10,868 research outputs found

    Supplying Improved Seed to Farmers in Rural Kenya: The Case of Freshco Kenya Ltd.

    Get PDF
    Freshco, a small producer and distributor of hybrid maize seed and macadamia seedlings, was one of the first private companies to enter the Kenya seed market after its liberalization. Currently, the company produces and markets six high yielding maize varieties that are suited for diverse agro-ecological conditions. Despite the company’s encouraging growth in the local maize seed market, Freshco’s executives recognize the need to scale up operations to stay competitive. The company’s challenge is to recognize business opportunities and customer needs in an environment susceptible to ecological, political, and socioeconomic change.Kenya, seed industry, smallholder farmers, scenario planning, Crop Production/Industries, Farm Management, Research Methods/ Statistical Methods, Q10, Q12,

    Do mixtures of bosonic and fermionic atoms adiabatically heat up in optical lattices?

    Full text link
    Mixtures of bosonic and fermionic atoms in optical lattices provide a promising arena to study strongly correlated systems. In experiments realizing such mixtures in the quantum degenerate regime the temperature is a key parameter. In this work, we investigate the intrinsic heating and cooling effects due to an entropy-preserving raising of the optical lattice potential. We analyze this process, identify the generic behavior valid for a wide range of parameters, and discuss it quantitatively for the recent experiments with 87Rb and 40K atoms. In the absence of a lattice, we treat the bosons in the Hartree-Fock-Bogoliubov-Popov-approximation, including the fermions in a self-consistent mean field interaction. In the presence of the full three-dimensional lattice, we use a strong coupling expansion. As a result of the presence of the fermions, the temperature of the mixture after the lattice ramp-up is always higher than for the pure bosonic case. This sheds light onto a key point in the analysis of recent experiments.Comment: 5 pages, 3 figure

    Parametric instabilities in magnetized multicomponent plasmas

    Full text link
    This paper investigates the excitation of various natural modes in a magnetized bi-ion or dusty plasma. The excitation is provided by parametrically pumping the magnetic field. Here two ion-like species are allowed to be fully mobile. This generalizes our previous work where the second heavy species was taken to be stationary. Their collection of charge from the background neutral plasma modifies the dispersion properties of the pump and excited waves. The introduction of an extra mobile species adds extra modes to both these types of waves. We firstly investigate the pump wave in detail, in the case where the background magnetic field is perpendicular to the direction of propagation of the pump wave. Then we derive the dispersion equation relating the pump to the excited wave for modes propagating parallel to the background magnetic field. It is found that there are a total of twelve resonant interactions allowed, whose various growth rates are calculated and discussed.Comment: Published in May 2004; this is a late submission to the archive. 14 pages, 8 figure

    Work probability distribution and tossing a biased coin

    Full text link
    We show that the rare events present in dissipated work that enters Jarzynski equality, when mapped appropriately to the phenomenon of large deviations found in a biased coin toss, are enough to yield a quantitative work probability distribution for Jarzynski equality. This allows us to propose a recipe for constructing work probability distribution independent of the details of any relevant system. The underlying framework, developed herein, is expected to be of use in modelling other physical phenomena where rare events play an important role.Comment: 6 pages, 4 figures

    Actin at cell-cell junctions is composed of two dynamic and functional populations

    Get PDF
    The ability of epithelial cells to polarize requires cell-cell adhesion mediated by cadherin receptors. During cell-cell contact, the mechanism via which a flat, spread cell shape is changed into a tall, cuboidal epithelial morphology is not known. We found that cadherin-dependent adhesion modulates actin dynamics by triggering changes in actin organization both locally at junctions and within the rest of the cell. Upon induction of cell-cell contacts, two spatial actin populations are distinguishable: junctional actin and peripheral thin bundles. With time, the relative position of these two populations changes and becomes indistinguishable to form a cortical actin ring that is characteristic of mature, fully polarized epithelial cells. Junctional actin and thin actin bundles differ in their actin dynamics and mechanism of formation, and interestingly, have distinct roles during epithelial polarization. Whereas junctional actin stabilizes clustered cadherin receptors at cell-cell contacts, contraction of peripheral actin bundle is essential for an increase in the maximum height at the lateral domain during polarization (cuboidal morphology). Thus, both junctional actin and thin bundles are necessary, and cooperate with each other to generate a polarized epithelial morphology

    Design of Electromagnetic Pulse Crimp Torque Joints

    Get PDF
    Electromagnetic pulse crimping of form fit joints was investigated using tubes with a diameter of 50 mm and a wall thickness of 1,5 mm, in the aluminium alloy EN AW-6060. The tubes were crimped onto steel internal parts, which were designed to bear torsional loads. Grooved, knurl rolled and knurl cut internal workpieces were used. To assess the torque strength of the connections, a torque test set-up was designed and built. In a first test series, grooved internal parts were used. The influence of the internal workpiece design and the energy level on the torque resistance was investigated. Related to the geometry of the internal workpiece, the following parameters were varied: the groove depth, the groove width, the edge radius and the number of grooves. In a second test series, knurl rolled and knurl cut internal workpieces were used. For the joints with a knurl rolled internal part, the influence of the knurl pattern, defined by the pitch, was investigated. For the connections with a knurl cut internal part, the influence of the energy level was studied. The different joint failure mechanisms were determined

    Singular value decomposition in parametrised tests of post-Newtonian theory

    Full text link
    Various coefficients of the 3.5 post-Newtonian (PN) phasing formula of non-spinning compact binaries moving in circular orbits is fully characterized by the two component masses. If two of these coefficients are independently measured, the masses can be estimated. Future gravitational wave observations could measure many of the 8 independent PN coefficients calculated to date. These additional measurements can be used to test the PN predictions of the underlying theory of gravity. Since all of these parameters are functions of the two component masses, there is strong correlation between the parameters when treated independently. Using Singular Value Decomposition of the Fisher information matrix, we remove this correlations and obtain a new set of parameters which are linear combinations of the original phasing coefficients. We show that the new set of parameters can be estimated with significantly improved accuracies which has implications for the ongoing efforts to implement parametrised tests of PN theory in the data analysis pipelines.Comment: 17 pages, 6 figures, Accepted for publication in Classical and Quantum Gravity (Matches with the published version

    Quantum protocols for anonymous voting and surveying

    Get PDF
    We describe quantum protocols for voting and surveying. A key feature of our schemes is the use of entangled states to ensure that the votes are anonymous and to allow the votes to be tallied. The entanglement is distributed over separated sites; the physical inaccessibility of any one site is sufficient to guarantee the anonymity of the votes. The security of these protocols with respect to various kinds of attack is discussed. We also discuss classical schemes and show that our quantum voting protocol represents a N-fold reduction in computational complexity, where N is the number of voters.Comment: 8 pages. V2 includes the modifications made for the published versio

    Non-malleable encryption: simpler, shorter, stronger

    Get PDF
    In a seminal paper, Dolev et al. [15] introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built from semantically secure (IND-CPA) encryption, as was shown in the seminal works by Pass et al. [29] and by Choi et al. [9], the latter of which provided a black-box construction. In this paper we investigate three questions related to NM-CPA security: 1. Can the rate of the construction by Choi et al. of NM-CPA from IND-CPA be improved? 2. Is it possible to achieve multi-bit NM-CPA security more efficiently from a single-bit NM-CPA scheme than from IND-CPA? 3. Is there a notion stronger than NM-CPA that has natural applications and can be achieved from IND-CPA security? We answer all three questions in the positive. First, we improve the rate in the scheme of Choi et al. by a factor O(λ), where λ is the security parameter. Still, encrypting a message of size O(λ) would require ciphertext and keys of size O(λ2) times that of the IND-CPA scheme, even in our improved scheme. Therefore, we show a more efficient domain extension technique for building a λ-bit NM-CPA scheme from a single-bit NM-CPA scheme with keys and ciphertext of size O(λ) times that of the NM-CPA one-bit scheme. To achieve our goal, we define and construct a novel type of continuous non-malleable code (NMC), called secret-state NMC, as we show that standard continuous NMCs are not enough for the natural “encode-then-encrypt-bit-by-bit” approach to work. Finally, we introduce a new security notion for public-key encryption that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA). After showing that NM-SDA is a strict strengthening of NM-CPA and allows for more applications, we nevertheless show that both of our results—(faster) construction from IND-CPA and domain extension from one-bit scheme—also hold for our stronger NM-SDA security. In particular, the notions of IND-CPA, NM-CPA, and NM-SDA security are all equivalent, lying (plausibly, strictly?) below IND-CCA securit
    corecore