12,083 research outputs found
Recommended from our members
Graphene-polyelectrolyte multilayer membranes with tunable structure and internal charge
One great advantage of graphene-polyelectrolyte multilayer (GPM) membranes is their tunable structure and internal charge for improved separation performance. In this study, we synthesized GO-dominant GPM membrane with internal negatively-charged domains, polyethyleneimine (PEI)-dominant GPM membrane with internal positively-charged domains and charge-balanced dense/loose GPM membranes by simply adjusting the ionic strength and pH of the GO and PEI solutions used in layer-by-layer membrane synthesis. A combined system of quartz crystal microbalance with dissipation (QCM-D) and ellipsometry was used to analyze the mass deposition, film thickness, and layer density of the GPM membranes. The performance of the GPM membranes were compared in terms of both permeability and selectivity to determine the optimal membrane structure and synthesis strategy. One effective strategy to improve the GPM membrane permeability-selectivity tradeoff is to assemble charge-balanced dense membranes under weak electrostatic interactions. This balanced membrane exhibits the highest MgCl2 selectivity (∼86%). Another effective strategy for improved cation removal is to create PEI-dominant membranes that provide internal positively-charged barrier to enhance cation selectivity without sacrificing water permeability. These findings shine lights on the development of a systematic approach to push the boundary of permeability-selectivity tradeoff for GPM membranes
Temporal Integration of Seismic Traveltime Tomography
Time-lapse geophysical measurements and seismic imaging methods in particular are powerful techniques
for monitoring changes in reservoir properties. Traditional time-lapse processing methods treat
each dataset as an independent unit and estimate changes in reservoir state through differencing these
separate inversions. We present a general least-squares approach to jointly inverting time-varying property
models through use of spatio-temporal coupling operators. Originally developed within the medical
imaging community, this extension of traditional Tikhonov regularization allows us to constrain the way
in which models vary in time, thereby reducing artifacts observed in traditional time-lapse imaging formulations.
The same methodology can also accommodate changes in experiment geometry as a function
of time thus allowing inversion of incremental or incomplete surveys. In this case, temporal resolution is
traded for improved spatial coverage at individual timesteps. We use seismic traveltime tomography as a
model problem although almost any geophysical inversion task can be posed within this formalism. We
apply the developed time-lapse inversion algorithm to a synthetic crosswell dataset designed to replicate
a CO2 sequestration monitoring experiment
M2000 : an astrometric catalog in the Bordeaux Carte du Ciel zone +11 degrees < {delta} < +18 degrees
During four years, systematic observations have been conducted in drift scan
mode with the Bordeaux automated meridian circle in the declination band [+11 ;
+18]. The resulting astrometric catalog includes about 2 300 000 stars down to
the magnitude limit V_M=16.3. Nearly all stars (96%) have been observed at
least 6 times, the catalog being complete down to V_M=15.4. The median internal
standard error in position is about 35 mas in the V_M magnitude range [11 ;
15], which degrades to about 50 mas when the faintest stars are considered.
M2000 provides also one band photometry with a median internal standard error
of 0.04 mag. Comparisons with the Hipparcos and bright part of Tycho-2 catalogs
have enabled to estimate external errors in position to be lower than 40 mas.
In this zone and at epoch 1998, the faint part of Tycho-2 is found to have an
accuracy of 116 mas in alpha instead of 82 mas deduced from the model-based
standard errors given in the catalog.Comment: The catalogue can be fetched directly from:
ftp://cdsarc.u-strasbg.fr/cats/I/272 or queried from:
http://vizier.u-strasbg.fr/viz-bin/VizieR?-source=I/272 More information at :
http://www.observ.u-bordeaux.fr/~soubiran/m2000.ht
Fast Ground State Manipulation of Neutral Atoms in Microscopic Optical Traps
We demonstrate Rabi flopping at MHz rates between ground hyperfine states of
neutral Rb atoms that are trapped in two micron sized optical traps.
Using tightly focused laser beams we demonstrate high fidelity, site specific
Rabi rotations with crosstalk on neighboring sites separated by at
the level of . Ramsey spectroscopy is used to measure a dephasing time
of which is 5000 times longer than the time for a
pulse.Comment: 4 pages, 4 figure
Gilbert Damping in Magnetic Multilayers
We study the enhancement of the ferromagnetic relaxation rate in thin films
due to the adjacent normal metal layers. Using linear response theory, we
derive the dissipative torque produced by the s-d exchange interaction at the
ferromagnet-normal metal interface. For a slow precession, the enhancement of
Gilbert damping constant is proportional to the square of the s-d exchange
constant times the zero-frequency limit of the frequency derivative of the
local dynamic spin susceptibility of the normal metal at the interface.
Electron-electron interactions increase the relaxation rate by the Stoner
factor squared. We attribute the large anisotropic enhancements of the
relaxation rate observed recently in multilayers containing palladium to this
mechanism. For free electrons, the present theory compares favorably with
recent spin-pumping result of Tserkovnyak et al. [Phys. Rev. Lett.
\textbf{88},117601 (2002)].Comment: 1 figure, 5page
Reconstruction of modified gravity with ghost dark energy models
In this work, we reconstruct the modified gravity for different ghost
and generalized ghost dark energy models in FRW flat universe, which describe
the accelerated expansion of the universe. The equation of state of
reconstructed - gravity has been calculated. We show that the
corresponding gravity of ghost dark energy model can behave like phantom
or quintessence. We also show that the equation of state of reconstructed
gravity for generalized ghost model can transit from quintessence regime
to the phantom regime as indicated by recent observations.Comment: 13 pages, some references and one author are added. Accepted for
publication by MPL
Reining in the Web's Inconsistencies with Site Policy
Over the years, browsers have adopted an ever-increasing number of client-enforced security policies deployed through HTTP headers. Such mechanisms are fundamental for web application security, and usually deployed on a per-page basis. This, however, enables inconsistencies, as different pages within the same security boundaries (in form of origins or sites) can express conflicting security requirements. In this paper, we formalize inconsistencies for cookie security attributes, CSP, and HSTS, and then quantify the magnitude and impact of inconsistencies at scale by crawling 15,000 popular sites. We show that numerous sites endanger their own security by omission or misconfiguration of the aforementioned mechanisms, which lead to unnecessary exposure to XSS, cookie theft, and HSTS deactivation. We then use our data to analyse to which extent the recent Origin Policy proposal can fix the problem of inconsistencies. Unfortunately, we conclude that the current Origin Policy design suffers from major shortcomings which limit its practical applicability to address security inconsistencies while catering to the need of real-world sites. Based on these insights, we propose Site Policy, designed to overcome Origin Policy's shortcomings and make any insecurity explicit. We make a prototype implementation of Site Policy publicly available, along with a supporting toolchain for initial policy generation, security analysis, and test deployment
ethical reasons and political commitment
Political commitments to resist oppression play a central role in the moral lives of many people. Such commitments are also a source of ethical reasons. They influence and organize ethical beliefs, emotions and reasons in an ongoing way. Political commitments to address oppression often contain a concern for the dignity and well-being of others and the objects of political commitments often have value, according to ideal moral theories, such as Kantian and utilitarian theory. However, ideal moral theories do not fully explain the ethical reasons political commitments engender. First, ideal moral theories do not explain the normative priority that agents give to politically committed ethical reasons. Their profound effect on a politically committed agent’s ethical deliberation and choice and the precedence they are given over other ends cannot be wholly understood through the moral obligations within ideal theories. Second, although politically committed reasons are valuable in ideal theory for the benefits they bring to others, they are not fungible with other reasons ideal theory would regard as having equal ethical value. A person might substitute another beneficial humanitarian aim for that to which she is politically committed and nevertheless regard herself as having done a morally wrong thing for failing or betraying her commitment. Politically committed ethical reasons are also motivated and informed by the social location of agents and their relationship to structures of oppression. Although there are universal ethical reasons to oppose oppression, this means that some of a person’s actual ethical reasons will be irreducibly particular
Proof-Pattern Recognition and Lemma Discovery in ACL2
We present a novel technique for combining statistical machine learning for
proof-pattern recognition with symbolic methods for lemma discovery. The
resulting tool, ACL2(ml), gathers proof statistics and uses statistical
pattern-recognition to pre-processes data from libraries, and then suggests
auxiliary lemmas in new proofs by analogy with already seen examples. This
paper presents the implementation of ACL2(ml) alongside theoretical
descriptions of the proof-pattern recognition and lemma discovery methods
involved in it
- …