58,472 research outputs found

    Electronic assembly rack panels snap on and off

    Get PDF
    Snap fasteners on each side of an electronic assembly rack blank panel give quick access to the interior. Guide pins extending from the inside face easily slip into standard screw holes on the frame and provide additional support

    The Texas Cavalry\u27s Race to Reinforce Arkansas Post, January 1863

    Get PDF

    Estimating the Factors That Explain Economists\u27 Time Preferences

    Get PDF
    Theory suggests that individuals’ characteristics, such as age and gender, may affect their rates of time preference. This paper empirically explores this “characteristic-time preference relationship.” Our sample is drawn from survey responses of economists belonging to the Association of Environmental and Resource Economics. We find that ideology, age, field of study, and the size of the institution where economists are employed are significant factors explaining economists’ time preferences

    Countering crime in hostile environments: securing vulnerable humanitarian aid workers in Paua New Guinea

    Get PDF
    Crime is a core issue for companies and more recently for NGOs working in Papua New Guinea (PNG). The nation is facing major challenges as crime levels rise exponentially across the country. Erstwhile un-affected humanitarian operations were often seen as immune from criminality, but now have become just as likely to be targeted as any other organisation. Consequently, there is a need to adopt security measures, but maybe not necessarily as draconian as those used hitherto by major companies. People-centered, locally-owned is a concept whereby the local population is encouraged to protect the delivery of health services and aid from humanitarian providers. The inclusive approach challenges previous concepts of what is required to protect workers in intimidating and dangerous areas. A mind-set change is required. The proposed multi-layered approach stems from defence-in-depth strategies. Although such a strategy is still primarily based upon the security risk assessment process, at the core of all operational security required in challenging environments, it also requires a proactive approach combined with engagement with the local population based around the Aid-security-triangle. The methodology used interpretative analysis of relevant literature underpinned by personal interviews with selected stake holders in the PNG during 2014

    Explosively activated egress area

    Get PDF
    A lightweight, add on structure which employs linear shaped pyrotechnic charges to smoothly cut an airframe along an egress area periphery is provided. It compromises reaction surfaces attached to the exterior surface of the airframe's skin and is designed to restrict the skin deflection. That portion of the airframe within the egress area periphery is jettisoned. Retention surfaces and sealing walls are attached to the interior surface of the airframe's skin and are designed to shield the interior of the aircraft during detonation of the pyrotechnic charges

    Airplane take-off performance indicator Patent

    Get PDF
    Aircraft instrument for indicating malfunctions during takeof

    Staggered Heavy Baryon Chiral Perturbation Theory

    Full text link
    Although taste violations significantly affect the results of staggered calculations of pseudoscalar and heavy-light mesonic quantities, those entering staggered calculations of baryonic quantities have not been quantified. Here I develop staggered chiral perturbation theory in the light-quark baryon sector by mapping the Symanzik action into heavy baryon chiral perturbation theory. For 2+1 dynamical quark flavors, the masses of flavor-symmetric nucleons are calculated to third order in partially quenched and fully dynamical staggered chiral perturbation theory. To this order the expansion includes the leading chiral logarithms, which come from loops with virtual decuplet-like states, as well as terms the order of the cubed pion mass, which come from loops with virtual octet-like states. Taste violations enter through the meson propagators in loops and tree-level terms the order of the squared lattice spacing. The pattern of taste symmetry breaking and the resulting degeneracies and mixings are discussed in detail. The resulting chiral forms are appropriate to lattice results obtained with operators already in use and could be used to study the restoration of taste symmetry in the continuum limit. I assume that the fourth root of the fermion determinant can be incorporated in staggered chiral perturbation theory using the replica method.Comment: 54 pages; v2: corrected discussion in Sec. III.C, conclusions unchange
    • …
    corecore