16,599 research outputs found

    Thermodynamics of the Mg-B system: Implications for the deposition of MgB2 thin films

    Full text link
    We have studied thermodynamics of the Mg-B system with the modeling technique CALPHAD using a computerized optimization procedure. Temperature-composition, pressure-composition, and pressure-temperature phase diagrams under different conditions are obtained. The results provide helpful insights into appropriate processing conditions for thin films of the superconducting phase, MgB2, including the identification of the pressure/temperature region for adsorption-controlled growth. Due to the high volatility of Mg, MgB2 is thermodynamically stable only under fairly high Mg overpressures for likely growth temperatures. This constraint places severe temperature constraints on deposition techniques employing high vacuum conditions

    Temptation and self-control: some evidence and applications

    Get PDF
    This paper studies the empirical relevance of temptation and self-control using household-level data from the Consumer Expenditure Survey. We estimate an infinite-horizon consumption-savings model that allows, but does not require, temptation and self-control in preferences. To help identify the presence of temptation, we exploit an implication of the theory that a tempted individual has a preference for commitment. In the presence of temptation, the cross-sectional distribution of the wealth-consumption ratio, in addition to that of consumption growth, becomes a determinant of the asset-pricing kernel, and the importance of this additional pricing factor depends on the strength of temptation. The estimates that we obtain provide statistical evidence supporting the presence of temptation. Based on our estimates, we explore some quantitative implications of this class of preferences on equity premium and on the welfare cost of business cycles.Asset pricing ; Welfare

    On the Application of Gluon to Heavy Quarkonium Fragmentation Functions

    Get PDF
    We analyze the uncertainties induced by different definitions of the momentum fraction zz in the application of gluon to heavy quarkonium fragmentation function. We numerically calculate the initial g→J/ψg \to J / \psi fragmentation functions by using the non-covariant definitions of zz with finite gluon momentum and find that these fragmentation functions have strong dependence on the gluon momentum k⃗\vec{k}. As ∣k⃗∣→∞| \vec{k} | \to \infty, these fragmentation functions approach to the fragmentation function in the light-cone definition. Our numerical results show that large uncertainties remains while the non-covariant definitions of zz are employed in the application of the fragmentation functions. We present for the first time the polarized gluon to J/ψJ/\psi fragmentation functions, which are fitted by the scheme exploited in this work.Comment: 11 pages, 7 figures;added reference for sec.

    Phase-Remapping Attack in Practical Quantum Key Distribution Systems

    Full text link
    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug & play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.Comment: 13 pages, 8 figure

    Temperature Effects on Threshold Counterion Concentration to Induce Aggregation of fd Virus

    Full text link
    We seek to determine the mechanism of like-charge attraction by measuring the temperature dependence of critical divalent counterion concentration (Cc\rm{C_{c}}) for the aggregation of fd viruses. We find that an increase in temperature causes Cc\rm{C_c} to decrease, primarily due to a decrease in the dielectric constant (ϵ\epsilon) of the solvent. At a constant ϵ\epsilon, Cc\rm{C_c} is found to increase as the temperature increases. The effects of TT and ϵ\epsilon on Cc\rm {C_{c}} can be combined to that of one parameter: Bjerrum length (lBl_{B}). Cc\rm{C_{c}} decreases exponentially as lBl_{B} increases, suggesting that entropic effect of counterions plays an important role at the onset of bundle formation.Comment: 12 pages, 3 figure

    Deviation detection in clinical pathways based on business alignment

    Get PDF
    Several unexpected behaviors may occur during actual treatment of clinical pathways, which will have negative impact on the implementation and the future work. To increase the performance of current deviation detection algorithms, a method is presented according to business alignment, which can effectively detect the anomaly in the implementation of the clinical pathways, provide judgment basis for the intervention in the process of the clinical pathway implementation, and play a crucial role in improving the clinical pathways. Firstly, the noise in diagnosis and treatment logs of clinical pathways will be removed. Then, the synchronous composition model is constructed to embody the deviations between the actual process and the theoretical model. Finally, A ∗ algorithm is selected to search for optimal alignment. A clinical pathway for ST-Elevation Myocardial Infarction (STEMI) under COVID-19 is used as a case study, and the superiority and effectiveness of this method in deviation detection are illustrated in the result of experiments

    Coexistence of coupled magnetic phases in epitaxial TbMnO3 films revealed by ultrafast optical spectroscopy

    Full text link
    Ultrafast optical pump-probe spectroscopy is used to reveal the coexistence of coupled antiferromagnetic/ferroelectric and ferromagnetic orders in multiferroic TbMnO3 films through their time domain signatures. Our observations are explained by a theoretical model describing the coupling between reservoirs with different magnetic properties. These results can guide researchers in creating new kinds of multiferroic materials that combine coupled ferromagnetic, antiferromagnetic and ferroelectric properties in one compound.Comment: Accepted by Appl. Phys. let
    • …
    corecore