32,655 research outputs found
How do Neutrinos Propagate ? - Wave-Packet Treatment of Neutrino Oscillation
The wave-packet treatment of neutrino oscillation developed previously is
extended to the case in which momentum distribution functions are taken to be a
Gaussian form with both central values and dispersions depending on the mass
eigenstates of the neutrinos. It is shown among other things that the velocity
of the neutrino wave packets does not in general agree with what one would
expect classically and that relativistic neutrinos emitted from pions
nevertheless do follow, to a good approximation, the classical trajectory.Comment: 13 page. No figure. Typeset using PTPTeX.st
Cross-border intellectual property rights: contract enforcement and absorptive capacity
This paper studies cross-border intellectual property rights (IPR) as a North-South contract using a Nash bargaining approach and distinguishes between the outcome and its actual enforcement. The absorptive capacity of the Southern country to exploit technology transfer plays a key role in the negotiated level of IPRs and its post-treaty enforcement. The optimal level of IPR protection relates positively to absorptive capacity. This provides a rationale for the longer time-frame provided to least developed countries in Article 66 of TRIPS to implement its provisions. In addition, monitoring is only effective in preventing contract violation up to a critical level of absorptive capacity. We relate this to the US Trade Representative “Special 301” report, which flags countries that deny adequate IPR protection as “priority watch list”. While disputes with less developed economies are promptly resolved, emerging economies, where most losses from copyright piracy originates from, continue to remain on the list.
Recent update of the RPLUS2D/3D codes
The development of the RPLUS2D/3D codes is summarized. These codes utilize LU algorithms to solve chemical non-equilibrium flows in a body-fitted coordinate system. The motivation behind the development of these codes is the need to numerically predict chemical non-equilibrium flows for the National AeroSpace Plane Program. Recent improvements include vectorization method, blocking algorithms for geometric flexibility, out-of-core storage for large-size problems, and an LU-SW/UP combination for CPU-time efficiency and solution quality
Combining Undersampled Dithered Images
Undersampled images, such as those produced by the HST WFPC-2, misrepresent
fine-scale structure intrinsic to the astronomical sources being imaged.
Analyzing such images is difficult on scales close to their resolution limits
and may produce erroneous results. A set of ``dithered'' images of an
astronomical source generally contains more information about its structure
than any single undersampled image, however, and may permit reconstruction of a
``superimage'' with Nyquist sampling. I present a tutorial on a method of image
reconstruction that builds a superimage from a complex linear combination of
the Fourier transforms of a set of undersampled dithered images. This method
works by algebraically eliminating the high order satellites in the periodic
transforms of the aliased images. The reconstructed image is an exact
representation of the data-set with no loss of resolution at the Nyquist scale.
The algorithm is directly derived from the theoretical properties of aliased
images and involves no arbitrary parameters, requiring only that the dithers
are purely translational and constant in pixel-space over the domain of the
object of interest. I show examples of its application to WFC and PC images. I
argue for its use when the best recovery of point sources or morphological
information at the HST diffraction limit is of interest.Comment: 22 pages, 9 EPS figures, submitted to PAS
Comparison of a reverse-transverse cross pin technique with a same side cross pin type II external skeletal fixator in 89 dogs
The objective of this study was to determine whether a novel reverse-transverse cross pin insertion technique could increase the stability of type II external skeletal fixators (ESF) in dogs compared with an alternate, same side cross pin ESF. Reverse-transverse cross pin technique and type II ESFs same side cross pin technique were applied and compared among subjects. Two of 42 ESFs (4.8%) applied with the reverse-transverse cross pin technique and 39 of 47 ESFs (83%) applied with the same side cross pin technique were subjectively unstable at the time of fixator removal (P < 0.001). The same side cross pin ESFs had significantly more pin tract new bone formation than the reverse-transverse ESFs (P = 0.038). In summary, this approach may provide a method of treating a variety of musculoskeletal conditions and soft tissue cases, which reverse-transverse cross pin ESFs are tolerated in dogs for a variety of conditions
Digital Switching in the Quantum Domain
In this paper, we present an architecture and implementation algorithm such
that digital data can be switched in the quantum domain. First we define the
connection digraph which can be used to describe the behavior of a switch at a
given time, then we show how a connection digraph can be implemented using
elementary quantum gates. The proposed mechanism supports unicasting as well as
multicasting, and is strict-sense non-blocking. It can be applied to perform
either circuit switching or packet switching. Compared with a traditional space
or time domain switch, the proposed switching mechanism is more scalable.
Assuming an n-by-n quantum switch, the space consumption grows linearly, i.e.
O(n), while the time complexity is O(1) for unicasting, and O(log n) for
multicasting. Based on these advantages, a high throughput switching device can
be built simply by increasing the number of I/O ports.Comment: 24 pages, 16 figures, LaTe
CP,T and/or CPT Violations in the K0-K0bar System --Implications of the KTeV,NA48 and CPLEAR Results
Possible violation of CP, T and/or CPT symmetries in the \ko-\kob system
is studied from a phenomenological point of view. For this purpose, we first
introduce parameters which represent violation of these symmetries in mixing
parameters and decay amplitudes in a convenient and well-defined way and,
treating these parameters as small, derive formulas which relate them to the
experimentally measured quantities. We then perform numerical analyses, with
the aid of the Bell-Steinberger relation, to derive constraints to these
symmetry-violating parameters, firstly paying particular attention to the
results reported by KTeV Collaboration and NA48 Collaboration, and then with
the results reported by CPLEAR Collaboration as well taken into account. A case
study, in which either CPT symmetry or T symmetry is assumed, is also carried
out. It is demonstrated that CP and T symmetries are violated definitively at
the level of 10^{-4} in decays and presumably at the level of 10^{-3} in
the \ko-\kob mixing, and that the Bell-Steinberger relation helps us to
establish CP and T violations being definitively present in the \ko-\kob
mixing and to test CPT symmetry to a level of 10^{-4} ~ 10^{-5}.Comment: 21 pages, 1 figure
Combining Stream Mining and Neural Networks for Short Term Delay Prediction
The systems monitoring the location of public transport vehicles rely on
wireless transmission. The location readings from GPS-based devices are
received with some latency caused by periodical data transmission and temporal
problems preventing data transmission. This negatively affects identification
of delayed vehicles. The primary objective of the work is to propose short term
hybrid delay prediction method. The method relies on adaptive selection of
Hoeffding trees, being stream classification technique and multilayer
perceptrons. In this way, the hybrid method proposed in this study provides
anytime predictions and eliminates the need to collect extensive training data
before any predictions can be made. Moreover, the use of neural networks
increases the accuracy of the predictions compared with the use of Hoeffding
trees only
- …