4,055 research outputs found

    Orientation of particle attachment and local isotropy in diffusion limited aggregation (DLA)

    Full text link
    We simulate 50 off-lattice DLA clusters, one million particles each. The probability distribution of the angle of attachment of arriving particles with respect to the local radial direction is obtained numerically. For increasing cluster size, NN, the distribution crosses over extremely accurately to a cosine, whose amplitude decreases towards zero as a power-law in NN. From this viewpoint, asymptotically large DLA clusters are locally isotropicisotropic. This contradicts previous conclusions drawn from density-density correlation measurements [P. Meakin, and T. Viscek, Phys. Rev. A {\bf 32}, 685 (1985)]. We present an intuitive phenomenological model random process for our numerical findings.Comment: 10 pages, RevTex 3.0, 11-9

    Residential Water Consumption: A Cross Country Analysis

    Get PDF
    Survey data from over 1,600 households in ten countries were used to analyse the determinants of residential water demand. Results show that in every country the price elasticity is negative and statistically significant. Households that do not have to pay for the water they use (volumetric water charges) consume about a third more water than similar households that do have to pay such charges. Consumers’ attitudes do not have a statistically significant effect on total water use, although they do increase the probability of households using some water saving behaviours. Volumetric water charges also have an impact on the adoption of water saving actions. Full-cost water pricing appears to be a highly effective instrument to manage residential water demand.water demand, water consumption, water pricing, Environmental Economics and Policy, Resource /Energy Economics and Policy, C21, Q25, Q50,

    Dendritic Synapse Location and Neocortical Spike-Timing-Dependent Plasticity

    Get PDF
    While it has been appreciated for decades that synapse location in the dendritic tree has a powerful influence on signal processing in neurons, the role of dendritic synapse location on the induction of long-term synaptic plasticity has only recently been explored. Here, we review recent work revealing how learning rules for spike-timing-dependent plasticity (STDP) in cortical neurons vary with the spatial location of synaptic input. A common principle appears to be that proximal synapses show conventional STDP, whereas distal inputs undergo plasticity according to novel learning rules. One crucial factor determining location-dependent STDP is the backpropagating action potential, which tends to decrease in amplitude and increase in width as it propagates into the dendritic tree of cortical neurons. We discuss additional location-dependent mechanisms as well as the functional implications of heterogeneous learning rules at different dendritic locations for the organization of synaptic inputs

    Toxoplasma MIC2 Is a Major Determinant of Invasion and Virulence

    Get PDF
    Like its apicomplexan kin, the obligate intracellular protozoan Toxoplasma gondii actively invades mammalian cells and uses a unique form of gliding motility. The recent identification of several transmembrane adhesive complexes, potentially capable of gripping external receptors and the sub-membrane actinomyosin motor, suggests that the parasite has multiple options for host-cell recognition and invasion. To test whether the transmembrane adhesin MIC2, together with its partner protein M2AP, participates in a major invasion pathway, we utilized a conditional expression system to introduce an anhydrotetracycline-responsive mic2 construct, allowing us to then knockout the endogenous mic2 gene. Conditional suppression of MIC2 provided the first opportunity to directly determine the role of this protein in infection. Reduced MIC2 expression resulted in mistrafficking of M2AP, markedly defective host-cell attachment and invasion, the loss of helical gliding motility, and the inability to support lethal infection in a murine model of acute toxoplasmosis. Survival of mice infected with MIC2-deficient parasites correlated with lower parasite burden in infected tissues, an attenuated inflammatory immune response, and induction of long-term protective immunity. Our findings demonstrate that the MIC2 protein complex is a major virulence determinant for Toxoplasma infection and that MIC2-deficient parasites constitute an effective live-attenuated vaccine for experimental toxoplasmosis

    The impact of high speed machining on computing and automation

    Get PDF
    Machine tool technologies, especially Computer Numerical Control (CNC) High Speed Machining (HSM) have emerged as effective mechanisms for Rapid Tooling and Manufacturing applications. These new technologies are attractive for competitive manufacturing because of their technical advantages, i.e. a significant reduction in lead-time, high product accuracy, and good surface finish. However, HSM not only stimulates advancements in cutting tools and materials, it also demands increasingly sophisticated CAD/CAM software, and powerful CNC controllers that require more support technologies. This paper explores the computational requirement and impact of HSM on CNC controller, wear detection, look ahead programming, simulation, and tool management

    Phase-Remapping Attack in Practical Quantum Key Distribution Systems

    Full text link
    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug & play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.Comment: 13 pages, 8 figure

    Quantum anti-Zeno effect without rotating wave approximation

    Get PDF
    In this paper, we systematically study the spontaneous decay phenomenon of a two-level system under the influences of both its environment and continuous measurements. In order to clarify some well-established conclusions about the quantum Zeno effect (QZE) and the quantum anti-Zeno effect (QAZE), we do not use the rotating wave approximation (RWA) in obtaining an effective Hamiltonian. We examine various spectral distributions by making use of our present approach in comparison with other approaches. It is found that with respect to a bare excited state even without the RWA, the QAZE can still happen for some cases, e.g., the interacting spectra of hydrogen. But for a physical excited state, which is a renormalized dressed state of the atomic state, the QAZE disappears and only the QZE remains. These discoveries inevitably show a transition from the QZE to the QAZE as the measurement interval changes.Comment: 14 pages, 8 figure

    Electric-field control of magnetic ordering in the tetragonal BiFeO3

    Full text link
    We propose a way to use electric-field to control the magnetic ordering of the tetragonal BiFeO3. Based on systematic first-principles studies of the epitaxial strain effect on the ferroelectric and magnetic properties of the tetragonal BiFeO3, we find that there exists a transition from C-type to G-type antiferromagnetic (AFM) phase at in-plane constant a ~ 3.905 {\AA} when the ferroelectric polarization is along [001] direction. Such magnetic phase transition can be explained by the competition between the Heisenberg exchange constant J1c and J2c under the influence of biaxial strain. Interestingly, when the in-plane lattice constant enlarges, the preferred ferroelectric polarization tends to be canted and eventually lies in the plane (along [110] direction). It is found that the orientation change of ferroelectric polarization, which can be realized by applying external electric-field, has significant impact on the Heisenberg exchange parameters and therefore the magnetic orderings of tetragonal BiFeO3. For example, at a ~ 3.79 {\AA}, an electric field along [111] direction with magnitude of 2 MV/cm could change the magnetic ordering from C-AFM to G-AFM. As the magnetic ordering affects many physical properties of the magnetic material, e.g. magnetoresistance, we expect such strategy would provide a new avenue to the application of multiferroic materials.Comment: 4 pages, 4 figure
    corecore