519 research outputs found
Borrelia burgdorferi and the causative agent of human granulocytic ehrlichiosis in deer ticks, Delaware.
During the 1998 hunting season in Delaware, 1,480 ticks were collected from 252 white- tailed deer; 98% were Ixodes scapularis, a significant increase from the 85% reported in 1988. Ticks were tested for Borrelia burgdorferi and the causative agent of human granulocytic ehrlichiosis. Infection rates remained stable in New Castle and Kent counties, but increased from <1% to 8% in sussex county
The nitrogen legacy: emerging evidence of nitrogen accumulation in anthropogenic landscapes
Watershed and global-scale nitrogen (N) budgets indicate that the majority of the N surplus in anthropogenic landscapes does not reach the coastal oceans. While there is general consensus that this \u27missing\u27 N either exits the landscape via denitrification or is retained within watersheds as nitrate or organic N, the relative magnitudes of these pools and fluxes are subject to considerable uncertainty. Our study, for the first time, provides direct, large-scale evidence of N accumulation in the root zones of agricultural soils that may account for much of the \u27missing N\u27 identified in mass balance studies. We analyzed long-term soil data (1957–2010) from 2069 sites throughout the Mississippi River Basin (MRB) to reveal N accumulation in cropland of 25–70 kg ha−1 yr−1, a total of 3.8 ± 1.8 Mt yr−1 at the watershed scale. We then developed a simple modeling framework to capture N depletion and accumulation dynamics under intensive agriculture. Using the model, we show that the observed accumulation of soil organic N (SON) in the MRB over a 30 year period (142 Tg N) would lead to a biogeochemical lag time of 35 years for 99% of legacy SON, even with complete cessation of fertilizer application. By demonstrating that agricultural soils can act as a net N sink, the present work makes a critical contribution towards the closing of watershed N budgets
Recoiling from a kick in the head-on collision of spinning black holes
Recoil ``kicks'' induced by gravitational radiation are expected in the
inspiral and merger of black holes. Recently the numerical relativity community
has begun to measure the significant kicks found when both unequal masses and
spins are considered. Because understanding the cause and magnitude of each
component of this kick may be complicated in inspiral simulations, we consider
these effects in the context of a simple test problem. We study recoils from
collisions of binaries with initially head-on trajectories, starting with the
simplest case of equal masses with no spin and then adding spin and varying the
mass ratio, both separately and jointly. We find spin-induced recoils to be
significant relative to unequal-mass recoils even in head-on configurations.
Additionally, it appears that the scaling of transverse kicks with spins is
consistent with post-Newtonian theory, even though the kick is generated in the
nonlinear merger interaction, where post-Newtonian theory should not apply.
This suggests that a simple heuristic description might be effective in the
estimation of spin-kicks.Comment: 12 pages, 10 figures. Replaced with published version, including more
discussion of convergence and properties of final hol
How Adolescents Use Text Messaging Through their High School Years
Co‐construction theory suggests adolescents use digital communication to address developmental challenges. For a sample of 214 ethnically diverse adolescents, this research used direct observation to investigate the frequency, content, and timing of texting with parents, peers, and romantic partners through grades 9–12. Analyses showed that texting frequency follows a curvilinear trajectory, peaking in eleventh grade. Adolescents discussed a range of topics, predominantly with peers. Communication with parents was less frequent, but consistent over time. Approximately 45‐65% of adolescents communicated with romantic partners, texting heavily and about topics similar to those discussed with peers. Texting may help adolescents navigate key developmental challenges of adolescence—the establishment of autonomy, intimate peer relationships, romantic relationships, and self‐identity
Older Adolescents’ Understanding of Participant Rights in the BlackBerry Project, a Longitudinal Ambulatory Assessment Study
For a long‐term, longitudinal study that used BlackBerry smartphones for passive ambulatory assessment among older adolescents, this study focused on three areas of ethical concern: (1) adolescents’ competence to give assent; (2) understanding of confidentiality, the protection of information, and project goals; and (3) awareness of procedures and benefits, and comfort with the research design. One hundred and seventy‐eight participants were 17 and 18 years old (84 girls). Results suggested that participants freely gave consent and understood most, but not all of the informed consent information. Participants reported a high level of satisfaction. Participants showed less understanding of when their confidentiality would be broken and how data would be protected
Integration of highly probabilistic sources into optical quantum architectures: perpetual quantum computation
In this paper we introduce a design for an optical topological cluster state
computer constructed exclusively from a single quantum component. Unlike
previous efforts we eliminate the need for on demand, high fidelity photon
sources and detectors and replace them with the same device utilised to create
photon/photon entanglement. This introduces highly probabilistic elements into
the optical architecture while maintaining complete specificity of the
structure and operation for a large scale computer. Photons in this system are
continually recycled back into the preparation network, allowing for a
arbitrarily deep 3D cluster to be prepared using a comparatively small number
of photonic qubits and consequently the elimination of high frequency,
deterministic photon sources.Comment: 19 pages, 13 Figs (2 Appendices with additional Figs.). Comments
welcom
Momentum constraint relaxation
Full relativistic simulations in three dimensions invariably develop runaway
modes that grow exponentially and are accompanied by violations of the
Hamiltonian and momentum constraints. Recently, we introduced a numerical
method (Hamiltonian relaxation) that greatly reduces the Hamiltonian constraint
violation and helps improve the quality of the numerical model. We present here
a method that controls the violation of the momentum constraint. The method is
based on the addition of a longitudinal component to the traceless extrinsic
curvature generated by a vector potential w_i, as outlined by York. The
components of w_i are relaxed to solve approximately the momentum constraint
equations, pushing slowly the evolution toward the space of solutions of the
constraint equations. We test this method with simulations of binary neutron
stars in circular orbits and show that effectively controls the growth of the
aforementioned violations. We also show that a full numerical enforcement of
the constraints, as opposed to the gentle correction of the momentum relaxation
scheme, results in the development of instabilities that stop the runs shortly.Comment: 17 pages, 10 figures. New numerical tests and references added. More
detailed description of the algorithms are provided. Final published versio
Path Selection for Quantum Repeater Networks
Quantum networks will support long-distance quantum key distribution (QKD)
and distributed quantum computation, and are an active area of both
experimental and theoretical research. Here, we present an analysis of
topologically complex networks of quantum repeaters composed of heterogeneous
links. Quantum networks have fundamental behavioral differences from classical
networks; the delicacy of quantum states makes a practical path selection
algorithm imperative, but classical notions of resource utilization are not
directly applicable, rendering known path selection mechanisms inadequate. To
adapt Dijkstra's algorithm for quantum repeater networks that generate
entangled Bell pairs, we quantify the key differences and define a link cost
metric, seconds per Bell pair of a particular fidelity, where a single Bell
pair is the resource consumed to perform one quantum teleportation. Simulations
that include both the physical interactions and the extensive classical
messaging confirm that Dijkstra's algorithm works well in a quantum context.
Simulating about three hundred heterogeneous paths, comparing our path cost and
the total work along the path gives a coefficient of determination of 0.88 or
better.Comment: 12 pages, 8 figure
The Samurai Project: verifying the consistency of black-hole-binary waveforms for gravitational-wave detection
We quantify the consistency of numerical-relativity black-hole-binary
waveforms for use in gravitational-wave (GW) searches with current and planned
ground-based detectors. We compare previously published results for the
mode of the gravitational waves from an equal-mass
nonspinning binary, calculated by five numerical codes. We focus on the 1000M
(about six orbits, or 12 GW cycles) before the peak of the GW amplitude and the
subsequent ringdown. We find that the phase and amplitude agree within each
code's uncertainty estimates. The mismatch between the modes
is better than for binary masses above with respect to
the Enhanced LIGO detector noise curve, and for masses above
with respect to Advanced LIGO, Virgo and Advanced Virgo. Between the waveforms
with the best agreement, the mismatch is below . We find that
the waveforms would be indistinguishable in all ground-based detectors (and for
the masses we consider) if detected with a signal-to-noise ratio of less than
, or less than in the best cases.Comment: 17 pages, 9 figures. Version accepted by PR
- …