5,042 research outputs found
Investigation of measures to reduce dog attacks and promote responsible ownership amongst dog owners with dog control issues in the UK
The overall aim of the project is to identify methods to reduce dog attacks and dog control issues as well as provide evidence-based recommendations to promote responsible dog
ownership amongst owners with dog control issues. The project examined contemporary enforcement practice and also explored risk factors related to dog attacks
Transverse nucleon structure and diagnostics of hard parton-parton processes at LHC
We propose a new method to determine at what transverse momenta particle
production in high-energy pp collisions is governed by hard parton-parton
processes. Using information on the transverse spatial distribution of partons
obtained from hard exclusive processes in ep/gamma p scattering, we evaluate
the impact parameter distribution of pp collisions with a hard parton-parton
process as a function of p_T of the produced parton (jet). We find that the
average pp impact parameters in such events depend very weakly on p_T in the
range 2 < p_T < few 100 GeV, while they are much smaller than those in
minimum-bias inelastic collisions. The impact parameters in turn govern the
observable transverse multiplicity in such events (in the direction
perpendicular to the trigger particle or jet). Measuring the transverse
multiplicity as a function of p_T thus provides an effective tool for
determining the minimum p_T for which a given trigger particle originates from
a hard parton-parton process. Additional tests of the proposed geometric
correlations are possible by measuring the dependence on the trigger rapidity.
Various strategies for implementing this method are outlined.Comment: 9 pages, 6 figure
The technification of domestic abuse: Methods, tools and criminal justice responses
Methods of domestic abuse are progressively incorporating computer misuse and other related online offences and digital tools, escalating opportunities for perpetrators to monitor, threaten and humiliate their victims. Drawing on empirical research involving media case study analysis, a technology review and interviews undertaken with 21 professionals and service providers supporting domestic abuse victims, this article outlines the context in England and Wales regarding the methods, tools and criminal justice responses involved in what we conceptualise as the technification of domestic abuse. As technology continues to deeply intertwine with our daily lives, it is undeniable that its involvement within domestic abuse encompasses harmful behaviours that pose an increasing risk of harm, and unless effective criminal justice interventions are implemented, this risk will inevitably grow even further
Work environment, volume of activity and staffing in neonatal intensive care units in Italy: results of the SONAR-nurse study
Neonatal units' volume of activity, and other quantitative and qualitative variables, such as staffing, workload, work environment, care organization and geographical location, may influence the outcome of high risk newborns. Data about the distribution of these variables and their relationships among Italian neonatal units are lacking
Work environment, volume of activity and staffing in neonatal intensive care units in Italy: results of the SONAR-nurse study
Neonatal units' volume of activity, and other quantitative and qualitative variables, such as staffing, workload, work environment, care organization and geographical location, may influence the outcome of high risk newborns. Data about the distribution of these variables and their relationships among Italian neonatal units are lacking
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge
AbstractThe Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture.</jats:p
Solar ultraviolet radiation exposure of South African marathon runners during competition marathon runs and training sessions : a feasibility study
Marathon runners spend considerable time outdoors training for and participating in
marathons. Outdoor runners may experience high solar ultraviolet radiation (UVR) exposure.
South Africa, where running is popular, experiences high ambient solar UVR levels that may
be associated with adverse health effects. This feasibility study explores the use of personal
dosimeters to determine solar UVR exposure patterns and possible related acute health risks
of four marathon runners during marathons and training sessions in Cape Town and Pretoria.
Runners running marathons that started early in the day, and that did not exceed 4 hours,
yielded low total solar UVR exposure doses (mean 0.093 SED per exposure period run,
median 0.088 SED, range 0.062 – 0.136 SED; average of 16.54% of ambient solar UVR).
Training sessions run during early morning and late afternoon presented similar results.
Several challenges hindered analysis including accounting for anatomical position of personal dosimeter and natural shade. To assess health risks, hazard quotients (HQs) were calculated
using a hypothetical runner’s schedule. Cumulative, annual solar UVR exposure-calculated
acute health risks were low (HQ = 0.024) for training sessions and moderate (HQ = 4.922)
for marathon runs. While these data and calculations are based on 18 person-days, one can
measure marathon runners’ personal solar UVR exposure although several challenges must
be overcome.Council for Scientific and Industrial Research, the Cancer Association of South Africa and the National Research Foundation.http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1751-10972016-07-31hb201
W+jets Matrix Elements and the Dipole Cascade
We extend the algorithm for matching fixed-order tree-level matrix element
generators with the Dipole Cascade Model in Ariadne to apply to processes with
incoming hadrons. We test the algoritm on for the process W+n jets at the
Tevatron, and find that the results are fairly insensitive to the cutoff used
to regularize the soft and collinear divergencies in the tree-level matrix
elements. We also investigate a few observables to check the sensitivity to the
matrix element correction
- …