18 resultados para Coen, Joel


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We employed in situ pulsed laser deposition (PLD) and angle-resolved photoemission spectroscopy (ARPES) to investigate the mechanism of the metal-insulator transition (MIT) in NdNiO3 (NNO) thin films, grown on NdGaO3(110) and LaAlO3(100) substrates. In the metallic phase, we observe three-dimensional hole and electron Fermi surface (FS) pockets formed from strongly renormalized bands with well-defined quasiparticles. Upon cooling across the MIT in NNO/NGO sample, the quasiparticles lose coherence via a spectral weight transfer from near the Fermi level to localized states forming at higher binding energies. In the case of NNO/LAO, the bands are apparently shifted upward with an additional holelike pocket forming at the corner of the Brillouin zone. We find that the renormalization effects are strongly anisotropic and are stronger in NNO/NGO than NNO/LAO. Our study reveals that substrate-induced strain tunes the crystal field splitting, which changes the FS properties, nesting conditions, and spin-fluctuation strength, and thereby controls the MIT via the formation of an electronic order parameter with QAF similar to (1/4,1/4,1/4 +/- delta).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A protocol to efficiently assess Reactive Oxygen Species (ROS) levels in yeast cells using H2DCF-DA is described here. This method employs lithium acetate to permeate the cell wall, and thus, augments the release of the fluorescent product, dichlorofluorescein from the cells. This protocol obviates the need for both physical and enzymatic lysis methods that are arduous and time consuming. This method is simple, less time consuming and reproducible, especially while dealing with a large sample size. The lithium acetate method gave significantly reproducible and linear results (P < 0.0001), as compared with direct measurement (P = 0.0005), sonication (P = 0.1466) and bead beating (P = 0.0028).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.