9 resultados para Ghost reflection analysis
Resumo:
The results of a study to characterise the polarisation properties of the photon beam emerging from beamline 5D, mounted on a bending magnet source at the Synchrotron Radiation Source, Daresbury Laboratory, are presented. The expectation values for the Stokes parameters corresponding to the light transmitted by the beamline have been calculated by combining ray-tracing and optical methods. The polarisation of the light at the source is modified both by the beamline geometry and by the reflections at the optical components. Although it is often assumed that the polarising properties of grazing incidence optics are negligible, this assumption leads to rather inaccurate results in the VUV region. A study of the reflectivity shows that even at incidence angles (theta(i) = 80-85degrees) which are far from the Brewster angle (theta(B) similar to 45degrees for VUV and soft X-ray radiation) the residual changes in the amplitudes of the reflected light can result in non-negligible polarisation effects. Furthermore, reflection at grazing incidence gives rise to a substantial change in the phase, and this has the effect of rotating the elliptically polarised state. Theoretical Stokes parameters have been compared with full polarisation measurements obtained using a reflection polarimeter in the energy range 20-40 eV. (C) 2003 Elsevier B.V. All rights reserved.
Resumo:
The mid-infrared optical response of c-axis thin films of YBa2Cu3O7-delta has been studied using Otto-configuration attenuated total reflectance. The measured reflectance-angle characteristics are dominated by a strong absorption feature due to the excitation of surface plasmons, and can be modeled to determine the a-b plane dielectric function. The results show that while epsilon(i,) and therefore sigma(r), are temperature independent, \epsilon(r)\ exhibits a moderate decrease with generalized Drude analysis shows that the plasma frequency is independent of temperature, but decreases with decreasing doping. The scattering rate increases with temperature, and also increases with decreasing doping, consistent with stronger coupling in the underdoped regime. The mass-enhancement is small but increases to 30-40% at delta = 0.6. Difficulties in reconciling the results with some current theories of high-T-c materials are discussed. Finally, the surface plasmon propagation lengths and penetration depths are shown to vary systematically with doping. (C) 2003 Elsevier B.V. All rights reserved.
Resumo:
We present a theoretical analysis of a novel scheme for optical cooling of particles that does not in principle require a closed optical transition. A tightly confined laser beam interacting with a trapped particle experiences a phase shift, which upon reflection from a mirror or resonant microstructure produces a time-delayed optical potential for the particle. This leads to a nonconservative force and friction. A quantum model of the system is presented and analyzed in the semiclassical limit.
Resumo:
The paper is a reflection on the use of photographs in multiple case study research. It explores the crossovers between interpreting visual artefacts, the qualitative approach to case study research in organisations, and the move from cases to theory guided by the grounded theory tenets. The paper proposes an additional use of photographs as a visual method to those in the literature, as a device for data analysis. Photograph-based analysis techniques are explored, using e sequence of individual images and photo collages on case data, moving from interpretation of single to multiple case themes. This makes the case of using photograph analysis as an interpretation device for case research to illuminate theory development.
Resumo:
Reasoning that is deliberative and reflective often requires the inhibition of intuitive responses. The Cognitive Reflection Test (CRT) is designed to assess people’s ability to suppress incorrect heuristic responses in favour of deliberation. Correct responding on the CRT predicts performance on a range of tasks in which intuitive processes lead to incorrect responses, suggesting indirectly that CRT performance is related to cognitive control. Yet little is known about the cognitive processes underlying performance on the CRT. In the current research, we employed a novel mouse tracking mjavascript:void(0);ethodology to capture the time-course of reasoning on the CRT. Analysis of mouse cursor trajectories revealed that participants were initially drawn towards the incorrect (i.e., intuitive) option even when the correct (deliberative) option was ultimately chosen. Conversely, participants were not attracted to the correct option when they ultimately chose the incorrect intuitive one. We conclude that intuitive processes are activated automatically on the CRT and must be inhibited in order to respond correctly. When participants responded intuitively, there was no evidence that deliberative reasoning had become engaged.
Resumo:
Do philosophers have a responsibility to their society that is distinct from their responsibility to it as citizens? This edited volume explores both what type of contribution philosophy can make and what type of reasoning is appropriate when addressing public matters now. These questions are posed by leading international scholars working in the fields of moral and political philosophy. Each contribution also investigates the central issue of how to combine critical, rational analysis with a commitment to politically relevant public engagement. The contributions to this volume analyse issues raised in practical ethics, including abortion, embryology, and assisted suicide. They consider the role of ethical commitment in the philosophical analysis of contemporary political issues, and engage with matters of public policy such as poverty, the arts, meaningful work, as well as the evidence base for policy. They also examine the normative legitimacy of power, including the use of violence.
Resumo:
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.