1,995 research outputs found

    Elliptic Genera and 3d Gravity

    Full text link
    We describe general constraints on the elliptic genus of a 2d supersymmetric conformal field theory which has a gravity dual with large radius in Planck units. We give examples of theories which do and do not satisfy the bounds we derive, by describing the elliptic genera of symmetric product orbifolds of K3K3, product manifolds, certain simple families of Calabi-Yau hypersurfaces, and symmetric products of the "Monster CFT." We discuss the distinction between theories with supergravity duals and those whose duals have strings at the scale set by the AdS curvature. Under natural assumptions we attempt to quantify the fraction of (2,2) supersymmetric conformal theories which admit a weakly curved gravity description, at large central charge.Comment: 50 pages, 9 figures, v2: minor corrections to section

    A Quantitative, Time-Dependent Model of Oxygen Isotopes in the Solar Nebula: Step one

    Get PDF
    The remarkable discovery that oxygen isotopes in primitive meteorites were fractionated along a line of slope I rather than along the typical slope 0,52 terrestrial fractionation line occurred almost 40 years ago, However, a satisfactory, quantitative explanation for this observation has yet to be found, though many different explanations have been proposed, The first of these explanations proposed that the observed line represented the final product produced by mixing molecular cloud dust with a nucleosynthetic component, rich in O-16, possibly resulting from a nearby supernova explosion, Donald Clayton suggested that Galactic Chemical Evolution would gradually change the oxygen isotopic composition of the interstellar grain population by steadily producing O-16 in supernovae, then producing the heavier isotopes as secondary products in lower mass stars, Thiemens and collaborators proposed a chemical mechanism that relied on the availability of additional active rotational and vibrational states in otherwise-symmetric molecules, such as CO2, O3 or SiO2, containing two different oxygen isotopes and a second, photochemical process that suggested that differential photochemical dissociation processes could fractionate oxygen , This second line of research has been pursued by several groups, though none of the current models is quantitative

    Sexual abuse of intellectually disabled youth : a review

    Get PDF
    Intellectual disability (ID) is a condition characterized by significant limitations in intellectual functioning and adaptive behavior, which affects various everyday social and practical skills. This disability manifests itself before the age of 18 (American Association on Intellectual and Developmental Disabilities [AAIDD], 2010). While the global prevalence of ID is only 1% (Maulik, Mascarenhas, Mathers, Dua & Saxena, 2011), research shows that the risk of being sexually abused is 2 to 6 times greater among intellectually disabled youth than among typically developing youth (Dion, Bouchard, Gaudreault & Mercier, 2012). It is also argued that the prevalence of sexual abuse may be underestimated among intellectually disabled youth, as disclosure may be more difficult for them because of their limited vocabulary and communicative abilities (Murphy, 2007). Despite this higher risk, professionals who work with this population have little information on the issue. Myths and prejudices which devalue intellectually disabled people in our society, such as the notions that they are asexual or that they do not suffer, may increase their vulnerability to sexual abuse (Mansell & Sobsey, 2001). Expanding our knowledge in the field of ID and sexual abuse may help dispel these myths and break down these prejudices. This article presents a literature review that aims to 1) provide an overview of sexual abuse of intellectually disabled youth, and 2) discuss the implications for prevention and intervention for these vulnerable youth

    The Renormalization Group and Singular Perturbations: Multiple-Scales, Boundary Layers and Reductive Perturbation Theory

    Full text link
    Perturbative renormalization group theory is developed as a unified tool for global asymptotic analysis. With numerous examples, we illustrate its application to ordinary differential equation problems involving multiple scales, boundary layers with technically difficult asymptotic matching, and WKB analysis. In contrast to conventional methods, the renormalization group approach requires neither {\it ad hoc\/} assumptions about the structure of perturbation series nor the use of asymptotic matching. Our renormalization group approach provides approximate solutions which are practically superior to those obtained conventionally, although the latter can be reproduced, if desired, by appropriate expansion of the renormalization group approximant. We show that the renormalization group equation may be interpreted as an amplitude equation, and from this point of view develop reductive perturbation theory for partial differential equations describing spatially-extended systems near bifurcation points, deriving both amplitude equations and the center manifold.Comment: 44 pages, 2 Postscript figures, macro \uiucmac.tex available at macro archives or at ftp://gijoe.mrl.uiuc.edu/pu

    Illicit drug use and its association with key sexual risk behaviours and outcomes: Findings from Britain's third National Survey of Sexual Attitudes and Lifestyles (Natsal-3)

    Get PDF
    OBJECTIVES: We explore the hypothesis that using illicit drugs other than, or in addition to, cannabis is associated with sexual risk behaviour and sexual health outcomes in the British population. METHODS: We analysed data, separately by gender, reported by sexually-active participants (those reporting > = 1 partners/past year) aged 16-44 years (3,395 men, 4,980 women) in Britain's third National Survey of Sexual Attitudes and Lifestyles (Natsal-3), a probability survey undertaken 2010-12 involving computer-assisted personal-interview and computer-assisted self-interview. Analyses accounted for the stratification, clustering and weighting of the data. Multivariable logistic regression was used to calculate adjusted odds ratios. RESULTS: Use of illicit drugs other than, or in addition to, cannabis in the past year was reported by 11.5% (95%CI:10.4%-12.8%) of men and 5.5% (4.8%-6.3%) of women. Use of these types of drugs was more common among those = weekly (age-adjusted ORs, aAORs, 10.91 (6.27-18.97) men; 9.95 (6.11-16.19) women); having > = 2 condomless partners in the past year (aAOR:5.50 (3.61-8.39) men; 5.24 (3.07-8.94) women). Participants reporting illicit drug use were more likely (than those who did not) to report sexual health clinic attendance (ORs after adjusting for age, sexual identity and partner numbers: 1.79 (1.28-2.51) men; 1.99 (1.34-2.95) women), chlamydia testing (1.42 (1.06-1.92) men; 1.94 (1.40-2.70) women), unplanned pregnancy (2.93 (1.39-6.17) women), and among men only, sexually transmitted infection diagnoses (3.10 (1.63-5.89)). CONCLUSIONS: In Britain, those reporting recent illicit drug use were more likely to report other markers of poor general and sexual health. They were also more likely to attend sexual health clinics so these should be considered appropriate settings to implement holistic interventions to maximise health gain

    Multiple Front Propagation Into Unstable States

    Full text link
    The dynamics of transient patterns formed by front propagation in extended nonequilibrium systems is considered. Under certain circumstances, the state left behind a front propagating into an unstable homogeneous state can be an unstable periodic pattern. It is found by a numerical solution of a model of the Fr\'eedericksz transition in nematic liquid crystals that the mechanism of decay of such periodic unstable states is the propagation of a second front which replaces the unstable pattern by a another unstable periodic state with larger wavelength. The speed of this second front and the periodicity of the new state are analytically calculated with a generalization of the marginal stability formalism suited to the study of front propagation into periodic unstable states. PACS: 47.20.Ky, 03.40.Kf, 47.54.+rComment: 12 page

    Structural Stability and Renormalization Group for Propagating Fronts

    Full text link
    A solution to a given equation is structurally stable if it suffers only an infinitesimal change when the equation (not the solution) is perturbed infinitesimally. We have found that structural stability can be used as a velocity selection principle for propagating fronts. We give examples, using numerical and renormalization group methods.Comment: 14 pages, uiucmac.tex, no figure

    Renormalization Group Theory for Global Asymptotic Analysis

    Full text link
    We show with several examples that renormalization group (RG) theory can be used to understand singular and reductive perturbation methods in a unified fashion. Amplitude equations describing slow motion dynamics in nonequilibrium phenomena are RG equations. The renormalized perturbation approach may be simpler to use than other approaches, because it does not require the use of asymptotic matching, and yields practically superior approximations.Comment: 13 pages, plain tex + uiucmac.tex (available from babbage.sissa.it), one PostScript figure appended at end. Or (easier) get compressed postscript file by anon ftp from gijoe.mrl.uiuc.edu (128.174.119.153), file /pub/rg_sing_prl.ps.

    Demonstration of Universal Parametric Entangling Gates on a Multi-Qubit Lattice

    Get PDF
    We show that parametric coupling techniques can be used to generate selective entangling interactions for multi-qubit processors. By inducing coherent population exchange between adjacent qubits under frequency modulation, we implement a universal gateset for a linear array of four superconducting qubits. An average process fidelity of F=93%\mathcal{F}=93\% is estimated for three two-qubit gates via quantum process tomography. We establish the suitability of these techniques for computation by preparing a four-qubit maximally entangled state and comparing the estimated state fidelity against the expected performance of the individual entangling gates. In addition, we prepare an eight-qubit register in all possible bitstring permutations and monitor the fidelity of a two-qubit gate across one pair of these qubits. Across all such permutations, an average fidelity of F=91.6±2.6%\mathcal{F}=91.6\pm2.6\% is observed. These results thus offer a path to a scalable architecture with high selectivity and low crosstalk

    Functional limit theorems for random regular graphs

    Full text link
    Consider d uniformly random permutation matrices on n labels. Consider the sum of these matrices along with their transposes. The total can be interpreted as the adjacency matrix of a random regular graph of degree 2d on n vertices. We consider limit theorems for various combinatorial and analytical properties of this graph (or the matrix) as n grows to infinity, either when d is kept fixed or grows slowly with n. In a suitable weak convergence framework, we prove that the (finite but growing in length) sequences of the number of short cycles and of cyclically non-backtracking walks converge to distributional limits. We estimate the total variation distance from the limit using Stein's method. As an application of these results we derive limits of linear functionals of the eigenvalues of the adjacency matrix. A key step in this latter derivation is an extension of the Kahn-Szemer\'edi argument for estimating the second largest eigenvalue for all values of d and n.Comment: Added Remark 27. 39 pages. To appear in Probability Theory and Related Field
    corecore