4,155 research outputs found

    Alignments of parity even/odd-only multipoles in CMB

    Get PDF
    We compare the statistics of parity even and odd multipoles of the cosmic microwave background (CMB) sky from PLANCK full mission temperature measurements. An excess power in odd multipoles compared to even multipoles has previously been found on large angular scales. Motivated by this apparent parity asymmetry, we evaluate directional statistics associated with even compared to odd multipoles, along with their significances. Primary tools are the \emph{Power Tensor} and \emph{Alignment Tensor} statistics. We limit our analysis to the first sixty multipoles i.e., l=[2,61]l=[2,61]. We find no evidence for statistically unusual alignments of even parity multipoles. More than one independent statistic finds evidence for alignments of anisotropy axes of odd multipoles, with a significance equivalent to āˆ¼2Ļƒ\sim 2 \sigma or more. The robustness of alignment axes is tested by making galactic cuts and varying the multipole range. Very interestingly, the region spanned by the (a)symmetry axes is found to broadly contain other parity (a)symmetry axes previously observed in the literature.Comment: 13 pages, 13 figures, Matches the version accepted in MNRA

    Numerical approach for retention characteristics of double floating-gate memories

    Full text link
    We report on a numerical investigation in which memory characteristics of double floating-gate (DFG) structure were compared to those of the conventional single floating-gate structure, including an interference effect between two cells. We found that the advantage of the DFG structure is its longer retention time and the disadvantage is its smaller threshold voltage shift. We also provide an analytical form of charging energy including the interference effect.Comment: 4 pages, 4 figure

    The Decompensating Pediatric Inpatient Simulation Scenarios

    Get PDF
    Introduction: In July of 2009, Childrenā€™s National Medical Center (CNMC) Hospitalist and Emergency Department (ED) educators collaborated to create and implement unique simulation scenarios for trainees rotating on the pediatric hospitalist teams. The goal of this educational intervention is to teach and allow rehearsal of an approach to the unstable patient across three scenarios. Trainees use this high-fidelity, low-risksimulation to apply targeted clinical reasoning and their initial assessment and management strategies to core clinical problems. The three scenarios included in this resource cover altered mental status and seizure, respiratory distress and anaphylaxis, and refractory status asthmaticus, respectively. Methods:This resource contains a template, simulator technologist information, scenario progression, and guided discussion for three scenarios of worsening pediatric inpatients. Each case simulation and debriefing is intended to take approximately 30 to 45 minutes. Results: Within six months of implementation, the monthly simulation scenario series logged over 85 learner encounters at CNMC with uniformly positive evaluations indicating that learners subjectively felt that their competence in the assessment and management of unstable inpatients was improving. As trainees become even more proficient at timely recognition of sick patients, appropriate initial management, education, patient care, and safety outcomes are expected to improve. Discussion: The goal of this educational intervention is to teach and allow rehearsal of an approach to the unstable patient. Simulation such as this provide the opportunity to assess learnersā€™ competency with specific skills as long as rubrics for evaluation are created and applied to similar scenarios. AAMC MedEdPORTAL publication ID 7993. Link to original

    SecureDBaaS Model for Accessing Encrypted Cloud Databases

    Get PDF
    Cloud computing has recently emerged being a compelling paradigm that pertains to managing and delivering services over the web. The particular prevalent problem connected with cloud is confidentiality, security, as well as reliability etc., in which how the cloud provider assures. To recognize this, a novel architecture is usually introduced that will integrates cloud database services and as well executing concurrent operations on encrypted information. Also a new homomorphic encryption algorithm will likely be incorporated to offer confidentiality as well as concurrent execution of various SQL operations. This will be the first option supporting quite a few stributed clienteles to access encrypted cloud databases. One of main thing is that it eliminates advanced proxies in between cloud user and provider. The performance on the architecture is usually lculated by means of theoretical and practical results which are subjected to TPC-C benchmark standard tools for a number of clients as well as network latencies

    Characterization of the first hexacoordinate phosphorus compound with Sā†’Pā†S bonds

    Get PDF
    The first example of a hexacoordinate phosphorus compound [S{6-t-Bu-4-Me-C6H2O}2]2P+(Cl-· C3H4N2) with two S→P bonds is reported. This compound can be construed as an oxophosphonium salt with double intramolecular coordination by sulfur atoms. X-ray structure reveals a facial arrangement of the ligands with two coordinating sulfur atoms cis to each other. The S→P distance of 2.334 (1) Å is one among very short coordinate bond distances between sulfur and phosphorus

    Krill: An exploration in underwater sensor networks

    Get PDF
    While sensor networks have now become very popular on land, the underwater environment still poses some difficult problems. Communication is one of the difficult challenges under water. There are two options: optical and acoustic. We have designed an optical communication board that allows the Fleckā€™s to communicate optically. We have tested the resulting underwater sensor nodes in two different applications
    • ā€¦
    corecore