scholarly journals The Polarized-Target System for the SpinQuest Experiment at Fermilab

2020 ◽  
Author(s):  
Noah Wuerfe
1973 ◽  
Vol 34 (C1) ◽  
pp. C1-296-C1-297
Author(s):  
W. BEUSCH
Keyword(s):  

1977 ◽  
Vol 16 (03) ◽  
pp. 125-130 ◽  
Author(s):  
P. L. Reichertz

Data processing has become an important tool in theoretical and clinical medicine. The main categories of applications are : information analysis, (bio)signal processing and the field of information logistics (information systems).The problems encountered lie in the discrepancy of the basic methods of a formal approach to an empirical science, the complexity of the target system and the system ecology, i.e. the involvement of the user and the system environment during system construction and utilization.Possible solutions to these problems are the application of system techniques, inductive planning, development of medical methodology, development of methods and techniques for user involvement and assessment of motivation and education and educational planning.The necessary general strategy in the development in medical informatics is seen in the continuing systematization of the theoretical and practical approach. It is estimated that this will eventually contribute to the systematization of medical science and practice.


2020 ◽  
Vol 67 (1) ◽  
pp. 35-41
Author(s):  
Igor’ P. Popov

The work is actual due to the increased role of electrostatic energy in connection with the beginning of mass production of ionistors used in the power supply system of electric vehicles, and the need for the development of theoretical support. (Research purpose) The research purpose is in increasing the correctness of electrostatic calculations that exclude the possibility of obtaining unreliable results in the form of infinite electrostatic energy. (Materials and methods) Authors have used methods of mathematical modeling and analysis, studied the mathematical model as the equivalent of an object that reflects in mathematical form its most important properties, such as the laws that it obeys, and the relationships inherent in its constituent parts. (Results and discussion) Authors have studied the electrostatic field created by a system of two charges of the same name or different names. The article presents calculations for charges located in bodies that have the shape of balls. It was found that the results could be generalized to any form of charged objects. They gave three definitions: first, the total stored energy is the energy of the system or object, equal to the maximum work that the system or object can do if it is given such an opportunity. Second, the conditional realized stored energy is a part of the total stored energy of the system or object, equal to the work that the system or object can produce, limited by a condition that excludes the possibility of the system or object performing the maximum work that the system or object can hypothetically perform. The third is a conditional impossible reserved energy as a part of a complete stored energy system or an object that is equal to the work system or object can do and limited by the condition, which excludes the possibility of making a system or object maximum work that target system or object could hypothetically do. Five theorems were proved. (Conclusions) It was found that the main drawback of the actual potential energy formula is an infinitely large increase in energy at radius tending to 0. The obtained formulas for stored electrostatic energy are devoid of this drawback.


2000 ◽  
Vol 42 (11) ◽  
pp. 838-841 ◽  
Author(s):  
G. A. Krombach ◽  
T. Schmitz-Rode ◽  
B. B. Wein ◽  
J. Meyer ◽  
J. E. Wildberger ◽  
...  

Author(s):  
J Ball ◽  
G Baum ◽  
P Berglund ◽  
I Daito ◽  
N Doshita ◽  
...  

2015 ◽  
Vol 2015 ◽  
pp. 1-7 ◽  
Author(s):  
Liu Xiaojian ◽  
Yuan Yuyu

We analyze the distributed network attack-defense game scenarios, and we find that attackers and defenders have different information acquisition abilities since the ownership of the target system. Correspondingly, they will have different initiative and reaction in the game. Based on that, we propose a novel dynamic game method for distributed network attack-defense game. The method takes advantage of defenders’ information superiority and attackers’ imitation behaviors and induces attackers’ reaction evolutionary process in the game to gain more defense payoffs. Experiments show that our method can achieve relatively more average defense payoffs than previous work.


Sign in / Sign up

Export Citation Format

Share Document