31,787 research outputs found
Early development and predictors of morphological awareness: disentangling the impact of decoding skills and phonological awareness
Background: Morphological Awareness (MA) has been demonstrated to be influential on the
reading outcomes of children and adults. Yet, little is known regarding MA's early development.
Aim: The aim of this study is to better understand MA at different stages of development and its
association with Phonological Awareness (PA) and reading.
Methods and procedures: In a longitudinal design the development of MA was explored in a group
of pre-reading children with a family risk of dyslexia and age-matched controls from kindergarten
up to and including grade 2.
Outcomes and results: MA deficits were observed in the group with literacy difficulties at all time
points. PA was only found to make a significant contribution to MA development at the early
stages of formal reading instruction. While first-grade decoding skills were found to contribute
significantly to MA in second grade.
Conclusions: Evidence supporting a bidirectional relation was found and supports the need for
adequate MA intervention and explicit instruction for “at risk” children in the early stages of
literacy instruction
Key Management Building Blocks for Wireless Sensor Networks
Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly. First of all, the necessary keys need to be distributed to the nodes before the nodes are deployed in the field, in such a way that any two or more nodes that need to communicate securely can establish a session key. Then, the session keys need to be refreshed from time to time to prevent birthday attacks. Finally, in case any of the nodes is found to be compromised, the key ring of the compromised node needs to be revoked and some or all of the compromised keys might need to be replaced. These processes, together with the policies and techniques needed to support them, are called key management. The facts that WSNs (1) are generally not tamper-resistant; (2) operate unattended; (3) communicate in an open medium; (4) have no fixed infrastructure and pre-configured topology; (5) have severe hardware and resource constraints, present unique challenges to key management. In this article, we explore techniques for meeting these challenges. What distinguishes our approach from a routine literature survey is that, instead of comparing various known schemes, we set out to identify the basic cryptographic principles, or building blocks that will allow practitioners to set up their own key management framework using these building blocks
Dynamics of atomic spin-orbit-state wave packets produced by short-pulse laser photodetachment
We analyse the experiment by Hultgren et al. [Phys. Rev. A {\bf 87}, 031404
(2013)] on orbital alignment and quantum beats in coherently excited atomic
fine-structure manifolds produced by short-pulse laser photodetachment of
C, Si and Ge negative ions, and derive a formula that describes the
beats. Analysis of the experimental data enables us to extract the non-coherent
background contribution for each species, and indicates the need for a full
density matrix treatment of the problem
Comment on "Direct photodetachment of F by mid-infrared few-cycle femtosecond laser pulses"
Multiphoton detachment of F by strong few-cycle laser pulses was studied
by Shearer and Monteith using a Keldysh-type approach [Phys. Rev. A 88, 033415
(2013)]. We believe that this work contained errors in the calculation of the
detachment amplitude and photoelectron spectra. We describe the necessary
corrections to the theory and show that the results, in particular, the
interference features of the photoelectron spectra, appear noticeably
different.Comment: 9 pages, 4 figure
R2P: Activating the International Community’s Responsibility to Protect by Shifting Focus Away from Collective Action by the Security Council Towards Early Warning and Prevention
The responsibility to protect (R2P) is an expression of policy which aims to prevent mass atrocities or stop them if they are underway. Consensus on the international aspect, which includes when states can or should intervene to protect citizens other than their own, remains elusive. An observer might well conclude that R2P is a noble idea which is short on effectiveness. This article will examine whether R2P can lift off and move from theory to practice. How R2P has developed to date will be considered first, then the obstacles that have hindered its progress and how these might be circumvented. The final focus will be on the elements which need to come together for R2P to be activated. The conclusion will be reached that R2P can only gain real traction by looking past the Security Council to other bodies, within and outside the UN, to work together at the early warning and prevention stage. Consensus on if and when states can intervene militarily to protect is as distant as ever. It will also be concluded that R2P remains a policy aspiration and will not crystallise into a legal norm in the foreseeable future
A High Contrast Imaging Survey of SIM Lite Planet Search Targets
With the development of extreme high contrast ground-based adaptive optics
instruments and space missions aimed at detecting and characterizing Jupiter-
and terrestrial-mass planets, it is critical that each target star be
thoroughly vetted to determine whether it is a viable target given both the
instrumental design and scientific goals of the program. With this in mind, we
have conducted a high contrast imaging survey of mature AFGKM stars with the
PALAO/PHARO instrument on the Palomar 200 inch telescope. The survey reached
sensitivities sufficient to detect brown dwarf companions at separations of >
50 AU. The results of this survey will be utilized both by future direct
imaging projects such as GPI, SPHERE and P1640 and indirect detection missions
such as SIM Lite. Out of 84 targets, all but one have no close-in (0.45-1")
companions and 64 (76%) have no stars at all within the 25" field-of-view. The
sensitivity contrasts in the Ks passband ranged from 4.5 to 10 for this set of
observations. These stars were selected as the best nearby targets for
habitable planet searches owing to their long-lived habitable zones (> 1
billion years). We report two stars, GJ 454 and GJ 1020, with previously
unpublished proper motion companions. In both cases, the companions are stellar
in nature and are most likely M dwarfs based on their absolute magnitudes and
colors. Based on our mass sensitivities and level of completeness, we can place
an upper limit of ~17% on the presence of brown dwarf companions with masses
>40 MJ at separations of 1 arcsecond. We also discuss the importance of
including statistics on those stars with no detected companions in their field
of view for the sake of future companion searches and an overall understanding
of the population of low-mass objects around nearby stars.Comment: Accepted to PASP, Figure 7 available upon reques
A new probe of the small-scale primordial power spectrum: astrometric microlensing by ultracompact minihalos
The dark matter enclosed in a density perturbation with a large initial
amplitude (delta-rho/rho > 1e-3) collapses shortly after recombination and
forms an ultracompact minihalo (UCMH). Their high central densities make UCMHs
especially suitable for detection via astrometric microlensing: as the UCMH
moves, it changes the apparent position of background stars. A UCMH with a mass
larger than a few solar masses can produce a distinctive astrometric
microlensing signal that is detectable by the space astrometry mission Gaia. If
Gaia does not detect gravitational lensing by any UCMHs, then it establishes an
upper limit on their abundance and constrains the amplitude of the primordial
power spectrum for k~2700 Mpc^{-1}. These constraints complement the upper
bound on the amplitude of the primordial power spectrum derived from limits on
gamma-ray emission from UCMHs because the astrometric microlensing signal
produced by an UCMH is maximized if the dark-matter annihilation rate is too
low to affect the UCMH's density profile. If dark matter annihilation within
UCMHs is not detectable, a search for UCMHs by Gaia could constrain the
amplitude of the primordial power spectrum to be less than 1e-5; this bound is
three orders of magnitude stronger than the bound derived from the absence of
primordial black holes.Comment: 17 pages, 6 figures, references added and minor changes made to match
version published in PR
Liquid bridging of cylindrical colloids in near-critical solvents
Within mean field theory, we investigate the bridging transition between a
pair of parallel cylindrical colloids immersed in a binary liquid mixture as a
solvent which is close to its critical consolute point . We determine the
universal scaling functions of the effective potential and of the force between
the colloids. For a solvent which is at the critical concentration and close to
, we find that the critical Casimir force is the dominant interaction at
close separations. This agrees very well with the corresponding Derjaguin
approximation for the effective interaction between the two cylinders, while
capillary forces originating from the extension of the liquid bridge turn out
to be more important at large separations. In addition, we are able to infer
from the wetting characteristics of the individual colloids the first-order
transition of the liquid bridge connecting two colloidal particles to the
ruptured state. While specific to cylindrical colloids, the results presented
here provide also an outline for identifying critical Casimir forces acting on
bridged colloidal particles as such, and for analyzing the bridging transition
between them.Comment: 23 pages, 12 figure
- …