3,630 research outputs found

    Saturation and alternate pathways in four-wave mixing in rubidium

    Get PDF
    We have examined the frequency spectrum of the blue light generated via four-wave mixing in a rubidium vapor cell inside a ring cavity. At high atomic density and input laser power, two distinct frequency components separated by 116±4116 \pm 4 MHz are observed, indicating alternate four-wave mixing channels through the 6p3/26p_{3/2} hyperfine states. The dependence of the generated light on excitation intensity and atomic density are explored, and indicate the primary process has saturated. This saturation results when the excitation rate through the 6p state becomes equal to the rate through the 5p state, giving no further gain with atomic density while a quadratic intensity dependence remains

    A confluence of new technology and the right to water: Experience and potential from South Africa's constitution and commons

    Get PDF
    South Africa's groundbreaking constitution explicitly confers a right of access to sufficient water (section 27). But the country is officially 'water-stressed' and around 10 % of the population still has no access to on-site or off-site piped or tap water. It is evident that a disconnect exists between this right and the reality for many; however the reasons for the continuation of such discrepancies are not always clear. While barriers to sufficient water are myriad, one significant factor contributing to insufficient and unpredictable access to water is the high percentage of broken water pumps. Previous studies have reported that between 20 and 50 % of all hand operated water pumps installed on the African continent are broken, or out of use. Monitoring and maintenance of pumps, which in South Africa is the responsibility of local municipalities is often ineffective, in part due to the distances between municipal centres and rural communities and the consequent costs of site visits, as well as breakdowns within the local bureaucratic system. The emergence of new telemetry tools that can remotely monitor water applications constitutes a novel and cost-efficient alternative to undertaking regular sites visits. Sustainable, appropriate, low-cost telemetry systems are emerging that could be used to monitor the operational performance of water pumps, or a wide range of other field parameters, and to communicate this information swiftly and cheaply to water service providers, using SMS messages. Data on the performance of water pumps could also be made available to the public online. This is an example of how ICT can be used for water resources management and environmental regulation, as well as in the governance of socio-economic rights: helping to optimize water allocation by improving communication and strengthening accountability. © 2014 Springer Science+Business Media Dordrecht

    Privacy and Record Keeping: Remedies for the Misuse of Accurate Information

    Get PDF

    The Torts Process

    Get PDF

    Exciton mediated one phonon resonant Raman scattering from one-dimensional systems

    Full text link
    We use the Kramers-Heisenberg approach to derive a general expression for the resonant Raman scattering cross section from a one-dimensional (1D) system explicitly accounting for excitonic effects. The result should prove useful for analyzing the Raman resonance excitation profile lineshapes for a variety of 1D systems including carbon nanotubes and semiconductor quantum wires. We apply this formalism to a simple 1D model system to illustrate the similarities and differences between the free electron and correlated electron-hole theories.Comment: 10 pages, 6 figure

    Chirality dependence of the radial breathing phonon mode density in single wall carbon nanotubes

    Full text link
    A mass and spring model is used to calculate the phonon mode dispersion for single wall carbon nanotubes (SWNTs) of arbitrary chirality. The calculated dispersions are used to determine the chirality dependence of the radial breathing phonon mode (RBM) density. Van Hove singularities, usually discussed in the context of the single particle electronic excitation spectrum, are found in the RBM density of states with distinct qualitative differences for zig zag, armchair and chiral SWNTs. The influence the phonon mode density has on the two phonon resonant Raman scattering cross-section is discussed.Comment: 6 pages, 2 figures, submitted to Phys. Rev.

    Correlated random walks of human embryonic stem cells in vitro

    Get PDF
    We perform a detailed analysis of the migratory motion of human embryonic stem cells in two-dimensions, both when isolated and in close proximity to another cell, recorded with time-lapse microscopic imaging. We show that isolated cells tend to perform an unusual locally anisotropic walk, moving backwards and forwards along a preferred local direction correlated over a timescale of around 50 min and aligned with the axis of the cell elongation. Increasing elongation of the cell shape is associated with increased instantaneous migration speed. We also show that two cells in close proximity tend to move in the same direction, with the average separation of m or less and the correlation length of around 25 μm, a typical cell diameter. These results can be used as a basis for the mathematical modelling of the formation of clonal hESC colonies

    Detecting brute-force attacks on cryptocurrency wallets

    Full text link
    Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin. In this work, we consider a particular attack on wallets for collecting assets in a cryptocurrency network based on brute-force search attacks. Using Bitcoin as an example, we demonstrate that if the attack is implemented successfully, a legitimate user is able to prove that fact of this attack with a high probability. We also consider two options for modification of existing cryptocurrency protocols for dealing with this type of attacks. First, we discuss a modification that requires introducing changes in the Bitcoin protocol and allows diminishing the motivation to attack wallets. Second, an alternative option is the construction of special smart-contracts, which reward the users for providing evidence of the brute-force attack. The execution of this smart-contract can work as an automatic alarm that the employed cryptographic mechanisms, and (particularly) hash functions, have an evident vulnerability.Comment: 10 pages, 2 figures; published versio
    corecore