5,042 research outputs found

    Investigation of measures to reduce dog attacks and promote responsible ownership amongst dog owners with dog control issues in the UK

    Get PDF
    The overall aim of the project is to identify methods to reduce dog attacks and dog control issues as well as provide evidence-based recommendations to promote responsible dog ownership amongst owners with dog control issues. The project examined contemporary enforcement practice and also explored risk factors related to dog attacks

    Transverse nucleon structure and diagnostics of hard parton-parton processes at LHC

    Full text link
    We propose a new method to determine at what transverse momenta particle production in high-energy pp collisions is governed by hard parton-parton processes. Using information on the transverse spatial distribution of partons obtained from hard exclusive processes in ep/gamma p scattering, we evaluate the impact parameter distribution of pp collisions with a hard parton-parton process as a function of p_T of the produced parton (jet). We find that the average pp impact parameters in such events depend very weakly on p_T in the range 2 < p_T < few 100 GeV, while they are much smaller than those in minimum-bias inelastic collisions. The impact parameters in turn govern the observable transverse multiplicity in such events (in the direction perpendicular to the trigger particle or jet). Measuring the transverse multiplicity as a function of p_T thus provides an effective tool for determining the minimum p_T for which a given trigger particle originates from a hard parton-parton process. Additional tests of the proposed geometric correlations are possible by measuring the dependence on the trigger rapidity. Various strategies for implementing this method are outlined.Comment: 9 pages, 6 figure

    The technification of domestic abuse: Methods, tools and criminal justice responses

    Get PDF
    Methods of domestic abuse are progressively incorporating computer misuse and other related online offences and digital tools, escalating opportunities for perpetrators to monitor, threaten and humiliate their victims. Drawing on empirical research involving media case study analysis, a technology review and interviews undertaken with 21 professionals and service providers supporting domestic abuse victims, this article outlines the context in England and Wales regarding the methods, tools and criminal justice responses involved in what we conceptualise as the technification of domestic abuse. As technology continues to deeply intertwine with our daily lives, it is undeniable that its involvement within domestic abuse encompasses harmful behaviours that pose an increasing risk of harm, and unless effective criminal justice interventions are implemented, this risk will inevitably grow even further

    Work environment, volume of activity and staffing in neonatal intensive care units in Italy: results of the SONAR-nurse study

    Get PDF
    Neonatal units' volume of activity, and other quantitative and qualitative variables, such as staffing, workload, work environment, care organization and geographical location, may influence the outcome of high risk newborns. Data about the distribution of these variables and their relationships among Italian neonatal units are lacking

    Work environment, volume of activity and staffing in neonatal intensive care units in Italy: results of the SONAR-nurse study

    Get PDF
    Neonatal units' volume of activity, and other quantitative and qualitative variables, such as staffing, workload, work environment, care organization and geographical location, may influence the outcome of high risk newborns. Data about the distribution of these variables and their relationships among Italian neonatal units are lacking

    Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge

    Get PDF
    AbstractThe Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture.</jats:p

    Solar ultraviolet radiation exposure of South African marathon runners during competition marathon runs and training sessions : a feasibility study

    Get PDF
    Marathon runners spend considerable time outdoors training for and participating in marathons. Outdoor runners may experience high solar ultraviolet radiation (UVR) exposure. South Africa, where running is popular, experiences high ambient solar UVR levels that may be associated with adverse health effects. This feasibility study explores the use of personal dosimeters to determine solar UVR exposure patterns and possible related acute health risks of four marathon runners during marathons and training sessions in Cape Town and Pretoria. Runners running marathons that started early in the day, and that did not exceed 4 hours, yielded low total solar UVR exposure doses (mean 0.093 SED per exposure period run, median 0.088 SED, range 0.062 – 0.136 SED; average of 16.54% of ambient solar UVR). Training sessions run during early morning and late afternoon presented similar results. Several challenges hindered analysis including accounting for anatomical position of personal dosimeter and natural shade. To assess health risks, hazard quotients (HQs) were calculated using a hypothetical runner’s schedule. Cumulative, annual solar UVR exposure-calculated acute health risks were low (HQ = 0.024) for training sessions and moderate (HQ = 4.922) for marathon runs. While these data and calculations are based on 18 person-days, one can measure marathon runners’ personal solar UVR exposure although several challenges must be overcome.Council for Scientific and Industrial Research, the Cancer Association of South Africa and the National Research Foundation.http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1751-10972016-07-31hb201

    W+jets Matrix Elements and the Dipole Cascade

    Full text link
    We extend the algorithm for matching fixed-order tree-level matrix element generators with the Dipole Cascade Model in Ariadne to apply to processes with incoming hadrons. We test the algoritm on for the process W+n jets at the Tevatron, and find that the results are fairly insensitive to the cutoff used to regularize the soft and collinear divergencies in the tree-level matrix elements. We also investigate a few observables to check the sensitivity to the matrix element correction
    • …
    corecore