1,699 research outputs found

    Time-resolved soft x-ray spectra from laser-produced Cu plasma

    Get PDF
    The volumetric heating of a thin copper target has been studied with time resolved x-ray spectroscopy. The copper target was heated from a plasma produced using the Lawrence Livermore National Laboratory's Compact Multipulse Terrawatt (COMET) laser. A variable spaced grating spectrometer coupled to an x-ray streak camera measured soft x-ray emission (800-1550 eV) from the back of the copper target to characterize the bulk heating of the target. Radiation hydrodynamic simulations were modeled in 2-dimensions using the HYDRA code. The target conditions calculated by HYDRA were post-processed with the atomic kinetics code CRETIN to generate synthetic emission spectra. A comparison between the experimental and simulated spectra indicates the presence of specific ionization states of copper and the corresponding electron temperatures and ion densities throughout the laser-heated copper target

    False friends in the Fanfanyu

    Get PDF
    In the present article, a remarkable phenomenon is brought to the attention of those interested in early Chinese translations of Buddhist texts: false friends in the Fanfanyu (T54n2130). Baochang's Sanskrit-Chinese lexicon that was compiled as early as 517 AD reveals some curious examples of faux amis. In the present contribution, this case will be illustrated with references from the Shanjian lĂŒ piposha (T24n1462), a fifth century Chinese translation of the Samantapāsādikā, Buddhaghosa's commentary on the Pāli Vinaya. The fact that Baochang did not realise that this text was not translated from Sanskrit, inadvertently gave rise to some interesting jeux de mots

    Perfectionism and eating disorder symptoms in female university students: The central role of perfectionistic self-presentation

    Get PDF
    Purpose: Numerous studies have found perfectionism to show positive relations with eating disorder symptoms, but so far no study has examined whether perfectionistic self-presentation can explain these relations or whether the relations are the same for different eating disorder symptom groups. Methods: A sample of 393 female university students completed self-report measures of perfectionism (self-oriented perfectionism, socially prescribed perfectionism), perfectionistic self-presentation (perfectionistic self-promotion, nondisplay of imperfection, nondisclosure of imperfection), and three eating disorder symptom groups (dieting, bulimia, oral control). In addition, students reported their weight and height so their body mass index (BMI) could be computed. Results: Results of multiple regression analyses controlling for BMI indicated that socially prescribed perfectionism positively predicted all three symptom groups, whereas self-oriented perfectionism positively predicted dieting only. Moreover, perfectionistic self-presentation explained the positive relations that perfectionism showed with dieting and oral control, but not with bulimia. Further analyses indicated that all three aspects of perfectionistic self-presentation positively predicted dieting, whereas only nondisclosure of imperfection positively predicted bulimia and oral control. Overall, perfectionistic self-presentation explained 10.4-23.5% of variance in eating disorder symptoms, whereas perfectionism explained 7.9-12.1%. Conclusions: The findings suggest that perfectionistic self-presentation explains why perfectionistic women show higher levels of eating disorder symptoms, particularly dieting. Thus perfectionistic self-presentation appears to play a central role in the relations of perfectionism and disordered eating and may warrant closer attention in theory, research, and treatment of eating and weight disorders

    Device-independent quantum key distribution secure against collective attacks

    Full text link
    Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. We present here in detail the security proof for a DIQKD protocol introduced in [Phys. Rev. Lett. 98, 230501 (2008)]. This proof exploits the full structure of quantum theory (as opposed to other proofs that exploit the no-signalling principle only), but only holds again collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically at each round of the protocol (although she can act coherently on her systems at any time). The security of any DIQKD protocol necessarily relies on the violation of a Bell inequality. We discuss the issue of loopholes in Bell experiments in this context.Comment: 25 pages, 3 figure

    A comparative study of Tam3 and Ac transposition in transgenic tobacco and petunia plants

    Get PDF
    Transposition of the Anthirrinum majus Tam3 element and the Zea mays Ac element has been monitored in petunia and tobacco plants. Plant vectors were constructed with the transposable elements cloned into the leader sequence of a marker gene. Agrobacterium tumefaciens-mediated leaf disc transformation was used to introduce the transposable element constructs into plant cells. In transgenic plants, excision of the transposable element restores gene expression and results in a clearly distinguishable phenotype. Based on restored expression of the hygromycin phosphotransferase II (HPTII) gene, we established that Tam3 excises in 30% of the transformed petunia plants and in 60% of the transformed tobacco plants. Ac excises from the HPTII gene with comparable frequencies (30%) in both plant species. When the ÎČ-glucuronidase (GUS) gene was used to detect transposition of Tam3, a significantly lower excision frequency (13%) was found in both plant species. It could be shown that deletion of parts of the transposable elements Tam3 and Ac, removing either one of the terminal inverted repeats (TIR) or part of the presumptive transposase coding region, abolished the excision from the marker genes. This demonstrates that excision of the transposable element Tam3 in heterologous plant species, as documented for the autonomous element Ac, also depends on both properties. Southern blot hybridization shows the expected excision pattern and the reintegration of Tam3 and Ac elements into the genome of tobacco plants.

    Support and Assessment for Fall Emergency Referrals (SAFER 1) trial protocol. Computerised on-scene decision support for emergency ambulance staff to assess and plan care for older people who have fallen: evaluation of costs and benefits using a pragmatic cluster randomised trial

    Get PDF
    Background: Many emergency ambulance calls are for older people who have fallen. As half of them are left at home, a community-based response may often be more appropriate than hospital attendance. The SAFER 1 trial will assess the costs and benefits of a new healthcare technology - hand-held computers with computerised clinical decision support (CCDS) software - to help paramedics decide who needs hospital attendance, and who can be safely left at home with referral to community falls services. Methods/Design: Pragmatic cluster randomised trial with a qualitative component. We shall allocate 72 paramedics ('clusters') at random between receiving the intervention and a control group delivering care as usual, of whom we expect 60 to complete the trial. Patients are eligible if they are aged 65 or older, live in the study area but not in residential care, and are attended by a study paramedic following an emergency call for a fall. Seven to 10 days after the index fall we shall offer patients the opportunity to opt out of further follow up. Continuing participants will receive questionnaires after one and 6 months, and we shall monitor their routine clinical data for 6 months. We shall interview 20 of these patients in depth. We shall conduct focus groups or semi-structured interviews with paramedics and other stakeholders. The primary outcome is the interval to the first subsequent reported fall (or death). We shall analyse this and other measures of outcome, process and cost by 'intention to treat'. We shall analyse qualitative data thematically. Discussion: Since the SAFER 1 trial received funding in August 2006, implementation has come to terms with ambulance service reorganisation and a new national electronic patient record in England. In response to these hurdles the research team has adapted the research design, including aspects of the intervention, to meet the needs of the ambulance services. In conclusion this complex emergency care trial will provide rigorous evidence on the clinical and cost effectiveness of CCDS for paramedics in the care of older people who have fallen

    Affordances, constraints and information flows as ‘leverage points’ in design for sustainable behaviour

    Get PDF
    Copyright @ 2012 Social Science Electronic PublishingTwo of Donella Meadows' 'leverage points' for intervening in systems (1999) seem particularly pertinent to design for sustainable behaviour, in the sense that designers may have the scope to implement them in (re-)designing everyday products and services. The 'rules of the system' -- interpreted here to refer to affordances and constraints -- and the structure of information flows both offer a range of opportunities for design interventions to in fluence behaviour change, and in this paper, some of the implications and possibilities are discussed with reference to parallel concepts from within design, HCI and relevant areas of psychology
    • 

    corecore