66 resultados para Lie detectors and detection
Resumo:
The flare of radiation from the tidal disruption and accretion of a star can be used as a marker for supermassive black holes that otherwise lie dormant and undetected in the centres of distant galaxies. Previous candidate flares have had declining light curves in good agreement with expectations, but with poor constraints on the time of disruption and the type of star disrupted, because the rising emission was not observed. Recently, two `relativistic' candidate tidal disruption events were discovered, each of whose extreme X-ray luminosity and synchrotron radio emission were interpreted as the onset of emission from a relativistic jet. Here we report a luminous ultraviolet-optical flare from the nuclear region of an inactive galaxy at a redshift of 0.1696. The observed continuum is cooler than expected for a simple accreting debris disk, but the well-sampled rise and decay of the light curve follow the predicted mass accretion rate and can be modelled to determine the time of disruption to an accuracy of two days. The black hole has a mass of about two million solar masses, modulo a factor dependent on the mass and radius of the star disrupted. On the basis of the spectroscopic signature of ionized helium from the unbound debris, we determine that the disrupted star was a helium-rich stellar core.
Resumo:
AIM: To explore breast health awareness and the early diagnosis and detection methods of breast cancer from the perspective of women and primary healthcare providers in the Jizan region of the Kingdom of Saudi Arabia.
BACKGROUND: Although there is a high incidence of advanced breast cancer in young women in the Kingdom of Saudi Arabia, there is no standardized information about breast self-examination, or is there a national screening programme involving clinical breast examination and mammography available.
DESIGN: Qualitative exploratory study.
METHODS: Data collection will consist of 36 face-to-face semi-structured interviews: 12 with general practitioners; 12 with nurses at primary healthcare centres and with 12 women who attend the health centres. This study will be carried out in eight states across the Jizan region (four rural and four urban) to reflect the cultural diversity of Jizan. The data will be analysed using thematic content analysis. Research Ethics Committee approval was obtained in June 2015.
DISCUSSION: While we understand the enablers and barriers to breast health awareness outside of Saudi culture, in the Kingdom of Saudi Arabia, particularly in rural populations such as Jizan, there is a lack of research. This study will add positively to the international knowledge base of this topic. The findings will give evidence and inform policy about women and healthcare providers' experiences in Jizan, in a society where such topics are taboo.
Resumo:
The divergent and broadband proton beams produced by the target normal sheath acceleration mechanism provide the unique opportunity to probe, in a point-projection imaging scheme, the dynamics of the transient electric and magnetic fields produced during laser-plasma interactions. Commonly such experimental setup entails two intense laser beams, where the interaction produced by one beam is probed with the protons produced by the second. We present here experimental studies of the ultra-fast charge dynamics along a wire connected to laser irradiated target carried out by employing a ‘self’ proton probing arrangement – i.e. by connecting the wire to the target generating the probe protons. The experimental data shows that an electromagnetic pulse carrying a significant amount of charge is launched along the wire, which travels as a unified pulse of 10s of ps duration with a velocity close to speed of light. The experimental capabilities and the analysis procedure of this specific type of proton probing technique are discussed.
Resumo:
The most established route to create a laser-based neutron source is by employing laser accelerated, low atomic-number ions in fusion reactions. In addition to the high reaction cross-sections at moderate energies of the projectile ions, the anisotropy in neutron emission is another important feature of beam-fusion reactions. Using a simple numerical model based on neutron generation in a pitcher–catcher scenario, anisotropy in neutron emission was studied for the deuterium–deuterium fusion reaction. Simulation results are consistent with the narrow-divergence ( ∼ 70 ° full width at half maximum) neutron beam recently served in an experiment employing multi-MeV deuteron beams of narrow divergence (up to 30° FWHM, depending on the ion energy) accelerated by a sub-petawatt laser pulse from thin deuterated plastic foils via the Target Normal Sheath Acceleration mechanism. By varying the input ion beam parameters, simulations show that a further improvement in the neutron beam directionality (i.e. reduction in the beam divergence) can be obtained by increasing the projectile ion beam temperature and cut-off energy, as expected from interactions employing higher power lasers at upcoming facilities.
Resumo:
Android is becoming ubiquitous and currently has the largest share of the mobile OS market with billions of application downloads from the official app market. It has also become the platform most targeted by mobile malware that are becoming more sophisticated to evade state-of-the-art detection approaches. Many Android malware families employ obfuscation techniques in order to avoid detection and this may defeat static analysis based approaches. Dynamic analysis on the other hand may be used to overcome this limitation. Hence in this paper we propose DynaLog, a dynamic analysis based framework for characterizing Android applications. The framework provides the capability to analyse the behaviour of applications based on an extensive number of dynamic features. It provides an automated platform for mass analysis and characterization of apps that is useful for quickly identifying and isolating malicious applications. The DynaLog framework leverages existing open source tools to extract and log high level behaviours, API calls, and critical events that can be used to explore the characteristics of an application, thus providing an extensible dynamic analysis platform for detecting Android malware. DynaLog is evaluated using real malware samples and clean applications demonstrating its capabilities for effective analysis and detection of malicious applications.