215,795 research outputs found
Implementation of a Quantum Algorithm to Solve Deutsch's Problem on a Nuclear Magnetic Resonance Quantum Computer
We demonstrate the use of an NMR quantum computer based on the pyrimidine
base cytosine, and the implementation of a quantum algorithm to solve Deutsch's
problem.Comment: 16 pages including 6 figures. Minor clarifications as requested by
the referee plus updated references. Journal of Chemical Physics, in press
(expected publication date August 1st 1998
Recommended from our members
Variable domain transformation for linear PAC analysis of mixed-signal systems
This paper describes a method to perform linear AC analysis on mixed-signal systems which appear strongly nonlinear in the voltage domain but are linear in other variable domains. Common circuits like phase/delay-locked loops and duty-cycle correctors fall into this category, since they are designed to be linear with respect to phases, delays, and duty-cycles of the input and output clocks, respectively. The method uses variable domain translators to change the variables to which the AC perturbation is applied and from which the AC response is measured. By utilizing the efficient periodic AC (PAC) analysis available in commercial RF simulators, the circuitâs linear transfer function in the desired variable domain can be characterized without relying on extensive transient simulations. Furthermore, the variable domain translators enable the circuits to be macromodeled as weakly-nonlinear systems in the chosen domain and then converted to voltage-domain models, instead of being modeled as strongly-nonlinear systems directly
Internet-Facilitated Commercial Sexual Exploitation of Children.
This bulletin summarizes findings from the InternetâFacilitated Commercial Sexual Exploitation of Children (IFâCSEC) component of the 2006 Second National Juvenile Online Victimization study. Following are some key findings from the Office of Juvenile Justice and Delinquency Preventionâsponsored study: ⢠An estimated 569 arrests for IFâCSEC were made in the United States in 2006; more than half of the arrests involved the offender marketing and selling child pornography. ⢠Most offenders (83%) purchased child pornography or sex with a minor, but an important minority (17%) profited from the exploitation. Profiteers appeared to be more seasoned offenders who were involved in larger, organized networks of criminals, such as prostitution and human trafficking rings. ⢠Many offenders (39%) were acquaintances of the IFâCSEC victims, 23% were family members, and 17% were people the victims had met online. The rest were mostly pimps. ⢠Compared with victims of Internet sexual crimes that do not involve a commercial aspect, a greater perâ centage of IFâCSEC victims, as part of the current crime, were assaulted, given drugs or alcohol, and were the subject of child pornography
Taking over someone else's design: implications for the tutor's role in networked learning
The experience of taking over an already designed Web-based course helps us to investigate the claims in the literature about the role that tutors have more generally in networked learning. This paper addresses this issue through a case study and brings together the tutor's experience and her reflective diary, as well as the interview data from a JISC/CALT phenomenographic study of tutors' and students' experiences. This particular case study raises issues about the tutors' role, teaching activity, design and the value of content resources and knowledge representation. Finally the paper reflects on the implications for the tutor in this situation and provides suggestions for future practice
Towards an integrated and interoperable platform for telehealth and telecare
Copyright @ 2012 International Journal of Integrated Care (IJIC). This work is licensed under a (http://creativecommons.org/licenses/by/3.0) Creative Commons Attribution 3.0 Unported License.We present experience of implementing and evaluating a platform purpose designed to integrate interoperable telehealth and telecare. We chose the IEEE 11073 standards for all devices and used ZigBee wireless to support many devices concurrently and exploit its mesh networking to extend range around the entire house. We designed the home gateway to be unobtrusive; in project Hydra we used the smart meter and in other projects (Reaction, inCasa) we have developed a purpose designed plugtop ZigBee to GPRS gateway. All use common protocols and are interoperable. Technically the projects have been a success, and we have already implemented a wide range of devices on the common platform (BP, weight, SpO2, glucose, PIR, medication monitor, bed/chair sensor). Immediate feedback from participants has confirmed our goal of simplicity and convenience of use (and thus encourage adherence); and it is interesting that in discussion they then focus on the data rather than the technology. Our current goal is to exploit the potential for combination of physiological and environmental data to determine if change of habits can be detected and how this correlates with change in health. We are using this functionality to manage the frail elderly within project inCasa and we propose to present preliminary findings
Revising the Solution of the Neutrino Oscillation Parameter Degeneracies at Neutrino Factories
In the context of neutrino factories, we review the solution of the
degeneracies in the neutrino oscillation parameters. In particular, we have set
limits to in order to accomplish the unambiguous
determination of and . We have performed two different
analysis. In the first, at a baseline of 3000 km, we simulate a measurement of
the channels , and
, combined with their respective conjugate ones,
with a muon energy of 50 GeV and a running time of five years. In the second,
we merge the simulated data obtained at L=3000 km with the measurement of
channel at 7250 km, the so called 'magic baseline'. In both
cases, we have studied the impact of varying the detector
efficiency-mass product, , at 3000 km,
keeping unchanged the detector mass and its efficiency. At L=3000 km,
we found the existance of degenerate zones, that corresponds to values of
, which are equal or almost equal to the true ones. These zones
are extremely difficult to discard, even when we increase the number of events.
However, in the second scenario, this difficulty is overcomed, demostrating the
relevance of the 'magic baseline'. From this scenario, the best limits of
, reached at , for ,
0.975 and 0.99 are: 0.008, 0.015 and 0.045, respectively, obtained at
, and considering ,
which is five times the initial efficiency-mass combination.Comment: 40 pages, 18 figures; added references, corrected typos, updated Eq
(15c
Recommended from our members
Fast, non-monte-carlo estimation of transient performance variation due to device mismatch
This paper describes an efficient way of simulating the effects of device random mismatch on circuit transient characteristics, such as variations in delay or in frequency. The proposed method models DC random offsets as equivalent AC pseudo-noises and leverages the fast, linear periodically time-varying (LPTV) noise analysis available from RF circuit simulators. Therefore, the method can be considered as an extension to DC match analysis and offers a large speed-up compared to the traditional Monte-Carlo analysis. Although the assumed linear perturbation model is valid only for small variations, it enables easy ways to estimate correlations among variations and identify the most sensitive design parameters to mismatch, all at no additional simulation cost. Three benchmarks measuring the variations in the input offset voltage of a clocked comparator, the delay of a logic path, and the frequency of an oscillator demonstrate the speed improvement of about 100-1000x compared to a 1000-point Monte-Carlo method
Youth Internet Safety Study (YISS): Methodology Report.
The Youth Internet Safety Surveys (YISSâ1, YISSâ2, and YISSâ3) were conducted in order to quantify and detail youth experiences with unwanted or problematic Internet experiences including sexual solicitations, harassment, and unwanted exposure to pornography on the Internet. YISSâ3 collected additional information about youth produced sexual images (YPSI) or âsexting.â The YISSâ1, YISSâ2 and YISSâ3 studies were conducted in 2000, 2005 and 2010, respectively, providing important comparative information on changes in the numbers of youth reporting unwanted or problematic Internet experiences at 5âyear intervals since 2000. This is a critical timeframe for observation given the sharp rise in the use of Internet and new technologies by youth from 2000â2010 1 . The YISS were conducted via telephone surveys with separate national samples of 1500 youth Internet users, ages 10 to 17, and their parents. A sample size of 1,500 was preâdetermined based upon a maximum expected sampling error of +/â2.5% at the 5% significance level. Human subject participation in the YISS studies were reviewed and approved by the University of New Hampshire Institutional Review Board (IRB) and conformed to the rules mandated for research projects funded by the U.S. Department of Justice
- âŚ