1,220 research outputs found

    Aunt Jemima\u27s Birthday

    Get PDF
    Portrait of Rube Bloom; Words of the title are italicized and surrounded by a border with a small depiction of a person playing the piano on the left sidehttps://scholarsjunction.msstate.edu/cht-sheet-music/13701/thumbnail.jp

    Excitoxicity in Retinal Ischemia and Treatment Using Non-Competitive Receptor Antagonists

    Get PDF
    The following is an excerpt from the article: Ischemia is defined as an inadequacy of blood flow to tissue. Ischemia can deprive tissue of oxygen and metabolic substrates and it can also prevent the removal of waste products. If the ischemia is maintained over enough time the tissue will lose its homeostasis and eventually die causing an infarct. Retinal ischemia occurs when the blood supply to the retina does not meet the metabolic needs that are required to sustain the retina. This can lead to retinal damage and severe vision loss. Ischemia is caused by occluded blood vessels

    Nearly Supersymmetric Dark Atoms

    Full text link
    Theories of dark matter that support bound states are an intriguing possibility for the identity of the missing mass of the Universe. This article proposes a class of models of supersymmetric composite dark matter where the interactions with the Standard Model communicate supersymmetry breaking to the dark sector. In these models supersymmetry breaking can be treated as a perturbation on the spectrum of bound states. Using a general formalism, the spectrum with leading supersymmetry effects is computed without specifying the details of the binding dynamics. The interactions of the composite states with the Standard Model are computed and several benchmark models are described. General features of non-relativistic supersymmetric bound states are emphasized.Comment: 39 pages, 2 figure

    Political Polupragmones: Busybody Athenians, Meddlesome Citizenship, and Epistemic Democracy in Classical Athens

    Get PDF
    The figure of the πολυπράγμων, the overactive, over-engaged, or meddlesome democratic citizen, is a literary trope that emerges in Classical Athenian literature in the 5th and 4th centuries B.C. This project seeks to use the πολυπράγμων as an entry point into understanding Athenian attitudes toward citizenship and socially acceptable political behaviors in Athens’ democratic era. I explore the history and usage of the term πολυπράγμων, and the associated characteristic of πολυπραγμοσύνη (meddlesomeness), and its synonyms and antecedents. I demonstrate that to be labeled πολυπράγμων is a term of social restraint—one is named a πολυπράγμων if they do not “mind their own business.” In 5th century Athens such an admonition is primarily political. It refers to and demonstrates the existence of a contested definition of what is and what is not acceptable political behavior on behalf of the non-elite citizens of Athens. Through a reading of Plato’s dialogues and an analysis of other Athenian literary productions describing street-level social and political interactions in the fourth century, I endeavor to demonstrate in the second half of this thesis that the behaviors of social inquisitiveness, over-activity, and the negative characteristics attributed to the πολυπράγμων by contemporary writers such as Plato, could actually have served to increase the common knowledge and cohesiveness of the Athenian city-state. To do this, I consider the πολυπράγμων through the lens of modern scholarship and social science that considers Athens as an “epistemic democracy” concerned with aggregating and employing politically useful information

    Searching for Blood in the Streets: Mapping Political Violence onto Urban Topography in the Late Roman Republic, 80-50 BCE

    Get PDF
    This thesis uses traditional literary and archaeological evidence as well as new digital humanities methods such as 3-D modeling and GIS mapping to explore the close relationship between urban topography and political violence’s forms and effectiveness. The majority of the 65 distinguishable instances political violence during this period occurred in the Forum, where Rome’s political decision-making processes took place. The co-dependence of political processes such as legislation to their topography made these processes particularly vulnerable to physical disruption, and violence politically effective. Political violence was not random, but specifically targeted at a small number of sites and the processes they contained. Elite politicians, organized gangs, and individual crowd members used violent tactics that were tailored to the topography it was designed to disrupt. The Rostra, the Curia, and the judicial complex of the Eastern Forum were frequent targets because of their symbolic centrality and physical accessibility. Outside of the expressly political realm, Rome’s public theaters were symbolic targets of class-based violence because of their partly closed nature. Private homes on the Palatine Hill functioned both as headquarters for organizing violence, as well as the targets of it. In embedding the ancient sources’ narratives of violence in their urban context, this thesis provides a novel illustration of the intensely physical, sensorial, and spatial experience that was participation in Roman politics

    I\u27m The Guy

    Get PDF
    https://digitalcommons.library.umaine.edu/mmb-vp/4475/thumbnail.jp

    Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data

    Get PDF
    When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain. This paper presents a privacy-by-design approach to reengineer web applications as linked data-enabled and implement access control and privacy preservation properties. The method is based on the knowledge of the application architecture, which for the Web of data is commonly designed on the basis of a model-view-controller pattern. Whereas wrapping techniques commonly used to link data of web applications duplicate the security source code, the new approach allows for the controlled disclosure of an application’s data, while preserving non-functional properties such as privacy preservation. The solution has been implemented and compared with existing linked data frameworks in terms of reliability, maintainability and complexity
    corecore