20,612 research outputs found

    Monotonicity results and bounds for the inverse hyperbolic sine

    Get PDF
    In this note, we present monotonicity results of a function involving to the inverse hyperbolic sine. From these, we derive some inequalities for bounding the inverse hyperbolic sine.Comment: 3 page

    C-Cl Bond Fission, Hcl Elimination, And Secondary Radical Decomposition In The 193 Nm Photodissociation Of Allyl Chloride

    Get PDF
    The primary photodissociation dynamics of allyl chloride upon excitation at 193 nm is investigated in a crossed laser-molecular beam scattering apparatus. Tunable vacuum ultraviolet (VUV) photoionization of the products provides a unique ability to learn about the secondary reaction products of the nascent photoproducts formed. The data show evidence for four significant primary reaction channels: a previously unidentified low kinetic energy C-Cl bond fission channel producing unstable allyl radicals, an excited state C-Cl bond fission channel producing Cl atoms with high translational energy, an HCl elimination pathway releasing significant energy to product translation to HCl and its momentum-matched mass 40 partner, and an HCl elimination channel producing low kinetic energy HCl products and predominantly unstable mass 40 products. The measured branching of these primary reaction channels of [all C-Cl] : [fast C-Cl] : [slow C-Cl] : [fast HCl] : [slow HCl] : [all HCl] is 1.00: 0.971: 0.029: 0.291: 0.167: 0.458 (where fast refers to the high recoil kinetic energy channels). The high internal energy allyl radicals formed in the slow C-Cl fission pathway of allyl chloride further dissociate/isomerize, as do the unstable mass 40 products formed in the HCl elimination pathways, and these products are investigated. Photoionization efficiency (PIE) curves of the HCl product suggest that a three-centered elimination mechanism contributes significantly to an observed HCl elimination reaction. (C) 2002 American Institute of Physics

    Epitaxial graphene on SiC(0001): More than just honeycombs

    Full text link
    The potential of graphene to impact the development of the next generation of electronics has renewed interest in its growth and structure. The graphitization of hexagonal SiC surfaces provides a viable alternative for the synthesis of graphene, with wafer-size epitaxial graphene on SiC(0001) now possible. Despite this recent progress, the exact nature of the graphene-SiC interface and whether the graphene even has a semiconducting gap remain controversial. Using scanning tunneling microscopy with functionalized tips and density functional theory calculations, here we show that the interface is a warped carbon sheet consisting of three-fold hexagon-pentagon-heptagon complexes periodically inserted into the honeycomb lattice. These defects relieve the strain between the graphene layer and the SiC substrate, while still retaining the three-fold coordination for each carbon atom. Moreover, these defects break the six-fold symmetry of the honeycomb, thereby naturally inducing a gap: the calculated band structure of the interface is semiconducting and there are two localized states near K below the Fermi level, explaining the photoemission and carbon core-level data. Nonlinear dispersion and a 33 meV gap are found at the Dirac point for the next layer of graphene, providing insights into the debate over the origin of the gap in epitaxial graphene on SiC(0001). These results indicate that the interface of the epitaxial graphene on SiC(0001) is more than a dead buffer layer, but actively impacts the physical and electronic properties of the subsequent graphene layers

    A comparison of robust Mendelian randomization methods using summary data.

    Get PDF
    The number of Mendelian randomization (MR) analyses including large numbers of genetic variants is rapidly increasing. This is due to the proliferation of genome-wide association studies, and the desire to obtain more precise estimates of causal effects. Since it is unlikely that all genetic variants will be valid instrumental variables, several robust methods have been proposed. We compare nine robust methods for MR based on summary data that can be implemented using standard statistical software. Methods were compared in three ways: by reviewing their theoretical properties, in an extensive simulation study, and in an empirical example. In the simulation study, the best method, judged by mean squared error was the contamination mixture method. This method had well-controlled Type 1 error rates with up to 50% invalid instruments across a range of scenarios. Other methods performed well according to different metrics. Outlier-robust methods had the narrowest confidence intervals in the empirical example. With isolated exceptions, all methods performed badly when over 50% of the variants were invalid instruments. Our recommendation for investigators is to perform a variety of robust methods that operate in different ways and rely on different assumptions for valid inferences to assess the reliability of MR analyses

    Concise sharpening and generalizations of Shafer's inequality for the arc sine function

    Full text link
    In this paper, by a concise and elementary approach, we sharpen and generalize Shafer's inequality for the arc sine function, and some known results are extended and generalized.Comment: 5 page

    Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

    Full text link
    Unconditional security proofs of various quantum key distribution (QKD) protocols are built on idealized assumptions. One key assumption is: the sender (Alice) can prepare the required quantum states without errors. However, such an assumption may be violated in a practical QKD system. In this paper, we experimentally demonstrate a technically feasible "intercept-and-resend" attack that exploits such a security loophole in a commercial "plug & play" QKD system. The resulting quantum bit error rate is 19.7%, which is below the proven secure bound of 20.0% for the BB84 protocol. The attack we utilize is the phase-remapping attack (C.-H. F. Fung, et al., Phys. Rev. A, 75, 32314, 2007) proposed by our group.Comment: 16 pages, 6 figure

    Some integral inequalities on time scales

    Full text link
    In this paper, some new integral inequalities on time scales are presented by using elementarily analytic methods in calculus of time scales.Comment: 8 page
    • …
    corecore