12,687 research outputs found
An optimised scalable synthesis of H2O@C60and a new synthesis of H2@C60
New high-yielding synthetic routes to the small-molecule endofullerenes H2O@C60, D2O@C60 and H2@C60 are described. The use of high temperatures and pressures for the endohedral molecule incorporation are avoided. A new partial closure step using PPh3, and final suturing using a novel Diels–Alder/retro-Diels–Alder sequence are amongst the advances reported
Competing Rights Under the Totality of the Circumstances Test: Expanding DNA Collection Statutes
The Effect of School Choice on Student Outcomes: Evidence from Randomized Lotteries
School choice has become an increasingly prominent strategy for urban school districts seeking to enhance academic achievement. Evaluating the impact of such programs is complicated by the fact that a highly select sample of students takes advantage of these programs. To overcome this difficulty, we exploit randomized lotteries that determine high school admission in the Chicago Public Schools. Surprisingly, we find little evidence that attending sought after programs provides any benefit on a wide variety of traditional academic measures, including standardized test scores, attendance rates, course-taking, and credit accumulation. This is true despite the fact that those students who win the lotteries attend better high schools along a number of dimensions, including higher peer achievement levels, higher peer graduation rates, and lower levels of poverty. We do, however, uncover evidence that attendance at such schools may improve a subset of non-traditional outcome measures, such as self-reported disciplinary incidences and arrest rates.
Rotten Apples: An Investigation of the Prevalence and Predictors of Teacher Cheating
We develop an algorithm for detecting teacher cheating that combines information on unexpected test score fluctuations and suspicious patterns of answers for students in a classroom. Using data from the Chicago Public Schools, we estimate that serious cases of teacher or administrator cheating on standardized tests occur in a minimum of 4-5 percent of elementary school classrooms annually. Moreover, the observed frequency of cheating appears to respond strongly to relatively minor changes in incentives. Our results highlight the fact that incentive systems, especially those with bright line rules, often induce behavioral distortions such as cheating. Statistical analysis, however, may provide a means of detecting illicit acts, despite the best attempts of perpetrators to keep them clandestine.
Catching Cheating Teachers: The Results of an Unusual Experiment in Implementing Theory
This paper reports on the results of a prospective implementation of methods for detecting teacher cheating. In Spring 2002, over 100 Chicago Public Schools elementary classrooms were selected for retesting based on the cheating detection algorithm. Classrooms prospectively identified as likely cheaters experienced large test score declines. In contrast, classes that had large test score gains on the original test, but were prospectively identified as being unlikely to have cheated, maintained their original gains. Randomly selected classrooms also maintained their gains. The cheating detection tools were thus demonstrated to be effective in distinguishing between classrooms that achieved large test-score gains as a consequence of cheating versus those whose gains were the result of outstanding teaching. In addition, the data generated by the implementation experiment highlight numerous ways in which the original cheating detection methods can be improved in the future.
Security Policy Specification Using a Graphical Approach
A security policy states the acceptable actions of an information system, as
the actions bear on security. There is a pressing need for organizations to
declare their security policies, even informal statements would be better than
the current practice. But, formal policy statements are preferable to support
(1) reasoning about policies, e.g., for consistency and completeness, (2)
automated enforcement of the policy, e.g., using wrappers around legacy systems
or after the fact with an intrusion detection system, and (3) other formal
manipulation of policies, e.g., the composition of policies. We present LaSCO,
the Language for Security Constraints on Objects, in which a policy consists of
two parts: the domain (assumptions about the system) and the requirement (what
is allowed assuming the domain is satisfied). Thus policies defined in LaSCO
have the appearance of conditional access control statements. LaSCO policies
are specified as expressions in logic and as directed graphs, giving a visual
view of policy. LaSCO has a simple semantics in first order logic (which we
provide), thus permitting policies we write, even for complex policies, to be
very perspicuous. LaSCO has syntax to express many of the situations we have
found to be useful on policies or, more interesting, the composition of
policies. LaSCO has an object-oriented structure, permitting it to be useful to
describe policies on the objects and methods of an application written in an
object-oriented language, in addition to the traditional policies on operating
system objects. A LaSCO specification can be automatically translated into
executable code that checks an invocation of a program with respect to a
policy. The implementation of LaSCO is in Java, and generates wrappers to check
Java programs with respect to a policy.Comment: 28 pages, 22 figures, in color (but color is not essential for
viewing); UC Davis CS department technical report (July 22, 1998
Geometric Aspects of Composite Pulses
Unitary operations acting on a quantum system must be robust against
systematic errors in control parameters for reliable quantum computing.
Composite pulse technique in nuclear magnetic resonance (NMR) realises such a
robust operation by employing a sequence of possibly poor quality pulses. In
this article, we demonstrate that two kinds of composite pulses, one
compensates for a pulse length error in a one-qubit system and the other
compensates for a J-coupling error in a twoqubit system, have vanishing
dynamical phase and thereby can be seen as geometric quantum gates, which
implement unitary gates by the holonomy associated with dynamics of cyclic
vectors defined in the text.Comment: 20 pages, 4 figures. Accepted for publication in Philosophical
Transactions of the Royal Society
Micromechanical microphone using sideband modulation of nonlinear resonators
We report the successful detection of an audio signal via sideband modulation
of a nonlinear piezoelectric micromechanical resonator. The
27096-m resonator was shown to be reliable in audio detection for
sound intensity levels as low as ambient room noise and to have an unamplified
sensitivity of 23.9 V/Pa. Such an approach may be adapted in acoustic
sensors and microphones for consumer electronics or medical equipment such as
hearing aids.Comment: 5 pages, 3 figure
Nuclear Spins as Quantum Memory in Semiconductor Nanostructures
We theoretically consider solid state nuclear spins in a semiconductor
nanostructure environment as long-lived, high-fidelity quantum memory. In
particular, we calculate, in the limit of a strong applied magnetic field, the
fidelity versus time of P donor nuclear spins in random bath environments of Si
and GaAs, and the lifetime of excited intrinsic spins in polarized Si and GaAs
environments. In the former situation, the nuclear spin dephases due to
spectral diffusion induced by the dipolar interaction among nuclei in the bath.
We calculate the decay of nuclear spin quantum memory in the context of Hahn
and Carr-Purcell-Meiboom-Gill (CPMG) refocused spin echoes using a formally
exact cluster expansion technique which has previously been successful in
dealing with electron spin dephasing in a solid state nuclear spin bath. With
decoherence dominated by transverse dephasing (T2), we find it feasible to
maintain high fidelity (losses of less than 10^{-6}) quantum memory on nuclear
spins for times of the order of 100 microseconds (GaAs:P) and 1 to 2
milliseconds (natural Si:P) using CPMG pulse sequences of just a few (~2-4)
applied pulses. We also consider the complementary situation of a central
flipped intrinsic nuclear spin in a bath of completely polarized nuclear spins
where decoherence is caused by the direct flip-flop of the central spin with
spins in the bath. Exact numerical calculations that include a sufficiently
large neighborhood of surrounding nuclei show lifetimes on the order of 1-5 ms
for both GaAs and natural Si. Our calculated nuclear spin coherence times may
have significance for solid state quantum computer architectures using
localized electron spins in semiconductors where nuclear spins have been
proposed for quantum memory storage
- …
