914 research outputs found
Address by Hon. Thomas M. Cooley, and Poem by D. Bethune Duffield, Esq., on the Dedication of the Law Lecture Hall of the Michigan University
A stirring address by Professor Cooley upon the occasion of the dedication of the Law Lecture Hall of the first Law School Building. He begins: Students in the Department of Law: While Michigan was yet a wilderness, only feeling along its borders the advancing tread of civilization, and only hearing here and there the sound of the woodman\u27s axe, the wisdom of American statesmen made provision for the establishment in the territory of a great University...
Recommended from our members
VALUE CO-CREATION ENHANCING DESTINATION RESILIENCE THROUGH SMARTNESS.
The sustainability and competitive advantage of a destination must be extended to the standard of the resilience within the destination. Tourism, a “complex business ecosystem” must collectively manage their inherent vulnerabilities to crisis and disasters. This paper contributes to tourism literature by demonstrating the potential of smartness to increase destination resilience through value co-creation for all stakeholders through their real time responsiveness to crisis and disasters, ultimately strengthening resilience. Secondary research was conducted using a multi-disciplinary approach to understand the tenets that were key in the development of the core concepts of the research. Value co-creation within tourism has been primarily restricted to the consumer organization relationship. The discussion, however, must be elevated and reflected in the internal destination systems and processes to enhance the traveller experience, safety and security, which, ulimately, is value for all. Value co-creation is one of the inherent elements and outcomes of the Real Time Resilience and augers well for all stakeholders as it capitalizes on smartness to enhance decision making during crisis and disasters
C1 inhibitor deficiency: 2014 United Kingdom consensus document
C1 inhibitor deficiency is a rare disorder manifesting with recurrent attacks of disabling and potentially life-threatening angioedema. Here we present an updated 2014 United Kingdom consensus document for the management of C1 inhibitor-deficient patients, representing a joint venture between the United Kingdom Primary Immunodeficiency Network and Hereditary Angioedema UK. To develop the consensus, we assembled a multi-disciplinary steering group of clinicians, nurses and a patient representative. This steering group first met in 2012, developing a total of 48 recommendations across 11 themes. The statements were distributed to relevant clinicians and a representative group of patients to be scored for agreement on a Likert scale. All 48 statements achieved a high degree of consensus, indicating strong alignment of opinion. The recommendations have evolved significantly since the 2005 document, with particularly notable developments including an improved evidence base to guide dosing and indications for acute treatment, greater emphasis on home therapy for acute attacks and a strong focus on service organisation. This article is protected by copyright. All rights reserved
Autocompensating Quantum Cryptography
Quantum cryptographic key distribution (QKD) uses extremely faint light
pulses to carry quantum information between two parties (Alice and Bob),
allowing them to generate a shared, secret cryptographic key. Autocompensating
QKD systems automatically and passively compensate for uncontrolled time
dependent variations of the optical fiber properties by coding the information
as a differential phase between orthogonally-polarized components of a light
pulse sent on a round trip through the fiber, reflected at mid-course using a
Faraday mirror. We have built a prototype system based on standard telecom
technology that achieves a privacy-amplified bit generation rate of ~1000
bits/s over a 10-km optical fiber link. Quantum cryptography is an example of
an application that, by using quantum states of individual particles to
represent information, accomplishes a practical task that is impossible using
classical means.Comment: 18 pages, 6 figures, 1 table. Submitted to the New Journal of Physic
Recommended from our members
The women's movement in Japan and its effect on the workplace
The purpose of this study is to investigate the role of women in the
Japanese workplace. Data obtained from in-depth interviews and
questionnaires, shows that the Japanese workplace is in a state of
change moving toward a higher level of opportunity for female workers.
While similar to the circumstances experienced by Western women, the
changes which Japanese women are experiencing have their own history
and thus are analyzed from a non-Western perspective. Some key
aspects of the analysis include: training, separate positions for men and
women, tasks, and perceptions of gender discrimination.
For men and women who held the same jobs it was found that the
majority of training experiences were gender neutral. This is consistent
with the fact that Japanese companies must make training equal as
mandated by the 1985 Equal Employment Opportunity Law.
In the workplace, however, discrimination has taken the form of
separate positions for men and women. While there were informants
who were both supportive and un-supportive of job separation, it was
clear that this practice resulted in lower salaries and fewer high level
positions for women.
When males and females held the same positions, 17% of women
were given different duties. These duties included serving tea, cleaning,
and hostessing, all of which are tasks generally done by a wife for her
husband. Thus in some instances domestic roles determine tasks
assigned in the workplace.
From the informants' responses a Japanese definition of gender
discrimination was formulated. Culturally, gender discrimination was
noted in terms of treating women differently than men, but also included
improper sexual advances. A full 80% of the study's informants
acknowledged the existence of gender discrimination in the Japanese
workplace.
Finally, from this sample it was determined that cultural
relativism, internal labor market theory, and human capital theory are all
compatible tools for analysis of the Japanese labor market
Performance of various quantum key distribution systems using 1.55 um up-conversion single-photon detectors
We compare the performance of various quantum key distribution (QKD) systems
using a novel single-photon detector, which combines frequency up-conversion in
a periodically poled lithium niobate (PPLN) waveguide and a silicon avalanche
photodiode (APD). The comparison is based on the secure communication rate as a
function of distance for three QKD protocols: the Bennett-Brassard 1984 (BB84),
the Bennett, Brassard, and Mermin 1992 (BBM92), and the coherent differential
phase shift keying (DPSK). We show that the up-conversion detector allows for
higher communication rates and longer communication distances than the commonly
used InGaAs/InP APD for all the three QKD protocols.Comment: 9 pages, 9 figure
A high-performance integrated single-photon detector for telecom wavelengths
We have integrated a commercial avalanche photodiode (APD) and the circuitry
needed to operate it as a single-photon detector (SPD) onto a single PC-board.
At temperatures accessible with Peltier coolers (~200-240K), the PCB-SPD
achieves high detection efficiency (DE) at 1308 and 1545 nm with low dark count
probability (e.g. ~10-6/bias pulse at DE=20%, 220 K), making it useful for
quantum key distribution (QKD). The board generates fast bias pulses, cancels
noise transients, amplifies the signals, and sends them to an on-board
discriminator. A digital blanking circuit suppresses afterpulsing.Comment: (10 pages, 6 figures
Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors
Quantum Key Distribution with the BB84 protocol has been shown to be
unconditionally secure even using weak coherent pulses instead of single-photon
signals. The distances that can be covered by these methods are limited due to
the loss in the quantum channel (e.g. loss in the optical fiber) and in the
single-photon counters of the receivers. One can argue that the loss in the
detectors cannot be changed by an eavesdropper in order to increase the covered
distance. Here we show that the security analysis of this scenario is not as
easy as is commonly assumed, since already two-photon processes allow
eavesdropping strategies that outperform the known photon-number splitting
attack. For this reason there is, so far, no satisfactory security analysis
available in the framework of individual attacks.Comment: 11 pages, 6 figures; Abstract and introduction extended, Appendix
added, references update
Theory of Spontaneous Polarization of Endohedral Fullerenes
A pseudo-Jahn-Teller model describing central atom distortions is proposed
for endohedral fullerenes of the form A@C where A is either a rare gas
or a metal atom. A critical (dimensionless) coupling is found, below
which the symmetric configuration is stable and above which inversion symmetry
is broken. Vibronic parameters are given for selected endohedral fullerenes.Comment: 4 pages, REVTEX, 1 Postscript figure. [Phys. Rev. Lett. (in press)
Order out of Randomness : Self-Organization Processes in Astrophysics
Self-organization is a property of dissipative nonlinear processes that are
governed by an internal driver and a positive feedback mechanism, which creates
regular geometric and/or temporal patterns and decreases the entropy, in
contrast to random processes. Here we investigate for the first time a
comprehensive number of 16 self-organization processes that operate in
planetary physics, solar physics, stellar physics, galactic physics, and
cosmology. Self-organizing systems create spontaneous {\sl order out of chaos},
during the evolution from an initially disordered system to an ordered
stationary system, via quasi-periodic limit-cycle dynamics, harmonic mechanical
resonances, or gyromagnetic resonances. The internal driver can be gravity,
rotation, thermal pressure, or acceleration of nonthermal particles, while the
positive feedback mechanism is often an instability, such as the
magneto-rotational instability, the Rayleigh-B\'enard convection instability,
turbulence, vortex attraction, magnetic reconnection, plasma condensation, or
loss-cone instability. Physical models of astrophysical self-organization
processes involve hydrodynamic, MHD, and N-body formulations of Lotka-Volterra
equation systems.Comment: 61 pages, 38 Figure
- …