4,137 research outputs found

    Energy policy and regulatory challenges in natural gas infrastructure and supply in the energy transition in Sweden

    Get PDF
    Sweden is undergoing a major energy transition in which the present regulatory, competition and energy decisions will determine future involvement in the “oil and gas game” after decades of successful implementation of non-fossil fuel dependence policies. Contrary to major energy policies implemented since the oil crisis of the 70’s, higher natural gas investment in infrastructure – in particular regarding offshore pipelines – is not an outcome of a consented agreement between the government and private firms. The lack of clear governmental definition towards the time to phase out nuclear terminals, and how this source of energy would be replaced, is leading the country towards an energy bottleneck that could condition future energy supply, thus governance. Under these conditions, crucial decisions shall be taken in the near future regarding granting permissions to pipelines that connect to the Russian natural gas fields following an EU trend, to the Norwegian natural gas reserves on the trail of a Nordic energy path-dependence, or to both, sharing potential benefits and risks.Energy policy; Future energy supply; Natural gas infrastructure; Energy transition; Sweden; Russian natural gas fields; Norwegian natural gas reserves; Swedish energy transition.

    Android Malware Characterization using Metadata and Machine Learning Techniques

    Get PDF
    Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to identify patterns in malware applications. Our experiments show that: (1) the permissions used by an application offer only moderate performance results; (2) other features publicly available at Android Markets are more relevant in detecting malware, such as the application developer and certificate issuer, and (3) compact and efficient classifiers can be constructed for the early detection of malware applications prior to code inspection or sandboxing.Comment: 4 figures, 2 tables and 8 page

    Minimum depth of double cross product extensions

    Get PDF
    In this paper we explore minimum odd and minimum even depth sub- algebra pairs in the context of double cross products of finite dimensional Hopf algebras. We start by defining factorization algebras and outline how subring depth in this context relates with the module depth of the regular left module representation of the given subalgebra. Next we study minimum odd depth for double cross product Hopf subalgebras and determine their value in terms of their related module depth, we conclude that minimum odd depth of Drinfel’d double Hopf subalgebras is 3. Finaly we produce a necessary and sufficient condition for depth 2 in double cross product Hopf subalgebra extensions. This sufficient condition is then used to prove results regarding minimum depth 2 in Drinfel’d double Hopf subalgebras, particu- larly in the case of finite Group Hopf algebras. Lastly we provide formulas for the centralizer of a normal Hopf subalgebra in a double cross product scenario.UCR::Vicerrectoría de Investigación::Unidades de Investigación::Ciencias Básicas::Centro de Investigaciones en Matemáticas Puras y Aplicadas (CIMPA)UCR::Vicerrectoría de Docencia::Ciencias Básicas::Facultad de Ciencias::Escuela de Matemátic

    Analysis of IP delay variation in edge OBS nodes

    Full text link
    This is an electronic version of the paper presented at the European Conference on Networks and Optical Communications, held in Stockholm on 2007This paper evaluates the packet delay from its arrival at the burstifier until the burst is finally released. Such evaluation comprises the delay due to burstification together with the delay which is due to waiting in the transmission queue. More specifically, we focus on the delay jitter, which has an impact on the performance of multimedia applications.The authors would like to acknowledge the support of the E-Photon/One+ Network of Excellence (FP6-IST-027497) to this work

    El método de la caxa entera de Juan Bautista de Herrera (1628): ¿una visión peculiar de la partida doble?

    Get PDF
    Juan Bautista de Herrera fue contador del Cabildo Catedral de Sevilla a principios del siglo XVII. En uno de esos libros realiza una introducción en la que explica la utilidad del método de la partida doble, así como los argumentos de cómo debía implantarse el nuevo método. El estudio de dichos argumentos se ha realizado tomando como referencia el primer tratado de contabilidad español escrito por Bartolomé Salvador de Solórzano (1590) dado que este recoge las características y esencia de la partida doble castellana en ese período. A continuación comienza el registro de hechos contables sin recurrir a un libro diario. Juan Bautista de Herrera was an accountant of the Cathedral Council of Sevilla at the beginning of 17th century. In one of these books Herrera made an introduction explaining the usefulness of the double-entry bookkeeping method and argued how to implement it. The aim of this paper is to analyse his arguments using Bartolome Salvador de Solorzano´s approach. Solorzano wrote the first Spanish accounting treatise in 1590, where he compiled the characteristics and essence of Spanish double-entry bookkeeping in this period. Herrera recorded in this book without using a daybook

    Effect of an electric field within microscopy focused ion beam (FIB) between manipulator sharp and the ion trap of the electron detector

    Get PDF
    "The manipulation of samples with micro manipulators sharps in the normal axis to the observation plane is practically blind in microscopy focused ion beam (FIB) mono beam. The application of a negative potential to the manipulator sharp has been considered, which causes differences of electrical potential between the detector and the sample holder, generating an electric field between the sharp and the sample. This makes the electrons, aside the sample, undergo a greater deflection, reflecting in poorer contrast image. This deflection depends on a great extension of the sample holder height between the micromanipulator sharp, voltage deflector, q/m electron factor and electron acceleration.
    corecore