quantum-physics-0.6 / data /train /batch_000039.jsonl
konsman's picture
Upload data/train/batch_000039.jsonl with huggingface_hub
3dd82a7 verified
{"text": "november 30, 2012 scientists build with dna bricks researchers at harvard ' s wyss institute have coaxed single strands of dna to fit together like lego bricks and form scores of complex three - dimensional shapes, including a teeny - tiny space shuttle. the technique, described in this week ' s issue of the journal science, adds a new dimension to molecular construction and should help open the way for nanoscale medical and electronic devices. \" this is a simple, versatile and robust method, \" the study ' s senior author, peng yin, said in a news release. the method starts with synthetic strands of dna that take in just 32 nucleotides, or molecular bits of genetic code. these individual \" bricks \" are coded in a way that they fit together like lego pegs and holes to form larger shapes of a specific design. a cube built up from 1, 000 such bricks ( 10 by 10 by 10 ) measures just 25 nanometers in width. that ' s thousands of times smaller than the diameter of a single human hair. the latest research builds upon work that the wyss researchers detailed in may, which involved piecing together dna strands to create two - dimensional tiles ( including cute smiley faces ). this time around, the strands were twisted in such a way that they could be interlocked, lego - style. as any visitor to legoland knows, such structures can get incredibly complex in the hands of a skilled builder. yin and his colleagues are still learning their building techniques. fortunately, the bricks could be programmed to build themselves, with the aid of 3 - d modeling software. once the designs were set, the researchers synthesized strands with the right combinations of nucleotides \u2014 adenosine, thymine, cytosine and guanine \u2014 so that when they were mixed together in a solution, at least some of the bricks would form the desired design. to demonstrate the method, 102 different 3 - d shapes were created using a 1, 000 - brick template. posted by azra raza at 05 : 57 am | permalink", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6114990884327973, "token_count": 420, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:6d04708d-b823-4e61-8aab-f0d2e1781dc9>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.072603"}
{"text": "why buy that theory? what if the world is complex? here, symmetry is broken ; there, the seemingly simplest of chemical reactions, hydrogen burning to water, has a messy mechanism. the means by which one subunit of hemoglobin communicates its oxygenation to a second subunit, an essential task, resembles a rube goldberg cartoon. not to speak of the intricacies of any biological response, from the rise of blood pressure or release of adrenalin when a snake lunges at us, to returning a ping - pong serve with backspin. max perutz ' s theory of the cooperativity of oxygen uptake, the way the ribosome functions \u2014 these require complicated explanations. and yes, the inherent tinkering of evolution has made them complex. but simpler chemical reactions \u2014 a candle burning \u2014 are also intricate. as complex as the essential physics of the malleability, brittleness and hardness of metals. or the geology of hydrothermal vents. when things are complex yet understandable, human beings weave stories. we do so for several reasons : a - - > b requires no story. but a - - > b - - > c - - > d and not a - - > b - - > c ' - - > d is in itself a story. second, as psychologist jerome bruner writes, \" for there to be a story, something unforeseen must happen. \" in science the unforeseen lurks around the next experimental corner. stories then \" domesticate unexpectedness, \" to use bruner ' s phrase. storytelling seems to be ingrained in our psyche. i would claim that with our gift of spoken and written language, this is the way we wrest pleasure, psychologically, from a messy world. scientists are no exception. part of the story they tell is how they got there \u2014 the x - ray films measured over a decade, the blind alleys and false leads of a chemical synthesis. it is never easy, and serendipity substitutes for what in earlier ages would have been called the grace of god. in the end, we overcome. this appeals, and none of it takes away from the ingenuity of the creative act. in thinking about theories, storytelling has some distinct features. there is always a beginning to a theory \u2014 modeling assumptions, perhaps unexpected observations to account for. then, in a mathematically oriented theory, a kind of development section follows. something is tried ; it leads nowhere, or leaves one dissatisfied", "subdomain_id": "subdomain_quantum_field_theory", "similarity_score": 0.6202491779981356, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:d1740e74-1c30-4ecd-97cf-11e5d37a6787>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.194544"}
{"text": "distinct features. there is always a beginning to a theory \u2014 modeling assumptions, perhaps unexpected observations to account for. then, in a mathematically oriented theory, a kind of development section follows. something is tried ; it leads nowhere, or leaves one dissatisfied. so one essays a variation on what had been a minor theme, and \u2014 all of a sudden \u2014 it soars. resolution and coda follow. i think of the surprise that comes from doing a fourier transform, or of seeing eigenvalues popping out of nothing but an equation and boundary conditions. sadly, in the published accounts of theories, much of the narrative of the struggle for understanding is left out, because of self - censorship and the desire to show us as more rational than we were. that ' s okay ; fortunately one can still see the development sections of a theoretical symphony as one examines an ensemble of theories, created by many people, not just one, groping towards understanding. the other place where narrative is rife is in the hypothesis - forming stage of doing science. this is where the \" reach of imagination \" of science, as jacob bronowski referred to it, is explicit. soon you will be brought down to earth by experiment, but here the wild man in you can soar, think up any crazy scheme. and, in the way science works, if you are too blinded by your prejudices to see the faults in your theoretical fantasies, you can be sure others will. many theories are popular because they tell a rollicking good story, one that is sage in capturing the way the world works, and could be stored away to deal with the next trouble. stories can be funny ; can there be humorous theories? \u00bb post comment", "subdomain_id": "subdomain_quantum_field_theory", "similarity_score": 0.6411788494897023, "token_count": 347, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:d1740e74-1c30-4ecd-97cf-11e5d37a6787>", "chunk_index": 1, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.196550"}
{"text": "an aperture synthesis telescope, like the gmrt, consists of a number of antennas located on the ground and the resolution of such a telescope is proportional to the maximum projected separation between the antennas. the locations of the antennas are usually specified in the earth - centred co - ordinate system. the earth centred frame is related to the location of the antennas on the ground by however, for the purpose of imaging, only the relative separation between the antennas is important. this separation between the antennas is usually referred to as the baseline and is measured in units of the wavelength of the incident radiation. for the purpose of the theory of synthesis imaging, the antenna positions are specified in the so called frame. the geometric relationship between this frame and the frame is shown in fig. 2. 1 and the co - ordinate transformation is given by the geometric relation between the observing plane represented by the - plane and the sky plane represented by the - plane is shown in fig. 2. 2. the - plane in the sky is parallel to the plane in which measurements are made ( the - plane ) and the separation between them is denoted by. the - axis points towards the origin of the frame given by (, ) and is parallel to the - axis. the treatment of the theory of synthesis imaging given below follows that of thompson et al. ( 1986 ) and clark ( 1999 ). let represent the electric field produced by an infinitesimal element in the sky in the direction at point in the frame ( fig. 2. 2 ). the total electric field measured at this point will be an integral of the signals from all the radiation elements and is given by the source coherence function, defined as the mutual coherence function, measured at two points and on the observing plane is defined as where is the relative delay between the signals measured at the points and respectively. in the above equation, the dependence on and is implicitly via. for a plane wavefront from a direction in the sky, where is the vector separating the two antennas. it is therefore clear that depends only on the relative separation between the antenna positions given by and and can be written as in the limit of the plane wave front approximation, the denominator in equation 2. 8 can be adequately represented by and. the phase of the mutual coherence function in equation 2. 7, for a spatially incoherent source, therefore, depends only on the relative separation between the points of measurement in the far field of the radiation. let represent the unit vector along the - axis", "subdomain_id": "subdomain_quantum_optics", "similarity_score": 0.6088228366341442, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:01350e52-ba87-41cc-9a2b-b0f2b3dffa59>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.278957"}
{"text": "in equation 2. 8 corresponds to the geometrical delay corrected version of this equation. if, two versions of a time series displaced with respect to each other in time by will remain coherent. in the limit of the validity of the assumption that, in equation 2. 8 can be replaced by. this is the same as the source auto - correlation function at zero lag, ( equation 2. 6 ) and is equal to the two dimensional source surface brightness, denoted by therefore, under the approximation that : using the relation between in equation 2. 10 and the above mentioned phase rotation, equation 2. 8 can be re - written as the integrals in the above equation are over the entire sky ( limits of the integral from to ). however, the antenna primary beam limits the part of the sky from which the antenna can receive radiation to, where is the diameter of a circular aperture. assuming that the response close to the centre of the primary beam is, with an additional approximation that the field of view is small ( ), equation 2. 11 can be written as the source surface brightness is described in the - plane while and are the equivalent conjugate variables in fourier space. and can therefore be interpreted as the spatial frequencies and the visibility function as the spatial frequency spectrum of the source surface brightness distribution. synthesis radio telescopes like the gmrt measure the visibility function at several points in the frame using an array of antennas which instantaneously produce pairs of interferometers. due to the rotation of the earth, the projected separations between the antennas change as the antennas track a source in the sky. over time, each antenna pair therefore measures the visibility at several points in the frame. as a result, over time, the array of antennas partially covers the volume, up to a maximum projected antenna separation of corresponding to a spatial resolution of. also, an interferometric array does not measure for baselines smaller than a minimum value. just as the maximum baseline length for which is measured corresponds to the highest spatial resolution the telescope can provide, the smallest baseline for which is measured corresponds to largest angular scale that can be represented reliably in the final image. hence, an interferometric observation will be insensitive to scales larger than ; this problem of missing short spacing measurements is referred to as the problem of ` ` missing short spacing ' '. when imaging extended objects in the sky, like the ones imaged for this dissertation, the shortest spacing for which a reliable measurement exist has for reaching implications - missing short spacings", "subdomain_id": "subdomain_quantum_metrology", "similarity_score": 0.6150863043811758, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:01350e52-ba87-41cc-9a2b-b0f2b3dffa59>", "chunk_index": 2, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.281464"}
{"text": "as the problem of ` ` missing short spacing ' '. when imaging extended objects in the sky, like the ones imaged for this dissertation, the shortest spacing for which a reliable measurement exist has for reaching implications - missing short spacings result in missing extended emission in the image. if is completely sampled, at least at the nyquist rate, it can be inverse fourier transformed to recover the source brightness distribution. with a finite number of antennas located at discrete locations on the ground, the visibility function is sampled at a discreet set of points. the observed visibility can, therefore, be thought of as the true visibility, multiplied by the sampling function given by the approximation that breaks down at low frequencies and equation 2. 11 accurately described the measured visibility function. however, this is not a fourier transform relation. techniques used to recover in such cases are described in chapter 4. in practice, is measured by a number of two element interferometers, one of which is shown in fig. 2. 3. the signal from antenna 1 lags behind the signal from the antenna 2 by a phase equal to where is the reference unit vector mentioned in the previous section. under the plane wave approximation, the signals from the two antennas can be written as the response of the interferometer to a point source of flux density, located at the phase centre ( ) is therefore antennas receive radiation from a finite part of the sky, defined by the antenna primary beam. for an extended source, within the antenna primary beam, will be an integral over the source ( integral over and ; equation 2. 12 ) and can be thought of as a superposition of plane waves from the individual infinitesimal elements constituting the extended source given by equation 2. 17. as the interferometer tracks the source in the sky, the projected separation and hence the geometrical delay changes with time. changes slowly going from to when the antennas track a source from rise to set over several hours. depends on the declination of the source and the minimum elevation limits of the antennas. over short intervals of time, changes almost linearly with time. the interferometer response to a point source ( the real and imaginary parts ) therefore varies quasi - sinusoidally over short periods of time with a frequency proportional to the separation between the antennas. this quasi - sinusoidal variation of the interferometer output, due to the changing geometrical delay, is referred to as the fringe pattern. the amplitude of this fringe pattern is directly proportional to the power emitted by the", "subdomain_id": "subdomain_quantum_metrology", "similarity_score": 0.6132424062742727, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:01350e52-ba87-41cc-9a2b-b0f2b3dffa59>", "chunk_index": 3, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.282477"}
{"text": "separation between the antennas. this quasi - sinusoidal variation of the interferometer output, due to the changing geometrical delay, is referred to as the fringe pattern. the amplitude of this fringe pattern is directly proportional to the power emitted by the source in the sky. the phase of these fringes also changes sinusoidally with time with a period of 24 hours. the phase of this fringe pattern due to the geometrical delay however carries no astronomically useful information about the sky ( it only carries information about the direction in the sky being tracked ). in practice therefore, the geometrical delay is continuously compensated by introducing a time variable compensating delay in the signal from one of the antennas. this operations is referred to as delay tracking. the radio - frequency ( rf ) signals from the antenna feeds, centred at a frequency, are converted to an intermediate frequency band centred at to be transported to the correlator ( in the case of gmrt, over optical fiber cables ). the path length for the signals from the antenna to the correlator introduces a time invariant fixed delay suffered by the signals at. the compensating delay must therefore compensate for as well. for the gmrt, the compensating delay is applied to the signals at baseband frequencies in the correlator. however, the signals suffer the delays and at the rf and if frequencies respectively. delay compensation at the baseband therefore leaves a residual phase given by effectively, the phase of the visibilities is rotated by, equivalent to the residual delay due to the differences in the rf, if and base band frequencies. the phase of the visibility for a point source located at the phase centre is thus reduced to zero at all times. this final rotation of the fringe phase is referred to as fringe stopping or fringe rotation. note that the total phase applied to the visibilities via delay tracking and fringe rotation is equal to and this effectively phases the interferometer for a point in the sky ( the phase centre ). application of this total phase is achieved in the gmrt correlator in two stages, as explained in section 2. 5. 2. the response of the interferometer is integrated over the signal bandwidth as seen by the multiplier in the correlator. if represents the voltage response of the antennas as seen by the multiplier, the effect of a finite bandwidth is to modulate the output of the interferometer by the fourier transform of. if the receiver has a", "subdomain_id": "subdomain_quantum_metrology", "similarity_score": 0.6066159073687594, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:01350e52-ba87-41cc-9a2b-b0f2b3dffa59>", "chunk_index": 4, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.283409"}
{"text": "ibm has successfully demonstrated a new technique for improving transistor performance, allowing it to build smaller, more powerful chips in the next decade, the company declared yesterday. ibm researcher huiling shang said the company had discovered a way to use germanium to improve the flow of electrons through its transistor. a layer of strained germanium was applied directly to the channel of the transistor, or the area through which electrical current passes, to open up additional space for electrons within the channel. according to shang, transistors built with strained germanium should have three times the performance of conventional transistors. germanium has been used in smaller doses by several companies, including ibm, in an existing manufacturing technique called strained silicon. this involves placing a mixture of germanium and silicon next to a layer of pure silicon, which causes the silicon atoms to stretch to align themselves with the silicon germanium atoms. this opens a wider path that allows more electrons to flow through the circuit. shang said researchers had long known that germanium was a better conductor of electricity than silicon, but ibm was the first to figure out how to build higher concentrations of germanium into chips using conventional techniques. she added that the company had also worked out how to strain the germanium layer to improve performance further. a by - product of zinc ore processing, germanium is a hard element with the same crystal structure as a diamond. it is a semiconductor with electrical properties between those produced by a metal and an insulator. its use as a transistor was key in the advancement of solid - state electronics. ibm will present more details on how it accomplished its feat with germanium at the 2004 international electron devices meeting in san francisco next week. the technique gives chipmakers another resource to improve performance as shrinking the transistor becomes more difficult. although the technique is still in the research stage, ibm believes it could be used on the 32 - nanometer process generation, currently scheduled for introduction around 2013. chip designers have been improving performance for years by making transistors smaller and smaller. smaller transistors are generally faster, and more of them can be fitted on a chip. but they have now become so small that electrical current can leak out of the transistors as heat, a problem that is evident at the current 90 - nanometer process generation and is expected to get worse at the 65 - nanometer process generation scheduled for introduction in 2005 and 2006. the number attached to the process generation refers to the width of the smallest circuit line within a chip. other chip", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6175194516477288, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:794b81ac-c431-4670-a036-8da3f76c5111>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.698256"}
{"text": "a new direction in ai - - toward a computational theory of perceptions : reflecting the bounded ability of the human brain to resolve detail, perceptions are intrinsically imprecise. in more concrete terms, perceptions are f - granular, meaning that ( 1 ) the boundaries of perceived classes are unsharp ; and ( 2 ) the values of attributes are granulated, with a granule being a clump of values ( points, objects ) drawn together by indistinguishability, similarity, proximity, and functionality. f - granularity of perceptions puts them well beyond the reach of traditional methods of analysis based on predicate logic and / or probability theory. the computational theory of perceptions ( ctp ) that is outlined here adds to the armamentarium of ai a capability to compute and reason with perception - based information. the point of departure in ctp is the assumption that perceptions are described by propositions drawn from a natural language. in ctp, a proposition, p, is viewed as an answer to a question and the meaning of p is represented as a generalized constraint. to compute with perceptions, their descriptors are translated into what is called the generalized constraint language ( gcl ). then, a goal - directed constraint propagation is employed to answer a give query. a concept that plays a key role in ctp is that of precisiated natural language ( pnl ). the computational theory of perceptions suggests a new direction in ai - - a direction that may enhance the ability of ai to deal with real - world problems in which decision - relevant information is a mixture of measurements and perceptions. what is not widely recognized is that many important problems in ai fall into this category. precisiated natural language ( pnl ) : it is a deep - seated tradition in science to view the use of natural languages in scientific theories as a manifestation of mathematical immaturity. the rationale for this tradition is that natural languages are lacking in precision. however, what is not widely recognized is that adherence to this tradition carries a steep price - - the inability to exploit the richness of natural languages in a way that lends itself to computation and automated reasoning. in a significant departure from existing methods, the high expressive power of natural languages is harnessed by a process termed precisiation. in essence, if p is proposition in a natural language ( nl ), then precisiation of p results in a representation of the meaning of p in the form of what is referred to as a generalized constraint. with these constraints serving as basic building", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.6667718261544346, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:e6247b10-10ce-4564-8089-5bac15498610>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.974313"}
{"text": "in essence, if p is proposition in a natural language ( nl ), then precisiation of p results in a representation of the meaning of p in the form of what is referred to as a generalized constraint. with these constraints serving as basic building blocks, composite generalized constraints can be generated by combination, constraint propagation, modification, and qualification. the set of all composite generalized constraints and associated rules of generation and interpretation constitute the generalized constraint languages ( gcl ). translation from nl to glc is governed by the constraint - centered semantics of natural languages ( csnl ). thus, through csnl, gcl serves as precisiation language for nl. precisiation natural language ( pnl ) is a subset of nl, which is equipped with constraint - centered semantics and is translatable into glc. by construction, gcl is maximally expressive. in consequence, pnl is the largest subset of nl, which admits precisiation. the expressive power of pnl is far greater than that of conventional predicate - logic - based meaning - representation languages. the concept of pnl opens the door to a significant enlargement of the role of natural languages in scientific theories and, especially, in information processing, decision, and control. in these and other realms, a particularly important function that pnl can serve is that of a concept definition language - - a language that makes it possible to formulate precise definitions of new concepts and redefine those existing concepts that do not provide a good fit to reality. perception - based decision analysis ( pda ) : decisions are based on information. more often than not, the information available is a mixture of measurements and perception. the problem with perceptions is that they are intrinsically imprecise. a concept that plays a key role in perception - based decision analysis is that of precisiated natural language, pnl. in pda, precisiated natural language is employed to define the goals, constraints, relations, and decision - relevant information. an important sublanguage of pnl is the language of fuzzy if - then rules, frl. in this language, a perception of a function, f, is described by a collection of fuzzy if - then rules. such a collection is referred to as the fuzzy graph of function f. employment of pnl in decision analysis adds an important capability - - a capability to operate on perception - based information. the capability has the effect of substantially enhancing the ability of da to deal with real - world problems. more fundamentally, the high", "subdomain_id": "subdomain_quantum_computing", "similarity_score": 0.626839798001343, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:e6247b10-10ce-4564-8089-5bac15498610>", "chunk_index": 1, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.975343"}
{"text": "f. employment of pnl in decision analysis adds an important capability - - a capability to operate on perception - based information. the capability has the effect of substantially enhancing the ability of da to deal with real - world problems. more fundamentally, the high expressive power of pnl opens the door to a redefinition of such basic concepts as optimality and causality. perception - based decision analysis represents a significant change in direction in the evolution of decision analysis. as we move farther into the age of machine intelligence and automation of reasoning, the need for a shift from computing with numbers to computing with words, and from manipulation of measurements to manipulation of perceptions, will cease to be a matter of debate. from computing with numbers to computing with words to computation with perceptions - - a paradigm shift : the theory put forth in this research is focused on the development of what is referred to as the computational theory of perceptions ( ctp ) - - a theory that comprises a conceptual framework and a methodology for computing and reasoning with perceptions. the base for ctp is the methodology of computing with words ( cw ). in cw, the objects of computation are words and propositions drawn from a natural language. the point of departure in the computational theory of perceptions is the assumption that perceptions are described as propositions in a natural language. furthermore, computing and reasoning with perceptions is reduced to computing and reasoning with words. to be able to compute with perceptions it is necessary to have a means of representing their meaning in a way that lends itself to computation. conventional approaches to meaning representation cannot serve this purpose because the intrinsic imprecision of perceptions puts them well beyond the expressive power of predicate logic and related systems. in the computational theory of perceptions, representation of meaning is a preliminary to reasoning with perceptions - - a process that starts with a collection of perceptions that constitute the initial data set ( ids ) and terminates in a proposition or a collection of propositions that play the role of an answer to a query, that is, the terminal data set ( tds ). the principal aim of the computational theory of perceptions is the development of an automated capability to reason with perception - based information. existing theories do not have this capability and rely instead on conversion of perceptions into measurements - - a process that in many cases is infeasible, unrealistic, or counterproductive. in this perspective, addition of the machinery of the computational theory of perceptions to existing theories may eventually lead to theories that have a superior capability to deal with real - world problems and make it", "subdomain_id": "subdomain_quantum_computing", "similarity_score": 0.6354179671888289, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:e6247b10-10ce-4564-8089-5bac15498610>", "chunk_index": 2, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:35.977939"}
{"text": "data storage requirements are increasing dramatically and therefore much attention is being given to next - generation data storage media. however, in optical data storage devices the storage density is limited by the wavelength of light. this limitation can be avoided by an alternative data addressing mechanism using electric fields between nanoelectrodes with smaller dimensions than the wavelength of commercially available lasers. it has been shown that dna of a range of lengths can be aligned in an electric field [ 1, 2 ]. in this study we demonstrate the use of an ac electric field to address dna as a data storage technique. \u03bb - dna, immobilised on an array of electrodes utilising its self - assembling properties, serves as a scaffold for fluorescent molecules. the dna is immobilised onto gold electrodes in a multi - step procedure ensuring a controlled surface coverage of the molecules onto specific electrodes. to minimise background fluorescence and to enable reversible stretching, the substrate surface is silanised prior to dna immobilisation. using a strong, spatially confined ac electric field ( 1mv / m, 400khz ) the dna molecules on each electrode are individually and reversibly stretched into a focused argon laser beam. the fluorophores ( yoyo1, molecular probes ) are rapidly photobleached when the power density of the beam is increased, allowing for data storage when associating a photobleached data point with a binary 1 and an intact data point with a binary 0 ( figure 1 ). the resulting pattern of high / low fluorescence intensities is read by measuring the fluorescence intensity, using the same dielectrophoretic addressing mechanism, but in conjunction with a much reduced power beam. although this concept of data storage has been demonstrated only on the micrometre scale, it is a promising candidate for miniaturisation, potentially to the molecular scale. figure 1. a pattern of selectively stretched \u03bb - dna on an array of 4 gold electrodes. photobleaching the stretched dna in this configuration will result in a 1, 0, 1, 0 signal when reading back by sequentially stretching the dna on each electrode into a reduced power beam. the dna is being stretched in a 1 mv / m, 400 khz ac field. the electrodes are 10 \u03bcm in width and 15 \u03bcm apart. m. wasizu, and o. kurosawa, ieee t. ind. appl, 1990, 26, 1165.", "subdomain_id": "subdomain_quantum_optics", "similarity_score": 0.6096119503139653, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:34ad33bf-27ce-4304-ac21-c00fd2e7448d>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:36.070496"}
{"text": "light, a material emdelight\u00ae - glass is the innovative material for creative architects, interior designers and product designers. light as opposed to lighting when it \u2019 s light, the panels appear as high - grade, slightly translucent glass. when it \u2019 s dark, they transform into a source of light. without the use of filters, the self - lighting glass converts light into individual, versatile design media. - light emits from one or two opposing edges of the glass into the glass. - the glass is coated with a white or coloured screen pattern. each dot screens the emitted light according to the screen configuration. - the screen structure is calculated based on panel size and pane thickness to produce a harmonious distribution of light throughout the glass. - the panes are coated with ceramic inks. the ink is baked to create a durable coat that is scratchproof, colourfast, acid and alkaline resistant and thermally stable. - the average coverage or screen percent per pane of 12 - 15 percent largely preserves the transparent character. - glass with a low iron oxide content ( white glass ), which is especially pure and clear, is used. emdelight\u00ae - glass comes in various configurations, making it extremely versatile : - single - pane, tempered safety glass - laminated safety glass - insulated glass - flat or round shaped glass - slightly translucent plastics ( e. g. acrylic ) - 1600 mm x 3000 mm - is max. size for homogeneous illumination - pane thickness is between 8 and 15 mm - custom sizes are available ; consult factory or sales agent - reduced electricity consumption - electrically safe due to operation on safety low voltage ( max. 48 v ) - unrivalled long service life - minimum thermal stress - extremely compact dimensions mean little installation space is required", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6327821274669463, "token_count": 362, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:c5735715-91bd-4424-8df8-b2ed93641af8>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:36.248256"}
{"text": "on the right, you see a picture of a surface which is starting along a bad path. light colors represent atoms in high layers ( isolated atoms and clumps we call islands ), and dark colors represent atoms in lower layers ( vacancies and pits ). most of the surface is pretty flat, but there is a big dark - grey pit! this pit represents a region of the surface which has lagged behind by a whole monolayer : pits like these will eventually lead the surface to become rough. experimentalists have various ways to test whether their surfaces are growing layer by layer ( flat ), or 3d ( rough ). one way is by using stm to directly image the layers ; another way is to scatter something off the surface and look for oscillations in the ` ` anti - phase intensity ' '. if a layer completes and forms a perfectly flat surface, you get anti - phase intensity of one ; if the surface is rough ( or flat but half - covered with a new layer ), the antiphase intensity goes to zero. the dashed line in the picture on the left shows the anti - phase intensity for our computer model. ( we ' re growing on a platiunum ( 111 ) surface at 130k at one layer per second, using kmc with emt potentials. ) it goes away quickly. the spiky, solid line is our proposed new method for growing surfaces. we suggest using pulsed sputtering. if we sputter ( remove atoms ) from the surface just after a complete layer has been laid down, the extra atoms and islands can be removed without digging new pits : this smooths the surface. the spikes show how the surface gets smoother ( bigger antiphase intensity ) each time we sputter : the smaller inset graph shows that it stays smooth even after a hundred layers ( at least on the computer! ). it also shows that a rough surface can be made smooth by using our pulsed sputtering method. it ' s important to pick the right time to sputter. the big pit in the top picture formed even though we did pulsed sputtering. our surface stayed flat for forty layers before the pit formed. can we time things so as to make layer - by - layer growth last forever? the reason that we lasted for forty layers is that small pits tend to shrink : only big pits grow. we tested this by starting with pits of various sizes, and watching them grow or shrink. averaging over many runs we get the picture on", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6614639709847054, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:574f25d0-72f7-4e4c-b1f9-89aceeacb367>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:36.485593"}
{"text": "applications of technology : - rechargeable lithium - ion batteries for hybrid / electric automobiles - consumer electronics - enhanced safety - complete overcharge / overdischarge protection - longer cycle life and battery life - automatic cell balancing for maximum efficiency - lower cost than electronic controls - improved power density berkeley lab scientists guoying chen and thomas j. richardson have invented a new type of separator membrane that prevents dangerous overcharge and overdischarge conditions in rechargeable lithium - ion batteries. this low cost separator, with electroactive polymers incorporated into a porous fiber membrane, provides electronic insulation and high ionic conduction during normal cell operation, enabling high charge and discharge rates for high power density. in overcharge and / or overdischarge situations, the membrane provides a reversible, self - actuated current shunt to prevent damage to the battery. by allowing other cells in the pack to continue charging, these separators balance the charge on each cell to extend battery life and use all of the available capacity. the threshold voltage for these membranes can also be tuned for different battery chemistries by using different electroactive polymers. batteries incorporating such membranes thus have higher rate capability, improved safety, and longer cycle life. when overcharged, battery safety issues including overheating, explosion, and fire may arise. even slight overcharging reduces a cell \u2019 s discharge capacity, leading to overdischarging, which increases impedance and heat generation, and decreases cell lifetime. yet common approaches to preventing overcharge / overdischarge all have drawbacks. for example, external electronic controls add substantial weight, cost, and complexity to a battery pack. shutdown separators that melt at ~ 160\u00b0c permanently disable the cell, increasing the strain on the remaining cells. redox shuttle additives have limited sustainable current densities and cell charging rates, and do not work well at the low temperatures commonly experienced by vehicles. the berkeley lab overcharge protection technology overcomes limitations observed in other approaches. caption : the lbnl - developed separator membrane provided long - term reversible overcharge protection for this lithium - ion cell, even after hundreds of continuous, full charge / discharge cycles over more than 1770 hours of operation. for more information : status : patent pending. available for licensing or collaborative research. see these other berkeley lab technologies in this field : reference number : ib - 3263", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6155946695959416, "token_count": 498, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:be3d0a8a-3dd5-4835-8e63-89fdf015c0c4>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:36.503414"}
{"text": "powders and causes the resulting solid to be less uniform. investigators hope to better understand this process and develop techniques that can be used to lower costs of production and create even better sintered materials. in the electromagnetic processing facility known as tempus, an experiment to further the understanding of the fundamentals of undercooling and formation of metallic glass was initiated around 10 : 00 p. m. ( cdt ) thursday. the facility uses a combination of an electromagnetic field and the microgravity environment to suspend metal alloys in a free space within a set of coils. within the coils, the suspended alloy may be melted and resolidified in an ultra - pure environment. the sample of zirconium - nickel was cycled through two stable melting and solidification runs, then became molten and contacted the side of the sample container, adhering there. the experiment run was then terminated and the sample was removed. \u201c before the sample stuck to the coils, we were able to get some good data, \u201d said the principal investigator, dr. hans fecht of the technical university in berlin, germany. the experiment team is evaluating data concerning the unexpected contact and sticking. the next tempus experiment run is scheduled for later this afternoon. before the handover from the on - board blue shift science crew to the red shift, teams on the ground determined that the apparent cause of earlier glitches with the experiment control computer system was data transmission from the droplet combustion experiment. transmission of this data was disabled and the droplet combustion team - - commanding the experiment from the ground - - resumed the combustion investigation which resulted in several \u201c good burns, \u201d according to researchers. voss and crouch handed off to mission specialist dr. donald thomas and payload specialist dr. gregory linteris around 1 : 00 a. m. ( cdt ). after his daily planning session, payload specialist dr. greg linteris began the first of several runs of the droplet combustion experiment. the experiment takes place in a specially designed enclosed chamber in which single droplets of heptane fuel can be burned in an atmosphere composed of a mixture of helium and oxygen. the droplet is formed by injecting heptane through two injectors on opposite sides of the test platform within the chamber. once the drop is formed, the injectors are retracted and the drop is then ignited by two hot - wire igniters that are brought near the droplet from opposite sides. the burning droplets observed and recorded using video cameras and high", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6091145420018705, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:4727f20a-d580-4f5d-a26c-ec4c8d299f31>", "chunk_index": 1, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:36.899430"}
{"text": "feb. 17, 1998 eugene, ore. - - electrical engineers soon will have a new tool for use in designing electronic circuitry, including microelectronic devices such as computer chips, thanks to pioneering research by a university of oregon chemist. as reported in the dec. 19 issue of science magazine, mark lonergan has demonstrated the concept of a \u201c tunable diode, \u201d a new type of electronic device for controlling electricity. the appearance of the article in this prestigious publication comes almost exactly 50 years after the discovery of the transistor by three researchers, one of whom, the late walter brattain, earned a master \u2019 s degree from the university of oregon in 1926. brattain and his collaborators, john bardeen and william shockley, jointly received the 1956 nobel prize in physics. lonergan \u2019 s realization of the tunable diode relies on the special properties of a relatively new class of materials known as conducting polymers. presently, there is no direct analog to the tunable diode based on more conventional materials. \u201c the unique properties of this device hopefully will open new avenues for electrical engineers in the design of circuitry for the useful control and manipulation of electrical energy, \u201d lonergan says. the manipulation of energy in electrical circuits can be likened to the control of traffic on a highway system. in each case, specialized structures exert control over the system \u2019 s traffic. conventional diodes can be viewed as one kind of traffic control device - - essentially a one - way street for electricity. the tunable diode remains a one - way street, but it offers the added flexibility of a variable number of lanes. specific applications of the tunable diode and its unique characteristics have yet to be devised. lonergan notes, however, that \u201c if the concept of the tunable diode can be successfully transferred into a practical device, it may one day join the transistor, resistor and capacitor as a common component found in a myriad of new electronic devices. it is a new tool, and the advent of any new tool opens new possibilities. \u201d lonergan joined the uo chemistry faculty in 1996 as an assistant professor. originally from hillsboro, ore., he attended the university of oregon as an undergraduate, earning degrees in mathematics and chemistry with summa cum laude honors in 1990. other social bookmarking and sharing tools : the above story is reprinted from materials provided by university of oregon. note : materials may be edited for content and length. for further information, please contact the source cited above.", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.621403378241918, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:ddcd376e-6d37-4231-9ebf-86aeb559ba7f>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:37.223978"}
{"text": "oct. 28, 2004 ann arbor, mich. - - picture a honeycomb and each compartment in the honeycomb is coated with living cells from a person ' s mouth, skin or a piece of bone. university of michigan associate professor nicholas kotov believes that one day, the cells in those honeycombs can be used to grow spare parts for our bodies, or even an entire artificial immune system in a bottle. an immune system in a bottle would allow faster and easier production of a flu vaccine, thus preventing another shortage, he said. in addition, the immune system in a bottle will give scientists clues how to design vaccines that activate an immune response to the unchanging part of a flu virus, making yearly vaccinations, quite possibly, unnecessary, kotov said. in the paper \" inverted colloidal crystals as 3 - d cell scaffolds, \" published last month in the journal langmuir, kotov ' s lab in the chemical engineering department and other collaborators introduced a way to build those cell - incubating honeycombs - - - called scaffolds - - - so that even though the cells occupy different compartments in the honeycomb, they share the same conditions, just as they would share the same conditions if growing in the body. collaborators on the paper include researchers from oklahoma state university, university of texas medial branch and stillwater oklahoma - based nomadics inc. kotov has appointments in the biomedical, materials science and chemical engineering departments. the research is so important that the defense advanced research projects agency ( darpa ) has funded a consortium of research institutions for $ 10 million to grow the immune system in a bottle. scientists can study the artificial immune system to see how it reacts to biological hazards and their countermeasures, and use the data to make more effective countermeasures, said jan walker, darpa spokesman. the birthplace of this artificial immune system is kotov ' s three dimensional scaffold, which is comprised of inverted colloidal crystals, also called photonic crystals. colloidal crystals are hexagonally ordered lattices of highly uniform spherical particles that are packed together. they have a wide range of diameters, from nanometers to micrometers and this versatility is critical for controlling the life cycle of cells and how they change ( i. e. differentiation ). kotov ' s team didn ' t use robotics or complicated computer set - ups to make the scaffolds. instead, they used heat and gel to make", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6016006575063311, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:5c98c27e-73cb-4a98-a1de-3a4a3cfeac52>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:37.255243"}
{"text": "nov. 3, 2004 scientists have made a world - first discovery which is a step towards using environmentally - friendly hydrogen to power our cars. a team from the universities of newcastle upon tyne and liverpool in the uk, who report their findings in the prestigious academic journal, science, have found a safe way of storing and releasing hydrogen to produce energy. they do this using nanoporous materials, which have tiny pores that are one hundred - thousandth ( 100, 000th ) the thickness of a sheet of paper. hydrogen has been investigated for a long time as a replacement for petrol, amid worries over the long - term availability of fossil fuels. it is also an environmentally - friendly alternative, as it produces only water rather than the ' greenhouse gas ', carbon dioxide. however, scientists and others have been baffled for a long time about how to store the substance - which is a gas and so contains less energy in a given volume than the liquid petrol - safely and efficiently. in his january 2003 state of the union address, president bush announced the hydrogen fuel initiative - \" so that america can lead the world in developing clean, hydrogen - powered automobiles. \" hydrogen storage technology - the ability to carry enough hydrogen on - board a vehicle to enable 300 - mile vehicle range - is critical to the success of the president ' s initiative. the uk government is also very keen to exploit the hydrogen economy. at the present time, no existing hydrogen storage technology meets the challenging performance required to make hydrogen - powered automobiles competitive with traditional vehicles. new and innovative ideas are needed. the liverpool and newcastle researchers have found a workable method of injecting the gas at high pressure into the tiny pores - of ten to the minus nine metres in size - in specially - designed materials to give a dense form of hydrogen. they then reduce the pressure within the material in order to store the captured hydrogen safely. heat can be applied to release the hydrogen as energy, on which a car could potentially run. professor mark thomas, of newcastle university ' s northern carbon research laboratories in the school of natural sciences, a member of the research team, said : \" this is a proof of principle that we can trap hydrogen gas in a porous material and release it when required. however, if developed further, this method would have the potential to be applied to powering cars or any generator supplying power. although hydrogen - powered cars are likely to be decades away, our discovery brings this concept a step towards becoming reality. \" now that we have a mechanism that works, we can go", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.60995595803015, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:e64946ef-35ab-4c6b-b698-4d1c3dbbc199>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:37.264328"}
{"text": "mar. 12, 2013 encrypting a message with a strong code is the only safe way to keep your communications secret, but it will be obvious to anyone seeing such a message that the sender is hiding something, regardless of whether they are encrypting their emails for legitimate or illicit purposes. steganography on the other hand can hide a secret message in plain sight. often a message is secreted within the binary strings of 0s and 1s in a compressed image or music file format. prying eyes see only the original image or hear the song, whereas the recipient, knowing that a message is within uses software to extract it. nevertheless, a putative interception might still take place ; this kind of disguise also has the problem of requiring large file sizes. an alternative to such steganography would be to hide a message in plain sight within a plain text document. unfortunately, despite the much smaller file sizes that would be possible, secreting a message within normal text usually disrupts the grammar and syntax or the spelling and so immediately looks suspicious. now, an approach that is far less obvious and is tolerant of poor grammar has been developed by computer scientist abdelrahman desoky of the university of maryland in baltimore county, usa and is described in the latest issue of the international journal of security and networks. desoky suggests that instead of using a humdrum text document and modifying it in a codified way to embed a secret message, correspondents could use a joke to hide their true meaning. as such, he has developed an automatic joke generation based steganography methodology ( jokestega ) that takes advantage of recent software that can automatically write pun - type jokes using large dictionary databases. among the automatic joke generators available are : the mit project, chuck norris joke generator, jokes2000, the joke generator dot com and the online joke generator system ( pickuplinegen ). a simple example might be to hide the code word \" shaking \" in the following auto - joke. the original question and answer joke is \" where do milk shakes come from? \" and the correct answer would be \" from nervous cows. \" so far, so funny. but, the system can substitute the word \" shaking \" for \" nervous \" and still retain the humor so that the answer becomes \" from shaking cows. \" it loses some of its wit, but still makes sense and we are not all bob hopes, after all. other examples where substitutions are possible might include the equally funny : what do you get when you", "subdomain_id": "subdomain_quantum_cryptography", "similarity_score": 0.6093876800946283, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:21711b73-fd87-491a-abdb-e3ed8930f55d>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:37.294911"}
{"text": "elucidation and elaboration at the beginning of the workshop the fifty participants were randomly assigned to one of the six faraday lectures. these six working groups were briefly given the same four - fold assignment but no effort was made to enforce uniformity of treatment and as will be seen there are many differences in the manner of execution. - assignment 1. - to check the original biederstedt / davenport transcript for any misreadings and typographical errors and to attempt to figure out obscure words and phrases left untranscribed. these emendations have been incorporated into the final draft of the transcription. - assignment 2. - to present a brief summary of faraday ' s subtle and elegant pedagogy in so far as it can be inferred from his terse and self - addressed lecture notes. - assignment 3. - to compile a numerical listing of the extraordinary number of exp ' s or demonstrations that faraday incorporated into each lecture. this was to be done first in faraday ' s exact words followed by a brief modern interpretation or commentary. few of faraday ' s terse descriptions resisted elucidation and a surprising number of his demonstrations remain in the repertoire of today ' s teachers. - assignment 4. - to develop a performing version of each lecture for group presentation during the last week of the workshop. there were two conditions : the presentations were to be no longer than 30 - 40 minutes and they could invoke only macroscopic terms and explanations. both these conditions were occasionally violated ; the second was deemed decidedly unsporting. there is, however, much to be said in favor of making any introduction to chemistry primarily macroscopic and experimental. besides faraday rested little faith in the reality of atoms and molecules! woodrow wilson leadership program in chemistry the woodrow wilson national fellowship foundation cn 5281, princeton nj 08543 - 5281", "subdomain_id": "subdomain_quantum_optics", "similarity_score": 0.6119232535744752, "token_count": 389, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:2cbb102f-5fea-4e0f-a839-493cf3901ed1>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:37.805812"}
{"text": "nov 15, 2008, 10 : 03 pm group : basic member joined : jan 24, 2006 member no. : 4768 hi everyone, after being away for quite some time i have some new insights to share. thoughts & opinions on this are always welcome. can we design reality? what a strange question, but one worth considering. is it possible for us to design reality? to create an entirely different reality with its own set of rules unlike the ones of this universe? thinking about this requires that one looks at current scientific theory about the formation of the universe. aka, the big bang. now consider this question. why does reality behave in the way it does? why do things react in the way they do rather than in some other way? some people think that how atoms interact with each other has to do with the big bang. so perhaps this universe and the laws governing it, are something of random variation. meaning, if the big bang were to occur again, it could perhaps lead to an entirely different reality and cause it to work in a completely different way. hard to imagine, but of course its hard to imagine the universe as anything different than what it is now. its the only thing we ' ve ever known. so with this in mind, the universe is not something consisting of set, unmovable laws. rather it may be no different than a chemical reaction, except this reaction causes atoms to interact with each other in different ways. the idea is that under super immense force, such as the sum of the entire universe acting on itself. that the fundamental interaction between atoms can change. naturally, this is of course theory. however if this is true, then perhaps it is possible to engineer a reaction between atoms in a undefinable space, so that they interact with each other in a way that is different from how the atoms in our universe interact. just imagine the possibilities... nov 30, 2008, 12 : 46 pm group : basic member joined : feb 07, 2006 from : markham, just north of toronto, ontario, canada member no. : 4838 tl, have you heard of the book by dr. norman doidge? the letter below was published in the national post, nov. 28, 2008 brains and spirit re : the death of neurological nihilism, norman doidge, nov. 26. after reading norman doidge ' s interesting article, ( wednesday, nov. 26 ) i am moved to ask : shouldn ' t the title of his book [ the brain that changes itself ] really", "subdomain_id": "subdomain_quantum_field_theory", "similarity_score": 0.6144328141308704, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:8ad5d30b-d34b-4599-816d-8c4b9ae5207e>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:38.155431"}
{"text": "by \u03b6 ( zeta ), that characterizes the frequency response of a second order ordinary differential equation. it is particularly important in the study of control theory. it is also important in the harmonic oscillator. the damping ratio provides a mathematical means of expressing the level of damping in a system relative to critical damping. for a damped harmonic oscillator with mass m, damping coefficient c, and spring constant k, it can be defined as the ratio of the damping coefficient in the system ' s differential equation to the critical damping coefficient : where the system ' s equation of motion is and the corresponding critical damping coefficient is the damping ratio is dimensionless, being the ratio of two coefficients of identical units. this equation can be solved with the approach. where c and s are both complex constants. that approach assumes a solution that is oscillatory and / or decaying exponentially. using it in the ode gives a condition on the frequency of the damped oscillations, - undamped : is the case where corresponds to the undamped simple harmonic oscillator, and in that case the solution looks like, as expected. - underdamped : if s is a complex number, then the solution is a decaying exponential combined with an oscillatory portion that looks like. this case occurs for, and is referred to as underdamped. - overdamped : if s is a real number, then the solution is simply a decaying exponential with no oscillation. this case occurs for, and is referred to as overdamped. - critically damped : the case where is the border between the overdamped and underdamped cases, and is referred to as critically damped. this turns out to be a desirable outcome in many cases where engineering design of a damped oscillator is required ( e. g., a door closing mechanism ). q factor and decay rate the factors q, damping ratio \u03b6, and exponential decay rate \u03b1 are related such that when a second - order system has ( that is, when the system is underdamped ), it has two complex conjugate poles that each have a real part of ; that is, the decay rate parameter represents the rate of exponential decay of the oscillations. a lower damping ratio implies a lower decay rate, and so very underdamped systems oscillate for long times. for example, a high quality tuning fork, which", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.6080862029335268, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:d6e9e522-692a-44e7-9740-323179713bdb>", "chunk_index": 1, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:38.602006"}
{"text": "4. 8 / 5 ( 10 ) | 14 classical and quantum mechanics via lie algebras apr 15, 2011 i ' d like to open a discussion thread for version 2 of the draft of my book ' ' classical and quantum mechanics via lie algebras ' ', available online at http : / / lanl. arxiv. org / abs / 0810. 1019, and for the... - more from physics forums - independent research more news stories us teen births have dropped to a record low, but the country still has one of the highest rates among developed nations, the us centers for disease control and prevention said thursday. health 43 minutes ago | not rated yet | 0 calorie information in fast food restaurants used by 40 percent of 9 - 18 year olds when making food choices a new study published online today ( thursday ) in the journal of public health has found that of young people who visited fast food or chain restaurants in the u. s. in 2010, girls and youth who were obese were more likely... health 11 hours ago | not rated yet | 0 ( healthday ) \u2014 implementation of systematic monitoring for medication adherence will allow for identification of barriers to adherence and tailoring of interventions, according to a viewpoint piece published... health 13 hours ago | not rated yet | 0 ( ap ) \u2014 the obama administration says more doctors and hospitals are embracing technology as adoption of computerized medical records reaches a \" tipping point \" in america. health 14 hours ago | not rated yet | 0 johns hopkins researchers report that hospitals may be reaping enormous income for patients whose hospital stays are complicated by preventable bloodstream infections contracted in their intensive care units. health 15 hours ago | not rated yet | 0 swiss scientists reveal the mechanism responsible for aging hidden deep within mitochondria \u2014 and dramatically slow it down in worms by administering antibiotics to the young. 18 hours ago | 4. 9 / 5 ( 9 ) | 1 | researchers from queen mary, university of london have led the largest sequencing study of human disease to date, investigating the genetic basis of six autoimmune diseases. 18 hours ago | 4. 7 / 5 ( 3 ) | 0 | until now, little was scientifically known about the human potential to cultivate compassion \u2014 the emotional state of caring for people who are suffering in a way that motivates altruistic behavior. 15 hours ago | 5 / 5 ( 2 ) | 2 | existing research shows that bicyclists who wear helmets have an 88 percent lower risk of", "subdomain_id": "subdomain_quantum_mechanics", "similarity_score": 0.6387277659372906, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:982de17d-0b42-45b5-a425-a13217c0af27>", "chunk_index": 2, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:38.969804"}
{"text": "... differences of classical mechanics when learned with calc vs algebra? 15 hours ago what are the differences? every example i find usually has a derivative or integral or some kind of calculus defined concept that seems to make it... what is the distance traveled 19 hours ago a rough sketch of experiment. image : http : / / i43. tinypic. com / 14t4sk5. png the red dots represent a side view of path traveled, f is downward force... image of a convex lens cut in half horizontally 23 hours ago hello everyone, a friend of mine came up with this question in class and i really do not have a good answer. suppose you have a convex lens... ray tracing through optical system of thick lenses 23 hours ago can you advise me a free software that allow to draw rays passed throught system of thick lenses ( preferable in 3d )? - more from physics forums - classical physics more news stories parkinson ' s disease ( pd ) is a degenerative neurological disorder marked by a progressive loss of motor control. despite intensive research, there are currently no approved therapies that have been demonstrated to alter the... parkinson ' s & movement disorders may 20, 2013 | not rated yet | 0 faulty energy production in brain cells leads to disorders ranging from parkinson ' s to intellectual disability neuroscientist patrik verstreken of vib ( flanders institute for biotechnology ) and ku leuven has shown for the first time that dysfunctional mitochondria in brain cells can lead to learning disabilities. the link between... parkinson ' s & movement disorders may 17, 2013 | 4 / 5 ( 2 ) | 0 mcgill university researchers have unlocked a new door to developing drugs to slow the progression of parkinson ' s disease. collaborating teams led by dr. edward a. fon at the montreal neurological institute and hospital - the... parkinson ' s & movement disorders may 09, 2013 | 5 / 5 ( 1 ) | 0 | new research reveals that solanaceae \u2014 a flowering plant family with some species producing foods that are edible sources of nicotine \u2014 may provide a protective effect against parkinson ' s disease. the study appearing today... parkinson ' s & movement disorders may 09, 2013 | not rated yet | 0 ( medical xpress ) \u2014 researchers at the stanford university school of medicine have exposed the possible function, in the healthy brain, of a mysterious molecule that has been strongly implicated in parkinson ' s... parkinson ' s &", "subdomain_id": "subdomain_quantum_optics", "similarity_score": 0.6168069105537027, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:82a6da0e-8ac1-443b-9735-36b96bdcb54e>", "chunk_index": 2, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:38.986906"}
{"text": "ubns requires a mechanism for ( 1 ) authentication of users over the network and ( 2 ) allowing server processes to change the user on whose behalf they execute. implementing the cryptographic mechanisms for user authentication as part of the application is complex and error prone, and as we showed, requires a substantial amount of code. moving the authentication and cryptographic mechanisms outside the application makes the application independent of these mechanism, and application programmers are usually not skilled in this area. moreover, the os mechanisms for change of process ownership are also dangerous as such privileges are among the strongest in a computer system, since changing a user typically allows the privileges of any user to be appropriated. and hence, programmers typically defer such considerations, ignoring them during initial design. but ubns affects the very structure of programs and when its consideration is delayed, it becomes increasingly expensive to retrofit. thus many applications will not be structured as ubns and the design will not satisfy the property of least privilege. netauth is a simple mechanism to invoke network authentication and process change - of - ownership, thus encouraging the design of ubns. it builds on the work of kerberos, ssh, and plan9 but seeks to do so with the style of mandatory access controls and to provide better information assurance. it netauth integrates public key and a fast re - authentication mechanism to achieve high performance authentications with the strongest possible properties. further increases in performance are enabled by the re - use of processes for the same user, saving system overhead. this simplifies the structure of such applications, and makes it much easier to build ubns. such an easy - to - use mechanism will encourage programmers to integrate security from the start, and thus construct more secure applications. not only do these mechanisms enable the construction of more secure services but also provide significant advantages for system administration. these mechanisms enable strong controls to be imposed on services without resorting to application specific configuration and without analyzing application code. manigandan radhakrishnan 2008 - 05 - 13", "subdomain_id": "subdomain_quantum_cryptography", "similarity_score": 0.606133798078928, "token_count": 413, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:91fe61ad-2d33-48f8-beb9-53d70b30a035>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:40.258381"}
{"text": "drunk scientists pour wine on superconductors and make an incredible discovery wine makes superconductors better at their jobs. and apparently, it makes some scientists better at their jobs too. superconductors behave like most metals ; they conduct electricity. they do so, however, with a twist. all metal has some resistance to the flow of electricity. but when the temperature drops, superconductors get less and less resistant ( and therefore more conductive ). when they reach very low temperatures, their resistance drops to zero. yoshihiko takano and other researchers at the national institute for materials science in japan were in the process of creating a certain kind of superconductor by putting a compound in hot water and soaking it for hours. they also soaked the compound in a mixture of water and ethanol. it appears the process was going well, because the scientists decided to have a little party. the party included sake, whisky, various wines, shochu, and beer. at a certain point, the researchers decided to try soaking the compound in the many, many liquors they had on hand and seeing how they compared to the more conventional soaking liquids. when they tested the resulting materials for superconductivity, they found that the ones soaked in commercial booze came out ahead. about 15 percent of the material became a superconductor for the water mixed with ethanol, and less for the pure water. by comparison, shochu jacked up conductivity by 23 percent and red wine managed to supercharge over 62 percent of the material. the scientists were pleased, if bemused with their results. so, a little sip of something turns out to make potential superconductors much better at their jobs. and, perhaps, scientists better at their jobs as well.", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6422029969712086, "token_count": 363, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:8cdf4cf3-6cef-461f-a21a-c4dc451daa8a>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:40.576420"}
{"text": "berkeley lab scientists delivered nearly 100 presentations at the american chemical society \u2019 s fall 2010 national meeting in boston, august 22 - 26, 2010. in the opening scene of the famous 1967 movie the graduate, benjamin braddock, at a party to celebrate his new degree, is given one word of advice for his future : \u201c plastics. \u201d were young benjamin to be receiving that advice today the word might well have been : \u201c batteries. \u201d economic forecasters say that the market for advanced batteries that can power electric, hybrid - electric and the emerging plug - in hybrid electric vehicles is going to be worth billions of dollars. based on their performances in electronics and power tools, lithium - ion batteries have the potential to be far superior to nickel - metal hydride batteries but several technological issues must be addressed before they \u2019 re applied to vehicles. marca doeff, a chemist with berkeley lab \u2019 s materials sciences division, presented a talk titled \u201c advanced li - ion battery cathode materials for vehicle technologies. \u201d she focused on the cathode as one of the most expensive components in lithium - ion batteries. \u201c also, \u201d doeff said, \u201c the cathode is the determinant of energy density in the cell because the capacity is typically much lower than that of the graphite anode, with which it must be matched. \u201d doeff and her colleagues are experimenting with various approaches for lowering the cost and improving the performance of lithium - ion cathodes. their studies include partial substitution of the expensive cobalt constituent with aluminum, titanium or iron in layered mixed transition metal oxides now used in batteries. so far they have found that a five - percent substitution of cobalt with aluminum increases cathode performance and cycle stability. substitution with small amounts of titanium also led to the formation of a high - capacity and high - rate positive electrode material, whereas substitution with iron led to lower cathode capacities and poor rate capabilities. \u201c our work shows that changes in electrochemical performance of the cathode depend highly on the nature of the substituting atom and its effect on the crystal structure, \u201d doeff said. high efficiency solar cells and other nano delights at that same graduation party today, young ben braddock might also have been told to think \u201c nano. \u201d economic forecasters foresee an even more bountiful future for nanoscale materials, particularly in solar energy and the electronics fields. \u201c nanoscale electronic materials : challenges and opportunities, \u201d was the title of a talk by ali javey, a faculty scientist in berkeley", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6346561599923586, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:5fa548f9-c53b-4338-a419-7416ea44c063>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:40.758784"}
{"text": "an even more bountiful future for nanoscale materials, particularly in solar energy and the electronics fields. \u201c nanoscale electronic materials : challenges and opportunities, \u201d was the title of a talk by ali javey, a faculty scientist in berkeley lab \u2019 s materials sciences division. in his talk javey described a technique for engineering arrays of nanoscale pillars for a broad range of applications, including low cost, highly efficient solar cells, and artificial skin that provides prosthetic limbs with the sense of touch. \u201c our technique provides large - scale assembly of highly ordered and regular arrays of nanowire components on flexible substrates through a simple contact printing process, \u201d javey said. \u201c the ability to interface nanowire sensors with integrated electronics on large scales and with high uniformity presents an important advance toward the integration of nanomaterials for sensor this technology is being applied to portable electronic and wearable human interface applications, including artificial skin. the idea is that with the integration of advanced prosthetics into the brain for better control of joints, the addition of electronic skin with nanowire sensors could enable patients to regain their sense of touch. the skin might also be used in robotics, governing how much pressure a robot applies to an object. \u201c our mechanically flexible, artificial skin sensor provides impressive mechanical robustness and electrical properties, \u201d javey said. additionally, by utilizing optically active nanowire sensors, javey and his colleagues have been able to produce highly regular, single - crystalline nanopillar arrays of semiconductors on aluminum substrates that were then configured as solar cell modules. \u201c through experiments and modeling, we \u2019 ve demonstrated the that we can configure these solar modules on both rigid and flexible substrates with enhanced carrier collection efficiency and broadband photo absorption arising from the geometric configuration of the nanopillars, \u201d javey said. \u201c this is a hugely promising to lower the cost of efficient solar cells. \u201d hydrogen from sunlight via qdot - seeded nanorods one word of advice that the graduate might not have been given at the party is \u201c hydrogen. \u201d while experts agree that hydrogen could command a key role in future renewable energy technologies, a relatively cheap, efficient and carbon - neutral means of producing it must first be developed. the photocatalytic production of hydrogen from water using solar energy meets all the necessary criteria but there remain many materials - related obstacles to the widespread use of this approach. berkeley lab director paul alivisatos, a chemist and leading authority on nanotechnology for energy discussed one idea for overcoming some", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.617690555006828, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:5fa548f9-c53b-4338-a419-7416ea44c063>", "chunk_index": 1, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:40.762955"}
{"text": "using solar energy meets all the necessary criteria but there remain many materials - related obstacles to the widespread use of this approach. berkeley lab director paul alivisatos, a chemist and leading authority on nanotechnology for energy discussed one idea for overcoming some of these obstacles in his talk titled \u201c photocatalytic hydrogen production with tunable nanorod heterostructures. \u201d in this talk, alivisatos described a model nanosystem in which a quantum dot seed of cadmium selenide, a hydrogen - generating catalyst, is embedded inside a platinum - tipped cadmium sulfide nanorod. \u201c in such structures, holes are three - dimensionally confined to the cadmium selenide, whereas the delocalized electrons are transferred to the metal tip, \u201d alivisatos said. \u201c consequently, the electrons are separated from the holes over three different components and by a tunable physical length. \u201d the seeded nanorod metal tip facilitates efficient long - lasting charge carrier separation and minimizes back reaction of intermediates. by tuning the nanorod heterostructure length and the seed size, alivisatos and his group are able to significantly increase hydrogen production compared to that of unseeded rods. \u201c we found our a multi - component nanoheterostructures to be highly active for hydrogen production, with an apparent quantum yield of 20 - percemt at 450 nanometers, \u201d alivisatos said. \u201c our systems were active under orange light illumination and demonstrated improved stability compared to seedless cadmium sulfide nanorods. \u201d", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6400546573538949, "token_count": 318, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:5fa548f9-c53b-4338-a419-7416ea44c063>", "chunk_index": 2, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:40.763771"}
{"text": "network and computer security tutorial version 0. 4. 0 april 16, 2001 this computer security tutorial is written based on my experiences with computer and network security along with my training and information i have read. the field of security is constantly changing so i cannot guarantee that information in this computer security tutorial will be current. this computer security tutorial will define some basic security issues and give insight into what causes security to be a constant issue. this computer security tutorial will help you decide what to protect and provide some basic information about attacks that may be made against your network, computer systems, or data. it will also provide computer and network security recommendations for you or your organization. although much useful information can be derived from this document without the reader having networking knowledge, to use this document in depth, i recommend that readers of this computer security tutorial have a fundamental knowledge about networking. the information contained in the ctdp networking guide contains the networking documentation required to understand this computer security tutorial. in this computer security tutorial, the terms computer security and network security will be used often. when the term computer security is used, it specifically refers to the security of one computer, although the overall security of each individual computer is required for network security. when the term network security is used, it refers to the security of the network in general. this includes such issues as password security, network sniffing, intrusion detection, firewalls, network structure and so forth. security violation definition computer or network security has been violated when unauthorized access by any party occurs. computer security is required because most organizations can be damaged by hostile software or intruders. there may be several forms of damage which are obviously interrelated. these include : the methods used to accomplish these unscrupulous objectives are many and varied depending on the circumstances. this guide will help administrators understand some of these methods and explain some countermeasures. computer security can be very complex and may be very confusing to many people. it can even be a controversial subject. network administrators like to believe that their network is secure and those who break into networks may like to believe that they can break into any network. i believe that overconfidence plays an important role in allowing networks to be intruded upon. there are many fallacies that network administrators may fall victim to. these fallacies may allow administrators to wrongfully believe that their network is more secure than it really is. this guide will attempt to clarify many issues related to security by doing the following : there are many different aspects to", "subdomain_id": "subdomain_quantum_cryptography", "similarity_score": 0.6160669966424415, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:909ddb70-0d2e-47c3-92a5-b616925eb1c9>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.042600"}
{"text": "* * exhibition at the mit museum - oct. 22 - dec. 24 2010, first floor gallery * * markus decker, dietmar offenhuber, orkan telhan ' dust serenade ' is a reenactment of an acoustic experiment done by german physicist august kundt. inspired by the chladni ' s famous sand figures visualizing sound waves in solid materials, kundt devised an experiment for visualizing longitudinal sound waves through fine lycopodium dust ; a setup that would allow him to measure the speed of sound in different gases. kundt was a strong believer in experimental methods over purely theoretical inquiry in a time when the disciplines of theoretical and experimental physics started to diverge. ' dust serenade ' intends to remind us the materiality of sound. tubes filled with scraps of words and letters - - cut - up theory - - interact with sound waves and turn into figures of dust. here, visitors can modulate the frequency of the sound emitted by moving a rod and create different harmonic sound effects. as sound waves figure, refigure, and disfigure the text, we invite visitors to rethink about the tension between their theorical knowlegde and the sensory experience. dust serenade is one of a series of interactive sound projects that enable visitors to experience the physical aspects of sound, presence, and atmosphere. works in the series have been shown at the ars electronica festival in linz, zagreb, istanbul and sao paulo. the project was funded by the council for the arts at mit and the austrian federal ministry for education, arts and culture ( bmukk )", "subdomain_id": "subdomain_quantum_optics", "similarity_score": 0.6148609183369642, "token_count": 329, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:d21685b3-7fff-4cac-acc1-0179d315cc74>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.220161"}
{"text": "approximates the term gross national product ( gnp - - q. v. ) used by economists in the united states and in other countries having a market economy. the soviet measure has been based on constant prices, which do not fully account for inflation, and has excluded depreciation. - \" new soviet man \" - a theoretical goal of several soviet regimes to transform the culturally, ethnically, and linguistically diverse peoples of the soviet union into a single soviet people, behaving according to the ideology of marxism - leninism ( q. v. ). - \" new thinking \" - gorbachev ' s view that international politics should be based on common moral and ethical norms rather than military force, including nuclear war ; an integral part of perestroika - nkgb ( narodnyi komissariat gosudarstvennoi - people ' s commissariat of state security. functioned in 1941 and again from 1943 to 1946. - nkvd ( narodnyi komissariat vnutrennykh del ) - people ' s commissariat of internal affairs. the commissariat that administered regular police organizations from 1917 to 1946. when the ogpu ( q. v. ) was abolished in 1934, the nkvd incorporated the security police organization until 1946. - the cpsu ' s ( q. v. ) system of appointing key personnel in the government and other important organizations, based on lists of critical positions and people in political favor. also refers to the individuals included on these lists. - a large agricultural and industrial region in the european part of the soviet union, extending approximately 2, 300 kilometers from kaliningrad in the northwest to sverdlovsk in the east with a north - south expanse of more than 1, 000 kilometers in places. the region does not have the black earth of the chernozem - novosti ( agentstvo pechati - news press agency. the news agency responsible for disseminating soviet information abroad. ( the word novost ' means news or something new. ) - nuclear war - fighting - the capability to use nuclear weapons to fight a war. - oblast ( pl., oblasts ) - a territorial and administrative subdivision in ten of the fifteen union republics ( q. v. ). directly subordinate to its union republic. see also autonomous oblast. - ( oecd ) organization for economic cooperation and development - founded by western nations in 1961 to stimulate economic progress and world trade. it also coordinated economic", "subdomain_id": "subdomain_quantum_field_theory", "similarity_score": 0.6009533059636417, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:541f40b2-b44d-44b5-8c65-b11c665c384b>", "chunk_index": 19, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.465714"}
{"text": "a personal and mystical approach in the search for \" divine truth. \" sufism consists of semisecret sufi brotherhoods, each pursuing a different school or \" path \" of mystic discipline but having a common goal. - a member of the larger of the two great divisions of islam. the sunnis, who rejected the claim of ali ' s line, believe that they are the true followers of the sunna, the guide to proper behavior composed of the quran and hadith, the precedent of muhammad ' s words that serves as one of the sources of islamic law. in 1989 about 90 percent of the soviet union ' s muslims were - table of ranks - a system of ranks for nobles based on service to the tsar rather than on birth or seniority. created by peter the great in - the extensive, sub - arctic evergreen forest of the soviet union. the taiga, the largest of the five primary natural zones, lies south of the turdra ( q. v. ). - literally, published there ( abroad ). russian word for samizdat ( q. v. ) manuscripts surreptitiously sent abroad - tass ( telegrafnoe agentstvo sovetskogo - telegraph agency of the soviet union. the news agency that had a monopoly on collecting and distributing news within the - territorial production complex ( territorial ' no proyvodstvennyi kompleks ) - an economic entity consisting of various economically related industrial and agricultural enterprises ( q. v. ) in a particular geographic area. - time of troubles - period of civil war in muscovy between boyar ( q. v. ) factions from 1598 to 1613, with heavy polish involvement. - the movement of one ton of cargo a distance of one kilometer. ton - kilometers are computed by multiplying the weight ( in tons ) of each shipment transported by the distance hauled ( in - tons originated - the weight of freight ( in tons ) at its original point of - transmission belt - an organization, not formally part of the cpsu ( q. v. ) apparatus, used by the party to convey its party program ( q. v. ) and propaganda to the population at large, for example, soviet trade unions. - trans - siberian railway - the 7, 000 - kilometer railroad line, stretching from its western terminus at chelyabinsk on the eastern slopes of the ural mountains to vladivostok on the pacific ocean, was built between 1891 and 1916 to link the european part of russia", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6072895483481624, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:541f40b2-b44d-44b5-8c65-b11c665c384b>", "chunk_index": 28, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.476043"}
{"text": "this dec. 5, 2012 news item on nanowerk features a seasonal approach to a study about \u2019 4 - d \u2019 nanowires, a new type of transistor shaped like a christmas tree has arrived just in time for the holidays, but the prototype won \u2019 t be nestled under the tree along with the other gifts. \u201c it \u2019 s a preview of things to come in the semiconductor industry, \u201d said peide \u201c peter \u201d ye, a professor of electrical and computer engineering at purdue university. researchers from purdue and harvard universities created the transistor, which is made from a material that could replace silicon within a decade. each transistor contains three tiny nanowires made not of silicon, like conventional transistors, but from a material called indium - gallium - arsenide. the three nanowires are progressively smaller, yielding a tapered cross section resembling a christmas tree. sadly, purdue university ( indiana, us ) will not be releasing any images to accompany their dec. 4, 2012 news release ( which originated the news item ) about the \u2019 4 - d \u2019 transistor until saturday, dec. 8, 2012. so here \u2019 s an image of a real christmas tree from the national christmas tree organization \u2019 s common tree characteristics webpage, the purdue university news release written by emil venere provides more detail about the work, \u201c a one - story house can hold so many people, but more floors, more people, and it \u2019 s the same thing with transistors, \u201d ye said. \u201c stacking them results in more current and much faster operation for high - speed computing. this adds a whole new dimension, so i call them 4 - d. \u201d the work is led by purdue doctoral student jiangjiang gu and harvard postdoctoral researcher xinwei wang. the newest generation of silicon computer chips, introduced this year, contain transistors having a vertical 3 - d structure instead of a conventional flat design. however, because silicon has a limited \u201c electron mobility \u201d \u2013 how fast electrons flow \u2013 other materials will likely be needed soon to continue advancing transistors with this 3 - d approach, ye said. indium - gallium - arsenide is among several promising semiconductors being studied to replace silicon. such semiconductors are called iii - v materials because they combine elements from the third and fifth groups of the periodic table. transistors contain critical components called gates, which enable the devices to switch on and off and to direct the flow of electrical current. smaller gates make faster", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.627961532111187, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:297915e4-08ca-4154-94cb-ca18ee89a549>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.662543"}
{"text": "iii - v materials because they combine elements from the third and fifth groups of the periodic table. transistors contain critical components called gates, which enable the devices to switch on and off and to direct the flow of electrical current. smaller gates make faster operation possible. in today \u2019 s 3 - d silicon transistors, the length of these gates is about 22 nanometers, or billionths of a meter. the 3 - d design is critical because gate lengths of 22 nanometers and smaller do not work well in a flat transistor architecture. engineers are working to develop transistors that use even smaller gate lengths ; 14 nanometers are expected by 2015, and 10 nanometers by 2018. however, size reductions beyond 10 nanometers and additional performance improvements are likely not possible using silicon, meaning new materials will be needed to continue progress, ye said. creating smaller transistors also will require finding a new type of insulating, or \u201c dielectric \u201d layer that allows the gate to switch off. as gate lengths shrink smaller than 14 nanometers, the dielectric used in conventional transistors fails to perform properly and is said to \u201c leak \u201d electrical charge when the transistor is turned off. nanowires in the new transistors are coated with a different type of composite insulator, a 4 - nanometer - thick layer of lanthanum aluminate with an ultrathin, half - nanometer layer of aluminum oxide. the new ultrathin dielectric allowed researchers to create transistors made of indium - gallium - arsenide with 20 - nanometer gates, which is a milestone, ye said. this work will be presented at the 2012 international electron devices ( ieee [ institute of electrical and electronics engineers ] ) meeting in san francisco, california, dec. 10 \u2013 12, 2012 ( as per the information on the registration page ) with the two papers written by the team will be published in the proceedings. i have a full list of the authors, from the news release, the authors of the research papers are gu [ jiangjiang gu ] ; wang [ xinwei wang ] ; purdue doctoral student h. wu ; purdue postdoctoral research associate j. shao ; purdue doctoral student a. t. neal ; michael j. manfra, purdue \u2019 s william f. and patty j. miller associate professor of physics ; roy gordon, harvard \u2019 s thomas d. cabot professor of chemistry ; and ye [ peide \" peter \" ye ]", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.655554425868166, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:297915e4-08ca-4154-94cb-ca18ee89a549>", "chunk_index": 1, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.663611"}
{"text": "us 5182793 a an apparatus and method for assisting persons in making decisions, using a computer programmed with artificial intelligence techniques. real world objects and events pertaining to a particular domain are represented in a knowledge base. best choices for solving problems are made according to the application of rules, which may be applied absolutely, comparatively, by weight, or ordered, according to methods selected by the user. the invention also permits the user to select from among various decision making strategies and permits the user to observe the effects of choices in hypothetical scenarios. 1. in a computer system having a stored system of rules and a knowledge base of facts, events, and programming, an improved method for using said computer to display a problem scenario and modify the scenario according to a best choice among alternative choices in a particular solution domain, comprising the steps of : representing a real world problem to be solved as at least one data object ; generating a problem scenario from a number of data objects, wherein said objects are arranged as a symbolic spreadsheet in which cells of said spreadsheet are frames representing said objects and their attributes and wherein said cells are linked by relationship attributes of said objects ; displaying said problem scenario to a user ; generating a pool of candidate solutions to said problem scenario ; determining a candidate selection strategy for evaluating said candidates, wherein said strategy defines a method for applying rules ; evaluating said candidates, using said candidate selection strategy to access and apply a combination of hard elimination rules, soft elimination rules, and comparison rules from a stored system of rules, to each of said candidate solutions until a best candidate is selected ; assigning a solution value representing said best candidate to variables of said problem scenario ; modifying said scenario to substitute said solution value, such that a new scenario reflecting the effects of said solution value is generated, wherein all objects having attributes affected by said solution value are modified ; and displaying said modified scenario to a user. 2. the method of claim 1, wherein said candidate generating step further comprises updating the characteristics of said candidates in accordance with predetermined data or user input. 3. the method of claim 1, wherein said strategy is selected in accordance with user input. 4. the method of claim 1, wherein said evaluating step comprises evaluating said candidates using a hierarchial method. 5. the method of claim 1, wherein said evaluating step comprises evaluating said candidates using a rule weighting method. 6. the method of claim 5, wherein said rule weighting method includes a step for short circuiting said evaluation step by determining that a current best candidate", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.6280005448397287, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.759059"}
{"text": "of claim 1, wherein said evaluating step comprises evaluating said candidates using a rule weighting method. 6. the method of claim 5, wherein said rule weighting method includes a step for short circuiting said evaluation step by determining that a current best candidate cannot be surpassed. 7. the method of claim 29, wherein said rule weighting method learns best candidate selection by adjusting said rules. 8. the method of claim 1, wherein said candidate evaluating step further comprises using soft elimination rules. 9. the method of claim 1, wherein said candidate evaluating step further comprises using comparison rules. 10. the method of claim 1, wherein said candidate evaluating step further comprises using scoring rules. 11. the method of claim 1, wherein said candidate evaluating step further comprises using stop rules. 12. the method of claim 1, and further comprising the step of using said best choice in a final action. 13. the method of claim 1, wherein said candidate generating step further comprises updating the characteristics of said alternative choices in accordance with predetermined data or user input. 14. the method of claim 1, wherein said computer provides more than one method of applying said rules during said step of evaluating. this application is a continuation of application ser. no. 07 / 821, 234, filed jan. 9, 1992, now abandoned which is a continuation of application ser. no. 07 / 373, 420, filed jun. 30, 1989 now abandoned. this invention relates in general to computer processing, and in particular to an apparatus and method, using artificial intelligence programming techniques, for assisting human users in decision making. although there is no consensus on a definition of \" artificial intelligence \", it is sometimes generally defined as a computer programming style in which programs operate on data according to rules to solve problems. artificial intelligence involves the use of symbolic, as opposed to numeric, representations of data. using computer processing to relate these symbolic representations is referred to as \" symbolic processing \", and permits computers to represent real world objects in the form of symbols and to then develop associations between those symbols. a feature common to artificial intelligence programs is that they all involve knowledge, and must represent knowledge in a manner that can be used by a computer. specific applications of artificial intelligence, including those using symbolic processing, are associated with knowledge bases. a knowledge base for a particular application includes facts about the application and rules for applying those facts, i. e., declarative and procedural knowledge relevant to the domain. the \" facts \" of a knowledge base may include objects, events", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.6134729227804904, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 1, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.760089"}
{"text": "bases. a knowledge base for a particular application includes facts about the application and rules for applying those facts, i. e., declarative and procedural knowledge relevant to the domain. the \" facts \" of a knowledge base may include objects, events, and relationships. to develop useful knowledge bases, the computer industry has recognized a need to combine efforts of both software engineers and experts in the particular domain. generally, the software engineer develops the expert system, and the domain expert provides information for the knowledge base. however, even this approach to creating knowledge bases ignores the expertise of a user, who may have his or her own skills to add to the decision making process. thus, there is a need for a knowledge - based system that permits the skills of the user to contribute to the knowledge base. one application of artificial intelligence is decision support for human users, especially in the form of modeling a particular real world or hypothetical operation. the operation ' s domain includes all objects, events, and relationships that affect behavior within the operation. yet, many existing systems are relatively inflexible, and rely on rule - based inference engines. these systems do not compare favorably to the ability of human intelligence to make decisions on what rules apply and how to apply them. there is a need for improved methods for applying rules. one aspect of the invention is an apparatus for aiding human users in making decisions relative to events in a particular domain of operations. the invention may be embodied in a computer system, which has a stored knowledge base, and in which the user interacts with a decision processor subsystem. features of the apparatus include assisting a user in choosing among alternative choices relevant to the domain. the apparatus permits the user to select from a number of types of rules and other data to develop a choice method. the apparatus also permits the user to develop a strategy that includes a set of parameter values and methods designed for a particular set of choices. the invention is implemented with programming that uses artificial intelligence techniques, including object oriented programming. for this reason, a decision processor subsystem may be sufficiently generalized such that it has modules that may be used in a number of different computer systems. thus, an aspect of the invention is a processor apparatus that is programmed to assist the user in choosing among alternative actions. another aspect of the invention is a method of programming a computer to assist a user in selecting among possible alternatives. specific features of the programming include representations of various types of data relevant to the selection process and various functions to implement the rules. the programming provides", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.602997068511339, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 2, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.762721"}
{"text": "another aspect of the invention is a method of programming a computer to assist a user in selecting among possible alternatives. specific features of the programming include representations of various types of data relevant to the selection process and various functions to implement the rules. the programming provides a number of different rules, and permits rules to be applied in varying ways. the programming also permits a multiplicity of methods for applying rules and enables the user to choose a desired method. another aspect of the invention is a method of using a computer to select a best choice among alternatives in a particular domain. features of the method include applying different rules, applying rules in different ways, selecting among a multiplicity of methods to make a choice, and adopting strategies for decision making. a further feature of the invention permits decisions to be made in the context of hypothetical scenarios. a technical advantage of the invention is that computer - aided decision making is accomplished in a manner that more nearly approximates human decision making. rules may be applied non - absolutely and comparatively. a further advantage of the invention is that it allows a person to combine his or her expertise interactively with a computer system that has artificial intelligence capabilities. a still further advantage of the invention is that it combines the ability of a computer to determine the effects of events with its ability to make choices relevant to those events. the novel features believed characteristic of the invention are set forth in the appended claims. the invention itself, however, is best understood by reference to the following description of illustrative embodiments, read in conjunction with the accompanying drawings. fig. 1 is a block diagram of a computer system in accordance with the invention. fig. 2 illustrates a method for creating a program architecture for programming a computer in accordance with the present invention. fig. 3 is a flowchart illustrating a method of computer - aided decision making in accordance with the present invention. figs. 4a and 4b are flowcharts illustrating steps that are further detail of the evaluation step of fig. 3. fig. 5 is a flowchart illustrating a method of computer - aided decision making, using a strategy generated by said computer. fig. 6 is a flowchart illustrating a learning routine used with the method of fig. 4b. fig. 7 is a flowchart illustrating a method of computer - aided decision making, using a scenario generated by said computer. fig. 1 represents an apparatus constructed in accordance with the present invention. in one embodiment, the invention is part of a computer network, which includes a host computer 10 and", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.6183589477708401, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 3, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.764431"}
{"text": "computer - aided decision making, using a scenario generated by said computer. fig. 1 represents an apparatus constructed in accordance with the present invention. in one embodiment, the invention is part of a computer network, which includes a host computer 10 and a number of stations, each in communication with host 10 by means of a network communication system 15. an example of an application of the apparatus is a computer network for monitoring an airline flight operation, in which the domain of the operation includes all events affecting flight schedules. as will be explained below, the system provides real time support for enabling a user to comprehend the scope of a problem, observe the details of problem side effects, generate multiple possibilities for improving the situation, and evaluate alternatives for improvement. the use of this specific application is exemplary, and the apparatus and method of this invention could be used for any number of other applications in many diverse areas. a typical station is identified with the reference numeral 20. used in a network, each station 20 includes a terminal emulator to enable it to interact with host 10. however, it is not necessary to the invention that such a network be used, and the station may be a stand - alone processing unit. whether used as a terminal in a network or as a stand alone processing unit, station 20 has a number of components, including a transaction interface 30, a user interface 40, a knowledge base 50, and a decision processor system 60. these components deliver and receive information to and from each other by means of a bus 17 and other communication means. in addition, station 20 has other components ( not shown ) typical of a data processing terminal or stand - alone unit commonly in use. for example, memory other than that used for knowledge base 50 stores data and programming, and a timer ( not shown ) provides timing functions. transaction interface 30 permits data used by station 20 to be kept current with events that occur in the domain of the operation. thus, transaction interface 30 is in communication with host 10 as well as with knowledge base 50. of course, if station 20 is a stand - alone processing unit, transaction interface 30 will be in communication with some other input device and may be combined with user interface 40. transaction interface 30 is also in communication with decision processor system 60, so that information based on decisions made using the invention can be channeled from station 20 to another station or to an output device. the hardware associated with transaction interface 30 may be any one of a number of well - known input / output and other peripheral devices designed for the functions", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.6034367241168449, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 4, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.765658"}
{"text": "decisions made using the invention can be channeled from station 20 to another station or to an output device. the hardware associated with transaction interface 30 may be any one of a number of well - known input / output and other peripheral devices designed for the functions herein described. user interface 40 provides access for a user to the functions of the invention. user interface 40 allows input through a keyboard or other input device, and displays for permitting the user to interact with the invention. user interface 40 is also in communication with decision processor system 60. the hardware associated with user interface 40 may be any number of well - known input / output and other peripheral devices. knowledge base 50 contains the data necessary to perform the different functions of the system. the hardware associated with knowledge base 50 may be any memory device for electronically storing information, such as a digital storage device. knowledge base 50 is conceptually similar to a data base of a standard data processing system, except that it contains a number of artificial intelligence structures to enable decision making. more specifically, knowledge base 50 is arranged as a semantic network of frames. in general, a frame is a knowledge representation structure that represents \" objects \", i. e, physical items, facts, and events, in the real world as groups of attributes. a frame contains slots, each of which can have a value. as explained below, these values can include programs to be executed. in a system of frames, frames may inherit values from other frames. the frames within knowledge base 50 may include reasoning programming, which is more accurately described as \" application behavior code. \" this programming is object - oriented, which means that information is oriented around the objects that the programming manipulates. objects in knowledge base 50 may \" behave \" and thereby cause data and relationships between objects in the knowledge base to change. to effect such behavior, the programming makes use of demons, which are programs invoked when certain data elements in frames are accessed and determines what to do when certain conditions arise. the programming within knowledge base 50 permits objects to be represented and their interrelationships to be manipulated in a manner analogous to cells of a numeric spreadsheet. this feature is explained in more detail below, in connection with effects processor 62. decision processor system 60 includes two subsystems, including an effects processor 62 and a strategy processor 66, each associated with special programming to accomplish the functions described below. the hardware associated with each processor may be any one of a number of well - known devices capable of executing computer instructions, such as a microprocessor.", "subdomain_id": "subdomain_quantum_computing", "similarity_score": 0.6216273136767902, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 5, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.766811"}
{"text": "\" could be either a person operating the equipment or a program that exchanges information with another. furthermore, not all of the data types and functions described below are essential to operation of the invention in its simplest form, and with simple modifications, the invention may accomplish the function of assisting a user in making decisions with some, and not necessarily all of the data types and functions described herein. for example, the decision making function can be used without any selecting methods. it is not necessary to the invention that there be more than one method of decision making or that there be more than one strategy. the strategy programming can be used for managing a set of values only, with no associated choice methods. thus, in the programming of fig. 2, the data types and functions associated with defining multiple methods and multiple strategies, are not essential to the invention and the programming is easily modified to operate without them. as indicated in fig. 2, in general, the programming steps are defining functions and creating data types. an additional step is organizing these data types and functions into a programming structure to control the application of the functions and access to data. fig. 2 is directed to the architectural features of the invention, with functional features and their implementation being further explained in connection with figs. 3 - 7. candidate 200 is a data type that represents the candidates involved in a selection process. candidate 200 is associated with functions from candidate move 210, and a data type, rules 205. candidate 200 is created and maintained by candidate generator 201. candidate generator 201 is a data type that specifies how the candidate pool is created, maintained, and accessed. its internal structure is a list of the generator name, data, and functions from candidate move 210. the data in candidate generator 201 may range from a current candidate pool to a set of functions for determining candidates. candidate generator 201 uses functions defined as candidate move 210 to create and update the candidate pool and to produce each subsequent candidate on demand. candidate generator 201 permits more than one type of candidate generation, thus each candidate generator is identified with a name. candidate generator is an element of method 204. choose 230 determines whether more than one generator will be used during a decision making process, as specified by the current method. candidate move 210, is a set of related user defined functions, which provides an initial pool of candidates or some user defined data structure representing the information required to produce each subsequent candidate on demand. candidate move also provides the means to extract a single candidate from the candidate pool and a method for reducing the candidate pool after a single", "subdomain_id": "subdomain_quantum_cryptography", "similarity_score": 0.628648413503456, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 8, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.770042"}
{"text": "provides an initial pool of candidates or some user defined data structure representing the information required to produce each subsequent candidate on demand. candidate move also provides the means to extract a single candidate from the candidate pool and a method for reducing the candidate pool after a single candidate has been extracted. candidate move 210 is created by define candidate move 227, a system function, and is accessed by define candidate generator 225, a system function. state 202, a data type, stores runtime information about a candidate, i. e., its \" state \" information, both system and user generated. the system created information includes the number assigned to the candidate relative to the current candidate pool and the name of the generator that produced the candidate. state is updated by a system function, put state 226, and is accessible as a parameter from within rules 205 or final action 214. state update 211 is a user defined function, that updates a candidate ' s state information, using a system function put state 226. state update 221 is created by the system function define state update 228, and is accessed as an element of method 204. the preferred embodiment of the invention includes a data type, global context 203, which represents information bearing on the best candidate that is not a property of individual candidates. it is a list of datum keyword and value pairs, initialized by an argument to choose 230. it is accessed by a get system function and updated with a put system function. global context update 212 is a user defined function that makes changes and additions to the global list, using the get and put system function 220 referred to in the preceding paragraph. it is created by define 231, a system defined function, and is accessed as an element of choice method in method 204. method 204, a data type, represents information from which a method for making a choice in a particular way is selected. the internal structure of method 204 is comprised of a number of slots, including at least one of each of the following : a choice name, a method name, a global update function, a candidate generator, a state update function, rules, final action function, rule weights, soft violation inclusion option, scaling option, and approach. the information in these the slots is associated with the data types and functions described herein. rule weights, soft violation inclusion, and the scaling option are discussed below in connection with figs. 3 - 5. method 204 permits choices to be made using one of a multiplicity of possible methods. rules 205 is a data type comprised of at least one set", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.6111400687143059, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 9, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.771244"}
{"text": "defined data type, accessed by rules 205, such that rules behave differently depending on strategy parameter values. strategy parameters 208 is created by define strategy parameters 248, a system function. the values within strategy parameters can be obtained interactively from a user or from another program. the strategy feature is further discussed in connection with fig. 5. figs. 3 - 7 illustrate another aspect of the invention, which is a method for using a computer to assist a user in selecting a best choice among alternative choices when making a decision. essentially, figs. 3, 4a, and 4b illustrate the method of making a best choice, given a particular choice method. figs. 5 and 6 illustrate the a method of the invention using strategy selection and learning features. fig. 7 illustrates a method of the invention using a scenario feature. these methods can be implemented with the functions and data types discussed in connection with fig. 2. as indicated above, the \" begin \" stage of each method can be initiated by a user and the method can be executed interactively, or the method can be programmatic and called or used or both by other programming. the method of fig. 3 assumes that there exists a pool of candidates. step 300 is updating the characteristics of these candidates. a programming structure for implementing step 300 is the global context update 212. step 302 is executing a candidate generation procedure of the computer, such that candidates may be evaluated singularly or in multiples for comparison purposes, during the other steps of the method. candidate generation can range from a simple process that provides the initial pool of candidates as a simple list and extracts elements from the list one at a time, to a more complex process in which candidates are generated on demand using a data structure that represents the candidate pool. the generation of each candidate may be a computationally iterative process, so only as many candidates as required are generated. this latter process can be implemented with the aid of stop rules. however, for some choose options, the entire list of candidates must be generated to do a complete sort of preferred choices or perform the full weighted choose explained below. although not indicated in fig. 3, step 302 may be repeated, i. e, there may be more than one candidate generation. programming for implementing step 302 is described in connection with fig. 2, in particular, candidate generator 201, candidate move 210, and choose 230. whether or not there will be more than one candidate generation is determined by choose 230. step 304 is executing a procedure for selecting a best candidate for resolving the", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.6365134674808819, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 12, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.774841"}
{"text": "fig. 2, in particular, candidate generator 201, candidate move 210, and choose 230. whether or not there will be more than one candidate generation is determined by choose 230. step 304 is executing a procedure for selecting a best candidate for resolving the decision. within step 304 are alternative approaches, which are described below in connection with figs. 4a and 4b. an example of programming for implementing step 304 is the function choose 230. step 305 is determining whether there are any final action functions, such as final action 214. if there are, step 306 is performing the final action. if there are no final actions, step 308 returns the best candidate to the user. figs. 4a and 4b illustrate substeps of step 304. as will be explained in connection with each figure, the invention provides two choice approaches : a hierarchical approach and a weighted choose approach. regardless of the approach, it is assumed that a pool of candidates with updated information is available from the data types and functions described above. furthermore, if rules are to have rule weights, the rules are sorted accordingly. both approaches include steps involving the application of hard and soft elimination rules. if a hard elimination rule fails for a candidate, the candidate is eliminated and the next candidate is considered. soft elimination rules are applied to each candidate that has passed the hard elimination rules. unlike hard elimination rules, soft elimination rules may continue to be applied to a candidate, regardless of whether a failure has already occurred. a soft elimination rule score is accumulated for each candidate by adding in the rule weight of each rule passed. in addition to receiving scores, the candidates are assigned to one of two groups : a group containing candidates that have passed all soft elimination rules applied so far, and a group containing candidates that have failed at least one soft elimination rule. programming to implement the rules is described above in connection with rules 205, method 204, and choose 230. the particular approach for decision making may include scaling with respect to soft elimination rules. if scaling is to be applied, the final soft elimination score in multiplied by the number of candidates currently being considered. this allows the soft elimination score to be combined on an equal basis with the subsequent comparison rule score. an example of implementation of such scaling is an element, such as a flag, in method 204. both approaches include steps for applying stop rules. if a stop rule succeeds for a candidate, the decision making process stops. one example of a stop rule is when the latest best candidate is sufficient. another example is when the decision making has taken too", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.6024335641738836, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 13, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.775879"}
{"text": "invention with the strategy selection features involves a first step, step 510, of adopting a strategy. when a strategy is adopted, the parameter values and choice methods of that strategy become the current values and choice methods. step 512 is executing the decision making steps of fig. 3 to choose a best candidate. step 514 determines if the best candidate is acceptable. if it is, step 516 is using the best candidate in other programming or as desired by the user. steps 518 and 520 of fig. 5 illustrate another feature of the invention, which may be used during the development stage of the decision making system. this is a learning feature, which is invoked by the user after a decision making operation has failed to produce the desired result. in general, the learning feature is a rule weight adjusting feature in connection with the weighted choose method, so that the candidate who is the user ' s best choice will receive the highest score, and thereby improve the knowledge base. the learning steps are iterative for each \" rule instance \", i. e., each part of the weighted choose method in which a particular rule was evaluated for the entire set of candidates surviving elimination. a rule instance is the rule weight and a list of candidate / rank weight pairs. step 518 determines whether this learning feature is to be invoked. if so, step 520 is performing it. the substeps of step 520 are illustrated in fig. 6. it is assumed that the programming has already saved each candidate and its state information, including the total score for each candidate, and each rule instance. step 610 is getting a rule instance. step 612 ensures that the learning steps continue for each rule instance. step 614 is determining the relationship between the current rule and the current candidate ' s total, t. for each rule, there are three status categories : ( 1 ) every candidate that has a higher current t than the desired candidate is ranked higher by the current rule, or ( 2 ) every candidate that has a higher current t than the desired candidate is ranked lower by the current rule, or ( 3 ) neither category ( 1 ) nor ( 2 ) exists. according to the category in which a rule falls, the remaining steps increase or decrease that rule ' s weight or set the rule aside. if the rule falls within category 3, step 618 sets the rule aside. steps 620 - 626 ensures that if the rule is set aside, after any rule that falls within category ( 1 ) or ( 2 ) has had its weight adjusted, the set aside rules", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.604325249959812, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 18, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.783360"}
{"text": "pool and dividing that sum into the largest delta. step 644 is recomputing delta as the minimum of the scaled lo and sc. step 646 is determining whether the rule is a category 1 rule. if so, step 648 is computing a new rule weight as the old rule weight minus delta. if the rule is not in category 1, which implies that it is in category 2, the rule weight is the old rule weight plus delta. step 652 recalculates t for each candidate, and checks the pool of set aside rules, as indicated above. after every rule instance has been evaluated by steps 614 - 652, step 654 is determining whether the desired candidate has an improved position in a sorted list of candidate totals than it did with the original rule weights. if so, step 656 returns the adjusted rule weights. referring again to fig. 5, if the learning feature is not invoked, step 510 - 514 are repeated until an acceptable candidate is determined. fig. 7 illustrates a feature of the invention that integrates features of the decision processing system of fig. 1. in particular, fig. 7 illustrates a method for generating trial solutions using different strategies. the method may be implemented using the apparatus and programming discussed above in connection with decision processor 60 and knowledge base 50. step 710 is entering an \" effects mode \" of a computer system programmed with constraint propagation capabilities. step 712 is determining whether a new scenario is to be created. if a new scenario is to be created, step 714 is creating the scenario and associating a particular strategy with the scenario. if no new scenario is to be created, step 716 is determining whether a previously selected scenario is to be processed. if not, step 718 is leaving the effects mode and selecting a solution. referring again to step 716, if a previous scenario is to be used, step 720 is selecting a scenario. once a scenario has been created or selected, step 722 is entering that scenario, which implies the adoption of an accompanying strategy. step 724 is solving the problem by entering the decision making aspects of the invention. the programming discussed above in connection with figs. 3, 4a, and 4b are directed to this step. although the invention has been described with reference to specific embodiments, this description is not meant to be construed in a limiting sense. various modifications of the disclosed embodiment, as well as alternative embodiments, of the invention will become apparent to persons skilled in the", "subdomain_id": "subdomain_quantum_simulation", "similarity_score": 0.6246090473696976, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:83b0dc8f-1497-436c-b504-53e65437240e>", "chunk_index": 20, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.785227"}
{"text": "d - f - a collection of similar information stored in a file, such as a database of addresses. this information may be created and stored in a database management system ( dbms ). - slang. to find and correct equipment defects or program malfunctions. - the pre - defined configuration of a system or an application. in most programs, the defaults can be changed to reflect personal preferences. - the main directory of the user interface. desktops usually contain icons that represent links to the hard drive, a network ( if there is one ), and a trash or recycling can for files to be deleted. it can also display icons of frequently used applications, as requested by the user. - desktop publishing - the production of publication - quality documents using a personal computer in combination with text, graphics, and page layout programs. - a list of files stored in the computer. - two distinct types. the names refer to the media inside the container : - a hard disc stores vast amounts of data. it is usually inside the computer but can be a separate peripheral on the outside. hard discs are made up of several rigid coated metal discs. currently, hard discs can store 15 to 30 gb ( gigabytes ) - a floppy disc, 3. 5 \" square, usually inserted into the computer and can store about 1. 4 megabytes of data. the 3. 5 \" square \u201c floppies \u201d have a very thin, flexible disc inside. there is also an intermediate - sized floppy disc, trademarked zip discs, which can store 250 megabytes of data. hard disc drive - disk drive - the equipment that operates a hard or floppy disc. - the instruction manual for a piece of hardware or software. - represents an ip ( internet protocol ) address or set of ip addresses that comprise a domain. the domain name appears in urls to identify web pages or in email addresses. for example, the email address for the first lady is firstname. lastname @ example. org, \u201c whitehouse. gov \u201d being the domain name. each domain name ends with a suffix that indicates what \u201c top level domain \u201d it belongs to. these are : \u201c. com \u201d for commercial, \u201c. gov \u201d for government, \u201c. org \u201d for organization, \u201c. edu \u201d for educational institution, \u201c. biz \u201d for business, \u201c. info \u201d for information, \u201c. tv \u201d for television, \u201c. ws \u201d for website. domain suffixes may also indicate the country in which the domain is registered.", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.617763689388831, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:3a576b83-2541-4df5-a8af-dce08d1d4c26>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:41.979730"}
{"text": "today is a date in history to note for humankind and for our understanding of the universe. scientists at european organization for nuclear research ( cern ) have announced that they believe they have found the elusive higgs boson \u2013 the particle that elementary particles interact with to gain mass. the search began nearly 50 years ago with the invention of the mechanism for mass generation by phil anderson in the context of superconductivity. its existence as a sub - atomic particle was first hypothesized by peter higgs. on behalf of the liberal party i would like to congratulate the more than 100 canadian researchers who have been working for many decades on this international collaboration at cern. while research into high energy physics certainly does not come cheaply, and we don \u2019 t always know immediately what practical uses the results of that research will have, understanding the universe we live in is an important activity that has never failed to give us tools by which we might move humanity forward and improve the lives of billions. canada has a tremendous history of contributing to basic research that has revolutionized the world. the most famous example is perhaps the discovery of insulin by dr. frederick banting and his research assistant charles best working at the university of toronto. sadly under stephen harper the government of canada is steadily walking away from funding basic research. for instance, the natural research council has been ordered to turn away from early stage research and focus instead on direct commercial applications. granting councils like the natural sciences and engineering research council of canada ( nserc ) have increasingly lost funding for basic research. since 2006 funding for discovery grants has fallen from $ 420 million to $ 360 million. i \u2019 m sure that today we will all see and read many stories about the years of effort it has taken to find the higgs boson. as we reflect on the significance of this accomplishment, i hope we take a moment to consider the thousands of basic research groups across this country. it is the curiosity and dedication of these researchers, along with funding to test their ideas, and heeding their expert advice and warnings that will help us build a healthier, more prosperous civilization for everyone. - ted hsu liberal science and technology critic", "subdomain_id": "subdomain_quantum_field_theory", "similarity_score": 0.6089371625273129, "token_count": 441, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:b8598c65-f81c-46c7-be94-d22336d8ac66>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.248189"}
{"text": "of or pertaining to pluto ; plutonian ; hence, pertaining to the interior of the earth ; subterranean. of, pertaining to, or designating, the system of the plutonists ; igneous ; as, the plutonic theory. ( ploo tahn ' ic ) - igneous rocks that form from the cooling of magma in the interior of a planet or asteroid. describes igneous rocks formed deep beneath the earth ' s surface plutonic rocks are igneous rocks that crystallize below the eartha\u20ac\u2122s surface. they are characterized by visible crystals arranged in a three - dimensional interlocking mosaic. of igneous rock that has solidified beneath the earth ' s surface ; granite or diorite or gabbro related to the cooling of molten materials within the earth. a pluton is a body of hot material that rises within the earth because it is less dense that the material around it. when this material cools before breaking the surface, it forms plutonic, or intrusive, rocks. an igneous rock, or relating to igneous rock, that crystallized below the surface of the earth. the crystals in a plutonic rock are the size of grains of sugar or larger. pertaining to igneous rock formed at great depth. a plutonic rock is coarse - grained due to slow cooling underground. refers to rocks of igneous origin that have come from great depth. applies to igneous rocks formed beneath the surface of the earth ; typically with large crystals due to the slowness of cooling. synonym of intrusive. antonym of volcanic. eruptive or igneous rock consolidated at depth. having to do with a class of intrusive igneous rocks that have solidified far below the earth ' s surface ; or or having to do with the theory that the present condition of the earth ' s crust is mainly due to igneous action. [ ahdos", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6381246472072368, "token_count": 386, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:8f644cc8-ca7a-4ba8-99c0-3cd431a2f306>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.415152"}
{"text": "computer hacking and security with the rapid growth of the worldwide internet user base, online transactions are believed to reach well over a trillion dollars in the next three years. with stakes this high, it makes sense for all parties involved to secure the internet. haphazard handling of financial and personal information can lead to the internet being constantly associated with fraud and privacy abuses instead of being a viable commerce medium. the goal for higher security starts with the individual user. the term \" hacker \" has been around for a while. it originally referred to a person not well versed with a computer trying different things to accomplish a task. to hack was to figure out something through sheer trial and error or logical deduction. today, a hacker described as a person who breaks into computers for various reasons. crackers and script - kiddies are two other more commonly used terms describing those involved in the break in or disruption of an online service. security problems can occur in any networked environment. many of the problems are related to the exploitation of the original design of the tcp / ip suite of internetworking protocols, but the majority are due to configuration or operator errors. hackers are not just looking for websites or government computers to hack - utility grids, emergency information systems, controls for dams and locks, financial information, inter - banking information, military communications and much more sensitive information travels on the internet and other communication networks. in broad terms, security threats can be classified as active and passive. active hacking : active attacks involve the modification of transmitted data and attempts to gain unauthorized access to systems. data communication is based on a set of handshakes to ensure the smooth and reliable flow of information. a hacker that is between a client and a server and is able to spoof ( illegally duplicate ) the ip address and sequence numbers, can attack either machine in several ways. the hacker can disable one of the machines and take the identity of the other, or the hacker can mimic either machine and carry on conversations impersonating the other. a hacker could also attach additional information to a client request and strip the corresponding additional response from the packet before forwarding the remaining response to the client ' s original request. all this while having access to information that is assumed to be going back and forth between two ' trusted ' systems. computer viruses and trojans are also examples of active attacks. they can disable machines or in the case of trojans allow malicious hackers access to senstive information by creating a back door. passive hacking : passive attacks have to do with", "subdomain_id": "subdomain_quantum_cryptography", "similarity_score": 0.629221482745438, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:f471d58d-641c-4714-9c18-c6daa4f309d1>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.466679"}
{"text": "we present the molecular beam epitaxy fabrication and optical properties of complex gaas nanostructures by droplet epitaxy : concentric triple quantum rings. a significant difference was found between the volumes of the original droplets and the final gaas structures. by means of atomic force microscopy and photoluminescence spectroscopy, we found that a thin gaas quantum well - like layer is developed all over the substrate during the growth interruption times, caused by the migration of ga in a low as background. keywords : molecular beam epitaxy ; droplet epitaxy ; gaas nanostructures ; photoluminescence the fabrication of semiconductor quantum nanostructures based on self - assembly has deeply attracted the research community because of the interest in fundamental physics and the potential applications of these systems as building blocks for novel devices and quantum information technologies [ 1 - 3 ]. in particular, quantum rings, a special class of semiconductor nanostructures, have been investigated since they manifest a quantum - interference phenomenon, known as the aharonov \u2013 bohm ( ab ) effect, and have also been applied for the fabrication of optoelectronic devices [ 5 - 7 ]. therefore, the ability in the production of quantum ring systems has a great relevance in the nanotechnology field. during the last 15 years, molecular beam epitaxy ( mbe ) has been successfully employed for the fabrication of semiconductor nanoscopic rings, without the use of any lithographic step [ 8 - 11 ]. based on droplet epitaxy ( de ) [ 12, 13 ], we recently demonstrated the fabrication and discussed the growth of gaas concentric multiple quantum rings. the innovation in our growth protocol, compared with the standard de, resides in the multiple steps used for the droplets crystallization. normally the crystallization of nanometer - sized ga droplets, automatically formed at the substrate surface after irradiation of ga, has been achieved by supplying an as flux until the complete consumption of ga atoms. on the contrary, we introduced many pulsed arsenization steps at different substrate temperatures, opening the possibility for the fabrication of more complex gaas nanostructures. the partial crystallization of the available ga inside the droplets allows changes in the subsequent as supply condition ( arsenic bep and substrate temperatures ), adding an important degree of freedom in the fabrication technique. here, we will discuss the formation of concentric triple quantum rings ( ctqrs ), describing the morphological features by means of atomic force microscopy (", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6422275700514098, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:ab917039-64a0-4d30-8e09-9616fa38eb11>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.484499"}
{"text": "( arsenic bep and substrate temperatures ), adding an important degree of freedom in the fabrication technique. here, we will discuss the formation of concentric triple quantum rings ( ctqrs ), describing the morphological features by means of atomic force microscopy ( afm ) analysis, and we will show the optical properties of the system, investigated by photoluminescence ( pl ) spectroscopy. interestingly, we found that the volume of the final gaas nanostructure is much lower than the expected value, estimated from the initial amount of supplied ga. this discrepancy is justified in terms of ga atoms diffusion from the droplets to high distance onto the substrate surface during the growth interruption steps of the procedure. this explanation is supported by the presence of an additional peak in the pl spectra consistent with the emission of a quantum well - like thin layer of gaas formed all over the substrate. the growth experiments were performed in a conventional gen ii mbe system using epi - ready gaas ( 001 ) substrates. after the growth of a 500 - nm - thick gaas buffer layer and of a 200 - nm - thick al0. 3ga0. 7as barrier layer at 580\u00b0c, the substrate temperature was decreased to 350\u00b0c and the as valve closed until the background pressure was below 1 \u00d7 10\u22129 torr. at the same temperature, a ga molecular beam equivalent to the formation of 10 ml of gaas in the presence of as was supplied to the substrate surface, for the droplets formation. after that, the substrate temperature was decreased to 250\u00b0c and an as bep of 8 \u00d7 10\u22127 torr was supplied for 20 s for the partial crystallization of the original droplets into gaas. finally, the substrate temperature was increased to 300\u00b0c and the sample surface was irradiated by the same as bep ( 8 \u00d7 10\u22127 torr ) for 20 min, to ensure the complete reaction of metallic ga with as. it is worth mentioning that a growth interruption time of around 1 h was used to reach the thermal stability of the sample after each change of the substrate temperature. after the growth, the samples were taken out of the chamber for the morphological analysis by afm and optical investigation by pl. three samples were prepared : sample a by stopping the growth just after the ga supply ; sample b after completely performing the described procedure ; and sample c by burying the gaas nanostructure in al0. 3ga0. 7as and annealing at 650\u00b0c in as atmosphere for", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6186912499921844, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:ab917039-64a0-4d30-8e09-9616fa38eb11>", "chunk_index": 1, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.485518"}
{"text": "the growth just after the ga supply ; sample b after completely performing the described procedure ; and sample c by burying the gaas nanostructure in al0. 3ga0. 7as and annealing at 650\u00b0c in as atmosphere for the optical measurements. photoluminescence spectra of sample c were measured at t = 15 k using a green laser ( \u03bbexc = 532 nm ) as excitation source with a power density pexc = 10 w / cm2 and recorded by a peltier - cooled ccd camera. results and discussion in fig. 1a and 1b, we show the afm images of sample a, where the growth was stopped just after the deposition of ga and sample b, where the entire procedure was performed. the ga supply clearly resulted in the formation of nanometer - sized, nearly hemispherical ga droplets. their average diameter and height were around 80 and 35 nm, respectively, while the density was estimated to be around 8 \u00d7 108 cm\u22122. at the end of the procedure, clear ctqrs structures with good rotational symmetry appeared, with inner, middle and outer ring diameters of around 80, 140 and 210 nm, respectively, while heights were around 7 nm for the inner rings, 4 nm for middle rings and 3 nm for the outer rings. these structures showed an elongation of around 11 % along the [ 0 \u2013 11 ] direction, which might be due to the anisotropic diffusion of ga on gaas ( 001 ) surface. it is worth noticing that the inner rings showed nearly the same diameter to that of the original ga droplet and that the density of the final gaas structures was equal to that of the original droplets, confirming that all ga droplets transformed into gaas triple rings at the end of the procedure. as already discussed in ref., the formation of the inner rings comes from the crystallization of the droplets edge, thus explaining the identity between droplets and inner rings diameters. on the contrary, middle and outer rings appear caused by the subsequent as supplies, as a result of the interplay between as adsorption and ga migration from the droplets. fig. 1c shows the cross - sectional height profile for sample a ( black line ) and b ( red line ) obtained from the afm images. it is important to point out that there is a significant difference between the number of ga atoms initially supplied, corresponding to the equivalent amount of 10 mls, and the number of ga atoms, evaluated to be equivalent to around 3", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6144761957334325, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:ab917039-64a0-4d30-8e09-9616fa38eb11>", "chunk_index": 2, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.486460"}
{"text": "from the afm images. it is important to point out that there is a significant difference between the number of ga atoms initially supplied, corresponding to the equivalent amount of 10 mls, and the number of ga atoms, evaluated to be equivalent to around 3 \u2013 4 mls, inside the final structure. this difference suggests that only a fraction of the initially supplied ga atoms effectively concur to the formation of the 3d nanostructures, while the other part, estimated to be around 6 \u2013 7 mls, might be consumed in another process. the reason for this discrepancy might be found considering our experimental procedure for the formation of ctqrs. as mentioned before, the three main steps of the growth are performed at different temperatures : 350\u00b0c for the droplets formation, 250\u00b0c for the first as supply and 300\u00b0c for the second as supply. to establish the thermal equilibrium of the substrate, we observed 1 h growth interruption times after each change of the substrate temperature. during these waiting times, a portion of the ga atoms stored in the droplets might be consumed to form a 2d gaas thin layer all over the substrate. we believe this phenomenon to be caused by a slow 2d crystallization of ga atoms diffusing from the droplets, even in the absence of an intentional as supply. indeed, an as background pressure of around 1 \u00d7 10\u22129 torr is present during the whole procedure, thus providing the unintentional as pressure needed for the partial crystallization of ga atoms. as we recently found in similar systems, a slow gaas crystallization all over the substrate might take place in case of very low as supply to the ga droplets. in these conditions of very low as flux, the surface mobility of ga atoms is so large that an uniform layer of gaas might be formed all over the substrate surface. in a capped sample, embedded in an al0. 3ga0. 7as barrier, this layer can act as a quantum well, confining carriers and eventually being optically active. in order to check the optical quality of ctqrs and to confirm the presence of a thin quantum well - like gaas layer all over the substrate coming from the unintentional crystallization of a certain amount of ga atoms during the procedure, we performed pl investigations. the same structure of sample b was therefore grown on another sample ( sample c ) and embedded in an al0. 3ga0. 7as barrier layer. figure 2 shows the pl spectra of sample c excited at 15 k by a", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6388250995947171, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:ab917039-64a0-4d30-8e09-9616fa38eb11>", "chunk_index": 3, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.487448"}
{"text": "pl investigations. the same structure of sample b was therefore grown on another sample ( sample c ) and embedded in an al0. 3ga0. 7as barrier layer. figure 2 shows the pl spectra of sample c excited at 15 k by a green laser ( \u03bbexc = 532 nm ) with a power density pexc = 10 w / cm2 and recorded by a peltier - cooled ccd camera. in the region where the emission from quantum - confined gaas structures is expected, two peaks, respectively named peak 1 at 1. 55 ev and peak 2 at 1. 76 ev, appeared. a calculation on the electronic structure for the ctqrs was performed in the framework of the effective mass approximation [ 17 - 20 ], allowing us to attribute peak 1 to the emission of the localized states within the ctqrs. on the other hand, on the basis of the same theoretical predictions, peak 2 can be safely assigned to a 2d gaas quantum well ( qw ), which appeared all over the substrate during the procedure. as already discussed, only a fraction of the total supplied ga is effectively crystallized to form the triple rings, while the remaining 6 \u2013 7 mls of ga atoms concur to the formation of a 2d layer of gaas, as described above. within the effective mass approximation, a 6 \u2013 7 mls - thick gaas qw is expected to emit at 1. 76 ev, in excellent agreement with the observed peak 2 feature. we believe that the presence of this 2d layer might be a general feature in the samples grown with our multiple steps de, by observing growth interruption times. figure 1. afm 2 \u00d7 2 micron images of sample a ( a ) and b ( b ). insets show a 3d - magnified picture of a single structure. cross sectional height profiles of a single ga droplet and concentric triple quantum ring ( c ) figure 2. pholuminescence spectra of ctqrs recorded at 15 k. gaas and al0. 3ga0. 7as peaks appeared at 1. 52 and 1. 90 ev, respectively. between them additional two features appeared, at 1. 55 ev ( peak 1 ) and at 1. 76 ev ( peak 2 ) we presented the growth and the optical properties of gaas ctqrs fabricated by de. at the end of our multistep procedure, ga droplets are transformed into these complex nanostructures. we found a significant difference in the volume of the final structure compared", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6412919303673995, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:ab917039-64a0-4d30-8e09-9616fa38eb11>", "chunk_index": 4, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.488319"}
{"text": "and the optical properties of gaas ctqrs fabricated by de. at the end of our multistep procedure, ga droplets are transformed into these complex nanostructures. we found a significant difference in the volume of the final structure compared to the initially supplied amount of ga. we explain this discrepancy in terms of ga diffusion all over the substrate during the growth interruption steps of the experiments, caused by the residual as partial pressure in the chamber. this picture is strongly supported by the presence of a high - energy peak in the pl, which is consistent with the presence of a thin gaas quantum well on the substrate. this work was partially supported by the cariplo foundation ( prj. quadis2 \u2013 no. 2008 - 3186 ). this article is distributed under the terms of the creative commons attribution noncommercial license which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author ( s ) and source are credited. science. 2000, 290 : 2282. coi number [ 1 : cas : 528 : dc % 2bd3cxptfsnu7s % 3d ] ; bibcode number [ 2000sci... 290. 2282m ] pubmed abstract | publisher full text science. 2003, 301 : 809. coi number [ 1 : cas : 528 : dc % 2bd3sxmtvgqsrc % 3d ] ; bibcode number [ 2003sci... 301.. 809l ] pubmed abstract | publisher full text phys. rev. b. 2003, 67 : 121307. bibcode number [ 2003phrvb.. 67l1307s ] publisher full text phys. rev.. 1959, 115 : 485. bibcode number [ 1959phrv.. 115.. 485a ] publisher full text appl. phys. lett.. 2006, 89 : 183102. bibcode number [ 2006apphl.. 89r3102m ] publisher full text appl. phys. lett.. 2009, 94 : 171102. bibcode number [ 2009apphl.. 94q1102w ] publisher full text appl. phys. lett.. 2009, 95 : 071908. bibcode number [ 2009apphl.. 95g1908w ] publisher full text", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6456649754177208, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:ab917039-64a0-4d30-8e09-9616fa38eb11>", "chunk_index": 5, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.489103"}
{"text": ". 94q1102w ] publisher full text appl. phys. lett.. 2009, 95 : 071908. bibcode number [ 2009apphl.. 95g1908w ] publisher full text appl. phys. lett.. 1997, 71 : 2014. coi number [ 1 : cas : 528 : dyak2sxmsfoit70 % 3d ] ; bibcode number [ 1997apphl.. 71. 2014g ] publisher full text appl. phys. lett.. 2003, 82 : 2401. coi number [ 1 : cas : 528 : dc % 2bd3sxivfamu78 % 3d ] ; bibcode number [ 2003apphl.. 82. 2401g ] publisher full text jpn. j. appl. phys.. 2000, 39 : l79. coi number [ 1 : cas : 528 : dc % 2bd3cxhtlsqt7w % 3d ] ; bibcode number [ 2000jajap.. 39... 79w ] publisher full text j. cryst. growth. 2005, 278 : 108. coi number [ 1 : cas : 528 : dc % 2bd2mxjsvelsro % 3d ] ; bibcode number [ 2005jcrgr. 278.. 108m ] publisher full text j. cryst. growth. 1991, 111 : 688. coi number [ 1 : cas : 528 : dyak3mxkvvamsro % 3d ] ; bibcode number [ 1991jcrgr. 111.. 688k ] publisher full text jpn. j. appl. phys.. 1993, 32 : 2052. coi number [ 1 : cas : 528 : dyak3sxks1sjsb0 % 3d ] ; bibcode number [ 1993jajap.. 32. 2052k ] publisher full text nano. lett.. 2009, 9 : 3419. coi number [ 1 : cas : 528 : dc % 2bd1mxhtfglslje ] ; bibcode number [ 2009nanol... 9. 3419s ] pubmed abstract | publisher full text j. cryst. growth. 1989, 95 : 71. coi number [ 1 : cas : 528 :", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6347792694349095, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:ab917039-64a0-4d30-8e09-9616fa38eb11>", "chunk_index": 6, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.489753"}
{"text": "] ; bibcode number [ 2009nanol... 9. 3419s ] pubmed abstract | publisher full text j. cryst. growth. 1989, 95 : 71. coi number [ 1 : cas : 528 : dyal1mxitf2ls7g % 3d ] ; bibcode number [ 1989jcrgr.. 95... 71o ] publisher full text nanotechnology. 2010, 21 : 125601. coi number [ 1 : stn : 280 : dc % 2bc3c7lvvahuw % 3d % 3d ] ; bibcode number [ 2010nanot.. 21l5601s ] pubmed abstract | publisher full text solid. state commun.. 1994, 92 : 437. coi number [ 1 : cas : 528 : dyak2mxhsvshu7y % 3d ] ; bibcode number [ 1994sscom.. 92.. 437m ] publisher full text j. appl. phys.. 1994, 75 : 4779. coi number [ 1 : cas : 528 : dyak2cxkvfcmsbo % 3d ] ; bibcode number [ 1994jap.... 75. 4779p ] publisher full text phys. rev. b. 2000, 61 : 10959. coi number [ 1 : cas : 528 : dc % 2bd3cxis1amsb8 % 3d ] ; bibcode number [ 2000phrvb.. 6110959c ] publisher full text j. cryst. growth. 2002, 242 : 321. coi number [ 1 : cas : 528 : dc % 2bd38xkvfgqtlo % 3d ] ; bibcode number [ 2002jcrgr. 242.. 321s ] publisher full text", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.63255153669037, "token_count": 395, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:ab917039-64a0-4d30-8e09-9616fa38eb11>", "chunk_index": 7, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.490271"}
{"text": ". tue dec 25 05 : 43 : 29 gmt 2007 by gw fourmyle well, pilgrims - - you ' ve a few ' anomalies ', hardly 1. start with the galaxy chains, loops around huge voids - - sure, put an ' inflationary - theory ' band - aid on it. yeah. i suggest an elegant solution - - as - entropy has been produced on earth, and + entropy, i. e. ' s ' is rather obvious at reaching far beyond its initial thermodynamic concept - - seems to me s is the ' property - of - mass ', and ' g '? a myth. sure, mass curves space / time, i contend that is an ' s ' function. ' disorder - with - respect - to mass '. realizing dr. e. was doing his work, on a massive planet, in a massive stellar system, one would expect these ' anomalies ', as probes exit, or universes of infinite mass will bear infinite s - - - fortunately infinite - s must be equal. extrapolating calculations made in a burning house to all houses? here i see massive ' error - of - reasoning '. the stunning aspect is if s may ' disorder ' space / time? why not living - systems? the simple experiment, for most, is simply looking in a mirror, reading the news, or fighting cancer - - - too long, physics has only dealt in ' dead - stuff ' - - - there is more - - - all comments should respect the new scientist house rules. if you think a particular comment breaks these rules then please use the \" report \" link in that comment to report it to us. if you are having a technical problem posting a comment, please contact technical support.", "subdomain_id": "subdomain_quantum_field_theory", "similarity_score": 0.6062872238928085, "token_count": 364, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:48c72ba4-7085-46b3-8117-81921da98f66>", "chunk_index": 3, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.623632"}
{"text": "when an electron collides with an atom or ion, there is a small probability that the electron kicks out another electron, leaving the ion in the next highest charge state ( charge q increased by + 1 ). this is called electron - impact ionization and is the dominant process by which atoms and ions become more highly charged. the rate equation is given by : e - + a ( q ) e - + e - + a ( q + 1 ). from energy conservation, it is clear that the initial energy of the incident electron must be larger than the ionization potential of the electron being removed. theorists have found electron impact ionization cross sections difficult to calculate from first principles, even for relatively simple systems like hydrogen - like ( one electron ) and helium - like ( two electron ) ions. there has been recent progress in developing a phenomenological theory by dr. yong - ki kim here at nist. a simple empirical formula for calculating electron impact ionization cross sections was developed by w. lotz over 25 years ago. it is not very accurate, but it does give experimentalists a useful qualitative picture. radiative recombination is a process which takes place when a positively charged ion captures an electron to one of its bound orbits with a simultaneous emission of a photon : e - + a ( q + ) a ( q - 1 ) + photon in the dielectronic recombination process the energy which becomes available during the capture process is carried away by the promotion of a bound electron to another bound orbit : e - + a ( q + ) a ( q - 1 ) * * a ( q - 1 ) + photon in the second step of the dielectronic recombination process a photon is emitted characteristic to the doubly excited state ( * * ) of the q - 1 times ionized ion. the dielectronic recombination is a resonant process, because of the discrete energy nature of the bound electron orbits. both radiative and the dielectronic recombination are important capture processes which play a dominant role in determining the charge state balance of highly ionized astrophysical and laboratory plasmas. in a recent investigation carried out with our ebit, scandium - like and titanium - like barium ions were created, trapped, and excited. x - ray peaks arising from both radiative recombination and dielectronic recombination were studied simultaneously. in the", "subdomain_id": "subdomain_quantum_optics", "similarity_score": 0.6217673768852601, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:716dc55f-ad7c-480f-828e-32665f8aa931>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.690230"}
{"text": ", scandium - like and titanium - like barium ions were created, trapped, and excited. x - ray peaks arising from both radiative recombination and dielectronic recombination were studied simultaneously. in the dr process a 2p electron was promoted to the 3d orbital. one of the m - shell electrons of the recombined ion subsequently decayed radiatively to the 2p vacancy, and emitted an x - ray of energy almost twice the incident kinetic energy of the projectile electron. comparison with theoretical estimates showed a favorable agreement with the data. the theoretical calculations were carried out by the theory group of the university of connecticut ( mclaughlin and hahn ). the measurement of excited - state lifetimes is complementary to measuring transition wavelengths as a way of studying atomic structure. although the lifetimes are determined by the same wavefunctions as the energy levels the measurements of the atomic decays carry different information since they are sensitive to the long - range behavior of the wavefunctions. the knowledge of the lifetimes also has important practical applications. they are critical in the density diagnostics of laboratory and astrophysical plasmas. the principle of measuring lifetimes with an ebit lies in the periodic fast switching of different voltages in the machine. since the ions are created and excited with the same beam of electrons, by changing the electron beam energy one can selectively exclude certain levels from being excited. this can simply be done by setting the electron beam energy below the excitation threshold of the level to be excluded. without further excitation the time dependence of the emitted photon signal carries the information about the lifetime of the level. after a certain period of time ( determined by the lifetime of the level ) the electron beam energy is set to be above the excitation threshold to repopulate the level and repeat the sequence. an alternative method for measuring lifetimes with an ebit is to switch off the electron beam completely, take data, and turn the beam back again to re - excite the ions in the trap. while the electron beam is off, the ions remain trapped by the magnetic field. the lifetime range that can be measured with an ebit is determined by the capabilities for the fast switching of voltages. in principle the 10 ns to 10 ms lifetime range can be addressed by this method. since this lifetime range is only partially covered by other methods the ebit is a unique tool for measuring the lifetime of long living metastable levels. in a recent experiment we have measured the", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6218583457835294, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:716dc55f-ad7c-480f-828e-32665f8aa931>", "chunk_index": 1, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.691286"}
{"text": "new view of superconductivitycategory : science & technology posted : may 31, 2012 05 : 22pm the ultimate goal for many materials scientists and the field of electronics is the creation of room - temperature superconductors. these, thus far, undiscovered material are able to carry electric currents with no resistance and no energy loss, like their low temperature brethren. the key to this ability is the formation of cooper pairs, which scientists do not fully understand at the moment. researchers at berkeley lab have recently done an interesting experiment to see how cooper pairs form, and this research may lead to a new understanding of the pairs. cooper pairs are, essentially, electrons that have overcome their usual electromagnetic repulsion so they may travel together. in this coupled state the electrons have less energy than they would separately, but this energy they keep as they travel, which is what makes a material a superconductor. to understand how the cooper pairs form, the researchers decided to break some up using a pump - probe technique. an initial pumping laser pulse hits the cooper pair, causing it to split into two higher energy quasiparticles which the probing laser pulse interacts with. the probing laser pulse captures some information from these quasiparticles, including their momentum and energy. the data show the momentum of the quasiparticles and the energy of the pumping pulse influence how quickly the cooper pair reforms. this could be an indication of what keeps the pairs together. naturally, further study has to be done. only one high temperature superconductor was used for this study, and likely the researchers will want to use additional samples. also the light sourced used for this test is only able to produce low energy pulses. for this experiment though, that limit proved useful as it allowed for better momentum resolution. future experiments will likely want to explore other, potentially more intriguing, energy levels however.", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.7327918068481276, "token_count": 383, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:a8c46367-e836-4202-a7fe-80729dbb5101>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.769664"}
{"text": "ether is a class of organic compounds which contain an ether group \u2014 an oxygen atom connected to two ( substituted ) alkyl or aryl groups \u2014 of general formula r \u2013 o \u2013 r '. a typical example is the solvent and anesthetic diethyl ether, commonly referred to simply as \" ether \" ( ethoxyethane, ch3 - ch2 - o - ch2 - ch3 ). cannot form hydrogen bonds among each other, resulting in a relatively low boiling point comparable to that of the analogous alcohols. however, the differences in the boiling points of the ethers and their isometric alcohols become smaller as the carbon chains become longer, as the hydrophobic nature of the carbon chain becomes more predominant over the presence of hydrogen bonding. ethers are slightly polar as the coc bond angle in the functional group is about 110 degrees, and the c - o dipoles do not cancel out. ethers are more polar than alkenes but not as polar as alcohols, esters or amides of comparable structure. however, the presence of two lone pairs of electrons on the oxygen atoms makes hydrogen bonding with water molecules possible, causing the solubility of alcohols ( for instance, butan - 1 - ol ) and ethers ( ethoxyethane ) to be quite dissimilar. cyclic ethers such as tetrahydrofuran and 1, 4 - dioxane are totally miscible in water because of the more exposed oxygen atom for hydrogen bonding as compared to aliphatic ethers. ethers can act as lewis bases. for instance, diethyl ether forms a complex with boron compounds, such as boron trifluoride diethyl etherate ( bf3. oet2 ). ethers also coordinate to magnesium in grignard reagents ( rmgbr ). in the iupac nomenclature system, ethers are named using the general formula \" alkoxyalkane \", for example ch3. if the ether is part of a more complex molecule, it is described as an alkoxy substituent, so - och3 would be considered a \" methoxy - \" group. the simpler alkyl radical is written in front, so ch3 would be given as methoxy ). the nomenclature of describing the two alkyl groups and appending \" ether \", e. g. \" ethyl methyl ether \" in the example above, is a trivial usage ethers are not to", "subdomain_id": "subdomain_quantum_materials", "similarity_score": 0.6071975124835466, "token_count": 512, "source_dataset": "HuggingFaceFW/fineweb-edu", "source_id": "<urn:uuid:c378a27e-491b-4f83-87fe-b27cad4360f2>", "chunk_index": 0, "filtering_threshold": 0.6, "created_at": "2025-12-26T10:55:42.872521"}