scholarly journals Line Broadening Cross Sections for the Broadening of Transitions of Neutral Atoms by Collisions with Neutral Hydrogen

1998 ◽  
Vol 15 (3) ◽  
pp. 336-338 ◽  
Author(s):  
P. S. Barklem ◽  
S. D. Anstee ◽  
B. J. O'Mara

AbstractLine broadening cross sections for the broadening of spectral lines by collisions with neutral hydrogen atoms have been tabulated by Anstee & O'Mara (1995), Barklem & O'Mara (1997) and Barklem, O'Mara & Ross (1998) for s–p, p–s, p–d, d–p, d–f and f–d transitions. To make these data more accessible to the end user, fortran code which interpolates in these tabulations has been prepared and placed on the World Wide Web. It should be easy to incorporate this code into existing spectrum synthesis programs or to use it in a stand-alone mode to compute line broadening cross sections for specific transitions. The use of the code is demonstrated by its application to two transitions of astrophysical interest.

Author(s):  
Mark Kilfoil ◽  
Ali Ghorbani

The rapid growth of the World Wide Web has complicated the process of Web browsing by providing an overwhelming wealth of choices for the end user. To alleviate this burden, intelligent tools can do much of the drudge-work of looking ahead, searching and performing a preliminary evaluation of the end pages on the user’s behalf, anticipating the user’s needs and providing the user with more information with which to make fewer, more informed decisions. However, to accomplish this task, the tools need some form of representation of the interests of the user. This article describes the SWAMI system: SWAMI stands for Searching the Web with Agents having Mobility and Intelligence. SWAMI is a prototype that uses a multi-agent system to represent the interests of a user dynamically, and take advantage of the active nature of agents to provide a platform for look-ahead evaluation, page searching, and link swapping. The collection of agents is organized hierarchically according to the apparent interests of the user, which are discovered on-the-fly through multistage clustering. Results from initial testing show that such a system is able to follow the multiple changing interests of a user accurately, and that it is capable of acting fruitfully on these interests to provide a user with useful navigational suggestions.


Author(s):  
R. Ryan Nelson ◽  
Peter Todd

Beginning in the early 1980s, end-user computing (EUC) began to permeate organizations following the advent of the personal computer and a host of applications directed at the non-IS professional. Along with EUC came a whole new set of organizational opportunities and risks. Ten years later, the World Wide Web has opened the door to a yet more powerful set of EUC applications capable of reaching well beyond the boundaries of the organization. Indeed, Web technology permits end users to design applications that are immediately accessible by unlimited numbers of people from anywhere in the world. As a result, EUC using Web technology has introduced a whole new set of opportunities and risks for organizations. The purpose of this research is to examine what strategies organizations are using in their attempt to maximize the benefits of the Web for end users while mitigating the inherent risks. To this end, individuals from 12 major organizations were surveyed via the Web. The results indicate that while organizations seem to be doing an adequate job of establishing roles and standards, mechanisms for resource allocation, development management, and maintenance appear to be lacking. In fact, most firms seem to be relying on a monopolist control strategy at this point in time. While such a strategy may be the best approach given the relative infancy of Web technology, it could prove to be an unstable strategy in the long run given the reach, range and flexibility of access that Web technology provides. Organizations are encouraged to take a proactive, formal posture toward EUC development on the Web.


2002 ◽  
Vol 12 ◽  
pp. 429-431 ◽  
Author(s):  
Dan Kiselman

AbstractThe NLTE effects affecting oxygen-abundance determinations of solar-type stars are discussed. LTE is safe for the forbidden lines. The permitted triplet at 777 nm is expected to show NLTE effects so that assuming LTE overestimates the abundance, but the magnitude of the effects is dependent on the poorly known cross sections of collisional excitation by collisions with neutral hydrogen atoms. Little is known about the NLTE effects on molecular line formation.


Author(s):  
Yakubu Ajiji Makeri

The complexity and growth also create asymmetries between attackers and their targets, and incentives that drive underinvestment in cybersecurity The Digital technologies have transformed how people socialize, shop, interact with government and do business. The World Wide Web is of made amounts of information instantly available. The smartphones have put our fingertips everywhere we go it an improvement on effectiveness cybersecurity training for end users of systems and offers suggestions about and how topManagement leaders can improve on trainingto effectively combat cybersecurity threats at the organizations. Is imperative to achieve higher end-user cybersecurity compliance; practice is accepted, as a means to increase compliance behavior in any organization. The Training can influence compliance by one or more of three causal pathways: by increasing cybersecurity awareness, by increasing cybersecurity proficiency (i.e., improve cybersecurity skills) and by raising cybersecurity self-efficacy. This includes an extensive review of the cybersecurity policies and competencies that are the basis for training needs analysis, setting learning goals, and practical training. This paper discusses opportunities for human resource (HR) practitioners and industrial and organizational (I-O) psychologists, and informationtechnology (IT) specialists, and to integrate their skills and enhance the capabilities of organizations to counteract cybersecurity threats. AnyOrganizations cannot achieve their cybersecurity goalson workers alone, so all employees who use computer networks must be trained on the skill and policies related to cybersecurity.


Author(s):  
Mark Kilfoil ◽  
Ali Ghorbani

The rapid growth of the World Wide Web has complicated the process of Web browsing by providing an overwhelming wealth of choices for the end user. To alleviate this burden, intelligent tools can do much of the drudge-work of looking ahead, searching and performing a preliminary evaluation of the end pages on the user’s behalf, anticipating the user’s needs and providing the user with more information with which to make fewer, more informed decisions. However, to accomplish this task, the tools need some form of representation of the interests of the user. This article describes the SWAMI system: SWAMI stands for Searching the Web with Agents having Mobility and Intelligence. SWAMI is a prototype that uses a multi-agent system to represent the interests of a user dynamically, and take advantage of the active nature of agents to provide a platform for look-ahead evaluation, page searching, and link swapping. The collection of agents is organized hierarchically according to the apparent interests of the user, which are discovered on-the-fly through multi-stage clustering. Results from initial testing show that such a system is able to follow the multiple changing interests of a user accurately, and that it is capable of acting fruitfully on these interests to provide a user with useful navigational suggestions.


Author(s):  
Gerhard Fischer

The first decade of the World Wide Web predominantly enforced a clear separation between designers and consumers. New technological developments, such as the participatory Web 2.0 architectures, have emerged to support social computing. These developments are the foundations for a fundamental shift from consumer cultures (specialized in producing finished goods) to cultures of participation (in which all people can participate actively in personally meaningful activities). End-user development and meta-design provide foundations for this fundamental transformation. They explore and support new approaches for the design, adoption, appropriation, adaptation, evolution, and sharing of artifacts by all participating stakeholders. They take into account that cultures of participation are not dictated by technology alone: they are the result of incremental shifts in human behavior and social organizations. The design, development, and assessment of five particular applications that contributed to the development of our theoretical framework are described and discussed.


2018 ◽  
Vol 7 (4.35) ◽  
pp. 276
Author(s):  
Mohammed Najah Mahdi ◽  
Abdul Rahim Ahmad ◽  
Roslan Ismail

The volume of information available on the World Wide Web is quite significant. This plethora of information has, to a large extent constantly challenged researchers in seeking for ways of making the information easily accessible to end users in as convenient ways as possible. Characteristically, ensuring the accessibility of this large amount of information involves three all-encompassing processes of retrieval, organization and presentation. The World Wide Web offers a platform for sharing information from large database repositories globally. However, information needs to be searched with specialized tools commonly referred to as search engines. While a number of search engines does presently exist, most of these search engines are noted for their inability to retrieve information usable to the end user. It is therefore critical for the results generated from search engines to be intelligently organized for the optimal usefulness of the information to the searcher. Exploratory web technologies is capable of filing this gap. Therefore, this paper reviews exploratory search as a mechanism for conducting result-oriented search. It also reviews the ways of evaluating the search results obtained from an exploratory search.


2007 ◽  
Author(s):  
Paul S. Barklem ◽  
Luka Č. Popović ◽  
Milan S. Dimitrijević

1989 ◽  
Vol 67 (7) ◽  
pp. 694-698 ◽  
Author(s):  
Shouye Wang ◽  
J. W. McConkey

The dissociative excitation of CF3H by electron impact has been studied under single collision conditions for incident energies up to 600 eV. The emission spectrum in the wavelength range 50–130 nm shows many features arising from neutral and singly ionized fluorine and carbon fragments, as well as from neutral hydrogen atoms. Absolute cross sections for the observed features were measured at 200 eV incident energy, while the excitation functions of the most intense emissions were studied over the whole energy range. The threshold excitation of the hydrogen Lyman α line displays onsets at 18.4 and 34.0 eV, while that of the fluorine F I 95.5 nm feature shows only one onset at 33.0 eV. Possible dissociation channels are discussed.


1988 ◽  
Vol 66 (7) ◽  
pp. 645-648 ◽  
Author(s):  
R. Mayo ◽  
S. Rolston ◽  
T. J. Morgan

We report the results of a series of calculations of the cross section for the excitation of a neutral hydrogen atom to the 2s level, due to the collision of two neutral ground-state hydrogen atoms within the energy range 1–100 keV. Cross sections are presented for the first-Born approximation and for the straight-line impact-parameter method employing velocity truncation approximations. Electron exchange terms have been included in all calculations. Reported impact-parameter calculations are the best results of a series of calculations studying the inclusion, in the equation of motion, of terms that are zero- and first-order in the internuclear velocity. These results are compared with first- and second-order Born calculations neglecting exchange, recent infinite-order impact-parameter calculations, and experimental data.


Sign in / Sign up

Export Citation Format

Share Document