Koralm tunnel project, a 32.9-km-long base tunnel in Austria, in a 1000-m-long portion of the South tube in the construction lot KAT 2. The outcomes shows that the estimation of the penetration is reasonably accurate when applying models that are based on a database consistent with the project data, especially in terms of geology and typology of machine used in the excavation. The article proposes a design method for a system of TBM data analysis and prediction at the construction stage, based on a back-analysis process about machine data in different geological conditions. The methodology can be applied in any other project and the system is particularly useful in long tunnels, in which a continuous improvement of the ability of prediction can have an effective impact on time and costs
    corecore