2,599 research outputs found

    Medical genetics consultation

    Get PDF
    Medical genetics have three components: clinical, chromosomal and molecular The role of this clinical-biological discipline is to diagnose genetic diseases, participate in the management of patients, offer genetic counselling to family members concerning the probability of occurrence or reoccurrence of genetic diseases, and suggest preventive measures to couples at risk. A specific aspect of genetic counselling is that it is aimed at healthy or affected individuals taking into account all the members of their family

    Action principles, restoration of BRS symmetry and the renormalization group equation for chiral non-Abelian gauge theories in dimensional renormalization with a non-anticommuting γ5\gamma_5

    Get PDF
    The one-loop renormalization of a general chiral gauge theory without scalar and Majorana fields is fully worked out within Breitenlohner and Maison dimensional renormalization scheme. The coefficients of the anomalous terms introduced in the Slavnov-Taylor equations by the minimal subtraction algorithm are calculated and the asymmetric counterterms needed to restore the BRS symmetry, if the anomaly cancellation conditions are met, are computed. The renormalization group equation and its coefficients are worked out in the anomaly free case. The computations draw heavily from the existence of action principles and BRS cohomology theory.Comment: 86 pages, 14 figures, one table, plane te

    An oscillator circuit to produce a radio-frequency discharge and application to metastable helium saturated absorption spectroscopy

    Full text link
    We present an rf gas discharge apparatus which provides an atomic frequency reference for laser manipulation of metastable helium. We discuss the biasing and operation of a Colpitts oscillator in which the discharge coil is part of the oscillator circuit. Radiofrequency radiation is reduced by placing the entire oscillator in a metal enclosure.Comment: 9 pages, 5 figure

    Vacuum Polarization Effects in the Lorentz and PCT Violating Electrodynamics

    Full text link
    In this work we report new results concerning the question of dynamical mass generation in the Lorentz and PCT violating quantum electrodynamics. A one loop calculation for the vacuum polarization tensor is presented. The electron propagator, "dressed" by a Lorentz breaking extra term in the fermion Lagrangian density, is approximated by its first order: this scheme is shown to break gauge invariance. Then we rather consider a full calculation to second order in the Lorentz breaking parameter: we recover gauge invariance and use the Schwinger-Dyson equation to discuss the full photon propagator. This allows a discussion on a possible photon mass shift as well as measurable, observable physical consequences, such as the Lamb-shift.Comment: Latex file, 19 pages, no figures, includes PACS number

    Constrained Cost-Coupled Stochastic Games with Independent State Processes

    Full text link
    We consider a non-cooperative constrained stochastic games with N players with the following special structure. With each player there is an associated controlled Markov chain. The transition probabilities of the i-th Markov chain depend only on the state and actions of controller i. The information structure that we consider is such that each player knows the state of its own MDP and its own actions. It does not know the states of, and the actions taken by other players. Finally, each player wishes to minimize a time-average cost function, and has constraints over other time-avrage cost functions. Both the cost that is minimized as well as those defining the constraints depend on the state and actions of all players. We study in this paper the existence of a Nash equilirium. Examples in power control in wireless communications are given.Comment: 7 pages, submitted in september 2006 to Operations Research Letter

    Charon's radius and density from the combined data sets of the 2005 July 11 occultation

    Full text link
    The 2005 July 11 C313.2 stellar occultation by Charon was observed by three separate research groups, including our own, at observatories throughout South America. Here, the published timings from the three data sets have been combined to more accurately determine the mean radius of Charon: 606.0 +/- 1.5 km. Our analysis indicates that a slight oblateness in the body (0.006 +/- 0.003) best matches the data, with a confidence level of 86%. The oblateness has a pole position angle of 71.4 deg +/- 10.4 deg and is consistent with Charon's pole position angle of 67 deg. Charon's mean radius corresponds to a bulk density of 1.63 +/- 0.07 g/cm3, which is significantly less than Pluto's (1.92 +/- 0.12 g/cm3). This density differential favors an impact formation scenario for the system in which at least one of the impactors was differentiated. Finally, unexplained differences between chord timings measured at Cerro Pachon and the rest of the data set could be indicative of a depression as deep as 7 km on Charon's limb.Comment: 25 pages including 4 tables and 2 figures. Submitted to the Astronomical Journal on 2006 Feb 0

    Einstein-Weyl structures and Bianchi metrics

    Get PDF
    We analyse in a systematic way the (non-)compact four dimensional Einstein-Weyl spaces equipped with a Bianchi metric. We show that Einstein-Weyl structures with a Class A Bianchi metric have a conformal scalar curvature of constant sign on the manifold. Moreover, we prove that most of them are conformally Einstein or conformally K\"ahler ; in the non-exact Einstein-Weyl case with a Bianchi metric of the type VII0,VIIIVII_0, VIII or IXIX, we show that the distance may be taken in a diagonal form and we obtain its explicit 4-parameters expression. This extends our previous analysis, limited to the diagonal, K\"ahler Bianchi IXIX case.Comment: Latex file, 12 pages, a minor modification, accepted for publication in Class. Quant. Gra

    CacheZoom: How SGX Amplifies The Power of Cache Attacks

    Get PDF
    In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are malicious. However, SGX disregards side-channel attacks. We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. Our attack tool named CacheZoom is able to virtually track all memory accesses of SGX enclaves with high spatial and temporal precision. As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios. Our results show that SGX cannot protect critical data sensitive computations, and efficient AES key recovery is possible in a practical environment. In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements. We can successfully recover AES keys from T-Table based implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17
    corecore