708 research outputs found

    Scholars Forum: A New Model For Scholarly Communication

    Get PDF
    Scholarly journals have flourished for over 300 years because they successfully address a broad range of authors' needs: to communicate findings to colleagues, to establish precedence of their work, to gain validation through peer review, to establish their reputation, to know the final version of their work is secure, and to know their work will be accessible by future scholars. Eventually, the development of comprehensive paper and then electronic indexes allowed past work to be readily identified and cited. Just as postal service made it possible to share scholarly work regularly and among a broad readership, the Internet now provides a distribution channel with the power to reduce publication time and to expand traditional print formats by supporting multi-media options and threaded discourse. Despite widespread acceptance of the web by the academic and research community, the incorporation of advanced network technology into a new paradigm for scholarly communication by the publishers of print journals has not materialized. Nor have journal publishers used the lower cost of distribution on the web to make online versions of journals available at lower prices than print versions. It is becoming increasingly clear to the scholarly community that we must envision and develop for ourselves a new, affordable model for disseminating and preserving results, that synthesizes digital technology and the ongoing needs of scholars. In March 1997, with support from the Engineering Information Foundation, Caltech sponsored a Conference on Scholarly Communication to open a dialogue around key issues and to consider the feasibility of alternative undertakings. A general consensus emerged recognizing that the certification of scholarly articles through peer review could be "decoupled" from the rest of the publishing process, and that the peer review process is already supported by the universities whose faculty serve as editors, members of editorial boards, and referees. In the meantime, pressure to enact regressive copyright legislation has added another important element. The ease with which electronic files may be copied and forwarded has encouraged publishers and other owners of copyrighted material to seek means for denying access to anything they own in digital form to all but active subscribers or licensees. Furthermore, should publishers retain the only version of a publication in a digital form, there is a significant risk that this material may eventually be lost through culling little-used or unprofitable back-files, through not investing in conversion expense as technology evolves, through changes in ownership, or through catastrophic physical events. Such a scenario presents an intolerable threat to the future of scholarship

    Theory of the electronic states of semiconductor heterostructures

    Get PDF
    This thesis is concerned with theoretical calculations of the properties of electronic bound states in semiconductor heterostructures. The complex band structure empirical pseudopotential method (EPM) is used as the foundation of the work. Spin orbit coupling and strain effects (due to lattice mismatch) are included in familiar ways, as is the transfer matrix method, allowing the study of arbitrarily configured heterostructures. These techniques are used to investigate the unusually deep InAs/AlSb conduction band well. The strong possibility of intraband transitions at electro magnetic wavelengths around 1.55µm is predicted, with corresponding enhanced momentum matrix elements and joint density of states over interband transitions. An InAs/GaSb/AlSb asymmetric well is investigated, paying particular attention to the bound states in the vicinity of the InAs/GaSb band overlap. The electron-like states are found to cross with heavy hole and anti-cross with light hole-like states, as a function of heterostructure dimension or applied electrostatic field. This is analogous to the hybridisation of states in the in-plane band structure, except that for zero in-plane wave vector there can be no appreciable hybridisation of electron and heavy hole states. A technique is described that has been developed to extract envelope functions from heterostructure wavefunctions calculated using the realistic complex band structure EPM approach. These envelope functions conform to Burt’s theory (M. G. Burt, J. Phys.: Condens. Matt. 4, 6651 (1992)) in that they are uniquely defined, continuous and smooth over all space. Comparisons with traditional effective mass envelope functions are made. The extracted envelope functions are used to demonstrate conclusively Burt's predictions (M. G. Burt, Superlatt. Mi- crostruct. 17, 335 (1995)) concerning the inadequacy of certain approximations for the calculation of interband dipole matrix elements and charge oscillation. Finally, the issue of k • p operator ordering is convincingly settled, in favour of 'ordered' over 'symmetrised' Hamiltonians, by comparison to EPM calculations, and using EPM derived k • p parameters

    The contemporary literary short story

    Full text link
    Thesis (M.A.)--Boston University, 1939. This item was digitized by the Internet Archive

    The Information Security Ownership Question in ISO/IEC 27001 – an Implementation

    Get PDF
    The information security management standard ISO/IEC 27001 is built on the notion that information security is driven by risk assessment and risk treatment. Fundamental to the success of risk assessment and treatment is the decision making process that takes risk assessment output and assigns decisions to this output in terms of risk treatment actions. It is argued that the effectiveness of the management system lies in its ability to make effective, easytoimplement and measurable decisions. One of the key issues in decision making is ownership. In this paper two aspects of information security ownership are considered: ownership of the asset (as per the ISO/IEC 27001 definition) and ownership of the risk treatment actions. This paper discuses how traditional information security risk assessment methodologies confuse the ownership issue and raises the question as to whether this is simply because they are rebadged computer security risk assessment methodologies or because the significance and the complexity of ownership is underestimated in many forms of information security risk assessment. This paper also presents some observations from practical attempts at implementing an organisationwide information security risk assessment methodology. The observations were made as part of ISO/IEC 27001 certification assessment visits

    Particle Swarm Optimisation for learning Bayesian Networks

    Get PDF
    This paper discusses the potential of Particle Swarm Optimisation (PSO) for inducing Bayesian Networks (BNs). Specifically, we detail two methods which adopt the search and score approach to BN learning. The two algorithms are similar in that they both use PSO as the search algorithm, and the K2 metric to score the resulting network. The difference lies in the way networks are constructed. The CONstruct And Repair (CONAR) algorithm generates structures, validates, and repairs if required, and the REstricted STructure (REST) algorithm, only permits valid structures to be developed. Initial experiments indicate that these approaches produce promising results when compared to other BN learning strategies

    Two-Dimensional Topology of the 2dF Galaxy Redshift Survey

    Full text link
    We study the topology of the publicly available data released by the 2dFGRS. The 2dFGRS data contains over 100,000 galaxy redshifts with a magnitude limit of b_J=19.45 and is the largest such survey to date. The data lie over a wide range of right ascension (75 degree strips) but only within a narrow range of declination (10 degree and 15 degree strips). This allows measurements of the two-dimensional genus to be made. The NGP displays a slight meatball shift topology, whereas the SGP displays a bubble like topology. The current SGP data also have a slightly higher genus amplitude. In both cases, a slight excess of overdense regions are found over underdense regions. We assess the significance of these features using mock catalogs drawn from the Virgo Consortium's Hubble Volume LCDM z=0 simulation. We find that differences between the NGP and SGP genus curves are only significant at the 1 sigma level. The average genus curve of the 2dFGRS agrees well with that extracted from the LCDM mock catalogs. We compare the amplitude of the 2dFGRS genus curve to the amplitude of a Gaussian random field with the same power spectrum as the 2dFGRS and find, contradictory to results for the 3D genus of other samples, that the amplitude of the GRF genus curve is slightly lower than that of the 2dFGRS. This could be due to a a feature in the current data set or the 2D genus may not be as sensitive as the 3D genus to non-linear clustering due to the averaging over the thickness of the slice in 2D. (Abridged)Comment: Submitted to ApJ A version with Figure 1 in higher resolution can be obtained from http://www.physics.drexel.edu/~hoyle

    Using Integral Projection Models to Explore Management Strategies for Silver Carp (Hypophthalmichthys molitrix)

    Get PDF
    Silver carp (Hypophthalmichthys molitrix) are planktivorous fish that were originally introduced to the United States for use in fish production ponds and have since escaped these enclosures and are invading the Mississippi River Basin. The silver carp invasion of the Illinois River has a myriad of negative effects on native ecosystems. In this paper, we introduce key dependencies that are likely important in the population dynamics of silver carp: length-dependent egg production and density-dependent growth. Using movement data between two adjacent pools of the Illinois River, we conduct numerical simulations to explore the theoretical effect of harvesting and the use of movement barriers. Results of our model provide insights on how the number of silver carp may respond to movement barriers placed between adjacent harvesting sites

    An assessment of the efficacy of deep drains constructed in the wheatbelt of Western Australia Part 1 A discussion on drainage implmentation in the wheatbelt : a case study review, summary, conclusions and recommendations

    Get PDF
    Australia has undertaken a strategic review of current and historical deep drainage projects. A \u27rapid appraisal\u27 methodology was utilised, based principally on existing hydrological investigations and interpretation and anecdotal evidence provided by landholders to clarify the role of drainage in managing water in dry land rural landscapes. The objectives of this discussion paper are to: 1. Review the current status of groundwater drainage practice 2. Provide an assessment of deep drains in the landscape and 3. Propose recommendations on the development of drainage policy to enable the application of best management practice in groundwater drainage.https://researchlibrary.agric.wa.gov.au/bulletins/1012/thumbnail.jp

    The self-narrated walk. A user-led method to research people’s experiences in urban landscapes

    Get PDF
    Walking interviews and mobile ways of engaging participants in research have recently begun to emerge as methods to collect data that tries to understand people’s relationships with places. This work explores the self-narrated walk as a method to research people’s encounters and interactions with the landscape and their associated meanings and values. We address the method by explaining and examining how it has been designed, implemented and experienced by participants who engaged in a set of environmental immersive encounters in urban green landscapes. The findings show that this approach offers the user perspective, and facilitates in situ, mobile and in-the-moment, detailed, complex personal descriptions, and meanings into the mechanisms behind physical and emotional person–place interactions. Additionally, they suggest that the method is excellent to empower participants, to stimulate engagement with places and to capture simultaneously different data-sets. Finally, we discuss potential implications for landscape research and for the design process
    • …
    corecore