10,296 research outputs found

    Movement of Trace Elements During Residence in the Antarctic Ice: a Laboratory Simulation

    Get PDF
    Recent work has determined that differences in the trace element distribution between Antarctic eucrites and non-Antarctic eucrites may be due to weathering during residence in the ice, and samples that demonstrate trace element disturbances do not necessarily correspond to eucrites that appear badly weathered to the naked eye. This study constitutes a preliminary test of the idea that long-term residence in the ice is the cause of the trace element disturbances observed in the eucrites. Samples of a non-Antarctic eucrite were leached in water at room temperature conditions. Liquid samples were analyzed for rare earth element abundances using ion chromatography. The results for the short-term study showed little or no evidence that leaching had occurred. However, there were tantalizing hints that something may be happening. The residual solid samples are currently being analyzed for the unleached trace metals using instrumental neutron activation analysis and should show evidence of disturbance if the chromatography clues were real. In addition, another set of samples continues to be intermittently sampled for later analysis. The results should give us information about the movement of trace elements under our conditions and allow us to make some tentative extrapolations to what we observe in actual Antarctic eucrite samples

    Neoliberalism Goes to School: Neoliberalism\u27s Influence on Responses to Sexual Violence in Higher Education Institutions

    Get PDF
    This paper will begin by tracing the historical relationship between sexual violence and race, and then describe how neoliberalism compounded upon this history to create a carceral feminist response to sexual violence. After outlining the neoliberal trends present in national responses to sexual violence, I will narrow my focus to responses within higher education and attempt to demonstrate the parallels between them. I will focus on the commonalities of punitive responses and individualization, which result in a culture of compliance in higher education. I will conclude by describing alternatives to the current way higher education executes Title IX policy

    US LHC Accelerator Research Program High-Field Magnet R&D

    Get PDF

    Transfer Pricing--Can It Effectively Be Applied To Computer Services?

    Get PDF
    71 leaves. Advisor: David S. HabrThe problem. From a financial point of view, the primary function of the data processing department is to maximize the benefit the firm receives from its data processing resources. Though such a goal may be generally accepted, it is not entirely clear how it is achieved. This thesis seeks to remedy this situation by applying transfer price to computer services. Procedure. The research procedure consisted of an analysis of transfer price theory and its varied applications. Next, the most generally accepted methods of transfer price theory were applied to an actual computer processing site to determine if any were applicable. Findings. Transfer pricing is most generally applied in one of the following four alternatives: (1) market price, a price based on a competitive external market; (2) negotiated price, a price mutually agreed to by the parties involved; (3) marginal cost, a price based on costs that vary with output and; (4) full cost, price based on variable and fixed costs of the supplying division. Three units of transfer were determined, batch processing, online processing and developmental. Given four objectives, transfer price must be equitable, reproducible, understandable and return no profit or loss. Full cost approach was found to be the most applicable. Recommendations. The transfer price system as developed herein be implemented in a test environment initially. Even though the full cost alternative appeared to be the "best," a hint of marginal cost was obvious. The marginal cost would be a horizontal line or a close approximation. After a period of time, cost trends will substantiate the system or support the marginal cost approach

    Beirare Of Power Grabbers In Our Midst Warns PM

    Get PDF
    Power grabbers are hard at work taking advantage of the difficult conditions to fire up the people's sentiments with false promises Prime Minister Datuk Seri Abdullah Ahmad Badawi Said

    A position servomechanism with the gain modulated by the output velocity

    Get PDF
    Call number: LD2668 .T4 1960 S7

    High Intrinsic Mobility and Ultrafast Carrier Dynamics in Multilayer Metal Dichalcogenide MoS2

    Full text link
    The ultimate limitations on carrier mobilities in metal dichalcogenides, and the dynamics associated with carrier relaxation, are unclear. We present measurements of the frequency-dependent conductivity of multilayer dichalcogenide MoS2 by optical-pump terahertz-probe spectroscopy. We find mobilities in this material approaching 4200 cm2/Vs at low temperatures. The temperature dependence of scattering indicates that the mobility, an order of magnitude larger than previously reported for MoS2, is intrinsically limited by acoustic phonon scattering at THz frequencies. Our measurements of carrier relaxation reveal picosecond cooling times followed by recombination lasting tens of nanoseconds and dominated by Auger scattering into defects. Our results provide a useful context in which to understand and evaluate the performance of MoS2-based electronic and optoelectronic devices.Comment: 13 pages, 8 figure

    A Multiple Radar Approach for Automatic Target Recognition of Aircraft using Inverse Synthetic Aperture Radar

    Get PDF
    Along with the improvement of radar technologies, Automatic Target Recognition (ATR) using Synthetic Aperture Radar (SAR) and Inverse SAR (ISAR) has come to be an active research area. SAR/ISAR are radar techniques to generate a two-dimensional high-resolution image of a target. Unlike other similar experiments using Convolutional Neural Networks (CNN) to solve this problem, we utilize an unusual approach that leads to better performance and faster training times. Our CNN uses complex values generated by a simulation to train the network; additionally, we utilize a multi-radar approach to increase the accuracy of the training and testing processes, thus resulting in higher accuracies than the other papers working on SAR/ISAR ATR. We generated our dataset with 7 different aircraft models with a radar simulator we developed called RadarPixel; it is a Windows GUI program implemented using Matlab and Java programming, the simulator is capable of accurately replicating a real SAR/ISAR configurations. Our objective is to utilize our multi-radar technique and determine the optimal number of radars needed to detect and classify targets.Comment: 8 pages, 9 figures, International Conference for Data Intelligence and Security (ICDIS
    corecore