39,394 research outputs found

    Readers, readers, writers and engineers

    Get PDF
    Extended review of books <i>Knowledge, Power and Learning</i> and <i>Learning, Space and Identity</i>, both ed. Carrie Paechter et al., Paul Chapman Publishing (2001). ISBNs 0-769-6937-3 and 0-7619-6939-X

    On residual finiteness of monoids, their SchĆ¼tzenberger groups and associated actions

    Get PDF
    RG was supported by an EPSRC Postdoctoral Fellowship EP/E043194/1 held at the University of St Andrews, Scotland.In this paper we discuss connections between the following properties: (RFM) residual finiteness of a monoid M ; (RFSG) residual finiteness of SchĆ¼tzenberger groups of M ; and (RFRL) residual finiteness of the natural actions of M on its Green's R- and L-classes. The general question is whether (RFM) implies (RFSG) and/or (RFRL), and vice versa. We consider these questions in all the possible combinations of the following situations: M is an arbitrary monoid; M is an arbitrary regular monoid; every J-class of M has finitely many R- and L-classes; M has finitely many left and right ideals. In each case we obtain complete answers, which are summarised in a table.PostprintPeer reviewe

    Hermetically sealable package for hybrid solid-state electronic devices and the like

    Get PDF
    A light-weight, inexpensively fabricated, hermetically sealable, repairable package for small electronic or electromechanical units, having multiple connections, is described. A molded ring frame of polyamide-imide plastic (Torlon) is attached along one edge to a base plate formed of a highly heat conducting material, such as aluminum or copper. Bores are placed through a base plate within the area of the edge surface of ring frame which result in an attachment of the ring frame to the base plate during molding. Electrical leads are molded into the ring frame. The leads are L-shaped gold-plated copper wires imbedded within widened portions of the side wall of the ring frame. Within the plastic ring frame wall the leads are bent (typically, though not necessarily at 90 deg) so that they project into the interior volume of the ring frame for connection to the solid state devices

    Managing Research Data: Gravitational Waves

    Get PDF
    The project which led to this report was funded by JISC in 2010ā€“2011 as part of its ā€˜Managing Research Dataā€™ programme, to examine the way in which Big Science data is managed, and produce any recommendations which may be appropriate. Big science data is different: it comes in large volumes, and it is shared and exploited in ways which may differ from other disciplines. This project has explored these differences using as a case-study Gravitational Wave data generated by the LSC, and has produced recommendations intended to be useful variously to JISC, the funding council (STFC) and the LSC community. In Sect. 1 we deļ¬ne what we mean by ā€˜big scienceā€™, describe the overall data culture there, laying stress on how it necessarily or contingently differs from other disciplines. In Sect. 2 we discuss the beneļ¬ts of a formal data-preservation strategy, and the cases for open data and for well-preserved data that follow from that. This leads to our recommendations that, in essence, funders should adopt rather light-touch prescriptions regarding data preservation planning: normal data management practice, in the areas under study, corresponds to notably good practice in most other areas, so that the only change we suggest is to make this planning more formal, which makes it more easily auditable, and more amenable to constructive criticism. In Sect. 3 we brieļ¬‚y discuss the LIGO data management plan, and pull together whatever information is available on the estimation of digital preservation costs. The report is informed, throughout, by the OAIS reference model for an open archive. Some of the reportā€™s ļ¬ndings and conclusions were summarised in [1]. See the document history on page 37

    Fire extinguishing apparatus having a slidable mass for a penetrator nozzle

    Get PDF
    A fire extinguishing apparatus for delivering an extinguishing agent through a tarrier surrounding a structure into its interior includes an elongated tubular nozzle body which has a pointed penetrating head carried on one end of the tubular body. A source of extinguishing agent coupled to the opposite end of the tubular body is fed through and passes through passages adjacent the head for delivering the extinguishing agent to the interior of the structure. A slidable mass is carried on the tubular body on a remote end of the tubular body from the penetrating head. By manipulating the slidable mass and bringing such in contact with an abutment the force imparted to the tubular body causes the head to penetrate the structure

    Prevention of arthritis by interleukin 10-producing B cells

    Get PDF
    In this study we have shown that activation of arthritogenic splenocytes with antigen and agonistic anti-CD40 gives raise to a B cell population that produce high levels of interleukin (IL)-10 and low levels of interferon (IFN)-{gamma}. Transfer of these B cells into DBA/1-TcR-Ɵ-Tg mice, immunized with bovine collagen (CII) emulsified in complete Freund's adjuvant inhibited T helper type 1 differentiation, prevented arthritis development, and was also effective in ameliorating established disease. IL-10 is essential for the regulatory function of this subset of B cells, as the B cells population isolated from IL-10 knockout mice failed to mediate this protective function. Furthermore, B cells isolated from arthritogenic splenocytes treated in vitro with antiā€“IL-10/antiā€“IL-10R were unable to protect recipient mice from developing arthritis. Our results suggest a new role of a subset of B cells in controlling T cell differentiation and autoimmune disorders

    Advanced grid authorisation using semantic technologies - AGAST

    Get PDF
    Collaborative research requires flexible and fine-grained access control, beyond the common all-or-nothing access based purely on authentication. Existing systems can be hard to use, and do not lend themselves naturally to federation. We present an access-control architecture which builds on RDFs natural strength as an integration framework, which uses RDF scavenged from X.509 certificates, and policies expressed as ontologies and SPARQL queries, to provide flexible and distributed access control. We describe initial implementations

    Semantic security: specification and enforcement of semantic policies for security-driven collaborations

    Get PDF
    Collaborative research can often have demands on finer-grained security that go beyond the authentication-only paradigm as typified by many e-Infrastructure/Grid based solutions. Supporting finer-grained access control is often essential for domains where the specification and subsequent enforcement of authorization policies is needed. The clinical domain is one area in particular where this is so. However it is the case that existing security authorization solutions are fragile, inflexible and difficult to establish and maintain. As a result they often do not meet the needs of real world collaborations where robustness and flexibility of policy specification and enforcement, and ease of maintenance are essential. In this paper we present results of the JISC funded Advanced Grid Authorisation through Semantic Technologies (AGAST) project (www.nesc.ac.uk/hub/projects/agast) and show how semantic-based approaches to security policy specification and enforcement can address many of the limitations with existing security solutions. These are demonstrated into the clinical trials domain through the MRC funded Virtual Organisations for Trials and Epidemiological Studies (VOTES) project (www.nesc.ac.uk/hub/projects/votes) and the epidemiological domain through the JISC funded SeeGEO project (www.nesc.ac.uk/hub/projects/seegeo)
    • ā€¦
    corecore