1,688 research outputs found

    Studies of the genetics and physiology of a nitrate non-utilizing strain of Neurospora

    Get PDF
    Studies of the genetics andphysiology of a nitrate non-utilizing strain of Neurospor

    High country river processes : a technical discussion of results from research on the Kowai River system, Springfield, Canterbury

    Get PDF
    A sub-catchment (Torlesse Stream) of the Kowai River, Canterbury, has been the site of an interdisciplinary study of the relationships between erosion and stream sedimentation (Hayward 1975). It was logical to extend the stream sediment investigation of that study (Hayward 1978) into the Kowai system proper in order to establish changes in the nature and distribution of the stream sediments with distance downstream. The sediment sampling study, comprising Part I of Paper A in this volume, analyses the changes in size, distribution, form and rock type of the river gravels from ahead water mountain stream to the wide braided river beds of the middle reaches of the Kowai River. Part 2 of Paper A discusses the possible implications for the management that these sediment studies have for this and other similar river systems. It is believed that if thought necessary it is possible to design a river training programme to guide the river towards a more manageable pattern. Paper B of this volume compares the results of the present river gravel survey with those from a sedimentological analysis of fluvio-glacial outwash gravels deposited several thousand years ago within the lower reaches of the Kowai system. This comparative study is used to indicate differences in the hydrologic environment prevailing at their respective times of deposition, and aids in our understanding of the processes at work in hill and high country rivers today. Both Papers A and B relate to the Kowai River system, but the authors wish to emphasise that the findings from these studies are believed to have application to other similar gravel bed river systems

    Single particle multipole expansions from Micromagnetic Tomography

    Get PDF
    Micromagnetic tomography aims at reconstructing large numbers of individual magnetizations of magnetic particles from combining high-resolution magnetic scanning techniques with micro X-ray computed tomography (microCT). Previous work demonstrated that dipole moments can be robustly inferred, and mathematical analysis showed that the potential field of each particle is uniquely determined. Here, we describe a mathematical procedure to recover higher orders of the magnetic potential of the individual magnetic particles in terms of their spherical harmonic expansions (SHE). We test this approach on data from scanning superconducting quantum interference device microscopy and microCT of a reference sample. For particles with high signal-to-noise ratio of the magnetic scan we demonstrate that SHE up to order n=3n=3 can be robustly recovered. This additional level of detail restricts the possible internal magnetization structures of the particles and provides valuable rock magnetic information with respect to their stability and reliability as paleomagnetic remanence carriers. Micromagnetic tomography therefore enables a new approach for detailed rock magnetic studies on large ensembles of individual particles.Comment: 21 pages, 4 Figures, 3 Tables. For Supplemental Material see "Ancillary files" in this arxiv websit

    How to share a quantum secret

    Full text link
    We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains absolutely no information about the secret. We show that the only constraint on the existence of threshold schemes comes from the quantum "no-cloning theorem", which requires that n < 2k, and, in all such cases, we give an efficient construction of a ((k,n)) threshold scheme. We also explore similarities and differences between quantum secret sharing schemes and quantum error-correcting codes. One remarkable difference is that, while most existing quantum codes encode pure states as pure states, quantum secret sharing schemes must use mixed states in some cases. For example, if k <= n < 2k-1 then any ((k,n)) threshold scheme must distribute information that is globally in a mixed state.Comment: 5 pages, REVTeX, submitted to PR

    Evaluation of a hospital-based integrated model of eye care for diabetic retinopathy assessment: A multimethod study

    Full text link
    Objectives Diabetic eye disease is a leading cause of blindness but can be mitigated by regular eye assessment. A framework of issues, developed from the literature of barriers to eye assessment, was used to structure an examination of perceptions of a new model of care for diabetic retinopathy from the perspective of staff using the model, and health professionals referring patients to the new service. Design Multimethod: interviews and focus groups, and a separate survey. Setting A new clinic based on an integrated model of care was established at a hospital in outer metropolitan Sydney, Australia in 2017. Funded jointly by Centre for Eye Health (CFEH) and the hospital, the clinic was equipped and staffed by optometrists who work alongside the ophthalmologists in the existing hospital eye clinic. Participants Five (of seven) hospital staff working in the clinic (ophthalmologists and administrative officers) or referring to it from other departments (endocrinologists); nine optometrists from CFEH who developed or worked in the clinic; 10 community-based optometrists as potential referrers. Results The new clinic was considered to have addressed known barriers to eye assessment, including access, assistance for patients unable/unwilling to organise eye checks and efficient management of human resources. The clinic optimised known drivers of this model of care: providing clear scope of practice and protocols for shared care between optometrists and ophthalmologists, good communication between referrers and eye professionals and a collegial approach promoting interprofessional trust. Remaining areas of concern were few referrals from general practitioners, fewer referrals from hospital endocrinologists than expected and issues with stretched administrative capacity. There were also perceived mismatches between the priorities of hospital management and aims of the clinic. Conclusions The new model was considered to have addressed many of the barriers to assessment. While there remain issues with the model, there were also unexpected benefits

    Some Directions beyond Traditional Quantum Secret Sharing

    Full text link
    We investigate two directions beyond the traditional quantum secret sharing (QSS). First, a restriction on QSS that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets is permissible, provided some shares are withheld by the share dealer. We show that no more than λ1\lambda-1 withheld shares are required, where λ\lambda is the minimum number of {\em partially linked classes} among the authorized sets for the QSS. Our result means that such applications of QSS need not be thwarted by the no-cloning theorem. Secondly, we point out a way of combining the features of QSS and quantum key distribution (QKD) for applications where a classical information is shared by quantum means. We observe that in such case, it is often possible to reduce the security proof of QSS to that of QKD.Comment: To appear in Physica Scripta, 7 pages, 1 figure, subsumes arXiv:quant-ph/040720
    corecore