31,857 research outputs found

    How do Neutrinos Propagate ? - Wave-Packet Treatment of Neutrino Oscillation

    Full text link
    The wave-packet treatment of neutrino oscillation developed previously is extended to the case in which momentum distribution functions are taken to be a Gaussian form with both central values and dispersions depending on the mass eigenstates of the neutrinos. It is shown among other things that the velocity of the neutrino wave packets does not in general agree with what one would expect classically and that relativistic neutrinos emitted from pions nevertheless do follow, to a good approximation, the classical trajectory.Comment: 13 page. No figure. Typeset using PTPTeX.st

    Recent update of the RPLUS2D/3D codes

    Get PDF
    The development of the RPLUS2D/3D codes is summarized. These codes utilize LU algorithms to solve chemical non-equilibrium flows in a body-fitted coordinate system. The motivation behind the development of these codes is the need to numerically predict chemical non-equilibrium flows for the National AeroSpace Plane Program. Recent improvements include vectorization method, blocking algorithms for geometric flexibility, out-of-core storage for large-size problems, and an LU-SW/UP combination for CPU-time efficiency and solution quality

    Cross-border intellectual property rights: contract enforcement and absorptive capacity

    Get PDF
    This paper studies cross-border intellectual property rights (IPR) as a North-South contract using a Nash bargaining approach and distinguishes between the outcome and its actual enforcement. The absorptive capacity of the Southern country to exploit technology transfer plays a key role in the negotiated level of IPRs and its post-treaty enforcement. The optimal level of IPR protection relates positively to absorptive capacity. This provides a rationale for the longer time-frame provided to least developed countries in Article 66 of TRIPS to implement its provisions. In addition, monitoring is only effective in preventing contract violation up to a critical level of absorptive capacity. We relate this to the US Trade Representative “Special 301” report, which flags countries that deny adequate IPR protection as “priority watch list”. While disputes with less developed economies are promptly resolved, emerging economies, where most losses from copyright piracy originates from, continue to remain on the list.

    Comparison of a reverse-transverse cross pin technique with a same side cross pin type II external skeletal fixator in 89 dogs

    Get PDF
    The objective of this study was to determine whether a novel reverse-transverse cross pin insertion technique could increase the stability of type II external skeletal fixators (ESF) in dogs compared with an alternate, same side cross pin ESF. Reverse-transverse cross pin technique and type II ESFs same side cross pin technique were applied and compared among subjects. Two of 42 ESFs (4.8%) applied with the reverse-transverse cross pin technique and 39 of 47 ESFs (83%) applied with the same side cross pin technique were subjectively unstable at the time of fixator removal (P < 0.001). The same side cross pin ESFs had significantly more pin tract new bone formation than the reverse-transverse ESFs (P = 0.038). In summary, this approach may provide a method of treating a variety of musculoskeletal conditions and soft tissue cases, which reverse-transverse cross pin ESFs are tolerated in dogs for a variety of conditions

    Combining Undersampled Dithered Images

    Get PDF
    Undersampled images, such as those produced by the HST WFPC-2, misrepresent fine-scale structure intrinsic to the astronomical sources being imaged. Analyzing such images is difficult on scales close to their resolution limits and may produce erroneous results. A set of ``dithered'' images of an astronomical source generally contains more information about its structure than any single undersampled image, however, and may permit reconstruction of a ``superimage'' with Nyquist sampling. I present a tutorial on a method of image reconstruction that builds a superimage from a complex linear combination of the Fourier transforms of a set of undersampled dithered images. This method works by algebraically eliminating the high order satellites in the periodic transforms of the aliased images. The reconstructed image is an exact representation of the data-set with no loss of resolution at the Nyquist scale. The algorithm is directly derived from the theoretical properties of aliased images and involves no arbitrary parameters, requiring only that the dithers are purely translational and constant in pixel-space over the domain of the object of interest. I show examples of its application to WFC and PC images. I argue for its use when the best recovery of point sources or morphological information at the HST diffraction limit is of interest.Comment: 22 pages, 9 EPS figures, submitted to PAS

    Digital Switching in the Quantum Domain

    Get PDF
    In this paper, we present an architecture and implementation algorithm such that digital data can be switched in the quantum domain. First we define the connection digraph which can be used to describe the behavior of a switch at a given time, then we show how a connection digraph can be implemented using elementary quantum gates. The proposed mechanism supports unicasting as well as multicasting, and is strict-sense non-blocking. It can be applied to perform either circuit switching or packet switching. Compared with a traditional space or time domain switch, the proposed switching mechanism is more scalable. Assuming an n-by-n quantum switch, the space consumption grows linearly, i.e. O(n), while the time complexity is O(1) for unicasting, and O(log n) for multicasting. Based on these advantages, a high throughput switching device can be built simply by increasing the number of I/O ports.Comment: 24 pages, 16 figures, LaTe

    CP,T and/or CPT Violations in the K0-K0bar System --Implications of the KTeV,NA48 and CPLEAR Results

    Full text link
    Possible violation of CP, T and/or CPT symmetries in the \ko-\kob system is studied from a phenomenological point of view. For this purpose, we first introduce parameters which represent violation of these symmetries in mixing parameters and decay amplitudes in a convenient and well-defined way and, treating these parameters as small, derive formulas which relate them to the experimentally measured quantities. We then perform numerical analyses, with the aid of the Bell-Steinberger relation, to derive constraints to these symmetry-violating parameters, firstly paying particular attention to the results reported by KTeV Collaboration and NA48 Collaboration, and then with the results reported by CPLEAR Collaboration as well taken into account. A case study, in which either CPT symmetry or T symmetry is assumed, is also carried out. It is demonstrated that CP and T symmetries are violated definitively at the level of 10^{-4} in 2Ď€2\pi decays and presumably at the level of 10^{-3} in the \ko-\kob mixing, and that the Bell-Steinberger relation helps us to establish CP and T violations being definitively present in the \ko-\kob mixing and to test CPT symmetry to a level of 10^{-4} ~ 10^{-5}.Comment: 21 pages, 1 figure

    Combining Stream Mining and Neural Networks for Short Term Delay Prediction

    Full text link
    The systems monitoring the location of public transport vehicles rely on wireless transmission. The location readings from GPS-based devices are received with some latency caused by periodical data transmission and temporal problems preventing data transmission. This negatively affects identification of delayed vehicles. The primary objective of the work is to propose short term hybrid delay prediction method. The method relies on adaptive selection of Hoeffding trees, being stream classification technique and multilayer perceptrons. In this way, the hybrid method proposed in this study provides anytime predictions and eliminates the need to collect extensive training data before any predictions can be made. Moreover, the use of neural networks increases the accuracy of the predictions compared with the use of Hoeffding trees only
    • …
    corecore