215,795 research outputs found

    Implementation of a Quantum Algorithm to Solve Deutsch's Problem on a Nuclear Magnetic Resonance Quantum Computer

    Get PDF
    We demonstrate the use of an NMR quantum computer based on the pyrimidine base cytosine, and the implementation of a quantum algorithm to solve Deutsch's problem.Comment: 16 pages including 6 figures. Minor clarifications as requested by the referee plus updated references. Journal of Chemical Physics, in press (expected publication date August 1st 1998

    Internet-Facilitated Commercial Sexual Exploitation of Children.

    Get PDF
    This bulletin summarizes findings from the Internet‐Facilitated Commercial Sexual Exploitation of Children (IF‐CSEC) component of the 2006 Second National Juvenile Online Victimization study. Following are some key findings from the Office of Juvenile Justice and Delinquency Prevention‐sponsored study: • An estimated 569 arrests for IF‐CSEC were made in the United States in 2006; more than half of the arrests involved the offender marketing and selling child pornography. • Most offenders (83%) purchased child pornography or sex with a minor, but an important minority (17%) profited from the exploitation. Profiteers appeared to be more seasoned offenders who were involved in larger, organized networks of criminals, such as prostitution and human trafficking rings. • Many offenders (39%) were acquaintances of the IF‐CSEC victims, 23% were family members, and 17% were people the victims had met online. The rest were mostly pimps. • Compared with victims of Internet sexual crimes that do not involve a commercial aspect, a greater per‐ centage of IF‐CSEC victims, as part of the current crime, were assaulted, given drugs or alcohol, and were the subject of child pornography

    Taking over someone else's design: implications for the tutor's role in networked learning

    Get PDF
    The experience of taking over an already designed Web-based course helps us to investigate the claims in the literature about the role that tutors have more generally in networked learning. This paper addresses this issue through a case study and brings together the tutor's experience and her reflective diary, as well as the interview data from a JISC/CALT phenomenographic study of tutors' and students' experiences. This particular case study raises issues about the tutors' role, teaching activity, design and the value of content resources and knowledge representation. Finally the paper reflects on the implications for the tutor in this situation and provides suggestions for future practice

    Towards an integrated and interoperable platform for telehealth and telecare

    Get PDF
    Copyright @ 2012 International Journal of Integrated Care (IJIC). This work is licensed under a (http://creativecommons.org/licenses/by/3.0) Creative Commons Attribution 3.0 Unported License.We present experience of implementing and evaluating a platform purpose designed to integrate interoperable telehealth and telecare. We chose the IEEE 11073 standards for all devices and used ZigBee wireless to support many devices concurrently and exploit its mesh networking to extend range around the entire house. We designed the home gateway to be unobtrusive; in project Hydra we used the smart meter and in other projects (Reaction, inCasa) we have developed a purpose designed plugtop ZigBee to GPRS gateway. All use common protocols and are interoperable. Technically the projects have been a success, and we have already implemented a wide range of devices on the common platform (BP, weight, SpO2, glucose, PIR, medication monitor, bed/chair sensor). Immediate feedback from participants has confirmed our goal of simplicity and convenience of use (and thus encourage adherence); and it is interesting that in discussion they then focus on the data rather than the technology. Our current goal is to exploit the potential for combination of physiological and environmental data to determine if change of habits can be detected and how this correlates with change in health. We are using this functionality to manage the frail elderly within project inCasa and we propose to present preliminary findings

    Revising the Solution of the Neutrino Oscillation Parameter Degeneracies at Neutrino Factories

    Full text link
    In the context of neutrino factories, we review the solution of the degeneracies in the neutrino oscillation parameters. In particular, we have set limits to sin⁡22θ13\sin^2 2\theta_{13} in order to accomplish the unambiguous determination of θ23\theta_{23} and δ\delta. We have performed two different analysis. In the first, at a baseline of 3000 km, we simulate a measurement of the channels νe→νμ\nu_e\to\nu_\mu, νe→ντ\nu_e\to\nu_\tau and νˉμ→νˉμ\bar{\nu}_\mu\to\bar{\nu}_\mu, combined with their respective conjugate ones, with a muon energy of 50 GeV and a running time of five years. In the second, we merge the simulated data obtained at L=3000 km with the measurement of νe→νμ\nu_e\to\nu_\mu channel at 7250 km, the so called 'magic baseline'. In both cases, we have studied the impact of varying the ντ\nu_\tau detector efficiency-mass product, (ϵντ×Mτ)(\epsilon_{\nu_\tau}\times M_\tau), at 3000 km, keeping unchanged the νμ\nu_\mu detector mass and its efficiency. At L=3000 km, we found the existance of degenerate zones, that corresponds to values of θ13\theta_{13}, which are equal or almost equal to the true ones. These zones are extremely difficult to discard, even when we increase the number of events. However, in the second scenario, this difficulty is overcomed, demostrating the relevance of the 'magic baseline'. From this scenario, the best limits of sin⁡22θ13\sin^2 2\theta_{13}, reached at 3σ3\sigma, for sin⁡22θ23=0.95\sin^2 2\theta_{23}=0.95, 0.975 and 0.99 are: 0.008, 0.015 and 0.045, respectively, obtained at δ=0\delta=0, and considering (ϵντ×Mτ)≈125(\epsilon_{\nu_\tau}\times M_\tau) \approx 125, which is five times the initial efficiency-mass combination.Comment: 40 pages, 18 figures; added references, corrected typos, updated Eq (15c

    Youth Internet Safety Study (YISS): Methodology Report.

    Get PDF
    The Youth Internet Safety Surveys (YISS‐1, YISS‐2, and YISS‐3) were conducted in order to quantify and detail youth experiences with unwanted or problematic Internet experiences including sexual solicitations, harassment, and unwanted exposure to pornography on the Internet. YISS‐3 collected additional information about youth produced sexual images (YPSI) or “sexting.” The YISS‐1, YISS‐2 and YISS‐3 studies were conducted in 2000, 2005 and 2010, respectively, providing important comparative information on changes in the numbers of youth reporting unwanted or problematic Internet experiences at 5‐year intervals since 2000. This is a critical timeframe for observation given the sharp rise in the use of Internet and new technologies by youth from 2000‐2010 1 . The YISS were conducted via telephone surveys with separate national samples of 1500 youth Internet users, ages 10 to 17, and their parents. A sample size of 1,500 was pre‐determined based upon a maximum expected sampling error of +/‐2.5% at the 5% significance level. Human subject participation in the YISS studies were reviewed and approved by the University of New Hampshire Institutional Review Board (IRB) and conformed to the rules mandated for research projects funded by the U.S. Department of Justice

    Towards a theory of heuristic and optimal planning for sequential information search

    No full text
    • …
    corecore