311 research outputs found

    On polynomial digraphs

    Get PDF
    Let Ī¦(x,y)\Phi(x,y) be a bivariate polynomial with complex coefficients. The zeroes of Ī¦(x,y)\Phi(x,y) are given a combinatorial structure by considering them as arcs of a directed graph G(Ī¦)G(\Phi). This paper studies some relationship between the polynomial Ī¦(x,y)\Phi(x,y) and the structure of G(Ī¦)G(\Phi).Comment: 13 pages, 6 figures, See also http://www-ma2.upc.edu/~montes

    Universal quantum computation with unlabeled qubits

    Full text link
    We show that an n-th root of the Walsh-Hadamard transform (obtained from the Hadamard gate and a cyclic permutation of the qubits), together with two diagonal matrices, namely a local qubit-flip (for a fixed but arbitrary qubit) and a non-local phase-flip (for a fixed but arbitrary coefficient), can do universal quantum computation on n qubits. A quantum computation, making use of n qubits and based on these operations, is then a word of variable length, but whose letters are always taken from an alphabet of cardinality three. Therefore, in contrast with other universal sets, no choice of qubit lines is needed for the application of the operations described here. A quantum algorithm based on this set can be interpreted as a discrete diffusion of a quantum particle on a de Bruijn graph, corrected on-the-fly by auxiliary modifications of the phases associated to the arcs.Comment: 6 page

    Embedding complete binary trees into star networks

    Get PDF
    Abstract. Star networks have been proposed as a possible interconnection network for massively parallel computers. In this paper we investigate embeddings of complete binary trees into star networks. Let G and H be two networks represented by simple undirected graphs. An embedding of G into H is an injective mapping f from the vertices of G into the vertices of H. The dilation of the embedding is the maximum distance between f(u), f(v) taken over all edges (u, v) of G. Low dilation embeddings of binary trees into star graphs correspond to efficient simulations of parallel algorithms that use the binary tree topology, on parallel computers interconnected with star networks. First, we give a construction of embeddings of dilation 1 of complete binary trees into n-dimensional star graphs. These trees are subgraphs of star graphs. Their height is fl(n log n), which is asymptotically optimal. Constructions of embeddings of complete binary trees of dilation 28 and 26 + 1, for 8 > 1, into star graphs are then given. The use of larger dilation allows embeddings of trees of greater height into star graphs. For example, the difference of the heights of the trees embedded with dilation 2 and 1 is greater than n/2. All these constructions can be modified to yield embeddings of dilation 1, and 26, for ~ > 1, of complete binary trees into pancake graphs. Our results show that massively parallel computers interconnected with star networks are well suited for efficient simulations of parallel algorithms with complete binary tree topology

    "Of Mice and Measures": A Project to Improve How We Advance Duchenne Muscular Dystrophy Therapies to the Clinic

    Get PDF
    A new line of dystrophic mdx mice on the DBA/2J (D2) background has emerged as a candidate to study the efficacy of therapeutic approaches for Duchenne muscular dystrophy (DMD). These mice harbor genetic polymorphisms that appear to increase the severity of the dystropathology, with disease modifiers that also occur in DMD patients, making them attractive for efficacy studies and drug development. This workshop aimed at collecting and consolidating available data on the pathological features and the natural history of these new D2/mdx mice, for comparison with classic mdx mice and controls, and to identify gaps in information and their potential value. The overall aim is to establish guidance on how to best use the D2/mdx mouse model in preclinical studies

    The battle over Syria's reconstruction

    Get PDF
    Reconstruction is becoming the new battleground in the Syrian conflictā€”its continuation by other means. It is instrumentalized by the regime as a way to reconsolidate its control over the country and by rival regional and international powers to shape the internal balance of power and establish spheres of influence in the country. The paper examines the Asad regimeā€™s practices, including co-optation of militia leaders via reconstruction concessions and use of reconstruction to clear strategic areas of opposition-dominated urban settlements. The paper then surveys how the geopolitical struggle in Syria has produced an asymmetry as regards reconstruction: those powers that lost the geo-political contest on the ground seek to use geo-economic superiority to reverse the geo-political outcome. Then the impact of proxy wars and spheres of influence in the country on the security context for reconstruction is examined. Finally, the reconstruction initiatives of the various external parties are assessed, including Russia, Iran and Turkey as well as the spoiler role by which the US seeks to obstruct reconstruction that would spell victory in Syria for its Russian and Iranian rivals.PostprintPeer reviewe

    Serial Examination of an Inducible and Reversible Dilated Cardiomyopathy in Individual Adult Drosophila

    Get PDF
    Recent work has demonstrated that Drosophila can be used as a model of dilated cardiomyopathy, defined as an enlarged cardiac chamber at end-diastole when the heart is fully relaxed and having an impaired systolic function when the heart is fully contracted. Gene mutations that cause cardiac dysfunction in adult Drosophila can result from abnormalities in cardiac development or alterations in post-developmental heart function. To clarify the contribution of transgene expression to post-developmental cardiac abnormalities, we applied strategies to examine the temporal and spacial effects of transgene expression on cardiac function. We engineered transgenic Drosophila based on the well-characterized temperature-sensitive Gal80 protein in the context of the bipartite Gal4/UAS transgenic expression system in Drosophila employing the cardiac specific driver, tinCĪ”4-Gal4. Then, we developed a strategy using optical coherence tomography to serially measure cardiac function in the individual flies over time course of several days. As a proof of concept we examined the effects of the expression of a human mutant delta-sarcoglycan associated with familial heart failure and observed a reversible, post-developmental dilated cardiomyopathy in Drosophila. Our results show that the unique imaging strategy based on the non-destructive, non-invasive properties of optical coherence tomography can be applied to serially examine cardiac function in individual adult flies. Furthermore, the induction and reversal of cardiac transgene expression can be investigated in adult flies thereby providing insight into the post-developmental effects of transgene expression

    Securitizing the Muslim Brotherhood: state violence and authoritarianism in Egypt after the Arab Spring

    Get PDF
    Unprecedented levels of state violence against the Muslim Brotherhood, and the widespread acceptance of this violence by Egyptians following the July 2013 military coup, have been under-examined by scholars of both critical security studies and Middle East politics, reflecting implicit assumptions that state violence is unexceptional beyond Europe. This article explores how the deployment of such levels of violence was enabled by a securitization process in which the Egyptian military successfully appropriated popular opposition to Muslim Brotherhood rule, constructing the group as an existential threat to Egypt and justifying special measures against it. The article builds on existing critiques of the Eurocentrism of securitization theory, alongside the writings of Antonio Gramsci, to further refine its application to non-democratic contexts. In addition to revealing the exceptionalism of state violence against the Muslim Brotherhood and highlighting the important role of nominally non-state actors in constructing the Muslim Brotherhood as a threat to Egypt, the article also signals the role of securitization in re-establishing authoritarian rule in the wake of the 2011 uprising. Thus, we argue that securitization not only constitutes a break from ā€˜normal politicsā€™ but may also be integral to the reconstitution of ā€˜normal politicsā€™ following a period of transition

    Task swapping networks in distributed systems

    Full text link
    In this paper we propose task swapping networks for task reassignments by using task swappings in distributed systems. Some classes of task reassignments are achieved by using iterative local task swappings between software agents in distributed systems. We use group-theoretic methods to find a minimum-length sequence of adjacent task swappings needed from a source task assignment to a target task assignment in a task swapping network of several well-known topologies.Comment: This is a preprint of a paper whose final and definite form is published in: Int. J. Comput. Math. 90 (2013), 2221-2243 (DOI: 10.1080/00207160.2013.772985
    • ā€¦
    corecore