3,630 research outputs found
Saturation and alternate pathways in four-wave mixing in rubidium
We have examined the frequency spectrum of the blue light generated via
four-wave mixing in a rubidium vapor cell inside a ring cavity. At high atomic
density and input laser power, two distinct frequency components separated by
MHz are observed, indicating alternate four-wave mixing channels
through the hyperfine states. The dependence of the generated light
on excitation intensity and atomic density are explored, and indicate the
primary process has saturated. This saturation results when the excitation rate
through the 6p state becomes equal to the rate through the 5p state, giving no
further gain with atomic density while a quadratic intensity dependence
remains
A confluence of new technology and the right to water: Experience and potential from South Africa's constitution and commons
South Africa's groundbreaking constitution explicitly confers a right of access to sufficient water (section 27). But the country is officially 'water-stressed' and around 10 % of the population still has no access to on-site or off-site piped or tap water. It is evident that a disconnect exists between this right and the reality for many; however the reasons for the continuation of such discrepancies are not always clear. While barriers to sufficient water are myriad, one significant factor contributing to insufficient and unpredictable access to water is the high percentage of broken water pumps. Previous studies have reported that between 20 and 50 % of all hand operated water pumps installed on the African continent are broken, or out of use. Monitoring and maintenance of pumps, which in South Africa is the responsibility of local municipalities is often ineffective, in part due to the distances between municipal centres and rural communities and the consequent costs of site visits, as well as breakdowns within the local bureaucratic system. The emergence of new telemetry tools that can remotely monitor water applications constitutes a novel and cost-efficient alternative to undertaking regular sites visits. Sustainable, appropriate, low-cost telemetry systems are emerging that could be used to monitor the operational performance of water pumps, or a wide range of other field parameters, and to communicate this information swiftly and cheaply to water service providers, using SMS messages. Data on the performance of water pumps could also be made available to the public online. This is an example of how ICT can be used for water resources management and environmental regulation, as well as in the governance of socio-economic rights: helping to optimize water allocation by improving communication and strengthening accountability. © 2014 Springer Science+Business Media Dordrecht
Exciton mediated one phonon resonant Raman scattering from one-dimensional systems
We use the Kramers-Heisenberg approach to derive a general expression for the
resonant Raman scattering cross section from a one-dimensional (1D) system
explicitly accounting for excitonic effects. The result should prove useful for
analyzing the Raman resonance excitation profile lineshapes for a variety of 1D
systems including carbon nanotubes and semiconductor quantum wires. We apply
this formalism to a simple 1D model system to illustrate the similarities and
differences between the free electron and correlated electron-hole theories.Comment: 10 pages, 6 figure
Chirality dependence of the radial breathing phonon mode density in single wall carbon nanotubes
A mass and spring model is used to calculate the phonon mode dispersion for
single wall carbon nanotubes (SWNTs) of arbitrary chirality. The calculated
dispersions are used to determine the chirality dependence of the radial
breathing phonon mode (RBM) density. Van Hove singularities, usually discussed
in the context of the single particle electronic excitation spectrum, are found
in the RBM density of states with distinct qualitative differences for zig zag,
armchair and chiral SWNTs. The influence the phonon mode density has on the two
phonon resonant Raman scattering cross-section is discussed.Comment: 6 pages, 2 figures, submitted to Phys. Rev.
Correlated random walks of human embryonic stem cells in vitro
We perform a detailed analysis of the migratory motion of human embryonic stem cells in two-dimensions, both when isolated and in close proximity to another cell, recorded with time-lapse microscopic imaging. We show that isolated cells tend to perform an unusual locally anisotropic walk, moving backwards and forwards along a preferred local direction correlated over a timescale of around 50 min and aligned with the axis of the cell elongation. Increasing elongation of the cell shape is associated with increased instantaneous migration speed. We also show that two cells in close proximity tend to move in the same direction, with the average separation of m or less and the correlation length of around 25 μm, a typical cell diameter. These results can be used as a basis for the mathematical modelling of the formation of clonal hESC colonies
Detecting brute-force attacks on cryptocurrency wallets
Blockchain is a distributed ledger, which is protected against malicious
modifications by means of cryptographic tools, e.g. digital signatures and hash
functions. One of the most prominent applications of blockchains is
cryptocurrencies, such as Bitcoin. In this work, we consider a particular
attack on wallets for collecting assets in a cryptocurrency network based on
brute-force search attacks. Using Bitcoin as an example, we demonstrate that if
the attack is implemented successfully, a legitimate user is able to prove that
fact of this attack with a high probability. We also consider two options for
modification of existing cryptocurrency protocols for dealing with this type of
attacks. First, we discuss a modification that requires introducing changes in
the Bitcoin protocol and allows diminishing the motivation to attack wallets.
Second, an alternative option is the construction of special smart-contracts,
which reward the users for providing evidence of the brute-force attack. The
execution of this smart-contract can work as an automatic alarm that the
employed cryptographic mechanisms, and (particularly) hash functions, have an
evident vulnerability.Comment: 10 pages, 2 figures; published versio
- …