11,047 research outputs found
An optimised scalable synthesis of H2O@C60and a new synthesis of H2@C60
New high-yielding synthetic routes to the small-molecule endofullerenes H2O@C60, D2O@C60 and H2@C60 are described. The use of high temperatures and pressures for the endohedral molecule incorporation are avoided. A new partial closure step using PPh3, and final suturing using a novel Diels–Alder/retro-Diels–Alder sequence are amongst the advances reported
Rotten Apples: An Investigation of the Prevalence and Predictors of Teacher Cheating
We develop an algorithm for detecting teacher cheating that combines information on unexpected test score fluctuations and suspicious patterns of answers for students in a classroom. Using data from the Chicago Public Schools, we estimate that serious cases of teacher or administrator cheating on standardized tests occur in a minimum of 4-5 percent of elementary school classrooms annually. Moreover, the observed frequency of cheating appears to respond strongly to relatively minor changes in incentives. Our results highlight the fact that incentive systems, especially those with bright line rules, often induce behavioral distortions such as cheating. Statistical analysis, however, may provide a means of detecting illicit acts, despite the best attempts of perpetrators to keep them clandestine.
Catching Cheating Teachers: The Results of an Unusual Experiment in Implementing Theory
This paper reports on the results of a prospective implementation of methods for detecting teacher cheating. In Spring 2002, over 100 Chicago Public Schools elementary classrooms were selected for retesting based on the cheating detection algorithm. Classrooms prospectively identified as likely cheaters experienced large test score declines. In contrast, classes that had large test score gains on the original test, but were prospectively identified as being unlikely to have cheated, maintained their original gains. Randomly selected classrooms also maintained their gains. The cheating detection tools were thus demonstrated to be effective in distinguishing between classrooms that achieved large test-score gains as a consequence of cheating versus those whose gains were the result of outstanding teaching. In addition, the data generated by the implementation experiment highlight numerous ways in which the original cheating detection methods can be improved in the future.
Security Policy Specification Using a Graphical Approach
A security policy states the acceptable actions of an information system, as
the actions bear on security. There is a pressing need for organizations to
declare their security policies, even informal statements would be better than
the current practice. But, formal policy statements are preferable to support
(1) reasoning about policies, e.g., for consistency and completeness, (2)
automated enforcement of the policy, e.g., using wrappers around legacy systems
or after the fact with an intrusion detection system, and (3) other formal
manipulation of policies, e.g., the composition of policies. We present LaSCO,
the Language for Security Constraints on Objects, in which a policy consists of
two parts: the domain (assumptions about the system) and the requirement (what
is allowed assuming the domain is satisfied). Thus policies defined in LaSCO
have the appearance of conditional access control statements. LaSCO policies
are specified as expressions in logic and as directed graphs, giving a visual
view of policy. LaSCO has a simple semantics in first order logic (which we
provide), thus permitting policies we write, even for complex policies, to be
very perspicuous. LaSCO has syntax to express many of the situations we have
found to be useful on policies or, more interesting, the composition of
policies. LaSCO has an object-oriented structure, permitting it to be useful to
describe policies on the objects and methods of an application written in an
object-oriented language, in addition to the traditional policies on operating
system objects. A LaSCO specification can be automatically translated into
executable code that checks an invocation of a program with respect to a
policy. The implementation of LaSCO is in Java, and generates wrappers to check
Java programs with respect to a policy.Comment: 28 pages, 22 figures, in color (but color is not essential for
viewing); UC Davis CS department technical report (July 22, 1998
Micromechanical microphone using sideband modulation of nonlinear resonators
We report the successful detection of an audio signal via sideband modulation
of a nonlinear piezoelectric micromechanical resonator. The
27096-m resonator was shown to be reliable in audio detection for
sound intensity levels as low as ambient room noise and to have an unamplified
sensitivity of 23.9 V/Pa. Such an approach may be adapted in acoustic
sensors and microphones for consumer electronics or medical equipment such as
hearing aids.Comment: 5 pages, 3 figure
The Effect of School Choice on Student Outcomes: Evidence from Randomized Lotteries
School choice has become an increasingly prominent strategy for urban school districts seeking to enhance academic achievement. Evaluating the impact of such programs is complicated by the fact that a highly select sample of students takes advantage of these programs. To overcome this difficulty, we exploit randomized lotteries that determine high school admission in the Chicago Public Schools. Surprisingly, we find little evidence that attending sought after programs provides any benefit on a wide variety of traditional academic measures, including standardized test scores, attendance rates, course-taking, and credit accumulation. This is true despite the fact that those students who win the lotteries attend better high schools along a number of dimensions, including higher peer achievement levels, higher peer graduation rates, and lower levels of poverty. We do, however, uncover evidence that attendance at such schools may improve a subset of non-traditional outcome measures, such as self-reported disciplinary incidences and arrest rates.
Magic composite pulses
I describe composite pulses during which the average dipolar interactions
within a spin ensemble are controlled while realizing a global rotation. The
construction method used is based on the average Hamiltonian theory and rely on
the geometrical properties of the spin-spin dipolar interaction only. I present
several such composite pulses robust against standard experimental defects in
NRM: static or radio-frequency field miscalibration, fields inhomogeneities.
Numerical simulations show that the magic sandwich pulse sequence, a pulse
sequence that reverse the average dipolar field while applied, is plagued by
defects originating from its short initial and final \pi/2 radio-frequency
pulses. Using the magic composite pulses instead of \pi/2 pulses improves the
magic sandwich effect. A numerical test using a classical description of NMR
allows to check the validity of the magic composite pulses and estimate their
efficiency.Comment: 22 pages, 6 figure
- …