15,980 research outputs found
Modeling the environmental controls on tree water use at different temporal scales
Acknowledgements This study is part of the first authorās PhD projects in 2010ā2014, co-funded by the National Centre for Groundwater Research and Training in Australia and the China Scholarship Council. We give thanks to Zijuan Deng and Xiang Xu for their assistance in the field. Constructive comments and suggestion from the anonymous reviewers are appreciated for significant improvement of the manuscript.Peer reviewedPostprin
Polyandrous females avoid costs of inbreeding
Why do females typically mate with more than one male? Female mating patterns have broad implications for sexual selection, speciation and conflicts of interest between the sexes, and yet they are poorly understood. Matings inevitably have costs, and for females, the benefits of taking more than one mate are rarely obvious. One possible explanation is that females gain benefits because they can avoid using sperm from genetically incompatible males, or invest less in the offspring of such males. It has been shown that mating with more than one male can increase offspring viability, but we present the first clear demonstration that this occurs because females with several mates avoid the negative effects of genetic incompatibility. We show that in crickets, the eggs of females that mate only with siblings have decreased hatching success. However, if females mate with both a sibling and a non-sibling they avoid altogether the low egg viability associated with sibling matings. If similar effects occur in other species, inbreeding avoidance may be important in understanding the prevalence of multiple mating
Combinatorial Bounds and Characterizations of Splitting Authentication Codes
We present several generalizations of results for splitting authentication
codes by studying the aspect of multi-fold security. As the two primary
results, we prove a combinatorial lower bound on the number of encoding rules
and a combinatorial characterization of optimal splitting authentication codes
that are multi-fold secure against spoofing attacks. The characterization is
based on a new type of combinatorial designs, which we introduce and for which
basic necessary conditions are given regarding their existence.Comment: 13 pages; to appear in "Cryptography and Communications
General solution of an exact correlation function factorization in conformal field theory
We discuss a correlation function factorization, which relates a three-point
function to the square root of three two-point functions. This factorization is
known to hold for certain scaling operators at the two-dimensional percolation
point and in a few other cases. The correlation functions are evaluated in the
upper half-plane (or any conformally equivalent region) with operators at two
arbitrary points on the real axis, and a third arbitrary point on either the
real axis or in the interior. This type of result is of interest because it is
both exact and universal, relates higher-order correlation functions to
lower-order ones, and has a simple interpretation in terms of cluster or loop
probabilities in several statistical models. This motivated us to use the
techniques of conformal field theory to determine the general conditions for
its validity.
Here, we discover a correlation function which factorizes in this way for any
central charge c, generalizing previous results. In particular, the
factorization holds for either FK (Fortuin-Kasteleyn) or spin clusters in the
Q-state Potts models; it also applies to either the dense or dilute phases of
the O(n) loop models. Further, only one other non-trivial set of highest-weight
operators (in an irreducible Verma module) factorizes in this way. In this case
the operators have negative dimension (for c < 1) and do not seem to have a
physical realization.Comment: 7 pages, 1 figure, v2 minor revision
Contextuality under weak assumptions
The presence of contextuality in quantum theory was first highlighted by Bell, Kochen and Specker, who discovered that for quantum systems of three or more dimensions, measurements could not be viewed as deterministically revealing pre-existing properties of the system. More precisely, no model can assign deterministic outcomes to the projectors of a quantum measurement in a way that depends only on the projector and not the context (the full set of projectors) in which it appeared, despite the fact that the Born rule probabilities associated with projectors are independent of the context. A more general, operational definition of contextuality introduced by Spekkens, which we will term "probabilistic contextuality", drops the assumption of determinism and allows for operations other than measurements to be considered contextual. Even two-dimensional quantum mechanics can be shown to be contextual under this generalised notion. Probabilistic noncontextuality represents the postulate that elements of an operational theory that cannot be distinguished from each other based on the statistics of arbitrarily many repeated experiments (they give rise to the same operational probabilities) are ontologically identical. In this paper, we introduce a framework that enables us to distinguish between different noncontextuality assumptions in terms of the relationships between the ontological representations of objects in the theory given a certain relation between their operational representations. This framework can be used to motivate and define a "possibilistic" analogue, encapsulating the idea that elements of an operational theory that cannot be unambiguously distinguished operationally can also not be unambiguously distinguished ontologically. We then prove that possibilistic noncontextuality is equivalent to an alternative notion of noncontextuality proposed by Hardy. Finally, we demonstrate that these weaker noncontextuality assumptions are sufficient to prove alternative versions of known "no-go" theorems that constrain Ļ-epistemic models for quantum mechanics
Ultra-dense phosphorus in germanium delta-doped layers
Phosphorus (P) in germanium (Ge) delta-doped layers are fabricated in
ultra-high vacuum by adsorption of phosphine molecules onto an atomically flat
clean Ge(001) surface followed by thermal incorporation of P into the lattice
and epitaxial Ge overgrowth by molecular beam epitaxy. Structural and
electrical characterizations show that P atoms are confined, with minimal
diffusion, into an ultra-narrow 2-nm-wide layer with an electrically-active
sheet carrier concentration of 4x10^13 cm-2 at 4.2 K. These results open up the
possibility of ultra-narrow source/drain regions with unprecedented carrier
densities for Ge n-channel field effect transistors
Energy storage-boiler tank
Activities performed in an effort to demonstrate heat of fusion energy storage in containerized salts are reported. The properties and cycle life characteristics of a eutectic salt having a boiling point of about 385 C (NaCl, KCl, Mg Cl2) were determined. M-terphenyl was chosen as the heat transfer fluid. Compatibility studies were conducted and mild steel containers were selected. The design and fabrication of a 2MWh storage boiler tank are discussed
Maximizing phonon thermal conductance for ballistic membranes
At low temperatures, phonon scattering can become so weak that phonon
transport becomes ballistic. We calculate the ballistic phonon conductance G
for membranes using elasticity theory, considering the transition from three to
two dimensions. We discuss the temperature and thickness dependence and
especially concentrate on the issue of material parameters. For all membrane
thicknesses, the best conductors have, counter-intuitively, the lowest speed of
sound.Comment: 4 pages, 4 figures, proceedings to phonons 2007 conferenc
Creation of a Neural Network for the American Sign Language to Russian Translation App
A large population of people utilize American Sign Language for their primary method of communication. No commercially available product is available for these people for when they need to communicate with speakers of a foreign language. We must investigate methods to make communication between these two parties easier and more accessible. By using a neural network to classify images of American Sign Language letters, we can build a service to make translation of American Sign Language into foreign languages possible
- ā¦