61,885 research outputs found

    Optimal measurement precision of a nonlinear interferometer

    Full text link
    We study the best attainable measurement precision when a double-well trap with bosons inside acts as an interferometer to measure the energy difference of the atoms on the two sides of the trap. We introduce time independent perturbation theory as the main tool in both analytical arguments and numerical computations. Nonlinearity from atom-atom interactions will not indirectly allow the interferometer to beat the Heisenberg limit, but in many regimes of the operation the Heisenberg limit scaling of measurement precision is preserved in spite of added tunneling of the atoms and atom-atom interactions, often even with the optimal prefactor.Comment: very close to published versio

    Wave mixing of optical pulses and Bose-Einstein condensates

    Full text link
    We investigate theoretically the four-wave mixing of optical and matter waves resulting from the scattering of a short light pulse off an atomic Bose-Einstein condensate, as recently demonstrated by D. Schneble {\em et al.} [ Science {\bf 300}, 475 (2003)]. We show that atomic ``pair production'' from the condensate results in the generation of both forward- and backward-propagating matter waves. These waves are characterized by different phase-matching conditions, resulting in different angular distributions and temporal evolutions.Comment: 4+\epsilon pages, 3 figure

    Nonmonotonic behavior of resistance in a superconductor-Luttinger liquid junction

    Full text link
    Transport through a superconductor-Luttinger liquid junction is considered. When the interaction in the Luttinger liquid is repulsive, the resistance of the junction with a sufficiently clean interface shows nonmonotonic temperature- or voltage-dependence due to the competition between the superconductivity and the repulsive interaction. The result is discussed in connection with recent experiments on single-wall carbon nanotubes in contact with superconducting leads.Comment: Revtex4, 2 eps figure files, slightly revised from an earlier version submitted to PRL on 2001.12.

    Parallel processing architecture for computing inverse differential kinematic equations of the PUMA arm

    Get PDF
    In advanced robot control problems, on-line computation of inverse Jacobian solution is frequently required. Parallel processing architecture is an effective way to reduce computation time. A parallel processing architecture is developed for the inverse Jacobian (inverse differential kinematic equation) of the PUMA arm. The proposed pipeline/parallel algorithm can be inplemented on an IC chip using systolic linear arrays. This implementation requires 27 processing cells and 25 time units. Computation time is thus significantly reduced

    Ubiquitin C-terminal hydrolase37 regulates Tcf7 DNA binding for the activation of Wnt signalling

    Get PDF
    The Tcf/Lef family of transcription factors mediates the Wnt/��-catenin pathway that is involved in a wide range of biological processes, including vertebrate embryogenesis and diverse pathogenesis. Post-translational modifications, including phosphorylation, sumoylation and acetylation, are known to be important for the regulation of Tcf/Lef proteins. However, the importance of ubiquitination and ubiquitin-mediated regulatory mechanisms for Tcf/Lef activity are still unclear. Here, we newly show that ubiquitin C-terminal hydrolase 37 (Uch37), a deubiquitinase, interacts with Tcf7 (formerly named Tcf1) to activate Wnt signalling. Biochemical analyses demonstrated that deubiquitinating activity of Uch37 is not involved in Tcf7 protein stability but is required for the association of Tcf7 to target gene promoter in both Xenopus embryo and human liver cancer cells. In vivo analyses further revealed that Uch37 functions as a positive regulator of the Wnt/��-catenin pathway downstream of ��-catenin stabilization that is required for the expression of ventrolateral mesoderm genes during Xenopus gastrulation. Our study provides a new mechanism for chromatin occupancy of Tcf7 and uncovers the physiological significance of Uch37 during early vertebrate development by regulating the Wnt/��-catenin pathway. ? 2017 The Author(s).113Ysciescopu

    A key to room-temperature ferromagnetism in Fe-doped ZnO: Cu

    Full text link
    Successful synthesis of room-temperature ferromagnetic semiconductors, Zn1x_{1-x}Fex_{x}O, is reported. The essential ingredient in achieving room-temperature ferromagnetism in bulk Zn1x_{1-x}Fex_{x}O was found to be additional Cu doping. A transition temperature as high as 550 K was obtained in Zn0.94_{0.94}Fe0.05_{0.05}Cu0.01_{0.01}O; the saturation magnetization at room temperature reached a value of 0.75μB0.75 \mu_{\rm B} per Fe. Large magnetoresistance was also observed below 100100 K.Comment: 11 pages, 4 figures; to appear in Appl. Phys. Let

    Cooperative Secure Transmission by Exploiting Social Ties in Random Networks

    Full text link
    Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications, such as resource sharing, cooperative communication and so on. In this paper, we propose a hybrid cooperative beamforming and jamming scheme to secure communication based on the social trust degree under a stochastic geometry framework. The friendly nodes are categorized into relays and jammers according to their locations and social trust degrees with the source node. We aim to analyze the involved connection outage probability (COP) and secrecy outage probability (SOP) of the performance in the networks. To achieve this target, we propose a double Gamma ratio (DGR) approach through Gamma approximation. Based on this, the COP and SOP are tractably obtained in closed-form. We further consider the SOP in the presence of Poisson Point Process (PPP) distributed eavesdroppers and derive an upper bound. The simulation results verify our theoretical findings, and validate that the social trust degree has dramatic influences on the security performance in the networks.Comment: 30 pages, 11 figures, to be published in IEEE Transactions on Communication
    corecore