15,957 research outputs found

    Modeling the environmental controls on tree water use at different temporal scales

    Get PDF
    Acknowledgements This study is part of the first authorā€™s PhD projects in 2010ā€“2014, co-funded by the National Centre for Groundwater Research and Training in Australia and the China Scholarship Council. We give thanks to Zijuan Deng and Xiang Xu for their assistance in the field. Constructive comments and suggestion from the anonymous reviewers are appreciated for significant improvement of the manuscript.Peer reviewedPostprin

    Polyandrous females avoid costs of inbreeding

    Get PDF
    Why do females typically mate with more than one male? Female mating patterns have broad implications for sexual selection, speciation and conflicts of interest between the sexes, and yet they are poorly understood. Matings inevitably have costs, and for females, the benefits of taking more than one mate are rarely obvious. One possible explanation is that females gain benefits because they can avoid using sperm from genetically incompatible males, or invest less in the offspring of such males. It has been shown that mating with more than one male can increase offspring viability, but we present the first clear demonstration that this occurs because females with several mates avoid the negative effects of genetic incompatibility. We show that in crickets, the eggs of females that mate only with siblings have decreased hatching success. However, if females mate with both a sibling and a non-sibling they avoid altogether the low egg viability associated with sibling matings. If similar effects occur in other species, inbreeding avoidance may be important in understanding the prevalence of multiple mating

    Combinatorial Bounds and Characterizations of Splitting Authentication Codes

    Full text link
    We present several generalizations of results for splitting authentication codes by studying the aspect of multi-fold security. As the two primary results, we prove a combinatorial lower bound on the number of encoding rules and a combinatorial characterization of optimal splitting authentication codes that are multi-fold secure against spoofing attacks. The characterization is based on a new type of combinatorial designs, which we introduce and for which basic necessary conditions are given regarding their existence.Comment: 13 pages; to appear in "Cryptography and Communications

    General solution of an exact correlation function factorization in conformal field theory

    Full text link
    We discuss a correlation function factorization, which relates a three-point function to the square root of three two-point functions. This factorization is known to hold for certain scaling operators at the two-dimensional percolation point and in a few other cases. The correlation functions are evaluated in the upper half-plane (or any conformally equivalent region) with operators at two arbitrary points on the real axis, and a third arbitrary point on either the real axis or in the interior. This type of result is of interest because it is both exact and universal, relates higher-order correlation functions to lower-order ones, and has a simple interpretation in terms of cluster or loop probabilities in several statistical models. This motivated us to use the techniques of conformal field theory to determine the general conditions for its validity. Here, we discover a correlation function which factorizes in this way for any central charge c, generalizing previous results. In particular, the factorization holds for either FK (Fortuin-Kasteleyn) or spin clusters in the Q-state Potts models; it also applies to either the dense or dilute phases of the O(n) loop models. Further, only one other non-trivial set of highest-weight operators (in an irreducible Verma module) factorizes in this way. In this case the operators have negative dimension (for c < 1) and do not seem to have a physical realization.Comment: 7 pages, 1 figure, v2 minor revision

    Contextuality under weak assumptions

    Get PDF
    The presence of contextuality in quantum theory was first highlighted by Bell, Kochen and Specker, who discovered that for quantum systems of three or more dimensions, measurements could not be viewed as deterministically revealing pre-existing properties of the system. More precisely, no model can assign deterministic outcomes to the projectors of a quantum measurement in a way that depends only on the projector and not the context (the full set of projectors) in which it appeared, despite the fact that the Born rule probabilities associated with projectors are independent of the context. A more general, operational definition of contextuality introduced by Spekkens, which we will term "probabilistic contextuality", drops the assumption of determinism and allows for operations other than measurements to be considered contextual. Even two-dimensional quantum mechanics can be shown to be contextual under this generalised notion. Probabilistic noncontextuality represents the postulate that elements of an operational theory that cannot be distinguished from each other based on the statistics of arbitrarily many repeated experiments (they give rise to the same operational probabilities) are ontologically identical. In this paper, we introduce a framework that enables us to distinguish between different noncontextuality assumptions in terms of the relationships between the ontological representations of objects in the theory given a certain relation between their operational representations. This framework can be used to motivate and define a "possibilistic" analogue, encapsulating the idea that elements of an operational theory that cannot be unambiguously distinguished operationally can also not be unambiguously distinguished ontologically. We then prove that possibilistic noncontextuality is equivalent to an alternative notion of noncontextuality proposed by Hardy. Finally, we demonstrate that these weaker noncontextuality assumptions are sufficient to prove alternative versions of known "no-go" theorems that constrain Ļˆ-epistemic models for quantum mechanics

    Ultra-dense phosphorus in germanium delta-doped layers

    Full text link
    Phosphorus (P) in germanium (Ge) delta-doped layers are fabricated in ultra-high vacuum by adsorption of phosphine molecules onto an atomically flat clean Ge(001) surface followed by thermal incorporation of P into the lattice and epitaxial Ge overgrowth by molecular beam epitaxy. Structural and electrical characterizations show that P atoms are confined, with minimal diffusion, into an ultra-narrow 2-nm-wide layer with an electrically-active sheet carrier concentration of 4x10^13 cm-2 at 4.2 K. These results open up the possibility of ultra-narrow source/drain regions with unprecedented carrier densities for Ge n-channel field effect transistors

    Energy storage-boiler tank

    Get PDF
    Activities performed in an effort to demonstrate heat of fusion energy storage in containerized salts are reported. The properties and cycle life characteristics of a eutectic salt having a boiling point of about 385 C (NaCl, KCl, Mg Cl2) were determined. M-terphenyl was chosen as the heat transfer fluid. Compatibility studies were conducted and mild steel containers were selected. The design and fabrication of a 2MWh storage boiler tank are discussed

    Maximizing phonon thermal conductance for ballistic membranes

    Full text link
    At low temperatures, phonon scattering can become so weak that phonon transport becomes ballistic. We calculate the ballistic phonon conductance G for membranes using elasticity theory, considering the transition from three to two dimensions. We discuss the temperature and thickness dependence and especially concentrate on the issue of material parameters. For all membrane thicknesses, the best conductors have, counter-intuitively, the lowest speed of sound.Comment: 4 pages, 4 figures, proceedings to phonons 2007 conferenc

    Creation of a Neural Network for the American Sign Language to Russian Translation App

    Get PDF
    A large population of people utilize American Sign Language for their primary method of communication. No commercially available product is available for these people for when they need to communicate with speakers of a foreign language. We must investigate methods to make communication between these two parties easier and more accessible. By using a neural network to classify images of American Sign Language letters, we can build a service to make translation of American Sign Language into foreign languages possible
    • ā€¦
    corecore