WorldWideScience

Sample records for imply collision-free hash

  1. Internal differential collision attacks on the reduced-round Grøstl-0 hash function

    DEFF Research Database (Denmark)

    Ideguchi, Kota; Tischhauser, Elmar Wolfgang; Preneel, Bart

    2014-01-01

    . This results in collision attacks and semi-free-start collision attacks on the Grøstl-0 hash function and compression function with reduced rounds. Specifically, we show collision attacks on the Grøstl-0-256 hash function reduced to 5 and 6 out of 10 rounds with time complexities 248 and 2112 and on the Grøstl......-0-512 hash function reduced to 6 out of 14 rounds with time complexity 2183. Furthermore, we demonstrate semi-free-start collision attacks on the Grøstl-0-256 compression function reduced to 8 rounds and the Grøstl-0-512 compression function reduced to 9 rounds. Finally, we show improved...

  2. Collision analysis of one kind of chaos-based hash function

    International Nuclear Information System (INIS)

    Xiao Di; Peng Wenbing; Liao Xiaofeng; Xiang Tao

    2010-01-01

    In the last decade, various chaos-based hash functions have been proposed. Nevertheless, the corresponding analyses of them lag far behind. In this Letter, we firstly take a chaos-based hash function proposed very recently in Amin, Faragallah and Abd El-Latif (2009) as a sample to analyze its computational collision problem, and then generalize the construction method of one kind of chaos-based hash function and summarize some attentions to avoid the collision problem. It is beneficial to the hash function design based on chaos in the future.

  3. Data Collision Prevention with Overflow Hashing Technique in Closed Hash Searching Process

    Science.gov (United States)

    Rahim, Robbi; Nurjamiyah; Rafika Dewi, Arie

    2017-12-01

    Hash search is a method that can be used for various search processes such as search engines, sorting, machine learning, neural network and so on, in the search process the possibility of collision data can happen and to prevent the occurrence of collision can be done in several ways one of them is to use Overflow technique, the use of this technique perform with varying length of data and this technique can prevent the occurrence of data collisions.

  4. Incremental cryptography and security of public hash functions ...

    African Journals Online (AJOL)

    An investigation of incremental algorithms for crytographic functions was initiated. The problem, for collision-free hashing, is to design a scheme for which there exists an efficient “update” algorithm: this algorithm is given the hash function H, the hash h = H(M) of message M and the “replacement request” (j, m), and outputs ...

  5. On Randomizing Hash Functions to Strengthen the Security of Digital Signatures

    DEFF Research Database (Denmark)

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  6. On randomizing hash functions to strengthen the security of digital signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2009-01-01

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  7. The Grindahl Hash Functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Rechberger, Christian; Thomsen, Søren Steffen

    2007-01-01

    to the state. We propose two concrete hash functions, Grindahl-256 and Grindahl-512 with claimed security levels with respect to collision, preimage and second preimage attacks of 2^128 and 2^256, respectively. Both proposals have lower memory requirements than other hash functions at comparable speeds...

  8. Proposals for Iterated Hash Functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2008-01-01

    The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against...... some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned...

  9. Proposals for iterated hash functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2006-01-01

    The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against...... some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned...

  10. A scalable lock-free hash table with open addressing

    DEFF Research Database (Denmark)

    Nielsen, Jesper Puge; Karlsson, Sven

    2016-01-01

    and concurrent operations without any locks. In this paper, we present a new fully lock-free open addressed hash table with a simpler design than prior published work. We split hash table insertions into two atomic phases: first inserting a value ignoring other concurrent operations, then in the second phase......Concurrent data structures synchronized with locks do not scale well with the number of threads. As more scalable alternatives, concurrent data structures and algorithms based on widely available, however advanced, atomic operations have been proposed. These data structures allow for correct...

  11. Cryptographic quantum hashing

    Science.gov (United States)

    Ablayev, F. M.; Vasiliev, A. V.

    2014-02-01

    We present a version of quantum hash functions based on non-binary discrete functions. The proposed quantum procedure is ‘classical-quantum’, that is, it takes a classical bit string as an input and produces a quantum state. The resulting function has the property of a one-way function (pre-image resistance); in addition it has properties analogous to classical cryptographic hash second pre-image resistance and collision resistance. We also show that the proposed function can be naturally used in a quantum digital signature protocol.

  12. Cryptographic quantum hashing

    International Nuclear Information System (INIS)

    Ablayev, F M; Vasiliev, A V

    2014-01-01

    We present a version of quantum hash functions based on non-binary discrete functions. The proposed quantum procedure is ‘classical-quantum’, that is, it takes a classical bit string as an input and produces a quantum state. The resulting function has the property of a one-way function (pre-image resistance); in addition it has properties analogous to classical cryptographic hash second pre-image resistance and collision resistance. We also show that the proposed function can be naturally used in a quantum digital signature protocol. (letter)

  13. Cryptanalysis of Tav-128 hash function

    DEFF Research Database (Denmark)

    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag...... authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third...... party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which...

  14. Building Modern GPU Brute-Force Collision Resistible Hash Algorithm

    Directory of Open Access Journals (Sweden)

    L. A. Nadeinsky

    2012-03-01

    Full Text Available The article considers methods of fixing storing passwords in hashed form security vulnerability. Suggested hashing algorithm is based on the specifics of architecture of modern graphics processors.

  15. Hash function based on chaotic map lattices.

    Science.gov (United States)

    Wang, Shihong; Hu, Gang

    2007-06-01

    A new hash function system, based on coupled chaotic map dynamics, is suggested. By combining floating point computation of chaos and some simple algebraic operations, the system reaches very high bit confusion and diffusion rates, and this enables the system to have desired statistical properties and strong collision resistance. The chaos-based hash function has its advantages for high security and fast performance, and it serves as one of the most highly competitive candidates for practical applications of hash function for software realization and secure information communications in computer networks.

  16. Cryptanalysis of the LAKE Hash Family

    DEFF Research Database (Denmark)

    Biryukov, Alex; Gauravaram, Praveen; Guo, Jian

    2009-01-01

    We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attac...

  17. Robust hashing for 3D models

    Science.gov (United States)

    Berchtold, Waldemar; Schäfer, Marcel; Rettig, Michael; Steinebach, Martin

    2014-02-01

    3D models and applications are of utmost interest in both science and industry. With the increment of their usage, their number and thereby the challenge to correctly identify them increases. Content identification is commonly done by cryptographic hashes. However, they fail as a solution in application scenarios such as computer aided design (CAD), scientific visualization or video games, because even the smallest alteration of the 3D model, e.g. conversion or compression operations, massively changes the cryptographic hash as well. Therefore, this work presents a robust hashing algorithm for 3D mesh data. The algorithm applies several different bit extraction methods. They are built to resist desired alterations of the model as well as malicious attacks intending to prevent correct allocation. The different bit extraction methods are tested against each other and, as far as possible, the hashing algorithm is compared to the state of the art. The parameters tested are robustness, security and runtime performance as well as False Acceptance Rate (FAR) and False Rejection Rate (FRR), also the probability calculation of hash collision is included. The introduced hashing algorithm is kept adaptive e.g. in hash length, to serve as a proper tool for all applications in practice.

  18. Efficient hash tables for network applications.

    Science.gov (United States)

    Zink, Thomas; Waldvogel, Marcel

    2015-01-01

    Hashing has yet to be widely accepted as a component of hard real-time systems and hardware implementations, due to still existing prejudices concerning the unpredictability of space and time requirements resulting from collisions. While in theory perfect hashing can provide optimal mapping, in practice, finding a perfect hash function is too expensive, especially in the context of high-speed applications. The introduction of hashing with multiple choices, d-left hashing and probabilistic table summaries, has caused a shift towards deterministic DRAM access. However, high amounts of rare and expensive high-speed SRAM need to be traded off for predictability, which is infeasible for many applications. In this paper we show that previous suggestions suffer from the false precondition of full generality. Our approach exploits four individual degrees of freedom available in many practical applications, especially hardware and high-speed lookups. This reduces the requirement of on-chip memory up to an order of magnitude and guarantees constant lookup and update time at the cost of only minute amounts of additional hardware. Our design makes efficient hash table implementations cheaper, more predictable, and more practical.

  19. One-way hash function construction based on the spatiotemporal chaotic system

    International Nuclear Information System (INIS)

    Luo Yu-Ling; Du Ming-Hui

    2012-01-01

    Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the hash compression function in parallel. The hash compression is constructed based on the spatiotemporal chaos. In each message block, the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function. The final hash value is generated by further compressing the mixed result of all the hash compression values. Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key, good statistical properties, and strong collision resistance. (general)

  20. Range-efficient consistent sampling and locality-sensitive hashing for polygons

    DEFF Research Database (Denmark)

    Gudmundsson, Joachim; Pagh, Rasmus

    2017-01-01

    Locality-sensitive hashing (LSH) is a fundamental technique for similarity search and similarity estimation in high-dimensional spaces. The basic idea is that similar objects should produce hash collisions with probability significantly larger than objects with low similarity. We consider LSH for...... or union of a set of preprocessed polygons. Curiously, our consistent sampling method uses transformation to a geometric problem....

  1. Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function

    NARCIS (Netherlands)

    Liu, Bozhong; Gong, Zheng; Chen, Xiaohong; Qiu, Weidong; Zheng, Dong

    2010-01-01

    Hash functions are widely used in authentication. In this paper, the security of Lin et al.'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al.'s expandable message techniques, we find the scheme is vulnerable to collision, preimage and second

  2. Locality-sensitive Hashing without False Negatives

    DEFF Research Database (Denmark)

    Pagh, Rasmus

    2016-01-01

    We consider a new construction of locality-sensitive hash functions for Hamming space that is covering in the sense that is it guaranteed to produce a collision for every pair of vectors within a given radius r. The construction is efficient in the sense that the expected number of hash collisions......(n)/k, where n is the number of points in the data set and k ∊ N, and differs from it by at most a factor ln(4) in the exponent for general values of cr. As a consequence, LSH-based similarity search in Hamming space can avoid the problem of false negatives at little or no cost in efficiency. Read More: http...... between vectors at distance cr, for a given c > 1, comes close to that of the best possible data independent LSH without the covering guarantee, namely, the seminal LSH construction of Indyk and Motwani (FOCS ′98). The efficiency of the new construction essentially matches their bound if cr = log...

  3. The suffix-free-prefix-free hash function construction and its indifferentiability security analysis

    DEFF Research Database (Denmark)

    Bagheri, Nasour; Gauravaram, Praveen; Knudsen, Lars R.

    2012-01-01

    In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value $$(IV)$$ of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) str...

  4. Security analysis of a one-way hash function based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Wang Shi-Hong; Shan Peng-Yang

    2011-01-01

    The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions. (general)

  5. One-way hash function construction based on chaotic map network

    International Nuclear Information System (INIS)

    Yang Huaqian; Wong, K.-W.; Liao Xiaofeng; Wang Yong; Yang Degang

    2009-01-01

    A novel chaotic hash algorithm based on a network structure formed by 16 chaotic maps is proposed. The original message is first padded with zeros to make the length a multiple of four. Then it is divided into a number of blocks each contains 4 bytes. In the hashing process, the blocks are mixed together by the chaotic map network since the initial value and the control parameter of each tent map are dynamically determined by the output of its neighbors. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high flexibility, as required by practical keyed hash functions.

  6. Hashing for Statistics over K-Partitions

    DEFF Research Database (Denmark)

    Dahlgaard, Soren; Knudsen, Mathias Baek Tejs; Rotenberg, Eva

    2015-01-01

    In this paper we analyze a hash function for k-partitioning a set into bins, obtaining strong concentration bounds for standard algorithms combining statistics from each bin. This generic method was originally introduced by Flajolet and Martin [FOCS'83] in order to save a factor Ω(k) of time per...... concentration bounds on the most popular applications of k-partitioning similar to those we would get using a truly random hash function. The analysis is very involved and implies several new results of independent interest for both simple and double tabulation, e.g. A simple and efficient construction...

  7. Hash function construction using weighted complex dynamical networks

    International Nuclear Information System (INIS)

    Song Yu-Rong; Jiang Guo-Ping

    2013-01-01

    A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then, each block is divided into components, and the nodes and weighted edges are well defined from these components and their relations. Namely, the WCDN closely related to the original message is established. Furthermore, the node dynamics of the WCDN are chosen as a chaotic map. After chaotic iterations, quantization and exclusive-or operations, the fixed-length hash value is obtained. This scheme has the property that any tiny change in message can be diffused rapidly through the WCDN, leading to very different hash values. Analysis and simulation show that the scheme possesses good statistical properties, excellent confusion and diffusion, strong collision resistance and high efficiency. (general)

  8. A novel method for one-way hash function construction based on spatiotemporal chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren Haijun [College of Software Engineering, Chongqing University, Chongqing 400044 (China); State Key Laboratory of Power Transmission Equipment and System Security and New Technology, Chongqing University, Chongqing 400044 (China)], E-mail: jhren@cqu.edu.cn; Wang Yong; Xie Qing [Key Laboratory of Electronic Commerce and Logistics of Chongqing, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Yang Huaqian [Department of Computer and Modern Education Technology, Chongqing Education of College, Chongqing 400067 (China)

    2009-11-30

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  9. A novel method for one-way hash function construction based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Ren Haijun; Wang Yong; Xie Qing; Yang Huaqian

    2009-01-01

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  10. SPONGENT: The Design Space of Lightweight Cryptographic Hashing

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knezevic, Miroslav; Leander, Gregor

    2013-01-01

    construction instantiated with present-type permutations. The resulting family of hash functions is called spongent. We propose 13 spongent variants--or different levels of collision and (second) preimage resistance as well as for various implementation constraints. For each of them, we provide several ASIC...

  11. FSH: fast spaced seed hashing exploiting adjacent hashes.

    Science.gov (United States)

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  12. Parameter-free Locality Sensitive Hashing for Spherical Range Reporting

    DEFF Research Database (Denmark)

    Ahle, Thomas Dybdahl; Pagh, Rasmus; Aumüller, Martin

    2017-01-01

    We present a data structure for *spherical range reporting* on a point set S, i.e., reporting all points in S that lie within radius r of a given query point q. Our solution builds upon the Locality-Sensitive Hashing (LSH) framework of Indyk and Motwani, which represents the asymptotically best...... solutions to near neighbor problems in high dimensions. While traditional LSH data structures have several parameters whose optimal values depend on the distance distribution from q to the points of S, our data structure is parameter-free, except for the space usage, which is configurable by the user...... query time bounded by O(t(n/t)ρ), where t is the number of points to report and ρ∈(0,1) depends on the data distribution and the strength of the LSH family used. We further present a parameter-free way of using multi-probing, for LSH families that support it, and show that for many such families...

  13. Constructing a one-way hash function based on the unified chaotic system

    International Nuclear Information System (INIS)

    Long Min; Peng Fei; Chen Guanrong

    2008-01-01

    A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security. (general)

  14. Ranking Based Locality Sensitive Hashing Enabled Cancelable Biometrics: Index-of-Max Hashing

    OpenAIRE

    Jin, Zhe; Lai, Yen-Lung; Hwang, Jung-Yeon; Kim, Soohyung; Teoh, Andrew Beng Jin

    2017-01-01

    In this paper, we propose a ranking based locality sensitive hashing inspired two-factor cancelable biometrics, dubbed "Index-of-Max" (IoM) hashing for biometric template protection. With externally generated random parameters, IoM hashing transforms a real-valued biometric feature vector into discrete index (max ranked) hashed code. We demonstrate two realizations from IoM hashing notion, namely Gaussian Random Projection based and Uniformly Random Permutation based hashing schemes. The disc...

  15. InChIKey collision resistance: an experimental testing

    Directory of Open Access Journals (Sweden)

    Pletnev Igor

    2012-12-01

    Full Text Available Abstract InChIKey is a 27-character compacted (hashed version of InChI which is intended for Internet and database searching/indexing and is based on an SHA-256 hash of the InChI character string. The first block of InChIKey encodes molecular skeleton while the second block represents various kinds of isomerism (stereo, tautomeric, etc.. InChIKey is designed to be a nearly unique substitute for the parent InChI. However, a single InChIKey may occasionally map to two or more InChI strings (collision. The appearance of collision itself does not compromise the signature as collision-free hashing is impossible; the only viable approach is to set and keep a reasonable level of collision resistance which is sufficient for typical applications. We tested, in computational experiments, how well the real-life InChIKey collision resistance corresponds to the theoretical estimates expected by design. For this purpose, we analyzed the statistical characteristics of InChIKey for datasets of variable size in comparison to the theoretical statistical frequencies. For the relatively short second block, an exhaustive direct testing was performed. We computed and compared to theory the numbers of collisions for the stereoisomers of Spongistatin I (using the whole set of 67,108,864 isomers and its subsets. For the longer first block, we generated, using custom-made software, InChIKeys for more than 3 × 1010 chemical structures. The statistical behavior of this block was tested by comparison of experimental and theoretical frequencies for the various four-letter sequences which may appear in the first block body. From the results of our computational experiments we conclude that the observed characteristics of InChIKey collision resistance are in good agreement with theoretical expectations.

  16. The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases

    Directory of Open Access Journals (Sweden)

    A.T. Akinwale

    2009-05-01

    Full Text Available In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits. These functions are used in different levels of hash tables that are coded in Java Programming Language and a quite number of data records serve as primary data for testing the performances. The result shows that the two-level hash tables with three different hash functions give a superior performance over one-level hash table with two hash functions or zero-level hash table with one function in term of reducing the conflict keys and quick lookup for a particular element. The result assists to reduce the complexity of join operation in query language from O( n2 to O( 1 by placing larger query result, if any, in multilevel hash tables with multiple hash functions and generate shorter query result.

  17. Cache-Oblivious Hashing

    DEFF Research Database (Denmark)

    Pagh, Rasmus; Wei, Zhewei; Yi, Ke

    2014-01-01

    The hash table, especially its external memory version, is one of the most important index structures in large databases. Assuming a truly random hash function, it is known that in a standard external hash table with block size b, searching for a particular key only takes expected average t q =1...

  18. Cracking PwdHash: A Bruteforce Attack on Client-side Password Hashing

    OpenAIRE

    Llewellyn-Jones, David; Rymer, Graham Matthew

    2017-01-01

    PwdHash is a widely-used tool for client-side password hashing. Originally released as a browser extension, it replaces the user’s password with a hash that combines both the password and the website’s domain. As a result, while the user only remembers a single secret, the passwords received are all unique for each site. We demonstrate how the hashcat password recovery tool can be extended to allow passwords generated using PwdHash to be identified and recovered, revealing the user’s master p...

  19. Dakota - hashing from a combination of modular arithmetic and symmetric cryptography

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    In this paper a cryptographic hash function is proposed, where collision resistance is based upon an assumption that involves squaring modulo an RSA modulus in combination with a one-way function that does not compress its input, and may therefore be constructed from standard techniques and assum...

  20. DEVELOPMENT AND IMPLEMENTATION OF HASH FUNCTION FOR GENERATING HASHED MESSAGE

    Directory of Open Access Journals (Sweden)

    Amir Ghaeedi

    2016-09-01

    Full Text Available Steganography is a method of sending confidential information in a way that the existence of the channel in this communication remains secret. A collaborative approach between steganography and digital signature provides a high secure hidden data. Unfortunately, there are wide varieties of attacks that affect the quality of image steganography. Two issues that required to be addressed are large size of the ciphered data in digital signature and high bandwidth. The aim of the research is to propose a new method for producing a dynamic hashed message algorithm in digital signature and then embedded into image for enhancing robustness of image steganography with reduced bandwidth. A digital signature with smaller hash size than other hash algorithms was developed for authentication purposes. A hash function is used in the digital signature generation. The encoder function encoded the hashed message to generate the digital signature and then embedded into an image as a stego-image. In enhancing the robustness of the digital signature, we compressed or encoded it or performed both operations before embedding the data into the image. This encryption algorithm is also computationally efficient whereby for messages with the sizes less than 1600 bytes, the hashed file reduced the original file up to 8.51%.

  1. Perceptual Audio Hashing Functions

    Directory of Open Access Journals (Sweden)

    Emin Anarım

    2005-07-01

    Full Text Available Perceptual hash functions provide a tool for fast and reliable identification of content. We present new audio hash functions based on summarization of the time-frequency spectral characteristics of an audio document. The proposed hash functions are based on the periodicity series of the fundamental frequency and on singular-value description of the cepstral frequencies. They are found, on one hand, to perform very satisfactorily in identification and verification tests, and on the other hand, to be very resilient to a large variety of attacks. Moreover, we address the issue of security of hashes and propose a keying technique, and thereby a key-dependent hash function.

  2. Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2008-01-01

    In this paper a cryptographic hash function is proposed, where collision resistance is based upon an assumption that involves squaring modulo an RSA modulus in combination with a one-way function that does not compress its input, and may therefore be constructed from standard techniques and assum...

  3. The Concept of Collision-Free Motion Planning Using a Dynamic Collision Map

    Directory of Open Access Journals (Sweden)

    Keum-Bae Cho

    2014-09-01

    Full Text Available In this paper, we address a new method for the collision-free motion planning of a mobile robot in dynamic environments. The motion planner is based on the concept of a conventional collision map (CCM, represented on the L(travel length-T(time plane. We extend the CCM with dynamic information about obstacles, such as linear acceleration and angular velocity, providing useful information for estimating variation in the collision map. We first analyse the effect of the dynamic motion of an obstacle in the collision region. We then define the measure of collision dispersion (MOCD. The dynamic collision map (DCM is generated by drawing the MOCD on the CCM. To evaluate a collision-free motion planner using the DCM, we extend the DCM with MOCD, then draw the unreachable region and deadlocked regions. Finally, we construct a collision-free motion planner using the information from the extended DCM.

  4. Architecture-Conscious Hashing

    NARCIS (Netherlands)

    M. Zukowski (Marcin); S. Héman (Sándor); P.A. Boncz (Peter)

    2006-01-01

    textabstractHashing is one of the fundamental techniques used to implement query processing operators such as grouping, aggregation and join. This paper studies the interaction between modern computer architecture and hash-based query processing techniques. First, we focus on extracting maximum

  5. Efficient computation of hashes

    International Nuclear Information System (INIS)

    Lopes, Raul H C; Franqueira, Virginia N L; Hobson, Peter R

    2014-01-01

    The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel hash tree modes. The main contributions of this paper are, first, the identification of several efficiency and security challenges posed by the use of sequential hash computation based on the Merkle-Damgard engine. In addition, alternatives for the parallel computation of hash trees are discussed, and a prototype for a new parallel implementation of the Keccak function, the SHA-3 winner, is introduced.

  6. Structure Sensitive Hashing With Adaptive Product Quantization.

    Science.gov (United States)

    Liu, Xianglong; Du, Bowen; Deng, Cheng; Liu, Ming; Lang, Bo

    2016-10-01

    Hashing has been proved as an attractive solution to approximate nearest neighbor search, owing to its theoretical guarantee and computational efficiency. Though most of prior hashing algorithms can achieve low memory and computation consumption by pursuing compact hash codes, however, they are still far beyond the capability of learning discriminative hash functions from the data with complex inherent structure among them. To address this issue, in this paper, we propose a structure sensitive hashing based on cluster prototypes, which explicitly exploits both global and local structures. An alternating optimization algorithm, respectively, minimizing the quantization loss and spectral embedding loss, is presented to simultaneously discover the cluster prototypes for each hash function, and optimally assign unique binary codes to them satisfying the affinity alignment between them. For hash codes of a desired length, an adaptive bit assignment is further appended to the product quantization of the subspaces, approximating the Hamming distances and meanwhile balancing the variance among hash functions. Experimental results on four large-scale benchmarks CIFAR-10, NUS-WIDE, SIFT1M, and GIST1M demonstrate that our approach significantly outperforms state-of-the-art hashing methods in terms of semantic and metric neighbor search.

  7. Large-Scale Unsupervised Hashing with Shared Structure Learning.

    Science.gov (United States)

    Liu, Xianglong; Mu, Yadong; Zhang, Danchen; Lang, Bo; Li, Xuelong

    2015-09-01

    Hashing methods are effective in generating compact binary signatures for images and videos. This paper addresses an important open issue in the literature, i.e., how to learn compact hash codes by enhancing the complementarity among different hash functions. Most of prior studies solve this problem either by adopting time-consuming sequential learning algorithms or by generating the hash functions which are subject to some deliberately-designed constraints (e.g., enforcing hash functions orthogonal to one another). We analyze the drawbacks of past works and propose a new solution to this problem. Our idea is to decompose the feature space into a subspace shared by all hash functions and its complementary subspace. On one hand, the shared subspace, corresponding to the common structure across different hash functions, conveys most relevant information for the hashing task. Similar to data de-noising, irrelevant information is explicitly suppressed during hash function generation. On the other hand, in case that the complementary subspace also contains useful information for specific hash functions, the final form of our proposed hashing scheme is a compromise between these two kinds of subspaces. To make hash functions not only preserve the local neighborhood structure but also capture the global cluster distribution of the whole data, an objective function incorporating spectral embedding loss, binary quantization loss, and shared subspace contribution is introduced to guide the hash function learning. We propose an efficient alternating optimization method to simultaneously learn both the shared structure and the hash functions. Experimental results on three well-known benchmarks CIFAR-10, NUS-WIDE, and a-TRECVID demonstrate that our approach significantly outperforms state-of-the-art hashing methods.

  8. The hash function BLAKE

    CERN Document Server

    Aumasson, Jean-Philippe; Phan, Raphael; Henzen, Luca

    2014-01-01

    This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation.   In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security de

  9. Cryptanalysis on a parallel keyed hash function based on chaotic maps

    International Nuclear Information System (INIS)

    Guo Wei; Wang Xiaoming; He Dake; Cao Yang

    2009-01-01

    This Letter analyzes the security of a novel parallel keyed hash function based on chaotic maps, proposed by Xiao et al. to improve the efficiency in parallel computing environment. We show how to devise forgery attacks on Xiao's scheme with differential cryptanalysis and give the experiment results of two kinds of forgery attacks firstly. Furthermore, we discuss the problem of weak keys in the scheme and demonstrate how to utilize weak keys to construct collision.

  10. Fast and powerful hashing using tabulation

    DEFF Research Database (Denmark)

    Thorup, Mikkel

    2017-01-01

    Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yield the desired probabilistic guarantees are often too complicated to be practical. Here, we survey recent results on how simple hashing schemes based on tabulation provide unexpectedly strong......, linear probing and Cuckoo hashing. Next, we consider twisted tabulation where one input character is "twisted" in a simple way. The resulting hash function has powerful distributional properties: Chernoffstyle tail bounds and a very small bias for minwise hashing. This is also yields an extremely fast...... pseudorandom number generator that is provably good for many classic randomized algorithms and data-structures. Finally, we consider double tabulation where we compose two simple tabulation functions, applying one to the output of the other, and show that this yields very high independence in the classic...

  11. Deep Constrained Siamese Hash Coding Network and Load-Balanced Locality-Sensitive Hashing for Near Duplicate Image Detection.

    Science.gov (United States)

    Hu, Weiming; Fan, Yabo; Xing, Junliang; Sun, Liang; Cai, Zhaoquan; Maybank, Stephen

    2018-09-01

    We construct a new efficient near duplicate image detection method using a hierarchical hash code learning neural network and load-balanced locality-sensitive hashing (LSH) indexing. We propose a deep constrained siamese hash coding neural network combined with deep feature learning. Our neural network is able to extract effective features for near duplicate image detection. The extracted features are used to construct a LSH-based index. We propose a load-balanced LSH method to produce load-balanced buckets in the hashing process. The load-balanced LSH significantly reduces the query time. Based on the proposed load-balanced LSH, we design an effective and feasible algorithm for near duplicate image detection. Extensive experiments on three benchmark data sets demonstrate the effectiveness of our deep siamese hash encoding network and load-balanced LSH.

  12. Authenticated hash tables

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Papamanthou, Charalampos; Tamassia, Roberto

    2008-01-01

    Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating the hash table functionality, i.e., verifying...... to a scheme that achieves different trade-offs---namely, constant update time and O(nε/logκε n) query time for fixed ε > 0 and κ > 0. An experimental evaluation of our solution shows very good scalability....

  13. Neighborhood Discriminant Hashing for Large-Scale Image Retrieval.

    Science.gov (United States)

    Tang, Jinhui; Li, Zechao; Wang, Meng; Zhao, Ruizhen

    2015-09-01

    With the proliferation of large-scale community-contributed images, hashing-based approximate nearest neighbor search in huge databases has aroused considerable interest from the fields of computer vision and multimedia in recent years because of its computational and memory efficiency. In this paper, we propose a novel hashing method named neighborhood discriminant hashing (NDH) (for short) to implement approximate similarity search. Different from the previous work, we propose to learn a discriminant hashing function by exploiting local discriminative information, i.e., the labels of a sample can be inherited from the neighbor samples it selects. The hashing function is expected to be orthogonal to avoid redundancy in the learned hashing bits as much as possible, while an information theoretic regularization is jointly exploited using maximum entropy principle. As a consequence, the learned hashing function is compact and nonredundant among bits, while each bit is highly informative. Extensive experiments are carried out on four publicly available data sets and the comparison results demonstrate the outperforming performance of the proposed NDH method over state-of-the-art hashing techniques.

  14. Online Hashing for Scalable Remote Sensing Image Retrieval

    Directory of Open Access Journals (Sweden)

    Peng Li

    2018-05-01

    Full Text Available Recently, hashing-based large-scale remote sensing (RS image retrieval has attracted much attention. Many new hashing algorithms have been developed and successfully applied to fast RS image retrieval tasks. However, there exists an important problem rarely addressed in the research literature of RS image hashing. The RS images are practically produced in a streaming manner in many real-world applications, which means the data distribution keeps changing over time. Most existing RS image hashing methods are batch-based models whose hash functions are learned once for all and kept fixed all the time. Therefore, the pre-trained hash functions might not fit the ever-growing new RS images. Moreover, the batch-based models have to load all the training images into memory for model learning, which consumes many computing and memory resources. To address the above deficiencies, we propose a new online hashing method, which learns and adapts its hashing functions with respect to the newly incoming RS images in terms of a novel online partial random learning scheme. Our hash model is updated in a sequential mode such that the representative power of the learned binary codes for RS images are improved accordingly. Moreover, benefiting from the online learning strategy, our proposed hashing approach is quite suitable for scalable real-world remote sensing image retrieval. Extensive experiments on two large-scale RS image databases under online setting demonstrated the efficacy and effectiveness of the proposed method.

  15. Spongent: A lightweight hash function

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knežević, Miroslav; Leander, Gregor

    2011-01-01

    This paper proposes spongent - a family of lightweight hash functions with hash sizes of 88 (for preimage resistance only), 128, 160, 224, and 256 bits based on a sponge construction instantiated with a present-type permutation, following the hermetic sponge strategy. Its smallest implementations...

  16. Linear Subspace Ranking Hashing for Cross-Modal Retrieval.

    Science.gov (United States)

    Li, Kai; Qi, Guo-Jun; Ye, Jun; Hua, Kien A

    2017-09-01

    Hashing has attracted a great deal of research in recent years due to its effectiveness for the retrieval and indexing of large-scale high-dimensional multimedia data. In this paper, we propose a novel ranking-based hashing framework that maps data from different modalities into a common Hamming space where the cross-modal similarity can be measured using Hamming distance. Unlike existing cross-modal hashing algorithms where the learned hash functions are binary space partitioning functions, such as the sign and threshold function, the proposed hashing scheme takes advantage of a new class of hash functions closely related to rank correlation measures which are known to be scale-invariant, numerically stable, and highly nonlinear. Specifically, we jointly learn two groups of linear subspaces, one for each modality, so that features' ranking orders in different linear subspaces maximally preserve the cross-modal similarities. We show that the ranking-based hash function has a natural probabilistic approximation which transforms the original highly discontinuous optimization problem into one that can be efficiently solved using simple gradient descent algorithms. The proposed hashing framework is also flexible in the sense that the optimization procedures are not tied up to any specific form of loss function, which is typical for existing cross-modal hashing methods, but rather we can flexibly accommodate different loss functions with minimal changes to the learning steps. We demonstrate through extensive experiments on four widely-used real-world multimodal datasets that the proposed cross-modal hashing method can achieve competitive performance against several state-of-the-arts with only moderate training and testing time.

  17. Efficient tabling of structured data with enhanced hash-consing

    DEFF Research Database (Denmark)

    Zhou, Neng-Fa; Have, Christian Theil

    2012-01-01

    techniques, called input sharing and hash code memoization, for reducing the time complexity by avoiding computing hash codes for certain terms. The improved system is able to eliminate the extra linear factor in the old system for processing sequences, thus significantly enhancing the scalability...... uses hash tables, but also systems that use tries such as XSB and YAP. In this paper, we apply hash-consing to tabling structured data in B-Prolog. While hash-consing can reduce the space consumption when sharing is effective, it does not change the time complexity. We enhance hash-consing with two...

  18. On hash functions using checksums

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde

    2010-01-01

    We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimag...

  19. On hash functions using checksums

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde

    2008-01-01

    We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimag...

  20. Deep Hashing Based Fusing Index Method for Large-Scale Image Retrieval

    Directory of Open Access Journals (Sweden)

    Lijuan Duan

    2017-01-01

    Full Text Available Hashing has been widely deployed to perform the Approximate Nearest Neighbor (ANN search for the large-scale image retrieval to solve the problem of storage and retrieval efficiency. Recently, deep hashing methods have been proposed to perform the simultaneous feature learning and the hash code learning with deep neural networks. Even though deep hashing has shown the better performance than traditional hashing methods with handcrafted features, the learned compact hash code from one deep hashing network may not provide the full representation of an image. In this paper, we propose a novel hashing indexing method, called the Deep Hashing based Fusing Index (DHFI, to generate a more compact hash code which has stronger expression ability and distinction capability. In our method, we train two different architecture’s deep hashing subnetworks and fuse the hash codes generated by the two subnetworks together to unify images. Experiments on two real datasets show that our method can outperform state-of-the-art image retrieval applications.

  1. Multiview alignment hashing for efficient image search.

    Science.gov (United States)

    Liu, Li; Yu, Mengyang; Shao, Ling

    2015-03-01

    Hashing is a popular and efficient method for nearest neighbor search in large-scale data spaces by embedding high-dimensional feature descriptors into a similarity preserving Hamming space with a low dimension. For most hashing methods, the performance of retrieval heavily depends on the choice of the high-dimensional feature descriptor. Furthermore, a single type of feature cannot be descriptive enough for different images when it is used for hashing. Thus, how to combine multiple representations for learning effective hashing functions is an imminent task. In this paper, we present a novel unsupervised multiview alignment hashing approach based on regularized kernel nonnegative matrix factorization, which can find a compact representation uncovering the hidden semantics and simultaneously respecting the joint probability distribution of data. In particular, we aim to seek a matrix factorization to effectively fuse the multiple information sources meanwhile discarding the feature redundancy. Since the raised problem is regarded as nonconvex and discrete, our objective function is then optimized via an alternate way with relaxation and converges to a locally optimal solution. After finding the low-dimensional representation, the hashing functions are finally obtained through multivariable logistic regression. The proposed method is systematically evaluated on three data sets: 1) Caltech-256; 2) CIFAR-10; and 3) CIFAR-20, and the results show that our method significantly outperforms the state-of-the-art multiview hashing techniques.

  2. A model of quantum communication device for quantum hashing

    International Nuclear Information System (INIS)

    Vasiliev, A

    2016-01-01

    In this paper we consider a model of quantum communications between classical computers aided with quantum processors, connected by a classical and a quantum channel. This type of communications implying both classical and quantum messages with moderate use of quantum processing is implicitly used in many quantum protocols, such as quantum key distribution or quantum digital signature. We show that using the model of a quantum processor on multiatomic ensembles in the common QED cavity we can speed up quantum hashing, which can be the basis of quantum digital signature and other communication protocols. (paper)

  3. Security Analysis of Randomize-Hash-then-Sign Digital Signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2012-01-01

    At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar...... functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online...... 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash...

  4. A Novel Perceptual Hash Algorithm for Multispectral Image Authentication

    Directory of Open Access Journals (Sweden)

    Kaimeng Ding

    2018-01-01

    Full Text Available The perceptual hash algorithm is a technique to authenticate the integrity of images. While a few scholars have worked on mono-spectral image perceptual hashing, there is limited research on multispectral image perceptual hashing. In this paper, we propose a perceptual hash algorithm for the content authentication of a multispectral remote sensing image based on the synthetic characteristics of each band: firstly, the multispectral remote sensing image is preprocessed with band clustering and grid partition; secondly, the edge feature of the band subsets is extracted by band fusion-based edge feature extraction; thirdly, the perceptual feature of the same region of the band subsets is compressed and normalized to generate the perceptual hash value. The authentication procedure is achieved via the normalized Hamming distance between the perceptual hash value of the recomputed perceptual hash value and the original hash value. The experiments indicated that our proposed algorithm is robust compared to content-preserved operations and it efficiently authenticates the integrity of multispectral remote sensing images.

  5. Forensic hash for multimedia information

    Science.gov (United States)

    Lu, Wenjun; Varna, Avinash L.; Wu, Min

    2010-01-01

    Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social networking sites with user generated contents. Due to the ease of generating and modifying images and videos, it is critical to establish trustworthiness for online multimedia information. In this paper, we propose novel approaches to perform multimedia forensics using compact side information to reconstruct the processing history of a document. We refer to this as FASHION, standing for Forensic hASH for informatION assurance. Based on the Radon transform and scale space theory, the proposed forensic hash is compact and can effectively estimate the parameters of geometric transforms and detect local tampering that an image may have undergone. Forensic hash is designed to answer a broader range of questions regarding the processing history of multimedia data than the simple binary decision from traditional robust image hashing, and also offers more efficient and accurate forensic analysis than multimedia forensic techniques that do not use any side information.

  6. Compact binary hashing for music retrieval

    Science.gov (United States)

    Seo, Jin S.

    2014-03-01

    With the huge volume of music clips available for protection, browsing, and indexing, there is an increased attention to retrieve the information contents of the music archives. Music-similarity computation is an essential building block for browsing, retrieval, and indexing of digital music archives. In practice, as the number of songs available for searching and indexing is increased, so the storage cost in retrieval systems is becoming a serious problem. This paper deals with the storage problem by extending the supervector concept with the binary hashing. We utilize the similarity-preserving binary embedding in generating a hash code from the supervector of each music clip. Especially we compare the performance of the various binary hashing methods for music retrieval tasks on the widely-used genre dataset and the in-house singer dataset. Through the evaluation, we find an effective way of generating hash codes for music similarity estimation which improves the retrieval performance.

  7. Parallel keyed hash function construction based on chaotic maps

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Deng Shaojiang

    2008-01-01

    Recently, a variety of chaos-based hash functions have been proposed. Nevertheless, none of them works efficiently in parallel computing environment. In this Letter, an algorithm for parallel keyed hash function construction is proposed, whose structure can ensure the uniform sensitivity of hash value to the message. By means of the mechanism of both changeable-parameter and self-synchronization, the keystream establishes a close relation with the algorithm key, the content and the order of each message block. The entire message is modulated into the chaotic iteration orbit, and the coarse-graining trajectory is extracted as the hash value. Theoretical analysis and computer simulation indicate that the proposed algorithm can satisfy the performance requirements of hash function. It is simple, efficient, practicable, and reliable. These properties make it a good choice for hash on parallel computing platform

  8. Cryptanalysis of Tav-128 hash function

    DEFF Research Database (Denmark)

    Kumar, Ashish; Sanadhya, Somitra Kumar; Gauravaram, Praveen

    2010-01-01

    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentic...

  9. Hash3: Proofs, Analysis and Implementation

    DEFF Research Database (Denmark)

    Gauravaram, Praveen

    2009-01-01

    This report outlines the talks presented at the winter school on Hash3: Proofs, Analysis, and Implementation, ECRYPT II Event on Hash Functions. In general, speakers may not write everything what they talk on the slides. So, this report also outlines such findings following the understanding of t...

  10. FBC: a flat binary code scheme for fast Manhattan hash retrieval

    Science.gov (United States)

    Kong, Yan; Wu, Fuzhang; Gao, Lifa; Wu, Yanjun

    2018-04-01

    Hash coding is a widely used technique in approximate nearest neighbor (ANN) search, especially in document search and multimedia (such as image and video) retrieval. Based on the difference of distance measurement, hash methods are generally classified into two categories: Hamming hashing and Manhattan hashing. Benefitting from better neighborhood structure preservation, Manhattan hashing methods outperform earlier methods in search effectiveness. However, due to using decimal arithmetic operations instead of bit operations, Manhattan hashing becomes a more time-consuming process, which significantly decreases the whole search efficiency. To solve this problem, we present an intuitive hash scheme which uses Flat Binary Code (FBC) to encode the data points. As a result, the decimal arithmetic used in previous Manhattan hashing can be replaced by more efficient XOR operator. The final experiments show that with a reasonable memory space growth, our FBC speeds up more than 80% averagely without any search accuracy loss when comparing to the state-of-art Manhattan hashing methods.

  11. Chaos-based hash function (CBHF) for cryptographic applications

    International Nuclear Information System (INIS)

    Amin, Mohamed; Faragallah, Osama S.; Abd El-Latif, Ahmed A.

    2009-01-01

    As the core of cryptography, hash is the basic technique for information security. Many of the hash functions generate the message digest through a randomizing process of the original message. Subsequently, a chaos system also generates a random behavior, but at the same time a chaos system is completely deterministic. In this paper, an algorithm for one-way hash function construction based on chaos theory is introduced. Theoretical analysis and computer simulation indicate that the algorithm can satisfy all performance requirements of hash function in an efficient and flexible manner and secure against birthday attacks or meet-in-the-middle attacks, which is good choice for data integrity or authentication.

  12. Chaos-based hash function (CBHF) for cryptographic applications

    Energy Technology Data Exchange (ETDEWEB)

    Amin, Mohamed [Dept. of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511 (Egypt)], E-mail: mamin04@yahoo.com; Faragallah, Osama S. [Dept. of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952 (Egypt)], E-mail: osam_sal@yahoo.com; Abd El-Latif, Ahmed A. [Dept. of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511 (Egypt)], E-mail: ahmed_rahiem@yahoo.com

    2009-10-30

    As the core of cryptography, hash is the basic technique for information security. Many of the hash functions generate the message digest through a randomizing process of the original message. Subsequently, a chaos system also generates a random behavior, but at the same time a chaos system is completely deterministic. In this paper, an algorithm for one-way hash function construction based on chaos theory is introduced. Theoretical analysis and computer simulation indicate that the algorithm can satisfy all performance requirements of hash function in an efficient and flexible manner and secure against birthday attacks or meet-in-the-middle attacks, which is good choice for data integrity or authentication.

  13. Mean free paths for high energy hadron collisions in nuclear matter

    International Nuclear Information System (INIS)

    Strugalski, Z.

    1983-01-01

    The mean free paths for various collisions of high energy pion in nuclear matter are determined experimentally using pion-xenon nucleus collision events at 3.5 GeV/c momentum. The relation between the mean free path lambdasub(i) for hadron-nucleon particle producing collisions in nuclear matter and corresponding cross section σsub(i) for particle producing collisions of this hadron with free nucleon is derived and discussed. This relation is lambdasub(i)=k/σsub(i), where lambdasub(i) is in nucleons per fm 2 and σ sub(i) - in fm 2 per nucleon, correspondingly, k=3.00+-0.26 is a coefficient accounting for the display of the nucleon inner structure in hadron-nucleus collisions

  14. Hierarchical Recurrent Neural Hashing for Image Retrieval With Hierarchical Convolutional Features.

    Science.gov (United States)

    Lu, Xiaoqiang; Chen, Yaxiong; Li, Xuelong

    Hashing has been an important and effective technology in image retrieval due to its computational efficiency and fast search speed. The traditional hashing methods usually learn hash functions to obtain binary codes by exploiting hand-crafted features, which cannot optimally represent the information of the sample. Recently, deep learning methods can achieve better performance, since deep learning architectures can learn more effective image representation features. However, these methods only use semantic features to generate hash codes by shallow projection but ignore texture details. In this paper, we proposed a novel hashing method, namely hierarchical recurrent neural hashing (HRNH), to exploit hierarchical recurrent neural network to generate effective hash codes. There are three contributions of this paper. First, a deep hashing method is proposed to extensively exploit both spatial details and semantic information, in which, we leverage hierarchical convolutional features to construct image pyramid representation. Second, our proposed deep network can exploit directly convolutional feature maps as input to preserve the spatial structure of convolutional feature maps. Finally, we propose a new loss function that considers the quantization error of binarizing the continuous embeddings into the discrete binary codes, and simultaneously maintains the semantic similarity and balanceable property of hash codes. Experimental results on four widely used data sets demonstrate that the proposed HRNH can achieve superior performance over other state-of-the-art hashing methods.Hashing has been an important and effective technology in image retrieval due to its computational efficiency and fast search speed. The traditional hashing methods usually learn hash functions to obtain binary codes by exploiting hand-crafted features, which cannot optimally represent the information of the sample. Recently, deep learning methods can achieve better performance, since deep

  15. 76 FR 11433 - Federal Transition To Secure Hash Algorithm (SHA)-256

    Science.gov (United States)

    2011-03-02

    ... ADMINISTRATION [FAR-N-2011-01; Docket No. 2011-0083; Sequence 1] Federal Transition To Secure Hash Algorithm (SHA... acquisition community to transition to Secure Hash Algorithm SHA-256. SHA-256 is a cryptographic hash function... persons attending. Please cite ``Federal Transition to Secure Hash Algorithm SHA-256'' in all...

  16. An Hilbert space approach for a class of arbitrage free implied volatilities models

    OpenAIRE

    Brace, A.; Fabbri, G.; Goldys, B.

    2007-01-01

    We present an Hilbert space formulation for a set of implied volatility models introduced in \\cite{BraceGoldys01} in which the authors studied conditions for a family of European call options, varying the maturing time and the strike price $T$ an $K$, to be arbitrage free. The arbitrage free conditions give a system of stochastic PDEs for the evolution of the implied volatility surface ${\\hat\\sigma}_t(T,K)$. We will focus on the family obtained fixing a strike $K$ and varying $T$. In order to...

  17. A Collision-Free G2 Continuous Path-Smoothing Algorithm Using Quadratic Polynomial Interpolation

    Directory of Open Access Journals (Sweden)

    Seong-Ryong Chang

    2014-12-01

    Full Text Available Most path-planning algorithms are used to obtain a collision-free path without considering continuity. On the other hand, a continuous path is needed for stable movement. In this paper, the searched path was converted into a G2 continuous path using the modified quadratic polynomial and membership function interpolation algorithm. It is simple, unique and provides a good geometric interpretation. In addition, a collision-checking and improvement algorithm is proposed. The collision-checking algorithm can check the collisions of a smoothed path. If collisions are detected, the collision improvement algorithm modifies the collision path to a collision-free path. The collision improvement algorithm uses a geometric method. This method uses the perpendicular line between a collision position and the collision piecewise linear path. The sub-waypoint is added, and the QPMI algorithm is applied again. As a result, the collision-smoothed path is converted into a collision-free smooth path without changing the continuity.

  18. Scalable Packet Classification with Hash Tables

    Science.gov (United States)

    Wang, Pi-Chung

    In the last decade, the technique of packet classification has been widely deployed in various network devices, including routers, firewalls and network intrusion detection systems. In this work, we improve the performance of packet classification by using multiple hash tables. The existing hash-based algorithms have superior scalability with respect to the required space; however, their search performance may not be comparable to other algorithms. To improve the search performance, we propose a tuple reordering algorithm to minimize the number of accessed hash tables with the aid of bitmaps. We also use pre-computation to ensure the accuracy of our search procedure. Performance evaluation based on both real and synthetic filter databases shows that our scheme is effective and scalable and the pre-computation cost is moderate.

  19. Welding Robot Collision-Free Path Optimization

    Directory of Open Access Journals (Sweden)

    Xuewu Wang

    2017-02-01

    Full Text Available Reasonable welding path has a significant impact on welding efficiency, and a collision-free path should be considered first in the process of welding robot path planning. The shortest path length is considered as an optimization objective, and obstacle avoidance is considered as the constraint condition in this paper. First, a grid method is used as a modeling method after the optimization objective is analyzed. For local collision-free path planning, an ant colony algorithm is selected as the search strategy. Then, to overcome the shortcomings of the ant colony algorithm, a secondary optimization is presented to improve the optimization performance. Finally, the particle swarm optimization algorithm is used to realize global path planning. Simulation results show that the desired welding path can be obtained based on the optimization strategy.

  20. The LabelHash algorithm for substructure matching

    Directory of Open Access Journals (Sweden)

    Bryant Drew H

    2010-11-01

    Full Text Available Abstract Background There is an increasing number of proteins with known structure but unknown function. Determining their function would have a significant impact on understanding diseases and designing new therapeutics. However, experimental protein function determination is expensive and very time-consuming. Computational methods can facilitate function determination by identifying proteins that have high structural and chemical similarity. Results We present LabelHash, a novel algorithm for matching substructural motifs to large collections of protein structures. The algorithm consists of two phases. In the first phase the proteins are preprocessed in a fashion that allows for instant lookup of partial matches to any motif. In the second phase, partial matches for a given motif are expanded to complete matches. The general applicability of the algorithm is demonstrated with three different case studies. First, we show that we can accurately identify members of the enolase superfamily with a single motif. Next, we demonstrate how LabelHash can complement SOIPPA, an algorithm for motif identification and pairwise substructure alignment. Finally, a large collection of Catalytic Site Atlas motifs is used to benchmark the performance of the algorithm. LabelHash runs very efficiently in parallel; matching a motif against all proteins in the 95% sequence identity filtered non-redundant Protein Data Bank typically takes no more than a few minutes. The LabelHash algorithm is available through a web server and as a suite of standalone programs at http://labelhash.kavrakilab.org. The output of the LabelHash algorithm can be further analyzed with Chimera through a plugin that we developed for this purpose. Conclusions LabelHash is an efficient, versatile algorithm for large-scale substructure matching. When LabelHash is running in parallel, motifs can typically be matched against the entire PDB on the order of minutes. The algorithm is able to identify

  1. Quantum hashing is maximally secure against classical leakage

    OpenAIRE

    Huang, Cupjin; Shi, Yaoyun

    2017-01-01

    Cryptographic hash functions are fundamental primitives widely used in practice. For such a function $f:\\{0, 1\\}^n\\to\\{0, 1\\}^m$, it is nearly impossible for an adversary to produce the hash $f(x)$ without knowing the secret message $x\\in\\{0, 1\\}^n$. Unfortunately, all hash functions are vulnerable under the side-channel attack, which is a grave concern for information security in practice. This is because typically $m\\ll n$ and an adversary needs only $m$ bits of information to pass the veri...

  2. Hashing in computer science fifty years of slicing and dicing

    CERN Document Server

    Konheim, Alan G

    2009-01-01

    Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructor s manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires

  3. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2010-01-01

    functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle...

  4. Implementation of 4-way Superscalar Hash MIPS Processor Using FPGA

    Science.gov (United States)

    Sahib Omran, Safaa; Fouad Jumma, Laith

    2018-05-01

    Due to the quick advancements in the personal communications systems and wireless communications, giving data security has turned into a more essential subject. This security idea turns into a more confounded subject when next-generation system requirements and constant calculation speed are considered in real-time. Hash functions are among the most essential cryptographic primitives and utilized as a part of the many fields of signature authentication and communication integrity. These functions are utilized to acquire a settled size unique fingerprint or hash value of an arbitrary length of message. In this paper, Secure Hash Algorithms (SHA) of types SHA-1, SHA-2 (SHA-224, SHA-256) and SHA-3 (BLAKE) are implemented on Field-Programmable Gate Array (FPGA) in a processor structure. The design is described and implemented using a hardware description language, namely VHSIC “Very High Speed Integrated Circuit” Hardware Description Language (VHDL). Since the logical operation of the hash types of (SHA-1, SHA-224, SHA-256 and SHA-3) are 32-bits, so a Superscalar Hash Microprocessor without Interlocked Pipelines (MIPS) processor are designed with only few instructions that were required in invoking the desired Hash algorithms, when the four types of hash algorithms executed sequentially using the designed processor, the total time required equal to approximately 342 us, with a throughput of 4.8 Mbps while the required to execute the same four hash algorithms using the designed four-way superscalar is reduced to 237 us with improved the throughput to 5.1 Mbps.

  5. Probabilistic hypergraph based hash codes for social image search

    Institute of Scientific and Technical Information of China (English)

    Yi XIE; Hui-min YU; Roland HU

    2014-01-01

    With the rapid development of the Internet, recent years have seen the explosive growth of social media. This brings great challenges in performing efficient and accurate image retrieval on a large scale. Recent work shows that using hashing methods to embed high-dimensional image features and tag information into Hamming space provides a powerful way to index large collections of social images. By learning hash codes through a spectral graph partitioning algorithm, spectral hashing (SH) has shown promising performance among various hashing approaches. However, it is incomplete to model the relations among images only by pairwise simple graphs which ignore the relationship in a higher order. In this paper, we utilize a probabilistic hypergraph model to learn hash codes for social image retrieval. A probabilistic hypergraph model offers a higher order repre-sentation among social images by connecting more than two images in one hyperedge. Unlike a normal hypergraph model, a probabilistic hypergraph model considers not only the grouping information, but also the similarities between vertices in hy-peredges. Experiments on Flickr image datasets verify the performance of our proposed approach.

  6. Hadron-nucleon inelastic collision mean free path in nuclear matter

    International Nuclear Information System (INIS)

    Strugalski, Z.

    1980-01-01

    Characteristics of atomic nuclei, used as targets in high energy hadron-nucleus collision experiments, are defined on the basis of the data on the nuclei sizes and radial nucleon density distributions in nuclei. Average mean free path for inelastic hadron-nucleon collisions in nuclei is estimated using existing experimental data on the pion-xenon nucleus collisions and the connection of it with the cross-section for hadron-nucleon elementary inelastic collisions is discussed

  7. Feature hashing for fast image retrieval

    Science.gov (United States)

    Yan, Lingyu; Fu, Jiarun; Zhang, Hongxin; Yuan, Lu; Xu, Hui

    2018-03-01

    Currently, researches on content based image retrieval mainly focus on robust feature extraction. However, due to the exponential growth of online images, it is necessary to consider searching among large scale images, which is very timeconsuming and unscalable. Hence, we need to pay much attention to the efficiency of image retrieval. In this paper, we propose a feature hashing method for image retrieval which not only generates compact fingerprint for image representation, but also prevents huge semantic loss during the process of hashing. To generate the fingerprint, an objective function of semantic loss is constructed and minimized, which combine the influence of both the neighborhood structure of feature data and mapping error. Since the machine learning based hashing effectively preserves neighborhood structure of data, it yields visual words with strong discriminability. Furthermore, the generated binary codes leads image representation building to be of low-complexity, making it efficient and scalable to large scale databases. Experimental results show good performance of our approach.

  8. Towards a Collision-Free WLAN: Dynamic Parameter Adjustment in CSMA/E2CA

    Directory of Open Access Journals (Sweden)

    Bellalta Boris

    2011-01-01

    Full Text Available Carrier sense multiple access with enhanced collision avoidance (CSMA/ECA is a distributed MAC protocol that allows collision-free access to the medium in WLANs. The only difference between CSMA/ECA and the well-known CSMA/CA is that the former uses a deterministic backoff after successful transmissions. Collision-free operation is reached after a transient state during which some collisions may occur. This paper shows that the duration of the transient state can be shortened by appropriately setting the contention parameters. Standard absorbing Markov chain theory is used to describe the behaviour of the system in the transient state and to predict the expected number of slots to reach the collision-free operation. The paper also introduces CSMA/E2CA, in which a deterministic backoff is used two consecutive times after a successful transmission. CSMA/E2CA converges quicker to collision-free operation and delivers higher performance than CSMA/ECA, specially in harsh wireless scenarios with high frame-error rates. The last part of the paper addresses scenarios with a large number of contenders. We suggest dynamic parameter adjustment techniques to accommodate a varying (and potentially high number of contenders. The effectiveness of these adjustments in preventing collisions is validated by means of simulation.

  9. Side channel analysis of some hash based MACs: A response to SHA-3 requirements

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Okeya, Katsuyuki

    2008-01-01

    The forthcoming NIST's Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash...

  10. One-way hash function based on hyper-chaotic cellular neural network

    International Nuclear Information System (INIS)

    Yang Qunting; Gao Tiegang

    2008-01-01

    The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge–Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corresponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability. (general)

  11. Cryptanalysis of an Iterated Halving-based hash function: CRUSH

    DEFF Research Database (Denmark)

    Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde

    2009-01-01

    Iterated Halving has been suggested as a replacement to the Merkle–Damgård (MD) construction in 2004 anticipating the attacks on the MDx family of hash functions. The CRUSH hash function provides a specific instantiation of the block cipher for Iterated Halving. The authors identify structural pr...

  12. Final report for LDRD Project 93633 : new hash function for data protection.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Dautenhahn, Nathan; Schroeppel, Richard Crabtree; Tolk, Keith Michael; Orman, Hilarie (PurpleStreak, Inc.); Walker, Andrea Mae; Malone, Sean; Lee, Eric; Neumann, William Douglas; Cordwell, William R.; Torgerson, Mark Dolan; Anderson, Eric; Lanzone, Andrew J.; Collins, Michael Joseph; McDonald, Timothy Scott; Caskey, Susan Adele

    2009-03-01

    The security of the widely-used cryptographic hash function SHA1 has been impugned. We have developed two replacement hash functions. The first, SHA1X, is a drop-in replacement for SHA1. The second, SANDstorm, has been submitted as a candidate to the NIST-sponsored SHA3 Hash Function competition.

  13. HashDist: Reproducible, Relocatable, Customizable, Cross-Platform Software Stacks for Open Hydrological Science

    Science.gov (United States)

    Ahmadia, A. J.; Kees, C. E.

    2014-12-01

    Developing scientific software is a continuous balance between not reinventing the wheel and getting fragile codes to interoperate with one another. Binary software distributions such as Anaconda provide a robust starting point for many scientific software packages, but this solution alone is insufficient for many scientific software developers. HashDist provides a critical component of the development workflow, enabling highly customizable, source-driven, and reproducible builds for scientific software stacks, available from both the IPython Notebook and the command line. To address these issues, the Coastal and Hydraulics Laboratory at the US Army Engineer Research and Development Center has funded the development of HashDist in collaboration with Simula Research Laboratories and the University of Texas at Austin. HashDist is motivated by a functional approach to package build management, and features intelligent caching of sources and builds, parametrized build specifications, and the ability to interoperate with system compilers and packages. HashDist enables the easy specification of "software stacks", which allow both the novice user to install a default environment and the advanced user to configure every aspect of their build in a modular fashion. As an advanced feature, HashDist builds can be made relocatable, allowing the easy redistribution of binaries on all three major operating systems as well as cloud, and supercomputing platforms. As a final benefit, all HashDist builds are reproducible, with a build hash specifying exactly how each component of the software stack was installed. This talk discusses the role of HashDist in the hydrological sciences, including its use by the Coastal and Hydraulics Laboratory in the development and deployment of the Proteus Toolkit as well as the Rapid Operational Access and Maneuver Support project. We demonstrate HashDist in action, and show how it can effectively support development, deployment, teaching, and

  14. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  15. Hash function based on piecewise nonlinear chaotic map

    International Nuclear Information System (INIS)

    Akhavan, A.; Samsudin, A.; Akhshani, A.

    2009-01-01

    Chaos-based cryptography appeared recently in the early 1990s as an original application of nonlinear dynamics in the chaotic regime. In this paper, an algorithm for one-way hash function construction based on piecewise nonlinear chaotic map with a variant probability parameter is proposed. Also the proposed algorithm is an attempt to present a new chaotic hash function based on multithreaded programming. In this chaotic scheme, the message is connected to the chaotic map using probability parameter and other parameters of chaotic map such as control parameter and initial condition, so that the generated hash value is highly sensitive to the message. Simulation results indicate that the proposed algorithm presented several interesting features, such as high flexibility, good statistical properties, high key sensitivity and message sensitivity. These properties make the scheme a suitable choice for practical applications.

  16. Discriminative Projection Selection Based Face Image Hashing

    Science.gov (United States)

    Karabat, Cagatay; Erdogan, Hakan

    Face image hashing is an emerging method used in biometric verification systems. In this paper, we propose a novel face image hashing method based on a new technique called discriminative projection selection. We apply the Fisher criterion for selecting the rows of a random projection matrix in a user-dependent fashion. Moreover, another contribution of this paper is to employ a bimodal Gaussian mixture model at the quantization step. Our simulation results on three different databases demonstrate that the proposed method has superior performance in comparison to previously proposed random projection based methods.

  17. An Ad Hoc Adaptive Hashing Technique forNon-Uniformly Distributed IP Address Lookup in Computer Networks

    Directory of Open Access Journals (Sweden)

    Christopher Martinez

    2007-02-01

    Full Text Available Hashing algorithms long have been widely adopted to design a fast address look-up process which involves a search through a large database to find a record associated with a given key. Hashing algorithms involve transforming a key inside each target data to a hash value hoping that the hashing would render the database a uniform distribution with respect to this new hash value. The close the final distribution is to uniform, the less search time would be required when a query is made. When the database is already key-wise uniformly distributed, any regular hashing algorithm, such as bit-extraction, bit-group XOR, etc., would easily lead to a statistically perfect uniform distribution after the hashing. On the other hand, if records in the database are instead not uniformly distributed as in almost all known practical applications, then even different regular hash functions would lead to very different performance. When the target database has a key with a highly skewed distributed value, performance delivered by regular hashing algorithms usually becomes far from desirable. This paper aims at designing a hashing algorithm to achieve the highest probability in leading to a uniformly distributed hash result from a non-uniformly distributed database. An analytical pre-process on the original database is first performed to extract critical information that would significantly benefit the design of a better hashing algorithm. This process includes sorting on the bits of the key to prioritize the use of them in the XOR hashing sequence, or in simple bit extraction, or even a combination of both. Such an ad hoc hash design is critical to adapting to all real-time situations when there exists a changing (and/or expanding database with an irregular non-uniform distribution. Significant improvement from simulation results is obtained in randomly generated data as well as real data.

  18. Practical Pseudo-collisions for Hash Functions ARIRANG-224/384

    DEFF Research Database (Denmark)

    Guo, Jian; Matusiewicz, Krystian; Knudsen, Lars Ramkilde

    2009-01-01

    In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing high-probability differential characteristics in the function. We use this approach to find near-collisions with Hamming weigh...

  19. Practical security and privacy attacks against biometric hashing using sparse recovery

    Science.gov (United States)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  20. Toward Optimal Manifold Hashing via Discrete Locally Linear Embedding.

    Science.gov (United States)

    Rongrong Ji; Hong Liu; Liujuan Cao; Di Liu; Yongjian Wu; Feiyue Huang

    2017-11-01

    Binary code learning, also known as hashing, has received increasing attention in large-scale visual search. By transforming high-dimensional features to binary codes, the original Euclidean distance is approximated via Hamming distance. More recently, it is advocated that it is the manifold distance, rather than the Euclidean distance, that should be preserved in the Hamming space. However, it retains as an open problem to directly preserve the manifold structure by hashing. In particular, it first needs to build the local linear embedding in the original feature space, and then quantize such embedding to binary codes. Such a two-step coding is problematic and less optimized. Besides, the off-line learning is extremely time and memory consuming, which needs to calculate the similarity matrix of the original data. In this paper, we propose a novel hashing algorithm, termed discrete locality linear embedding hashing (DLLH), which well addresses the above challenges. The DLLH directly reconstructs the manifold structure in the Hamming space, which learns optimal hash codes to maintain the local linear relationship of data points. To learn discrete locally linear embeddingcodes, we further propose a discrete optimization algorithm with an iterative parameters updating scheme. Moreover, an anchor-based acceleration scheme, termed Anchor-DLLH, is further introduced, which approximates the large similarity matrix by the product of two low-rank matrices. Experimental results on three widely used benchmark data sets, i.e., CIFAR10, NUS-WIDE, and YouTube Face, have shown superior performance of the proposed DLLH over the state-of-the-art approaches.

  1. Object-Location-Aware Hashing for Multi-Label Image Retrieval via Automatic Mask Learning.

    Science.gov (United States)

    Huang, Chang-Qin; Yang, Shang-Ming; Pan, Yan; Lai, Han-Jiang

    2018-09-01

    Learning-based hashing is a leading approach of approximate nearest neighbor search for large-scale image retrieval. In this paper, we develop a deep supervised hashing method for multi-label image retrieval, in which we propose to learn a binary "mask" map that can identify the approximate locations of objects in an image, so that we use this binary "mask" map to obtain length-limited hash codes which mainly focus on an image's objects but ignore the background. The proposed deep architecture consists of four parts: 1) a convolutional sub-network to generate effective image features; 2) a binary "mask" sub-network to identify image objects' approximate locations; 3) a weighted average pooling operation based on the binary "mask" to obtain feature representations and hash codes that pay most attention to foreground objects but ignore the background; and 4) the combination of a triplet ranking loss designed to preserve relative similarities among images and a cross entropy loss defined on image labels. We conduct comprehensive evaluations on four multi-label image data sets. The results indicate that the proposed hashing method achieves superior performance gains over the state-of-the-art supervised or unsupervised hashing baselines.

  2. NHash: Randomized N-Gram Hashing for Distributed Generation of Validatable Unique Study Identifiers in Multicenter Research.

    Science.gov (United States)

    Zhang, Guo-Qiang; Tao, Shiqiang; Xing, Guangming; Mozes, Jeno; Zonjy, Bilal; Lhatoo, Samden D; Cui, Licong

    2015-11-10

    A unique study identifier serves as a key for linking research data about a study subject without revealing protected health information in the identifier. While sufficient for single-site and limited-scale studies, the use of common unique study identifiers has several drawbacks for large multicenter studies, where thousands of research participants may be recruited from multiple sites. An important property of study identifiers is error tolerance (or validatable), in that inadvertent editing mistakes during their transmission and use will most likely result in invalid study identifiers. This paper introduces a novel method called "Randomized N-gram Hashing (NHash)," for generating unique study identifiers in a distributed and validatable fashion, in multicenter research. NHash has a unique set of properties: (1) it is a pseudonym serving the purpose of linking research data about a study participant for research purposes; (2) it can be generated automatically in a completely distributed fashion with virtually no risk for identifier collision; (3) it incorporates a set of cryptographic hash functions based on N-grams, with a combination of additional encryption techniques such as a shift cipher; (d) it is validatable (error tolerant) in the sense that inadvertent edit errors will mostly result in invalid identifiers. NHash consists of 2 phases. First, an intermediate string using randomized N-gram hashing is generated. This string consists of a collection of N-gram hashes f1, f2, ..., fk. The input for each function fi has 3 components: a random number r, an integer n, and input data m. The result, fi(r, n, m), is an n-gram of m with a starting position s, which is computed as (r mod |m|), where |m| represents the length of m. The output for Step 1 is the concatenation of the sequence f1(r1, n1, m1), f2(r2, n2, m2), ..., fk(rk, nk, mk). In the second phase, the intermediate string generated in Phase 1 is encrypted using techniques such as shift cipher. The result

  3. Improving the security of a parallel keyed hash function based on chaotic maps

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di, E-mail: xiaodi_cqu@hotmail.co [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China); Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China); Wang Yong [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)] [College of Economy and Management, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China)

    2009-11-23

    In this Letter, we analyze the cause of vulnerability of the original parallel keyed hash function based on chaotic maps in detail, and then propose the corresponding enhancement measures. Theoretical analysis and computer simulation indicate that the modified hash function is more secure than the original one. At the same time, it can keep the parallel merit and satisfy the other performance requirements of hash function.

  4. Improving the security of a parallel keyed hash function based on chaotic maps

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Wang Yong

    2009-01-01

    In this Letter, we analyze the cause of vulnerability of the original parallel keyed hash function based on chaotic maps in detail, and then propose the corresponding enhancement measures. Theoretical analysis and computer simulation indicate that the modified hash function is more secure than the original one. At the same time, it can keep the parallel merit and satisfy the other performance requirements of hash function.

  5. The FPGA realization of the general cellular automata based cryptographic hash functions: Performance and effectiveness

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2014-01-01

    Full Text Available In the paper the author considers hardware implementation of the GRACE-H family general cellular automata based cryptographic hash functions. VHDL is used as a language and Altera FPGA as a platform for hardware implementation. Performance and effectiveness of the FPGA implementations of GRACE-H hash functions were compared with Keccak (SHA-3, SHA-256, BLAKE, Groestl, JH, Skein hash functions. According to the performed tests, performance of the hardware implementation of GRACE-H family hash functions significantly (up to 12 times exceeded performance of the hardware implementation of previously known hash functions, and effectiveness of that hardware implementation was also better (up to 4 times.

  6. Robust visual hashing via ICA

    International Nuclear Information System (INIS)

    Fournel, Thierry; Coltuc, Daniela

    2010-01-01

    Designed to maximize information transmission in the presence of noise, independent component analysis (ICA) could appear in certain circumstances as a statistics-based tool for robust visual hashing. Several ICA-based scenarios can attempt to reach this goal. A first one is here considered.

  7. Authentication codes from ε-ASU hash functions with partially secret keys

    NARCIS (Netherlands)

    Liu, S.L.; Tilborg, van H.C.A.; Weng, J.; Chen, Kefei

    2014-01-01

    An authentication code can be constructed with a family of e-Almost strong universal (e-ASU) hash functions, with the index of hash functions as the authentication key. This paper considers the performance of authentication codes from e-ASU, when the authentication key is only partially secret. We

  8. Linear-XOR and Additive Checksums Don't Protect Damgard-Merkle Hashes

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Kelsey, John

    2008-01-01

    We consider the security of Damg\\aa{}rd-Merkle variants which compute linear-XOR or additive checksums over message blocks, intermediate hash values, or both, and process these checksums in computing the final hash value. We show that these Damg\\aa{}rd-Merkle variants gain almost no security...

  9. Gene function prediction based on Gene Ontology Hierarchy Preserving Hashing.

    Science.gov (United States)

    Zhao, Yingwen; Fu, Guangyuan; Wang, Jun; Guo, Maozu; Yu, Guoxian

    2018-02-23

    Gene Ontology (GO) uses structured vocabularies (or terms) to describe the molecular functions, biological roles, and cellular locations of gene products in a hierarchical ontology. GO annotations associate genes with GO terms and indicate the given gene products carrying out the biological functions described by the relevant terms. However, predicting correct GO annotations for genes from a massive set of GO terms as defined by GO is a difficult challenge. To combat with this challenge, we introduce a Gene Ontology Hierarchy Preserving Hashing (HPHash) based semantic method for gene function prediction. HPHash firstly measures the taxonomic similarity between GO terms. It then uses a hierarchy preserving hashing technique to keep the hierarchical order between GO terms, and to optimize a series of hashing functions to encode massive GO terms via compact binary codes. After that, HPHash utilizes these hashing functions to project the gene-term association matrix into a low-dimensional one and performs semantic similarity based gene function prediction in the low-dimensional space. Experimental results on three model species (Homo sapiens, Mus musculus and Rattus norvegicus) for interspecies gene function prediction show that HPHash performs better than other related approaches and it is robust to the number of hash functions. In addition, we also take HPHash as a plugin for BLAST based gene function prediction. From the experimental results, HPHash again significantly improves the prediction performance. The codes of HPHash are available at: http://mlda.swu.edu.cn/codes.php?name=HPHash. Copyright © 2018 Elsevier Inc. All rights reserved.

  10. Normalization for Implied Volatility

    OpenAIRE

    Fukasawa, Masaaki

    2010-01-01

    We study specific nonlinear transformations of the Black-Scholes implied volatility to show remarkable properties of the volatility surface. Model-free bounds on the implied volatility skew are given. Pricing formulas for the European options which are written in terms of the implied volatility are given. In particular, we prove elegant formulas for the fair strikes of the variance swap and the gamma swap.

  11. Side channel analysis of some hash based MACs:A response to SHA-3 requirements

    DEFF Research Database (Denmark)

    The forthcoming NIST's Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash...... function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card...... implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC...

  12. Five Performance Enhancements for Hybrid Hash Join

    National Research Council Canada - National Science Library

    Graefe, Goetz

    1992-01-01

    .... We discuss five performance enhancements for hybrid hash join algorithms, namely data compression, large cluster sizes and multi-level recursion, role reversal of build and probe inputs, histogram...

  13. System using data compression and hashing adapted for use for multimedia encryption

    Science.gov (United States)

    Coffland, Douglas R [Livermore, CA

    2011-07-12

    A system and method is disclosed for multimedia encryption. Within the system of the present invention, a data compression module receives and compresses a media signal into a compressed data stream. A data acquisition module receives and selects a set of data from the compressed data stream. And, a hashing module receives and hashes the set of data into a keyword. The method of the present invention includes the steps of compressing a media signal into a compressed data stream; selecting a set of data from the compressed data stream; and hashing the set of data into a keyword.

  14. Quicksort, largest bucket, and min-wise hashing with limited independence

    DEFF Research Database (Denmark)

    Knudsen, Mathias Bæk Tejs; Stöckel, Morten

    2015-01-01

    Randomized algorithms and data structures are often analyzed under the assumption of access to a perfect source of randomness. The most fundamental metric used to measure how “random” a hash function or a random number generator is, is its independence: a sequence of random variables is said...... to be k-independent if every variable is uniform and every size k subset is independent. In this paper we consider three classic algorithms under limited independence. Besides the theoretical interest in removing the unrealistic assumption of full independence, the work is motivated by lower independence...... being more practical. We provide new bounds for randomized quicksort, min-wise hashing and largest bucket size under limited independence. Our results can be summarized as follows. Randomized Quicksort. When pivot elements are computed using a 5-independent hash function, Karloff and Raghavan, J.ACM’93...

  15. Simultenious binary hash and features learning for image retrieval

    Science.gov (United States)

    Frantc, V. A.; Makov, S. V.; Voronin, V. V.; Marchuk, V. I.; Semenishchev, E. A.; Egiazarian, K. O.; Agaian, S.

    2016-05-01

    Content-based image retrieval systems have plenty of applications in modern world. The most important one is the image search by query image or by semantic description. Approaches to this problem are employed in personal photo-collection management systems, web-scale image search engines, medical systems, etc. Automatic analysis of large unlabeled image datasets is virtually impossible without satisfactory image-retrieval technique. It's the main reason why this kind of automatic image processing has attracted so much attention during recent years. Despite rather huge progress in the field, semantically meaningful image retrieval still remains a challenging task. The main issue here is the demand to provide reliable results in short amount of time. This paper addresses the problem by novel technique for simultaneous learning of global image features and binary hash codes. Our approach provide mapping of pixel-based image representation to hash-value space simultaneously trying to save as much of semantic image content as possible. We use deep learning methodology to generate image description with properties of similarity preservation and statistical independence. The main advantage of our approach in contrast to existing is ability to fine-tune retrieval procedure for very specific application which allow us to provide better results in comparison to general techniques. Presented in the paper framework for data- dependent image hashing is based on use two different kinds of neural networks: convolutional neural networks for image description and autoencoder for feature to hash space mapping. Experimental results confirmed that our approach has shown promising results in compare to other state-of-the-art methods.

  16. Parallel Algorithm of Geometrical Hashing Based on NumPy Package and Processes Pool

    Directory of Open Access Journals (Sweden)

    Klyachin Vladimir Aleksandrovich

    2015-10-01

    Full Text Available The article considers the problem of multi-dimensional geometric hashing. The paper describes a mathematical model of geometric hashing and considers an example of its use in localization problems for the point. A method of constructing the corresponding hash matrix by parallel algorithm is considered. In this paper an algorithm of parallel geometric hashing using a development pattern «pool processes» is proposed. The implementation of the algorithm is executed using the Python programming language and NumPy package for manipulating multidimensional data. To implement the process pool it is proposed to use a class Process Pool Executor imported from module concurrent.futures, which is included in the distribution of the interpreter Python since version 3.2. All the solutions are presented in the paper by corresponding UML class diagrams. Designed GeomNash package includes classes Data, Result, GeomHash, Job. The results of the developed program presents the corresponding graphs. Also, the article presents the theoretical justification for the application process pool for the implementation of parallel algorithms. It is obtained condition t2 > (p/(p-1*t1 of the appropriateness of process pool. Here t1 - the time of transmission unit of data between processes, and t2 - the time of processing unit data by one processor.

  17. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    Science.gov (United States)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  18. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    Science.gov (United States)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. PMID:26823196

  19. One-way Hash function construction based on the chaotic map with changeable-parameter

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Deng Shaojiang

    2005-01-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce

  20. One-way Hash function construction based on the chaotic map with changeable-parameter

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China) and College of Mechanical Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xiaodi_cqu@hotmail.com; Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xfliao@cqu.edu.cn; Deng Shaojiang [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)

    2005-04-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce.

  1. An algorithm for the detection of move repetition without the use of hash-keys

    Directory of Open Access Journals (Sweden)

    Vučković Vladan

    2007-01-01

    Full Text Available This paper addresses the theoretical and practical aspects of an important problem in computer chess programming - the problem of draw detection in cases of position repetition. The standard approach used in the majority of computer chess programs is hash-oriented. This method is sufficient in most cases, as the Zobrist keys are already present due to the systemic positional hashing, so that they need not be computed anew for the purpose of draw detection. The new type of the algorithm that we have developed solves the problem of draw detection in cases when Zobrist keys are not used in the program, i.e. in cases when the memory is not hashed.

  2. Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Leurent, Gaëtan; Mendel, Florian

    2010-01-01

    In this paper, we analyze SHAvite-3-512 hash function, as proposed for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on ...

  3. The Speech multi features fusion perceptual hash algorithm based on tensor decomposition

    Science.gov (United States)

    Huang, Y. B.; Fan, M. H.; Zhang, Q. Y.

    2018-03-01

    With constant progress in modern speech communication technologies, the speech data is prone to be attacked by the noise or maliciously tampered. In order to make the speech perception hash algorithm has strong robustness and high efficiency, this paper put forward a speech perception hash algorithm based on the tensor decomposition and multi features is proposed. This algorithm analyses the speech perception feature acquires each speech component wavelet packet decomposition. LPCC, LSP and ISP feature of each speech component are extracted to constitute the speech feature tensor. Speech authentication is done by generating the hash values through feature matrix quantification which use mid-value. Experimental results showing that the proposed algorithm is robust for content to maintain operations compared with similar algorithms. It is able to resist the attack of the common background noise. Also, the algorithm is highly efficiency in terms of arithmetic, and is able to meet the real-time requirements of speech communication and complete the speech authentication quickly.

  4. Visual hashing of digital video : applications and techniques

    NARCIS (Netherlands)

    Oostveen, J.; Kalker, A.A.C.M.; Haitsma, J.A.; Tescher, A.G.

    2001-01-01

    his paper present the concept of robust video hashing as a tool for video identification. We present considerations and a technique for (i) extracting essential perceptual features from a moving image sequences and (ii) for identifying any sufficiently long unknown video segment by efficiently

  5. Adoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador

    Science.gov (United States)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2018-04-01

    The Hash security algorithm was analyzed in order to mitigate information security in a distributed architecture. The objective of this research is to develop a prototype for the Adoption of the algorithm Hash in a conceptual model for the Civil Registry of Ecuador. The deductive method was used in order to analyze the published articles that have a direct relation with the research project "Algorithms and Security Protocols for the Civil Registry of Ecuador" and articles related to the Hash security algorithm. It resulted from this research: That the SHA-1 security algorithm is appropriate for use in Ecuador's civil registry; we adopted the SHA-1 algorithm used in the flowchart technique and finally we obtained the adoption of the hash algorithm in a conceptual model. It is concluded that from the comparison of the DM5 and SHA-1 algorithm, it is suggested that in the case of an implementation, the SHA-1 algorithm is taken due to the amount of information and data available from the Civil Registry of Ecuador; It is determined that the SHA-1 algorithm that was defined using the flowchart technique can be modified according to the requirements of each institution; the model for adopting the hash algorithm in a conceptual model is a prototype that can be modified according to all the actors that make up each organization.

  6. Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs.

    Science.gov (United States)

    Teoh, Andrew B J; Goh, Alwyn; Ngo, David C L

    2006-12-01

    Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.

  7. Practical Attacks on AES-like Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Rechberger, Christian

    2015-01-01

    to drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more...

  8. Robust Image Hashing Using Radon Transform and Invariant Features

    Directory of Open Access Journals (Sweden)

    Y.L. Liu

    2016-09-01

    Full Text Available A robust image hashing method based on radon transform and invariant features is proposed for image authentication, image retrieval, and image detection. Specifically, an input image is firstly converted into a counterpart with a normalized size. Then the invariant centroid algorithm is applied to obtain the invariant feature point and the surrounding circular area, and the radon transform is employed to acquire the mapping coefficient matrix of the area. Finally, the hashing sequence is generated by combining the feature vectors and the invariant moments calculated from the coefficient matrix. Experimental results show that this method not only can resist against the normal image processing operations, but also some geometric distortions. Comparisons of receiver operating characteristic (ROC curve indicate that the proposed method outperforms some existing methods in classification between perceptual robustness and discrimination.

  9. Collision free path generation in 3D with turning and pitch radius constraints for aerial vehicles

    DEFF Research Database (Denmark)

    Schøler, F.; La Cour-Harbo, A.; Bisgaard, M.

    2009-01-01

    In this paper we consider the problem of trajectory generation in 3D for uninhabited aerial systems (UAS). The proposed algorithm for trajectory generation allows us to find a feasible collision-free 3D trajectory through a number of waypoints in an environment containing obstacles. Our approach...... assumes that most of the aircraft structural and dynamic limitations can be formulated as a turn radius constraint, and that any two consecutive waypoints have line-of-sight. The generated trajectories are collision free and also satisfy a constraint on the minimum admissible turning radius, while...

  10. Collision-Free Structure Using Thin-Film Magnet For Electrostatic Energy Harvester

    International Nuclear Information System (INIS)

    Yoshii, S; Yamaguchi, K; Fujita, T; Kanda, K; Maenaka, K

    2016-01-01

    This paper proposes collision-free structure using NdFeB thin-film magnet for vibration energy harvesters. By using stripe shaped NdFeB magnet array on the Si MEMS structure, we finally obtained 3 mN of magnetic repulsive force on 8 × 8 mm 2 specimen with 40 μm air-gap. (paper)

  11. Collision-Free Structure Using Thin-Film Magnet For Electrostatic Energy Harvester

    Science.gov (United States)

    Yoshii, S.; Yamaguchi, K.; Fujita, T.; Kanda, K.; Maenaka, K.

    2016-11-01

    This paper proposes collision-free structure using NdFeB thin-film magnet for vibration energy harvesters. By using stripe shaped NdFeB magnet array on the Si MEMS structure, we finally obtained 3 mN of magnetic repulsive force on 8 × 8 mm2 specimen with 40 μm air-gap.

  12. The Forecast Performance of Competing Implied Volatility Measures

    DEFF Research Database (Denmark)

    Tsiaras, Leonidas

    This study examines the information content of alternative implied volatility measures for the 30 components of the Dow Jones Industrial Average Index from 1996 until 2007. Along with the popular Black-Scholes and "model-free" implied volatility expectations, the recently proposed corridor implie......, volatility definitions, loss functions and forecast evaluation settings....

  13. EFFICIENCY ANALYSIS OF HASHING METHODS FOR FILE SYSTEMS IN USER MODE

    Directory of Open Access Journals (Sweden)

    E. Y. Ivanov

    2013-05-01

    Full Text Available The article deals with characteristics and performance of interaction protocols between virtual file system and file system, their influence on processing power of microkernel operating systems. User mode implementation of ext2 file system for MINIX 3 OS is used to show that in microkernel operating systems file object identification time might increase up to 26 times in comparison with monolithic systems. Therefore, we present efficiency analysis of various hashing methods for file systems, running in user mode. Studies have shown that using hashing methods recommended in this paper it is possible to achieve competitive performance of the considered component of I/O stacks in microkernel and monolithic operating systems.

  14. HASH: the Hong Kong/AAO/Strasbourg Hα planetary nebula database

    International Nuclear Information System (INIS)

    Parker, Quentin A; Bojičić, Ivan S; Frew, David J

    2016-01-01

    By incorporating our major recent discoveries with re-measured and verified contents of existing catalogues we provide, for the first time, an accessible, reliable, on-line SQL database for essential, up-to date information for all known Galactic planetary nebulae (PNe). We have attempted to: i) reliably remove PN mimics/false ID's that have biased previous studies and ii) provide accurate positions, sizes, morphologies, multi-wavelength imagery and spectroscopy. We also provide a link to CDS/Vizier for the archival history of each object and other valuable links to external data. With the HASH interface, users can sift, select, browse, collate, investigate, download and visualise the entire currently known Galactic PNe diversity. HASH provides the community with the most complete and reliable data with which to undertake new science. (paper)

  15. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Seonho Choi

    2012-12-01

    Full Text Available A predictive-hashing based Denial-of-Service (DoS resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.

  16. Analysis and Implementation of Cryptographic Hash Functions in Programmable Logic Devices

    Directory of Open Access Journals (Sweden)

    Tautvydas Brukštus

    2016-06-01

    Full Text Available In this day’s world, more and more focused on data pro-tection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryp-tographic hash function. In this article has been selected the SHA-256 cryptographic hash function to implement and explore, based on fact that it is now a popular and safe. SHA-256 cryp-tographic function did not find any theoretical gaps or conflict situations. Also SHA-256 cryptographic hash function used cryptographic currencies. Currently cryptographic currency is popular and their value is high. For the measurements have been chosen programmable logic integrated circuits as they less effi-ciency then ASIC. We chose Altera Corporation produced prog-rammable logic integrated circuits. Counting speed will be inves-tigated by three programmable logic integrated circuit. We will use programmable logic integrated circuits belong to the same family, but different generations. Each programmable logic integ-rated circuit made using different dimension technology. Choo-sing these programmable logic integrated circuits: EP3C16, EP4CE115 and 5CSEMA5F31. To compare calculations perfor-mances parameters are provided in the tables and graphs. Re-search show the calculation speed and stability of different prog-rammable logic circuits.

  17. A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol.

    Directory of Open Access Journals (Sweden)

    Ping Zeng

    Full Text Available In this paper, based on our previous multi-pattern uniform resource locator (URL binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. The MH algorithm can be applied to the fields of network security, data analysis, load balancing, cloud robotic communications, and so on-all of which require string matching from a fixed starting position. Our approach effectively solves the performance problems of the classical multi-pattern matching algorithms. This paper explores ways to improve string matching performance under the HTTP protocol by using a hash method combined with a binary method that transforms the symbol-space matching problem into a digital-space numerical-size comparison and hashing problem. The MH approach has a fast matching speed, requires little memory, performs better than both the classical algorithms and HEM for matching fields in an HTTP stream, and it has great promise for use in real-world applications.

  18. The determination of the hadron mean free path for particle-producing collisions in intranuclear matter by measurement

    International Nuclear Information System (INIS)

    Strugalski, Z.; Mousa, M.

    1987-01-01

    It is shown how it is possible to determine the hadron mean free path in > for particle-producing collisions in intranuclear matter by measurement. The mean free path for the collisions of pions inside 54 131 Xe nuclei at 3.5 GeV/c momentum has been measured. The relation between in > in units nucleons/S and the hadron-nucleon inelastic cross section σ in in units S/nucleon is found: in >k1/σ in , where S∼10 fm 2 , k=3.0±0.15; physical meaning of S is given in this paper

  19. Local Deep Hashing Matching of Aerial Images Based on Relative Distance and Absolute Distance Constraints

    Directory of Open Access Journals (Sweden)

    Suting Chen

    2017-12-01

    Full Text Available Aerial images have features of high resolution, complex background, and usually require large amounts of calculation, however, most algorithms used in matching of aerial images adopt the shallow hand-crafted features expressed as floating-point descriptors (e.g., SIFT (Scale-invariant Feature Transform, SURF (Speeded Up Robust Features, which may suffer from poor matching speed and are not well represented in the literature. Here, we propose a novel Local Deep Hashing Matching (LDHM method for matching of aerial images with large size and with lower complexity or fast matching speed. The basic idea of the proposed algorithm is to utilize the deep network model in the local area of the aerial images, and study the local features, as well as the hash function of the images. Firstly, according to the course overlap rate of aerial images, the algorithm extracts the local areas for matching to avoid the processing of redundant information. Secondly, a triplet network structure is proposed to mine the deep features of the patches of the local image, and the learned features are imported to the hash layer, thus obtaining the representation of a binary hash code. Thirdly, the constraints of the positive samples to the absolute distance are added on the basis of the triplet loss, a new objective function is constructed to optimize the parameters of the network and enhance the discriminating capabilities of image patch features. Finally, the obtained deep hash code of each image patch is used for the similarity comparison of the image patches in the Hamming space to complete the matching of aerial images. The proposed LDHM algorithm evaluates the UltraCam-D dataset and a set of actual aerial images, simulation result demonstrates that it may significantly outperform the state-of-the-art algorithm in terms of the efficiency and performance.

  20. Accelerating SPARQL queries by exploiting hash-based locality and adaptive partitioning

    KAUST Repository

    Al-Harbi, Razen; Abdelaziz, Ibrahim; Kalnis, Panos; Mamoulis, Nikos; Ebrahim, Yasser; Sahli, Majed

    2016-01-01

    State-of-the-art distributed RDF systems partition data across multiple computer nodes (workers). Some systems perform cheap hash partitioning, which may result in expensive query evaluation. Others try to minimize inter-node communication, which

  1. Sensor Fusion Based Model for Collision Free Mobile Robot Navigation

    Science.gov (United States)

    Almasri, Marwah; Elleithy, Khaled; Alajlan, Abrar

    2015-01-01

    Autonomous mobile robots have become a very popular and interesting topic in the last decade. Each of them are equipped with various types of sensors such as GPS, camera, infrared and ultrasonic sensors. These sensors are used to observe the surrounding environment. However, these sensors sometimes fail and have inaccurate readings. Therefore, the integration of sensor fusion will help to solve this dilemma and enhance the overall performance. This paper presents a collision free mobile robot navigation based on the fuzzy logic fusion model. Eight distance sensors and a range finder camera are used for the collision avoidance approach where three ground sensors are used for the line or path following approach. The fuzzy system is composed of nine inputs which are the eight distance sensors and the camera, two outputs which are the left and right velocities of the mobile robot’s wheels, and 24 fuzzy rules for the robot’s movement. Webots Pro simulator is used for modeling the environment and the robot. The proposed methodology, which includes the collision avoidance based on fuzzy logic fusion model and line following robot, has been implemented and tested through simulation and real time experiments. Various scenarios have been presented with static and dynamic obstacles using one robot and two robots while avoiding obstacles in different shapes and sizes. PMID:26712766

  2. Sensor Fusion Based Model for Collision Free Mobile Robot Navigation

    Directory of Open Access Journals (Sweden)

    Marwah Almasri

    2015-12-01

    Full Text Available Autonomous mobile robots have become a very popular and interesting topic in the last decade. Each of them are equipped with various types of sensors such as GPS, camera, infrared and ultrasonic sensors. These sensors are used to observe the surrounding environment. However, these sensors sometimes fail and have inaccurate readings. Therefore, the integration of sensor fusion will help to solve this dilemma and enhance the overall performance. This paper presents a collision free mobile robot navigation based on the fuzzy logic fusion model. Eight distance sensors and a range finder camera are used for the collision avoidance approach where three ground sensors are used for the line or path following approach. The fuzzy system is composed of nine inputs which are the eight distance sensors and the camera, two outputs which are the left and right velocities of the mobile robot’s wheels, and 24 fuzzy rules for the robot’s movement. Webots Pro simulator is used for modeling the environment and the robot. The proposed methodology, which includes the collision avoidance based on fuzzy logic fusion model and line following robot, has been implemented and tested through simulation and real time experiments. Various scenarios have been presented with static and dynamic obstacles using one robot and two robots while avoiding obstacles in different shapes and sizes.

  3. Remarks on Gödel's Code as a Hash Function

    Czech Academy of Sciences Publication Activity Database

    Mikuš, M.; Savický, Petr

    2010-01-01

    Roč. 47, č. 3 (2010), s. 67-80 ISSN 1210-3195 R&D Projects: GA ČR GAP202/10/1333 Institutional research plan: CEZ:AV0Z10300504 Keywords : Gödel numbering function * hash function * rational reconstruction * integer relation algorithm Subject RIV: BA - General Mathematics http://www.sav.sk/journals/uploads/0317151904m-s.pdf

  4. HashLearn Now: Mobile Tutoring in India

    OpenAIRE

    Arun Kumar Agariya; Binay Krishna Shivam; Shashank Murali; Jyoti Tikoria

    2016-01-01

    Looking at today’s competitive exams scenario, a single mark may lead to a differentiation of rank in multiples of hundreds or even thousands. Looking at this problem from student’s perspective this article discusses the role of anywhere, anytime help for the students in getting answers for their problems on a real-time basis from the application known as HashLearn Now. The smart phones usage by students clearly signifies the importance of this application for getting their queries answered b...

  5. Distributed hash table theory, platforms and applications

    CERN Document Server

    Zhang, Hao; Xie, Haiyong; Yu, Nenghai

    2013-01-01

    This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed environments. The authors teach the principles of several popular DHT platforms that can solve practical problems such as load balance, multiple replicas, consistency and latency. They also propose DHT-based applications including multicast, anycast, distributed file systems, search, storage, content delivery network, file sharing and c

  6. UQlust: combining profile hashing with linear-time ranking for efficient clustering and analysis of big macromolecular data.

    Science.gov (United States)

    Adamczak, Rafal; Meller, Jarek

    2016-12-28

    Advances in computing have enabled current protein and RNA structure prediction and molecular simulation methods to dramatically increase their sampling of conformational spaces. The quickly growing number of experimentally resolved structures, and databases such as the Protein Data Bank, also implies large scale structural similarity analyses to retrieve and classify macromolecular data. Consequently, the computational cost of structure comparison and clustering for large sets of macromolecular structures has become a bottleneck that necessitates further algorithmic improvements and development of efficient software solutions. uQlust is a versatile and easy-to-use tool for ultrafast ranking and clustering of macromolecular structures. uQlust makes use of structural profiles of proteins and nucleic acids, while combining a linear-time algorithm for implicit comparison of all pairs of models with profile hashing to enable efficient clustering of large data sets with a low memory footprint. In addition to ranking and clustering of large sets of models of the same protein or RNA molecule, uQlust can also be used in conjunction with fragment-based profiles in order to cluster structures of arbitrary length. For example, hierarchical clustering of the entire PDB using profile hashing can be performed on a typical laptop, thus opening an avenue for structural explorations previously limited to dedicated resources. The uQlust package is freely available under the GNU General Public License at https://github.com/uQlust . uQlust represents a drastic reduction in the computational complexity and memory requirements with respect to existing clustering and model quality assessment methods for macromolecular structure analysis, while yielding results on par with traditional approaches for both proteins and RNAs.

  7. Rebound Attacks on the Reduced Grøstl Hash Function

    DEFF Research Database (Denmark)

    Mendel, Florian; Rechberger, C.; Schlaffer, Martin

    2010-01-01

    Grøstl is one of 14 second round candidates of the NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression function of Grøstl-256 have already been published. However, little is known about the hash function, arguably a much more interesting cryptanalytic setting. Also, Grøstl...

  8. Accelerating SPARQL queries by exploiting hash-based locality and adaptive partitioning

    KAUST Repository

    Al-Harbi, Razen

    2016-02-08

    State-of-the-art distributed RDF systems partition data across multiple computer nodes (workers). Some systems perform cheap hash partitioning, which may result in expensive query evaluation. Others try to minimize inter-node communication, which requires an expensive data preprocessing phase, leading to a high startup cost. Apriori knowledge of the query workload has also been used to create partitions, which, however, are static and do not adapt to workload changes. In this paper, we propose AdPart, a distributed RDF system, which addresses the shortcomings of previous work. First, AdPart applies lightweight partitioning on the initial data, which distributes triples by hashing on their subjects; this renders its startup overhead low. At the same time, the locality-aware query optimizer of AdPart takes full advantage of the partitioning to (1) support the fully parallel processing of join patterns on subjects and (2) minimize data communication for general queries by applying hash distribution of intermediate results instead of broadcasting, wherever possible. Second, AdPart monitors the data access patterns and dynamically redistributes and replicates the instances of the most frequent ones among workers. As a result, the communication cost for future queries is drastically reduced or even eliminated. To control replication, AdPart implements an eviction policy for the redistributed patterns. Our experiments with synthetic and real data verify that AdPart: (1) starts faster than all existing systems; (2) processes thousands of queries before other systems become online; and (3) gracefully adapts to the query load, being able to evaluate queries on billion-scale RDF data in subseconds.

  9. The legal response to illegal "hash clubs" in Denmark

    DEFF Research Database (Denmark)

    Asmussen, V.; Moesby-Johansen, C.

    2004-01-01

    Fra midten af 1990'erne er der skudt en række hashklubber op i Danmark. Overordnet er der to slags klubber: salgssteder og væresteder. De første klubber er udelukkende organiseret om salget af hash, mens de andre er klubber, hvor man både kan købe hashen og opholde sig på stedet for at deltage i ...

  10. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

    DEFF Research Database (Denmark)

    Lamberger, Mario; Mendel, Florian; Schläffer, Martin

    2015-01-01

    We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. We give attacks on reduced variants of the 10-round Whirlpool hash function and compression function. Our results are collisions for 5...

  11. ANALISA FUNGSI HASH DALAM ENKRIPSI IDEA UNTUK KEAMANAN RECORD INFORMASI

    Directory of Open Access Journals (Sweden)

    Ramen Antonov Purba

    2014-02-01

    Full Text Available Issues of security and confidentiality of data is very important to organization or individual. If the data in a network of computers connected with a public network such as the Internet. Of course a very important data is viewed or hijacked by unauthorized persons. Because if this happens we will probably corrupted data can be lost even that will cause huge material losses. This research discusses the security system of sending messages/data using the encryption aims to maintain access of security a message from the people who are not authorized/ eligible. Because of this delivery system is very extensive security with the scope then this section is limited only parsing the IDEA Algorithm with hash functions, which include encryption, decryption. By combining the encryption IDEA methods (International Data Encryption Algorithm to encrypt the contents of the messages/data with the hash function to detect changes the content of messages/data is expected security level to be better. Results from this study a software that can perform encryption and decryption of messages/data, generate the security key based on the message/data is encrypted.

  12. A traffic priority language for collision-free navigation of autonomous mobile robots in dynamic environments.

    Science.gov (United States)

    Bourbakis, N G

    1997-01-01

    This paper presents a generic traffic priority language, called KYKLOFORTA, used by autonomous robots for collision-free navigation in a dynamic unknown or known navigation space. In a previous work by X. Grossmman (1988), a set of traffic control rules was developed for the navigation of the robots on the lines of a two-dimensional (2-D) grid and a control center coordinated and synchronized their movements. In this work, the robots are considered autonomous: they are moving anywhere and in any direction inside the free space, and there is no need of a central control to coordinate and synchronize them. The requirements for each robot are i) visual perception, ii) range sensors, and iii) the ability of each robot to detect other moving objects in the same free navigation space, define the other objects perceived size, their velocity and their directions. Based on these assumptions, a traffic priority language is needed for each robot, making it able to decide during the navigation and avoid possible collision with other moving objects. The traffic priority language proposed here is based on a set of primitive traffic priority alphabet and rules which compose pattern of corridors for the application of the traffic priority rules.

  13. Speaker Linking and Applications using Non-Parametric Hashing Methods

    Science.gov (United States)

    2016-09-08

    nonparametric estimate of a multivariate density function,” The Annals of Math- ematical Statistics , vol. 36, no. 3, pp. 1049–1051, 1965. [9] E. A. Patrick...Speaker Linking and Applications using Non-Parametric Hashing Methods† Douglas Sturim and William M. Campbell MIT Lincoln Laboratory, Lexington, MA...with many approaches [1, 2]. For this paper, we focus on using i-vectors [2], but the methods apply to any embedding. For the task of speaker QBE and

  14. Vehicle Reference Generator for Collision-Free Trajectories in Hazardous Maneuvers

    Directory of Open Access Journals (Sweden)

    Cuauhtémoc Acosta Lúa

    2018-01-01

    Full Text Available This paper presents a reference generator for ground vehicles, based on potential fields adapted to the case of vehicular dynamics. The reference generator generates signals to be tracked by the vehicle, corresponding to a trajectory avoiding collisions with obstacles. This generator integrates artificial forces of potential fields of the object surrounding the vehicle. The reference generator is used with a controller to ensure the tracking of the accident-free reference. This approach can be used for vehicle autonomous driving or for active control of manned vehicles. Simulation results, presented for the autonomous driving, consider a scenario inspired by the so-called moose (or elk test, with the presence of other collaborative vehicles.

  15. Construction of secure and fast hash functions using nonbinary error-correcting codes

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Preneel, Bart

    2002-01-01

    constructions based on block ciphers such as the Data Encryption Standard (DES), where the key size is slightly smaller than the block size; IDEA, where the key size is twice the block size; Advanced Encryption Standard (AES), with a variable key size; and to MD4-like hash functions. Under reasonable...

  16. GATHERING TECHNOLOGY BASED ON REGEX WEB PAGE DENOISING HASH ALIGNMENTS WEB CRAWLER WITHOUT LANDING THE MICRO - BLOG ABUNDANT%基于 Regex 网页去噪 Hash 比对的网络爬虫无登陆微博采集技术

    Institute of Scientific and Technical Information of China (English)

    陈宇; 孟凡龙; 刘培玉; 朱振方

    2015-01-01

    针对当前微博采集无精确去噪方法和微博无法无登陆采集现象,笔者提出了基于 Regex 网页去噪 Hash 对比的网络爬虫采集方案并利用插件采集实现了无登陆采集。该方法通过 Regex 构建 DFA 和 NFA 模型来去除网页噪声,通过 Hash 对比对确定采集页面,并通过插件权限提升实现无登陆技术。有效的避免了 Hash 值的变化与网页内容变化产生偏离的现象,解决了网络爬虫虚拟登录时多次对 URL 采集造成的身份认证问题。实验表明,该方法可以实时快速的获取微博信息,为舆情数据分析提供批量精准的数据。%In view of the current micro - blog acquisition without accurate denoising method and unable abundantly the non - debarkation gathering phenomenon,we present a web crawler acquisition scheme of Regex Webpage denoising Hash based on comparison and realize no landing collection by using plug - in acquisition. The method of Regex to construct DFA and NFA model to remove Webpage noise,comparing the Hash to determine the collection page,and the plug - in privilege without landing techniques are presented. Experiments show that,this method quickly gets micro - blog information in real time,and provides,accurate data for the mass public opinion data analysis.

  17. Numerical simulation of collision-free plasma using Vlasov hybrid simulation

    International Nuclear Information System (INIS)

    Nunn, D.

    1990-01-01

    A novel scheme for the numerical simulation of wave particle interactions in space plasmas has been developed. The method, termed VHS or Vlasov Hybrid Simulation, is applicable to hot collision free plasmas in which the unperturbed distribution functions is smooth and free of delta function singularities. The particle population is described as a continuous Vlasov fluid in phase space-granularity and collisional effects being ignored. In traditional PIC/CIC codes the charge/current due to each simulation particle is assigned to a fixed spatial grid. In the VHS method the simulation particles sample the Vlasov fluid and provide information about the value of distribution function (F(r,v) at random points in phase space. Values of F are interpolated from the simulation particles onto a fixed grid in velocity/position or phase space. With distribution function defined on a phase space grid the plasma charge/current field is quickly calculated. The simulation particles serve only to provide information, and thus the particle population may be dynamic. Particles no longer resonant with the wavefield may be discarded from the simulation, and new particles may be inserted into the Vlasov fluid where required

  18. Post-quantum security of the sponge construction

    NARCIS (Netherlands)

    Czajkowski, J.; Groot Bruinderink, L.; Hülsing, A.T.; Schaffner, C.; Unruh, D.

    2017-01-01

    We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengthening of collision-resistance). We show that the sponge construction is collapsing (and in consequence

  19. Post-quantum security of the sponge construction

    NARCIS (Netherlands)

    Czajkowski, Jan; Groot Bruinderink, Leon; Hülsing, Andreas; Schaffner, Christian; Unruh, Dominique

    2018-01-01

    We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengthening of collision-resistance). We show that the sponge construction is collapsing (and in consequence

  20. Fast Structural Alignment of Biomolecules Using a Hash Table, N-Grams and String Descriptors

    Directory of Open Access Journals (Sweden)

    Robert Preissner

    2009-04-01

    Full Text Available This work presents a generalized approach for the fast structural alignment of thousands of macromolecular structures. The method uses string representations of a macromolecular structure and a hash table that stores n-grams of a certain size for searching. To this end, macromolecular structure-to-string translators were implemented for protein and RNA structures. A query against the index is performed in two hierarchical steps to unite speed and precision. In the first step the query structure is translated into n-grams, and all target structures containing these n-grams are retrieved from the hash table. In the second step all corresponding n-grams of the query and each target structure are subsequently aligned, and after each alignment a score is calculated based on the matching n-grams of query and target. The extendable framework enables the user to query and structurally align thousands of protein and RNA structures on a commodity machine and is available as open source from http://lajolla.sf.net.

  1. MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers

    Directory of Open Access Journals (Sweden)

    Jingsha He

    2018-05-01

    Full Text Available To enhance the efficiency of data searching, most data owners store their data files in different cloud servers in the form of cipher-text. Thus, efficient search using fuzzy keywords becomes a critical issue in such a cloud computing environment. This paper proposes a method that aims at improving the efficiency of cipher-text retrieval and lowering storage overhead for fuzzy keyword search. In contrast to traditional approaches, the proposed method can reduce the complexity of Min-Hash-based fuzzy keyword search by using Min-Hash fingerprints to avoid the need to construct the fuzzy keyword set. The method will utilize Jaccard similarity to rank the results of retrieval, thus reducing the amount of calculation for similarity and saving a lot of time and space overhead. The method will also take consideration of multiple user queries through re-encryption technology and update user permissions dynamically. Security analysis demonstrates that the method can provide better privacy preservation and experimental results show that efficiency of cipher-text using the proposed method can improve the retrieval time and lower storage overhead as well.

  2. Mean free path of nucleons in a Fermi gas at finite temperature

    International Nuclear Information System (INIS)

    Collins, M.T.; Griffin, J.J.

    1980-01-01

    The mean free path of a nucleon in a nuclear Fermi gas at finite temperature is calculated by utilizing the free nucleon-nucleon cross section modified to suppress final states excluded by the Pauli principle. The results agree with an earlier zero-temperature calculation but yield substantially smaller values than a previous finite-temperature analysis. The Fermi gas mean free paths are some two to four times shorter than those implied by phenomenological imaginary optical potentials, suggesting that the present Fermi gas model fails to adequately describe the physical processes determining the mean free path. Even so, the present results, taken as lower bounds on te mean free path, require temperatures of some 4.5 MeV before the mean free path of bound nucleons becomes as short as the nuclear diameter. It follows that very high excitation energies are prerequisite to any short mean free path assumption in nuclear heavy-ion collisions. (orig.)

  3. Particle correlations in proton-nucleus and nucleus-nucleus collisions

    International Nuclear Information System (INIS)

    Nagamiya, Sh.

    1981-01-01

    Particle correlations in proton-nucleus and nucleus-nucleus collisions at energies of 1-2 GeV/nucleon are investigated. The problems of measurement of the mean free path lambda of protons inside the nucleus and the interaction radius of nucleus-nucleus collisions is considered. The value of lambda has been determined in two-proton coincidence experiment in proton-nucleus interaction at 800 MeV. The observed value of lambda is slightly longer than the expected from free nucleon-nucleon collisions. Some preliminary results on proton emission beyond free nucleon-nucleon kinemaics are given

  4. Probability of Grounding and Collision Events

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup

    1996-01-01

    To quantify the risks involved in ship traffic, rational criteria for collision and grounding accidents are developed. This implies that probabilities as well as inherent consequences can be analysed and assessed. The presnt paper outlines a method for evaluation of the probability of ship...

  5. Probability of Grounding and Collision Events

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup

    1996-01-01

    To quantify the risks involved in ship traffic, rational criteria for collision and grounding accidents have to be developed. This implies that probabilities as well as inherent consequences have to be analyzed and assessed.The present notes outline a method for evaluation of the probability...

  6. Implied Volatility Surface: Construction Methodologies and Characteristics

    OpenAIRE

    Cristian Homescu

    2011-01-01

    The implied volatility surface (IVS) is a fundamental building block in computational finance. We provide a survey of methodologies for constructing such surfaces. We also discuss various topics which can influence the successful construction of IVS in practice: arbitrage-free conditions in both strike and time, how to perform extrapolation outside the core region, choice of calibrating functional and selection of numerical optimization algorithms, volatility surface dynamics and asymptotics.

  7. Cryptanalysis of MD2

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric

    2010-01-01

    This paper considers the hash function MD2 which was developed by Ron Rivest in 1989. Despite its age, MD2 has withstood cryptanalytic attacks until recently. This paper contains the state-of-the-art cryptanalytic results on MD2, in particular collision and preimage attacks on the full hash...

  8. Asymptotic Expansions of the Lognormal Implied Volatility : A Model Free Approach

    OpenAIRE

    Cyril Grunspan

    2011-01-01

    We invert the Black-Scholes formula. We consider the cases low strike, large strike, short maturity and large maturity. We give explicitly the first 5 terms of the expansions. A method to compute all the terms by induction is also given. At the money, we have a closed form formula for implied lognormal volatility in terms of a power series in call price.

  9. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  10. Moment generating functions and Normalized implied volatilities: unification and extension via Fukasawa's pricing formula

    OpenAIRE

    De Marco, Stefano; Martini, Claude

    2017-01-01

    We extend the model-free formula of [Fukasawa 2012] for $\\mathbb E[\\Psi(X_T)]$, where $X_T=\\log S_T/F$ is the log-price of an asset, to functions $\\Psi$ of exponential growth. The resulting integral representation is written in terms of normalized implied volatilities. Just as Fukasawa's work provides rigourous ground for Chriss and Morokoff's (1999) model-free formula for the log-contract (related to the Variance swap implied variance), we prove an expression for the moment generating functi...

  11. 76 FR 7817 - Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request...

    Science.gov (United States)

    2011-02-11

    ...-02] Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request... and request for comments. SUMMARY: This notice announces the Draft Federal Information Processing..., Information Technology Laboratory, Attention: Comments on Draft FIPS 180-4, 100 Bureau Drive--Stop 8930...

  12. Collision-free gases in spatially homogeneous space-times

    International Nuclear Information System (INIS)

    Maartens, R.; Maharaj, S.D.

    1985-01-01

    The kinematical and dynamical properties of one-component collision-free gases in spatially homogeneous, locally rotationally symmetric (LRS) space-times are analyzed. Following Ray and Zimmerman [Nuovo Cimento B 42, 183 (1977)], it is assumed that the distribution function f of the gas inherits the symmetry of space-time, in order to construct solutions of Liouville's equation. The redundancy of their further assumption that f be based on Killing vector constants of the motion is shown. The Ray and Zimmerman results for Kantowski--Sachs space-time are extended to all spatially homogeneous LRS space-times. It is shown that in all these space-times the kinematic average four-velocity u/sup i/ can be tilted relative to the homogeneous hypersurfaces. This differs from the perfect fluid case, in which only one space-time admits tilted u/sup i/, as shown by King and Ellis [Commun. Math. Phys. 31, 209 (1973)]. As a consequence, it is shown that all space-times admit nonzero acceleration and heat flow, while a subclass admits nonzero vorticity. The stress π/sub i/j is proportional to the shear sigma/sub i/j by virtue of the invariance of the distribution function. The evolution of tilt and the existence of perfect fluid solutions is also discussed

  13. Collision of BEC dark matter structures and comparison with the collision of ideal gas structures

    International Nuclear Information System (INIS)

    Guzman, F. S.; Gonzalez, J. A.

    2010-01-01

    In this work we present an important feature of the Bose Einstein Condensate (BEC) dark matter model, that is, the head-on collision of BEC dark matter virialized structures. This model of dark matter is assumed to be ruled by the Schroedinger-Poisson system of equations, which is interpreted as the Gross-Pitaevskii equation with a gravitational potential sourced by the density of probability. It has been shown recently that during the collision of two structures a pattern formation in the density of probability appears. We explore the pattern formation for various initial dynamical conditions during the collision. In order to know whether or not the pattern formation is a particular property of the BEC dark matter, we compare with the collision of two structures of virialized ideal gas under similar dynamical initial conditions, which is a model more consistent with usual models of dark matter. In order to do so, we also solve Euler's equations using a smoothed particle hydrodynamics approach. We found that the collision of the ideal gas structures does not show interference patterns, which in turn implies that the pattern formation is a property of the BEC dark matter.

  14. A Note on the Equivalence between the Normal and the Lognormal Implied Volatility : A Model Free Approach

    OpenAIRE

    Grunspan, Cyril

    2011-01-01

    First, we show that implied normal volatility is intimately linked with the incomplete Gamma function. Then, we deduce an expansion on implied normal volatility in terms of the time-value of a European call option. Then, we formulate an equivalence between the implied normal volatility and the lognormal implied volatility with any strike and any model. This generalizes a known result for the SABR model. Finally, we adress the issue of the "breakeven move" of a delta-hedged portfolio.

  15. Free-parameterless model of high energy particle collisions with atomic nuclei

    International Nuclear Information System (INIS)

    Strugalski, Z.

    1982-01-01

    In result of studies, it has been discovered that: a) Intensive emission of fast nucleons of kinetic energy from 20 to 400 MeV proceeds independently of the pion production process; b) The particle production in hadron-nucleon collisions is mediated by intermediate objects produced first in a 2 → 2 type endoergic reaction and decaying after lifetime tausub(g) > or approximately 10 - 22 s into commonly known resonances and particles; c) Inside of massive enough atomic nuclei quasi-onedimensional cascades of the intermediate objects can develop; d) A definite simple connection exists between the characteristics of the secondaries appearing in hadron-nucleus collision events and corresponding hadron-nucleon collision events, the target-nucleus size and the nucleon density distribution in it. The yield of the hadron-nucleus collisions is described in a convincing manner in terms of the hadron-nucleon collision data by means of simple formulas

  16. Rotation invariant deep binary hashing for fast image retrieval

    Science.gov (United States)

    Dai, Lai; Liu, Jianming; Jiang, Aiwen

    2017-07-01

    In this paper, we study how to compactly represent image's characteristics for fast image retrieval. We propose supervised rotation invariant compact discriminative binary descriptors through combining convolutional neural network with hashing. In the proposed network, binary codes are learned by employing a hidden layer for representing latent concepts that dominate on class labels. A loss function is proposed to minimize the difference between binary descriptors that describe reference image and the rotated one. Compared with some other supervised methods, the proposed network doesn't have to require pair-wised inputs for binary code learning. Experimental results show that our method is effective and achieves state-of-the-art results on the CIFAR-10 and MNIST datasets.

  17. Model-based recognition of 3-D objects by geometric hashing technique

    International Nuclear Information System (INIS)

    Severcan, M.; Uzunalioglu, H.

    1992-09-01

    A model-based object recognition system is developed for recognition of polyhedral objects. The system consists of feature extraction, modelling and matching stages. Linear features are used for object descriptions. Lines are obtained from edges using rotation transform. For modelling and recognition process, geometric hashing method is utilized. Each object is modelled using 2-D views taken from the viewpoints on the viewing sphere. A hidden line elimination algorithm is used to find these views from the wire frame model of the objects. The recognition experiments yielded satisfactory results. (author). 8 refs, 5 figs

  18. Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory

    Directory of Open Access Journals (Sweden)

    Ye Dengpan

    2012-09-01

    Full Text Available The content authenticity of the multimedia delivery is important issue with rapid development and widely used of multimedia technology. Till now many authentication solutions had been proposed, such as cryptology and watermarking based methods. However, in latest heterogeneous network the video stream transmission has been coded in scalable way such as H.264/SVC, there is still no good authentication solution. In this paper, we firstly summarized related works and proposed a scalable content authentication scheme using a ratio of different energy (RDE based perceptual hashing in Q/S dimension, which is used Dempster-Shafer theory and combined with the latest scalable video coding (H.264/SVC construction. The idea of aldquo;sign once and verify in scalable wayardquo; can be realized. Comparing with previous methods, the proposed scheme based on perceptual hashing outperforms previous works in uncertainty (robustness and efficiencies in the H.264/SVC video streams. At last, the experiment results verified the performance of our scheme.

  19. A new test method for the assessment of neck injuries in rear-end collisions

    NARCIS (Netherlands)

    Cappon, H.J.; Philippens, M.M.G.M.; Wismans, J.S.H.M.

    2001-01-01

    Whiplash injuries due to rear-end car collisions is one of the most aggravating traffic safety problems with serious implications for the European society. Yearly more than a million European citizens suffer neck injuries from rear-end car collisions, implying tremendous societal costs. Therefore

  20. Hash-chain-based authentication for IoT

    Directory of Open Access Journals (Sweden)

    Antonio PINTO

    2016-12-01

    Full Text Available The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT. Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices perform data collection. The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy. The current work proposes a modified hash-chain authentication mechanism that, with the help of a smartphone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP while using open wireless networks. Moreover, the proposed authentication mechanism adheres to the stateless, HTTP-like behavior expected of REST web-services, even allowing the caching of server authentication replies within a predefined time window. No other known web-service authentication mechanism operates in such manner.

  1. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Science.gov (United States)

    Vielhauer, Claus; Steinmetz, Ralf

    2004-12-01

    In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation), the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  2. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Directory of Open Access Journals (Sweden)

    Ralf Steinmetz

    2004-04-01

    Full Text Available In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation, the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  3. Large-scale subduction of continental crust implied by India-Asia mass-balance calculation

    Science.gov (United States)

    Ingalls, Miquela; Rowley, David B.; Currie, Brian; Colman, Albert S.

    2016-11-01

    Continental crust is buoyant compared with its oceanic counterpart and resists subduction into the mantle. When two continents collide, the mass balance for the continental crust is therefore assumed to be maintained. Here we use estimates of pre-collisional crustal thickness and convergence history derived from plate kinematic models to calculate the crustal mass balance in the India-Asia collisional system. Using the current best estimates for the timing of the diachronous onset of collision between India and Eurasia, we find that about 50% of the pre-collisional continental crustal mass cannot be accounted for in the crustal reservoir preserved at Earth's surface today--represented by the mass preserved in the thickened crust that makes up the Himalaya, Tibet and much of adjacent Asia, as well as southeast Asian tectonic escape and exported eroded sediments. This implies large-scale subduction of continental crust during the collision, with a mass equivalent to about 15% of the total oceanic crustal subduction flux since 56 million years ago. We suggest that similar contamination of the mantle by direct input of radiogenic continental crustal materials during past continent-continent collisions is reflected in some ocean crust and ocean island basalt geochemistry. The subduction of continental crust may therefore contribute significantly to the evolution of mantle geochemistry.

  4. UnoHop: Efficient Distributed Hash Table with O(1 Lookup Performance

    Directory of Open Access Journals (Sweden)

    Herry Sitepu

    2008-05-01

    Full Text Available Distributed Hash Tables (DHTs with O(1 lookup performance strive to minimize the maintenance traffic which required for propagating membership changes information (events. These events distribution allows each node in the peer-to-peer network maintains accurate routing tables with complete membership information. We present UnoHop, a novel DHT protocol with O(1 lookup performance. The protocol uses an efficient mechanism to distribute events through a dissemination tree that constructed dynamically rooted at the node that detect the events. Our protocol produces symmetric bandwidth usage at all nodes while decreasing the events propagation delay.

  5. Global flow of glasma in high energy nuclear collisions

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Guangyao; Fries, Rainer J., E-mail: rjfries@comp.tamu.edu

    2013-06-25

    We discuss the energy flow of the classical gluon fields created in collisions of heavy nuclei at collider energies. We show how the Yang–Mills analog of Faraday's Law and Gauss' Law predicts the initial gluon flux tubes to expand or bend. The resulting transverse and longitudinal structure of the Poynting vector field has a rich phenomenology. Besides the well-known radial and elliptic flow in transverse direction, classical quantum chromodynamics predicts a rapidity-odd transverse flow that tilts the fireball for non-central collisions, and it implies a characteristic flow pattern for collisions of non-symmetric systems A+B. The rapidity-odd transverse flow translates into a directed particle flow v{sub 1} which has been observed at RHIC and LHC. The global flow fields in heavy ion collisions could be a powerful check for the validity of classical Yang–Mills dynamics in high energy collisions.

  6. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization

    Directory of Open Access Journals (Sweden)

    Wai Kuan Yip

    2007-01-01

    Full Text Available We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT and discrete fourier transform (DFT. Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs of and for random and skilled forgeries for stolen token (worst case scenario, and for both forgeries in the genuine token (optimal scenario.

  7. Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment

    Directory of Open Access Journals (Sweden)

    Yanwei Xu

    2017-01-01

    Full Text Available With the increasing volume of web services in the cloud environment, Collaborative Filtering- (CF- based service recommendation has become one of the most effective techniques to alleviate the heavy burden on the service selection decisions of a target user. However, the service recommendation bases, that is, historical service usage data, are often distributed in different cloud platforms. Two challenges are present in such a cross-cloud service recommendation scenario. First, a cloud platform is often not willing to share its data to other cloud platforms due to privacy concerns, which decreases the feasibility of cross-cloud service recommendation severely. Second, the historical service usage data recorded in each cloud platform may update over time, which reduces the recommendation scalability significantly. In view of these two challenges, a novel privacy-preserving and scalable service recommendation approach based on SimHash, named SerRecSimHash, is proposed in this paper. Finally, through a set of experiments deployed on a real distributed service quality dataset WS-DREAM, we validate the feasibility of our proposal in terms of recommendation accuracy and efficiency while guaranteeing privacy-preservation.

  8. Multiple-collision model for pion production in relativistic nucleus-nucleus collisions

    International Nuclear Information System (INIS)

    Vary, J.P.

    1978-01-01

    A simple model for pion production in relativistic heavy-ion collisions is developed based on nucleon-nucleon data, nuclear density distribution, and the assumption of straight-line trajectories. Multiplicity distributions for total pion production and for negative-pion production are predicted for 40 Ar incident on a Pb 3 O 4 target at 1.8 GeV/nucleon. Production through intermediate baryon resonances reduces the high-multiplicity region but insufficiently to yield agreement with data. This implies the need for a coherent production mechanism

  9. Ultrarelativistic atomic collisions

    International Nuclear Information System (INIS)

    Bottcher, C.; Strayer, M.R.

    1991-01-01

    Calculations of the coherent production of free pairs and of pair production with electron capture from ultrarelativistic ion-ion collisions are discussed. Theory and experiment are contrasted, with some conjectures on the possibility of new phenomena. 29 refs., 5 figs., 1 tab

  10. MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

    DEFF Research Database (Denmark)

    Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian

    2016-01-01

    and cryptographic hash functions is to reconsider and simplify the round function of the Knudsen-Nyberg cipher from 1995. The mapping F(x) := x3 is used as the main component there and is also the main component of our family of proposals called “MiMC”. We study various attack vectors for this construction and give...... a new attack vector that outperforms others in relevant settings. Due to its very low number of multiplications, the design lends itself well to a large class of applications, especially when the depth does not matter but the total number of multiplications in the circuit dominates all aspects...

  11. Forecasting with Option-Implied Information

    DEFF Research Database (Denmark)

    Christoffersen, Peter; Jacobs, Kris; Chang, Bo Young

    2013-01-01

    This chapter surveys the methods available for extracting information from option prices that can be used in forecasting. We consider option-implied volatilities, skewness, kurtosis, and densities. More generally, we discuss how any forecasting object that is a twice differentiable function...... of the future realization of the underlying risky asset price can utilize option-implied information in a well-defined manner. Going beyond the univariate option-implied density, we also consider results on option-implied covariance, correlation and beta forecasting, as well as the use of option......-implied information in cross-sectional forecasting of equity returns. We discuss how option-implied information can be adjusted for risk premia to remove biases in forecasting regressions....

  12. Revisiting the long memory dynamics of implied-realized volatility relation: A new evidence from wavelet band spectrum regression

    OpenAIRE

    Barunik, Jozef; Barunikova, Michaela

    2015-01-01

    This paper revisits the fractional co-integrating relationship between ex-ante implied volatility and ex-post realized volatility. Previous studies on stock index options have found biases and inefficiencies in implied volatility as a forecast of future volatility. It is argued that the concept of corridor implied volatility (CIV) should be used instead of the popular model-free option-implied volatility (MFIV) when assessing the relation as the latter may introduce bias to the estimation. In...

  13. MATCHING AERIAL IMAGES TO 3D BUILDING MODELS BASED ON CONTEXT-BASED GEOMETRIC HASHING

    Directory of Open Access Journals (Sweden)

    J. Jung

    2016-06-01

    Full Text Available In this paper, a new model-to-image framework to automatically align a single airborne image with existing 3D building models using geometric hashing is proposed. As a prerequisite process for various applications such as data fusion, object tracking, change detection and texture mapping, the proposed registration method is used for determining accurate exterior orientation parameters (EOPs of a single image. This model-to-image matching process consists of three steps: 1 feature extraction, 2 similarity measure and matching, and 3 adjustment of EOPs of a single image. For feature extraction, we proposed two types of matching cues, edged corner points representing the saliency of building corner points with associated edges and contextual relations among the edged corner points within an individual roof. These matching features are extracted from both 3D building and a single airborne image. A set of matched corners are found with given proximity measure through geometric hashing and optimal matches are then finally determined by maximizing the matching cost encoding contextual similarity between matching candidates. Final matched corners are used for adjusting EOPs of the single airborne image by the least square method based on co-linearity equations. The result shows that acceptable accuracy of single image's EOP can be achievable by the proposed registration approach as an alternative to labour-intensive manual registration process.

  14. MULTIMEDIA DATA TRANSMISSION THROUGH TCP/IP USING HASH BASED FEC WITH AUTO-XOR SCHEME

    OpenAIRE

    R. Shalin; D. Kesavaraja

    2012-01-01

    The most preferred mode for communication of multimedia data is through the TCP/IP protocol. But on the other hand the TCP/IP protocol produces huge packet loss unavoidable due to network traffic and congestion. In order to provide a efficient communication it is necessary to recover the loss of packets. The proposed scheme implements Hash based FEC with auto XOR scheme for this purpose. The scheme is implemented through Forward error correction, MD5 and XOR for providing efficient transmissi...

  15. New parameter-free polarization potentials in low-energy positron collisions

    Science.gov (United States)

    Jain, Ashok

    1990-01-01

    The polarization potential plays a decisive role in shaping up the cross sections in low energy positron collisions with atoms and molecules. However, its inclusion without involving any adjustable parameter, is still a challenge. Various other techniques employed so far for positron collisions are summarized, and a new, nonadjustable and very simple form of the polarization potential for positron-atom (molecule) collisions below the threshold of positronium formation is discussed. This new recently proposed potential is based on the correlation energy of a single positron in a homogeneous electron gas. The correlation energy was calculated by solving the Schrodinger equation of the positron-electron system and fitted to an analytical form in various ranges of the density parameter. In the outside region, the correlation energy is joined smoothly with the correct asymptotic form. This new positron correlation polarization (PCOP) potential was tested on several atomic and molecular targets such as the Ar, CO, and CH4. The results on the total and differential cross sections on these targets are shown along with the experimental data where available.

  16. Universal pion freeze-out in heavy-ion collisions.

    Science.gov (United States)

    Adamová, D; Agakichiev, G; Appelshäuser, H; Belaga, V; Braun-Munzinger, P; Castillo, A; Cherlin, A; Damjanović, S; Dietel, T; Dietrich, L; Drees, A; Esumi, S I; Filimonov, K; Fomenko, K; Fraenkel, Z; Garabatos, C; Glässel, P; Hering, G; Holeczek, J; Kushpil, V; Lenkeit, B; Ludolphs, W; Maas, A; Marín, A; Milosević, J; Milov, A; Miśkowiec, D; Panebrattsev, Yu; Petchenova, O; Petrácek, V; Pfeiffer, A; Rak, J; Ravinovich, I; Rehak, P; Sako, H; Schmitz, W; Schukraft, J; Sedykh, S; Shimansky, S; Slívová, J; Specht, H J; Stachel, J; Sumbera, M; Tilsner, H; Tserruya, I; Wessels, J P; Wienold, T; Windelband, B; Wurm, J P; Xie, W; Yurevich, S; Yurevich, V

    2003-01-17

    Based on an evaluation of data on pion interferometry and on particle yields at midrapidity, we propose a universal condition for thermal freeze-out of pions in heavy-ion collisions. We show that freeze-out occurs when the mean free path of pions lambda(f) reaches a value of about 1 fm, which is much smaller than the spatial extent of the system at freeze-out. This critical mean free path is independent of the centrality of the collision and beam energy from the Alternating Gradient Synchrotron to the Relativistic Heavy Ion Collider.

  17. Contact discontinuities in a cold collision-free two-beam plasma

    Science.gov (United States)

    Kirkland, K. B.; Sonnerup, B. U. O.

    1982-01-01

    The structure of contact discontinuities in a collision-free plasma is examined using a model of a plasma which consists of two oppositely directed cold ion beams and a background of cold massless electrons such that exact charge neutrality is maintained and that the electric field is zero. The basic equations describing self-consistent equilibria are obtained for the more general situation where a net flow across the layer takes place and where the magnetic field has two nonzero tangential components but where the electric field remains zero. These equations are then specialized to the case of no net plasma flow where one of the tangential components is zero, and four different classes of sheets are obtained, all having thickness the order of the ion inertial length. The first class is for layers separating two identical plasma and magnetic field regions, the second is for an infinite array of parallel layers producing an undulated magnetic field, the third is for layers containing trapped ions in closed orbits which separate two vacuum regions with uniform identical magnetic fields, and the fourth is for layers which reflect a single plasma beam, leaving a vacuum with a reversed and compressed tangential field on the other side.

  18. Deep sub-threshold ϕ production in Au+Au collisions

    Science.gov (United States)

    Adamczewski-Musch, J.; Arnold, O.; Behnke, C.; Belounnas, A.; Belyaev, A.; Berger-Chen, J. C.; Biernat, J.; Blanco, A.; Blume, C.; Böhmer, M.; Bordalo, P.; Chernenko, S.; Chlad, L.; Deveaux, C.; Dreyer, J.; Dybczak, A.; Epple, E.; Fabbietti, L.; Fateev, O.; Filip, P.; Fonte, P.; Franco, C.; Friese, J.; Fröhlich, I.; Galatyuk, T.; Garzón, J. A.; Gernhäuser, R.; Golubeva, M.; Greifenhagen, R.; Guber, F.; Gumberidze, M.; Harabasz, S.; Heinz, T.; Hennino, T.; Hlavac, S.; Höhne, C.; Holzmann, R.; Ierusalimov, A.; Ivashkin, A.; Kämpfer, B.; Karavicheva, T.; Kardan, B.; Koenig, I.; Koenig, W.; Kolb, B. W.; Korcyl, G.; Kornakov, G.; Kotte, R.; Kühn, W.; Kugler, A.; Kunz, T.; Kurepin, A.; Kurilkin, A.; Kurilkin, P.; Ladygin, V.; Lalik, R.; Lapidus, K.; Lebedev, A.; Lopes, L.; Lorenz, M.; Mahmoud, T.; Maier, L.; Mangiarotti, A.; Markert, J.; Maurus, S.; Metag, V.; Michel, J.; Mihaylov, D. M.; Morozov, S.; Müntz, C.; Münzer, R.; Naumann, L.; Nowakowski, K. N.; Palka, M.; Parpottas, Y.; Pechenov, V.; Pechenova, O.; Petukhov, O.; Pietraszko, J.; Przygoda, W.; Ramos, S.; Ramstein, B.; Reshetin, A.; Rodriguez-Ramos, P.; Rosier, P.; Rost, A.; Sadovsky, A.; Salabura, P.; Scheib, T.; Schuldes, H.; Schwab, E.; Scozzi, F.; Seck, F.; Sellheim, P.; Siebenson, J.; Silva, L.; Sobolev, Yu. G.; Spataro, S.; Ströbele, H.; Stroth, J.; Strzempek, P.; Sturm, C.; Svoboda, O.; Szala, M.; Tlusty, P.; Traxler, M.; Tsertos, H.; Usenko, E.; Wagner, V.; Wendisch, C.; Wiebusch, M. G.; Wirth, J.; Zanevsky, Y.; Zumbruch, P.; Hades Collaboration

    2018-03-01

    We present data on charged kaons (K±) and ϕ mesons in Au(1.23A GeV)+Au collisions. It is the first simultaneous measurement of K- and ϕ mesons in central heavy-ion collisions below a kinetic beam energy of 10A GeV. The ϕ /K- multiplicity ratio is found to be surprisingly high with a value of 0.52 ± 0.16 and shows no dependence on the centrality of the collision. Consequently, the different slopes of the K+ and K- transverse-mass spectra can be explained solely by feed-down, which substantially softens the spectra of K- mesons. Hence, in contrast to the commonly adapted argumentation in literature, the different slopes do not necessarily imply diverging freeze-out temperatures of K+ and K- mesons caused by different couplings to baryons.

  19. Collision-Avoidance Characteristics of Grasping. Early Signs in Hand and Arm Kinematics

    NARCIS (Netherlands)

    Lommertzen, J.; Costa e Silva, E.; Meulenbroek, R.G.J.

    2009-01-01

    Grasping an object successfully implies avoiding colliding into it before the hand is closed around the object. The present study focuses on prehension kinematics that typically reflect collision-avoidance characteristics of grasping movements. Twelve participants repeatedly grasped

  20. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  1. Forecasting the density of oil futures returns using model-free implied volatility and high-frequency data

    International Nuclear Information System (INIS)

    Ielpo, Florian; Sevi, Benoit

    2013-09-01

    Forecasting the density of returns is useful for many purposes in finance, such as risk management activities, portfolio choice or derivative security pricing. Existing methods to forecast the density of returns either use prices of the asset of interest or option prices on this same asset. The latter method needs to convert the risk-neutral estimate of the density into a physical measure, which is computationally cumbersome. In this paper, we take the view of a practitioner who observes the implied volatility under the form of an index, namely the recent OVX, to forecast the density of oil futures returns for horizons going from 1 to 60 days. Using the recent methodology in Maheu and McCurdy (2011) to compute density predictions, we compare the performance of time series models using implied volatility and either daily or intra-daily futures prices. Our results indicate that models based on implied volatility deliver significantly better density forecasts at all horizons, which is in line with numerous studies delivering the same evidence for volatility point forecast. (authors)

  2. SEMANTIC SEGMENTATION OF BUILDING ELEMENTS USING POINT CLOUD HASHING

    Directory of Open Access Journals (Sweden)

    M. Chizhova

    2018-05-01

    Full Text Available For the interpretation of point clouds, the semantic definition of extracted segments from point clouds or images is a common problem. Usually, the semantic of geometrical pre-segmented point cloud elements are determined using probabilistic networks and scene databases. The proposed semantic segmentation method is based on the psychological human interpretation of geometric objects, especially on fundamental rules of primary comprehension. Starting from these rules the buildings could be quite well and simply classified by a human operator (e.g. architect into different building types and structural elements (dome, nave, transept etc., including particular building parts which are visually detected. The key part of the procedure is a novel method based on hashing where point cloud projections are transformed into binary pixel representations. A segmentation approach released on the example of classical Orthodox churches is suitable for other buildings and objects characterized through a particular typology in its construction (e.g. industrial objects in standardized enviroments with strict component design allowing clear semantic modelling.

  3. Universal pion freeze-out in heavy-ion collisions

    CERN Document Server

    Adamova, D; Appelshäuser, H; Belaga, V; Braun-Munzinger, P; Castillo, A; Cherlin, A; Damjanovic, S; Dietel, T; Dietrich, L; Drees, A; Esumi, S I; Filimonov, K; Fomenko, K; Fraenkel, Zeev; Garabatos, C; Glässel, P; Hering, G; Holeczek, J; Kushpil, V; Lenkeit, B C; Ludolphs, W; Maas, A; Marin, A; Milosevic, J; Milov, A; Miskowiec, D; Panebratsev, Yu A; Petchenova, O Yu; Petracek, V; Pfeiffer, A; Rak, J; Ravinovich, I; Rehak, P; Sako, H; Schükraft, Jürgen; Sedykh, S; Shimansky, S S; Slivova, J; Specht, H J; Stachel, J; Sumbera, M; Tilsner, H; Tserruya, Itzhak; Wessels, J P; Wienold, T; Windelband, B; Wurm, J P; Xie, W; Yurevich, S; Yurevich, V; Schmitz, W

    2003-01-01

    Based on an evaluation of recent systematic data on two-pion interferometry and on measured particle yields at mid-rapidity, we propose a universal condition for thermal freeze-out of pions in heavy-ion collisions. We show that freeze-out occurs when the mean free path of pions lambda_f reaches a value of approximately 2.5 fm, which is much smaller than the spatial extent of the system at freeze-out. This critical mean free path is independent of the centrality of the collision and its value is constant at all currently available beam energies from AGS to RHIC.

  4. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  5. Laser Assisted Free-Free Transition in Electron - Atom Collision

    Science.gov (United States)

    Sinha, C.; Bhatia, A. K.

    2011-01-01

    Free-free transition is studied for electron-Hydrogen atom system in ground state at very low incident energies in presence of an external homogeneous, monochromatic and linearly polarized laser field. The incident electron is considered to be dressed by the laser in a non perturbative manner by choosing the Volkov solutions in both the channels. The space part of the scattering wave function for the electron is solved numerically by taking into account the effect of electron exchange, short range as well as of the long range interactions. Laser assisted differential as well as elastic total cross sections are calculated for single photon absorption/emission in the soft photon limit, the laser intensity being much less than the atomic field intensity. A strong suppression is noted in the laser assisted cross sections as compared to the field free situations. Significant difference is noted in the singlet and the triplet cross sections.

  6. Matching Aerial Images to 3D Building Models Using Context-Based Geometric Hashing

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-06-01

    Full Text Available A city is a dynamic entity, which environment is continuously changing over time. Accordingly, its virtual city models also need to be regularly updated to support accurate model-based decisions for various applications, including urban planning, emergency response and autonomous navigation. A concept of continuous city modeling is to progressively reconstruct city models by accommodating their changes recognized in spatio-temporal domain, while preserving unchanged structures. A first critical step for continuous city modeling is to coherently register remotely sensed data taken at different epochs with existing building models. This paper presents a new model-to-image registration method using a context-based geometric hashing (CGH method to align a single image with existing 3D building models. This model-to-image registration process consists of three steps: (1 feature extraction; (2 similarity measure; and matching, and (3 estimating exterior orientation parameters (EOPs of a single image. For feature extraction, we propose two types of matching cues: edged corner features representing the saliency of building corner points with associated edges, and contextual relations among the edged corner features within an individual roof. A set of matched corners are found with given proximity measure through geometric hashing, and optimal matches are then finally determined by maximizing the matching cost encoding contextual similarity between matching candidates. Final matched corners are used for adjusting EOPs of the single airborne image by the least square method based on collinearity equations. The result shows that acceptable accuracy of EOPs of a single image can be achievable using the proposed registration approach as an alternative to a labor-intensive manual registration process.

  7. Effective collision frequency of electrons in noble gases

    International Nuclear Information System (INIS)

    Baille, P.; Chang, J.-S.; Claude, A.; Yau, A.W.; Hobson, R.M.; Ogram, G.L.

    1981-01-01

    The electron-neutral collision frequency in the noble gases has been calculated using recent numerical results for momentum transfer cross sections by assuming a Maxwellian distribution of electron velocities. In all these gases, except for argon, good agreement is obtained with most previously published experimental and theoretical data. Mean free path, mobilities and diffusion coefficients are also calculated from the resulting effective collision frequencies. The empirical formulae are presented for an electron temperature dependence of the electron-neutral collision frequency for all noble gases up to Tsub(e) < approximately 25.000 K. (author)

  8. A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption

    Directory of Open Access Journals (Sweden)

    Aswin Wibisurya

    2014-12-01

    Full Text Available Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate validator on the client computer and a certificate generator on the server. The certificate validator integrity is protected using hashing result while all communications are encrypted using asymmetrical encryption to ensure the security of this approach.

  9. Comparison of Various Similarity Measures for Average Image Hash in Mobile Phone Application

    Science.gov (United States)

    Farisa Chaerul Haviana, Sam; Taufik, Muhammad

    2017-04-01

    One of the main issue in Content Based Image Retrieval (CIBR) is similarity measures for resulting image hashes. The main key challenge is to find the most benefits distance or similarity measures for calculating the similarity in term of speed and computing costs, specially under limited computing capabilities device like mobile phone. This study we utilize twelve most common and popular distance or similarity measures technique implemented in mobile phone application, to be compared and studied. The results show that all similarity measures implemented in this study was perform equally under mobile phone application. This gives more possibilities for method combinations to be implemented for image retrieval.

  10. Probabilistic Analysis of Collision Damages with Application to ro-Ro Passenger Vessels

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup; Hansen, Peter Friis; Nielsen, Lars Peter

    1997-01-01

    To quantify the risks involved in Ro-ro passenger vessel traffic, rational criteria for prediction and evaluation of collision accidents have to be developed. This implies that probabilities as well as the inherent consequences have to be analyzed and assessed.The present report outlines a method...... for evaluation of the probability of a Ro-Ro passenger vessel on a given route being struck by another ship. Given a collision has taken place the spatial distribution of the collision damages is calculated. Results are presented in terms of probability distributions, for indentation depth, length and height...... of the holes and for the vertical location. The main benefit of the formulated procedure is that it allows comparisons of various navigation routes by assessing the relative frequencies of collisions. The derived procedure is applied to two typical Ro-Ro passenger vessel routes....

  11. Cryptanalysis of MDC-2

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mendel, Florian; Rechberger, Christian

    2009-01-01

    We provide a collision attack and preimage attacks on the MDC-2 construction, which is a method (dating back to 1988) of turning an $n$-bit block cipher into a $2n$-bit hash function. The collision attack is the first below the birthday bound to be described for MDC-2 and, with $n=128$, it has co...

  12. Formation of heavy quarks in ultrarelativistic heavy-ion collisions

    International Nuclear Information System (INIS)

    Schneider, S.M.; Greiner, W.; Soff, G.

    1992-02-01

    We investigate the production of heavy quarks in continuum and bound states in nuclear collisions. Creation for free banti b and tanti t quark pairs and for bottomonium and toponium in the ground state are computed at RHIC, LHC and SSC energies. Central and peripheral heavy-ion collisions are discussed. For top quark creation we assumed a mass range of 90 GeV ≤ m t ≤ 250 GeV. The creation rate for top quarks on peripheral collisions is estimated to be by a factor 40 to 130 smaller compared with corresponding central collisions. For m t = 130 GeV we calculated a creation rate of about 4760 top quark pairs per day at the LHC (3.5 TeV/u) for Pb-Pb collisions. (orig.)

  13. MULTIMEDIA DATA TRANSMISSION THROUGH TCP/IP USING HASH BASED FEC WITH AUTO-XOR SCHEME

    Directory of Open Access Journals (Sweden)

    R. Shalin

    2012-09-01

    Full Text Available The most preferred mode for communication of multimedia data is through the TCP/IP protocol. But on the other hand the TCP/IP protocol produces huge packet loss unavoidable due to network traffic and congestion. In order to provide a efficient communication it is necessary to recover the loss of packets. The proposed scheme implements Hash based FEC with auto XOR scheme for this purpose. The scheme is implemented through Forward error correction, MD5 and XOR for providing efficient transmission of multimedia data. The proposed scheme provides transmission high accuracy, throughput and low latency and loss.

  14. p-p minimum-bias dijets and nonjet quadrupole in relation to conjectured collectivity (flows in high-energy nuclear collisions

    Directory of Open Access Journals (Sweden)

    Trainor Thomas A.

    2016-01-01

    Full Text Available Recent observations of ridge-like structure in p-p and p-A angular correlations at the RHIC and LHC have been interpreted to imply collective motion in smaller collision systems. It is argued that if correlation structures accepted as manifestations of flow in A-A collisions appear in smaller systems collectivity (flow must extend to the smaller systems. But the argument could be reversed to conclude that such structures appearing in A-A collisions may not imply hydrodynamic flow. I present spectrum, correlation and fluctuation data from RHIC p-p and Au-Au collisions and p-p, p-Pb and Pb-Pb results from the LHC described accurately by a two-component (soft+dijet model of hadron production. I also present evidence for a significant p-p nonjet (NJ quadrupole (v2 component with nch systematics directly related to A-A NJ quadrupole systematics. The combination suggests that soft, dijet and NJ quadrupole com- ponents are distinct phenomena in all cases, inconsistent with hadron production from a common bulk medium exhibiting collective motion (flow.

  15. Two- and Multi-particle Azimuthal Correlations in Small Collision Systems with the ATLAS Detector

    CERN Document Server

    Trzupek, Adam; The ATLAS collaboration

    2017-01-01

    ATLAS measurements of two-particle correlations in $\\Delta\\phi$ and $\\Delta\\eta$ are presented for $pp$ collisions at 2.76, 5.02 and 13~TeV, and for $p$+Pb collisions at 5.02 TeV. A template fitting procedure is used to subtract the dijet contribution and to extract the genuine long-range ridge correlations. This template procedure was previously used for 2.76 TeV and 13 TeV pp collisions, but is now extended to pp and $p$+Pb collisions at 5.02 TeV. In all collision systems, the ridge correlations are shown to be present even in events with a low multiplicity of produced particles, implying that the long-range correlations are not unique to rare high-multiplicity events. The properties of the correlation are shown to exhibit only a weak energy dependence and are remarkably similar to that observed in $p$+Pb collisions. Another new aspect of this talk is a detailed study of ridge properties in collisions containing hard processes, characterized by large four-momentum transfer. This may help answering the quest...

  16. Paradeisos: A perfect hashing algorithm for many-body eigenvalue problems

    Science.gov (United States)

    Jia, C. J.; Wang, Y.; Mendl, C. B.; Moritz, B.; Devereaux, T. P.

    2018-03-01

    We describe an essentially perfect hashing algorithm for calculating the position of an element in an ordered list, appropriate for the construction and manipulation of many-body Hamiltonian, sparse matrices. Each element of the list corresponds to an integer value whose binary representation reflects the occupation of single-particle basis states for each element in the many-body Hilbert space. The algorithm replaces conventional methods, such as binary search, for locating the elements of the ordered list, eliminating the need to store the integer representation for each element, without increasing the computational complexity. Combined with the "checkerboard" decomposition of the Hamiltonian matrix for distribution over parallel computing environments, this leads to a substantial savings in aggregate memory. While the algorithm can be applied broadly to many-body, correlated problems, we demonstrate its utility in reducing total memory consumption for a series of fermionic single-band Hubbard model calculations on small clusters with progressively larger Hilbert space dimension.

  17. Studies of fluctuation processes in nuclear collisions

    International Nuclear Information System (INIS)

    Ayik, S.

    1992-02-01

    This report discusses the following topics: Relativistic Boltzmann-Langevin model for heavy-ion collision; K+ production far below free neucleon-nucleon threshold and damping of collective vibrations in a memory-dependent transport model

  18. Vertebrate Fossils Imply Paleo-elevations of the Tibetan Plateau

    Science.gov (United States)

    Deng, T.; Wang, X.; Li, Q.; Wu, F.; Wang, S.; Hou, S.

    2017-12-01

    The uplift of the Tibetan Plateau remains unclear, and its paleo-elevation reconstructions are crucial to interpret the geodynamic evolution and to understand the climatic changes in Asia. Uplift histories of the Tibetan Plateau based on different proxies differ considerably, and two viewpoints are pointedly opposing on the paleo-elevation estimations of the Tibetan Plateau. One viewpoint is that the Tibetan Plateau did not strongly uplift to reach its modern elevation until the Late Miocene, but another one, mainly based on stable isotopes, argues that the Tibetan Plateau formed early during the Indo-Asian collision and reached its modern elevation in the Paleogene or by the Middle Miocene. In 1839, Hugh Falconer firstly reported some rhinocerotid fossils collected from the Zanda Basin in Tibet, China and indicated that the Himalayas have uplifted by more than 2,000 m since several million years ago. In recent years, the vertebrate fossils discovered from the Tibetan Plateau and its surrounding areas implied a high plateau since the late Early Miocene. During the Oligocene, giant rhinos lived in northwestern China to the north of the Tibetan Plateau, while they were also distributed in the Indo-Pakistan subcontinent to the south of this plateau, which indicates that the elevation of the Tibetan Plateau was not too high to prevent exchanges of large mammals; giant rhinos, the rhinocerotid Aprotodon, and chalicotheres still dispersed north and south of "Tibetan Plateau". A tropical-subtropical lowland fish fauna was also present in the central part of this plateau during the Late Oligocene, in which Eoanabas thibetana was inferred to be closely related to extant climbing perches from South Asia and Sub-Saharan Africa. In contrast, during the Middle Miocene, the shovel-tusked elephant Platybelodon was found from many localities north of the Tibetan Plateau, while its trace was absent in the Siwaliks of the subcontinent, which implies that the Tibetan Plateau had

  19. 32 CFR 634.8 - Implied consent.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Implied consent. 634.8 Section 634.8 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Driving Privileges § 634.8 Implied consent. (a) Implied consent to blood, breath, or urine tests....

  20. Collision-free motion coordination of heterogeneous robots

    Energy Technology Data Exchange (ETDEWEB)

    Ko, Nak Yong [Chosun University, Gwangju (Korea, Republic of); Seo, Dong Jin [RedOne Technologies, Gwangju (Korea, Republic of); Simmons, Reid G. [Carnegie Mellon University, Pennsylvania (United States)

    2008-11-15

    This paper proposes a method to coordinate the motion of multiple heterogeneous robots on a network. The proposed method uses prioritization and avoidance. Priority is assigned to each robot; a robot with lower priority avoids the robots of higher priority. To avoid collision with other robots, elastic force and potential field force are used. Also, the method can be applied separately to the motion planning of a part of a robot from that of the other parts of the robot. This is useful for application to the robots of the type mobile manipulator or highly redundant robots. The method is tested by simulation, and it results in smooth and adaptive coordination in an environment with multiple heterogeneous robots

  1. Collision-free motion coordination of heterogeneous robots

    International Nuclear Information System (INIS)

    Ko, Nak Yong; Seo, Dong Jin; Simmons, Reid G.

    2008-01-01

    This paper proposes a method to coordinate the motion of multiple heterogeneous robots on a network. The proposed method uses prioritization and avoidance. Priority is assigned to each robot; a robot with lower priority avoids the robots of higher priority. To avoid collision with other robots, elastic force and potential field force are used. Also, the method can be applied separately to the motion planning of a part of a robot from that of the other parts of the robot. This is useful for application to the robots of the type mobile manipulator or highly redundant robots. The method is tested by simulation, and it results in smooth and adaptive coordination in an environment with multiple heterogeneous robots

  2. The dynamic conditional relationship between stock market returns and implied volatility

    Science.gov (United States)

    Park, Sung Y.; Ryu, Doojin; Song, Jeongseok

    2017-09-01

    Using the dynamic conditional correlation multivariate generalized autoregressive conditional heteroskedasticity (DCC-MGARCH) model, we empirically examine the dynamic relationship between stock market returns (KOSPI200 returns) and implied volatility (VKOSPI), as well as their statistical mechanics, in the Korean market, a representative and leading emerging market. We consider four macroeconomic variables (exchange rates, risk-free rates, term spreads, and credit spreads) as potential determinants of the dynamic conditional correlation between returns and volatility. Of these macroeconomic variables, the change in exchange rates has a significant impact on the dynamic correlation between KOSPI200 returns and the VKOSPI, especially during the recent financial crisis. We also find that the risk-free rate has a marginal effect on this dynamic conditional relationship.

  3. Search for Exotic Strange Dibaryon in Relativistic Heavy Ion Collisions

    Institute of Scientific and Technical Information of China (English)

    GAOChong-Shou

    2003-01-01

    The exotic strange dibaryon particle (ΩΩ)0+ with S = -6 can be produced in relativistic heavy ion collisions. The yields of this kind of exotic strange dibaryon particles can increase signitlcantly soon as the formation of QGP does exhibit after the collision. If there is no phase transition after the collision, the upper bound of the production of this diomega can be estimated from the free hadronic gas model for nuclear matter. The relative yield ratio of diomega to deuteron is less than 0.000205, this means that if there is no QGP creation it is difficult to observe the production of diomega in relativistic heavy ion collisions.

  4. The first collision for full SHA-1

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); E. Bursztein (Elie); P. Karpman (Pierre); A. Albertini (Ange); Y. Markov (Yarik)

    2017-01-01

    textabstractSHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses and theoretical attacks. Despite its deprecation, SHA-1 remains widely used in 2017 for document

  5. Dissipative binary collisions

    International Nuclear Information System (INIS)

    Aboufirassi, M; Angelique, J.C.; Bizard, G.; Bougault, R.; Brou, R.; Buta, A.; Colin, J.; Cussol, D.; Durand, D.; Genoux-Lubain, A.; Horn, D.; Kerambrun, A.; Laville, J.L.; Le Brun, C.; Lecolley, J.F.; Lefebvres, F.; Lopez, O.; Louvel, M.; Meslin, C.; Metivier, V.; Nakagawa, T.; Peter, J.; Popescu, R.; Regimbart, R.; Steckmeyer, J.C.; Tamain, B.; Vient, E.; Wieloch, A.; Yuasa-Nakagawa, K.

    1998-01-01

    The binary character of the heavy ion collisions at intermediate energies in the exit channel has been observed under 30 MeV/n in medium and heavy systems. Measurements in light systems at energies approaching ∼ 100 MeV/nucleon as well as in very heavy systems have allowed to extend considerably the investigations of this binary process. Thus, the study of the Pb + Au system showed that the complete charge events indicated two distinct sources: the quasi-projectile and the quasi-target. The characteristics of these two sources are rather well reproduced by a trajectory computation which takes into account the Coulomb and nuclear forces and the friction appearing from the projectile-target interaction. The Wilczynski diagram is used to probe the correlation between the kinetic energy quenching and the deflecting angle. In case of the system Pb + Au at 29 MeV/nucleon the diagram indicate dissipative binary collisions typical for low energies. This binary aspect was also detected in the systems Xe + Ag at 44 MeV/nucleon, 36 Ar + 27 Al and 64 Zn + nat Ti. Thus, it was possible to reconstruct the quasi-projectile and to study its mass and excitation energy evolution as a function of the impact parameter. The dissipative binary collisions represent for the systems and energies under considerations the main contribution to the cross section. This does not implies that there are not other processes; particularly, the more or less complete fusion is also observed but with a low cross section which decreases with the increase of bombardment energy. More exclusive measurements with the INDRA detector on quasi-symmetric systems as Ar + KCl and Xe + Sn seem to confirm the importance of the binary collisions. The two source reconstruction of the Xe + Sn data at 50 MeV/nucleon reproduces the same behaviour as that observed in the system Pb + Au at 29 MeV/nucleon

  6. Effect of free-particle collisions in high energy proton and pion-induced nuclear reactions

    International Nuclear Information System (INIS)

    Jacob, N.P. Jr.

    1975-07-01

    The effect of free-particle collisions in simple ''knockout'' reactions of the form (a,aN) and in more complex nuclear reactions of the form (a,X) was investigated by using protons and pions. Cross sections for the 48 Ti(p,2p) 47 Sc and the 74 Ge(p,2p) 73 Ga reactions were measured from 0.3 to 4.6 GeV incident energy. The results indicate a rise in (p,2p) cross section for each reaction of about (25 +- 3) percent between the energies 0.3 and 1.0 GeV, and are correlated to a large increase in the total free-particle pp scattering cross sections over the same energy region. Results are compared to previous (p,2p) excitation functions in the GeV energy region and to (p,2p) cross section calculations based on a Monte Carlo intranuclear cascade-evaporation model. Cross section measurements for (π/sup +-/, πN) and other more complex pion-induced spallation reactions were measured for the light target nuclei 14 N, 16 O, and 19 F from 45 to 550 MeV incident pion energy. These measurements indicate a broad peak in the excitation functions for both (π,πN) and (π,X) reactions near 180 MeV incident energy. This corresponds to the large resonances observed in the free-particle π + p and π - p cross sections at the same energy. Striking differences in (π,πN) cross section magnitudes are observed among the light nuclei targets. The experimental cross section ratio sigma(π - ,π - n)/sigma(π + ,πN) at 180 MeV is 1.7 +- 0.2 for all three targets. The experimental results are compared to previous pion and analogous proton-induced reactions, to Monte Carlo intranuclear cascade-evaporation calculations, and to a semi-classical nucleon charge exchange model. (108 references) (auth)

  7. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  8. A rear-end collision risk assessment model based on drivers' collision avoidance process under influences of cell phone use and gender-A driving simulator based study.

    Science.gov (United States)

    Li, Xiaomeng; Yan, Xuedong; Wu, Jiawei; Radwan, Essam; Zhang, Yuting

    2016-12-01

    Driver's collision avoidance performance has a direct link to the collision risk and crash severity. Previous studies demonstrated that the distracted driving, such as using a cell phone while driving, disrupted the driver's performance on road. This study aimed to investigate the manner and extent to which cell phone use and driver's gender affected driving performance and collision risk in a rear-end collision avoidance process. Forty-two licensed drivers completed the driving simulation experiment in three phone use conditions: no phone use, hands-free, and hand-held, in which the drivers drove in a car-following situation with potential rear-end collision risks caused by the leading vehicle's sudden deceleration. Based on the experiment data, a rear-end collision risk assessment model was developed to assess the influence of cell phone use and driver's gender. The cell phone use and driver's gender were found to be significant factors that affected the braking performances in the rear-end collision avoidance process, including the brake reaction time, the deceleration adjusting time and the maximum deceleration rate. The minimum headway distance between the leading vehicle and the simulator during the rear-end collision avoidance process was the final output variable, which could be used to measure the rear-end collision risk and judge whether a collision occurred. The results showed that although cell phone use drivers took some compensatory behaviors in the collision avoidance process to reduce the mental workload, the collision risk in cell phone use conditions was still higher than that without the phone use. More importantly, the results proved that the hands-free condition did not eliminate the safety problem associated with distracted driving because it impaired the driving performance in the same way as much as the use of hand-held phones. In addition, the gender effect indicated that although female drivers had longer reaction time than male drivers in

  9. Autonomous Collision-Free Navigation of Microvehicles in Complex and Dynamically Changing Environments.

    Science.gov (United States)

    Li, Tianlong; Chang, Xiaocong; Wu, Zhiguang; Li, Jinxing; Shao, Guangbin; Deng, Xinghong; Qiu, Jianbin; Guo, Bin; Zhang, Guangyu; He, Qiang; Li, Longqiu; Wang, Joseph

    2017-09-26

    Self-propelled micro- and nanoscale robots represent a rapidly emerging and fascinating robotics research area. However, designing autonomous and adaptive control systems for operating micro/nanorobotics in complex and dynamically changing environments, which is a highly demanding feature, is still an unmet challenge. Here we describe a smart microvehicle for precise autonomous navigation in complicated environments and traffic scenarios. The fully autonomous navigation system of the smart microvehicle is composed of a microscope-coupled CCD camera, an artificial intelligence planner, and a magnetic field generator. The microscope-coupled CCD camera provides real-time localization of the chemically powered Janus microsphere vehicle and environmental detection for path planning to generate optimal collision-free routes, while the moving direction of the microrobot toward a reference position is determined by the external electromagnetic torque. Real-time object detection offers adaptive path planning in response to dynamically changing environments. We demonstrate that the autonomous navigation system can guide the vehicle movement in complex patterns, in the presence of dynamically changing obstacles, and in complex biological environments. Such a navigation system for micro/nanoscale vehicles, relying on vision-based close-loop control and path planning, is highly promising for their autonomous operation in complex dynamic settings and unpredictable scenarios expected in a variety of realistic nanoscale scenarios.

  10. Energy-exchange collisions of dark-bright-bright vector solitons.

    Science.gov (United States)

    Radhakrishnan, R; Manikandan, N; Aravinthan, K

    2015-12-01

    We find a dark component guiding the practically interesting bright-bright vector one-soliton to two different parametric domains giving rise to different physical situations by constructing a more general form of three-component dark-bright-bright mixed vector one-soliton solution of the generalized Manakov model with nine free real parameters. Moreover our main investigation of the collision dynamics of such mixed vector solitons by constructing the multisoliton solution of the generalized Manakov model with the help of Hirota technique reveals that the dark-bright-bright vector two-soliton supports energy-exchange collision dynamics. In particular the dark component preserves its initial form and the energy-exchange collision property of the bright-bright vector two-soliton solution of the Manakov model during collision. In addition the interactions between bound state dark-bright-bright vector solitons reveal oscillations in their amplitudes. A similar kind of breathing effect was also experimentally observed in the Bose-Einstein condensates. Some possible ways are theoretically suggested not only to control this breathing effect but also to manage the beating, bouncing, jumping, and attraction effects in the collision dynamics of dark-bright-bright vector solitons. The role of multiple free parameters in our solution is examined to define polarization vector, envelope speed, envelope width, envelope amplitude, grayness, and complex modulation of our solution. It is interesting to note that the polarization vector of our mixed vector one-soliton evolves in sphere or hyperboloid depending upon the initial parametric choices.

  11. LSHSIM: A Locality Sensitive Hashing based method for multiple-point geostatistics

    Science.gov (United States)

    Moura, Pedro; Laber, Eduardo; Lopes, Hélio; Mesejo, Daniel; Pavanelli, Lucas; Jardim, João; Thiesen, Francisco; Pujol, Gabriel

    2017-10-01

    Reservoir modeling is a very important task that permits the representation of a geological region of interest, so as to generate a considerable number of possible scenarios. Since its inception, many methodologies have been proposed and, in the last two decades, multiple-point geostatistics (MPS) has been the dominant one. This methodology is strongly based on the concept of training image (TI) and the use of its characteristics, which are called patterns. In this paper, we propose a new MPS method that combines the application of a technique called Locality Sensitive Hashing (LSH), which permits to accelerate the search for patterns similar to a target one, with a Run-Length Encoding (RLE) compression technique that speeds up the calculation of the Hamming similarity. Experiments with both categorical and continuous images show that LSHSIM is computationally efficient and produce good quality realizations. In particular, for categorical data, the results suggest that LSHSIM is faster than MS-CCSIM, one of the state-of-the-art methods.

  12. On the security of the Winternitz one-time signature scheme

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas; Rückert, Markus; Nitaj, A.; Pointcheval, D.

    2011-01-01

    We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudo random functions. Compared to previous results, which require a collision resistant hash function, our result provides significantly

  13. Collision Risk and Damage after Collision

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup; Hansen, Peter Friis; Nielsen, Lars Peter

    1996-01-01

    The paper presents a new and complete procedure for calculation of ship-ship collision rates on specific routes and the hull damage caused by such collisions.The procedure is applied to analysis of collision risks for Ro-Ro pasenger vessels. Given a collision the spatial probability distribution ...

  14. Contact discontinuities in a cold collision-free two-beam plasma

    International Nuclear Information System (INIS)

    Kirkland, K.B.; Sonnerup, B.U.O.

    1982-01-01

    A contact discontinuity in a collision-free magnetized plasma is a thin layer, possessing a nontrivial magnetic structure, across which no net plasma flow takes place (#betta#/sub n/ = 0) even though the magnetic field has a nonvanishing component (B/sub n/not =0) normal to it. This paper examines the structure of such discontinuities in a simple plasma model consisting of two oppositely directed cold ion beams and a background of cold massless electrons such that exact charge neutrality is maintained so that the electric field Eequivalent0. The basic equations describing self-consistent equilibria are developed for the more general situation where a net flow across the layer takes place (#betta#/sub n/ = 0) and where the magnetic field has two nonzero tangential components B/sub y/ and B/sub z/ but where E remains zero. These equations are then specialized to the case eta/sub n/equivalent0, B/sub z/equivalent0, and four different classes of sheets are obtained, all having thickness of the order of the ion inertial length: (1) layers separating two identical plasma and magnetic field regions. (2) an infinite array of parallel layers producing an undulated magnetic field, (3) layers containing trapped ions in closed orbits which separate two vacuum regions with uniform identical magnetic fields, and (4) layers which reflect a single plasma beam, leaving a vacuum with a revesed and compressed tangential field on the other side. Solutions for which #betta#/sub n/ = 0 but B/sub z/not =0 may also exist but have not been analyzed; rotational discontinuities are shown not to be possible in this model

  15. ATLAS measurements of the ridge in $pp$ and $p$+Pb collisions

    CERN Document Server

    Tu, Xiao; The ATLAS collaboration

    2017-01-01

    ATLAS measurements of correlations between particle pairs in relative azimuthal angle ($\\Delta\\phi$) and pseudorapidity separation ($\\Delta\\eta$) in $pp$ collisions at $\\sqrt{s}$=5.02 and 13~TeV, and in $p$+Pb collisions at $\\sqrt{s_{\\mathrm{NN}}}$=5.02~TeV are presented. Prior measurements have shown that in $pp$ collisions with a large multiplicity of produced particles, a long-range structure (the ``ridge'') develops along $\\Delta\\eta$ at $\\Delta\\phi\\sim$0. However, due to the presence of the large away-side jet, the full $\\Delta\\phi$ dependence of the long-range correlation could not be studied. In this analysis, a template fitting procedure is implemented to determine the contributions from dijets to the correlations, using low-multiplicity events, and to extract the genuine long-range correlation. The long-range correlations are shown to be present even in events with a small multiplicity of produced particles, implying that the long-range correlations are not unique to rare high multiplicity events. Th...

  16. Beam-energy dependence of charge separation along the magnetic field in Au+Au collisions at RHIC.

    Science.gov (United States)

    Adamczyk, L; Adkins, J K; Agakishiev, G; Aggarwal, M M; Ahammed, Z; Alekseev, I; Alford, J; Anson, C D; Aparin, A; Arkhipkin, D; Aschenauer, E C; Averichev, G S; Banerjee, A; Beavis, D R; Bellwied, R; Bhasin, A; Bhati, A K; Bhattarai, P; Bichsel, H; Bielcik, J; Bielcikova, J; Bland, L C; Bordyuzhin, I G; Borowski, W; Bouchet, J; Brandin, A V; Brovko, S G; Bültmann, S; Bunzarov, I; Burton, T P; Butterworth, J; Caines, H; Calderón de la Barca Sánchez, M; Cebra, D; Cendejas, R; Cervantes, M C; Chaloupka, P; Chang, Z; Chattopadhyay, S; Chen, H F; Chen, J H; Chen, L; Cheng, J; Cherney, M; Chikanian, A; Christie, W; Chwastowski, J; Codrington, M J M; Contin, G; Cramer, J G; Crawford, H J; Cui, X; Das, S; Davila Leyva, A; De Silva, L C; Debbe, R R; Dedovich, T G; Deng, J; Derevschikov, A A; Derradi de Souza, R; Dhamija, S; di Ruzza, B; Didenko, L; Dilks, C; Ding, F; Djawotho, P; Dong, X; Drachenberg, J L; Draper, J E; Du, C M; Dunkelberger, L E; Dunlop, J C; Efimov, L G; Engelage, J; Engle, K S; Eppley, G; Eun, L; Evdokimov, O; Eyser, O; Fatemi, R; Fazio, S; Fedorisin, J; Filip, P; Finch, E; Fisyak, Y; Flores, C E; Gagliardi, C A; Gangadharan, D R; Garand, D; Geurts, F; Gibson, A; Girard, M; Gliske, S; Greiner, L; Grosnick, D; Gunarathne, D S; Guo, Y; Gupta, A; Gupta, S; Guryn, W; Haag, B; Hamed, A; Han, L-X; Haque, R; Harris, J W; Heppelmann, S; Hirsch, A; Hoffmann, G W; Hofman, D J; Horvat, S; Huang, B; Huang, H Z; Huang, X; Huck, P; Humanic, T J; Igo, G; Jacobs, W W; Jang, H; Judd, E G; Kabana, S; Kalinkin, D; Kang, K; Kauder, K; Ke, H W; Keane, D; Kechechyan, A; Kesich, A; Khan, Z H; Kikola, D P; Kisel, I; Kisiel, A; Koetke, D D; Kollegger, T; Konzer, J; Koralt, I; Kotchenda, L; Kraishan, A F; Kravtsov, P; Krueger, K; Kulakov, I; Kumar, L; Kycia, R A; Lamont, M A C; Landgraf, J M; Landry, K D; Lauret, J; Lebedev, A; Lednicky, R; Lee, J H; LeVine, M J; Li, C; Li, W; Li, X; Li, X; Li, Y; Li, Z M; Lisa, M A; Liu, F; Ljubicic, T; Llope, W J; Lomnitz, M; Longacre, R S; Luo, X; Ma, G L; Ma, Y G; Madagodagettige Don, D M M D; Mahapatra, D P; Majka, R; Margetis, S; Markert, C; Masui, H; Matis, H S; McDonald, D; McShane, T S; Minaev, N G; Mioduszewski, S; Mohanty, B; Mondal, M M; Morozov, D A; Mustafa, M K; Nandi, B K; Nasim, Md; Nayak, T K; Nelson, J M; Nigmatkulov, G; Nogach, L V; Noh, S Y; Novak, J; Nurushev, S B; Odyniec, G; Ogawa, A; Oh, K; Ohlson, A; Okorokov, V; Oldag, E W; Olvitt, D L; Pachr, M; Page, B S; Pal, S K; Pan, Y X; Pandit, Y; Panebratsev, Y; Pawlak, T; Pawlik, B; Pei, H; Perkins, C; Peryt, W; Pile, P; Planinic, M; Pluta, J; Poljak, N; Porter, J; Poskanzer, A M; Pruthi, N K; Przybycien, M; Pujahari, P R; Putschke, J; Qiu, H; Quintero, A; Ramachandran, S; Raniwala, R; Raniwala, S; Ray, R L; Riley, C K; Ritter, H G; Roberts, J B; Rogachevskiy, O V; Romero, J L; Ross, J F; Roy, A; Ruan, L; Rusnak, J; Rusnakova, O; Sahoo, N R; Sahu, P K; Sakrejda, I; Salur, S; Sandweiss, J; Sangaline, E; Sarkar, A; Schambach, J; Scharenberg, R P; Schmah, A M; Schmidke, W B; Schmitz, N; Seger, J; Seyboth, P; Shah, N; Shahaliev, E; Shanmuganathan, P V; Shao, M; Sharma, B; Shen, W Q; Shi, S S; Shou, Q Y; Sichtermann, E P; Singaraju, R N; Skoby, M J; Smirnov, D; Smirnov, N; Solanki, D; Sorensen, P; Spinka, H M; Srivastava, B; Stanislaus, T D S; Stevens, J R; Stock, R; Strikhanov, M; Stringfellow, B; Sumbera, M; Sun, X; Sun, X M; Sun, Y; Sun, Z; Surrow, B; Svirida, D N; Symons, T J M; Szelezniak, M A; Takahashi, J; Tang, A H; Tang, Z; Tarnowsky, T; Thomas, J H; Timmins, A R; Tlusty, D; Tokarev, M; Trentalange, S; Tribble, R E; Tribedy, P; Trzeciak, B A; Tsai, O D; Turnau, J; Ullrich, T; Underwood, D G; Van Buren, G; van Nieuwenhuizen, G; Vandenbroucke, M; Vanfossen, J A; Varma, R; Vasconcelos, G M S; Vasiliev, A N; Vertesi, R; Videbæk, F; Viyogi, Y P; Vokal, S; Voloshin, S A; Vossen, A; Wada, M; Wang, F; Wang, G; Wang, H; Wang, J S; Wang, X L; Wang, Y; Wang, Y; Webb, G; Webb, J C; Westfall, G D; Wieman, H; Wissink, S W; Witt, R; Wu, Y F; Xiao, Z; Xie, W; Xin, K; Xu, H; Xu, J; Xu, N; Xu, Q H; Xu, Y; Xu, Z; Yan, W; Yang, C; Yang, Y; Yang, Y; Ye, Z; Yepes, P; Yi, L; Yip, K; Yoo, I-K; Yu, N; Zawisza, Y; Zbroszczyk, H; Zha, W; Zhang, J B; Zhang, J L; Zhang, S; Zhang, X P; Zhang, Y; Zhang, Z P; Zhao, F; Zhao, J; Zhong, C; Zhu, X; Zhu, Y H; Zoulkarneeva, Y; Zyzak, M

    2014-08-01

    Local parity-odd domains are theorized to form inside a quark-gluon plasma which has been produced in high-energy heavy-ion collisions. The local parity-odd domains manifest themselves as charge separation along the magnetic field axis via the chiral magnetic effect. The experimental observation of charge separation has previously been reported for heavy-ion collisions at the top RHIC energies. In this Letter, we present the results of the beam-energy dependence of the charge correlations in Au+Au collisions at midrapidity for center-of-mass energies of 7.7, 11.5, 19.6, 27, 39, and 62.4 GeV from the STAR experiment. After background subtraction, the signal gradually reduces with decreased beam energy and tends to vanish by 7.7 GeV. This implies the dominance of hadronic interactions over partonic ones at lower collision energies.

  17. Beam-Energy Dependence of Charge Separation along the Magnetic Field in Au +Au Collisions at RHIC

    Science.gov (United States)

    Adamczyk, L.; Adkins, J. K.; Agakishiev, G.; Aggarwal, M. M.; Ahammed, Z.; Alekseev, I.; Alford, J.; Anson, C. D.; Aparin, A.; Arkhipkin, D.; Aschenauer, E. C.; Averichev, G. S.; Banerjee, A.; Beavis, D. R.; Bellwied, R.; Bhasin, A.; Bhati, A. K.; Bhattarai, P.; Bichsel, H.; Bielcik, J.; Bielcikova, J.; Bland, L. C.; Bordyuzhin, I. G.; Borowski, W.; Bouchet, J.; Brandin, A. V.; Brovko, S. G.; Bültmann, S.; Bunzarov, I.; Burton, T. P.; Butterworth, J.; Caines, H.; Calderón de la Barca Sánchez, M.; Cebra, D.; Cendejas, R.; Cervantes, M. C.; Chaloupka, P.; Chang, Z.; Chattopadhyay, S.; Chen, H. F.; Chen, J. H.; Chen, L.; Cheng, J.; Cherney, M.; Chikanian, A.; Christie, W.; Chwastowski, J.; Codrington, M. J. M.; Contin, G.; Cramer, J. G.; Crawford, H. J.; Cui, X.; Das, S.; Davila Leyva, A.; De Silva, L. C.; Debbe, R. R.; Dedovich, T. G.; Deng, J.; Derevschikov, A. A.; Derradi de Souza, R.; Dhamija, S.; di Ruzza, B.; Didenko, L.; Dilks, C.; Ding, F.; Djawotho, P.; Dong, X.; Drachenberg, J. L.; Draper, J. E.; Du, C. M.; Dunkelberger, L. E.; Dunlop, J. C.; Efimov, L. G.; Engelage, J.; Engle, K. S.; Eppley, G.; Eun, L.; Evdokimov, O.; Eyser, O.; Fatemi, R.; Fazio, S.; Fedorisin, J.; Filip, P.; Finch, E.; Fisyak, Y.; Flores, C. E.; Gagliardi, C. A.; Gangadharan, D. R.; Garand, D.; Geurts, F.; Gibson, A.; Girard, M.; Gliske, S.; Greiner, L.; Grosnick, D.; Gunarathne, D. S.; Guo, Y.; Gupta, A.; Gupta, S.; Guryn, W.; Haag, B.; Hamed, A.; Han, L.-X.; Haque, R.; Harris, J. W.; Heppelmann, S.; Hirsch, A.; Hoffmann, G. W.; Hofman, D. J.; Horvat, S.; Huang, B.; Huang, H. Z.; Huang, X.; Huck, P.; Humanic, T. J.; Igo, G.; Jacobs, W. W.; Jang, H.; Judd, E. G.; Kabana, S.; Kalinkin, D.; Kang, K.; Kauder, K.; Ke, H. W.; Keane, D.; Kechechyan, A.; Kesich, A.; Khan, Z. H.; Kikola, D. P.; Kisel, I.; Kisiel, A.; Koetke, D. D.; Kollegger, T.; Konzer, J.; Koralt, I.; Kotchenda, L.; Kraishan, A. F.; Kravtsov, P.; Krueger, K.; Kulakov, I.; Kumar, L.; Kycia, R. A.; Lamont, M. A. C.; Landgraf, J. M.; Landry, K. D.; Lauret, J.; Lebedev, A.; Lednicky, R.; Lee, J. H.; LeVine, M. J.; Li, C.; Li, W.; Li, X.; Li, X.; Li, Y.; Li, Z. M.; Lisa, M. A.; Liu, F.; Ljubicic, T.; Llope, W. J.; Lomnitz, M.; Longacre, R. S.; Luo, X.; Ma, G. L.; Ma, Y. G.; Madagodagettige Don, D. M. M. D.; Mahapatra, D. P.; Majka, R.; Margetis, S.; Markert, C.; Masui, H.; Matis, H. S.; McDonald, D.; McShane, T. S.; Minaev, N. G.; Mioduszewski, S.; Mohanty, B.; Mondal, M. M.; Morozov, D. A.; Mustafa, M. K.; Nandi, B. K.; Nasim, Md.; Nayak, T. K.; Nelson, J. M.; Nigmatkulov, G.; Nogach, L. V.; Noh, S. Y.; Novak, J.; Nurushev, S. B.; Odyniec, G.; Ogawa, A.; Oh, K.; Ohlson, A.; Okorokov, V.; Oldag, E. W.; Olvitt, D. L.; Pachr, M.; Page, B. S.; Pal, S. K.; Pan, Y. X.; Pandit, Y.; Panebratsev, Y.; Pawlak, T.; Pawlik, B.; Pei, H.; Perkins, C.; Peryt, W.; Pile, P.; Planinic, M.; Pluta, J.; Poljak, N.; Porter, J.; Poskanzer, A. M.; Pruthi, N. K.; Przybycien, M.; Pujahari, P. R.; Putschke, J.; Qiu, H.; Quintero, A.; Ramachandran, S.; Raniwala, R.; Raniwala, S.; Ray, R. L.; Riley, C. K.; Ritter, H. G.; Roberts, J. B.; Rogachevskiy, O. V.; Romero, J. L.; Ross, J. F.; Roy, A.; Ruan, L.; Rusnak, J.; Rusnakova, O.; Sahoo, N. R.; Sahu, P. K.; Sakrejda, I.; Salur, S.; Sandweiss, J.; Sangaline, E.; Sarkar, A.; Schambach, J.; Scharenberg, R. P.; Schmah, A. M.; Schmidke, W. B.; Schmitz, N.; Seger, J.; Seyboth, P.; Shah, N.; Shahaliev, E.; Shanmuganathan, P. V.; Shao, M.; Sharma, B.; Shen, W. Q.; Shi, S. S.; Shou, Q. Y.; Sichtermann, E. P.; Singaraju, R. N.; Skoby, M. J.; Smirnov, D.; Smirnov, N.; Solanki, D.; Sorensen, P.; Spinka, H. M.; Srivastava, B.; Stanislaus, T. D. S.; Stevens, J. R.; Stock, R.; Strikhanov, M.; Stringfellow, B.; Sumbera, M.; Sun, X.; Sun, X. M.; Sun, Y.; Sun, Z.; Surrow, B.; Svirida, D. N.; Symons, T. J. M.; Szelezniak, M. A.; Takahashi, J.; Tang, A. H.; Tang, Z.; Tarnowsky, T.; Thomas, J. H.; Timmins, A. R.; Tlusty, D.; Tokarev, M.; Trentalange, S.; Tribble, R. E.; Tribedy, P.; Trzeciak, B. A.; Tsai, O. D.; Turnau, J.; Ullrich, T.; Underwood, D. G.; Van Buren, G.; van Nieuwenhuizen, G.; Vandenbroucke, M.; Vanfossen, J. A.; Varma, R.; Vasconcelos, G. M. S.; Vasiliev, A. N.; Vertesi, R.; Videbæk, F.; Viyogi, Y. P.; Vokal, S.; Voloshin, S. A.; Vossen, A.; Wada, M.; Wang, F.; Wang, G.; Wang, H.; Wang, J. S.; Wang, X. L.; Wang, Y.; Wang, Y.; Webb, G.; Webb, J. C.; Westfall, G. D.; Wieman, H.; Wissink, S. W.; Witt, R.; Wu, Y. F.; Xiao, Z.; Xie, W.; Xin, K.; Xu, H.; Xu, J.; Xu, N.; Xu, Q. H.; Xu, Y.; Xu, Z.; Yan, W.; Yang, C.; Yang, Y.; Yang, Y.; Ye, Z.; Yepes, P.; Yi, L.; Yip, K.; Yoo, I.-K.; Yu, N.; Zawisza, Y.; Zbroszczyk, H.; Zha, W.; Zhang, J. B.; Zhang, J. L.; Zhang, S.; Zhang, X. P.; Zhang, Y.; Zhang, Z. P.; Zhao, F.; Zhao, J.; Zhong, C.; Zhu, X.; Zhu, Y. H.; Zoulkarneeva, Y.; Zyzak, M.; STAR Collaboration

    2014-08-01

    Local parity-odd domains are theorized to form inside a quark-gluon plasma which has been produced in high-energy heavy-ion collisions. The local parity-odd domains manifest themselves as charge separation along the magnetic field axis via the chiral magnetic effect. The experimental observation of charge separation has previously been reported for heavy-ion collisions at the top RHIC energies. In this Letter, we present the results of the beam-energy dependence of the charge correlations in Au +Au collisions at midrapidity for center-of-mass energies of 7.7, 11.5, 19.6, 27, 39, and 62.4 GeV from the STAR experiment. After background subtraction, the signal gradually reduces with decreased beam energy and tends to vanish by 7.7 GeV. This implies the dominance of hadronic interactions over partonic ones at lower collision energies.

  18. Option-implied measures of equity risk

    DEFF Research Database (Denmark)

    Chang, Bo-Young; Christoffersen, Peter; Vainberg, Gregory

    2012-01-01

    Equity risk measured by beta is of great interest to both academics and practitioners. Existing estimates of beta use historical returns. Many studies have found option-implied volatility to be a strong predictor of future realized volatility. We find that option-implied volatility and skewness...... are also good predictors of future realized beta. Motivated by this finding, we establish a set of assumptions needed to construct a beta estimate from option-implied return moments using equity and index options. This beta can be computed using only option data on a single day. It is therefore potentially...

  19. No free lunch

    KAUST Repository

    Ture, Ferhan

    2011-01-01

    This work explores the problem of cross-lingual pairwise similarity, where the task is to extract similar pairs of documents across two different languages. Solutions to this problem are of general interest for text mining in the multilingual context and have specific applications in statistical machine translation. Our approach takes advantage of cross-language information retrieval (CLIR) techniques to project feature vectors from one language into another, and then uses locality-sensitive hashing (LSH) to extract similar pairs. We show that effective cross-lingual pairwise similarity requires working with similarity thresholds that are much lower than in typical monolingual applications, making the problem quite challenging. We present a parallel, scalable MapReduce implementation of the sort-based sliding window algorithm, which is compared to a brute-force approach on German and English Wikipedia collections. Our central finding can be summarized as "no free lunch": there is no single optimal solution. Instead, we characterize effectiveness-efficiency tradeoffs in the solution space, which can guide the developer to locate a desirable operating point based on application- and resource-specific constraints.

  20. Transport coefficients of multi-particle collision algorithms with velocity-dependent collision rules

    International Nuclear Information System (INIS)

    Ihle, Thomas

    2008-01-01

    Detailed calculations of the transport coefficients of a recently introduced particle-based model for fluid dynamics with a non-ideal equation of state are presented. Excluded volume interactions are modeled by means of biased stochastic multi-particle collisions which depend on the local velocities and densities. Momentum and energy are exactly conserved locally. A general scheme to derive transport coefficients for such biased, velocity-dependent collision rules is developed. Analytic expressions for the self-diffusion coefficient and the shear viscosity are obtained, and very good agreement is found with numerical results at small and large mean free paths. The viscosity turns out to be proportional to the square root of temperature, as in a real gas. In addition, the theoretical framework is applied to a two-component version of the model, and expressions for the viscosity and the difference in diffusion of the two species are given

  1. Matter in extremis: Ultrarelativistic nuclear collisions at RHIC

    Energy Technology Data Exchange (ETDEWEB)

    Jacobs, Peter; Wang, Xin-Nian

    2004-08-20

    We review the physics of nuclear matter at high energy density and the experimental search for the Quark-Gluon Plasma at the Relativistic Heavy Ion Collider (RHIC). The data obtained in the first three years of the RHIC physics program provide several lines of evidence that a novel state of matter has been created in the most violent, head-on collisions of Au nuclei at {radical}s = 200 GeV. Jet quenching and global measurements show that the initial energy density of the strongly interacting medium generated in the collision is about two orders of magnitude larger than that of cold nuclear matter, well above the critical density for the deconfinement phase transition predicted by lattice QCD. The observed collective flow patterns imply that the system thermalizes early in its evolution, with the dynamics of its expansion consistent with ideal hydrodynamic flow based on a Quark-Gluon Plasma equation of state.

  2. Matter in extremis: Ultrarelativistic nuclear collisions at RHIC

    International Nuclear Information System (INIS)

    Jacobs, Peter; Wang, Xin-Nian

    2004-01-01

    We review the physics of nuclear matter at high energy density and the experimental search for the Quark-Gluon Plasma at the Relativistic Heavy Ion Collider (RHIC). The data obtained in the first three years of the RHIC physics program provide several lines of evidence that a novel state of matter has been created in the most violent, head-on collisions of Au nuclei at √s = 200 GeV. Jet quenching and global measurements show that the initial energy density of the strongly interacting medium generated in the collision is about two orders of magnitude larger than that of cold nuclear matter, well above the critical density for the deconfinement phase transition predicted by lattice QCD. The observed collective flow patterns imply that the system thermalizes early in its evolution, with the dynamics of its expansion consistent with ideal hydrodynamic flow based on a Quark-Gluon Plasma equation of state

  3. SECOM: A novel hash seed and community detection based-approach for genome-scale protein domain identification

    KAUST Repository

    Fan, Ming

    2012-06-28

    With rapid advances in the development of DNA sequencing technologies, a plethora of high-throughput genome and proteome data from a diverse spectrum of organisms have been generated. The functional annotation and evolutionary history of proteins are usually inferred from domains predicted from the genome sequences. Traditional database-based domain prediction methods cannot identify novel domains, however, and alignment-based methods, which look for recurring segments in the proteome, are computationally demanding. Here, we propose a novel genome-wide domain prediction method, SECOM. Instead of conducting all-against-all sequence alignment, SECOM first indexes all the proteins in the genome by using a hash seed function. Local similarity can thus be detected and encoded into a graph structure, in which each node represents a protein sequence and each edge weight represents the shared hash seeds between the two nodes. SECOM then formulates the domain prediction problem as an overlapping community-finding problem in this graph. A backward graph percolation algorithm that efficiently identifies the domains is proposed. We tested SECOM on five recently sequenced genomes of aquatic animals. Our tests demonstrated that SECOM was able to identify most of the known domains identified by InterProScan. When compared with the alignment-based method, SECOM showed higher sensitivity in detecting putative novel domains, while it was also three orders of magnitude faster. For example, SECOM was able to predict a novel sponge-specific domain in nucleoside-triphosphatase (NTPases). Furthermore, SECOM discovered two novel domains, likely of bacterial origin, that are taxonomically restricted to sea anemone and hydra. SECOM is an open-source program and available at http://sfb.kaust.edu.sa/Pages/Software.aspx. © 2012 Fan et al.

  4. SECOM: A novel hash seed and community detection based-approach for genome-scale protein domain identification

    KAUST Repository

    Fan, Ming; Wong, Ka-Chun; Ryu, Tae Woo; Ravasi, Timothy; Gao, Xin

    2012-01-01

    With rapid advances in the development of DNA sequencing technologies, a plethora of high-throughput genome and proteome data from a diverse spectrum of organisms have been generated. The functional annotation and evolutionary history of proteins are usually inferred from domains predicted from the genome sequences. Traditional database-based domain prediction methods cannot identify novel domains, however, and alignment-based methods, which look for recurring segments in the proteome, are computationally demanding. Here, we propose a novel genome-wide domain prediction method, SECOM. Instead of conducting all-against-all sequence alignment, SECOM first indexes all the proteins in the genome by using a hash seed function. Local similarity can thus be detected and encoded into a graph structure, in which each node represents a protein sequence and each edge weight represents the shared hash seeds between the two nodes. SECOM then formulates the domain prediction problem as an overlapping community-finding problem in this graph. A backward graph percolation algorithm that efficiently identifies the domains is proposed. We tested SECOM on five recently sequenced genomes of aquatic animals. Our tests demonstrated that SECOM was able to identify most of the known domains identified by InterProScan. When compared with the alignment-based method, SECOM showed higher sensitivity in detecting putative novel domains, while it was also three orders of magnitude faster. For example, SECOM was able to predict a novel sponge-specific domain in nucleoside-triphosphatase (NTPases). Furthermore, SECOM discovered two novel domains, likely of bacterial origin, that are taxonomically restricted to sea anemone and hydra. SECOM is an open-source program and available at http://sfb.kaust.edu.sa/Pages/Software.aspx. © 2012 Fan et al.

  5. Beam energy dependence of d and d ‾ production in Au+Au collisions at RHIC

    Science.gov (United States)

    Yu, Ning; STAR Collaboration

    2017-11-01

    The binding energy of light nuclei is small compared to the temperature of the system created in heavy-ion collisions. Consequently, the yields of light nuclei can be used to probe the freeze-out properties, such as correlation volume and local baryon density of the medium created in high-energy nuclear collisions. In this paper, we report the results of deuteron and anti-deuteron production in Au+Au collision at √{sNN} = 7.7, 11.5, 14.5, 19.6, 27, 39, 62.4, and 200 GeV, measured by STAR at RHIC. The collision energy, centrality and transverse momentum dependence of the coalescence parameter B2 for deuteron and anti-deuteron production are discussed. We find the values of B2 for anti-deuterons are systematically lower than those for deuterons indicating the correlation volume of anti-baryon are larger than that of baryon. In addition, the values of B2 are found to vary with collision energy and show a broad minimum around √{sNN} = 20GeV, implying a change of the equation of state of the medium in these collisions.

  6. Implied and Local Volatility Surfaces for South African Index and Foreign Exchange Options

    Directory of Open Access Journals (Sweden)

    Antonie Kotzé

    2015-01-01

    Full Text Available Certain exotic options cannot be valued using closed-form solutions or even by numerical methods assuming constant volatility. Many exotics are priced in a local volatility framework. Pricing under local volatility has become a field of extensive research in finance, and various models are proposed in order to overcome the shortcomings of the Black-Scholes model that assumes a constant volatility. The Johannesburg Stock Exchange (JSE lists exotic options on its Can-Do platform. Most exotic options listed on the JSE’s derivative exchanges are valued by local volatility models. These models needs a local volatility surface. Dupire derived a mapping from implied volatilities to local volatilities. The JSE uses this mapping in generating the relevant local volatility surfaces and further uses Monte Carlo and Finite Difference methods when pricing exotic options. In this document we discuss various practical issues that influence the successful construction of implied and local volatility surfaces such that pricing engines can be implemented successfully. We focus on arbitrage-free conditions and the choice of calibrating functionals. We illustrate our methodologies by studying the implied and local volatility surfaces of South African equity index and foreign exchange options.

  7. Physics of Ultra-Peripheral Collisions at RHIC and LHC

    Directory of Open Access Journals (Sweden)

    Melek Yılmaz Şengül

    2014-12-01

    Full Text Available The creation of electron-positron pairs from the vacuum by strong electromagnetic fields is a fundamental and one of the most fascinating processes of relativistic quantum mechanics. Fields sufficiently strong to induce pair creation can be produced, for example, in collisions of bare ions. The process has been studied intensively both in theory and experiment since the 1980s. In peripheral relativistic heavy-ion collisions electromagnetic fields are very strong and interact with each other for a very short time. In these strong fields, probabilities of various electromagnetic processes such as free pair production, bound-free pair production and excitation are large and increase with the Lorentz factor γ. Measurement of cross sections and other relevant distributions are very important for understanding the strong field effect.

  8. Single-collision studies of hot atom energy transfer and chemical reaction

    International Nuclear Information System (INIS)

    Valentini, J.J.

    1991-01-01

    This report discusses research in the collision dynamics of translationally hot atoms, with funding with DOE for the project ''Single-Collision Studies of Hot Atom Energy Transfer and Chemical Reaction,'' Grant Number DE-FG03-85ER13453. The work reported here was done during the period September 9, 1988 through October 31, 1991. During this period this DOE-funded work has been focused on several different efforts: (1) experimental studies of the state-to-state dynamics of the H + RH → H 2 R reactions where RH is CH 4 , C 2 H 6 , or C 3 H 8 , (2) theoretical (quasiclassical trajectory) studies of hot hydrogen atom collision dynamics, (3) the development of photochemical sources of translationally hot molecular free radicals and characterization of the high resolution CARS spectroscopy of molecular free radicals, (4) the implementation of stimulated Raman excitation (SRE) techniques for the preparation of vibrationally state-selected molecular reactants

  9. Mimicing Charged Particle-Atom Collisions Using Half-Cycle Electromagnetic Pulses

    National Research Council Canada - National Science Library

    Jones, Robert

    2000-01-01

    .... Demonstration and preliminary studies of free electron-ion recombination in mock collisions. Identified Stark wave packets, coherent superpositions of "stretched" atomic states as potentially useful sources of short-pulses...

  10. Search for Exotic Strange Dibaryon in Relativistic Heavy Ion Collisions

    Institute of Scientific and Technical Information of China (English)

    GAO Chong-Shou

    2003-01-01

    The exotic strange dibaryon particle (ΩΩ)0+ with S = -6 can be produced in relativistic heavyioncollisions. The yields of this kind of exotic strange dibaryon particles can increase significantly soon as the formation ofQGP does exhibit after the collision. If there is no phase transition after the collision, the upper bound of the productionof this diomega can be estimated from the free hadronic gas model for nuclear matter. The relative yield ratio of diomegato deuteron is less than 0.000205, this means that if there is no QGP creation it is difficult to observe the production ofdiomega in relativistic heavy ion collisions.

  11. Human Robot Interaction for Hybrid Collision Avoidance System for Indoor Mobile Robots

    Directory of Open Access Journals (Sweden)

    Mazen Ghandour

    2017-06-01

    Full Text Available In this paper, a novel approach for collision avoidance for indoor mobile robots based on human-robot interaction is realized. The main contribution of this work is a new technique for collision avoidance by engaging the human and the robot in generating new collision-free paths. In mobile robotics, collision avoidance is critical for the success of the robots in implementing their tasks, especially when the robots navigate in crowded and dynamic environments, which include humans. Traditional collision avoidance methods deal with the human as a dynamic obstacle, without taking into consideration that the human will also try to avoid the robot, and this causes the people and the robot to get confused, especially in crowded social places such as restaurants, hospitals, and laboratories. To avoid such scenarios, a reactive-supervised collision avoidance system for mobile robots based on human-robot interaction is implemented. In this method, both the robot and the human will collaborate in generating the collision avoidance via interaction. The person will notify the robot about the avoidance direction via interaction, and the robot will search for the optimal collision-free path on the selected direction. In case that no people interacted with the robot, it will select the navigation path autonomously and select the path that is closest to the goal location. The humans will interact with the robot using gesture recognition and Kinect sensor. To build the gesture recognition system, two models were used to classify these gestures, the first model is Back-Propagation Neural Network (BPNN, and the second model is Support Vector Machine (SVM. Furthermore, a novel collision avoidance system for avoiding the obstacles is implemented and integrated with the HRI system. The system is tested on H20 robot from DrRobot Company (Canada and a set of experiments were implemented to report the performance of the system in interacting with the human and avoiding

  12. Cryptanalysis of Vortex

    DEFF Research Database (Denmark)

    Aumasson, Jean-Philippe; Dunkelman, Orr; Mendel, Florian

    2009-01-01

    Vortex is a hash function that was first presented at ISC'2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws...

  13. Second-Preimage Analysis of Reduced SHA-1

    DEFF Research Database (Denmark)

    Rechberger, Christian

    2010-01-01

    Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-1 continues to be recommended in all applications except digital signatures after 2010. Recent work on preimage and second...

  14. Gas-Microjet Reactive Scattering: Collisions of HCl and DCl with Cool Salty Water.

    Science.gov (United States)

    Faust, Jennifer A; Sobyra, Thomas B; Nathanson, Gilbert M

    2016-02-18

    Liquid microjets provide a powerful means to investigate reactions of gases with salty water in vacuum while minimizing gas-vapor collisions. We use this technique to explore the fate of gaseous HCl and DCl molecules impinging on 8 molal LiCl and LiBr solutions at 238 K. The experiments reveal that HCl or DCl evaporate infrequently if they become thermally accommodated at the surface of either solution. In particular, we observe minimal thermal desorption of HCl following HCl collisions and no distinct evidence for rapid, interfacial DCl→HCl exchange following DCl collisions. These results imply that surface thermal motions are not generally strong enough to propel momentarily trapped HCl or DCl back into the gas phase before they ionize and disappear into solution. Instead, only HCl and DCl molecules that scatter directly from the surface escape entry. These recoiling molecules transfer less energy upon collision to LiBr/H2O than to LiCl/H2O, reflecting the heavier mass of Br(-) than of Cl(-) in the interfacial region.

  15. Optic flow-based collision-free strategies: From insects to robots.

    Science.gov (United States)

    Serres, Julien R; Ruffier, Franck

    2017-09-01

    Flying insects are able to fly smartly in an unpredictable environment. It has been found that flying insects have smart neurons inside their tiny brains that are sensitive to visual motion also called optic flow. Consequently, flying insects rely mainly on visual motion during their flight maneuvers such as: takeoff or landing, terrain following, tunnel crossing, lateral and frontal obstacle avoidance, and adjusting flight speed in a cluttered environment. Optic flow can be defined as the vector field of the apparent motion of objects, surfaces, and edges in a visual scene generated by the relative motion between an observer (an eye or a camera) and the scene. Translational optic flow is particularly interesting for short-range navigation because it depends on the ratio between (i) the relative linear speed of the visual scene with respect to the observer and (ii) the distance of the observer from obstacles in the surrounding environment without any direct measurement of either speed or distance. In flying insects, roll stabilization reflex and yaw saccades attenuate any rotation at the eye level in roll and yaw respectively (i.e. to cancel any rotational optic flow) in order to ensure pure translational optic flow between two successive saccades. Our survey focuses on feedback-loops which use the translational optic flow that insects employ for collision-free navigation. Optic flow is likely, over the next decade to be one of the most important visual cues that can explain flying insects' behaviors for short-range navigation maneuvers in complex tunnels. Conversely, the biorobotic approach can therefore help to develop innovative flight control systems for flying robots with the aim of mimicking flying insects' abilities and better understanding their flight. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  16. Collision avoidance in robotic environments

    International Nuclear Information System (INIS)

    Kreifeldt, J.G.

    1984-01-01

    A generalized approach to the problem of collision avoidance in robotic environments is presented. This approach transforms the three dimensional but dynamic real-world changing geometric space of the robot in its environment into a multidimensional but static space such that any possible geometric arrangement of the robotic space becomes a point in hyperspace. Major advantages of this approach include clarification of and potential solution to the basic problem of finding optimized, collision free movements from an initial to a final configuration. A major disadvantage of the approach is related to computational and data storage problems. However these latter are technically solvable while the clarification of the control and guidance problem gained through the transformational approach and its general elucidation power remain prime conceptual tools for the problem of robot design and operation

  17. Matching Real and Synthetic Panoramic Images Using a Variant of Geometric Hashing

    Science.gov (United States)

    Li-Chee-Ming, J.; Armenakis, C.

    2017-05-01

    This work demonstrates an approach to automatically initialize a visual model-based tracker, and recover from lost tracking, without prior camera pose information. These approaches are commonly referred to as tracking-by-detection. Previous tracking-by-detection techniques used either fiducials (i.e. landmarks or markers) or the object's texture. The main contribution of this work is the development of a tracking-by-detection algorithm that is based solely on natural geometric features. A variant of geometric hashing, a model-to-image registration algorithm, is proposed that searches for a matching panoramic image from a database of synthetic panoramic images captured in a 3D virtual environment. The approach identifies corresponding features between the matched panoramic images. The corresponding features are to be used in a photogrammetric space resection to estimate the camera pose. The experiments apply this algorithm to initialize a model-based tracker in an indoor environment using the 3D CAD model of the building.

  18. Multifractal analysis of implied volatility in index options

    Science.gov (United States)

    Oh, GabJin

    2014-06-01

    In this paper, we analyze the statistical and the non-linear properties of the log-variations in implied volatility for the CAC40, DAX and S& P500 daily index options. The price of an index option is generally represented by its implied volatility surface, including its smile and skew properties. We utilize a Lévy process model as the underlying asset to deepen our understanding of the intrinsic property of the implied volatility in the index options and estimate the implied volatility surface. We find that the options pricing models with the exponential Lévy model can reproduce the smile or sneer features of the implied volatility that are observed in real options markets. We study the variation in the implied volatility for at-the-money index call and put options, and we find that the distribution function follows a power-law distribution with an exponent of 3.5 ≤ γ ≤ 4.5. Especially, the variation in the implied volatility exhibits multifractal spectral characteristics, and the global financial crisis has influenced the complexity of the option markets.

  19. Theoretical interpretation of data from high-energy nuclear collisions

    International Nuclear Information System (INIS)

    Fai, G.

    1988-09-01

    Nuclear collision data at energies ranging from medium to relativistic are interpreted theoretically. The major objective is a better understanding of high-energy heavy-ion collisions, with particular emphasis on the properties of excited nuclear matter. Further progress towards a satisfactory description of excited subsaturation nuclear matter is achieved. The mean free path of a nucleon in nuclear matter, which is a critical parameter in assessing the applicability of certain nuclear collision models, is investigated. Experimental information is used together with theoretical concepts in collaborations with experimentalists in order to learn about the reaction mechanism and about excited nuclear matter properties. In the framework of a more strictly theoretical program development, subnuclear degrees of freedom and nonlinear phenomena in model field theories are studied

  20. Fractional Black–Scholes option pricing, volatility calibration and implied Hurst exponents in South African context

    Directory of Open Access Journals (Sweden)

    Emlyn Flint

    2017-03-01

    least-squares optimisation routine. Results: It is shown that a fractional Black–Scholes model always admits a non-constant implied volatility term structure when the Hurst exponent is not 0.5, and that 1-year implied volatility is independent of the Hurst exponent and equivalent to fractional volatility. Furthermore, we show that the FBSI model fits the equity index implied volatility data very well but that a more flexible Hurst exponent parameterisation is required to fit accurately the currency implied volatility data. Conclusion: The FBSI model is an arbitrage-free deterministic volatility model that can accurately model equity index implied volatility. It also provides one with an estimate of the implied Hurst exponent, which could be very useful in derivatives trading and delta hedging.

  1. Time-reversal invariance in multiple collisions between coupled masses

    International Nuclear Information System (INIS)

    Crawford, F.S.

    1989-01-01

    The time evolution of two mechanical oscillators coupled by a spring can (but need not) exhibit an instant t = 2t' when the initial conditions at t = 0 have been exactly restored. When that is the case, then at t = t' energy and momentum have been exchanged exactly as in an elastic collision between two free particles, and the evolution of the system from t = t' to 2t' is related to that from 0 to t' by time-reversal invariance. A similar ''simulation of elastic scattering'' at t = t' can occur for two free particles coupled via collisions with an intermediary mass that bounces back and forth between the two particles provided the intermediary is left at rest at t = t'. Examined here is the time evolution of the exchange of momentum and energy for these two examples, determining the values of the coupling spring constant (or mass value) of the intermediating spring (or mass) needed to simulate single elastic scattering between free particles, and looking at the manifestation of time-reversal invariance

  2. Central Au on Au collisions

    Energy Technology Data Exchange (ETDEWEB)

    Alard, J.P.; Amouroux, V. [Labo de Phys. Corp., IN2P3-CRNS, Univ. Blaise Pascal, Clermont-Fd. (France); Basrak, Z. [Rudjer Boskovic Institute, Zagreb (Croatia)] [and others; FOPI-Collaboration

    1995-02-06

    In nucleus-nucleus collisions the initial relative kinetic energy of target and projectile is available for internal excitation of the interacting system; it is however still not well established to what extent local equilibrium and thermalisation occur. Local equilibrium is of interest to derive, within the formalism of transport equations and of the equation of state, (EOS), general properties of compressed and excited nuclear matter. Such approach describes in relatively simple terms the complex many body interactions occuring within extended baryonic and hadronic (or quark) matter. For a basic microscopic understanding it is highly desirable to investigate the elementary in-medium interactions in relation to the free elementary processes. Excitation function measurements of central collisions between the heaviest available nuclei (like Au on Au), supply the best ground for such studies: the highest degree of thermalisation and compression is expected for such reactions. The consideration presented here of energy thermalisation and of an expanding system clusterizing at freeze-out in a situation close to the liquid gas phase transition can be of interest to astrophysics as well as to the quark gluon plasma deconfinement studied in nucleus-nucleus collisions at the higher energy regime of CERN and Brookhaven. (orig.).

  3. Modelling of a collision between two smartphones

    Science.gov (United States)

    de Jesus, V. L. B.; Sasaki, D. G. G.

    2016-09-01

    In the predominant approach in physics textbooks, the collision between particles is treated as a black box, where no physical quantity can be measured. This approach becomes even more evident in experimental classes where collisions are the simplest and most common way of applying the theorem of conservation of linear momentum in the asymptotic behavior. In this paper we develop and analyse an experiment on collisions using only two smartphones. The experimental setup is amazingly simple; the two devices are aligned on a horizontal table of lacquered wood, in order to slide more easily. At the edge of one of them a piece of common sponge is glued using double-sided tape. By using a free smartphone application, the values generated by the accelerometer of the two devices in full motion are measured and tabulated. Through numerical iteration, the speed graphs of the smartphones before, during, and after the collision are obtained. The main conclusions were: (i) the demonstration of the feasibility of using smartphones as an alternative to air tracks and electronic sensors employed in a teaching lab, (ii) the possibility of investigating the collision itself, its characteristics and effects; this is the great advantage of the use of smartphones over traditional experiments, (iii) the compatibility of the results with the impulse-momentum theorem, within the margin of uncertainty.

  4. Transverse-momentum distribution of produced particles in ultrarelativistic nucleus-nucleus collisions

    International Nuclear Information System (INIS)

    Ban-Hao, S.; Wong, C.

    1985-01-01

    In order to discern coherent or collective processes from incoherent processes in nucleus-nucleus reactions at high energies, we study the transverse-momentum distribution of the produced particles with an incoherent-multiple-collision model. In this model, the projectile nucleon makes successive inelastic collisions with nucleons in the target nucleus, the probability of such collisions being given by the thickness function and the nucleon-nucleon inelastic cross section. It is assumed that each baryon-baryon collision produces particles and degrades momenta just as a baryon-baryon collision in free space, and that there are no secondary collisions between the produced particles and the nucleons. We found that the average transverse momentum and the charged-multiplicity data at Fermilab and CERN ISR energies can be well explained by such a model. However, the average transverse momentum for some events observed by the Japanese-American cooperative emulsion experiment (JACEE) associated with large energy density in the central rapidity region differ markedly from the model results. Such a deviation indicates the presence of coherent or collective effects for these collisions and may indicate the possibility of a formation of quark-gluon plasma

  5. Transport models for relativistic heavy-ion collisions at Relativistic ...

    Indian Academy of Sciences (India)

    While the free-streaming of particles in the kinetic theory drive the system out of equi- ... For collisions at RHIC and LHC, a transport model may involve four main com- ...... Further, there are many important conceptual issues such as imple-.

  6. Implied terms in English and Romanian law

    OpenAIRE

    Stefan Dinu

    2015-01-01

    This study analyses the matter of implied terms from the point of view of both English and Romanian law. First, the introductory section provides a brief overview of implied terms, by defining this class of contractual clauses and by providing their general features. Second, the English law position is analysed, where it is generally recognised that a term may be implied in one of three manners, which are described in turn. An emp hasis is made on the Privy Council’s decision in Attorney G...

  7. $\\phi$ Production in In-In Collisions at 158 A GeV

    CERN Document Server

    Arnaldi, R; Borer, K; Castor, J; Chaurand, B; Chen, W; Cicalò, C; Colla, A; Cortese, P; Damjanovic, S; David, A; de Falco, A; Devaux, A; Ducroux, L; En’yo, H; Fargeix, J; Ferretti, A; Floris, M; Förster, A; Force, P; Guettet, N; Guichard, A; Gulkanyan, H; Heuser, J; Keil, M; Kluberg, L; Li, Z; Lourenço, C; Lozano, J; Manso, F; Martins, P; Masoni, A; Neves, A; Ohnishi, H; Oppedisano, C; Parracho, P; Pillot, P; Poghosyan, T; Puddu, G; Radermacher, E; Ramalhete, P; Rosinsky, P; Scomparin, E; Seixas, J; Serci, S; Shahoyan, R; Sonderegger, P; Specht, H J; Tieulent, R; Uras, A; Usai, G; Veenhof, R; Wöhri, H K

    2009-01-01

    The NA60 experiment has measured muon pair production in In-In collisions at 158 AGeV at the CERN SPS. This paper presents a high statistics measurement of $\\phi\\to\\mu\\mu$ meson production. Differential spectra, yields, mass and width are measured as a function of centrality and compared to previous measurements in other colliding systems at the same energy. The width of the rapidity distribution is found to be constant as a function of centrality, compatible with previous results. The decay muon polar angle distribution is measured in several reference frames. No evidence of polarization is found as a function of transverse momentum and centrality. The analysis of the $p_{T}$ spectra shows that the $\\phi$ has a small radial flow, implying a weak coupling to the medium. The $T_{eff}$ parameter measured in In-In collisions suggests that the high value observed in Pb-Pb in the kaon channel is difficult to reconcile with radial flow alone. The absolute yield is compared to results in Pb-Pb collisions: though sig...

  8. Production of spectator hypermatter in relativistic heavy-ion collisions

    International Nuclear Information System (INIS)

    Botvina, A. S.; Gudima, K. K.; Steinheimer, J.; Bleicher, M.; Mishustin, I. N.

    2011-01-01

    Possible formation of large hyperfragments in relativistic heavy-ion collisions is studied within two transport models, the Dubna cascade model and UrQMD model. Our goal is to explore a new mechanism for the formation of strange nuclear systems via capture of hyperons by relatively cold spectator matter produced in semiperipheral collisions. We investigate basic characteristics of the produced hyperspectators and estimate the production probabilities of multistrange systems. Advantages of the proposed mechanisms over an alternative coalescence process are analyzed. We also discuss how such hyperfragments can be detected by taking into account the background of free hyperons. This investigation is important for the development of new experimental methods for producing hypernuclei in peripheral relativistic nucleus-nucleus collisions, which are now underway at GSI and are planned for the future FAIR and NICA facilities.

  9. Sequential Monte Carlo simulation of collision risk in free flight air traffic

    NARCIS (Netherlands)

    Blom, H.A.P.; Bakker, G.; Krystul, J.; Everdij, M.H.C.; Klein Obbink, B.; Klompstra, M.B.

    2005-01-01

    Within HYBRIDGE a novel approach in speeding up Monte Carlo simulation of rare events has been developed. In the current report this method is extended for application to simulating collisions with a stochastic dynamical model of an air traffic operational concept. Subsequently this extended Monte

  10. Implied terms in English and Romanian law

    Directory of Open Access Journals (Sweden)

    Stefan Dinu

    2015-12-01

    Full Text Available This study analyses the matter of implied terms from the point of view of both English and Romanian law. First, the introductory section provides a brief overview of implied terms, by defining this class of contractual clauses and by providing their general features. Second, the English law position is analysed, where it is generally recognised that a term may be implied in one of three manners, which are described in turn. An emp hasis is made on the Privy Council’s decision in Attorney General of Belize v Belize Telecom Ltd and its impact. Third, the Romanian law position is described, the starting point of the discussion being represented by the provisions of Article 1272 of the 2009 Civil Code. Fourth, the study ends by mentioning some points of comparison between the two legal systems in what concerns the approach towards implied terms.

  11. Observation of a laser-assisted ionization of the He(21S,23S)+He(11S) collision system involving a bound-free transition

    International Nuclear Information System (INIS)

    Pradel, P.; Monchicourt, P.; Dubreuil, D.; Heuze, J.; Laucagne, J.J.; Spiess, G.

    1985-01-01

    We report the first observation of an assisted He + yield arising from single collisions between a He(2 1 S,2 3 S) atom beam on a He(1 1 S) target in the presence of an intense laser field. A time-of-flight analysis shows that the pulsed laser-assisted ion signal is reproducible, energy dependent, and appears in addition to the continuous ion flux coming from a known field-free diabatic channel. From the estimated value of the diabatic ionization cross section sigma/sub d/, the order of magnitude of the assisted-ionization cross section sigma/sub a/ is given

  12. A Dynamic Linear Hashing Method for Redundancy Management in Train Ethernet Consist Network

    Directory of Open Access Journals (Sweden)

    Xiaobo Nie

    2016-01-01

    Full Text Available Massive transportation systems like trains are considered critical systems because they use the communication network to control essential subsystems on board. Critical system requires zero recovery time when a failure occurs in a communication network. The newly published IEC62439-3 defines the high-availability seamless redundancy protocol, which fulfills this requirement and ensures no frame loss in the presence of an error. This paper adopts these for train Ethernet consist network. The challenge is management of the circulating frames, capable of dealing with real-time processing requirements, fast switching times, high throughout, and deterministic behavior. The main contribution of this paper is the in-depth analysis it makes of network parameters imposed by the application of the protocols to train control and monitoring system (TCMS and the redundant circulating frames discarding method based on a dynamic linear hashing, using the fastest method in order to resolve all the issues that are dealt with.

  13. Effective software design and development for the new graph architecture HPC machines.

    Energy Technology Data Exchange (ETDEWEB)

    Dechev, Damian

    2012-03-01

    Software applications need to change and adapt as modern architectures evolve. Nowadays advancement in chip design translates to increased parallelism. Exploiting such parallelism is a major challenge in modern software engineering. Multicore processors are about to introduce a significant change in the way we design and use fundamental data structures. In this work we describe the design and programming principles of a software library of highly concurrent scalable and nonblocking data containers. In this project we have created algorithms and data structures for handling fundamental computations in massively multithreaded contexts, and we have incorporated these into a usable library with familiar look and feel. In this work we demonstrate the first design and implementation of a wait-free hash table. Our multiprocessor data structure design allows a large number of threads to concurrently insert, remove, and retrieve information. Non-blocking designs alleviate the problems traditionally associated with the use of mutual exclusion, such as bottlenecks and thread-safety. Lock-freedom provides the ability to share data without some of the drawbacks associated with locks, however, these designs remain susceptible to starvation. Furthermore, wait-freedom provides all of the benefits of lock-free synchronization with the added assurance that every thread makes progress in a finite number of steps. This implies deadlock-freedom, livelock-freedom, starvation-freedom, freedom from priority inversion, and thread-safety. The challenges of providing the desirable progress and correctness guarantees of wait-free objects makes their design and implementation difficult. There are few wait-free data structures described in the literature. Using only standard atomic operations provided by the hardware, our design is portable; therefore, it is applicable to a variety of data-intensive applications including the domains of embedded systems and supercomputers.Our experimental

  14. The effect of cargo on the crush loading of RAM transportation packages in ship collisions

    International Nuclear Information System (INIS)

    Radloff, H.D.; Ammerman, D.J.

    1998-03-01

    Recent intercontinental radioactive material shipping campaigns have focused public and regulatory attention on the safety of transport of this material by ocean-going vessels. One major concern is the response of the vessel and onboard radioactive material (RAM) packages during a severe ship-to-ship collision. These collisions occur at velocities less than the velocity obtained in the Type B package regulatory impact event and the bow of the striking ship is less rigid than the unyielding target used in those tests (Ammerman and Daidola, 1996). This implies that ship impact is not a credible scenario for damaging the radioactive material packages during ship collisions. It is possible, however, for these collisions to generate significant amounts of crush force by the bow of the impacting ship overrunning the package. It is the aim of this paper to determine an upper bound on the magnitude of this crush force taking into account the strength of the radioactive material carrying vessel and any other cargo that may be stowed in the same hold as the radioactive material

  15. Constraining the Stellar Mass Function in the Galactic Center via Mass Loss from Stellar Collisions

    Directory of Open Access Journals (Sweden)

    Douglas Rubin

    2011-01-01

    Full Text Available The dense concentration of stars and high-velocity dispersions in the Galactic center imply that stellar collisions frequently occur. Stellar collisions could therefore result in significant mass loss rates. We calculate the amount of stellar mass lost due to indirect and direct stellar collisions and find its dependence on the present-day mass function of stars. We find that the total mass loss rate in the Galactic center due to stellar collisions is sensitive to the present-day mass function adopted. We use the observed diffuse X-ray luminosity in the Galactic center to preclude any present-day mass functions that result in mass loss rates >10-5M⨀yr−1 in the vicinity of ~1″. For present-day mass functions of the form, dN/dM∝M-α, we constrain the present-day mass function to have a minimum stellar mass ≲7M⨀ and a power-law slope ≳1.25. We also use this result to constrain the initial mass function in the Galactic center by considering different star formation scenarios.

  16. Power Load from Collision Debris on the LHC Point 8 Insertion Magnets implied by the LHCB Luminosity Increase

    CERN Document Server

    Esposito, L S; Lechner, A; Mereghetti, A; Vlachoudis, V; Patapenka, A

    2013-01-01

    LHCb is aiming to upgrade its goal peak luminosity up to a value of 2 × 1033 cm−2 s−1 after LS2. We investigate the collision debris impact on the machine elements by extensive FLUKA simulations, showing that the present machine layout is substantially compatible with such a luminosity goal. In particular the installation of a TAS (Target Absorber of Secondaries, installed in front of the final focus Q1-Q3 quadrupole triplet in the LHC high luminosity insertions) turns out not to be necessary on the basis of the expected peak power deposition in the Q1 superconducting coils. A warm protection may be desirable to further reduce heat load and dose on the D2 recombination dipole, due to the absence of the TAN (Target Absorber of Neutrals, present in Point 1 and 5).

  17. A numerical 4D Collision Risk Model

    Science.gov (United States)

    Schmitt, Pal; Culloch, Ross; Lieber, Lilian; Kregting, Louise

    2017-04-01

    With the growing number of marine renewable energy (MRE) devices being installed across the world, some concern has been raised about the possibility of harming mobile, marine fauna by collision. Although physical contact between a MRE device and an organism has not been reported to date, these novel sub-sea structures pose a challenge for accurately estimating collision risks as part of environmental impact assessments. Even if the animal motion is simplified to linear translation, ignoring likely evasive behaviour, the mathematical problem of establishing an impact probability is not trivial. We present a numerical algorithm to obtain such probability distributions using transient, four-dimensional simulations of a novel marine renewable device concept, Deep Green, Minesto's power plant and hereafter referred to as the 'kite' that flies in a figure-of-eight configuration. Simulations were carried out altering several configurations including kite depth, kite speed and kite trajectory while keeping the speed of the moving object constant. Since the kite assembly is defined as two parts in the model, a tether (attached to the seabed) and the kite, collision risk of each part is reported independently. By comparing the number of collisions with the number of collision-free simulations, a probability of impact for each simulated position in the cross- section of the area is considered. Results suggest that close to the bottom, where the tether amplitude is small, the path is always blocked and the impact probability is 100% as expected. However, higher up in the water column, the collision probability is twice as high in the mid line, where the tether passes twice per period than at the extremes of its trajectory. The collision probability distribution is much more complex in the upper end of the water column, where the kite and tether can simultaneously collide with the object. Results demonstrate the viability of such models, which can also incorporate empirical

  18. The generalized Balescu-Lenard collision operator: A unifying concept for tokamak transport

    International Nuclear Information System (INIS)

    Mynick, H.E.

    1987-08-01

    The generalization of the Balescu-Lenard collision operator to its fully electromagnetic counterpart in Kaufman's action-angle formalism is derived and its properties investigated. The general form may be specialized to any particular geometry where the unperturbed particle motion is integrable, and thus includes cylindrical plasmas, inhomogeneous slabs with nonuniform magnetic fields, tokamaks, and the particularly simple geometry of the standard operator as special cases. The general form points to the commonality between axisymmetric, turbulent, and ripple transport, and implies properties (e.g., intrinsic ambipolarity) which should be shared by them, under appropriate conditions. Along with a turbulent ''anomalous diffusion coefficient'' calculated for tokamaks in previous work, an ''anomalous pinch'' term of closely related structure and scaling is also implied by the generalized operator. 20 refs

  19. Data Recovery of Distributed Hash Table with Distributed-to-Distributed Data Copy

    Science.gov (United States)

    Doi, Yusuke; Wakayama, Shirou; Ozaki, Satoshi

    To realize huge-scale information services, many Distributed Hash Table (DHT) based systems have been proposed. For example, there are some proposals to manage item-level product traceability information with DHTs. In such an application, each entry of a huge number of item-level IDs need to be available on a DHT. To ensure data availability, the soft-state approach has been employed in previous works. However, this does not scale well against the number of entries on a DHT. As we expect 1010 products in the traceability case, the soft-state approach is unacceptable. In this paper, we propose Distributed-to-Distributed Data Copy (D3C). With D3C, users can reconstruct the data as they detect data loss, or even migrate to another DHT system. We show why it scales well against the number of entries on a DHT. We have confirmed our approach with a prototype. Evaluation shows our approach fits well on a DHT with a low rate of failure and a huge number of data entries.

  20. Numerical simulation of binary collisions using a modified surface tension model with particle method

    International Nuclear Information System (INIS)

    Sun Zhongguo; Xi Guang; Chen Xi

    2009-01-01

    The binary collision of liquid droplets is of both practical importance and fundamental value in computational fluid mechanics. We present a modified surface tension model within the moving particle semi-implicit (MPS) method, and carry out two-dimensional simulations to investigate the mechanisms of coalescence and separation of the droplets during binary collision. The modified surface tension model improves accuracy and convergence. A mechanism map is established for various possible deformation pathways encountered during binary collision, as the impact speed is varied; a new pathway is reported when the collision speed is critical. In addition, eccentric collisions are simulated and the effect of the rotation of coalesced particle is explored. The results qualitatively agree with experiments and the numerical protocol may find applications in studying free surface flows and interface deformation

  1. Resolving collisions in Stokes suspensions with an efficient and stable potential-free constrained optimization algorithm

    Science.gov (United States)

    Yan, Wen; Corona, Eduardo; Veerapaneni, Shravan; Shelley, Michael

    2017-11-01

    A common challenge in simulating dense suspension of rigid particles in Stokes flow is the numerical instability that arises due to particle collisions. To overcome this problem, often a strong repulsive potential between particles is prescribed. This in turn leads to numerical stiffness and dramatic reduction in stable time-step sizes. In this work, we eliminate such stiffness by introducing contact constraints explicitly and solving the hydrodynamic equations in tandem with a linear complementarity problem with inequality constraints. The Newton's third law of the collision force is explicitly guaranteed to allow consistent calculation of collision stresses. Efficient parallelization for shared-memory and distributed-memory architectures is also implemented. This method can be coupled to any Stokes hydrodynamics solver for particles with various shapes and allows us to simulate 104 107 spheres on a laptop, depending on the cost of the Stokes hydrodynamics solver. We demonstrate its performance on a range of applications from active matter to multi-physics problems.

  2. Centrality and rapidity dependence of inclusive jet production in sNN=5.02 TeV proton–lead collisions with the ATLAS detector

    Directory of Open Access Journals (Sweden)

    G. Aad

    2015-09-01

    Full Text Available Measurements of the centrality and rapidity dependence of inclusive jet production in sNN=5.02 TeV proton–lead (p+Pb collisions and the jet cross-section in s=2.76 TeV proton–proton collisions are presented. These quantities are measured in datasets corresponding to an integrated luminosity of 27.8 nb−1 and 4.0 pb−1, respectively, recorded with the ATLAS detector at the Large Hadron Collider in 2013. The p+Pb collision centrality was characterised using the total transverse energy measured in the pseudorapidity interval −4.9<η<−3.2 in the direction of the lead beam. Results are presented for the double-differential per-collision yields as a function of jet rapidity and transverse momentum (pT for minimum-bias and centrality-selected p+Pb collisions, and are compared to the jet rate from the geometric expectation. The total jet yield in minimum-bias events is slightly enhanced above the expectation in a pT-dependent manner but is consistent with the expectation within uncertainties. The ratios of jet spectra from different centrality selections show a strong modification of jet production at all pT at forward rapidities and for large pT at mid-rapidity, which manifests as a suppression of the jet yield in central events and an enhancement in peripheral events. These effects imply that the factorisation between hard and soft processes is violated at an unexpected level in proton–nucleus collisions. Furthermore, the modifications at forward rapidities are found to be a function of the total jet energy only, implying that the violations may have a simple dependence on the hard parton–parton kinematics.

  3. Ontology-Based Peer Exchange Network (OPEN)

    Science.gov (United States)

    Dong, Hui

    2010-01-01

    In current Peer-to-Peer networks, distributed and semantic free indexing is widely used by systems adopting "Distributed Hash Table" ("DHT") mechanisms. Although such systems typically solve a. user query rather fast in a deterministic way, they only support a very narrow search scheme, namely the exact hash key match. Furthermore, DHT systems put…

  4. Doubly charmed baryon production in heavy ion collisions

    Science.gov (United States)

    Yao, Xiaojun; Müller, Berndt

    2018-04-01

    We give an estimate of Ξcc ++ production rate and transverse momentum spectra in relativistic heavy ion collisions. We use Boltzmann transport equations to describe the dynamical evolution of charm quarks and diquarks inside quark-gluon plasma. In-medium formation and dissociation rates of charm diquarks are calculated from potential nonrelativistic QCD for the diquark sector. We solve the transport equations by Monte Carlo simulations. For 2.76 TeV Pb-Pb collisions with 0-10% centrality, the number of Ξcc ++ produced in the transverse momentum range 0-5 GeV and rapidity from -1 to 1 is roughly 0.02 per collision. We repeat the calculation with a melting temperature 250 MeV above which no diquarks can be formed. The number of Ξcc ++ produced in the same kinematic region is about 0.0125 per collision. We discuss how to study diquarks at finite temperature on a lattice and construct the antitriplet free energy in a gauge invariant but path dependent way. We also comment on extensions of the calculation to other doubly heavy baryons and doubly heavy tetraquarks and the feasibility of experimental measurements.

  5. Gaze movements and spatial working memory in collision avoidance: a traffic intersection task

    Directory of Open Access Journals (Sweden)

    Gregor eHardiess

    2013-06-01

    Full Text Available Street crossing under traffic is an everyday activity including collision detection as well as avoidance of objects in the path of motion. Such tasks demand extraction and representation of spatio-temporal information about relevant obstacles in an optimized format. Relevant task information is extracted visually by the use of gaze movements and represented in spatial working memory. In a virtual reality traffic intersection task, subjects are confronted with a two-lane intersection where cars are appearing with different frequencies, corresponding to high and low traffic densities. Under free observation and exploration of the scenery (using unrestricted eye and head movements the overall task for the subjects was to predict the potential-of-collision (POC of the cars or to adjust an adequate driving speed in order to cross the intersection without collision (i.e., to find the free space for crossing. In a series of experiments, gaze movement parameters, task performance, and the representation of car positions within working memory at distinct time points were assessed in normal subjects as well as in neurological patients suffering from homonymous hemianopia. In the following, we review the findings of these experiments together with other studies and provide a new perspective of the role of gaze behavior and spatial memory in collision detection and avoidance, focusing on the following questions: (i which sensory variables can be identified supporting adequate collision detection? (ii How do gaze movements and working memory contribute to collision avoidance when multiple moving objects are present and (iii how do they correlate with task performance? (iv How do patients with homonymous visual field defects use gaze movements and working memory to compensate for visual field loss? In conclusion, we extend the theory of collision detection and avoidance in the case of multiple moving objects and provide a new perspective on the combined

  6. RANCANG BANGUN APLIKASI ANTIVIRUS KOMPUTER DENGAN MENGGUNAKAN METODE SECURE HASH ALGORITHM 1 (SHA1 DAN HEURISTIC STRING

    Directory of Open Access Journals (Sweden)

    I Gusti Made Panji Indrawinatha

    2016-12-01

    Full Text Available Virus komputer merupakan perangkat lunak berbahaya yang dapat merusak data dan menggandakan diri pada sistem komputer. Untuk mendeteksi dan membersihkan virus dari sistem komputer, maka dibuatlah aplikasi antivirus. Dalam mendeteksi berbagai jenis virus sebuah aplikasi antivirus biasanya menggunakan beberapa metode. Pada penelitian ini akan membahas perancangan sebuah aplikasi antivirus menggunakan metode Secure Hash Algorithm 1 (SHA1 dan heuristic string sebagai metode pendeteksian virus. Dari pengujian yang dilakukan diperoleh hasil dimana saat tidak menggunakan heuristic, antivirus hanya mendeteksi 12 file dari 34 file sample virus atau memiliki tingkat akurasi pendeteksian sebesar 35%. sedangkan saat menggunakan heuristic, antivirus berhasil mendeteksi 31 file dari 34 file sample virus atau memiliki tingkat akurasi pendeteksian sebesar 91%.

  7. PREDICTIVE POTENTIAL FIELD-BASED COLLISION AVOIDANCE FOR MULTICOPTERS

    Directory of Open Access Journals (Sweden)

    M. Nieuwenhuisen

    2013-08-01

    Full Text Available Reliable obstacle avoidance is a key to navigating with UAVs in the close vicinity of static and dynamic obstacles. Wheel-based mobile robots are often equipped with 2D or 3D laser range finders that cover the 2D workspace sufficiently accurate and at a high rate. Micro UAV platforms operate in a 3D environment, but the restricted payload prohibits the use of fast state-of-the-art 3D sensors. Thus, perception of small obstacles is often only possible in the vicinity of the UAV and a fast collision avoidance system is necessary. We propose a reactive collision avoidance system based on artificial potential fields, that takes the special dynamics of UAVs into account by predicting the influence of obstacles on the estimated trajectory in the near future using a learned motion model. Experimental evaluation shows that the prediction leads to smoother trajectories and allows to navigate collision-free through passageways.

  8. Production of pions and anomalous projectile fragments in heavy ion collisions

    International Nuclear Information System (INIS)

    Noren, B.

    1988-05-01

    Results are presented from investigations of the mean free path (mfp) of multiply charged fragments, produced by 1.8 A GeV argon nuclei. The mfp's have been studied experimentally, and no dependence of the mfp on the distance from the preceeding collision is observed. In a Monte Carlo simulation, the mfp estimators are investigated for different statistics, with or without an enhanced reaction probability. Intermediate energy heavy ion collisions have been studied using the carbon beam produced at the CERN SC-accelerator. Cross-sections for pion + and pion - have been measured over a wide range of angles and targets. Also, coincidence measurements with projectile-like fragments have been performed. The pion - /pion + ratio has been studied for C+Li, C+C, C+Pb, C+ 116 Sn and C+ 124 Sn. Inconsistencies in the target mass dependence of the pion yield disappear if a correction for reabsorption in the target nucleus is included. The projectile breakup is significantly stronger for pion producing collisions than for the average collision, thus indicating a much stronger abundance of central collisions. (With 32 refs.) (author)

  9. Constituent quark model for nuclear stopping in high energy nuclear collisions

    International Nuclear Information System (INIS)

    Choi, T.K.; Maruyama, M.; Takagi, F.

    1997-01-01

    We study nuclear stopping in high energy nuclear collisions using the constituent quark model. It is assumed that wounded nucleons with a different number of interacted quarks hadronize in different ways. The probabilities of having such wounded nucleons are evaluated for proton-proton, proton-nucleus, and nucleus-nucleus collisions. After examining our model in proton-proton and proton-nucleus collisions and fixing the hadronization functions, it is extended to nucleus-nucleus collisions. It is used to calculate the rapidity distribution and the rapidity shift of final-state protons in nucleus-nucleus collisions. The computed results are in good agreement with the experimental data on 32 S+ 32 S at E lab =200A GeV and 208 Pb+ 208 Pb at E lab =160A GeV. Theoretical predictions are also given for proton rapidity distribution in 197 Au+ 197 Au at √(s)=200A GeV (BNL-RHIC). We predict that the nearly baryon-free region will appear in the midrapidity region and the rapidity shift is left-angle Δy right-angle=2.24

  10. When do particle ratios freeze out in relativistic heavy ion collisions?

    Science.gov (United States)

    Humanic, Thomas; Bellwied, Rene

    1999-10-01

    The systematics of CERN SPS data for transverse mass distributions have been shown to imply that thermal equilibrium is achieved at freeze out in these collisions. This conclusion is based on the observation that for p+p, S+S, and Pb+Pb collisions freeze out occurs at a single temperature for all particle species measured if one assumes a certain uniform expansion velocity after hadronization for each colliding system [1]. A recent final- state rescattering calculation for SPS Pb+Pb collisions has shown that these systematics can be described as a consequence of particle rescattering where the system is assumed initially (i.e. at hadronization) to have a common temperature for all particles and no initial expansion velocity [2]. In addition to kinetic observables, it is equally interesting to investigate the time dependence of particle abundances through particle ratios in such a calculation. Two questions immediately arise: 1) is chemical equilibrium established in these collisions, and 2) when does chemical freeze out occur with respect to thermal freeze out for different particle ratios? How rescattering influences particle ratios is clearly of interest if one would like to deduce information about the hadronization stage of the collision from particle ratios measured at freeze out. For the present work we will show results for strange and non-strange particle ratios within the context of a version of the dynamic transport code used in Ref. [2]. [1] NA44 colaboration, I.G. Bearden et al., Phys. Rev. Lett. 78,2080(1997), [2] T. J. Humanic, Phys. Rev. C 57,866(1998)

  11. Coorbital Collision as the Energy Source for Enceladus' Plumes

    Science.gov (United States)

    Peale, Stanton J.; Greenberg, R.

    2009-09-01

    A collision of a coorbiting satellite with Enceladus is proposed as the source of energy to power the observed plumes emanating from the south pole of the satellite. A coorbital would have impacted at a velocity only slightly above the escape velocity of Enceladus, which would likely be necessary to keep the collision gentle enough not to disrupt the old cratered terrain nearby. If the mass were 1% of Enceladus', the energy deposited can sustain the plumes for approximately 80,000 to 200,000 years at the estimated observed power of 6 to 15 GW, so the impact would have been quite recent. The collision at an arbitrary point would leave Enceladus with non-synchronous, non-principal-axis rotation and a significant obliquity. After subsuming the impactor's volume, the region around the impact point will have expanded in a manner consistent with the observed tectonic pattern. The ring-like expansion implied by the radial cracks suggests that the new principal axis of maximum moment of inertia could have passed through the impact point. Internal dissipation from precession of the spin axis about the axis of maximum moment of inertia in the body frame of reference and from tides raised on Enceladus cause the axes of spin and of maximum moment to converge as the spin is brought to a zero obliquity and synchronous rotation on a time scale that is extremely short compared to the lifetime of the plumes. Hence, the region of collision, which is hot, ends up at one of the poles where we find the plumes.

  12. A quantum-mechanical study of atom-diatom collisions in a laser field

    International Nuclear Information System (INIS)

    Chang, Sintarng.

    1989-01-01

    A quantum-mechanical formalism, in both space-fixed (SF) and body-fixed (BF) coordinate systems, is developed for describing an S-state structureless atom (A) colliding with a Estate vibrating rotor diatomic molecule (BC) in the presence of a laser field. The additional Hamiltonians H rad and H int , which describe the laser field and its interaction with the atom-diatom collision system, have been added to the field-free Hamiltonian Ho. And the collision problem can be solved by this extended Hamiltonian. The laser field Hamiltonian is represented by the number state representation. The interaction Hamiltonian is expressed by rvec μ BC . rvec ε, where rvec μ BC is the dipole moment of the diatomic molecule BC, and rvec ε is the electric field strength of the laser field. Since the field-free total angular momentum J is coupling with the laser field, J and its z-axis projection M are no longer conserved. To facilitate the collision problem, the laser field is restricted to a single mode, and its interaction with the collision only involves dipole allowed transitions in which a single photon is absorbed or emitted. For convenience, the coupled-channel equations are solved by the real boundary conditions instead of the complex boundary conditions. On applying the real boundary conditions, the author obtains the K-matrix, which is related to the S-matrix by S = (I + iK)(I - iK) -1 . A model calculation is discussed for the Ar + CO collision system in a laser intensity of 10 9 W/cm 2

  13. A chimeric fusion of the hASH1 and EZH2 promoters mediates high and specific reporter and suicide gene expression and cytotoxicity in small cell lung cancer cells

    DEFF Research Database (Denmark)

    Poulsen, T.T.; Pedersen, N.; Juel, H.

    2008-01-01

    Transcriptionally targeted gene therapy is a promising experimental modality for treatment of systemic malignancies such as small cell lung cancer (SCLC). We have identified the human achaete-scute homolog 1 (hASH1) and enhancer of zeste homolog 2 (EZH2) genes as highly upregulated in SCLC compar...

  14. A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy

    Science.gov (United States)

    Popic, Victoria; Batzoglou, Serafim

    2017-05-01

    Low-cost clouds can alleviate the compute and storage burden of the genome sequencing data explosion. However, moving personal genome data analysis to the cloud can raise serious privacy concerns. Here, we devise a method named Balaur, a privacy preserving read mapper for hybrid clouds based on locality sensitive hashing and kmer voting. Balaur can securely outsource a substantial fraction of the computation to the public cloud, while being highly competitive in accuracy and speed with non-private state-of-the-art read aligners on short read data. We also show that the method is significantly faster than the state of the art in long read mapping. Therefore, Balaur can enable institutions handling massive genomic data sets to shift part of their analysis to the cloud without sacrificing accuracy or exposing sensitive information to an untrusted third party.

  15. Quasi-free scattering in the ionization and destruction of hydrogen and helium Rydberg atoms in collision with neutral targets

    International Nuclear Information System (INIS)

    Renwick, S.P.

    1992-01-01

    Hydrogen and helium Rydberg atoms (H** and He**), with principal quantum number n ranging from 10 to 20, have been used in collision experiments from 1 to 40 keV/amu. These were produced by electron capture in a charge-exchange cell and analyzed by ionization in a modulated electric field combined with phase-sensitive detection. Three experiments have been conducted. In the first, spectra of the band of H and He Rydberg states from electron capture were produced by the modulated field technique and compared. Considerable differences were found between the two. Both types of spectra were analyzed with calculations of Stark energies and field ionization rates. Attempts were made to simulate the spectra using this information and some assumptions about the state distribution produced in the electron capture. In the second experiment, destruction cross sections for H** incident on N 2 , Ar, and SF 6 were measured. This was a further test of the independent-particle model for Rydberg atom scattering; in this model, the atom is destroyed by quasi-free scattering of either the ionic core or the outer electron. Already proven valid for n = 20-35, this has been extended to n as low as 10, as measurements with n = 10 showed full compliance with the model. In the third experiment, not only destruction cross sections but also ionization cross sections for H** and He** incident on Xe, AR, and N 2 were measured. The ionization measurement is a more sensitive test of the quasi-free scattering of the Rydberg electron. This was especially important for the Xe and Ar targets, which exhibits a Ramsauer-Townsend minimum in their free-electron scattering cross sections. The quasi-free Rydberg electron should reproduce these data. Unmistakable deviations from the quasi-free prediction were seen in Xe and N 2 but not in Ar. This represents the first measurement of a breakdown of the Independent Particle Model for fast Rydberg atom scattering

  16. Hadronic accompaniment of free quarks creation in E+E--collisions

    International Nuclear Information System (INIS)

    Golubkov, Yu.A.

    1991-01-01

    The process of free b-quarks quarks creation in e + e - -annihilation at the Z 0 -peak is regarded. The hadronic accompaniment due to bremsstrahlung of such a process is analysed. The calculations for free bb-bar-pair production are made taking into account the energy losses on colour field. The distributions of leptons and free light quarks from weak decays of b-quark are shown. The probability to overlap of ionization signals of free light quark and charge hadron is estimated. The comparison with LEP experimental data allows to get a conclusion, that the existing experimental accuracy does not exclude the creation of free b-quarks in the Z 0 -decays. 17 refs.; 6 figs

  17. On the Impact of Collisions on Particle Dispersion in a Shear Layer

    Science.gov (United States)

    Soteriou, Marios; Mosley, John

    1999-11-01

    In this numerical study the impact of collisions on the evolution of a dispersed phase in a gaseous shear layer flow is investigated. The disperse phase consists of spherical particles which may experience two modes of collision: In the first, the collision has no effect on the particles themselves and is simply registered for accounting purposes. In the second, the particles coalesce upon impact into a larger spherical particle. The two phase mixture is assumed to be dilute and hence the impact of the disperse phase on the carrier phase is disabled. The unaveraged evolution of the carrier phase is simulated by using the Lagrangian Vortex Element Method while that of the dispersed phase by computing the trajectories of individual particles. Thus the numerical model is totally Lagrangian and grid-free. Numerical results indicate that collisions are maximized at intermediate Stokes numbers and that for a given volume fraction they increase as the particles get smaller. Coalescence of particles tends to reduce the overall number of collisions in the flow and alters their locus, shifting them predominately upstream. It also has a dramatic impact on dispersion increasing it substantially for the cases that experience even moderate number of collisions.

  18. Entropy-based implied volatility and its information content

    NARCIS (Netherlands)

    X. Xiao (Xiao); C. Zhou (Chen)

    2016-01-01

    markdownabstractThis paper investigates the maximum entropy approach on estimating implied volatility. The entropy approach also allows to measure option implied skewness and kurtosis nonparametrically, and to construct confidence intervals. Simulations show that the en- tropy approach outperforms

  19. Orbital alignment effects in near-resonant Rydberg atoms-rare gas collisions

    International Nuclear Information System (INIS)

    Isaacs, W.A.; Morrison, M.A.

    1993-01-01

    Recent experimental and theoretical studies of near-resonant energy transfer collisions involving rare-gas atoms and alkali or alkaline earth atoms which have been initially excited to an aligned state via one or more linearly polarized rasters have yielded a wealth of insight into orbital alignment and related effects. We have extended this inquiry to initially aligned Rydberg states, examining state-to-state and alignment-selected cross sections using quantum collision theory augmented by approximations appropriate to the special characteristics of the Rydberg state (e.g., the quasi-free-electron model and the impulse approximation)

  20. Quantum control of quasi-collision states: A protocol for hybrid fusion

    Science.gov (United States)

    Vilela Mendes, R.

    2018-04-01

    When confined to small regions quantum systems exhibit electronic and structural properties different from their free space behavior. These properties are of interest, for example, for molecular insertion, hydrogen storage and the exploration of new pathways for chemical and nuclear reactions. Here, a confined three-body problem is studied, with emphasis on the study of the “quantum scars” associated to dynamical collisions. For the particular case of nuclear reactions, it is proposed that a molecular cage might simply be used as a confining device with the collision states accessed by quantum control techniques.

  1. Multiple ionization effects in atomic collisions in the K-L matching region

    International Nuclear Information System (INIS)

    Piticu, I.; Ciortea, C.; Dumitriu, D.; Enulescu, A.; Fluerasu, D.; Szilagyi, S.Z.; Zoran, V.; Bucur, B.I.

    1994-01-01

    The multiple ionization effect in the determination of 3dσ vacancy production cross sections and sharing probabilities in asymmetric quasimolecular collisions near K-L level matching, for the collision systems Fe, Co, Ni, and Cu + Bi in the energy range 0.25 - 1.75 MeV/u have been studied. The experimental energy and intensity shifts of some projectile and target X-ray lines, as well as Dirac-Hartree-Fock calculations, have been used to estimate average single particle probabilities for multiple ionization of projectile L- and target M-shells. Using these estimates and a standard procedure, the experimental 3dσ vacancy production cross sections and sharing probabilities have been corrected for multiple ionization. The influence of the multiple ionization-induced increase in binding energy of the molecular orbitals implied in vacancy sharing is discussed. (Author)

  2. Uniform bounds for Black--Scholes implied volatility

    OpenAIRE

    Tehranchi, Michael R.

    2015-01-01

    In this note, Black--Scholes implied volatility is expressed in terms of various optimisation problems. From these representations, upper and lower bounds are derived which hold uniformly across moneyness and call price. Various symmetries of the Black--Scholes formula are exploited to derive new bounds from old. These bounds are used to reprove asymptotic formulae for implied volatility at extreme strikes and/or maturities.

  3. Large-scale model-based assessment of deer-vehicle collision risk.

    Directory of Open Access Journals (Sweden)

    Torsten Hothorn

    Full Text Available Ungulates, in particular the Central European roe deer Capreolus capreolus and the North American white-tailed deer Odocoileus virginianus, are economically and ecologically important. The two species are risk factors for deer-vehicle collisions and as browsers of palatable trees have implications for forest regeneration. However, no large-scale management systems for ungulates have been implemented, mainly because of the high efforts and costs associated with attempts to estimate population sizes of free-living ungulates living in a complex landscape. Attempts to directly estimate population sizes of deer are problematic owing to poor data quality and lack of spatial representation on larger scales. We used data on >74,000 deer-vehicle collisions observed in 2006 and 2009 in Bavaria, Germany, to model the local risk of deer-vehicle collisions and to investigate the relationship between deer-vehicle collisions and both environmental conditions and browsing intensities. An innovative modelling approach for the number of deer-vehicle collisions, which allows nonlinear environment-deer relationships and assessment of spatial heterogeneity, was the basis for estimating the local risk of collisions for specific road types on the scale of Bavarian municipalities. Based on this risk model, we propose a new "deer-vehicle collision index" for deer management. We show that the risk of deer-vehicle collisions is positively correlated to browsing intensity and to harvest numbers. Overall, our results demonstrate that the number of deer-vehicle collisions can be predicted with high precision on the scale of municipalities. In the densely populated and intensively used landscapes of Central Europe and North America, a model-based risk assessment for deer-vehicle collisions provides a cost-efficient instrument for deer management on the landscape scale. The measures derived from our model provide valuable information for planning road protection and defining

  4. Expansion, thermalization, and entropy production in high-energy nuclear collisions

    International Nuclear Information System (INIS)

    Heiselberg, H.; Wang, X.

    1996-01-01

    The thermalization process is studied in an expanding parton gas using the Boltzmann equation with two types of collision terms. In the relaxation time approximation we determine the criteria under which a time-dependent relaxation time leads to thermalization of the partons. We calculate the entropy production due to collisions for the general time-dependent relaxation time. In a perturbative QCD approach on the other hand, we can, given the initial conditions, estimate the effective relaxation time due to elastic collisions; this will be an upper limit only since radiative processes will also contribute to thermalization. We find that the parton gas does thermalize eventually but only after having undergone a phase of free streaming and gradual equilibration where considerable entropy is produced (open-quote open-quote after burning close-quote close-quote). The final entropy and thus particle density depends on the collision time as well as the initial conditions (a open-quote open-quote memory effect close-quote close-quote). Results for entropy production are presented based upon various model estimates of early parton production. copyright 1996 The American Physical Society

  5. Energy Dependence of Elliptic Flow over a Large Pseudorapidity Range in Au+Au Collisions at the BNL Relativistic Heavy Ion Collider

    Science.gov (United States)

    Back, B. B.; Baker, M. D.; Ballintijn, M.; Barton, D. S.; Betts, R. R.; Bickley, A. A.; Bindel, R.; Budzanowski, A.; Busza, W.; Carroll, A.; Chai, Z.; Decowski, M. P.; García, E.; Gburek, T.; George, N.; Gulbrandsen, K.; Gushue, S.; Halliwell, C.; Hamblen, J.; Hauer, M.; Heintzelman, G. A.; Henderson, C.; Hofman, D. J.; Hollis, R. S.; Hołyński, R.; Holzman, B.; Iordanova, A.; Johnson, E.; Kane, J. L.; Katzy, J.; Khan, N.; Kucewicz, W.; Kulinich, P.; Kuo, C. M.; Lin, W. T.; Manly, S.; McLeod, D.; Mignerey, A. C.; Nouicer, R.; Olszewski, A.; Pak, R.; Park, I. C.; Pernegger, H.; Reed, C.; Remsberg, L. P.; Reuter, M.; Roland, C.; Roland, G.; Rosenberg, L.; Sagerer, J.; Sarin, P.; Sawicki, P.; Seals, H.; Sedykh, I.; Skulski, W.; Smith, C. E.; Stankiewicz, M. A.; Steinberg, P.; Stephans, G. S.; Sukhanov, A.; Tang, J.-L.; Tonjes, M. B.; Trzupek, A.; Vale, C.; van Nieuwenhuizen, G. J.; Vaurynovich, S. S.; Verdier, R.; Veres, G. I.; Wenger, E.; Wolfs, F. L.; Wosiek, B.; Woźniak, K.; Wuosmaa, A. H.; Wysłouch, B.

    2005-04-01

    This Letter describes the measurement of the energy dependence of elliptic flow for charged particles in Au+Au collisions using the PHOBOS detector at the Relativistic Heavy Ion Collider. Data taken at collision energies of √(sNN)=19.6, 62.4, 130, and 200 GeV are shown over a wide range in pseudorapidity. These results, when plotted as a function of η'=|η|-ybeam, scale with approximate linearity throughout η', implying no sharp changes in the dynamics of particle production as a function of pseudorapidity or increasing beam energy.

  6. Design and performance evaluation of collision protection-based safety operation for a haptic robot-assisted catheter operating system.

    Science.gov (United States)

    Zhang, Linshuai; Guo, Shuxiang; Yu, Huadong; Song, Yu; Tamiya, Takashi; Hirata, Hideyuki; Ishihara, Hidenori

    2018-02-23

    The robot-assisted catheter system can increase operating distance thus preventing the exposure radiation of the surgeon to X-ray for endovascular catheterization. However, few designs have considered the collision protection between the catheter tip and the vessel wall. This paper presents a novel catheter operating system based on tissue protection to prevent vessel puncture caused by collision. The integrated haptic interface not only allows the operator to feel the real force feedback, but also combines with the newly proposed collision protection mechanism (CPM) to mitigate the collision trauma. The CPM can release the catheter quickly when the measured force exceeds a certain threshold, so as to avoid the vessel puncture. A significant advantage is that the proposed mechanism can adjust the protection threshold in real time by the current according to the actual characteristics of the blood vessel. To verify the effectiveness of the tissue protection by the system, the evaluation experiments in vitro were carried out. The results show that the further collision damage can be effectively prevented by the CPM, which implies the realization of relative safe catheterization. This research provides some insights into the functional improvements of safe and reliable robot-assisted catheter systems.

  7. GMC Collisions as Triggers of Star Formation. III. Density and Magnetically Regulated Star Formation

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Benjamin [National Astronomical Observatory of Japan, Mitaka, Tokyo 181-8588 (Japan); Tan, Jonathan C. [Department of Physics, University of Florida, Gainesville, FL 32611 (United States); Christie, Duncan [Department of Astronomy, University of Florida, Gainesville, FL 32611 (United States); Nakamura, Fumitaka [National Astronomical Observatory, Mitaka, Tokyo 181-8588 (Japan); Van Loo, Sven [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Collins, David, E-mail: ben.wu@nao.ac.jp [Department of Physics, Florida State University, Tallahassee, FL 32306-4350 (United States)

    2017-06-01

    We study giant molecular cloud (GMC) collisions and their ability to trigger star cluster formation. We further develop our three-dimensional magnetized, turbulent, colliding GMC simulations by implementing star formation subgrid models. Two such models are explored: (1) “Density-Regulated,” i.e., fixed efficiency per free-fall time above a set density threshold and (2) “Magnetically Regulated,” i.e., fixed efficiency per free-fall time in regions that are magnetically supercritical. Variations of parameters associated with these models are also explored. In the non-colliding simulations, the overall level of star formation is sensitive to model parameter choices that relate to effective density thresholds. In the GMC collision simulations, the final star formation rates and efficiencies are relatively independent of these parameters. Between the non-colliding and colliding cases, we compare the morphologies of the resulting star clusters, properties of star-forming gas, time evolution of the star formation rate (SFR), spatial clustering of the stars, and resulting kinematics of the stars in comparison to the natal gas. We find that typical collisions, by creating larger amounts of dense gas, trigger earlier and enhanced star formation, resulting in 10 times higher SFRs and efficiencies. The star clusters formed from GMC collisions show greater spatial substructure and more disturbed kinematics.

  8. Production of dimeson atoms in high-energy collisions

    Energy Technology Data Exchange (ETDEWEB)

    Afanasyev, L.; Gevorkyan, S.; Voskresenskaya, O. [Joint Institute for Nuclear Research, Dubna (Russian Federation)

    2017-04-15

    The production of two-meson electromagnetic bound states and free meson pairs π{sup +}π{sup -}, K{sup +}K{sup -}, π{sup +}K{sup -+} in relativistic collisions has been considered. It is shown that using of exact Coulomb wave functions for dimeson atom (DMA) allows one to calculate the yield of discrete states with the desired accuracy. The relative probabilities of production of DMA and meson pairs in the free state are estimated. The amplitude of DMA transition from 1S to 2P state, which is essential for the pionium Lamb shift measurements, has been obtained. (orig.)

  9. Uniform Bounds for Black--Scholes Implied Volatility

    OpenAIRE

    Tehranchi, Michael Rummine

    2016-01-01

    In this note, Black--Scholes implied volatility is expressed in terms of various optimization problems. From these representations, upper and lower bounds are derived which hold uniformly across moneyness and call price. Various symmetries of the Black--Scholes formula are exploited to derive new bounds from old. These bounds are used to reprove asymptotic formulas for implied volatility at extreme strikes and/or maturities. the Society for Industrial and Applied Mathematics 10.1137/14095248X

  10. Modification of jet-like correlations in Pb-Au collisions at 158A GeV/c

    Science.gov (United States)

    Ceres Collaboration; Adamová, D.; Agakichiev, G.; Antończyk, D.; Appelshäuser, H.; Belaga, V.; Bielčíková, J.; Braun-Munzinger, P.; Busch, O.; Cherlin, A.; Damjanović, S.; Dietel, T.; Dietrich, L.; Drees, A.; Dubitzky, W.; Esumi, S. I.; Filimonov, K.; Fomenko, K.; Fraenkel, Z.; Garabatos, C.; Glässel, P.; Holeczek, J.; Kalisky, M.; Kniege, S.; Kushpil, V.; Maas, A.; Marín, A.; Milošević, J.; Milov, A.; Miśkowiec, D.; Panebrattsev, Yu.; Petchenova, O.; Petráček, V.; Pfeiffer, A.; Płoskoń, M.; Rak, J.; Ravinovich, I.; Rehak, P.; Sako, H.; Schmitz, W.; Schuchmann, S.; Sedykh, S.; Shimansky, S.; Stachel, J.; Šumbera, M.; Tilsner, H.; Tserruya, I.; Wessels, J. P.; Wienold, T.; Wurm, J. P.; Xie, W.; Yurevich, S.; Yurevich, V.

    2009-07-01

    Results of a two-particle correlation analysis of high-p charged particles in Pb-Au collisions at 158A GeV/c are presented. The data have been recorded by the CERES experiment at the CERN-SPS. The correlations are studied as function of transverse momentum, particle charge and collision centrality. We observe a jet-like structure in the vicinity of a high-p trigger particle and a broad back-to-back distribution. The yields of associated particles per trigger show a strong dependence on the trigger/associate charge combination. A comparison to PYTHIA confirms the jet-like pattern at the near-side but suggests a strong modification at the away-side, implying significant energy transfer of the hard-scattered parton to the medium.

  11. Evidence of b-jet quenching in PbPb collisions at $\\sqrt{s_{NN}}$ = 2.76 TeV

    CERN Document Server

    Chatrchyan, Serguei; Sirunyan, Albert M; Tumasyan, Armen; Adam, Wolfgang; Bergauer, Thomas; Dragicevic, Marko; Erö, Janos; Fabjan, Christian; Friedl, Markus; Fruehwirth, Rudolf; Ghete, Vasile Mihai; Hartl, Christian; Hörmann, Natascha; Hrubec, Josef; Jeitler, Manfred; Kiesenhofer, Wolfgang; Knünz, Valentin; Krammer, Manfred; Krätschmer, Ilse; Liko, Dietrich; Mikulec, Ivan; Rabady, Dinyar; Rahbaran, Babak; Rohringer, Herbert; Schöfbeck, Robert; Strauss, Josef; Taurok, Anton; Treberer-Treberspurg, Wolfgang; Waltenberger, Wolfgang; Wulz, Claudia-Elisabeth; Mossolov, Vladimir; Shumeiko, Nikolai; Suarez Gonzalez, Juan; Alderweireldt, Sara; Bansal, Monika; Bansal, Sunil; Cornelis, Tom; De Wolf, Eddi A; Janssen, Xavier; Knutsson, Albert; Luyckx, Sten; Mucibello, Luca; Ochesanu, Silvia; Roland, Benoit; Rougny, Romain; Van Haevermaet, Hans; Van Mechelen, Pierre; Van Remortel, Nick; Van Spilbeeck, Alex; Blekman, Freya; Blyweert, Stijn; D'Hondt, Jorgen; Heracleous, Natalie; Kalogeropoulos, Alexis; Keaveney, James; Kim, Tae Jeong; Lowette, Steven; Maes, Michael; Olbrechts, Annik; Strom, Derek; Tavernier, Stefaan; Van Doninck, Walter; Van Mulders, Petra; Van Onsem, Gerrit Patrick; Villella, Ilaria; Caillol, Cécile; Clerbaux, Barbara; De Lentdecker, Gilles; Favart, Laurent; Gay, Arnaud; Léonard, Alexandre; Marage, Pierre Edouard; Mohammadi, Abdollah; Perniè, Luca; Reis, Thomas; Seva, Tomislav; Thomas, Laurent; Vander Velde, Catherine; Vanlaer, Pascal; Wang, Jian; Adler, Volker; Beernaert, Kelly; Benucci, Leonardo; Cimmino, Anna; Costantini, Silvia; Dildick, Sven; Garcia, Guillaume; Klein, Benjamin; Lellouch, Jérémie; Mccartin, Joseph; Ocampo Rios, Alberto Andres; Ryckbosch, Dirk; Salva Diblen, Sinem; Sigamani, Michael; Strobbe, Nadja; Thyssen, Filip; Tytgat, Michael; Walsh, Sinead; Yazgan, Efe; Zaganidis, Nicolas; Basegmez, Suzan; Beluffi, Camille; Bruno, Giacomo; Castello, Roberto; Caudron, Adrien; Ceard, Ludivine; Da Silveira, Gustavo Gil; Delaere, Christophe; Du Pree, Tristan; Favart, Denis; Forthomme, Laurent; Giammanco, Andrea; Hollar, Jonathan; Jez, Pavel; Komm, Matthias; Lemaitre, Vincent; Liao, Junhui; Militaru, Otilia; Nuttens, Claude; Pagano, Davide; Pin, Arnaud; Piotrzkowski, Krzysztof; Popov, Andrey; Quertenmont, Loic; Selvaggi, Michele; Vidal Marono, Miguel; Vizan Garcia, Jesus Manuel; Beliy, Nikita; Caebergs, Thierry; Daubie, Evelyne; Hammad, Gregory Habib; Alves, Gilvan; Correa Martins Junior, Marcos; Martins, Thiago; Pol, Maria Elena; Henrique Gomes E Souza, Moacyr; Aldá Júnior, Walter Luiz; Carvalho, Wagner; Chinellato, Jose; Custódio, Analu; Melo Da Costa, Eliza; De Jesus Damiao, Dilson; De Oliveira Martins, Carley; Fonseca De Souza, Sandro; Malbouisson, Helena; Malek, Magdalena; Matos Figueiredo, Diego; Mundim, Luiz; Nogima, Helio; Prado Da Silva, Wanda Lucia; Santaolalla, Javier; Santoro, Alberto; Sznajder, Andre; Tonelli Manganote, Edmilson José; Vilela Pereira, Antonio; Bernardes, Cesar Augusto; De Almeida Dias, Flavia; Tomei, Thiago; De Moraes Gregores, Eduardo; Lagana, Caio; Mercadante, Pedro G; Novaes, Sergio F; Padula, Sandra; Genchev, Vladimir; Iaydjiev, Plamen; Marinov, Andrey; Piperov, Stefan; Rodozov, Mircho; Sultanov, Georgi; Vutova, Mariana; Dimitrov, Anton; Glushkov, Ivan; Hadjiiska, Roumyana; Kozhuharov, Venelin; Litov, Leander; Pavlov, Borislav; Petkov, Peicho; Bian, Jian-Guo; Chen, Guo-Ming; Chen, He-Sheng; Chen, Mingshui; Du, Ran; Jiang, Chun-Hua; Liang, Dong; Liang, Song; Meng, Xiangwei; Plestina, Roko; Tao, Junquan; Wang, Xianyou; Wang, Zheng; Asawatangtrakuldee, Chayanit; Ban, Yong; Guo, Yifei; Li, Wenbo; Liu, Shuai; Mao, Yajun; Qian, Si-Jin; Teng, Haiyun; Wang, Dayong; Zhang, Linlin; Zou, Wei; Avila, Carlos; Carrillo Montoya, Camilo Andres; Chaparro Sierra, Luisa Fernanda; Florez, Carlos; Gomez, Juan Pablo; Gomez Moreno, Bernardo; Sanabria, Juan Carlos; Godinovic, Nikola; Lelas, Damir; Polic, Dunja; Puljak, Ivica; Antunovic, Zeljko; Kovac, Marko; Brigljevic, Vuko; Kadija, Kreso; Luetic, Jelena; Mekterovic, Darko; Morovic, Srecko; Tikvica, Lucija; Attikis, Alexandros; Mavromanolakis, Georgios; Mousa, Jehad; Nicolaou, Charalambos; Ptochos, Fotios; Razis, Panos A; Finger, Miroslav; Finger Jr, Michael; Assran, Yasser; Elgammal, Sherif; Elkafrawy, Tamer; Ellithi Kamel, Ali; Mahmoud, Mohammed; Radi, Amr; Kadastik, Mario; Müntel, Mait; Murumaa, Marion; Raidal, Martti; Rebane, Liis; Tiko, Andres; Eerola, Paula; Fedi, Giacomo; Voutilainen, Mikko; Härkönen, Jaakko; Karimäki, Veikko; Kinnunen, Ritva; Kortelainen, Matti J; Lampén, Tapio; Lassila-Perini, Kati; Lehti, Sami; Lindén, Tomas; Luukka, Panja-Riina; Mäenpää, Teppo; Peltola, Timo; Tuominen, Eija; Tuominiemi, Jorma; Tuovinen, Esa; Wendland, Lauri; Tuuva, Tuure; Besancon, Marc; Couderc, Fabrice; Dejardin, Marc; Denegri, Daniel; Fabbro, Bernard; Faure, Jean-Louis; Ferri, Federico; Ganjour, Serguei; Givernaud, Alain; Gras, Philippe; Hamel de Monchenault, Gautier; Jarry, Patrick; Locci, Elizabeth; Malcles, Julie; Nayak, Aruna; Rander, John; Rosowsky, André; Titov, Maksym; Baffioni, Stephanie; Beaudette, Florian; Busson, Philippe; Charlot, Claude; Daci, Nadir; Dahms, Torsten; Dalchenko, Mykhailo; Dobrzynski, Ludwik; Florent, Alice; Granier de Cassagnac, Raphael; Miné, Philippe; Mironov, Camelia; Naranjo, Ivo Nicolas; Nguyen, Matthew; Ochando, Christophe; Paganini, Pascal; Sabes, David; Salerno, Roberto; Sirois, Yves; Veelken, Christian; Yilmaz, Yetkin; Zabi, Alexandre; Agram, Jean-Laurent; Andrea, Jeremy; Bloch, Daniel; Brom, Jean-Marie; Chabert, Eric Christian; Collard, Caroline; Conte, Eric; Drouhin, Frédéric; Fontaine, Jean-Charles; Gelé, Denis; Goerlach, Ulrich; Goetzmann, Christophe; Juillot, Pierre; Le Bihan, Anne-Catherine; Van Hove, Pierre; Gadrat, Sébastien; Beauceron, Stephanie; Beaupere, Nicolas; Boudoul, Gaelle; Brochet, Sébastien; Chasserat, Julien; Chierici, Roberto; Contardo, Didier; Depasse, Pierre; El Mamouni, Houmani; Fan, Jiawei; Fay, Jean; Gascon, Susan; Gouzevitch, Maxime; Ille, Bernard; Kurca, Tibor; Lethuillier, Morgan; Mirabito, Laurent; Perries, Stephane; Ruiz Alvarez, José David; Sgandurra, Louis; Sordini, Viola; Vander Donckt, Muriel; Verdier, Patrice; Viret, Sébastien; Xiao, Hong; Tsamalaidze, Zviad; Autermann, Christian; Beranek, Sarah; Bontenackels, Michael; Calpas, Betty; Edelhoff, Matthias; Feld, Lutz; Hindrichs, Otto; Klein, Katja; Ostapchuk, Andrey; Perieanu, Adrian; Raupach, Frank; Sammet, Jan; Schael, Stefan; Sprenger, Daniel; Weber, Hendrik; Wittmer, Bruno; Zhukov, Valery; Ata, Metin; Caudron, Julien; Dietz-Laursonn, Erik; Duchardt, Deborah; Erdmann, Martin; Fischer, Robert; Güth, Andreas; Hebbeker, Thomas; Heidemann, Carsten; Hoepfner, Kerstin; Klingebiel, Dennis; Knutzen, Simon; Kreuzer, Peter; Merschmeyer, Markus; Meyer, Arnd; Olschewski, Mark; Padeken, Klaas; Papacz, Paul; Reithler, Hans; Schmitz, Stefan Antonius; Sonnenschein, Lars; Teyssier, Daniel; Thüer, Sebastian; Weber, Martin; Cherepanov, Vladimir; Erdogan, Yusuf; Flügge, Günter; Geenen, Heiko; Geisler, Matthias; Haj Ahmad, Wael; Hoehle, Felix; Kargoll, Bastian; Kress, Thomas; Kuessel, Yvonne; Lingemann, Joschka; Nowack, Andreas; Nugent, Ian Michael; Perchalla, Lars; Pooth, Oliver; Stahl, Achim; Asin, Ivan; Bartosik, Nazar; Behr, Joerg; Behrenhoff, Wolf; Behrens, Ulf; Bell, Alan James; Bergholz, Matthias; Bethani, Agni; Borras, Kerstin; Burgmeier, Armin; Cakir, Altan; Calligaris, Luigi; Campbell, Alan; Choudhury, Somnath; Costanza, Francesco; Diez Pardos, Carmen; Dooling, Samantha; Dorland, Tyler; Eckerlin, Guenter; Eckstein, Doris; Eichhorn, Thomas; Flucke, Gero; Geiser, Achim; Grebenyuk, Anastasia; Gunnellini, Paolo; Habib, Shiraz; Hauk, Johannes; Hellwig, Gregor; Hempel, Maria; Horton, Dean; Jung, Hannes; Kasemann, Matthias; Katsas, Panagiotis; Kieseler, Jan; Kleinwort, Claus; Krämer, Mira; Krücker, Dirk; Lange, Wolfgang; Leonard, Jessica; Lipka, Katerina; Lohmann, Wolfgang; Lutz, Benjamin; Mankel, Rainer; Marfin, Ihar; Melzer-Pellmann, Isabell-Alissandra; Meyer, Andreas Bernhard; Mnich, Joachim; Mussgiller, Andreas; Naumann-Emme, Sebastian; Novgorodova, Olga; Nowak, Friederike; Perrey, Hanno; Petrukhin, Alexey; Pitzl, Daniel; Placakyte, Ringaile; Raspereza, Alexei; Ribeiro Cipriano, Pedro M; Riedl, Caroline; Ron, Elias; Sahin, Mehmet Özgür; Salfeld-Nebgen, Jakob; Saxena, Pooja; Schmidt, Ringo; Schoerner-Sadenius, Thomas; Schröder, Matthias; Stein, Matthias; Vargas Trevino, Andrea Del Rocio; Walsh, Roberval; Wissing, Christoph; Aldaya Martin, Maria; Blobel, Volker; Enderle, Holger; Erfle, Joachim; Garutti, Erika; Goebel, Kristin; Görner, Martin; Gosselink, Martijn; Haller, Johannes; Höing, Rebekka Sophie; Kirschenmann, Henning; Klanner, Robert; Kogler, Roman; Lange, Jörn; Marchesini, Ivan; Ott, Jochen; Peiffer, Thomas; Pietsch, Niklas; Rathjens, Denis; Sander, Christian; Schettler, Hannes; Schleper, Peter; Schlieckau, Eike; Schmidt, Alexander; Seidel, Markus; Sibille, Jennifer; Sola, Valentina; Stadie, Hartmut; Steinbrück, Georg; Troendle, Daniel; Usai, Emanuele; Vanelderen, Lukas; Barth, Christian; Baus, Colin; Berger, Joram; Böser, Christian; Butz, Erik; Chwalek, Thorsten; De Boer, Wim; Descroix, Alexis; Dierlamm, Alexander; Feindt, Michael; Guthoff, Moritz; Hartmann, Frank; Hauth, Thomas; Held, Hauke; Hoffmann, Karl-Heinz; Husemann, Ulrich; Katkov, Igor; Kornmayer, Andreas; Kuznetsova, Ekaterina; Lobelle Pardo, Patricia; Martschei, Daniel; Mozer, Matthias Ulrich; Müller, Thomas; Niegel, Martin; Nürnberg, Andreas; Oberst, Oliver; Quast, Gunter; Rabbertz, Klaus; Ratnikov, Fedor; Röcker, Steffen; Schilling, Frank-Peter; Schott, Gregory; Simonis, Hans-Jürgen; Stober, Fred-Markus Helmut; Ulrich, Ralf; Wagner-Kuhr, Jeannine; Wayand, Stefan; Weiler, Thomas; Wolf, Roger; Zeise, Manuel; Anagnostou, Georgios; Daskalakis, Georgios; Geralis, Theodoros; Kesisoglou, Stilianos; Kyriakis, Aristotelis; Loukas, Demetrios; Markou, Athanasios; Markou, Christos; Ntomari, Eleni; Psallidas, Andreas; Topsis-Giotis, Iasonas; Gouskos, Loukas; Panagiotou, Apostolos; Saoulidou, Niki; Stiliaris, Efstathios; Aslanoglou, Xenofon; Evangelou, Ioannis; Flouris, Giannis; Foudas, Costas; Kokkas, Panagiotis; Manthos, Nikolaos; Papadopoulos, Ioannis; Paradas, Evangelos; Bencze, Gyorgy; Hajdu, Csaba; Hidas, Pàl; Horvath, Dezso; Sikler, Ferenc; Veszpremi, Viktor; Vesztergombi, Gyorgy; Zsigmond, Anna Julia; Beni, Noemi; Czellar, Sandor; Molnar, Jozsef; Palinkas, Jozsef; Szillasi, Zoltan; Karancsi, János; Raics, Peter; Trocsanyi, Zoltan Laszlo; Ujvari, Balazs; Swain, Sanjay Kumar; Beri, Suman Bala; Bhatnagar, Vipin; Dhingra, Nitish; Gupta, Ruchi; Kaur, Manjit; Mehta, Manuk Zubin; Mittal, Monika; Nishu, Nishu; Sharma, Archana; Singh, Jasbir; Kumar, Ashok; Kumar, Arun; Ahuja, Sudha; Bhardwaj, Ashutosh; Choudhary, Brajesh C; Kumar, Ajay; Malhotra, Shivali; Naimuddin, Md; Ranjan, Kirti; Sharma, Varun; Shivpuri, Ram Krishen; Banerjee, Sunanda; Bhattacharya, Satyaki; Chatterjee, Kalyanmoy; Dutta, Suchandra; Gomber, Bhawna; Jain, Sandhya; Jain, Shilpi; Khurana, Raman; Modak, Atanu; Mukherjee, Swagata; Roy, Debarati; Sarkar, Subir; Sharan, Manoj; Singh, Anil; Abdulsalam, Abdulla; Dutta, Dipanwita; Kailas, Swaminathan; Kumar, Vineet; Mohanty, Ajit Kumar; Pant, Lalit Mohan; Shukla, Prashant; Topkar, Anita; Aziz, Tariq; Chatterjee, Rajdeep Mohan; Ganguly, Sanmay; Ghosh, Saranya; Guchait, Monoranjan; Gurtu, Atul; Kole, Gouranga; Kumar, Sanjeev; Maity, Manas; Majumder, Gobinda; Mazumdar, Kajari; Mohanty, Gagan Bihari; Parida, Bibhuti; Sudhakar, Katta; Wickramage, Nadeesha; Banerjee, Sudeshna; Dugad, Shashikant; Arfaei, Hessamaddin; Bakhshiansohi, Hamed; Behnamian, Hadi; Etesami, Seyed Mohsen; Fahim, Ali; Jafari, Abideh; Khakzad, Mohsen; Mohammadi Najafabadi, Mojtaba; Naseri, Mohsen; Paktinat Mehdiabadi, Saeid; Safarzadeh, Batool; Zeinali, Maryam; Grunewald, Martin; Abbrescia, Marcello; Barbone, Lucia; Calabria, Cesare; Chhibra, Simranjit Singh; Colaleo, Anna; Creanza, Donato; De Filippis, Nicola; De Palma, Mauro; Fiore, Luigi; Iaselli, Giuseppe; Maggi, Giorgio; Maggi, Marcello; Marangelli, Bartolomeo; My, Salvatore; Nuzzo, Salvatore; Pacifico, Nicola; Pompili, Alexis; Pugliese, Gabriella; Radogna, Raffaella; Selvaggi, Giovanna; Silvestris, Lucia; Singh, Gurpreet; Venditti, Rosamaria; Verwilligen, Piet; Zito, Giuseppe; Abbiendi, Giovanni; Benvenuti, Alberto; Bonacorsi, Daniele; Braibant-Giacomelli, Sylvie; Brigliadori, Luca; Campanini, Renato; Capiluppi, Paolo; Castro, Andrea; Cavallo, Francesca Romana; Codispoti, Giuseppe; Cuffiani, Marco; Dallavalle, Gaetano-Marco; Fabbri, Fabrizio; Fanfani, Alessandra; Fasanella, Daniele; Giacomelli, Paolo; Grandi, Claudio; Guiducci, Luigi; Marcellini, Stefano; Masetti, Gianni; Meneghelli, Marco; Montanari, Alessandro; Navarria, Francesco; Odorici, Fabrizio; Perrotta, Andrea; Primavera, Federica; Rossi, Antonio; Rovelli, Tiziano; Siroli, Gian Piero; Tosi, Nicolò; Travaglini, Riccardo; Albergo, Sebastiano; Cappello, Gigi; Chiorboli, Massimiliano; Costa, Salvatore; Giordano, Ferdinando; Potenza, Renato; Tricomi, Alessia; Tuve, Cristina; Barbagli, Giuseppe; Ciulli, Vitaliano; Civinini, Carlo; D'Alessandro, Raffaello; Focardi, Ettore; Gallo, Elisabetta; Gonzi, Sandro; Gori, Valentina; Lenzi, Piergiulio; Meschini, Marco; Paoletti, Simone; Sguazzoni, Giacomo; Tropiano, Antonio; Benussi, Luigi; Bianco, Stefano; Fabbri, Franco; Piccolo, Davide; Fabbricatore, Pasquale; Ferretti, Roberta; Ferro, Fabrizio; Lo Vetere, Maurizio; Musenich, Riccardo; Robutti, Enrico; Tosi, Silvano; Benaglia, Andrea; Dinardo, Mauro Emanuele; Fiorendi, Sara; Gennai, Simone; Ghezzi, Alessio; Govoni, Pietro; Lucchini, Marco Toliman; Malvezzi, Sandra; Manzoni, Riccardo Andrea; Martelli, Arabella; Menasce, Dario; Moroni, Luigi; Paganoni, Marco; Pedrini, Daniele; Ragazzi, Stefano; Redaelli, Nicola; Tabarelli de Fatis, Tommaso; Buontempo, Salvatore; Cavallo, Nicola; Fabozzi, Francesco; Iorio, Alberto Orso Maria; Lista, Luca; Meola, Sabino; Merola, Mario; Paolucci, Pierluigi; Azzi, Patrizia; Bacchetta, Nicola; Bisello, Dario; Branca, Antonio; Carlin, Roberto; Checchia, Paolo; Dorigo, Tommaso; Dosselli, Umberto; Galanti, Mario; Gasparini, Fabrizio; Giubilato, Piero; Gozzelino, Andrea; Kanishchev, Konstantin; Lacaprara, Stefano; Lazzizzera, Ignazio; Margoni, Martino; Meneguzzo, Anna Teresa; Montecassiano, Fabio; Passaseo, Marina; Pazzini, Jacopo; Pegoraro, Matteo; Pozzobon, Nicola; Ronchese, Paolo; Simonetto, Franco; Torassa, Ezio; Tosi, Mia; Zotto, Pierluigi; Zucchetta, Alberto; Zumerle, Gianni; Gabusi, Michele; Ratti, Sergio P; Riccardi, Cristina; Vitulo, Paolo; Biasini, Maurizio; Bilei, Gian Mario; Fanò, Livio; Lariccia, Paolo; Mantovani, Giancarlo; Menichelli, Mauro; Romeo, Francesco; Saha, Anirban; Santocchia, Attilio; Spiezia, Aniello; Androsov, Konstantin; Azzurri, Paolo; Bagliesi, Giuseppe; Bernardini, Jacopo; Boccali, Tommaso; Broccolo, Giuseppe; Castaldi, Rino; Ciocci, Maria Agnese; Dell'Orso, Roberto; Fiori, Francesco; Foà, Lorenzo; Giassi, Alessandro; Grippo, Maria Teresa; Kraan, Aafke; Ligabue, Franco; Lomtadze, Teimuraz; Martini, Luca; Messineo, Alberto; Moon, Chang-Seong; Palla, Fabrizio; Rizzi, Andrea; Savoy-Navarro, Aurore; Serban, Alin Titus; Spagnolo, Paolo; Squillacioti, Paola; Tenchini, Roberto; Tonelli, Guido; Venturi, Andrea; Verdini, Piero Giorgio; Vernieri, Caterina; Barone, Luciano; Cavallari, Francesca; Del Re, Daniele; Diemoz, Marcella; Grassi, Marco; Jorda, Clara; Longo, Egidio; Margaroli, Fabrizio; Meridiani, Paolo; Micheli, Francesco; Nourbakhsh, Shervin; Organtini, Giovanni; Paramatti, Riccardo; Rahatlou, Shahram; Rovelli, Chiara; Soffi, Livia; Traczyk, Piotr; Amapane, Nicola; Arcidiacono, Roberta; Argiro, Stefano; Arneodo, Michele; Bellan, Riccardo; Biino, Cristina; Cartiglia, Nicolo; Casasso, Stefano; Costa, Marco; Degano, Alessandro; Demaria, Natale; Mariotti, Chiara; Maselli, Silvia; Migliore, Ernesto; Monaco, Vincenzo; Musich, Marco; Obertino, Maria Margherita; Ortona, Giacomo; Pacher, Luca; Pastrone, Nadia; Pelliccioni, Mario; Potenza, Alberto; Romero, Alessandra; Ruspa, Marta; Sacchi, Roberto; Solano, Ada; Staiano, Amedeo; Tamponi, Umberto; Belforte, Stefano; Candelise, Vieri; Casarsa, Massimo; Cossutti, Fabio; Della Ricca, Giuseppe; Gobbo, Benigno; La Licata, Chiara; Marone, Matteo; Montanino, Damiana; Penzo, Aldo; Schizzi, Andrea; Umer, Tomo; Zanetti, Anna; Chang, Sunghyun; Kim, Tae Yeon; Nam, Soon-Kwon; Kim, Dong Hee; Kim, Gui Nyun; Kim, Ji Eun; Kim, Min Suk; Kong, Dae Jung; Lee, Sangeun; Oh, Young Do; Park, Hyangkyu; Son, Dong-Chul; Kim, Jae Yool; Kim, Zero Jaeho; Song, Sanghyeon; Choi, Suyong; Gyun, Dooyeon; Hong, Byung-Sik; Jo, Mihee; Kim, Hyunchul; Kim, Yongsun; Lee, Kyong Sei; Park, Sung Keun; Roh, Youn; Choi, Minkyoo; Kim, Ji Hyun; Park, Chawon; Park, Inkyu; Park, Sangnam; Ryu, Geonmo; Choi, Young-Il; Choi, Young Kyu; Goh, Junghwan; Kwon, Eunhyang; Lee, Byounghoon; Lee, Jongseok; Lee, Sungeun; Seo, Hyunkwan; Yu, Intae; Juodagalvis, Andrius; Komaragiri, Jyothsna Rani; Castilla-Valdez, Heriberto; De La Cruz-Burelo, Eduard; Heredia-de La Cruz, Ivan; Lopez-Fernandez, Ricardo; Martínez-Ortega, Jorge; Sánchez Hernández, Alberto; Villasenor-Cendejas, Luis Manuel; Carrillo Moreno, Salvador; Vazquez Valencia, Fabiola; Salazar Ibarguen, Humberto Antonio; Casimiro Linares, Edgar; Morelos Pineda, Antonio; Krofcheck, David; Butler, Philip H; Doesburg, Robert; Reucroft, Steve; Silverwood, Hamish; Ahmad, Muhammad; Asghar, Muhammad Irfan; Butt, Jamila; Hoorani, Hafeez R; Khalid, Shoaib; Khan, Wajid Ali; Khurshid, Taimoor; Qazi, Shamona; Shah, Mehar Ali; Shoaib, Muhammad; Bialkowska, Helena; Bluj, Michal; Boimska, Bożena; Frueboes, Tomasz; Górski, Maciej; Kazana, Malgorzata; Nawrocki, Krzysztof; Romanowska-Rybinska, Katarzyna; Szleper, Michal; Wrochna, Grzegorz; Zalewski, Piotr; Brona, Grzegorz; Bunkowski, Karol; Cwiok, Mikolaj; Dominik, Wojciech; Doroba, Krzysztof; Kalinowski, Artur; Konecki, Marcin; Krolikowski, Jan; Misiura, Maciej; Wolszczak, Weronika; Bargassa, Pedrame; Beirão Da Cruz E Silva, Cristóvão; Faccioli, Pietro; Ferreira Parracho, Pedro Guilherme; Gallinaro, Michele; Nguyen, Federico; Rodrigues Antunes, Joao; Seixas, Joao; Varela, Joao; Vischia, Pietro; Afanasiev, Serguei; Bunin, Pavel; Golutvin, Igor; Gorbunov, Ilya; Kamenev, Alexey; Karjavin, Vladimir; Konoplyanikov, Viktor; Kozlov, Guennady; Lanev, Alexander; Malakhov, Alexander; Matveev, Viktor; Moisenz, Petr; Palichik, Vladimir; Perelygin, Victor; Shmatov, Sergey; Skatchkov, Nikolai; Smirnov, Vitaly; Zarubin, Anatoli; Golovtsov, Victor; Ivanov, Yury; Kim, Victor; Levchenko, Petr; Murzin, Victor; Oreshkin, Vadim; Smirnov, Igor; Sulimov, Valentin; Uvarov, Lev; Vavilov, Sergey; Vorobyev, Alexey; Vorobyev, Andrey; Andreev, Yuri; Dermenev, Alexander; Gninenko, Sergei; Golubev, Nikolai; Kirsanov, Mikhail; Krasnikov, Nikolai; Pashenkov, Anatoli; Tlisov, Danila; Toropin, Alexander; Epshteyn, Vladimir; Gavrilov, Vladimir; Lychkovskaya, Natalia; Popov, Vladimir; Safronov, Grigory; Semenov, Sergey; Spiridonov, Alexander; Stolin, Viatcheslav; Vlasov, Evgueni; Zhokin, Alexander; Andreev, Vladimir; Azarkin, Maksim; Dremin, Igor; Kirakosyan, Martin; Leonidov, Andrey; Mesyats, Gennady; Rusakov, Sergey V; Vinogradov, Alexey; Belyaev, Andrey; Boos, Edouard; Ershov, Alexander; Gribushin, Andrey; Klyukhin, Vyacheslav; Kodolova, Olga; Korotkikh, Vladimir; Lokhtin, Igor; Obraztsov, Stepan; Petrushanko, Sergey; Savrin, Viktor; Snigirev, Alexander; Vardanyan, Irina; Azhgirey, Igor; Bayshev, Igor; Bitioukov, Sergei; Kachanov, Vassili; Kalinin, Alexey; Konstantinov, Dmitri; Krychkine, Victor; Petrov, Vladimir; Ryutin, Roman; Sobol, Andrei; Tourtchanovitch, Leonid; Troshin, Sergey; Tyurin, Nikolay; Uzunian, Andrey; Volkov, Alexey; Adzic, Petar; Djordjevic, Milos; Ekmedzic, Marko; Milosevic, Jovan; Aguilar-Benitez, Manuel; Alcaraz Maestre, Juan; Battilana, Carlo; Calvo, Enrique; Cerrada, Marcos; Chamizo Llatas, Maria; Colino, Nicanor; De La Cruz, Begona; Delgado Peris, Antonio; Domínguez Vázquez, Daniel; Fernandez Bedoya, Cristina; Fernández Ramos, Juan Pablo; Ferrando, Antonio; Flix, Jose; Fouz, Maria Cruz; Garcia-Abia, Pablo; Gonzalez Lopez, Oscar; Goy Lopez, Silvia; Hernandez, Jose M; Josa, Maria Isabel; Merino, Gonzalo; Navarro De Martino, Eduardo; Puerta Pelayo, Jesus; Quintario Olmeda, Adrián; Redondo, Ignacio; Romero, Luciano; Senghi Soares, Mara; Willmott, Carlos; Albajar, Carmen; de Trocóniz, Jorge F; Missiroli, Marino; Brun, Hugues; Cuevas, Javier; Fernandez Menendez, Javier; Folgueras, Santiago; Gonzalez Caballero, Isidro; Lloret Iglesias, Lara; Brochero Cifuentes, Javier Andres; Cabrillo, Iban Jose; Calderon, Alicia; Chuang, Shan-Huei; Duarte Campderros, Jordi; Fernandez, Marcos; Gomez, Gervasio; Gonzalez Sanchez, Javier; Graziano, Alberto; Lopez Virto, Amparo; Marco, Jesus; Marco, Rafael; Martinez Rivero, Celso; Matorras, Francisco; Munoz Sanchez, Francisca Javiela; Piedra Gomez, Jonatan; Rodrigo, Teresa; Rodríguez-Marrero, Ana Yaiza; Ruiz-Jimeno, Alberto; Scodellaro, Luca; Vila, Ivan; Vilar Cortabitarte, Rocio; Abbaneo, Duccio; Auffray, Etiennette; Auzinger, Georg; Bachtis, Michail; Baillon, Paul; Ball, Austin; Barney, David; Bendavid, Joshua; Benhabib, Lamia; Benitez, Jose F; Bernet, Colin; Bianchi, Giovanni; Bloch, Philippe; Bocci, Andrea; Bonato, Alessio; Bondu, Olivier; Botta, Cristina; Breuker, Horst; Camporesi, Tiziano; Cerminara, Gianluca; Christiansen, Tim; Coarasa Perez, Jose Antonio; Colafranceschi, Stefano; D'Alfonso, Mariarosaria; D'Enterria, David; Dabrowski, Anne; David Tinoco Mendes, Andre; De Guio, Federico; De Roeck, Albert; De Visscher, Simon; Di Guida, Salvatore; Dobson, Marc; Dupont-Sagorin, Niels; Elliott-Peisert, Anna; Eugster, Jürg; Franzoni, Giovanni; Funk, Wolfgang; Giffels, Manuel; Gigi, Dominique; Gill, Karl; Girone, Maria; Giunta, Marina; Glege, Frank; Gomez-Reino Garrido, Robert; Gowdy, Stephen; Guida, Roberto; Hammer, Josef; Hansen, Magnus; Harris, Philip; Innocente, Vincenzo; Janot, Patrick; Karavakis, Edward; Kousouris, Konstantinos; Krajczar, Krisztian; Lecoq, Paul; Lourenco, Carlos; Magini, Nicolo; Malgeri, Luca; Mannelli, Marcello; Masetti, Lorenzo; Meijers, Frans; Mersi, Stefano; Meschi, Emilio; Moortgat, Filip; Mulders, Martijn; Musella, Pasquale; Orsini, Luciano; Palencia Cortezon, Enrique; Perez, Emmanuelle; Perrozzi, Luca; Petrilli, Achille; Petrucciani, Giovanni; Pfeiffer, Andreas; Pierini, Maurizio; Pimiä, Martti; Piparo, Danilo; Plagge, Michael; Racz, Attila; Reece, William; Rolandi, Gigi; Rovere, Marco; Sakulin, Hannes; Santanastasio, Francesco; Schäfer, Christoph; Schwick, Christoph; Sekmen, Sezen; Sharma, Archana; Siegrist, Patrice; Silva, Pedro; Simon, Michal; Sphicas, Paraskevas; Steggemann, Jan; Stieger, Benjamin; Stoye, Markus; Tsirou, Andromachi; Veres, Gabor Istvan; Vlimant, Jean-Roch; Wöhri, Hermine Katharina; Zeuner, Wolfram Dietrich; Bertl, Willi; Deiters, Konrad; Erdmann, Wolfram; Horisberger, Roland; Ingram, Quentin; Kaestli, Hans-Christian; König, Stefan; Kotlinski, Danek; Langenegger, Urs; Renker, Dieter; Rohe, Tilman; Bachmair, Felix; Bäni, Lukas; Bianchini, Lorenzo; Bortignon, Pierluigi; Buchmann, Marco-Andrea; Casal, Bruno; Chanon, Nicolas; Deisher, Amanda; Dissertori, Günther; Dittmar, Michael; Donegà, Mauro; Dünser, Marc; Eller, Philipp; Grab, Christoph; Hits, Dmitry; Lustermann, Werner; Mangano, Boris; Marini, Andrea Carlo; Martinez Ruiz del Arbol, Pablo; Meister, Daniel; Mohr, Niklas; Nägeli, Christoph; Nef, Pascal; Nessi-Tedaldi, Francesca; Pandolfi, Francesco; Pape, Luc; Pauss, Felicitas; Peruzzi, Marco; Quittnat, Milena; Ronga, Frederic Jean; Rossini, Marco; Starodumov, Andrei; Takahashi, Maiko; Tauscher, Ludwig; Theofilatos, Konstantinos; Treille, Daniel; Wallny, Rainer; Weber, Hannsjoerg Artur; Amsler, Claude; Chiochia, Vincenzo; De Cosa, Annapaola; Favaro, Carlotta; Hinzmann, Andreas; Hreus, Tomas; Ivova Rikova, Mirena; Kilminster, Benjamin; Millan Mejias, Barbara; Ngadiuba, Jennifer; Robmann, Peter; Snoek, Hella; Taroni, Silvia; Verzetti, Mauro; Yang, Yong; Cardaci, Marco; Chen, Kuan-Hsin; Ferro, Cristina; Kuo, Chia-Ming; Li, Syue-Wei; Lin, Willis; Lu, Yun-Ju; Volpe, Roberta; Yu, Shin-Shan; Bartalini, Paolo; Chang, Paoti; Chang, You-Hao; Chang, Yu-Wei; Chao, Yuan; Chen, Kai-Feng; Chen, Po-Hsun; Dietz, Charles; Grundler, Ulysses; Hou, George Wei-Shu; Hsiung, Yee; Kao, Kai-Yi; Lei, Yeong-Jyi; Liu, Yueh-Feng; Lu, Rong-Shyang; Majumder, Devdatta; Petrakou, Eleni; Shi, Xin; Shiu, Jing-Ge; Tzeng, Yeng-Ming; Wang, Minzu; Wilken, Rachel; Asavapibhop, Burin; Suwonjandee, Narumon; Adiguzel, Aytul; Bakirci, Mustafa Numan; Cerci, Salim; Dozen, Candan; Dumanoglu, Isa; Eskut, Eda; Girgis, Semiray; Gokbulut, Gul; Gurpinar, Emine; Hos, Ilknur; Kangal, Evrim Ersin; Kayis Topaksu, Aysel; Onengut, Gulsen; Ozdemir, Kadri; Ozturk, Sertac; Polatoz, Ayse; Sogut, Kenan; Sunar Cerci, Deniz; Tali, Bayram; Topakli, Huseyin; Vergili, Mehmet; Akin, Ilina Vasileva; Aliev, Takhmasib; Bilin, Bugra; Bilmis, Selcuk; Deniz, Muhammed; Gamsizkan, Halil; Guler, Ali Murat; Karapinar, Guler; Ocalan, Kadir; Ozpineci, Altug; Serin, Meltem; Sever, Ramazan; Surat, Ugur Emrah; Yalvac, Metin; Zeyrek, Mehmet; Gülmez, Erhan; Isildak, Bora; Kaya, Mithat; Kaya, Ozlem; Ozkorucuklu, Suat; Bahtiyar, Hüseyin; Barlas, Esra; Cankocak, Kerem; Günaydin, Yusuf Oguzhan; Vardarli, Fuat Ilkehan; Yücel, Mete; Levchuk, Leonid; Sorokin, Pavel; Brooke, James John; Clement, Emyr; Cussans, David; Flacher, Henning; Frazier, Robert; Goldstein, Joel; Grimes, Mark; Heath, Greg P; Heath, Helen F; Jacob, Jeson; Kreczko, Lukasz; Lucas, Chris; Meng, Zhaoxia; Newbold, Dave M; Paramesvaran, Sudarshan; Poll, Anthony; Senkin, Sergey; Smith, Vincent J; Williams, Thomas; Belyaev, Alexander; Brew, Christopher; Brown, Robert M; Cockerill, David JA; Coughlan, John A; Harder, Kristian; Harper, Sam; Ilic, Jelena; Olaiya, Emmanuel; Petyt, David; Shepherd-Themistocleous, Claire; Thea, Alessandro; Tomalin, Ian R; Womersley, William John; Worm, Steven; Baber, Mark; Bainbridge, Robert; Buchmuller, Oliver; Burton, Darren; Colling, David; Cripps, Nicholas; Cutajar, Michael; Dauncey, Paul; Davies, Gavin; Della Negra, Michel; Ferguson, William; Fulcher, Jonathan; Futyan, David; Gilbert, Andrew; Guneratne Bryer, Arlo; Hall, Geoffrey; Hatherell, Zoe; Hays, Jonathan; Iles, Gregory; Jarvis, Martyn; Karapostoli, Georgia; Kenzie, Matthew; Lane, Rebecca; Lucas, Robyn; Lyons, Louis; Magnan, Anne-Marie; Marrouche, Jad; Mathias, Bryn; Nandi, Robin; Nash, Jordan; Nikitenko, Alexander; Pela, Joao; Pesaresi, Mark; Petridis, Konstantinos; Pioppi, Michele; Raymond, David Mark; Rogerson, Samuel; Rose, Andrew; Seez, Christopher; Sharp, Peter; Sparrow, Alex; Tapper, Alexander; Vazquez Acosta, Monica; Virdee, Tejinder; Wakefield, Stuart; Wardle, Nicholas; Cole, Joanne; Hobson, Peter R; Khan, Akram; Kyberd, Paul; Leggat, Duncan; Leslie, Dawn; Martin, William; Reid, Ivan; Symonds, Philip; Teodorescu, Liliana; Turner, Mark; Dittmann, Jay; Hatakeyama, Kenichi; Kasmi, Azeddine; Liu, Hongxuan; Scarborough, Tara; Charaf, Otman; Cooper, Seth; Henderson, Conor; Rumerio, Paolo; Avetisyan, Aram; Bose, Tulika; Fantasia, Cory; Heister, Arno; Lawson, Philip; Lazic, Dragoslav; Rohlf, James; Sperka, David; St John, Jason; Sulak, Lawrence; Alimena, Juliette; Bhattacharya, Saptaparna; Christopher, Grant; Cutts, David; Demiragli, Zeynep; Ferapontov, Alexey; Garabedian, Alex; Heintz, Ulrich; Jabeen, Shabnam; Kukartsev, Gennadiy; Laird, Edward; Landsberg, Greg; Luk, Michael; Narain, Meenakshi; Segala, Michael; Sinthuprasith, Tutanon; Speer, Thomas; Swanson, Joshua; Breedon, Richard; Breto, Guillermo; Calderon De La Barca Sanchez, Manuel; Chauhan, Sushil; Chertok, Maxwell; Conway, John; Conway, Rylan; Cox, Peter Timothy; Erbacher, Robin; Gardner, Michael; Ko, Winston; Kopecky, Alexandra; Lander, Richard; Miceli, Tia; Pellett, Dave; Pilot, Justin; Ricci-Tam, Francesca; Rutherford, Britney; Searle, Matthew; Shalhout, Shalhout; Smith, John; Squires, Michael; Tripathi, Mani; Wilbur, Scott; Yohay, Rachel; Andreev, Valeri; Cline, David; Cousins, Robert; Erhan, Samim; Everaerts, Pieter; Farrell, Chris; Felcini, Marta; Hauser, Jay; Ignatenko, Mikhail; Jarvis, Chad; Rakness, Gregory; Schlein, Peter; Takasugi, Eric; Valuev, Vyacheslav; Weber, Matthias; Babb, John; Clare, Robert; Ellison, John Anthony; Gary, J William; Hanson, Gail; Heilman, Jesse; Jandir, Pawandeep; Lacroix, Florent; Liu, Hongliang; Long, Owen Rosser; Luthra, Arun; Malberti, Martina; Nguyen, Harold; Shrinivas, Amithabh; Sturdy, Jared; Sumowidagdo, Suharyo; Wimpenny, Stephen; Andrews, Warren; Branson, James G; Cerati, Giuseppe Benedetto; Cittolin, Sergio; D'Agnolo, Raffaele Tito; Evans, David; Holzner, André; Kelley, Ryan; Kovalskyi, Dmytro; Lebourgeois, Matthew; Letts, James; Macneill, Ian; Padhi, Sanjay; Palmer, Christopher; Pieri, Marco; Sani, Matteo; Sharma, Vivek; Simon, Sean; Sudano, Elizabeth; Tadel, Matevz; Tu, Yanjun; Vartak, Adish; Wasserbaech, Steven; Würthwein, Frank; Yagil, Avraham; Yoo, Jaehyeok; Barge, Derek; Campagnari, Claudio; Danielson, Thomas; Flowers, Kristen; Geffert, Paul; George, Christopher; Golf, Frank; Incandela, Joe; Justus, Christopher; Magaña Villalba, Ricardo; Mccoll, Nickolas; Pavlunin, Viktor; Richman, Jeffrey; Rossin, Roberto; Stuart, David; To, Wing; West, Christopher; Apresyan, Artur; Bornheim, Adolf; Bunn, Julian; Chen, Yi; Di Marco, Emanuele; Duarte, Javier; Kcira, Dorian; Mott, Alexander; Newman, Harvey B; Pena, Cristian; Rogan, Christopher; Spiropulu, Maria; Timciuc, Vladlen; Wilkinson, Richard; Xie, Si; Zhu, Ren-Yuan; Azzolini, Virginia; Calamba, Aristotle; Carroll, Ryan; Ferguson, Thomas; Iiyama, Yutaro; Jang, Dong Wook; Paulini, Manfred; Russ, James; Vogel, Helmut; Vorobiev, Igor; Cumalat, John Perry; Drell, Brian Robert; Ford, William T; Gaz, Alessandro; Luiggi Lopez, Eduardo; Nauenberg, Uriel; Smith, James; Stenson, Kevin; Ulmer, Keith; Wagner, Stephen Robert; Alexander, James; Chatterjee, Avishek; Eggert, Nicholas; Gibbons, Lawrence Kent; Hopkins, Walter; Khukhunaishvili, Aleko; Kreis, Benjamin; Mirman, Nathan; Nicolas Kaufman, Gala; Patterson, Juliet Ritchie; Ryd, Anders; Salvati, Emmanuele; Sun, Werner; Teo, Wee Don; Thom, Julia; Thompson, Joshua; Tucker, Jordan; Weng, Yao; Winstrom, Lucas; Wittich, Peter; Winn, Dave; Abdullin, Salavat; Albrow, Michael; Anderson, Jacob; Apollinari, Giorgio; Bauerdick, Lothar AT; Beretvas, Andrew; Berryhill, Jeffrey; Bhat, Pushpalatha C; Burkett, Kevin; Butler, Joel Nathan; Chetluru, Vasundhara; Cheung, Harry; Chlebana, Frank; Cihangir, Selcuk; Elvira, Victor Daniel; Fisk, Ian; Freeman, Jim; Gao, Yanyan; Gottschalk, Erik; Gray, Lindsey; Green, Dan; Grünendahl, Stefan; Gutsche, Oliver; Hare, Daryl; Harris, Robert M; Hirschauer, James; Hooberman, Benjamin; Jindariani, Sergo; Johnson, Marvin; Joshi, Umesh; Kaadze, Ketino; Klima, Boaz; Kwan, Simon; Linacre, Jacob; Lincoln, Don; Lipton, Ron; Lykken, Joseph; Maeshima, Kaori; Marraffino, John Michael; Martinez Outschoorn, Verena Ingrid; Maruyama, Sho; Mason, David; McBride, Patricia; Mishra, Kalanand; Mrenna, Stephen; Musienko, Yuri; Nahn, Steve; Newman-Holmes, Catherine; O'Dell, Vivian; Prokofyev, Oleg; Ratnikova, Natalia; Sexton-Kennedy, Elizabeth; Sharma, Seema; Spalding, William J; Spiegel, Leonard; Taylor, Lucas; Tkaczyk, Slawek; Tran, Nhan Viet; Uplegger, Lorenzo; Vaandering, Eric Wayne; Vidal, Richard; Whitbeck, Andrew; Whitmore, Juliana; Wu, Weimin; Yang, Fan; Yun, Jae Chul; Acosta, Darin; Avery, Paul; Bourilkov, Dimitri; Cheng, Tongguang; Das, Souvik; De Gruttola, Michele; Di Giovanni, Gian Piero; Dobur, Didar; Field, Richard D; Fisher, Matthew; Fu, Yu; Furic, Ivan-Kresimir; Hugon, Justin; Kim, Bockjoo; Konigsberg, Jacobo; Korytov, Andrey; Kropivnitskaya, Anna; Kypreos, Theodore; Low, Jia Fu; Matchev, Konstantin; Milenovic, Predrag; Mitselmakher, Guenakh; Muniz, Lana; Rinkevicius, Aurelijus; Shchutska, Lesya; Skhirtladze, Nikoloz; Snowball, Matthew; Yelton, John; Zakaria, Mohammed; Gaultney, Vanessa; Hewamanage, Samantha; Linn, Stephan; Markowitz, Pete; Martinez, German; Rodriguez, Jorge Luis; Adams, Todd; Askew, Andrew; Bochenek, Joseph; Chen, Jie; Diamond, Brendan; Haas, Jeff; Hagopian, Sharon; Hagopian, Vasken; Johnson, Kurtis F; Prosper, Harrison; Veeraraghavan, Venkatesh; Weinberg, Marc; Baarmand, Marc M; Dorney, Brian; Hohlmann, Marcus; Kalakhety, Himali; Yumiceva, Francisco; Adams, Mark Raymond; Apanasevich, Leonard; Bazterra, Victor Eduardo; Betts, Russell Richard; Bucinskaite, Inga; Cavanaugh, Richard; Evdokimov, Olga; Gauthier, Lucie; Gerber, Cecilia Elena; Hofman, David Jonathan; Khalatyan, Samvel; Kurt, Pelin; Moon, Dong Ho; O'Brien, Christine; Silkworth, Christopher; Turner, Paul; Varelas, Nikos; Akgun, Ugur; Albayrak, Elif Asli; Bilki, Burak; Clarida, Warren; Dilsiz, Kamuran; Duru, Firdevs; Haytmyradov, Maksat; Merlo, Jean-Pierre; Mermerkaya, Hamit; Mestvirishvili, Alexi; Moeller, Anthony; Nachtman, Jane; Ogul, Hasan; Onel, Yasar; Ozok, Ferhat; Sen, Sercan; Tan, Ping; Tiras, Emrah; Wetzel, James; Yetkin, Taylan; Yi, Kai; Barnett, Bruce Arnold; Blumenfeld, Barry; Bolognesi, Sara; Fehling, David; Gritsan, Andrei; Maksimovic, Petar; Martin, Christopher; Swartz, Morris; Baringer, Philip; Bean, Alice; Benelli, Gabriele; Kenny III, Raymond Patrick; Murray, Michael; Noonan, Daniel; Sanders, Stephen; Sekaric, Jadranka; Stringer, Robert; Wang, Quan; Wood, Jeffrey Scott; Barfuss, Anne-Fleur; Chakaberia, Irakli; Ivanov, Andrew; Khalil, Sadia; Makouski, Mikhail; Maravin, Yurii; Saini, Lovedeep Kaur; Shrestha, Shruti; Svintradze, Irakli; Gronberg, Jeffrey; Lange, David; Rebassoo, Finn; Wright, Douglas; Baden, Drew; Calvert, Brian; Eno, Sarah Catherine; Gomez, Jaime; Hadley, Nicholas John; Kellogg, Richard G; Kolberg, Ted; Lu, Ying; Marionneau, Matthieu; Mignerey, Alice; Pedro, Kevin; Skuja, Andris; Temple, Jeffrey; Tonjes, Marguerite; Tonwar, Suresh C; Apyan, Aram; Barbieri, Richard; Bauer, Gerry; Busza, Wit; Cali, Ivan Amos; Chan, Matthew; Di Matteo, Leonardo; Dutta, Valentina; Gomez Ceballos, Guillelmo; Goncharov, Maxim; Gulhan, Doga; Klute, Markus; Lai, Yue Shi; Lee, Yen-Jie; Levin, Andrew; Luckey, Paul David; Ma, Teng; Paus, Christoph; Ralph, Duncan; Roland, Christof; Roland, Gunther; Stephans, George; Stöckli, Fabian; Sumorok, Konstanty; Velicanu, Dragos; Veverka, Jan; Wyslouch, Bolek; Yang, Mingming; Yoon, Sungho; Zanetti, Marco; Zhukova, Victoria; Dahmes, Bryan; De Benedetti, Abraham; Gude, Alexander; Kao, Shih-Chuan; Klapoetke, Kevin; Kubota, Yuichi; Mans, Jeremy; Pastika, Nathaniel; Rusack, Roger; Singovsky, Alexander; Tambe, Norbert; Turkewitz, Jared; Acosta, John Gabriel; Cremaldi, Lucien Marcus; Kroeger, Rob; Oliveros, Sandra; Perera, Lalith; Rahmat, Rahmat; Sanders, David A; Summers, Don; Avdeeva, Ekaterina; Bloom, Kenneth; Bose, Suvadeep; Claes, Daniel R; Dominguez, Aaron; Gonzalez Suarez, Rebeca; Keller, Jason; Knowlton, Dan; Kravchenko, Ilya; Lazo-Flores, Jose; Malik, Sudhir; Meier, Frank; Snow, Gregory R; Dolen, James; Godshalk, Andrew; Iashvili, Ia; Jain, Supriya; Kharchilava, Avto; Kumar, Ashish; Rappoccio, Salvatore; Wan, Zongru; Alverson, George; Barberis, Emanuela; Baumgartel, Darin; Chasco, Matthew; Haley, Joseph; Massironi, Andrea; Nash, David; Orimoto, Toyoko; Trocino, Daniele; Wood, Darien; Zhang, Jinzhong; Anastassov, Anton; Hahn, Kristan Allan; Kubik, Andrew; Lusito, Letizia; Mucia, Nicholas; Odell, Nathaniel; Pollack, Brian; Pozdnyakov, Andrey; Schmitt, Michael Henry; Stoynev, Stoyan; Sung, Kevin; Velasco, Mayda; Won, Steven; Berry, Douglas; Brinkerhoff, Andrew; Chan, Kwok Ming; Drozdetskiy, Alexey; Hildreth, Michael; Jessop, Colin; Karmgard, Daniel John; Kellams, Nathan; Kolb, Jeff; Lannon, Kevin; Luo, Wuming; Lynch, Sean; Marinelli, Nancy; Morse, David Michael; Pearson, Tessa; Planer, Michael; Ruchti, Randy; Slaunwhite, Jason; Valls, Nil; Wayne, Mitchell; Wolf, Matthias; Woodard, Anna; Antonelli, Louis; Bylsma, Ben; Durkin, Lloyd Stanley; Flowers, Sean; Hill, Christopher; Hughes, Richard; Kotov, Khristian; Ling, Ta-Yung; Puigh, Darren; Rodenburg, Marissa; Smith, Geoffrey; Vuosalo, Carl; Winer, Brian L; Wolfe, Homer; Wulsin, Howard Wells; Berry, Edmund; Elmer, Peter; Halyo, Valerie; Hebda, Philip; Hegeman, Jeroen; Hunt, Adam; Jindal, Pratima; Koay, Sue Ann; Lujan, Paul; Marlow, Daniel; Medvedeva, Tatiana; Mooney, Michael; Olsen, James; Piroué, Pierre; Quan, Xiaohang; Raval, Amita; Saka, Halil; Stickland, David; Tully, Christopher; Werner, Jeremy Scott; Zenz, Seth Conrad; Zuranski, Andrzej; Brownson, Eric; Lopez, Angel; Mendez, Hector; Ramirez Vargas, Juan Eduardo; Alagoz, Enver; Benedetti, Daniele; Bolla, Gino; Bortoletto, Daniela; De Mattia, Marco; Everett, Adam; Hu, Zhen; Jones, Matthew; Jung, Kurt; Kress, Matthew; Leonardo, Nuno; Lopes Pegna, David; Maroussov, Vassili; Merkel, Petra; Miller, David Harry; Neumeister, Norbert; Radburn-Smith, Benjamin Charles; Shipsey, Ian; Silvers, David; Svyatkovskiy, Alexey; Wang, Fuqiang; Xie, Wei; Xu, Lingshan; Yoo, Hwi Dong; Zablocki, Jakub; Zheng, Yu; Parashar, Neeti; Adair, Antony; Akgun, Bora; Ecklund, Karl Matthew; Geurts, Frank JM; Li, Wei; Michlin, Benjamin; Padley, Brian Paul; Redjimi, Radia; Roberts, Jay; Zabel, James; Betchart, Burton; Bodek, Arie; Covarelli, Roberto; de Barbaro, Pawel; Demina, Regina; Eshaq, Yossof; Ferbel, Thomas; Garcia-Bellido, Aran; Goldenzweig, Pablo; Han, Jiyeon; Harel, Amnon; Miner, Daniel Carl; Petrillo, Gianluca; Vishnevskiy, Dmitry; Zielinski, Marek; Bhatti, Anwar; Ciesielski, Robert; Demortier, Luc; Goulianos, Konstantin; Lungu, Gheorghe; Malik, Sarah; Mesropian, Christina; Arora, Sanjay; Barker, Anthony; Chou, John Paul; Contreras-Campana, Christian; Contreras-Campana, Emmanuel; Duggan, Daniel; Ferencek, Dinko; Gershtein, Yuri; Gray, Richard; Halkiadakis, Eva; Hidas, Dean; Lath, Amitabh; Panwalkar, Shruti; Park, Michael; Patel, Rishi; Rekovic, Vladimir; Robles, Jorge; Salur, Sevil; Schnetzer, Steve; Seitz, Claudia; Somalwar, Sunil; Stone, Robert; Thomas, Scott; Thomassen, Peter; Walker, Matthew; Rose, Keith; Spanier, Stefan; Yang, Zong-Chang; York, Andrew; Bouhali, Othmane; Eusebi, Ricardo; Flanagan, Will; Gilmore, Jason; Kamon, Teruki; Khotilovich, Vadim; Krutelyov, Vyacheslav; Montalvo, Roy; Osipenkov, Ilya; Pakhotin, Yuriy; Perloff, Alexx; Roe, Jeffrey; Safonov, Alexei; Sakuma, Tai; Suarez, Indara; Tatarinov, Aysen; Toback, David; Akchurin, Nural; Cowden, Christopher; Damgov, Jordan; Dragoiu, Cosmin; Dudero, Phillip Russell; Kovitanggoon, Kittikul; Kunori, Shuichi; Lee, Sung Won; Libeiro, Terence; Volobouev, Igor; Appelt, Eric; Delannoy, Andrés G; Greene, Senta; Gurrola, Alfredo; Johns, Willard; Maguire, Charles; Mao, Yaxian; Melo, Andrew; Sharma, Monika; Sheldon, Paul; Snook, Benjamin; Tuo, Shengquan; Velkovska, Julia; Arenton, Michael Wayne; Boutle, Sarah; Cox, Bradley; Francis, Brian; Goodell, Joseph; Hirosky, Robert; Ledovskoy, Alexander; Lin, Chuanzhe; Neu, Christopher; Wood, John; Gollapinni, Sowjanya; Harr, Robert; Karchin, Paul Edmund; Kottachchi Kankanamge Don, Chamath; Lamichhane, Pramod; Belknap, Donald; Borrello, Laura; Carlsmith, Duncan; Cepeda, Maria; Dasu, Sridhara; Duric, Senka; Friis, Evan; Grothe, Monika; Hall-Wilton, Richard; Herndon, Matthew; Hervé, Alain; Klabbers, Pamela; Klukas, Jeffrey; Lanaro, Armando; Levine, Aaron; Loveless, Richard; Mohapatra, Ajit; Ojalvo, Isabel; Perry, Thomas; Pierro, Giuseppe Antonio; Polese, Giovanni; Ross, Ian; Sakharov, Alexandre; Sarangi, Tapas; Savin, Alexander; Smith, Wesley H

    2014-09-22

    The production of jets associated to bottom quarks is measured for the first time in PbPb collisions at a center-of-mass energy of 2.76 TeV per nucleon pair. Jet spectra are reported in the transverse momentum ($p_T$) range of 80-250 GeV, and within pseudorapidity abs($\\eta \\lt 2$). The nuclear modification factor ($R_{AA}$) calculated from these spectra shows a strong suppression in the b-jet yield in PbPb collisions relative to the yield observed in pp collisions at the same energy. The suppression persists to the largest values of $p_T$ studied, and is centrality dependent. The $R_{AA}$ is about 0.4 in the most central events, similar to previous observations for inclusive jets. This implies that jet quenching does not have a strong dependence on parton mass and flavor in the jet $p_T$ range studied.

  12. Collision Statistics of Driven Polydisperse Granular Gases

    International Nuclear Information System (INIS)

    Chen Zhiyuan; Zhang Duanming; Yang Fengxia; Guo Xinping; Li Zhongming

    2008-01-01

    We present a dynamical model of two-dimensional polydisperse granular gases with fractal size distribution, in which the disks are subject to inelastic mutual collisions and driven by standard white noise. The inhomogeneity of the disk size distribution can be measured by a fractal dimension d f . By Monte Carlo simulations, we have mainly investigated the effect of the inhomogeneity on the statistical properties of the system in the same inelasticity case. Some novel results are found that the average energy of the system decays exponentially with a tendency to achieve a stable asymptotic value, and the system finally reaches a nonequilibrium steady state after a long evolution time. Furthermore, the inhomogeneity has great influence on the steady-state statistical properties. With the increase of the fractal dimension d f , the distributions of path lengths and free times between collisions deviate more obviously from expected theoretical forms for elastic spheres and have an overpopulation of short distances and time bins. The collision rate increases with d f , but it is independent of time. Meanwhile, the velocity distribution deviates more strongly from the Gaussian one, but does not demonstrate any apparent universal behavior

  13. Semiclassical theory of resonance inelastic electron-molecule collisions

    International Nuclear Information System (INIS)

    Kazanskij, A.K.

    1986-01-01

    Semiclassical approach to the theory of resonance electron-molecule collisions, unlocal with respect to interatomic distance was developed. Two problems were considered: modified adiabatic approach for sigle-pole approximation of R-matrix and Fano-Feshbach-Bardsley theory. It is shown that these problems are similar in semiclassical approximation. A simple equation system with coefficients expressed in quadratures was obtained. It enables to determine amplitudes of all processes (including dissociation adhesion, association ejection, free-free and free-bound transitions) in energetic representation with respect to nucleus vibrations in molecule with allowance for both descrete and continuous spectra of nucleus motion in molecule. Quantitative investigation of the system results to the notion of dynamic energy curve of intermediate state, generalizing the motion of such curve in boomerang theory

  14. Option-implied term structures

    OpenAIRE

    Vogt, Erik

    2014-01-01

    The illiquidity of long-maturity options has made it difficult to study the term structures of option spanning portfolios. This paper proposes a new estimation and inference framework for these option-implied term structures that addresses long-maturity illiquidity. By building a sieve estimator around the risk-neutral valuation equation, the framework theoretically justifies (fat-tailed) extrapolations beyond truncated strikes and between observed maturities while remaining nonparametric. Ne...

  15. Beam-energy dependence of charge balance functions from Au + Au collisions at energies available at the BNL Relativistic Heavy Ion Collider

    Science.gov (United States)

    Adamczyk, L.; Adkins, J. K.; Agakishiev, G.; Aggarwal, M. M.; Ahammed, Z.; Alekseev, I.; Alford, J.; Aparin, A.; Arkhipkin, D.; Aschenauer, E. C.; Averichev, G. S.; Banerjee, A.; Bellwied, R.; Bhasin, A.; Bhati, A. K.; Bhattarai, P.; Bielcik, J.; Bielcikova, J.; Bland, L. C.; Bordyuzhin, I. G.; Bouchet, J.; Brandin, A. V.; Bunzarov, I.; Burton, T. P.; Butterworth, J.; Caines, H.; Calderón de la Barca Sánchez, M.; Campbell, J. M.; Cebra, D.; Cervantes, M. C.; Chakaberia, I.; Chaloupka, P.; Chang, Z.; Chattopadhyay, S.; Chen, J. H.; Chen, H. F.; Cheng, J.; Cherney, M.; Christie, W.; Codrington, M. J. M.; Contin, G.; Crawford, H. J.; Cui, X.; Das, S.; De Silva, L. C.; Debbe, R. R.; Dedovich, T. G.; Deng, J.; Derevschikov, A. A.; Derradi de Souza, R.; di Ruzza, B.; Didenko, L.; Dilks, C.; Dong, X.; Drachenberg, J. L.; Draper, J. E.; Du, C. M.; Dunkelberger, L. E.; Dunlop, J. C.; Efimov, L. G.; Engelage, J.; Eppley, G.; Esha, R.; Evdokimov, O.; Eyser, O.; Fatemi, R.; Fazio, S.; Federic, P.; Fedorisin, J.; Feng, Filip, P.; Fisyak, Y.; Flores, C. E.; Gagliardi, C. A.; Garand, D.; Geurts, F.; Gibson, A.; Girard, M.; Greiner, L.; Grosnick, D.; Gunarathne, D. S.; Guo, Y.; Gupta, A.; Gupta, S.; Guryn, W.; Hamad, A.; Hamed, A.; Han, L.-X.; Haque, R.; Harris, J. W.; Heppelmann, S.; Hirsch, A.; Hoffmann, G. W.; Hofman, D. J.; Horvat, S.; Huang, B.; Huang, X.; Huang, H. Z.; Huck, P.; Humanic, T. J.; Igo, G.; Jacobs, W. W.; Jang, H.; Judd, E. G.; Kabana, S.; Kalinkin, D.; Kang, K.; Kauder, K.; Ke, H. W.; Keane, D.; Kechechyan, A.; Khan, Z. H.; Kikola, D. P.; Kisel, I.; Kisiel, A.; Klein, S. R.; Koetke, D. D.; Kollegger, T.; Kosarzewski, L. K.; Kotchenda, L.; Kraishan, A. F.; Kravtsov, P.; Krueger, K.; Kulakov, I.; Kumar, L.; Kycia, R. A.; Lamont, M. A. C.; Landgraf, J. M.; Landry, K. D.; Lauret, J.; Lebedev, A.; Lednicky, R.; Lee, J. H.; Li, Z. M.; Li, X.; Li, W.; Li, Y.; Li, X.; Li, C.; Lisa, M. A.; Liu, F.; Ljubicic, T.; Llope, W. J.; Lomnitz, M.; Longacre, R. S.; Luo, X.; Ma, G. L.; Ma, R. M.; Ma, Y. G.; Magdy, N.; Mahapatra, D. P.; Majka, R.; Manion, A.; Margetis, S.; Markert, C.; Masui, H.; Matis, H. S.; McDonald, D.; Minaev, N. G.; Mioduszewski, S.; Mohanty, B.; Mondal, M. M.; Morozov, D. A.; Mustafa, M. K.; Nandi, B. K.; Nasim, Md.; Nayak, T. K.; Nigmatkulov, G.; Nogach, L. V.; Noh, S. Y.; Novak, J.; Nurushev, S. B.; Odyniec, G.; Ogawa, A.; Oh, K.; Okorokov, V.; Olvitt, D. L.; Page, B. S.; Pan, Y. X.; Pandit, Y.; Panebratsev, Y.; Pawlak, T.; Pawlik, B.; Pei, H.; Perkins, C.; Pile, P.; Planinic, M.; Pluta, J.; Poljak, N.; Poniatowska, K.; Porter, J.; Poskanzer, A. M.; Pruthi, N. K.; Przybycien, M.; Putschke, J.; Qiu, H.; Quintero, A.; Ramachandran, S.; Raniwala, R.; Raniwala, S.; Ray, R. L.; Ritter, H. G.; Roberts, J. B.; Rogachevskiy, O. V.; Romero, J. L.; Roy, A.; Ruan, L.; Rusnak, J.; Rusnakova, O.; Sahoo, N. R.; Sahu, P. K.; Sakrejda, I.; Salur, S.; Sandacz, A.; Sandweiss, J.; Sarkar, A.; Schambach, J.; Scharenberg, R. P.; Schmah, A. M.; Schmidke, W. B.; Schmitz, N.; Seger, J.; Seyboth, P.; Shah, N.; Shahaliev, E.; Shanmuganathan, P. V.; Shao, M.; Sharma, B.; Shen, W. Q.; Shi, S. S.; Shou, Q. Y.; Sichtermann, E. P.; Simko, M.; Skoby, M. J.; Smirnov, N.; Smirnov, D.; Solanki, D.; Song, L.; Sorensen, P.; Spinka, H. M.; Srivastava, B.; Stanislaus, T. D. S.; Stock, R.; Strikhanov, M.; Stringfellow, B.; Sumbera, M.; Summa, B. J.; Sun, X. M.; Sun, Z.; Sun, Y.; Sun, X.; Surrow, B.; Svirida, D. N.; Szelezniak, M. A.; Takahashi, J.; Tang, Z.; Tang, A. H.; Tarnowsky, T.; Tawfik, A. N.; Thomas, J. H.; Timmins, A. R.; Tlusty, D.; Tokarev, M.; Trentalange, S.; Tribble, R. E.; Tribedy, P.; Tripathy, S. K.; Trzeciak, B. A.; Tsai, O. D.; Turnau, J.; Ullrich, T.; Underwood, D. G.; Upsal, I.; Van Buren, G.; van Nieuwenhuizen, G.; Vandenbroucke, M.; Varma, R.; Vasconcelos, G. M. S.; Vasiliev, A. N.; Vertesi, R.; Videbæk, F.; Viyogi, Y. P.; Vokal, S.; Voloshin, S. A.; Vossen, A.; Wang, J. S.; Wang, X. L.; Wang, Y.; Wang, H.; Wang, F.; Wang, G.; Webb, G.; Webb, J. C.; Wen, L.; Westfall, G. D.; Wieman, H.; Wissink, S. W.; Witt, R.; Wu, Y. F.; Xiao, Z.; Xie, W.; Xin, K.; Xu, N.; Xu, Z.; Xu, H.; Xu, Y.; Xu, Q. H.; Yan, W.; Yang, Y.; Yang, C.; Yang, Y.; Ye, Z.; Yepes, P.; Yi, L.; Yip, K.; Yoo, I.-K.; Yu, N.; Zbroszczyk, H.; Zha, W.; Zhang, X. P.; Zhang, Z. P.; Zhang, J. B.; Zhang, J. L.; Zhang, Y.; Zhang, S.; Zhao, F.; Zhao, J.; Zhong, C.; Zhu, Y. H.; Zhu, X.; Zoulkarneeva, Y.; Zyzak, M.; STAR Collaboration

    2016-08-01

    Balance functions have been measured in terms of relative pseudorapidity (Δ η ) for charged particle pairs at the BNL Relativistic Heavy Ion Collider from Au + Au collisions at √{sNN}=7.7 GeV to 200 GeV using the STAR detector. These results are compared with balance functions measured at the CERN Large Hadron Collider from Pb + Pb collisions at √{sNN}=2.76 TeV by the ALICE Collaboration. The width of the balance function decreases as the collisions become more central and as the beam energy is increased. In contrast, the widths of the balance functions calculated using shuffled events show little dependence on centrality or beam energy and are larger than the observed widths. Balance function widths calculated using events generated by UrQMD are wider than the measured widths in central collisions and show little centrality dependence. The measured widths of the balance functions in central collisions are consistent with the delayed hadronization of a deconfined quark gluon plasma (QGP). The narrowing of the balance function in central collisions at √{sNN}=7.7 GeV implies that a QGP is still being created at this relatively low energy.

  16. An evaluation of multi-probe locality sensitive hashing for computing similarities over web-scale query logs.

    Directory of Open Access Journals (Sweden)

    Graham Cormode

    Full Text Available Many modern applications of AI such as web search, mobile browsing, image processing, and natural language processing rely on finding similar items from a large database of complex objects. Due to the very large scale of data involved (e.g., users' queries from commercial search engines, computing such near or nearest neighbors is a non-trivial task, as the computational cost grows significantly with the number of items. To address this challenge, we adopt Locality Sensitive Hashing (a.k.a, LSH methods and evaluate four variants in a distributed computing environment (specifically, Hadoop. We identify several optimizations which improve performance, suitable for deployment in very large scale settings. The experimental results demonstrate our variants of LSH achieve the robust performance with better recall compared with "vanilla" LSH, even when using the same amount of space.

  17. Collision group and renormalization of the Boltzmann collision integral

    Science.gov (United States)

    Saveliev, V. L.; Nanbu, K.

    2002-05-01

    On the basis of a recently discovered collision group [V. L. Saveliev, in Rarefied Gas Dynamics: 22nd International Symposium, edited by T. J. Bartel and M. Gallis, AIP Conf. Proc. No. 585 (AIP, Melville, NY, 2001), p. 101], the Boltzmann collision integral is exactly rewritten in two parts. The first part describes the scattering of particles with small angles. In this part the infinity due to the infinite cross sections is extracted from the Boltzmann collision integral. Moreover, the Boltzmann collision integral is represented as a divergence of the flow in velocity space. Owing to this, the role of collisions in the kinetic equation can be interpreted in terms of the nonlocal friction force that depends on the distribution function.

  18. How Much Control is Enough for Network Connectivity Preservation and Collision Avoidance?

    Science.gov (United States)

    Chen, Zhiyong; Fan, Ming-Can; Zhang, Hai-Tao

    2015-08-01

    For a multiagent system in free space, the agents are required to generate sufficiently large cohesive force for network connectivity preservation and sufficiently large repulsive force for collision avoidance. This paper gives an energy function based approach for estimating the control force in a general setting. In particular, the force estimated for network connectivity preservation and collision avoidance is separated from the force for other collective behavior of the agents. Moreover, the estimation approach is applied in three typical collective control scenarios including swarming, flocking, and flocking without velocity measurement.

  19. Atomic and molecular collision processes

    International Nuclear Information System (INIS)

    Norcross, D.W.

    1991-01-01

    530Accomplishments during the course of a 44-month program of code development and high precision calculations for electron collisions with atoms, atomic ions, and molecules are summarized. In electron-atom and -ion collisions, we were primarily concerned with the fundamental physics of the process that controls excitation in high temperature plasmas. In the molecular work, we pursued the development of techniques for accurate calculations of ro-vibrational excitation of polyatomic molecules, to the modeling of gas-phase laser systems. Highlights from the seven technical paper published as a result of this contract include: The resolution of a long history of unexplained anomalies and experimental/theoretical discrepancies by a demonstration that the Coulomb phase must be included in scattering amplitudes for electron-ion collisions. Definitive close-coupling calculations of cross sections for electron impact excitation of Be + , using a very elaborate expansion for the collision system and inclusion of both one- and two-body terms for the effect of core polarization. Detailed state-of-the-art calculations for electron-impact excitation of the sodium-like ion A ell 2+ that included core-polarization interactions, and which also produced new data on bound-state energy levels for the magnesium-like ion A ell + and oscillator strengths for A ell 2+ . Partial cross sections for excitation of the 3p level of sodium at energies just above threshold calculated using a four-state close-coupling approach, including both total cross sections and those for excitation as a function of the change in the spin and orbital angular momentum projection quantum numbers of the target electron. Generalization of our electron-molecule scattering code to carry out full vibrational close-coupling calculations with an exact treatment of exchange and with a parameter-free representation of correlation and polarization interactions, and application to HF and H 2

  20. Electron-molecule collisions

    International Nuclear Information System (INIS)

    Shimamura, I.; Takayanagi, K.

    1984-01-01

    The study of collision processes plays an important research role in modern physics. Many significant discoveries have been made by means of collision experiments. Based on theoretical, experimental, and computational studies, this volume presents an overview detailing the basic processes of electron-molecule collisions. The editors have collected papers-written by a group of international experts-that consider a diverse range of phenomena occurring in electronmolecule collisions. The volume discusses first the basic formulation for scattering problems and then gives an outline of the physics of electron-molecule collisions. The main topics covered are rotational transitions, vibrational transitions, dissociation of molecules in slow collisions, the electron-molecule collision as a spectroscopic tool for studying molecular electronic structures, and experimental and computational techniques for determining the cross sections. These well-referenced chapters are self-contained and can be read independently or consecutively. Authoritative and up-to-date, Electron-Molecule Collisions is a useful addition to the libraries of students and researchers in the fields of atomic, molecular, and chemical physics, and physical chemistry

  1. Money market rates and implied CCAPM rates: some international evidence

    OpenAIRE

    Yamin Ahmad

    2004-01-01

    New Neoclassical Synthesis models equate the instrument of monetary policy to the implied CCAPM rate arising from an Euler equation. This paper identifies monetary policy shocks within six of the G7 countries and examines the movement of money market and implied CCAPM rates. The key result is that an increase in the nominal interest rate leads to a fall in the implied CCAPM rate. Incorporating habit still yields the same result. The findings suggest that the movement of these two rates implie...

  2. Implied Terms: The Foundation in Good Faith and Fair Dealing

    OpenAIRE

    2014-01-01

    With the aim of clarifying English law of implied terms in contracts and explaining their basis in the idea of good faith in performance, it is argued first that two, but no more, types of implied terms can be distinguished (terms implied in fact and terms implied by law), though it is explained why these types are frequently confused. Second, the technique of implication of terms is distinguished in most instances from the task of interpretation of contracts. Third, it is a...

  3. A model of fast radio bursts: collisions between episodic magnetic blobs

    Science.gov (United States)

    Li, Long-Biao; Huang, Yong-Feng; Geng, Jin-Jun; Li, Bing

    2018-06-01

    Fast radio bursts (FRBs) are bright radio pulses from the sky with millisecond durations and Jansky-level flux densities. Their origins are still largely uncertain. Here we suggest a new model for FRBs. We argue that the collision of a white dwarf with a black hole can generate a transient accretion disk, from which powerful episodicmagnetic blobs will be launched. The collision between two consecutive magnetic blobs can result in a catastrophic magnetic reconnection, which releases a large amount of free magnetic energy and forms a forward shock. The shock propagates through the cold magnetized plasma within the blob in the collision region, radiating through the synchrotron maser mechanism, which is responsible for a non-repeating FRB signal. Our calculations show that the theoretical energetics, radiation frequency, duration timescale and event rate can be very consistent with the observational characteristics of FRBs.

  4. Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function

    Science.gov (United States)

    Moon, Dukjae; Hong, Deukjo; Kwon, Daesung; Hong, Seokhie

    We assume that the domain extender is the Merkle-Damgård (MD) scheme and he message is padded by a ‘1’, and minimum number of ‘0’s, followed by a fixed size length information so that the length of padded message is multiple of block length. Under this assumption, we analyze securities of the hash mode when the compression function follows the Davies-Meyer (DM) scheme and the underlying block cipher is one of the plain Feistel or Misty scheme or the generalized Feistel or Misty schemes with Substitution-Permutation (SP) round function. We do this work based on Meet-in-the-Middle (MitM) preimage attack techniques, and develop several useful initial structures.

  5. Nucleus-Nucleus Collision as Superposition of Nucleon-Nucleus Collisions

    International Nuclear Information System (INIS)

    Orlova, G.I.; Adamovich, M.I.; Aggarwal, M.M.; Alexandrov, Y.A.; Andreeva, N.P.; Badyal, S.K.; Basova, E.S.; Bhalla, K.B.; Bhasin, A.; Bhatia, V.S.; Bradnova, V.; Bubnov, V.I.; Cai, X.; Chasnikov, I.Y.; Chen, G.M.; Chernova, L.P.; Chernyavsky, M.M.; Dhamija, S.; Chenawi, K.El; Felea, D.; Feng, S.Q.; Gaitinov, A.S.; Ganssauge, E.R.; Garpman, S.; Gerassimov, S.G.; Gheata, A.; Gheata, M.; Grote, J.; Gulamov, K.G.; Gupta, S.K.; Gupta, V.K.; Henjes, U.; Jakobsson, B.; Kanygina, E.K.; Karabova, M.; Kharlamov, S.P.; Kovalenko, A.D.; Krasnov, S.A.; Kumar, V.; Larionova, V.G.; Li, Y.X.; Liu, L.S.; Lokanathan, S.; Lord, J.J.; Lukicheva, N.S.; Lu, Y.; Luo, S.B.; Mangotra, L.K.; Manhas, I.; Mittra, I.S.; Musaeva, A.K.; Nasyrov, S.Z.; Navotny, V.S.; Nystrand, J.; Otterlund, I.; Peresadko, N.G.; Qian, W.Y.; Qin, Y.M.; Raniwala, R.; Rao, N.K.; Roeper, M.; Rusakova, V.V.; Saidkhanov, N.; Salmanova, N.A.; Seitimbetov, A.M.; Sethi, R.; Singh, B.; Skelding, D.; Soderstrem, K.; Stenlund, E.; Svechnikova, L.N.; Svensson, T.; Tawfik, A.M.; Tothova, M.; Tretyakova, M.I.; Trofimova, T.P.; Tuleeva, U.I.; Vashisht, Vani; Vokal, S.; Vrlakova, J.; Wang, H.Q.; Wang, X.R.; Weng, Z.Q.; Wilkes, R.J.; Yang, C.B.; Yin, Z.B.; Yu, L.Z.; Zhang, D.H.; Zheng, P.Y.; Zhokhova, S.I.; Zhou, D.C.

    1999-01-01

    Angular distributions of charged particles produced in 16 O and 32 S collisions with nuclear track emulsion were studied at momenta 4.5 and 200 A GeV/c. Comparison with the angular distributions of charged particles produced in proton-nucleus collisions at the same momentum allows to draw the conclusion, that the angular distributions in nucleus-nucleus collisions can be seen as superposition of the angular distributions in nucleon-nucleus collisions taken at the same impact parameter b NA , that is mean impact parameter between the participating projectile nucleons and the center of the target nucleus

  6. Nucleus-Nucleus Collision as Superposition of Nucleon-Nucleus Collisions

    Energy Technology Data Exchange (ETDEWEB)

    Orlova, G I; Adamovich, M I; Aggarwal, M M; Alexandrov, Y A; Andreeva, N P; Badyal, S K; Basova, E S; Bhalla, K B; Bhasin, A; Bhatia, V S; Bradnova, V; Bubnov, V I; Cai, X; Chasnikov, I Y; Chen, G M; Chernova, L P; Chernyavsky, M M; Dhamija, S; Chenawi, K El; Felea, D; Feng, S Q; Gaitinov, A S; Ganssauge, E R; Garpman, S; Gerassimov, S G; Gheata, A; Gheata, M; Grote, J; Gulamov, K G; Gupta, S K; Gupta, V K; Henjes, U; Jakobsson, B; Kanygina, E K; Karabova, M; Kharlamov, S P; Kovalenko, A D; Krasnov, S A; Kumar, V; Larionova, V G; Li, Y X; Liu, L S; Lokanathan, S; Lord, J J; Lukicheva, N S; Lu, Y; Luo, S B; Mangotra, L K; Manhas, I; Mittra, I S; Musaeva, A K; Nasyrov, S Z; Navotny, V S; Nystrand, J; Otterlund, I; Peresadko, N G; Qian, W Y; Qin, Y M; Raniwala, R; Rao, N K; Roeper, M; Rusakova, V V; Saidkhanov, N; Salmanova, N A; Seitimbetov, A M; Sethi, R; Singh, B; Skelding, D; Soderstrem, K; Stenlund, E; Svechnikova, L N; Svensson, T; Tawfik, A M; Tothova, M; Tretyakova, M I; Trofimova, T P; Tuleeva, U I; Vashisht, Vani; Vokal, S; Vrlakova, J; Wang, H Q; Wang, X R; Weng, Z Q; Wilkes, R J; Yang, C B; Yin, Z B; Yu, L Z; Zhang, D H; Zheng, P Y; Zhokhova, S I; Zhou, D C

    1999-03-01

    Angular distributions of charged particles produced in {sup 16}O and {sup 32}S collisions with nuclear track emulsion were studied at momenta 4.5 and 200 A GeV/c. Comparison with the angular distributions of charged particles produced in proton-nucleus collisions at the same momentum allows to draw the conclusion, that the angular distributions in nucleus-nucleus collisions can be seen as superposition of the angular distributions in nucleon-nucleus collisions taken at the same impact parameter b{sub NA}, that is mean impact parameter between the participating projectile nucleons and the center of the target nucleus.

  7. Nucleus-nucleus collision as superposition of nucleon-nucleus collisions

    International Nuclear Information System (INIS)

    Orlova, G.I.; Adamovich, M.I.; Aggarwal, M.M.

    1999-01-01

    Angular distributions of charged particles produced in 16 O and 32 S collisions with nuclear track emulsion were studied at momenta 4.5 and 200 A GeV/c. Comparison with the angular distributions of charged particles produced in proton-nucleus collisions at the same momentum allows to draw the conclusion, that the angular distributions in nucleus-nucleus collisions can be seen as superposition of the angular distributions in nucleon-nucleus collisions taken at the same impact parameter b NA , that is mean impact parameter between the participating projectile nucleons and the center of the target nucleus. (orig.)

  8. Using correlation functions as free decays

    DEFF Research Database (Denmark)

    Brincker, Rune; Amador, Sandro; Juul, Martin

    It is a general assumption in OMA that correlation functions are free decays. In multiple input OMA this assumption also implies that any column in the correlation function matrix is to be considered as multiple output free decays. This assumption is discussed in this paper together with issues...... concerning estimation and application of correlations functions in OMA....

  9. Effects of in-medium nucleon-nucleon cross sections on stopping observable and ratio of free protons in heavy-ion collisions at 400 MeV/nucleon

    Energy Technology Data Exchange (ETDEWEB)

    Su, Jun; Huang, Ching-Yuan [Sun Yat-sen University, Sino-French Institute of Nuclear Engineering and Technology, Zhuhai (China); Xie, Wen-Jie [Yuncheng University, Department of Physics, Yuncheng (China); Chinese Academy of Sciences, Institute of Modern Physics, Lanzhou (China); Zhang, Feng-Shou [Beijing Normal University, The Key Laboratory of Beam Technology and Material Modification of Ministry of Education, College of Nuclear Science and Technology, Beijing (China); Beijing Radiation Center, Beijing (China); National Laboratory of Heavy Ion Accelerator of Lanzhou, Center of Theoretical Nuclear Physics, Lanzhou (China)

    2016-07-15

    The effects of in-medium nucleon-nucleon cross sections on the stopping observable and ratio of free protons in heavy-ion collisions at 400 MeV/nucleon have been investigated within the framework of the IQMD+GEMINI model. Five kinds of in-medium corrections of nucleon-nucleon cross sections, which are considerably different in the referred energy and density, have been used in the model. It has been found that calculations of the stopping decrease when the in-medium cross sections decrease. Moreover, the ratio of free protons R{sub p} depends not only on the value of the in-medium factors but also on its isospin dependence. In order to investigate the isospin effect of in-medium factors on the ratio of free protons R{sub p}, the isospin dependence of in-medium factors has been adjusted and used in the model. The calculations have shown that the isospin dependence of in-medium factors does not impact the stopping, but impacts the ratio of free protons R{sub p}. When the in-medium factors relation f{sub nn}{sup med} > f{sub pp}{sup med} is used in the model, the calculated values of R{sub p} are larger than those in the f{sub nn}{sup med} < f{sub pp}{sup med} case. (orig.)

  10. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  11. Electrodermal responses to implied versus actual violence on television.

    Science.gov (United States)

    Kalamas, A D; Gruber, M L

    1998-01-01

    The electrodermal response (EDR) of children watching a violent show was measured. Particular attention was paid to the type of violence (actual or implied) that prompted an EDR. In addition, the impact of the auditory component (sounds associated with violence) of the show was evaluated. Implied violent stimuli, such as the villain's face, elicited the strongest EDR. The elements that elicited the weakest responses were the actual violent stimuli, such as stabbing. The background noise and voices of the sound track enhanced the total number of EDRs. The results suggest that implied violence may elicit more fear (as measured by EDRs) than actual violence does and that sounds alone contribute significantly to the emotional response to television violence. One should not, therefore, categorically assume that a show with mostly actual violence evokes less fear than one with mostly implied violence.

  12. Capriccio For Strings: Collision-Mediated Parallel Transport in Curved Landscapes and Conifold-Enhanced Hierarchies among Mirror Quintic Flux Vacua

    Science.gov (United States)

    Eckerle, Kate

    This dissertation begins with a review of Calabi-Yau manifolds and their moduli spaces, flux compactification largely tailored to the case of type IIb supergravity, and Coleman-De Luccia vacuum decay. The three chapters that follow present the results of novel research conducted as a graduate student. Our first project is concerned with bubble collisions in single scalar field theories with multiple vacua. Lorentz boosted solitons traveling in one spatial dimension are used as a proxy to the colliding 3-dimensional spherical bubble walls. Recent work found that at sufficiently high impact velocities collisions between such bubble vacua are governed by "free passage" dynamics in which field interactions can be ignored during the collision, providing a systematic process for populating local minima without quantum nucleation. We focus on the time period that follows the bubble collision and provide evidence that, for certain potentials, interactions can drive significant deviations from the free passage bubble profile, thwarting the production of a new patch with different field value. However, for simple polynomial potentials a fine-tuning of vacuum locations is required to reverse the free passage kick enough that the field in the collision region returns to the original bubble vacuum. Hence we deem classical transitions mediated by free passage robust. Our second project continues with soliton collisions in the limit of relativistic impact velocity, but with the new feature of nontrivial field space curvature. We establish a simple geometrical interpretation of such collisions in terms of a double family of field profiles whose tangent vector fields stand in mutual parallel transport. This provides a generalization of the well-known limit in flat field space (free passage). We investigate the limits of this approximation and illustrate our analytical results with numerical simulations. In our third and final project we investigate the distribution of field

  13. Diffractive, diffusive, and statistical aspects of deep inelastic heavy-ion collisions

    International Nuclear Information System (INIS)

    Lee, S.Y.; McGrath, R.L.; Dean, D.R.

    1984-01-01

    Deep inelastic collisions between ''light'' heavy ions are considered in a formalism containing diffractive, diffusive, and statistical aspects. A closed-form diffractive cross section is derived, with the deflection function being parametrized in a classically-motivated way. A statistical argument is used to demonstrate how the observed double differential cross section is built up from different diffractive contributions each with its own weight. The form of the weighting function is derived. The observed forward-peaked exponentially-decaying form of deep inelastic collision angular distributions is accounted for. The possibility of exciting a nonzero spin state is explicitly included, enabling the same formalism to be used to explain the spin polarization occurring in deep inelastic collisions. This quantity is much more sensitive than the angular distribution to the choice of deflection function parametrization. Reasonable fits to data are obtained with only one free parameter, apart from an overall normalization factor

  14. Collision induced light-scattering from gaseous sulphurhexafluoride

    International Nuclear Information System (INIS)

    Pleich, R.

    1983-10-01

    Modern laser technology permits the measurement of collision induced light-scattering spectra from molecular gases at low densities. Measurements of this type provide a test for the separation dependent pair polarizabilities and pair potentials. For this work the octahedral molecule sulphurhexafluoride (SF 6 , point group symmetry 0sub(h)) has been chosen for which the permanent polarizability anisotropy vanishes. For the experiment an argon ion laser in combination with a double grating monochromator and standard photon counting techniques were used. Both the polarized and depolarized scattering cross sections were obtained. The point dipole-induced-dipole (DID) effect is shown to account for the most of the total scattered intensity. At low frequency shifts the line shape of the SF 6 spectrum is dominated by bound dimers, whereas the intermediate frequency range up to 50 cm -1 is well described by a DID free trajectory binary collision model. The high frequency wings are discussed in terms of the collision induced rotational Raman (CIRR) effect and estimates for the dipole-octopole polarizability E are obtained both from the spectral distribution and from the depolarization ratio. It is demonstrated that the hierarchy of effects constituting the CIRR-model converges slowly for large frequency shifts. (Author)

  15. Hadron-nucleus collisions

    International Nuclear Information System (INIS)

    Strugalski, Z.

    1981-01-01

    Qualitative picture of high energy hadron-nucleus collision process, emerging from the analysis of experimental data, is presented. Appropriate description procedure giving a possibility of reproducing various characteristics of this process in terms of the data on elementary hadron-nucleon interaction is proposed. Formula reproducing hadron-nucleus collision cross sections is derived. Inelastic collision cross sections for pion-nucleus and proton-nucleus reactions at wide energy interval are calculated for Pb, Ag, and Al targets. A-dependence of cross sections for pion-nucleus and proton-nucleus collisions at nearly 50 GeV/c momentum were calculated and compared with existing experimental data. Energy dependence of cross sections for hadron-nucleus collisions is determined simply by energy dependence of corresponding cross sections for hadron-nucleon collisions; A-dependence is determined simply by nuclear sizes and nucleon density distributions in nuclei

  16. A panorama of phase transition signals and influence of collision-induced correlations

    Energy Technology Data Exchange (ETDEWEB)

    Bougault, R. [LPC Caen IN2P3-CNRS/ENSICAEN et Univ., 14 - Caen (France)

    2003-07-01

    The presented results will show the richness of nuclear heavy-ion physics where data are accumulated as a succession of independent events. The different reaction mechanisms can provide for 39 A.MeV Ta+Au, 40 and 80 A.MeV Au+Au peripheral collisions a set of data almost free of entrance channel effects as well as a set of events where collision-induced correlations can be evidenced. The event selection method will be presented and it will be shown how the entrance channel dynamical effects affect determination of heat capacity through partial energy fluctuation measurements. (author)

  17. A panorama of phase transition signals and influence of collision-induced correlations

    International Nuclear Information System (INIS)

    Bougault, R.

    2003-01-01

    The presented results will show the richness of nuclear heavy-ion physics where data are accumulated as a succession of independent events. The different reaction mechanisms can provide for 39 A.MeV Ta+Au, 40 and 80 A.MeV Au+Au peripheral collisions a set of data almost free of entrance channel effects as well as a set of events where collision-induced correlations can be evidenced. The event selection method will be presented and it will be shown how the entrance channel dynamical effects affect determination of heat capacity through partial energy fluctuation measurements. (author)

  18. Restricted Collision List method for faster Direct Simulation Monte-Carlo (DSMC) collisions

    Energy Technology Data Exchange (ETDEWEB)

    Macrossan, Michael N., E-mail: m.macrossan@uq.edu.au

    2016-08-15

    The ‘Restricted Collision List’ (RCL) method for speeding up the calculation of DSMC Variable Soft Sphere collisions, with Borgnakke–Larsen (BL) energy exchange, is presented. The method cuts down considerably on the number of random collision parameters which must be calculated (deflection and azimuthal angles, and the BL energy exchange factors). A relatively short list of these parameters is generated and the parameters required in any cell are selected from this list. The list is regenerated at intervals approximately equal to the smallest mean collision time in the flow, and the chance of any particle re-using the same collision parameters in two successive collisions is negligible. The results using this method are indistinguishable from those obtained with standard DSMC. The CPU time saving depends on how much of a DSMC calculation is devoted to collisions and how much is devoted to other tasks, such as moving particles and calculating particle interactions with flow boundaries. For 1-dimensional calculations of flow in a tube, the new method saves 20% of the CPU time per collision for VSS scattering with no energy exchange. With RCL applied to rotational energy exchange, the CPU saving can be greater; for small values of the rotational collision number, for which most collisions involve some rotational energy exchange, the CPU may be reduced by 50% or more.

  19. Do nuclear collisions create a locally equilibrated quark-gluon plasma?

    Energy Technology Data Exchange (ETDEWEB)

    Romatschke, P. [University of Colorado at Boulder, Department of Physics, 390 UCB, Boulder, CO (United States); University of Colorado, Center for Theory of Quantum Matter, Boulder, CO (United States)

    2017-01-15

    Experimental results on azimuthal correlations in high energy nuclear collisions (nucleus-nucleus, proton-nucleus, and proton-proton) seem to be well described by viscous hydrodynamics. It is often argued that this agreement implies either local thermal equilibrium or at least local isotropy. In this note, I present arguments why this is not the case. Neither local near-equilibrium nor near-isotropy are required in order for hydrodynamics to offer a successful and accurate description of experimental results. However, I predict the breakdown of hydrodynamics at momenta of order seven times the temperature, corresponding to a smallest possible QCD liquid drop size of 0.15 fm. (orig.)

  20. GSHR-Tree: a spatial index tree based on dynamic spatial slot and hash table in grid environments

    Science.gov (United States)

    Chen, Zhanlong; Wu, Xin-cai; Wu, Liang

    2008-12-01

    Computation Grids enable the coordinated sharing of large-scale distributed heterogeneous computing resources that can be used to solve computationally intensive problems in science, engineering, and commerce. Grid spatial applications are made possible by high-speed networks and a new generation of Grid middleware that resides between networks and traditional GIS applications. The integration of the multi-sources and heterogeneous spatial information and the management of the distributed spatial resources and the sharing and cooperative of the spatial data and Grid services are the key problems to resolve in the development of the Grid GIS. The performance of the spatial index mechanism is the key technology of the Grid GIS and spatial database affects the holistic performance of the GIS in Grid Environments. In order to improve the efficiency of parallel processing of a spatial mass data under the distributed parallel computing grid environment, this paper presents a new grid slot hash parallel spatial index GSHR-Tree structure established in the parallel spatial indexing mechanism. Based on the hash table and dynamic spatial slot, this paper has improved the structure of the classical parallel R tree index. The GSHR-Tree index makes full use of the good qualities of R-Tree and hash data structure. This paper has constructed a new parallel spatial index that can meet the needs of parallel grid computing about the magnanimous spatial data in the distributed network. This arithmetic splits space in to multi-slots by multiplying and reverting and maps these slots to sites in distributed and parallel system. Each sites constructs the spatial objects in its spatial slot into an R tree. On the basis of this tree structure, the index data was distributed among multiple nodes in the grid networks by using large node R-tree method. The unbalance during process can be quickly adjusted by means of a dynamical adjusting algorithm. This tree structure has considered the

  1. φ production in In-In collisions at 158 A GeV

    International Nuclear Information System (INIS)

    Arnaldi, R.; Oppedisano, C.; Scomparin, E.; Banicz, K.; Damjanovic, S.; Borer, K.; Castor, J.; Devaux, A.; Fargeix, J.; Force, P.; Manso, F.; Chaurand, B.; Chen, W.; Li, Z.; Cicalo, C.; Masoni, A.; Colla, A.; Cortese, P.; Ferretti, A.; David, A.; Keil, M.; Martins, P.; Parracho, P.; Ramalhete, P.; Shahoyan, R.; Falco, A. de; Floris, M.; Puddu, G.; Serci, S.; Uras, A.; Usai, G.; Ducroux, L.; Guichard, A.; Pillot, P.; Tieulent, R.; En'yo, H.; Heuser, J.; Ohnishi, H.; Foerster, A.; Lourenco, C.; Radermacher, E.; Rosinsky, P.; Guettet, N.; Gulkanyan, H.; Poghosyan, T.; Kluberg, L.; Lozano, J.; Neves, A.; Seixas, J.; Sonderegger, P.; Specht, H.J.; Veenhof, R.

    2009-01-01

    The NA60 experiment has measured muon pair production in In-In collisions at 158 AGeV at the CERN SPS. This paper presents a high statistics measurement of φ→μμ meson production. Differential spectra, yields, mass and width are measured as a function of centrality and compared to previous measurements in other colliding systems at the same energy. The width of the rapidity distribution is found to be constant as a function of centrality, compatible with previous results. The decay muon polar angle distribution is measured in several reference frames. No evidence of polarization is found as a function of transverse momentum and centrality. The analysis of the p T spectra shows that the φ has a small radial flow, implying a weak coupling to the medium. The T eff parameter measured in In-In collisions suggests that the high value observed in Pb-Pb in the kaon channel is difficult to reconcile with radial flow alone. The absolute yield is compared to results in Pb-Pb collisions: though significantly smaller than measured by NA50 in the muon channel, it is found to exceed the NA49 and CERES data in the kaon channel at any centrality. The mass and width are found to be compatible with the PDG values at any centrality and at any p T : no evidence for in-medium modifications is observed. (orig.)

  2. Model-Based Estimation of Collision Risks of Predatory Birds with Wind Turbines

    Directory of Open Access Journals (Sweden)

    Marcus Eichhorn

    2012-06-01

    Full Text Available The expansion of renewable energies, such as wind power, is a promising way of mitigating climate change. Because of the risk of collision with rotor blades, wind turbines have negative effects on local bird populations, particularly on raptors such as the Red Kite (Milvus milvus. Appropriate assessment tools for these effects have been lacking. To close this gap, we have developed an agent-based, spatially explicit model that simulates the foraging behavior of the Red Kite around its aerie in a landscape consisting of different land-use types. We determined the collision risk of the Red Kite with the turbine as a function of the distance between the wind turbine and the aerie and other parameters. The impact function comprises the synergistic effects of species-specific foraging behavior and landscape structure. The collision risk declines exponentially with increasing distance. The strength of this decline depends on the raptor's foraging behavior, its ability to avoid wind turbines, and the mean wind speed in the region. The collision risks, which are estimated by the simulation model, are in the range of values observed in the field. The derived impact function shows that the collision risk can be described as an aggregated function of distance between the wind turbine and the raptor's aerie. This allows an easy and rapid assessment of the ecological impacts of (existing or planned wind turbines in relation to their spatial location. Furthermore, it implies that minimum buffer zones for different landscapes can be determined in a defensible way. This modeling approach can be extended to other bird species with central-place foraging behavior. It provides a helpful tool for landscape planning aimed at minimizing the impacts of wind power on biodiversity.

  3. Prediction of catastrophe theory for heavy-ion collisions at high energies

    International Nuclear Information System (INIS)

    Kuchin, I.A.

    2002-01-01

    Studying the nature of limiting fragmentation of nuclei in high energy heavy-ion collisions has shown that the dynamic system of the nucleus is inclined to enter a nonequilibrium state, schottische and disintegrate on separate nucleons under conditions typical to each collision. There is a question: how the phenomenon of multifragmentation is possible here, i. e. formation of several nucleus with masses on interval from a nucleon up to a material nucleus A in a final state. What is it - debris of a material nucleus or newly created daughter nuclei? The purpose of offered report is discussion of this question. The initial for us statement is taken from the theory of dynamic systems. Chaos is a result of hashing of phase space which is carried out by means of operations of distension and compression. The appropriate transformation are called baker-transformation or Smale's horseshoe. The geometrical picture of chaos is a folded relief of multi-dimensional phase space. The stochastic amplification is understood as growth of folder number and their size. In typical interactions of massive ions, chaos formation conditions are provided automatically due to alternate force influence of Coulomb and Yukawa fields - compression is replaced by distension, and distension - by compression. Extending this representation on a case of massive ion collision, we supplement it accounting a possibility of constituents (nucleons) strong interaction on small distances. The easiest way to make it is approximating minima of potential function V(x, c) in catastrophe theory by rectangular holes of Fermi-gas in nuclear physics. The catastrophe theory is necessary to find connection between channels of fragments birth of different charge and masses, proceeding from the general form of a multi-dimensional phase space relief (a kind of potential function). The main result which can be taken from this theory at the given stage of researches consists in the general form of a curve of a

  4. Ion-ion collisions

    International Nuclear Information System (INIS)

    Salzborn, Erhard; Melchert, Frank

    2000-01-01

    Collisions between ions belong to the elementary processes occurring in all types of plasmas. In this article we give a short overview about collisions involving one-electron systems. For collisions involving multiply-charged ions we limit the discussion to one specific quasi-one-electron system. (author)

  5. Predicting Agency Rating Migrations with Spread Implied Ratings

    OpenAIRE

    Jianming Kou; Dr Simone Varotto

    2005-01-01

    Investors traditionally rely on credit ratings to price debt instruments. However, rating agencies are known to be prudent in their approach to rating revisions, which results in delayed ratings adjustments to mutating credit conditions. For a large set of eurobonds we derive credit spread implied ratings and compare them with the ratings issued by rating agencies. Our results indicate that spread implied ratings often anticipate future movement of agency ratings and hence could help track cr...

  6. Estimating implied rates of discount in healthcare decision-making.

    Science.gov (United States)

    West, R R; McNabb, R; Thompson, A G H; Sheldon, T A; Grimley Evans, J

    2003-01-01

    To consider whether implied rates of discounting from the perspectives of individual and society differ, and whether implied rates of discounting in health differ from those implied in choices involving finance or "goods". The study comprised first a review of economics, health economics and social science literature and then an empirical estimate of implied rates of discounting in four fields: personal financial, personal health, public financial and public health, in representative samples of the public and of healthcare professionals. Samples were drawn in the former county and health authority district of South Glamorgan, Wales. The public sample was a representative random sample of men and women, aged over 18 years and drawn from electoral registers. The health professional sample was drawn at random with the cooperation of professional leads to include doctors, nurses, professions allied to medicine, public health, planners and administrators. The literature review revealed few empirical studies in representative samples of the population, few direct comparisons of public with private decision-making and few direct comparisons of health with financial discounting. Implied rates of discounting varied widely and studies suggested that discount rates are higher the smaller the value of the outcome and the shorter the period considered. The relationship between implied discount rates and personal attributes was mixed, possibly reflecting the limited nature of the samples. Although there were few direct comparisons, some studies found that individuals apply different rates of discount to social compared with private comparisons and health compared with financial. The present study also found a wide range of implied discount rates, with little systematic effect of age, gender, educational level or long-term illness. There was evidence, in both samples, that people chose a lower rate of discount in comparisons made on behalf of society than in comparisons made for

  7. Implied liquidity : towards stochastic liquidity modeling and liquidity trading

    NARCIS (Netherlands)

    Corcuera, J.M.; Guillaume, F.M.Y.; Madan, D.B.; Schoutens, W.

    2010-01-01

    In this paper we introduce the concept of implied (il)liquidity of vanilla options. Implied liquidity is based on the fundamental theory of conic finance, in which the one-price model is abandoned and replaced by a two-price model giving bid and ask prices for traded assets. The pricing is done by

  8. Bipolar H II regions produced by cloud-cloud collisions

    Science.gov (United States)

    Whitworth, Anthony; Lomax, Oliver; Balfour, Scott; Mège, Pierre; Zavagno, Annie; Deharveng, Lise

    2018-05-01

    We suggest that bipolar H II regions may be the aftermath of collisions between clouds. Such a collision will produce a shock-compressed layer, and a star cluster can then condense out of the dense gas near the center of the layer. If the clouds are sufficiently massive, the star cluster is likely to contain at least one massive star, which emits ionizing radiation, and excites an H II region, which then expands, sweeping up the surrounding neutral gas. Once most of the matter in the clouds has accreted onto the layer, expansion of the H II region meets little resistance in directions perpendicular to the midplane of the layer, and so it expands rapidly to produce two lobes of ionized gas, one on each side of the layer. Conversely, in directions parallel to the midplane of the layer, expansion of the H II region stalls due to the ram pressure of the gas that continues to fall towards the star cluster from the outer parts of the layer; a ring of dense neutral gas builds up around the waist of the bipolar H II region, and may spawn a second generation of star formation. We present a dimensionless model for the flow of ionized gas in a bipolar H II region created according to the above scenario, and predict the characteristics of the resulting free-free continuum and recombination-line emission. This dimensionless model can be scaled to the physical parameters of any particular system. Our intention is that these predictions will be useful in testing the scenario outlined above, and thereby providing indirect support for the role of cloud-cloud collisions in triggering star formation.

  9. Lock-free atom garbage collection for multithreaded Prolog

    NARCIS (Netherlands)

    J. Wielemaker (Jan); Harris, K. (Keri)

    2016-01-01

    textabstractThe runtime system of dynamic languages such as Prolog or Lisp and their derivatives contain a symbol table, in Prolog often called the atom table. A simple dynamically resizing hash-table used to be an adequate way to implement this table. As Prolog becomes fashionable for 24 × 7 server

  10. Lock-free atom garbage collection for multithreaded Prolog

    NARCIS (Netherlands)

    Wielemaker, Jan; Harris, Keri

    2016-01-01

    The runtime system of dynamic languages such as Prolog or Lisp and their derivatives contain a symbol table, in Prolog often called the atom table. A simple dynamically resizing hash-table used to be an adequate way to implement this table. As Prolog becomes fashionable for 24 × 7 server processes

  11. Asymptotic formulae for implied volatility in the Heston model

    OpenAIRE

    Forde, Martin; Jacquier, Antoine; Mijatovic, Aleksandar

    2009-01-01

    In this paper we prove an approximate formula expressed in terms of elementary functions for the implied volatility in the Heston model. The formula consists of the constant and first order terms in the large maturity expansion of the implied volatility function. The proof is based on saddlepoint methods and classical properties of holomorphic functions.

  12. Inelastic 12C(12C, 12C)12C scattering via the Glauber optical potential at E/A=30 MeV and 85 MeV

    International Nuclear Information System (INIS)

    Chauvin, J.; Lebrun, D.; Durand, F.; Buenerd, M.

    1984-07-01

    It is shown that some approximations implied in the optical limit of the Glauber theory are justified for low energies heavy-ions surface collisions. The Glauber optical potential -with no free parameters- leads to reasonable predictions for both elastic and inelastic scattering in the 12 C + 12 C system

  13. Probability of satellite collision

    Science.gov (United States)

    Mccarter, J. W.

    1972-01-01

    A method is presented for computing the probability of a collision between a particular artificial earth satellite and any one of the total population of earth satellites. The collision hazard incurred by the proposed modular Space Station is assessed using the technique presented. The results of a parametric study to determine what type of satellite orbits produce the greatest contribution to the total collision probability are presented. Collision probability for the Space Station is given as a function of Space Station altitude and inclination. Collision probability was also parameterized over miss distance and mission duration.

  14. Limits on rare B decays B implies μ+μ-K± and B implies μ+μ- K*

    International Nuclear Information System (INIS)

    Anway-Wiese, C.

    1995-01-01

    We report on a search for flavor-changing neutral current decays of B mesons into γγK * and γγK± using data obtained in the Collider Detector at Fermilab (CDF) 1992 endash 1993 data taking run. To reduce the amount of background in our data we use precise tracking information from the CDF silicon vertex detector to pinpoint the location of the decay vertex of the B candidate, and accept only events which have a large decay time.We compare this data to a B meson signal obtained in a similar fashion, but where the muon pairs originate from ψ decays, and calculate the relative branching ratios. In the absence of any indication of flavor-changing neutral current decays we set an upper limits of BR(B implies μμK ± ) much-gt 3.5x10 -5 , and BR(B implies μμK * )much-gt 5.1x10 -5 at 90% confidence level, which are consistent with Standard Model expectations but leave little room for non-standard physics. copyright 1995 American Institute of Physics

  15. Centrality and pseudorapidity dependence of the transverse energy flow in pPb collisions at √{sNN} = 5.02 TeV

    Science.gov (United States)

    Bruner, Christopher; Murray, Michael

    2016-12-01

    The almost hermetic coverage of CMS is used to measure the distribution of transverse energy as a function of pseudo-rapidity for pPb collisions at √{sNN} = 5.02 TeV. For minimum bias collisions (1 / N) dET / dη reaches 23 GeV which implies an ET per participant pair comparable to that of peripheral PbPb collisions at √{sNN} = 2.76 TeV. The centrality dependence of transverse energy production has been studied using centrality measures defined in three different angular regions. There is a strong auto-correlation between (1 / N) dET / dη and the η range used to define centrality for data and the EPOS-LHC and HIJING event generators. The centrality dependence of the data is much stronger for η values on the lead side than the proton side and shows significant differences from that predicted by either event generator.

  16. THE NON-THERMAL, TIME-VARIABLE RADIO EMISSION FROM Cyg OB2 no. 5: A WIND-COLLISION REGION

    International Nuclear Information System (INIS)

    Ortiz-Leon, Gisela N.; Loinard, Laurent; RodrIguez, Luis F.; Dzib, Sergio A.; Mioduszewski, Amy J.

    2011-01-01

    The radio emission from the well-studied massive stellar system Cyg OB2 no. 5 is known to fluctuate with a period of 6.7 years between a low-flux state, when the emission is entirely of free-free origin, and a high-flux state, when an additional non-thermal component (of hitherto unknown nature) appears. In this paper, we demonstrate that the radio flux of that non-thermal component is steady on timescales of hours and that its morphology is arc-like. This shows that the non-thermal emission results from the collision between the strong wind driven by the known contact binary in the system and that of an unseen companion on a somewhat eccentric orbit with a 6.7 year period and a 5-10 mas semimajor axis. Together with the previously reported wind-collision region located about 0.''8 to the northeast of the contact binary, so far Cyg OB2 no. 5 appears to be the only multiple system known to harbor two radio-imaged wind-collision regions.

  17. Precise gouging-free tool orientations for 5-axis CNC machining

    KAUST Repository

    Kim, Yong-Joon

    2014-08-19

    We present a precise approach to the generation of optimized collision-free and gouging-free tool paths for 5-axis CNC machining of freeform NURBS surfaces using flat-end and rounded-end (bull nose) tools having cylindrical shank. To achieve high approximation quality, we employ analysis of hyper-osculating circles (HOCs) (Wang et al., 1993a,b), that have third order contact with the target surface, and lead to a locally collision-free configuration between the tool and the target surface. At locations where an HOC is not possible, we aim at a double tangential contact among the tool and the target surface, and use it as a bridge between the feasible HOC tool paths. We formulate all such possible two-contact configurations as systems of algebraic constraints and solve them. For all feasible HOCs and two-contact configurations, we perform a global optimization to find the tool path that maximizes the approximation quality of the machining, while being gouge-free and possibly satisfying constraints on the tool tilt and the tool acceleration. We demonstrate the effectiveness of our approach via several experimental results.

  18. Precise gouging-free tool orientations for 5-axis CNC machining

    KAUST Repository

    Kim, Yong-Joon; Elber, Gershon; Barton, Michael; Pottmann, Helmut

    2014-01-01

    We present a precise approach to the generation of optimized collision-free and gouging-free tool paths for 5-axis CNC machining of freeform NURBS surfaces using flat-end and rounded-end (bull nose) tools having cylindrical shank. To achieve high approximation quality, we employ analysis of hyper-osculating circles (HOCs) (Wang et al., 1993a,b), that have third order contact with the target surface, and lead to a locally collision-free configuration between the tool and the target surface. At locations where an HOC is not possible, we aim at a double tangential contact among the tool and the target surface, and use it as a bridge between the feasible HOC tool paths. We formulate all such possible two-contact configurations as systems of algebraic constraints and solve them. For all feasible HOCs and two-contact configurations, we perform a global optimization to find the tool path that maximizes the approximation quality of the machining, while being gouge-free and possibly satisfying constraints on the tool tilt and the tool acceleration. We demonstrate the effectiveness of our approach via several experimental results.

  19. Multiregion, multigroup collision probability method with white boundary condition for light water reactor thermalization calculations

    International Nuclear Information System (INIS)

    Ozgener, B.; Ozgener, H.A.

    2005-01-01

    A multiregion, multigroup collision probability method with white boundary condition is developed for thermalization calculations of light water moderated reactors. Hydrogen scatterings are treated by Nelkin's kernel while scatterings from other nuclei are assumed to obey the free-gas scattering kernel. The isotropic return (white) boundary condition is applied directly by using the appropriate collision probabilities. Comparisons with alternate numerical methods show the validity of the present formulation. Comparisons with some experimental results indicate that the present formulation is capable of calculating disadvantage factors which are closer to the experimental results than alternative methods

  20. Collision Mechanics

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup; Servis, D.P.; Zhang, Shengming

    1999-01-01

    The first section of the present report describes the procedures that are being programmed at DTU for evaluation of the external collision dynamics. Then follows a detailed description of a comprehensive finite element analysis of one collision scenario for MS Dextra carried out at NTUA. The last...

  1. Cluster-collision frequency. II. Estimation of the collision rate

    International Nuclear Information System (INIS)

    Amadon, A.S.; Marlow, W.H.

    1991-01-01

    Gas-phase cluster-collision rates, including effects of cluster morphology and long-range intermolecular forces, are calculated. Identical pairs of icosahedral or dodecahedral carbon tetrachloride clusters of 13, 33, and 55 molecules in two different relative orientations were discussed in the preceding paper [Phys. Rev. A 43, 5483 (1991)]: long-range interaction energies were derived based upon (i) exact calculations of the iterated, or many-body, induced-dipole interaction energies for the clusters in two fixed relative orientations; and (ii) bulk, or continuum descriptions (Lifshitz--van der Waals theory), of spheres of corresponding masses and diameters. In this paper, collision rates are calculated according to an exact description of the rates for small spheres interacting via realistic potentials. Utilizing the interaction energies of the preceding paper, several estimates of the collision rates are given by treating the discrete clusters in fixed relative orientations, by computing rotationally averaged potentials for the discrete clusters, and by approximating the clusters as continuum spheres. For the discrete, highly symmetric clusters treated here, the rates using the rotationally averaged potentials closely approximate the fixed-orientation rates and the values of the intercluster potentials for cluster surface separations under 2 A have negligible effect on the overall collision rates. While the 13-molecule cluster-collision rate differs by 50% from the rate calculated as if the cluster were bulk matter, the two larger cluster-collision rates differ by less than 15% from the macroscopic rates, thereby indicating the transition of microscopic to macroscopic behavior

  2. The Born Rule and Free Will: why Libertarian Agent-Causal Free Will is not "antiscientific"

    Science.gov (United States)

    Kastner, Ruth E.

    In the libertarian "agent causation" view of free will, free choices are attributable only to the choosing agent, as opposed to a specific cause or causes outside the agent. An often-repeated claim in the philosophical literature on free will is that agent causation necessarily implies lawlessness, and is therefore "antiscientific." That claim is critiqued and it is argued, on the contrary, that the volitional powers of a free agent need not be viewed as anomic, specifically with regard to the quantum statistical law (the Born Rule). Assumptions about the role and nature of causation, taken as bearing on volitional agency, are examined and found inadequate to the task. Finally, it is suggested that quantum theory may constitute precisely the sort of theory required for a nomic grounding of libertarian free will.

  3. US Implied Volatility as A predictor of International Returns

    Directory of Open Access Journals (Sweden)

    Mehmet F. Dicle

    2017-12-01

    Full Text Available This study provides evidence of the US implied volatility’s e ect on international equitymarkets’ returns. This evidence has two main implications: i investors may find that foreign equityreturns adjusting to US implied volatility may not provide true diversification benefits, and ii foreignequity returns may be predicted using US implied volatility. Our sample includes US volatility index(VIX and major equity indexes in twenty countries for the period between January, 2000 throughJuly, 2017. VIX leads eighteen of the international markets and Granger causes seventeen of themarkets after controlling for the S&P-500 index returns and the 2007/2008 US financial crisis. USinvestors looking to diversify US risk may find that international equities may not provide intendeddiversification benefits. Our evidence provides support for predictability of international equity returnsbased on US volatility.

  4. Magnetostratigraphy of the Fenghuoshan Group in the Hoh Xil Basin and its tectonic implications for India-Eurasia collision and Tibetan Plateau deformation

    Science.gov (United States)

    Jin, Chunsheng; Liu, Qingsong; Liang, Wentian; Roberts, Andrew P.; Sun, Jimin; Hu, Pengxiang; Zhao, Xiangyu; Su, Youliang; Jiang, Zhaoxia; Liu, Zhifeng; Duan, Zongqi; Yang, Huihui; Yuan, Sihua

    2018-03-01

    Early Cenozoic plate collision of India and Eurasia was a significant geological event, which resulted in Tibetan Plateau (TP) uplift and altered regional and global atmospheric circulations. However, the timing of initial collision is debated. It also remains unclear whether the TP was deformed either progressively northward, or synchronously as a whole. As the largest basin in the hinterland of the TP, evolution of the Hoh Xil Basin (HXB) and its structural relationship with development of the Tanggula Thrust System (TTS) have important implications for unraveling the formation mechanism and deformation history of the TP. In this study, we present results from a long sedimentary sequence from the HXB that dates the Fenghuoshan Group to ∼72-51 Ma based on magnetostratigraphy and radiometric ages of a volcanic tuff layer within the group. Three depositional phases reflect different stages of tectonic movement on the TTS, which was initialized at 71.9 Ma prior to the India-Eurasia collision. An abrupt sediment accumulation rate increase from 53.9 Ma is a likely response to tectonic deformation in the plateau hinterland, and indicates that initial India-Eurasia collision occurred at no later than that time. This remote HXB tectonosedimentary response implies that compressional deformation caused by India-Eurasia collision likely propagated to the central TP shortly after the collision, which supports the synchronous deformation model for TP.

  5. SU-E-T-754: Three-Dimensional Patient Modeling Using Photogrammetry for Collision Avoidance

    Energy Technology Data Exchange (ETDEWEB)

    Popple, R; Cardan, R [Univ Alabama Birmingham, Birmingham, AL (United States)

    2015-06-15

    Purpose: To evaluate photogrammetry for creating a three-dimensional patient model. Methods: A mannequin was configured on the couch of a CT scanner to simulate a patient setup using an indexed positioning device. A CT fiducial was placed on the indexed CT table-overlay at the reference index position. Two dimensional photogrammetry targets were placed on the table in known positions. A digital SLR camera was used to obtain 27 images from different positions around the CT table. The images were imported into a commercial photogrammetry package and a 3D model constructed. Each photogrammetry target was identified on 2 to 5 images. The CT DICOM metadata and the position of the CT fiducial were used to calculate the coordinates of the photogrammetry targets in the CT image frame of reference. The coordinates were transferred to the photogrammetry software to orient the 3D model. The mannequin setup was transferred to the treatment couch of a linear accelerator and positioned at isocenter using in-room lasers. The treatment couch coordinates were noted and compared with prediction. The collision free regions were measured over the full range of gantry and table motion and were compared with predictions obtained using a general purpose polygon interference algorithm. Results: The reconstructed 3D model consisted of 180000 triangles. The difference between the predicted and measured couch positions were 5 mm, 1 mm, and 1 mm for longitudinal, lateral, and vertical, respectively. The collision prediction tested 64620 gantry table combinations in 11.1 seconds. The accuracy was 96.5%, with false positive and negative results occurring at the boundaries of the collision space. Conclusion: Photogrammetry can be used as a tool for collision avoidance during treatment planning. The results indicate that a buffer zone is necessary to avoid false negatives at the boundary of the collision-free zone. Testing with human patients is underway. Research partially supported by a grant

  6. Electromagnetic lepton-pair production in relativistic collisions

    International Nuclear Information System (INIS)

    Albert, C.J.; Ernst, D.J.; Strayer, M.R.; Bottcher, C.

    1991-01-01

    Electromagnetic lepton-pair production in relativistic collisions is studied in an ab initio approach with no free parameters. After a semi-classical approximation to the relative motion of the two incident particles is made, the resulting second-order diagram is calculated using a Monte Carlo technique to evaluate the resulting seven-dimensional integral. We examine the case of electron-positron pair production in π - p collisions at p pi = 17 GeV. We find that a significant fraction of the measured pairs in this reaction are produced via the magnetic spin-flip current of the proton. Approaches, such as the equivalent photon approximation, which neglect this part of the current predict much too small a cross section. This feature is traced to the cuts imposed in taking the experimental data. Lepton-pair production in the scattering of 3 He, 4 He and 4 He, 4 He is proposed as a clean way of experimentally separating the spin-flip and non-flip processes; predictions are made for these systems

  7. On security arguments of the second round SHA-3 candidates

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2012-01-01

    of which got accepted to the first round. 14 candidates were left in the second round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection process is the SHA-3 hash function security. We identify two important classes of security arguments...... for the new designs: (1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions for the second round candidates...... and review arguments and bounds against classes of differential attacks.We discuss all the SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential attacks. Additionally, we generalize the well-known proof of collision resistance...

  8. On the rates of type Ia supernovae originating from white dwarf collisions in quadruple star systems

    Science.gov (United States)

    Hamers, Adrian S.

    2018-04-01

    We consider the evolution of stellar hierarchical quadruple systems in the 2+2 (two binaries orbiting each other's barycentre) and 3+1 (triple orbited by a fourth star) configurations. In our simulations, we take into account the effects of secular dynamical evolution, stellar evolution, tidal evolution and encounters with passing stars. We focus on type Ia supernovae (SNe Ia) driven by collisions of carbon-oxygen (CO) white dwarfs (WDs). Such collisions can arise from several channels: (1) collisions due to extremely high eccentricities induced by secular evolution, (2) collisions following a dynamical instability of the system, and (3) collisions driven by semisecular evolution. The systems considered here have initially wide inner orbits, with initial semilatus recti larger than 12 {au}, implying no interaction if the orbits were isolated. However, taking into account dynamical evolution, we find that ≈0.4 (≈0.6) of 2+2 (3+1) systems interact. In particular, Roche Lobe overflow can be triggered possibly in highly eccentric orbits, dynamical instability can ensue due to mass-loss-driven orbital expansion or secular evolution, or a semisecular regime can be entered. We compute the delay-time distributions (DTDs) of collision-induced SNe Ia, and find that they are flatter compared to the observed DTD. Moreover, our combined SNe Ia rates are (3.7± 0.7) × 10^{-6} M_⊙^{-1} and (1.3± 0.2) × 10^{-6} M_⊙^{-1} for 2+2 and 3+1 systems, respectively, three orders of magnitude lower compared to the observed rate, of order 10^{-3} M_⊙^{-1}. The low rates can be ascribed to interactions before the stars evolve to CO WDs. However, our results are lower limits given that we considered a subset of quadruple systems.

  9. Higgs boson creation in laser-boosted lepton collisions

    International Nuclear Information System (INIS)

    Müller, Sarah J.; Keitel, Christoph H.; Müller, Carsten

    2014-01-01

    Electroweak processes in high-energy lepton collisions are considered in a situation where the incident center-of-mass energy lies below the reaction threshold, but is boosted to the required level by subsequent laser acceleration. Within the framework of laser-dressed quantum field theory, we study the laser-boosted process ℓ + ℓ − →HZ 0 in detail and specify the technical demands needed for its experimental realization. Further, we outline possible qualitative differences to field-free processes regarding the detection of the produced Higgs bosons.

  10. Associations between butane hash oil use and cannabis-related problems.

    Science.gov (United States)

    Meier, Madeline H

    2017-10-01

    High-potency cannabis concentrates are increasingly popular in the United States, and there is concern that use of high-potency cannabis might increase risk for cannabis-related problems. However, little is known about the potential negative consequences of concentrate use. This study reports on associations between past-year use of a high-potency cannabis concentrate, known as butane hash oil (BHO), and cannabis-related problems. A sample of 821 college students were recruited to complete a survey about their health and behavior. Participants who had used cannabis in the past year (33%, n=273) completed questions about their cannabis use, including their use of BHO and cannabis-related problems in eight domains: physical dependence, impaired control, academic-occupational problems, social-interpersonal problems, self-care problems, self-perception, risk behavior, and blackouts. Approximately 44% (n=121) of past-year cannabis users had used BHO in the past year. More frequent BHO use was associated with higher levels of physical dependence (RR=1.8, pcannabis-related academic/occupational problems (RR=1.5, p=0.004), poor self-care (RR=1.3, p=0.002), and cannabis-related risk behavior (RR=1.2, p=0.001). After accounting for sociodemographic factors, age of onset of cannabis use, sensation seeking, overall frequency of cannabis use, and frequency of other substance use, BHO use was still associated with higher levels of physical dependence (RR=1.2, p=0.014). BHO use is associated with greater physiological dependence on cannabis, even after accounting for potential confounders. Longitudinal research is needed to determine if cannabis users with higher levels of physiological dependence seek out BHO and/or if BHO use increases risk for physiological dependence. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Few-photon electron-positron pair creation in the collision of a relativistic nucleus and an intense x-ray laser beam

    International Nuclear Information System (INIS)

    Mueller, C.; Gruen, N.; Voitkiv, A.B.

    2004-01-01

    We study the nonlinear process of e - e + pair creation by a nucleus which moves at a relativistic energy in the laboratory frame and collides with an intense x-ray laser beam. The collision system under consideration is chosen in such a way that the simultaneous absorption of at least two photons from the laser wave is required in order to exceed the energy threshold of the reaction. We calculate total and differential rates for both free-free and bound-free pair production. In the case of free-free pair creation we demonstrate the effect of the laser polarization on the spectra of the produced particles, and we show that at very high intensities the total rate exhibits features analogous to those well known from above-threshold ionization rates for atoms. In the case of bound-free pair creation a singularity is found in the laboratory frame angular distribution of the produced positron. This singularity represents a distinct characteristic of the bound-free pair production and allows one to separate this process from free-free pair creation even without detecting a bound state of the captured electron. For both types of pair creation we consider the dependences of the total rates on the collision parameters, give the corresponding scaling laws, and discuss the possibility to observe these nonlinear processes in a future experiment

  12. Energy dependence of the anisotropy of noncharacteristic x-rays emitted in fast ion-atom collisions

    International Nuclear Information System (INIS)

    Thoe, R.S.; Sellin, I.A.; Brown, M.D.; Forester, J.P.; Griffin, P.M.; Pegg, D.J.; Peterson, R.S.

    1974-01-01

    The effect of beam velocity and K-shell binding energy on the angular distributions of the noncharacteristic x-radiation emitted for various collision pairs. The results are in general agreement with the calculations of Mueller and Greiner, in that the anisotropy increases rapidly with energy, provided that the ions are still moving slowly, compared to the velocity of the K-shell electrons of the separated atoms. The anisotropy in some cases exceeds the maximum permitted by the Mueller--Greiner model for the zero alignment case, implying that strong alignment phenomena also occur

  13. Laser-assisted atom-atom collisions

    International Nuclear Information System (INIS)

    Roussel, F.

    1984-01-01

    The basic layer-assisted atom-atom collision processes are reviewed in order to get a simpler picture of the main physical facts. The processes can be separated into two groups: optical collisions where only one atom is changing state during the collision, the other acting as a spectator atom, and radiative collisions where the states of the two atoms are changing during the collision. All the processes can be interpreted in terms of photoexcitation of the quasimolecule formed during the collisional process. (author)

  14. Hard probes in heavy ion collisions at the LHC: PDFs, shadowing and $pA$ collisions

    CERN Document Server

    Accardi, Alberto; Botje, M.; Brodsky, S.J.; Cole, B.; Eskola, K.J.; Fai, George I.; Frankfurt, L.; Fries, R.J.; Geist, Walter M.; Guzey, V.; Honkanen, H.; Kolhinen, V.J.; Kovchegov, Yu.V.; McDermott, M.; Morsch, A.; Qiu, Jian-wei; Salgado, C.A.; Strikman, M.; Takai, H.; Tapprogge, S.; Vogt, R.; Zhang, X.f.

    2003-01-01

    This manuscript is the outcome of the subgroup ``PDFs, shadowing and $pA$ collisions'' from the CERN workshop ``Hard Probes in Heavy Ion Collisions at the LHC''. In addition to the experimental parameters for $pA$ collisions at the LHC, the issues discussed are factorization in nuclear collisions, nuclear parton distributions (nPDFs), hard probes as the benchmark tests of factorization in $pA$ collisions at the LHC, and semi-hard probes as observables with potentially large nuclear effects. Also, novel QCD phenomena in $pA$ collisions at the LHC are considered. The importance of the $pA$ program at the LHC is emphasized.

  15. Implied adjusted volatility functions: Empirical evidence from Australian index option market

    Science.gov (United States)

    Harun, Hanani Farhah; Hafizah, Mimi

    2015-02-01

    This study aims to investigate the implied adjusted volatility functions using the different Leland option pricing models and to assess whether the use of the specified implied adjusted volatility function can lead to an improvement in option valuation accuracy. The implied adjusted volatility is investigated in the context of Standard and Poor/Australian Stock Exchange (S&P/ASX) 200 index options over the course of 2001-2010, which covers the global financial crisis in the mid-2007 until the end of 2008. Both in- and out-of-sample resulted in approximately similar pricing error along the different Leland models. Results indicate that symmetric and asymmetric models of both moneyness ratio and logarithmic transformation of moneyness provide the overall best result in both during and post-crisis periods. We find that in the different period of interval (pre-, during and post-crisis) is subject to a different implied adjusted volatility function which best explains the index options. Hence, it is tremendously important to identify the intervals beforehand in investigating the implied adjusted volatility function.

  16. On the possibility of using model potentials for collision integral calculations of interest for planetary atmospheres

    International Nuclear Information System (INIS)

    Capitelli, M.; Cappelletti, D.; Colonna, G.; Gorse, C.; Laricchiuta, A.; Liuti, G.; Longo, S.; Pirani, F.

    2007-01-01

    The interaction energy in systems (atom-atom, atom-ion and atom-molecule) involving open-shell species, predicted by a phenomenological method, is used for collision integral calculations. The results are compared with those obtained by different authors by using the complete set of quantum mechanical interaction potentials arizing from the electronic configurations of separate partners. A satisfactory agreement is achieved, implying that the effect of deep potential wells, present in some of the chemical potentials, is cancelled by the effect of strong repulsive potentials

  17. Low-energy electron collisions with metal clusters: Electron capture and cluster fragmentation

    International Nuclear Information System (INIS)

    Kresin, V.V.; Scheidemann, A.; Knight, W.D.

    1993-01-01

    The authors have carried out the first measurement of absolute cross sections for the interaction between electrons and size-resolved free metal clusters. Integral inelastic scattering cross sections have been determined for electron-Na n cluster collisions in the energy range from 0.1 eV to 30 eV. At energies ≤1 eV, cross sections increase with decreasing impact energies, while at higher energies they remain essentially constant. The dominant processes are electron attachment in the low-energy range, and collision-induced fragmentation at higher energies. The magnitude of electron capture cross sections can be quantitatively explained by the effect of the strong polarization field induced in the cluster by the incident electron. The cross sections are very large, reaching values of hundreds of angstrom 2 ; this is due to the highly polarizable nature of metal clusters. The inelastic interaction range for fragmentation collisions is also found to considerably exceed the cluster radius, again reflecting the long-range character of electron-cluster interactions. The important role played by the polarization interaction represents a bridge between the study of collision processes and the extensive research on cluster response properties. Furthermore, insight into the mechanisms of electron scattering is important for understanding production and detection of cluster ions in mass spectrometry and related processes

  18. On exotic hybrid meson production in γ*γ collisions

    International Nuclear Information System (INIS)

    Anikin, I.V.; Teryaev, O.V.; Pire, B.; Szymanowski, L.; Universite de Liege; Paris-11 Univ., 91 - Orsay; Wallon, S.

    2006-01-01

    We present a theoretical study of exotic hybrid meson (J PC =1 -+ ) production in photon-photon collisions where one of the photons is deeply virtual, including twist two and twist three contributions. We calculate the cross section of this process, which turns out to be large enough to imply sizeable counting rates in the present high luminosity electron-positron colliders. We emphasize the importance of the πη decay channel for the detection of the hybrid meson candidate π 1 (1400) and calculate the cross section and the angular distribution for πη pair production in the unpolarized case. This angular distribution is a useful tool for disentangling the hybrid meson signal from the background. Finally, we calculate the single spin asymmetry associated with one initial longitudinally polarized lepton. (orig.)

  19. User characteristics and effect profile of Butane Hash Oil: An extremely high-potency cannabis concentrate.

    Science.gov (United States)

    Chan, Gary C K; Hall, Wayne; Freeman, Tom P; Ferris, Jason; Kelly, Adrian B; Winstock, Adam

    2017-09-01

    Recent reports suggest an increase in use of extremely potent cannabis concentrates such as Butane Hash Oil (BHO) in some developed countries. The aims of this study were to examine the characteristics of BHO users and the effect profiles of BHO. Anonymous online survey in over 20 countries in 2014 and 2015. Participants aged 18 years or older were recruited through onward promotion and online social networks. The overall sample size was 181,870. In this sample, 46% (N=83,867) reported using some form of cannabis in the past year, and 3% reported BHO use (n=5922). Participants reported their use of 7 types of cannabis in the past 12 months, the source of their cannabis, reasons for use, use of other illegal substances, and lifetime diagnosis for depression, anxiety and psychosis. Participants were asked to rate subjective effects of BHO and high potency herbal cannabis. Participants who reported a lifetime diagnosis of depression (OR=1.15, p=0.003), anxiety (OR=1.72, pcannabis. BHO users also reported stronger negative effects and less positive effects when using BHO than high potency herbal cannabis (pcannabis. Copyright © 2017. Published by Elsevier B.V.

  20. Level Shifts in Volatility and the Implied-Realized Volatility Relation

    DEFF Research Database (Denmark)

    Christensen, Bent Jesper; de Magistris, Paolo Santucci

    We propose a simple model in which realized stock market return volatility and implied volatility backed out of option prices are subject to common level shifts corresponding to movements between bull and bear markets. The model is estimated using the Kalman filter in a generalization to the mult......We propose a simple model in which realized stock market return volatility and implied volatility backed out of option prices are subject to common level shifts corresponding to movements between bull and bear markets. The model is estimated using the Kalman filter in a generalization...... to the multivariate case of the univariate level shift technique by Lu and Perron (2008). An application to the S&P500 index and a simulation experiment show that the recently documented empirical properties of strong persistence in volatility and forecastability of future realized volatility from current implied...... volatility, which have been interpreted as long memory (or fractional integration) in volatility and fractional cointegration between implied and realized volatility, are accounted for by occasional common level shifts....

  1. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    Science.gov (United States)

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  2. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2014-01-01

    Full Text Available In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  3. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  4. Free-Free Transitions in the Presence of Laser Fields and Debye Potential at Very Low Incident Electron Energies

    Science.gov (United States)

    Bhatia, Anand

    2012-01-01

    We study the free-free transition in electron-helium ion in the ground state and embedded in a Debye potential in the presence of an external laser field at very low incident electron energies. The laser field is treated classically while the collision dynamics is treated quantum mechanically. The laser field is chosen as monochromatic, linearly polarized and homogeneous. The incident electron is considered to be dressed by the laser field in a nonperturbative manner by choosing Volkov wave function for it. The scattering wave function for the incident electron on the target embedded in a Debye potential is solved numerically by taking into account the effect of electron exchange. We calculate the laser-assisted differential and total cross sections for free-free transition for absorption/emission of a single photon or no photon exchange. The results will be presented at the conference.

  5. Single-photon emission associated with double electron capture in F9+ + C collisions

    CERN Document Server

    Elkafrawy, Tamer; Tanis, John A; Warczak, Andrzej

    2016-01-01

    Radiative double electron capture (RDEC), the one-step process occurring in ion-atom collisions, has been investigated for bare fluorine ions colliding with carbon. RDEC is completed when two target electrons are captured to a bound state of a projectile simultaneously with the emission of a single photon. This work is a follow-up to our earlier measurement of RDEC for bare oxygen projectiles, thus providing a recipient system free of electron-related Coulomb fields in both cases and allowing for the comparison between the two collision systems as well as with available theoretical studies. The most significant mechanisms of x-ray emission that may contribute to the RDEC energy region as background processes are also addressed.

  6. Collision Repair Campaign

    Science.gov (United States)

    The Collision Repair Campaign targets meaningful risk reduction in the Collision Repair source category to reduce air toxic emissions in their communities. The Campaign also helps shops to work towards early compliance with the Auto Body Rule.

  7. Exact analytical solutions of continuity equation for electron beams precipitating in Coulomb collisions

    Energy Technology Data Exchange (ETDEWEB)

    Dobranskis, R. R.; Zharkova, V. V., E-mail: valentina.zharkova@northumbria.ac.uk [Department of Mathematics and Information Sciences, University of Northumbria, Newcastle upon Tyne NE1 2XP (United Kingdom)

    2014-06-10

    The original continuity equation (CE) used for the interpretation of the power law energy spectra of beam electrons in flares was written and solved for an electron beam flux while ignoring an additional free term with an electron density. In order to remedy this omission, the original CE for electron flux, considering beam's energy losses in Coulomb collisions, was first differentiated by the two independent variables: depth and energy leading to partial differential equation for an electron beam density instead of flux with the additional free term. The analytical solution of this partial differential continuity equation (PDCE) is obtained by using the method of characteristics. This solution is further used to derive analytical expressions for mean electron spectra for Coulomb collisions and to carry out numeric calculations of hard X-ray (HXR) photon spectra for beams with different parameters. The solutions revealed a significant departure of electron densities at lower energies from the original results derived from the CE for the flux obtained for Coulomb collisions. This departure is caused by the additional exponential term that appeared in the updated solutions for electron differential density leading to its faster decrease at lower energies (below 100 keV) with every precipitation depth similar to the results obtained with numerical Fokker-Planck solutions. The effects of these updated solutions for electron densities on mean electron spectra and HXR photon spectra are also discussed.

  8. Simultaneous electron capture and excitation in ion-atom collisions

    International Nuclear Information System (INIS)

    Tanis, J.A.; Bernstein, E.M.; Graham, W.G.; Clark, M.; Shafroth, S.M.; Johnson, B.M.; Jones, K.; Meron, M.

    1982-01-01

    A review of recent efforts to observe simultaneous electron capture-and-K-shell excitation in ion-atom collisions is presented. This process which has been referred to as resonant-transfer-and-excitation (RTE), is qualitatively analogous to dielectronic recombination (inverse Auger transition) in free-electron-ion collisions, and, hence, is expected to be resonant. Experimentally, events having the correct signature for simultaneous capture-and-excitation are isolated by detecting projectile K x rays in coincidence with ions which capture a single electron. In a recent experiment involving 70-160 MeV S 13+ ions incident on Ar, a maximum was observed in the yield of projectile K x rays associated with electron capture. This maximum is attributed to simultaneous capture - and excitation. The position (120 MeV) and width (60 MeV) of the observed maximum are in good agreement with theoretical calculations. The data indicate that RTE is an important mechanism for inner-shell vacancy production in the energy range studied

  9. Basins in ARC-continental collisions

    Science.gov (United States)

    Draut, Amy E.; Clift, Peter D.; Busby, Cathy; Azor, Antonio

    2012-01-01

    Arc-continent collisions occur commonly in the plate-tectonic cycle and result in rapidly formed and rapidly collapsing orogens, often spanning just 5-15 My. Growth of continental masses through arc-continent collision is widely thought to be a major process governing the structural and geochemical evolution of the continental crust over geologic time. Collisions of intra-oceanic arcs with passive continental margins (a situation in which the arc, on the upper plate, faces the continent) involve a substantially different geometry than collisions of intra-oceanic arcs with active continental margins (a situation requiring more than one convergence zone and in which the arc, on the lower plate, backs into the continent), with variable preservation potential for basins in each case. Substantial differences also occur between trench and forearc evolution in tectonically erosive versus tectonically accreting margins, both before and after collision. We examine the evolution of trenches, trench-slope basins, forearc basins, intra-arc basins, and backarc basins during arc-continent collision. The preservation potential of trench-slope basins is low; in collision they are rapidly uplifted and eroded, and at erosive margins they are progressively destroyed by subduction erosion. Post-collisional preservation of trench sediment and trench-slope basins is biased toward margins that were tectonically accreting for a substantial length of time before collision. Forearc basins in erosive margins are usually floored by strong lithosphere and may survive collision with a passive margin, sometimes continuing sedimentation throughout collision and orogeny. The low flexural rigidity of intra-arc basins makes them deep and, if preserved, potentially long records of arc and collisional tectonism. Backarc basins, in contrast, are typically subducted and their sediment either lost or preserved only as fragments in melange sequences. A substantial proportion of the sediment derived from

  10. Clifford Algebra Implying Three Fermion Generations Revisited

    International Nuclear Information System (INIS)

    Krolikowski, W.

    2002-01-01

    The author's idea of algebraic compositeness of fundamental particles, allowing to understand the existence in Nature of three fermion generations, is revisited. It is based on two postulates. Primo, for all fundamental particles of matter the Dirac square-root procedure √p 2 → Γ (N) ·p works, leading to a sequence N=1, 2, 3, ... of Dirac-type equations, where four Dirac-type matrices Γ (N) μ are embedded into a Clifford algebra via a Jacobi definition introducing four ''centre-of-mass'' and (N - 1) x four ''relative'' Dirac-type matrices. These define one ''centre-of-mass'' and N - 1 ''relative'' Dirac bispinor indices. Secundo, the ''centre-of-mass'' Dirac bispinor index is coupled to the Standard Model gauge fields, while N - 1 ''relative'' Dirac bispinor indices are all free indistinguishable physical objects obeying Fermi statistics along with the Pauli principle which requires the full antisymmetry with respect to ''relative'' Dirac indices. This allows only for three Dirac-type equations with N = 1, 3, 5 in the case of N odd, and two with N = 2, 4 in the case of N even. The first of these results implies unavoidably the existence of three and only three generations of fundamental fermions, namely leptons and quarks, as labelled by the Standard Model signature. At the end, a comment is added on the possible shape of Dirac 3 x 3 mass matrices for four sorts of spin-1/2 fundamental fermions appearing in three generations. For charged leptons a prediction is m τ = 1776.80 MeV, when the input of experimental m e and m μ is used. (author)

  11. Clifford Algebra Implying Three Fermion Generations Revisited

    Science.gov (United States)

    Krolikowski, Wojciech

    2002-09-01

    The author's idea of algebraic compositeness of fundamental particles, allowing to understand the existence in Nature of three fermion generations, is revisited. It is based on two postulates. Primo, for all fundamental particles of matter the Dirac square-root procedure √ {p2} → {Γ }(N)p works, leading to a sequence N = 1,2,3, ... of Dirac-type equations, where four Dirac-type matrices {Γ }(N)μ are embedded into a Clifford algebra via a Jacobi definition introducing four ``centre-of-mass'' and (N-1)× four ``relative'' Dirac-type matrices. These define one ``centre-of-mass'' and (N-1) ``relative'' Dirac bispinor indices. Secundo, the ``centre-of-mass'' Dirac bispinor index is coupled to the Standard Model gauge fields, while (N-1) ``relative'' Dirac bispinor indices are all free indistinguishable physical objects obeying Fermi statistics along with the Pauli principle which requires the full antisymmetry with respect to ``relative'' Dirac indices. This allows only for three Dirac-type equations with N = 1,3,5 in the case of N odd, and two with N = 2,4 in the case of N even. The first of these results implies unavoidably the existence of three and only three generations of fundamental fermions, namely leptons and quarks, as labelled by the Standard Model signature. At the end, a comment is added on the possible shape of Dirac 3x3 mass matrices for four sorts of spin-1/2 fundamental fermions appearing in three generations. For charged leptons a prediction is mτ = 1776.80 MeV, when the input of experimental me and mμ is used.

  12. Study of charge correlation for Z {<=} 2 obtained in Au+Au collisions with incident energy from 150 up to 400 MeV/A. FOPI detector is used; Etude des correlations des charges Z {<=} 2 obtenues lors des collisions Au+Au aux energies incidentes de 150 a 400 MeV/A avec le detecteur fopi

    Energy Technology Data Exchange (ETDEWEB)

    Pras, Ph

    1997-01-24

    In the first part of this work we present what information can be driven from heavy ion collision studies and what can be expected from the state equation of nuclear matter. We introduce the notion of centrality and the concept of spectator-participant. The different models of collisions are reviewed. The theory of correlations between light particles is used as a tool to predict some results about the shape and population density of theoretical spectra.The Coulomb model which implies a thermal interpretation of heavy ion collisions is modified in order to take excited states into account and to reproduce the collective phenomena of flow and squeeze-out. Within the frame of this modified Coulomb model 3 notions of nuclear temperature are compared. A discussion is lead to find out the temperature of nuclear matter at the very moment of fragmentation. (A.C.) 134 refs.

  13. Interaction mean free path measurements for relativistic heavy ion fragments using CR39 plastic track detectors

    International Nuclear Information System (INIS)

    Drechsel, H.; Brechtmann, C.; Dreute, J.; Sonntag, S.; Trakowski, W.; Beer, J.; Heinrich, W.

    1984-01-01

    This paper describes an experiment measuring the interaction mean free paths for charge changing nuclear collisions of relativistic heavy ion fragments. We use a stack of CR39 plastic nuclear track detectors that was irradiated with 1.8 GeV/nucleon 40 Ar ions at the Berkeley Bevalac. About 1.5 x 10 7 etch cones were measured in this experiment using an automatic measuring system. By tracing the etch cones over successive plastic foils the particle trajectories in the stack were reconstructed. For 14185 trajectories with 6444 nuclear collisions of fragments with charge 9-15 the interaction mean free path in the plastic was determined. (orig.)

  14. Forward di-jet production in p+Pb collisions in the small-x improved TMD factorization framework

    CERN Document Server

    van Hameren, A.; Kutak, K.; Marquet, C.; Petreska, E.; Sapeta, S.

    2016-01-01

    We study the production of forward di-jets in proton-lead and proton-proton collisions at the Large Hadron Collider. Such configurations, with both jets produced in the forward direction, impose a dilute-dense asymmetry which allows to probe the gluon density of the lead or proton target at small longitudinal momentum fractions. Even though the jet momenta are always much bigger than the saturation scale of the target, $Q_s$, the transverse momentum imbalance of the di-jet system may be either also much larger than $Q_s$, or of the order $Q_s$, implying that the small-$x$ QCD dynamics involved is either linear or non-linear, respectively. The small-$x$ improved TMD factorization framework deals with both situation in the same formalism. In the latter case, which corresponds to nearly back-to-back jets, we find that saturation effects induce a significant suppression of the forward di-jet azimuthal correlations in proton-lead versus proton-proton collisions.

  15. Forward di-jet production in p+Pb collisions in the small-x improved TMD factorization framework

    Energy Technology Data Exchange (ETDEWEB)

    Hameren, A. van [The H. Niewodniczański Institute of Nuclear Physics PAN,Radzikowskiego 152, 31-342 Kraków (Poland); Kotko, P. [Department of Physics, Penn State University,University Park, 16803 PA (United States); Kutak, K. [The H. Niewodniczański Institute of Nuclear Physics PAN,Radzikowskiego 152, 31-342 Kraków (Poland); Marquet, C. [Centre de Physique Théorique, École Polytechnique,CNRS, Université Paris-Saclay,91128 Palaiseau (France); Petreska, E. [Centre de Physique Théorique, École Polytechnique,CNRS, Université Paris-Saclay,91128 Palaiseau (France); Departamento de Física de Partículas and IGFAE,Universidade de Santiago de Compostela,15782 Santiago de Compostela (Spain); Sapeta, S. [Theoretical Physics Department, CERN,Geneva (Switzerland); The H. Niewodniczański Institute of Nuclear Physics PAN,Radzikowskiego 152, 31-342 Kraków (Poland)

    2016-12-12

    We study the production of forward di-jets in proton-lead and proton-proton collisions at the Large Hadron Collider. Such configurations, with both jets produced in the forward direction, impose a dilute-dense asymmetry which allows to probe the gluon density of the lead or proton target at small longitudinal momentum fractions. Even though the jet momenta are always much bigger than the saturation scale of the target, Q{sub s}, the transverse momentum imbalance of the di-jet system may be either also much larger than Q{sub s}, or of the order Q{sub s}, implying that the small-x QCD dynamics involved is either linear or non-linear, respectively. The small-x improved TMD factorization framework deals with both situations in the same formalism. In the latter case, which corresponds to nearly back-to-back jets, we find that saturation effects induce a significant suppression of the forward di-jet azimuthal correlations in proton-lead versus proton-proton collisions.

  16. Africa Development - Vol 36, No 1 (2011)

    African Journals Online (AJOL)

    Can It be Achieved? Partnering Towards Improving Livelihoods in the Ganspan Settlement, Norther n Cape Province, South Africa · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. D Norris, EC Van Zyl, WT Hashe, MS Mafuma, MP Senyolo, SP Mngomezulu, ...

  17. (3+1)D hydrodynamic simulation of relativistic heavy-ion collisions

    International Nuclear Information System (INIS)

    Schenke, Bjoern; Jeon, Sangyong; Gale, Charles

    2010-01-01

    We present music, an implementation of the Kurganov-Tadmor algorithm for relativistic 3+1 dimensional fluid dynamics in heavy-ion collision scenarios. This Riemann-solver-free, second-order, high-resolution scheme is characterized by a very small numerical viscosity and its ability to treat shocks and discontinuities very well. We also incorporate a sophisticated algorithm for the determination of the freeze-out surface using a three dimensional triangulation of the hypersurface. Implementing a recent lattice based equation of state, we compute p T -spectra and pseudorapidity distributions for Au+Au collisions at √(s)=200 GeV and present results for the anisotropic flow coefficients v 2 and v 4 as a function of both p T and pseudorapidity η. We were able to determine v 4 with high numerical precision, finding that it does not strongly depend on the choice of initial condition or equation of state.

  18. Motor mapping of implied actions during perception of emotional body language.

    Science.gov (United States)

    Borgomaneri, Sara; Gazzola, Valeria; Avenanti, Alessio

    2012-04-01

    Perceiving and understanding emotional cues is critical for survival. Using the International Affective Picture System (IAPS) previous TMS studies have found that watching humans in emotional pictures increases motor excitability relative to seeing landscapes or household objects, suggesting that emotional cues may prime the body for action. Here we tested whether motor facilitation to emotional pictures may reflect the simulation of the human motor behavior implied in the pictures occurring independently of its emotional valence. Motor-evoked potentials (MEPs) to single-pulse TMS of the left motor cortex were recorded from hand muscles during observation and categorization of emotional and neutral pictures. In experiment 1 participants watched neutral, positive and negative IAPS stimuli, while in experiment 2, they watched pictures depicting human emotional (joyful, fearful), neutral body movements and neutral static postures. Experiment 1 confirms the increase in excitability for emotional IAPS stimuli found in previous research and shows, however, that more implied motion is perceived in emotional relative to neutral scenes. Experiment 2 shows that motor excitability and implied motion scores for emotional and neutral body actions were comparable and greater than for static body postures. In keeping with embodied simulation theories, motor response to emotional pictures may reflect the simulation of the action implied in the emotional scenes. Action simulation may occur independently of whether the observed implied action carries emotional or neutral meanings. Our study suggests the need of controlling implied motion when exploring motor response to emotional pictures of humans. Copyright © 2012 Elsevier Inc. All rights reserved.

  19. Mass and free energy of Lovelock black holes

    International Nuclear Information System (INIS)

    Kastor, David; Traschen, Jennie; Ray, Sourya

    2011-01-01

    An explicit formula for the ADM mass of an asymptotically AdS black hole in a generic Lovelock gravity theory is presented, identical in form to that in Einstein gravity, but multiplied by a function of the Lovelock coupling constants and the AdS curvature radius. A Gauss' law-type formula relates the mass, which is an integral at infinity, to an expression depending instead on the horizon radius. This and other thermodynamic quantities, such as the free energy, are then analyzed in the limits of small and large horizon radius, yielding results that are independent of the detailed choice of Lovelock couplings. In even dimensions, the temperature diverges in both limits, implying the existence of a minimum temperature for black holes. The negative free energy of sufficiently large black holes implies the existence of a Hawking-Page transition. In odd dimensions, the temperature still diverges for large black holes, which again have negative free energy. However, the temperature vanishes as the horizon radius tends to zero and sufficiently small black holes have positive specific heat.

  20. Airborne Collision Detection and Avoidance for Small UAS Sense and Avoid Systems

    Science.gov (United States)

    Sahawneh, Laith Rasmi

    collision risk using the uncorrelated encounter model (UEM) developed by MIT Lincoln Laboratory. We evaluate the proposed approach using Monte Carlo simulations and compare the performance with linearly extrapolated collision detection logic. For the path planning and collision avoidance part, we present multiple reactive path planning algorithms. We first propose a collision avoidance algorithm based on a simulated chain that responds to a virtual force field produced by encountering intruders. The key feature of the proposed approach is to model the future motion of both the intruder and the ownship using a chain of waypoints that are equally spaced in time. This timing information is used to continuously re-plan paths that minimize the probability of collision. Second, we present an innovative collision avoidance logic using an ownship centered coordinate system. The technique builds a graph in the local-level frame and uses the Dijkstra's algorithm to find the least cost path. An advantage of this approach is that collision avoidance is inherently a local phenomenon and can be more naturally represented in the local coordinates than the global coordinates. Finally, we propose a two step path planner for ground-based SAA systems. In the first step, an initial suboptimal path is generated using A* search. In the second step, using the A* solution as an initial condition, a chain of unit masses connected by springs and dampers evolves in a simulated force field. The chain is described by a set of ordinary differential equations that is driven by virtual forces to find the steady-state equilibrium. The simulation results show that the proposed approach produces collision-free plans while minimizing the path length. To move towards a deployable system, we apply collision detection and avoidance techniques to a variety of simulation and sensor modalities including camera, radar and ADS-B along with suitable tracking schemes. Keywords: unmanned aircraft system, small UAS

  1. Strangeness production in heavy ion collisions: What have we learned with the energy increase from SPS to RHIC

    International Nuclear Information System (INIS)

    Odyniec, Grazyna

    2002-01-01

    A review of strange particle production in heavy ion collisions at ultrarelativistic energies is presented. The particle yields and ratios from SPS and RHIC are discussed in view of the newest developments in understanding collision dynamics, and in view of their role in the search for a quark gluon plasma. A strangeness enhancement, most notably observed in CERN Pb-beam results, shows a remarkable two fold global enhancement with a much larger effect seen in the case of multistrange baryons. Hadronic models did fail to explain this pattern. At RHIC energy strangeness assumes a different role, since temperatures are higher and the central rapidity region almost baryon-free. An intriguing question: ''Did RHIC change the way we understand strangeness production in heavy ion collisions ?'' is discussed

  2. On impact mechanics in ship collisions

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup; Zhang, Shengming

    1998-01-01

    The purpose of this paper is to present analytical, closed-form expressions for the energy released for crushing and the impact impulse during ship collisions. Ship–ship collisions, ship collisions with rigid walls and ship collisions with flexible offshore structures are considered. The derived ...

  3. On Impact Mechanics in Ship Collisions

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup; Zhang, Shengming

    1998-01-01

    The purpose of this paper is to present analytical, closed-form expressions for the energy released for crushing and the impact impulse during ship collisions. Ship-ship collisions, ship collisions with rigid walls and ship collisions with flexible offshore structures are considered. The derived ...

  4. New results on Coulomb effects in meson production in relativistic heavy ion collisions

    Directory of Open Access Journals (Sweden)

    Rybicki Andrzej

    2014-01-01

    Full Text Available We propose a new method of investigating the space-time evolution of meson production in heavy ion collisions, by making use of spectator-induced electromagnetic (“Coulomb” effects. The presence of two nuclear remnants (“spectator systems” in the non-central collision generates a strong Coulomb field, which modifies the trajectories of charged final state hadrons. This results in charge-dependent azimuthal anisotropies in final state meson emission. In our approach, this effect can be computed numerically by means of a high-statistics Monte Carlo simulation, using the distance between the meson formation zone and the spectator system as free parameter. Our simulation correctly describes the electromagnetic effect on azimuthal anisotropies observed for π+ and π−mesons in Au+Au collisions at lower RHIC energy, known from data recently reported by the STAR Collaboration. Similarly to our earlier studies of spectator-induced electromagnetic effects, also in the present study we find that these effects offer sensitivity to the position of the meson formation zone with respect to the spectator system. Therefore, we conclude that they can serve as a new tool to investigate the space-time evolution of meson production, and the dynamics of the heavy ion collision.

  5. Gravitational waves from cosmic bubble collisions

    International Nuclear Information System (INIS)

    Kim, Dong-Hoon; Lee, Bum-Hoon; Lee, Wonwoo; Yang, Jongmann; Yeom, Dong-han

    2015-01-01

    Cosmic bubbles are nucleated through the quantum tunneling process. After nucleation they would expand and undergo collisions with each other. In this paper, we focus in particular on collisions of two equal-sized bubbles and compute gravitational waves emitted from the collisions. First, we study the mechanism of the collisions by means of a real scalar field and its quartic potential. Then, using this model, we compute gravitational waves from the collisions in a straightforward manner. In the quadrupole approximation, time-domain gravitational waveforms are directly obtained by integrating the energy-momentum tensors over the volume of the wave sources, where the energy-momentum tensors are expressed in terms of the scalar field, the local geometry and the potential. We present gravitational waveforms emitted during (i) the initial-to-intermediate stage of strong collisions and (ii) the final stage of weak collisions: the former is obtained numerically, in full General Relativity and the latter analytically, in the flat spacetime approximation. We gain qualitative insights into the time-domain gravitational waveforms from bubble collisions: during (i), the waveforms show the non-linearity of the collisions, characterized by a modulating frequency and cusp-like bumps, whereas during (ii), the waveforms exhibit the linearity of the collisions, featured by smooth monochromatic oscillations. (orig.)

  6. On the quantum Landau collision operator and electron collisions in dense plasmas

    Energy Technology Data Exchange (ETDEWEB)

    Daligault, Jérôme, E-mail: daligaul@lanl.gov [Theoretical Division, Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States)

    2016-03-15

    The quantum Landau collision operator, which extends the widely used Landau/Fokker-Planck collision operator to include quantum statistical effects, is discussed. The quantum extension can serve as a reference model for including electron collisions in non-equilibrium dense plasmas, in which the quantum nature of electrons cannot be neglected. In this paper, the properties of the Landau collision operator that have been useful in traditional plasma kinetic theory and plasma transport theory are extended to the quantum case. We outline basic properties in connection with the conservation laws, the H-theorem, and the global and local equilibrium distributions. We discuss the Fokker-Planck form of the operator in terms of three potentials that extend the usual two Rosenbluth potentials. We establish practical closed-form expressions for these potentials under local thermal equilibrium conditions in terms of Fermi-Dirac and Bose-Einstein integrals. We study the properties of linearized quantum Landau operator, and extend two popular approximations used in plasma physics to include collisions in kinetic simulations. We apply the quantum Landau operator to the classic test-particle problem to illustrate the physical effects embodied in the quantum extension. We present useful closed-form expressions for the electron-ion momentum and energy transfer rates. Throughout the paper, similarities and differences between the quantum and classical Landau collision operators are emphasized.

  7. On the quantum Landau collision operator and electron collisions in dense plasmas

    Science.gov (United States)

    Daligault, Jérôme

    2016-03-01

    The quantum Landau collision operator, which extends the widely used Landau/Fokker-Planck collision operator to include quantum statistical effects, is discussed. The quantum extension can serve as a reference model for including electron collisions in non-equilibrium dense plasmas, in which the quantum nature of electrons cannot be neglected. In this paper, the properties of the Landau collision operator that have been useful in traditional plasma kinetic theory and plasma transport theory are extended to the quantum case. We outline basic properties in connection with the conservation laws, the H-theorem, and the global and local equilibrium distributions. We discuss the Fokker-Planck form of the operator in terms of three potentials that extend the usual two Rosenbluth potentials. We establish practical closed-form expressions for these potentials under local thermal equilibrium conditions in terms of Fermi-Dirac and Bose-Einstein integrals. We study the properties of linearized quantum Landau operator, and extend two popular approximations used in plasma physics to include collisions in kinetic simulations. We apply the quantum Landau operator to the classic test-particle problem to illustrate the physical effects embodied in the quantum extension. We present useful closed-form expressions for the electron-ion momentum and energy transfer rates. Throughout the paper, similarities and differences between the quantum and classical Landau collision operators are emphasized.

  8. Aplikasi Algoritma Biseksi dan Newton-Raphson dalam Menaksir Nilai Volatilitas Implied

    Directory of Open Access Journals (Sweden)

    Komang Dharmawan

    2012-11-01

    Full Text Available Volatilitas adalah suatu besaran yang mengukuran seberapa jauh suatu harga sahambergerak dalam suatu periode tertentu dapat juga diartikan sebagai persentase simpanganbaku dari perubahan harga harian suatu saham. Menurut teori yang dikembangkan oleh Black-Scholes in 1973, semua harga opsi dengan ’underlying asset’ dan waktu jatuh tempo yang samatetapi memiliki nilai exercise yang berbeda akan memiliki nilai volatilitas implied yang sama.Model Black-Scholes dapat dipakai mengestimasi nilai volatilitas implied dari suatu sahamdengan mencari sulusi numerik dari persamaan invers dari model Black-Scholes. Makalah inimendemonstrasikan bagaimana menghitung nilai volatilitas implied suatu saham dengan mengasumsikanbahwa model Black-schole adalah benar dan suatu kontrak opsi dengan denganumur kontrak yang sama akan memiliki harga yang sama. Menggunakan data harga opsi SonyCorporation (SNE, Cisco Systems, Inc (CSCO, dan Canon, Inc (CNJ diperoleh bahwa, ImpliedVolatility memberikan harga yang lebih murah dibandingkan dengan harga opsi darivolatilitas yang dihitung dari data historis. Selain itu, dari hasil iterasi yang diperoleh, metodeNewton-Raphson lebih cepat konvergen dibandingkan dengan metode Bisection.

  9. Correlation Structures of Correlated Binomial Models and Implied Default Distribution

    OpenAIRE

    S. Mori; K. Kitsukawa; M. Hisakado

    2006-01-01

    We show how to analyze and interpret the correlation structures, the conditional expectation values and correlation coefficients of exchangeable Bernoulli random variables. We study implied default distributions for the iTraxx-CJ tranches and some popular probabilistic models, including the Gaussian copula model, Beta binomial distribution model and long-range Ising model. We interpret the differences in their profiles in terms of the correlation structures. The implied default distribution h...

  10. Long memory and the relation between implied and realized volatility

    OpenAIRE

    Federico Bandi; Benoit Perron

    2003-01-01

    We argue that the conventional predictive regression between implied volatility (regressor) and realized volatility over the remaining life of the option (regressand) is likely to be a fractional cointegrating relation. Since cointegration is associated with long-run comovements, this finding modifies the usual interpretation of such regression as a study towards assessing option market efficiency (given a certain option pricing model) and/or short-term unbiasedness of implied volatility as a...

  11. Electron-molecule collisions

    CERN Document Server

    Takayanagi, Kazuo

    1984-01-01

    Scattering phenomena play an important role in modern physics. Many significant discoveries have been made through collision experiments. Amongst diverse kinds of collision systems, this book sheds light on the collision of an electron with a molecule. The electron-molecule collision provides a basic scattering problem. It is scattering by a nonspherical, multicentered composite particle with its centers having degrees of freedom of motion. The molecule can even disintegrate, Le., dissociate or ionize into fragments, some or all of which may also be molecules. Although it is a difficult problem, the recent theoretical, experimental, and computational progress has been so significant as to warrant publication of a book that specializes in this field. The progress owes partly to technical develop­ ments in measurements and computations. No less important has been the great and continuing stimulus from such fields of application as astrophysics, the physics of the earth's upper atmosphere, laser physics, radiat...

  12. On exotic hybrid meson production in {gamma}{sup *}{gamma} collisions

    Energy Technology Data Exchange (ETDEWEB)

    Anikin, I.V.; Teryaev, O.V. [Bogoliubov Laboratory of Theoretical Physics, Dubna (Russian Federation); Pire, B. [Ecole Polytechnique, 91 - Palaiseau (France). CPHT; Szymanowski, L. [Soltan Inst. for Nuclear Studies, Warsaw (Poland); Universite de Liege (Belgium); Paris-11 Univ., 91 - Orsay (France). LPT; Wallon, S. [Paris-11 Univ., 91 - Orsay (France). LPT

    2006-07-15

    We present a theoretical study of exotic hybrid meson (J{sup PC}=1{sup -+}) production in photon-photon collisions where one of the photons is deeply virtual, including twist two and twist three contributions. We calculate the cross section of this process, which turns out to be large enough to imply sizeable counting rates in the present high luminosity electron-positron colliders. We emphasize the importance of the {pi}{eta} decay channel for the detection of the hybrid meson candidate {pi}{sub 1}(1400) and calculate the cross section and the angular distribution for {pi}{eta} pair production in the unpolarized case. This angular distribution is a useful tool for disentangling the hybrid meson signal from the background. Finally, we calculate the single spin asymmetry associated with one initial longitudinally polarized lepton. (orig.)

  13. Real-time Collision Avoidance and Path Optimizer for Semi-autonomous UAVs.

    Science.gov (United States)

    Hawary, A. F.; Razak, N. A.

    2018-05-01

    Whilst UAV offers a potentially cheaper and more localized observation platform than current satellite or land-based approaches, it requires an advance path planner to reveal its true potential, particularly in real-time missions. Manual control by human will have limited line-of-sights and prone to errors due to careless and fatigue. A good alternative solution is to equip the UAV with semi-autonomous capabilities that able to navigate via a pre-planned route in real-time fashion. In this paper, we propose an easy-and-practical path optimizer based on the classical Travelling Salesman Problem and adopts a brute force search method to re-optimize the route in the event of collisions using range finder sensor. The former utilizes a Simple Genetic Algorithm and the latter uses Nearest Neighbour algorithm. Both algorithms are combined to optimize the route and avoid collision at once. Although many researchers proposed various path planning algorithms, we find that it is difficult to integrate on a basic UAV model and often lacks of real-time collision detection optimizer. Therefore, we explore a practical benefit from this approach using on-board Arduino and Ardupilot controllers by manually emulating the motion of an actual UAV model prior to test on the flying site. The result showed that the range finder sensor provides a real-time data to the algorithm to find a collision-free path and eventually optimized the route successfully.

  14. Production of the $\\rho(770)^{0}$ meson in pp and Pb–Pb collisions at $\\sqrt{s_{NN}}$ = 2.76 TeV

    CERN Document Server

    Acharya, Shreyasi; The ALICE collaboration; Adamova, Dagmar; Adolfsson, Jonatan; Aggarwal, Madan Mohan; Aglieri Rinella, Gianluca; Agnello, Michelangelo; Agrawal, Neelima; Ahammed, Zubayer; Ahn, Sang Un; Aiola, Salvatore; Akindinov, Alexander; Al-turany, Mohammad; Alam, Sk Noor; Silva De Albuquerque, Danilo; Aleksandrov, Dmitry; Alessandro, Bruno; Alfaro Molina, Jose Ruben; Ali, Yasir; Alici, Andrea; Alkin, Anton; Alme, Johan; Alt, Torsten; Altenkamper, Lucas; Altsybeev, Igor; Andrei, Cristian; Andreou, Dimitra; Andrews, Harry Arthur; Andronic, Anton; Angeletti, Massimo; Anguelov, Venelin; Anson, Christopher Daniel; Anticic, Tome; Antinori, Federico; Antonioli, Pietro; Anwar, Rafay; Apadula, Nicole; Aphecetche, Laurent Bernard; Appelshaeuser, Harald; Arcelli, Silvia; Arnaldi, Roberta; Arnold, Oliver Werner; Arsene, Ionut Cristian; Arslandok, Mesut; Audurier, Benjamin; Augustinus, Andre; Averbeck, Ralf Peter; Azmi, Mohd Danish; Badala, Angela; Baek, Yong Wook; Bagnasco, Stefano; Bailhache, Raphaelle Marie; Bala, Renu; Baldisseri, Alberto; Ball, Markus; Baral, Rama Chandra; Barbano, Anastasia Maria; Barbera, Roberto; Barile, Francesco; Barioglio, Luca; Barnafoldi, Gergely Gabor; Barnby, Lee Stuart; Ramillien Barret, Valerie; Bartalini, Paolo; Barth, Klaus; Bartsch, Esther; Bastid, Nicole; Basu, Sumit; Batigne, Guillaume; Batyunya, Boris; Batzing, Paul Christoph; Bazo Alba, Jose Luis; Bearden, Ian Gardner; Beck, Hans; Bedda, Cristina; Behera, Nirbhay Kumar; Belikov, Iouri; Bellini, Francesca; Bello Martinez, Hector; Bellwied, Rene; Espinoza Beltran, Lucina Gabriela; Belyaev, Vladimir; Bencedi, Gyula; Beole, Stefania; Bercuci, Alexandru; Berdnikov, Yaroslav; Berenyi, Daniel; Bertens, Redmer Alexander; Berzano, Dario; Betev, Latchezar; Bhaduri, Partha Pratim; Bhasin, Anju; Bhat, Inayat Rasool; Bhatt, Himani; Bhattacharjee, Buddhadeb; Bhom, Jihyun; Bianchi, Antonio; Bianchi, Livio; Bianchi, Nicola; Bielcik, Jaroslav; Bielcikova, Jana; Bilandzic, Ante; Biro, Gabor; Biswas, Rathijit; Biswas, Saikat; Blair, Justin Thomas; Blau, Dmitry; Blume, Christoph; Boca, Gianluigi; Bock, Friederike; Bogdanov, Alexey; Boldizsar, Laszlo; Bombara, Marek; Bonomi, Germano; Bonora, Matthias; Borel, Herve; Borissov, Alexander; Borri, Marcello; Botta, Elena; Bourjau, Christian; Bratrud, Lars; Braun-munzinger, Peter; Bregant, Marco; Broker, Theo Alexander; Broz, Michal; Brucken, Erik Jens; Bruna, Elena; Bruno, Giuseppe Eugenio; Budnikov, Dmitry; Buesching, Henner; Bufalino, Stefania; Buhler, Paul; Buncic, Predrag; Busch, Oliver; Buthelezi, Edith Zinhle; Bashir Butt, Jamila; Buxton, Jesse Thomas; Cabala, Jan; Caffarri, Davide; Caines, Helen Louise; Caliva, Alberto; Calvo Villar, Ernesto; Soto Camacho, Rabi; Camerini, Paolo; Capon, Aaron Allan; Carena, Francesco; Carena, Wisla; Carnesecchi, Francesca; Castillo Castellanos, Javier Ernesto; Castro, Andrew John; Casula, Ester Anna Rita; Ceballos Sanchez, Cesar; Chandra, Sinjini; Chang, Beomsu; Chang, Wan; Chapeland, Sylvain; Chartier, Marielle; Chattopadhyay, Subhasis; Chattopadhyay, Sukalyan; Chauvin, Alex; Cheshkov, Cvetan Valeriev; Cheynis, Brigitte; Chibante Barroso, Vasco Miguel; Dobrigkeit Chinellato, David; Cho, Soyeon; Chochula, Peter; Chowdhury, Tasnuva; Christakoglou, Panagiotis; Christensen, Christian Holm; Christiansen, Peter; Chujo, Tatsuya; Chung, Suh-urk; Cicalo, Corrado; Cifarelli, Luisa; Cindolo, Federico; Cleymans, Jean Willy Andre; Colamaria, Fabio Filippo; Colella, Domenico; Collu, Alberto; Colocci, Manuel; Concas, Matteo; Conesa Balbastre, Gustavo; Conesa Del Valle, Zaida; Contreras Nuno, Jesus Guillermo; Cormier, Thomas Michael; Corrales Morales, Yasser; Cortese, Pietro; Cosentino, Mauro Rogerio; Costa, Filippo; Costanza, Susanna; Crkovska, Jana; Crochet, Philippe; Cuautle Flores, Eleazar; Cunqueiro Mendez, Leticia; Dahms, Torsten; Dainese, Andrea; Danisch, Meike Charlotte; Danu, Andrea; Das, Debasish; Das, Indranil; Das, Supriya; Dash, Ajay Kumar; Dash, Sadhana; De, Sudipan; De Caro, Annalisa; De Cataldo, Giacinto; De Conti, Camila; De Cuveland, Jan; De Falco, Alessandro; De Gruttola, Daniele; De Marco, Nora; De Pasquale, Salvatore; Derradi De Souza, Rafael; Franz Degenhardt, Hermann; Deisting, Alexander; Deloff, Andrzej; Delsanto, Silvia; Deplano, Caterina; Dhankher, Preeti; Di Bari, Domenico; Di Mauro, Antonio; Di Ruzza, Benedetto; Arteche Diaz, Raul; Dietel, Thomas; Dillenseger, Pascal; Ding, Yanchun; Divia, Roberto; Djuvsland, Oeystein; Dobrin, Alexandru Florin; Domenicis Gimenez, Diogenes; Donigus, Benjamin; Dordic, Olja; Van Doremalen, Lennart Vincent; Dubey, Anand Kumar; Dubla, Andrea; Ducroux, Laurent; Dudi, Sandeep; Duggal, Ashpreet Kaur; Dukhishyam, Mallick; Dupieux, Pascal; Ehlers Iii, Raymond James; Elia, Domenico; Endress, Eric; Engel, Heiko; Epple, Eliane; Erazmus, Barbara Ewa; Erhardt, Filip; Ersdal, Magnus Rentsch; Espagnon, Bruno; Eulisse, Giulio; Eum, Jongsik; Evans, David; Evdokimov, Sergey; Fabbietti, Laura; Faggin, Mattia; Faivre, Julien; Fantoni, Alessandra; Fasel, Markus; Feldkamp, Linus; Feliciello, Alessandro; Feofilov, Grigorii; Fernandez Tellez, Arturo; Ferretti, Alessandro; Festanti, Andrea; Feuillard, Victor Jose Gaston; Figiel, Jan; Araujo Silva Figueredo, Marcel; Filchagin, Sergey; Finogeev, Dmitry; Fionda, Fiorella; Fiorenza, Gabriele; Floris, Michele; Foertsch, Siegfried Valentin; Foka, Panagiota; Fokin, Sergey; Fragiacomo, Enrico; Francescon, Andrea; Francisco, Audrey; Frankenfeld, Ulrich Michael; Fronze, Gabriele Gaetano; Fuchs, Ulrich; Furget, Christophe; Furs, Artur; Fusco Girard, Mario; Gaardhoeje, Jens Joergen; Gagliardi, Martino; Gago Medina, Alberto Martin; Gajdosova, Katarina; Gallio, Mauro; Duarte Galvan, Carlos; Ganoti, Paraskevi; Garabatos Cuadrado, Jose; Garcia-solis, Edmundo Javier; Garg, Kunal; Gargiulo, Corrado; Gasik, Piotr Jan; Gauger, Erin Frances; De Leone Gay, Maria Beatriz; Germain, Marie; Ghosh, Jhuma; Ghosh, Premomoy; Ghosh, Sanjay Kumar; Gianotti, Paola; Giubellino, Paolo; Giubilato, Piero; Glassel, Peter; Gomez Coral, Diego Mauricio; Gomez Ramirez, Andres; Gonzalez, Victor; Gonzalez Zamora, Pedro; Gorbunov, Sergey; Gorlich, Lidia Maria; Gotovac, Sven; Grabski, Varlen; Graczykowski, Lukasz Kamil; Graham, Katie Leanne; Greiner, Leo Clifford; Grelli, Alessandro; Grigoras, Costin; Grigoryev, Vladislav; Grigoryan, Ara; Grigoryan, Smbat; Gronefeld, Julius Maximilian; Grosa, Fabrizio; Grosse-oetringhaus, Jan Fiete; Grosso, Raffaele; Guernane, Rachid; Guerzoni, Barbara; Guittiere, Manuel; Gulbrandsen, Kristjan Herlache; Gunji, Taku; Gupta, Anik; Gupta, Ramni; Bautista Guzman, Irais; Haake, Rudiger; Habib, Michael Karim; Hadjidakis, Cynthia Marie; Hamagaki, Hideki; Hamar, Gergoe; Hamon, Julien Charles; Hannigan, Ryan; Haque, Md Rihan; Harris, John William; Harton, Austin Vincent; Hassan, Hadi; Hatzifotiadou, Despina; Hayashi, Shinichi; Heckel, Stefan Thomas; Hellbar, Ernst; Helstrup, Haavard; Herghelegiu, Andrei Ionut; Gonzalez Hernandez, Emma; Herrera Corral, Gerardo Antonio; Herrmann, Florian; Hetland, Kristin Fanebust; Hilden, Timo Eero; Hillemanns, Hartmut; Hills, Christopher; Hippolyte, Boris; Hohlweger, Bernhard; Horak, David; Hornung, Sebastian; Hosokawa, Ritsuya; Hristov, Peter Zahariev; Hughes, Charles; Huhn, Patrick; Humanic, Thomas; Hushnud, Hushnud; Hussain, Nur; Hussain, Tahir; Hutter, Dirk; Hwang, Dae Sung; Iddon, James Philip; Iga Buitron, Sergio Arturo; Ilkaev, Radiy; Inaba, Motoi; Ippolitov, Mikhail; Islam, Md Samsul; Ivanov, Marian; Ivanov, Vladimir; Izucheev, Vladimir; Jacak, Barbara; Jacazio, Nicolo; Jacobs, Peter Martin; Jadhav, Manoj Bhanudas; Jadlovska, Slavka; Jadlovsky, Jan; Jaelani, Syaefudin; Jahnke, Cristiane; Jakubowska, Monika Joanna; Janik, Malgorzata Anna; Jena, Chitrasen; Jercic, Marko; Jimenez Bustamante, Raul Tonatiuh; Jin, Muqing; Jones, Peter Graham; Jusko, Anton; Kalinak, Peter; Kalweit, Alexander Philipp; Kang, Ju Hwan; Kaplin, Vladimir; Kar, Somnath; Karasu Uysal, Ayben; Karavichev, Oleg; Karavicheva, Tatiana; Karczmarczyk, Przemyslaw; Karpechev, Evgeny; Kebschull, Udo Wolfgang; Keidel, Ralf; Keijdener, Darius Laurens; Keil, Markus; Ketzer, Bernhard Franz; Khabanova, Zhanna; Khan, Shaista; Khan, Shuaib Ahmad; Khanzadeev, Alexei; Kharlov, Yury; Khatun, Anisa; Khuntia, Arvind; Kielbowicz, Miroslaw Marek; Kileng, Bjarte; Kim, Byungchul; Kim, Daehyeok; Kim, Dong Jo; Kim, Eun Joo; Kim, Hyeonjoong; Kim, Jinsook; Kim, Jiyoung; Kim, Minjung; Kim, Se Yong; Kim, Taejun; Kim, Taesoo; Kirsch, Stefan; Kisel, Ivan; Kiselev, Sergey; Kisiel, Adam Ryszard; Klay, Jennifer Lynn; Klein, Carsten; Klein, Jochen; Klein-boesing, Christian; Klewin, Sebastian; Kluge, Alexander; Knichel, Michael Linus; Knospe, Anders Garritt; Kobdaj, Chinorat; Varga-kofarago, Monika; Kohler, Markus Konrad; Kollegger, Thorsten; Kondratyeva, Natalia; Kondratyuk, Evgeny; Konevskikh, Artem; Konyushikhin, Maxim; Kovalenko, Oleksandr; Kovalenko, Vladimir; Kowalski, Marek; Kralik, Ivan; Kravcakova, Adela; Kreis, Lukas; Krivda, Marian; Krizek, Filip; Kruger, Mario; Kryshen, Evgeny; Krzewicki, Mikolaj; Kubera, Andrew Michael; Kucera, Vit; Kuhn, Christian Claude; Kuijer, Paulus Gerardus; Kumar, Jitendra; Kumar, Lokesh; Kumar, Shyam; Kundu, Sourav; Kurashvili, Podist; Kurepin, Alexander; Kurepin, Alexey; Kuryakin, Alexey; Kushpil, Svetlana; Kweon, Min Jung; Kwon, Youngil; La Pointe, Sarah Louise; La Rocca, Paola; Lai, Yue Shi; Lakomov, Igor; Langoy, Rune; Lapidus, Kirill; Lara Martinez, Camilo Ernesto; Lardeux, Antoine Xavier; Larionov, Pavel; Lattuca, Alessandra; Laudi, Elisa; Lavicka, Roman; Lea, Ramona; Leardini, Lucia; Lee, Seongjoo; Lehas, Fatiha; Lehner, Sebastian; Lehrbach, Johannes; Lemmon, Roy Crawford; Leogrande, Emilia; Leon Monzon, Ildefonso; Levai, Peter; Li, Xiaomei; Li, Xing Long; Lien, Jorgen Andre; Lietava, Roman; Lim, Bong-hwi; Lindal, Svein; Lindenstruth, Volker; Lindsay, Scott William; Lippmann, Christian; Lisa, Michael Annan; Litichevskyi, Vladyslav; Liu, Alwina; Ljunggren, Hans Martin; Llope, William; Lodato, Davide Francesco; Loginov, Vitaly; Loizides, Constantinos; Loncar, Petra; Lopez, Xavier Bernard; Lopez Torres, Ernesto; Lowe, Andrew John; Luettig, Philipp Johannes; Luhder, Jens Robert; Lunardon, Marcello; Luparello, Grazia; Lupi, Matteo; Maevskaya, Alla; Mager, Magnus; Mahmood, Sohail Musa; Maire, Antonin; Majka, Richard Daniel; Malaev, Mikhail; Malinina, Liudmila; Mal'kevich, Dmitry; Malzacher, Peter; Mamonov, Alexander; Manko, Vladislav; Manso, Franck; Manzari, Vito; Mao, Yaxian; Marchisone, Massimiliano; Mares, Jiri; Margagliotti, Giacomo Vito; Margotti, Anselmo; Margutti, Jacopo; Marin, Ana Maria; Markert, Christina; Marquard, Marco; Martin, Nicole Alice; Martinengo, Paolo; Martinez Hernandez, Mario Ivan; Martinez-garcia, Gines; Martinez Pedreira, Miguel; Masciocchi, Silvia; Masera, Massimo; Masoni, Alberto; Massacrier, Laure Marie; Masson, Erwann; Mastroserio, Annalisa; Mathis, Andreas Michael; Toledo Matuoka, Paula Fernanda; Matyja, Adam Tomasz; Mayer, Christoph; Mazzilli, Marianna; Mazzoni, Alessandra Maria; Meddi, Franco; Melikyan, Yuri; Menchaca-rocha, Arturo Alejandro; Meninno, Elisa; Mercado-perez, Jorge; Meres, Michal; Soncco Meza, Carlos; Mhlanga, Sibaliso; Miake, Yasuo; Micheletti, Luca; Mieskolainen, Matti Mikael; Mihaylov, Dimitar Lubomirov; Mikhaylov, Konstantin; Mischke, Andre; Mishra, Aditya Nath; Miskowiec, Dariusz Czeslaw; Mitra, Jubin; Mitu, Ciprian Mihai; Mohammadi, Naghmeh; Mohanty, Auro Prasad; Mohanty, Bedangadas; Khan, Mohammed Mohisin; Moreira De Godoy, Denise Aparecida; Perez Moreno, Luis Alberto; Moretto, Sandra; Morreale, Astrid; Morsch, Andreas; Muccifora, Valeria; Mudnic, Eugen; Muhlheim, Daniel Michael; Muhuri, Sanjib; Mukherjee, Maitreyee; Mulligan, James Declan; Gameiro Munhoz, Marcelo; Munning, Konstantin; Arratia Munoz, Miguel Ignacio; Munzer, Robert Helmut; Murakami, Hikari; Murray, Sean; Musa, Luciano; Musinsky, Jan; Myers, Corey James; Myrcha, Julian Wojciech; Naik, Bharati; Nair, Rahul; Nandi, Basanta Kumar; Nania, Rosario; Nappi, Eugenio; Narayan, Amrendra; Naru, Muhammad Umair; Nassirpour, Adrian Fereydon; Ferreira Natal Da Luz, Pedro Hugo; Nattrass, Christine; Rosado Navarro, Sebastian; Nayak, Kishora; Nayak, Ranjit; Nayak, Tapan Kumar; Nazarenko, Sergey; Negrao De Oliveira, Renato Aparecido; Nellen, Lukas; Nesbo, Simon Voigt; Neskovic, Gvozden; Ng, Fabian; Nicassio, Maria; Niedziela, Jeremi; Nielsen, Borge Svane; Nikolaev, Sergey; Nikulin, Sergey; Nikulin, Vladimir; Noferini, Francesco; Nomokonov, Petr; Nooren, Gerardus; Cabanillas Noris, Juan Carlos; Norman, Jaime; Nyanin, Alexander; Nystrand, Joakim Ingemar; Oh, Hoonjung; Ohlson, Alice Elisabeth; Oleniacz, Janusz; Oliveira Da Silva, Antonio Carlos; Oliver, Michael Henry; Onderwaater, Jacobus; Oppedisano, Chiara; Orava, Risto; Oravec, Matej; Ortiz Velasquez, Antonio; Oskarsson, Anders Nils Erik; Otwinowski, Jacek Tomasz; Oyama, Ken; Pachmayer, Yvonne Chiara; Pacik, Vojtech; Pagano, Davide; Paic, Guy; Palni, Prabhakar; Pan, Jinjin; Pandey, Ashutosh Kumar; Panebianco, Stefano; Papikyan, Vardanush; Pareek, Pooja; Park, Jonghan; Parkkila, Jasper Elias; Parmar, Sonia; Passfeld, Annika; Pathak, Surya Prakash; Patra, Rajendra Nath; Paul, Biswarup; Pei, Hua; Peitzmann, Thomas; Peng, Xinye; Pereira, Luis Gustavo; Pereira Da Costa, Hugo Denis Antonio; Peresunko, Dmitry Yurevich; Perez Lezama, Edgar; Peskov, Vladimir; Pestov, Yury; Petracek, Vojtech; Petrovici, Mihai; Petta, Catia; Peretti Pezzi, Rafael; Piano, Stefano; Pikna, Miroslav; Pillot, Philippe; Ozelin De Lima Pimentel, Lais; Pinazza, Ombretta; Pinsky, Lawrence; Pisano, Silvia; Piyarathna, Danthasinghe; Ploskon, Mateusz Andrzej; Planinic, Mirko; Pliquett, Fabian; Pluta, Jan Marian; Pochybova, Sona; Podesta Lerma, Pedro Luis Manuel; Poghosyan, Martin; Polishchuk, Boris; Poljak, Nikola; Poonsawat, Wanchaloem; Pop, Amalia; Poppenborg, Hendrik; Porteboeuf, Sarah Julie; Pozdniakov, Valeriy; Prasad, Sidharth Kumar; Preghenella, Roberto; Prino, Francesco; Pruneau, Claude Andre; Pshenichnov, Igor; Puccio, Maximiliano; Punin, Valery; Putschke, Jorn Henning; Raha, Sibaji; Rajput, Sonia; Rak, Jan; Rakotozafindrabe, Andry Malala; Ramello, Luciano; Rami, Fouad; Raniwala, Rashmi; Raniwala, Sudhir; Rasanen, Sami Sakari; Rascanu, Bogdan Theodor; Ratza, Viktor; Ravasenga, Ivan; Read, Kenneth Francis; Redlich, Krzysztof; Rehman, Attiq Ur; Reichelt, Patrick Simon; Reidt, Felix; Ren, Xiaowen; Renfordt, Rainer Arno Ernst; Reshetin, Andrey; Revol, Jean-pierre; Reygers, Klaus Johannes; Riabov, Viktor; Richert, Tuva Ora Herenui; Richter, Matthias Rudolph; Riedler, Petra; Riegler, Werner; Riggi, Francesco; Ristea, Catalin-lucian; Rode, Sudhir Pandurang; Rodriguez Cahuantzi, Mario; Roeed, Ketil; Rogalev, Roman; Rogochaya, Elena; Rohr, David Michael; Roehrich, Dieter; Rokita, Przemyslaw Stefan; Ronchetti, Federico; Dominguez Rosas, Edgar; Roslon, Krystian; Rosnet, Philippe; Rossi, Andrea; Rotondi, Alberto; Roukoutakis, Filimon; Roy, Christelle Sophie; Roy, Pradip Kumar; Vazquez Rueda, Omar; Rui, Rinaldo; Rumyantsev, Boris; Rustamov, Anar; Ryabinkin, Evgeny; Ryabov, Yury; Rybicki, Andrzej; Saarinen, Sampo; Sadhu, Samrangy; Sadovskiy, Sergey; Safarik, Karel; Saha, Sumit Kumar; Sahoo, Baidyanath; Sahoo, Pragati; Sahoo, Raghunath; Sahoo, Sarita; Sahu, Pradip Kumar; Saini, Jogender; Sakai, Shingo; Saleh, Mohammad Ahmad; Sambyal, Sanjeev Singh; Samsonov, Vladimir; Sandoval, Andres; Sarkar, Amal; Sarkar, Debojit; Sarkar, Nachiketa; Sarma, Pranjal; Sas, Mike Henry Petrus; Scapparone, Eugenio; Scarlassara, Fernando; Schaefer, Brennan; Scheid, Horst Sebastian; Schiaua, Claudiu Cornel; Schicker, Rainer Martin; Schmidt, Christian Joachim; Schmidt, Hans Rudolf; Schmidt, Marten Ole; Schmidt, Martin; Schmidt, Nicolas Vincent; Schukraft, Jurgen; Schutz, Yves Roland; Schwarz, Kilian Eberhard; Schweda, Kai Oliver; Scioli, Gilda; Scomparin, Enrico; Sefcik, Michal; Seger, Janet Elizabeth; Sekiguchi, Yuko; Sekihata, Daiki; Selyuzhenkov, Ilya; Senosi, Kgotlaesele; Senyukov, Serhiy; Serradilla Rodriguez, Eulogio; Sett, Priyanka; Sevcenco, Adrian; Shabanov, Arseniy; Shabetai, Alexandre; Shahoyan, Ruben; Shaikh, Wadut; Shangaraev, Artem; Sharma, Anjali; Sharma, Ankita; Sharma, Meenakshi; Sharma, Natasha; Sheikh, Ashik Ikbal; Shigaki, Kenta; Shimomura, Maya; Shirinkin, Sergey; Shou, Qiye; Shtejer Diaz, Katherin; Sibiryak, Yury; Siddhanta, Sabyasachi; Sielewicz, Krzysztof Marek; Siemiarczuk, Teodor; Silvermyr, David Olle Rickard; Simatovic, Goran; Simonetti, Giuseppe; Singaraju, Rama Narayana; Singh, Ranbir; Singh, Randhir; Singhal, Vikas; Sarkar - Sinha, Tinku; Sitar, Branislav; Sitta, Mario; Skaali, Bernhard; Slupecki, Maciej; Smirnov, Nikolai; Snellings, Raimond; Snellman, Tomas Wilhelm; Song, Jihye; Soramel, Francesca; Sorensen, Soren Pontoppidan; Sozzi, Federica; Sputowska, Iwona Anna; Stachel, Johanna; Stan, Ionel; Stankus, Paul; Stenlund, Evert Anders; Stocco, Diego; Storetvedt, Maksim Melnik; Strmen, Peter; Alarcon Do Passo Suaide, Alexandre; Sugitate, Toru; Suire, Christophe Pierre; Suleymanov, Mais Kazim Oglu; Suljic, Miljenko; Sultanov, Rishat; Sumbera, Michal; Sumowidagdo, Suharyo; Suzuki, Ken; Swain, Sagarika; Szabo, Alexander; Szarka, Imrich; Tabassam, Uzma; Takahashi, Jun; Tambave, Ganesh Jagannath; Tanaka, Naoto; Tarhini, Mohamad; Tariq, Mohammad; Tarzila, Madalina-gabriela; Tauro, Arturo; Tejeda Munoz, Guillermo; Telesca, Adriana; Terrevoli, Cristina; Teyssier, Boris; Thakur, Dhananjaya; Thakur, Sanchari; Thomas, Deepa; Thoresen, Freja; Tieulent, Raphael Noel; Tikhonov, Anatoly; Timmins, Anthony Robert; Toia, Alberica; Topilskaya, Nataliya; Toppi, Marco; Rojas Torres, Solangel; Tripathy, Sushanta; Trogolo, Stefano; Trombetta, Giuseppe; Tropp, Lukas; Trubnikov, Victor; Trzaska, Wladyslaw Henryk; Trzcinski, Tomasz Piotr; Trzeciak, Barbara Antonina; Tsuji, Tomoya; Tumkin, Alexandr; Turrisi, Rosario; Tveter, Trine Spedstad; Ullaland, Kjetil; Umaka, Ejiro Naomi; Uras, Antonio; Usai, Gianluca; Utrobicic, Antonija; Vala, Martin; Van Hoorne, Jacobus Willem; Van Leeuwen, Marco; Vande Vyvre, Pierre; Varga, Dezso; Diozcora Vargas Trevino, Aurora; Vargyas, Marton; Varma, Raghava; Vasileiou, Maria; Vasiliev, Andrey; Vauthier, Astrid; Vazquez Doce, Oton; Vechernin, Vladimir; Veen, Annelies Marianne; Velure, Arild; Vercellin, Ermanno; Vergara Limon, Sergio; Vermunt, Luuk; Vernet, Renaud; Vertesi, Robert; Vickovic, Linda; Viinikainen, Jussi Samuli; Vilakazi, Zabulon; Villalobos Baillie, Orlando; Villatoro Tello, Abraham; Vinogradov, Alexander; Virgili, Tiziano; Vislavicius, Vytautas; Vodopyanov, Alexander; Volkl, Martin Andreas; Voloshin, Kirill; Voloshin, Sergey; Volpe, Giacomo; Von Haller, Barthelemy; Vorobyev, Ivan; Voscek, Dominik; Vranic, Danilo; Vrlakova, Janka; Wagner, Boris; Wang, Hongkai; Wang, Mengliang; Watanabe, Yosuke; Weber, Michael; Weber, Steffen Georg; Wegrzynek, Adam; Weiser, Dennis Franz; Wenzel, Sandro Christian; Wessels, Johannes Peter; Westerhoff, Uwe; Whitehead, Andile Mothegi; Wiechula, Jens; Wikne, Jon; Wilk, Grzegorz Andrzej; Wilkinson, Jeremy John; Willems, Guido Alexander; Williams, Crispin; Willsher, Emily; Windelband, Bernd Stefan; Witt, William Edward; Xu, Ran; Yalcin, Serpil; Yamakawa, Kosei; Yano, Satoshi; Yin, Zhongbao; Yokoyama, Hiroki; Yoo, In-kwon; Yoon, Jin Hee; Yurchenko, Volodymyr; Zaccolo, Valentina; Zaman, Ali; Zampolli, Chiara; Correa Zanoli, Henrique Jose; Zardoshti, Nima; Zarochentsev, Andrey; Zavada, Petr; Zavyalov, Nikolay; Zbroszczyk, Hanna Paulina; Zhalov, Mikhail; Zhang, Xiaoming; Zhang, Yonghong; Zhang, Zuman; Zhao, Chengxin; Zherebchevskii, Vladimir; Zhigareva, Natalia; Zhou, Daicui; Zhou, You; Zhou, Zhuo; Zhu, Hongsheng; Zhu, Jianhui; Zhu, Ya; Zichichi, Antonino; Zimmermann, Markus Bernhard; Zinovjev, Gennady; Zmeskal, Johann; Zou, Shuguang

    2018-01-01

    The production of the $\\rho(770)^{0}$ meson has been measured at mid-rapidity (|y| < 0.5) in pp and centrality differential Pb-Pb collisions at $\\sqrt{s_{NN}}$ = 2.76 TeV with the ALICE detector at the Large Hadron Collider. The particles have been reconstructed in the $\\rho(770)^{0}\\rightarrow \\pi^{+}\\pi^{-}$ decay channel in the transverse momentum ($p_{T}$) range 0.5 − 11 GeV/$c$. A centrality dependent suppression of the ratio of the integrated yields $2\\rho(770)^{0}/(\\pi^{+}+\\pi^{-})$ is observed. The ratio decreases by ~40% from pp to central Pb-Pb collisions. A study of the $p_{T}$-differential $2\\rho(770)^{0}/(\\pi^{+}+\\pi^{-})$ ratio reveals that the suppression occurs at low transverse momenta, $p_{T}$ < 2 GeV/$c$. At higher momentum, particle ratios measured in heavy-ion and pp collisions are consistent. The observed suppression is very similar to that previously measured for the $K^{*}(892)^{0}/K$ ratio and is consistent with EPOS3 predictions that may imply that rescattering in the hadroni...

  15. Two-Particle Correlations with Neutral Pion and Direct Photon Triggers in pp and Pb+Pb Collisions with ALICE at the LHC

    CERN Document Server

    Zhu, Xiangrong; Constantinos, Loizides; Zhongbao, Yin; Loizides, Constantinos; Zhongbao, Yin

    Two-particle correlations is considered as a powerful probe for understanding the properties of the strongly interacting hot and dense medium. In such an analysis, a particle is chosen from higher $p_{\\rm T}$ region and called the trigger particle, which is presumably from jet fragmentations. The so called associated particles from lower $p_{\\rm T}$ region are always from the other fragmentation of the jet, or another production, such as collective flow. At RHIC and LHC, the measurements of the azimuthal angle distribution from two-particle correlations in A+A collisions show a strong suppression even disappeared at the high $p_{\\rm T}$ and enhancement with double-peak at the low $p_{\\rm T}$ on the away side, and ``ridge'' structure in pseudo-rapidity direction at the low $p_{\\rm T}$ on the near side compared to pp collisions. All the measurements can be explained as the effects of the hot and dense medium, and imply the Quark-Gluon Plasma is indeed formed in the heavy-ion collisions. When the direct ph...

  16. Strangeness in nuclear collisions

    International Nuclear Information System (INIS)

    Gazdzicki, M.; Roehrich, D.

    1996-01-01

    Data on the mean multiplicity of strange hadrons produced in minimum bias proton-proton and central nucleus-nucleus collisions at momenta between 2.8 and 400 GeV/c per nucleon have been compiled. The multiplicities for nucleon-nucleon interactions were constructed. The ratios of strange particle multiplicity to participant nucleon as well as to pion multiplicity are larger for central nucleus-nucleus collisions than for nucleon-nucleon interactions at all studied energies. The data at AGS energies suggest that the latter ratio saturates with increasing masses of the colliding nuclei. The strangeness to pion multiplicity ratio observed in nucleon-nucleon interactions increases with collision energy in the whole energy range studied. A qualitatively different behaviour is observed for central nucleus-nucleus collisions: the ratio rapidly increases when going from Dubna to AGS energies and changes little between AGS and SPS energies. This change in the behaviour can be related to the increase in the entropy production observed in central nucleus-nucleus collisions at the same energy range. The results are interpreted within a statistical approach. They are consistent with the hypothesis that the quark gluon plasma is created at SPS energies, the critical collision energy being between AGS and SPS energies. (orig.)

  17. Collision-produced atomic states

    International Nuclear Information System (INIS)

    Andersen, N.; Copenhagen Univ.

    1988-01-01

    The last 10-15 years have witnessed the development of a new, powerful class of experimental techniques for atomic collision studies, allowing partial or complete determination of the state of the atoms after a collision event, i.e. the full set of quantum-mechanical scattering amplitudes or - more generally - the density matrix describing the system. Evidently, such studies, involving determination of alignment and orientation parameters, provide much more severe tests of state-of-the-art scattering theories than do total or differential cross section measurements which depend on diagonal elements of the density matrix. The off-diagonal elements give us detailed information about the shape and dynamics of the atomic states. Therefore, close studies of collision-produced atomic states are currently leading to deeper insights into the fundamental physical mechanisms governing the dynamics of atomic collision events. The first part of the lectures deals with the language used to describe atomic states, while the second part presents a selection of recent results for model systems which display fundamental aspects of the collision physics in particularly instructive ways. I shall here restrict myself to atom-atom collisions. The discussion will be focused on states decaying by photon emission though most of the ideas can be easily modified to include electron emission as well. (orig./AH)

  18. Accurate Treatment of Collisions and Water-Delivery in Models of Terrestrial Planet Formation

    Science.gov (United States)

    Haghighipour, Nader; Maindl, Thomas; Schaefer, Christoph

    2017-10-01

    It is widely accepted that collisions among solid bodies, ignited by their interactions with planetary embryos is the key process in the formation of terrestrial planets and transport of volatiles and chemical compounds to their accretion zones. Unfortunately, due to computational complexities, these collisions are often treated in a rudimentary way. Impacts are considered to be perfectly inelastic and volatiles are considered to be fully transferred from one object to the other. This perfect-merging assumption has profound effects on the mass and composition of final planetary bodies as it grossly overestimates the masses of these objects and the amounts of volatiles and chemical elements transferred to them. It also entirely neglects collisional-loss of volatiles (e.g., water) and draws an unrealistic connection between these properties and the chemical structure of the protoplanetary disk (i.e., the location of their original carriers). We have developed a new and comprehensive methodology to simulate growth of embryos to planetary bodies where we use a combination of SPH and N-body codes to accurately model collisions as well as the transport/transfer of chemical compounds. Our methodology accounts for the loss of volatiles (e.g., ice sublimation) during the orbital evolution of their careers and accurately tracks their transfer from one body to another. Results of our simulations show that traditional N-body modeling of terrestrial planet formation overestimates the amount of the mass and water contents of the final planets by over 60% implying that not only the amount of water they suggest is far from being realistic, small planets such as Mars can also form in these simulations when collisions are treated properly. We will present details of our methodology and discuss its implications for terrestrial planet formation and water delivery to Earth.

  19. Section of Atomic Collisions

    International Nuclear Information System (INIS)

    Berenyi, D.; Biri, S.; Gulyas, L.; Juhasz, Z.; Kover, A.; Orban, A.; Palinkas, J.; Papp, T.; Racz, R.; Ricz, S.

    2009-01-01

    The Section of Atomic Collisions is a research unit with extended activity in the field of atomic and molecular physics. Starting from the study of atomic processes at the beamlines of nuclear physics accelerators in the seventies, our research community became one of the centers of fundamental research in Atomki. We also have a strong connection to materials sciences especially along the line of electron and ion spectroscopy methods. Our present activity covers a wide range of topics from atomic collision mechanisms of fundamental interest, to the complex interactions of electrons, ions, photons and antiparticles with atoms, molecules, surfaces, and specific nanostructures. In the last few years, an increasing fraction of our present topics has become relevant for applications, e.g., molecular collision studies for the radiation therapy methods of tumors, or ion-nanostructure interactions for the future construction of small ion-focusing elements. Our section belongs to the Division of Atomic Physics. The other unit of the Division is the Section of Electron Spectroscopy and Materials Sciences. There are traditionally good connections and a strong collaboration between the groups of the two sections in many fields. From the very beginning of our research work in atomic collisions, external collaborations were of vital importance for us. We regularly organize international workshops in the field of fast ion-atom collisions and related small conferences in Debrecen from 1981. Recently, we organized the Conference on Radiation Damage in Biomolecular Systems (RADAM 2008, Debrecen), and coorganized the Conference on Elementary Processes in Atomic Systems (CEPAS 2008, Cluj). We have access to several large scale facilities in Europe within the framework of formal and informal collaborations. The next themes are in this article: Forward electron emission from energetic atomic collisions; Positron-atom collisions; Photon-atom interactions; Interference effects in electron

  20. EVIDENCE FOR CLOUD-CLOUD COLLISION AND PARSEC-SCALE STELLAR FEEDBACK WITHIN THE L1641-N REGION

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, Fumitaka [National Astronomical Observatory, Mitaka, Tokyo 181-8588 (Japan); Miura, Tomoya; Nishi, Ryoichi [Department of Physics, Niigata University, 8050 Ikarashi-2, Niigata 950-2181 (Japan); Kitamura, Yoshimi; Akashi, Toshiya; Ikeda, Norio [Institute of Space and Astronautical Science, Japan Aerospace Exploration Agency, 3-1-1 Yoshinodai, Sagamihara, Kanagawa 229-8510 (Japan); Shimajiri, Yoshito; Kawabe, Ryohei [Nobeyama Radio Observatory, Nobeyama, Minamimaki, Minamisaku, Nagano 384-1305 (Japan); Tsukagoshi, Takashi [Department of Astronomy, School of Science, University of Tokyo, Bunkyo, Tokyo 113-0033 (Japan); Momose, Munetake [Institute of Astrophysics and Planetary Sciences, Ibaraki University, Bunkyo 2-1-1, Mito 310-8512 (Japan); Li Zhiyun, E-mail: fumitaka.nakamura@nao.ac.jp [Department of Astronomy, University of Virginia, P.O. Box 400325, Charlottesville, VA 22904 (United States)

    2012-02-10

    We present high spatial resolution {sup 12}CO (J = 1-0) images taken by the Nobeyama 45 m telescope toward a 48' Multiplication-Sign 48' area, including the L1641-N cluster. The effective spatial resolution of the maps is 21'', corresponding to 0.04 pc at a distance of 400 pc. A recent 1.1 mm dust continuum map reveals that the dense gas is concentrated in several thin filaments. We find that a few dust filaments are located at the parts where {sup 12}CO (J = 1-0) emission drops sharply. Furthermore, the filaments have two components with different velocities. The velocity difference between the two components is about 3 km s{sup -1}, corresponding to a Mach number of 10, significantly larger than the local turbulent velocity in the cloud. These facts imply that the collision of the two components (hereafter, the cloud-cloud collision) possibly contributed to the formation of these filaments. Since the two components appear to overlap toward the filaments on the plane of the sky, the collision may have occurred almost along the line of sight. Star formation in the L1641-N cluster was probably triggered by such a collision. We also find several parsec-scale CO shells whose centers are close to either the L1641-N cluster or the V 380 Ori cluster. We propose that these shells were created by multiple winds and/or outflows from cluster young stellar objects, i.e., 'protocluster winds'. One exceptional dust filament located at the western cloud edge lies along a shell; it is presumably part of the expanding shell. Both the cloud-cloud collision and protocluster winds are likely to influence the cloud structure and kinematics in this region.

  1. Implied and realized volatility in the cross-section of equity options

    DEFF Research Database (Denmark)

    Ammann, Manuel; Skovmand, David; Verhofen, Michael

    2009-01-01

    Using a complete sample of US equity options, we analyze patterns of implied volatility in the cross-section of equity options with respect to stock characteristics. We find that high-beta stocks, small stocks, stocks with a low-market-to-book ratio, and non-momentum stocks trade at higher implied...

  2. Free-Will and the Undesirability of Moral Education

    Science.gov (United States)

    Gordon, David

    1975-01-01

    This paper makes two arguments: (1) that education does not imply determinism; and (2) that if one takes the libertarian position with regard to the free-will/determinism issue, one is forced to the conclusion that moral education is undesirable. (RC)

  3. Simulating the production of free defects in irradiated metals

    International Nuclear Information System (INIS)

    Heinisch, H.L.

    1995-01-01

    Under cascade-producing irradiation by high energy neutrons or charged particles, only a small fraction of the initially displaced atoms contribute to the population of free defects that are available to migrate throughout the metal and cause microstructural changes. Although, in principle, computer simulations of free defect production could best be done using molecular dynamics, in practice, the wide ranges of time and distance scales involved can be done only by a combination of atomistic models that employ various levels of approximation. An atomic-scale, multi-model approach has been developed that combines molecular dynamics, binary collision models and stochastic annealing simulation. The annealing simulation is utilized in calibrating binary collision simulations to the results of molecular dynamics calculations, as well as to model the subsequent migration of the defects on more macroscopic time and size scales. The annealing simulation and the method of calibrating the multi-model approach are discussed, and the results of simulations of cascades in copper are presented. The temperature dependence of free defect production following simulated annealing of isolated cascades in copper shows a differential in the fractions of free vacancies and interstitial defects escaping from the cascade above stage V. This differential, a consequence of the direct formation of interstitial clusters in cascades and the relative thermal stability of vacancy and interstitial clusters during subsequent annealing, is the basis for the production bias mechanism of void swelling. (orig.)

  4. Collision-induced destructive quantum interference

    International Nuclear Information System (INIS)

    Yang Xihua; Sun Zhenrong; Zhang Shi'an; Ding Liang'en; Wang Zugeng

    2005-01-01

    We conduct theoretical studies on the collision-induced destructive quantum interference of two-colour two-photon transitions in an open rhomb-type five-level system with a widely separated doublet by the density matrix approach. The effects of the collision-induced decay rates, the ratio of the transition dipole moments and the energy separation of the doublet on the interference are analysed. It is shown that a narrow dip appears in the excitation spectrum due to the collision-induced destructive interference, and that the narrow interference dip still exists even when the collision broadening is comparable to the energy separation of the doublet. The physical origin of the collision-induced destructive quantum interference is analysed in the dressed-atom picture

  5. A Collective Collision Operator for DSMC

    International Nuclear Information System (INIS)

    Gallis, Michail A.; Torczynski, John R.

    2000-01-01

    A new scheme to simulate elastic collisions in particle simulation codes is presented. The new scheme aims at simulating the collisions in the highly collisional regime, in which particle simulation techniques typically become computationally expensive.The new scheme is based on the concept of a grid-based collision field. According to this scheme, the particles perform a single collision with the background grid during a time step. The properties of the background field are calculated from the moments of the distribution function accumulated on the grid. The collision operator is based on the Langevin equation. Based on comparisons with other methods, it is found that the Langevin method overestimates the collision frequency for dilute gases

  6. Limits on production of anomalous secondaries in deuteron-deuteron collisions at 7.9 GeV/c

    International Nuclear Information System (INIS)

    Clarke, R.L.; Hardy, J.E.; Hemingway, R.J.

    1983-01-01

    A search has been made in bubble-chamber film of 7.9-GeV/c deuteron-deuteron interactions for anomalous behavior of the collision fragments. No positive effect is seen in the distribution of secondary mean free paths, although stringent limits are placed on the primary production rate

  7. Neuromorphic UAS Collision Avoidance

    Data.gov (United States)

    National Aeronautics and Space Administration — Collision avoidance for unmanned aerial systems (UAS) traveling at high relative speeds is a challenging task. It requires both the detection of a possible collision...

  8. Long memory persistence in the factor of Implied volatility dynamics

    OpenAIRE

    Härdle, Wolfgang Karl; Mungo, Julius

    2007-01-01

    The volatility implied by observed market prices as a function of the strike and time to maturity form an Implied Volatility Surface (IV S). Practical applications require reducing the dimension and characterize its dynamics through a small number of factors. Such dimension reduction is summarized by a Dynamic Semiparametric Factor Model (DSFM) that characterizes the IV S itself and their movements across time by a multivariate time series of factor loadings. This paper focuses on investigati...

  9. Topics in atomic collision theory

    CERN Document Server

    Geltman, Sydney; Brueckner, Keith A

    1969-01-01

    Topics in Atomic Collision Theory originated in a course of graduate lectures given at the University of Colorado and at University College in London. It is recommended for students in physics and related fields who are interested in the application of quantum scattering theory to low-energy atomic collision phenomena. No attention is given to the electromagnetic, nuclear, or elementary particle domains. The book is organized into three parts: static field scattering, electron-atom collisions, and atom-atom collisions. These are in the order of increasing physical complexity and hence necessar

  10. Electron loss from hydrogen-like highly charged ions in collisions with electrons, protons and light atoms

    Science.gov (United States)

    Lyashchenko, K. N.; Andreev, O. Yu; Voitkiv, A. B.

    2018-03-01

    We consider electron loss from a hydrogen-like highly charged ion (HCI) in relativistic collisions with hydrogen and helium in the range of impact velocities v min ≤ v ≤ v max (v min and v max correspond to the threshold energy ε th for electron loss in collisions with a free electron and to ≈5 ε th, respectively) where any reliable data for loss cross sections are absent. In this range, where the loss process is characterized by large momentum transfers, we express it in terms of electron loss in collisions with equivelocity protons and electrons and explore by performing a detailed comparative study of these subprocesses. Our results, in particular, show that: (i) compared to equivelocity electrons protons are more effective in inducing electron loss, (ii) the relative effectiveness of electron projectiles grows with increase in the atomic number of a HCI, (iii) collisions with protons and electrons lead to a qualitatively different population of the final-state-electron momentum space and even when the total loss cross sections in these collisions become already equal the spectra of the outgoing electrons still remain quite different in almost the entire volume of the final-state-electron momentum space, (iv) in collisions with hydrogen and helium the contributions to the loss process from the interactions with the nucleus and the electron(s) of the atom could be rather well separated in a substantial part of the final-state-electron momentum space.

  11. First-principles investigation of the dissociation and coupling of methane on small copper clusters: Interplay of collision dynamics and geometric and electronic effects

    Energy Technology Data Exchange (ETDEWEB)

    Varghese, Jithin J.; Mushrif, Samir H., E-mail: shmushrif@ntu.edu.sg [School of Chemical and Biomedical Engineering, Nanyang Technological University, 62 Nanyang Drive, 637459 (Singapore)

    2015-05-14

    Small metal clusters exhibit unique size and morphology dependent catalytic activity. The search for alternate minimum energy pathways and catalysts to transform methane to more useful chemicals and carbon nanomaterials led us to investigate collision induced dissociation of methane on small Cu clusters. We report here for the first time, the free energy barriers for the collision induced activation, dissociation, and coupling of methane on small Cu clusters (Cu{sub n} where n = 2–12) using ab initio molecular dynamics and metadynamics simulations. The collision induced activation of the stretching and bending vibrations of methane significantly reduces the free energy barrier for its dissociation. Increase in the cluster size reduces the barrier for dissociation of methane due to the corresponding increase in delocalisation of electron density within the cluster, as demonstrated using the electron localisation function topology analysis. This enables higher probability of favourable alignment of the C–H stretching vibration of methane towards regions of high electron density within the cluster and makes higher number of sites available for the chemisorption of CH{sub 3} and H upon dissociation. These characteristics contribute in lowering the barrier for dissociation of methane. Distortion and reorganisation of cluster geometry due to high temperature collision dynamics disturb electron delocalisation within them and increase the barrier for dissociation. Coupling reactions of CH{sub x} (x = 1–3) species and recombination of H with CH{sub x} have free energy barriers significantly lower than complete dehydrogenation of methane to carbon. Thus, competition favours the former reactions at high hydrogen saturation on the clusters.

  12. First-principles investigation of the dissociation and coupling of methane on small copper clusters: Interplay of collision dynamics and geometric and electronic effects

    International Nuclear Information System (INIS)

    Varghese, Jithin J.; Mushrif, Samir H.

    2015-01-01

    Small metal clusters exhibit unique size and morphology dependent catalytic activity. The search for alternate minimum energy pathways and catalysts to transform methane to more useful chemicals and carbon nanomaterials led us to investigate collision induced dissociation of methane on small Cu clusters. We report here for the first time, the free energy barriers for the collision induced activation, dissociation, and coupling of methane on small Cu clusters (Cu n where n = 2–12) using ab initio molecular dynamics and metadynamics simulations. The collision induced activation of the stretching and bending vibrations of methane significantly reduces the free energy barrier for its dissociation. Increase in the cluster size reduces the barrier for dissociation of methane due to the corresponding increase in delocalisation of electron density within the cluster, as demonstrated using the electron localisation function topology analysis. This enables higher probability of favourable alignment of the C–H stretching vibration of methane towards regions of high electron density within the cluster and makes higher number of sites available for the chemisorption of CH 3 and H upon dissociation. These characteristics contribute in lowering the barrier for dissociation of methane. Distortion and reorganisation of cluster geometry due to high temperature collision dynamics disturb electron delocalisation within them and increase the barrier for dissociation. Coupling reactions of CH x (x = 1–3) species and recombination of H with CH x have free energy barriers significantly lower than complete dehydrogenation of methane to carbon. Thus, competition favours the former reactions at high hydrogen saturation on the clusters

  13. Radiations from atomic collision processes

    International Nuclear Information System (INIS)

    Bernyi, D.

    1994-01-01

    The physics of atomic collision phenomena in which only the Coulomb forces have a role is an actual field or the research of the present days. The impact energy range in these collisions is very broad,it extends from the eV or even lower region to the GeV region or higher,i.e. it spans the region of three branches of physics,namely that of the atomic,the nuclear and the particle physics.To describe and explain the collision processes themselves, different models (collision mechanisms) are used and they are surveyed in the presentation. Different electromagnetic radiations and particles are emitted from the collision processes.Their features are shown in details together with the most important methods in their detection and study.Examples are given based on the literature and on the investigations of the author and his coworkers. The applications of the radiation from atomic collisions in other scientific fields and in the solution of different practical problems are also surveyed shortly. 16 figs., 2 tabs., 76 refs. (author)

  14. Achieving high baryon densities in the fragmentation regions in heavy ion collisions at top RHIC energy

    International Nuclear Information System (INIS)

    Li, Ming; Kapusta, Joseph I.

    2017-01-01

    Heavy ion collisions at extremely high energy, such as the top energy at RHIC, exhibit the property of transparency where there is a clear separation between the almost net-baryon-free central rapidity region and the net-baryon-rich fragmentation region. We calculate the net-baryon rapidity loss and the nuclear excitation energy using the energy-momentum tensor obtained from the McLerran-Venugopalan model. Nuclear compression during the collision is further estimated using a simple space-time picture. The results show that extremely high baryon densities, about twenty times larger than the normal nuclear density, can be achieved in the fragmentation regions. (paper)

  15. Electroweak bosons in Pb+Pb and $p$+Pb collisions

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00356981; The ATLAS collaboration

    2016-01-01

    Electroweak boson ( W , Z , γ ) measurements in Pb+Pb collisions at sNN=2.76 TeV and in p +Pb collisions at sNN=5.02 TeV are presented with the ATLAS detector at the LHC. In Pb+Pb, electroweak boson yields are shown to be independent of centrality. Differential measurements in absolute pseudorapidity are used to investigate nuclear effects to the free-proton parton distribution function (PDF). The distributions lack the experimental precision to unambiguously identify the presence of nuclear modifications. In p +Pb, the Z boson cross section is measured as a function of center-of-mass rapidity yZ⁎ and the momentum fraction of the lead-going parton (Bjorken xPb ). The distributions are asymmetric and model predictions underestimate the data at large xPb . The overall shape is best described by including nuclear effects. The differential cross section is also measured in different centrality classes and shows evidence of spatially-dependent nuclear PDFs. The Z boson production yields are measured as a functi...

  16. Molecular description of steady supersonic free jets

    Science.gov (United States)

    Montero, S.

    2017-09-01

    A detailed analysis of the non-local thermal equilibrium (n-LTE) problem in the paraxial zone of silence of supersonic free jets is reported. The study is based on a hybrid approach that combines Navier-Stokes equations with a kinetic equation derived from the generalized Boltzmann (Waldmann-Snider) equation. The resulting system is solved for those flow quantities not easily amenable to experimental measure (translational temperature, flow velocity, and entropy) in terms of the quantities that can be measured accurately (distance, number density, population of rotational states, and their gradients). The reported solutions are essentially exact and are formulated in terms of macroscopic quantities, as well as in terms of elementary collision processes. Emphasis is made on the influence of dissipative effects onto the flow (viscous and diabatic) and of the breakdown of thermal equilibrium onto the evolution of entropy and translational temperature. The influence of inelastic collisions onto these effects is analysed in depth. The reported equations are aimed at optimizing the experimental knowledge of the n-LTE problem and its quantitative interpretation in terms of state-to-state rates for inelastic collisions.

  17. Transverse expansion and dileptons from the rho-peak in ultrarelativistic nuclear collisions

    International Nuclear Information System (INIS)

    Fai, G.; Neumann, J.J.; Seibert, D.

    1995-01-01

    The authors calculate the transverse-mass distribution of lepton pairs in the ρ - ω peak. An equation of state with a strong first order phase transition is assumed. They focus on the baryon-free central rapidity region, and couple a boost-invariant longitudinal expansion to a cylindrically symmetric transverse expansion to model the dynamics of central collisions. In the absence of transverse expansion, the fit temperature of the resulting dilepton spectra provided a good thermometer for the critical temperature. Assuming thermal equilibrium throughout the collision, they study the effect of transverse expansion on the spectra. They allow deviations from chemical equilibrium in the high-temperature phase by appropriately parametrizing the equation of state. The freeze-out dependence is also studied. They calculate dilepton production vs. transverse-mass as a function of the critical temperature for these different scenarios

  18. Free energy of activation. Definition, properties, and dependent variables with special reference to linear free energy relations

    International Nuclear Information System (INIS)

    Levine, R.D.

    1979-01-01

    The reaction rate constant is expressed as Z exp(-G/sub a//RT). Z is the binary collision frequency. G/sub a/, the free energy of activation, is shown to be the difference between the free energy of the reactive reactants and the free energy of all reactants. The results are derived from both a statistical mechanical and a collision theoretic point of view. While the later is more suitable for an ab-initio computation of the reaction rate, it is the former that lends itself to the search of systematics and of correlations and to compaction of data. Different thermodynamic-like routes to the characterization of G/sub a/ are thus explored. The two most promising ones appear to be the use of thermodynamic type cycles and the changes of dependent variables using the Legendre transform technique. The dependence of G/sub a/ on ΔG 0 , the standard free energy change in the reaction, is examined from the later point of view. It is shown that one can rigorously express this dependence as G/sub a/ = αΔG 0 + G/sub a/ 0 M(α). Here α is the Bronsted slope, α = -par. delta ln k(T)/par. delta(ΔG 0 /RT), G/sub a/ 0 is independent of ΔG 0 and M(α), the Legendre transform of G/sub a/, is a function only of α. For small changes in ΔG 0 , the general result reduces to the familiar ''linear'' free energy relation delta G/sub a/ = α delta ΔG 0 . It is concluded from general considerations that M(α) is a symmetric, convex function of α and hence that α is a monotonically increasing function of ΔG 0 . Experimental data appear to conform well to the form α = 1/[1 + exp(-ΔG 0 /G/sub s/ 0 )]. A simple interpretation of the ΔG 0 dependence of G/sub a/, based on an interpolation of the free energy from that of the reagents to that of the products, is offered. 4 figures, 69 references

  19. Translational Entanglement and Teleportation of Matter Wavepackets by Collisions and Half-Collisions

    Science.gov (United States)

    Fisch, L.; Tal, A.; Kurizki, G.

    To date, the translationally-entangled state originally proposed by Einstein, Podolsky and Rosen (EPR) in 1935 has not been experimentally realized for massive particles. Opatrný and Kurizki [Phys. Rev. Lett. 86, 3180 (2000)] have suggested the creation of a position- and momentum-correlated, i.e., translationally-entangled, pair of particles approximating the EPR state by dissociation of cold diatomic molecules, and further manipulation of the EPR pair effecting matter-wave teleportation. Here we aim at setting the principles of and quantifying translational entanglement by collisions and half-collisions. In collisions, the resonance width s and the initial phase-space distributions are shown to determine the degree of post-collisional momentum entanglement. Half-collisions (dissociation) are shown to yield different types of approximate EPR states. We analyse a feasible realization of translational EPR entanglement and teleportation via cold-molecule Raman dissociation and subsequent collisions, resolving both practical and conceptual difficulties it has faced so far: How to avoid entanglement loss due to the wavepacket spreading of the dissociation fragments? How to measure both position and momentum correlations of the dissociation fragments with sufficient accuracy to verify their EPR correlations? How to reliably perform two-particle (Bell) position and momentum measurements on one of the fragments and the wavepacket to be teleported?

  20. Recent results from the CELSIUS/WASA collaboration on meson production in proton-hydrogen collisions

    International Nuclear Information System (INIS)

    Bilger, R.; Bondar, A.; Brodowski, W.; Calen, H.; Clement, H.; Dyring, J.; Ekstroem, C.; Fransson, K.; Gustafsson, L.; Haeggstroem, S.; Hoeistad, B.; Johanson, J.; Johansson, A.; Johansson, T.; Kilian, K.; Kullander, S.; Kupsc, A.; Kuzmin, A.; Marciniewski, P.; Morosov, B.; Moertsell, A.; Oelert, W.; Povtorejko, A.; Ruber, R.J.M.Y.; Schuberth, U.; Sefzick, T.; Sidorov, V.; Shwartz, B.; Sopov, V.; Stepaniak, J.; Sukhanov, A.; Sukhanov, A.; Tchernychev, V.; Turowiecki, A.; Wagner, G.; Wilhelmi, Z.; Zabierowski, J.; Zernov, A.; Zlomanczuk, J.

    1999-01-01

    Different π and η meson production channels in proton-proton and proton-deuteron collisions have been studied at the CELSIUS storage ring using an internal cluster-jet target setup [1]. During the last years more emphasis has been put on ππ and all but one of the possible channels in proton-proton collisions have been studied. Recently also the quasi-free p+n→d+η reaction cross section has been measured at threshold using 1295 MeV protons and target deuterium. Excess energies from threshold to 10 MeV in the center of mass of the final dη system were covered. Approaching the threshold the cross section is enhanced compared to phase-space expectations. This behaviour is typical for a strong final-state interaction

  1. Cost analysis of hash collisions : will quantum computers make SHARCS obsolete?

    NARCIS (Netherlands)

    Bernstein, D.J.

    2009-01-01

    Current proposals for special-purpose factorization hardware will become obsolete if large quantum computers are built: the number-field sieve scales much more poorly than Shor's quantum algorithm for factorization. Will all special-purpose cryptanalytic hardware become obsolete in a post-quantum

  2. The Contribution of Galactic Free-Free Emission to Anistropies in the Cosmic Microwave Background Found by the Saskatoon Experiment

    Science.gov (United States)

    Simonetti, John H.; Dennison, Brian; Topasna, Gregory A.

    1996-02-01

    We made a sensitive, wide-field H alpha image of the north celestial polar region. Using this image, we constrain the contribution of irregularities in interstellar free-free emission to the degree-scale anisotropies in the cosmic microwave background detected in recent observations at Saskatoon by the Princeton group. The analysis of the H alpha image mimics the Saskatoon data analysis: the resulting signal is the strength of irregularities sampled with the Saskatoon beam (i.e., degree-scale) along the 85 deg declination circle. We found no such irregularities that could be attributed to H alpha emission. The implied upper bound on the rms variation in free-free brightness temperature is less than 4.6 mu K at 27.5 GHz. The observed cosmic microwave background anisotropies are much larger. Therefore, the contribution of irregularities in interstellar free-free emission to the observed anisotropies is negligible.

  3. Inclusive spectra of hadrons in proton-nucleus collisions

    International Nuclear Information System (INIS)

    Gevorkyan, S.R.; Gulkanyan, G.R.; Kotzinyan, A.M.; Zhamkochyan, V.M.

    1985-01-01

    A model is proposed, which allows one to describe all exprimental data on inclusive spectra of different hadrons produced on nuclei. The model is based on the following assumptions. After the first inelastic collision with nucleon in the nucleus the proton transforms into some excited system H, which collides with the other nucleons during its passage through the nucleus. Since in inelastic collisions the slow sea partons play the dominant role, the valence quarks of this system H coincide with those of proton. Fragmentation of H into hadrons (as well as into proton) is dilated in the lab system by the Lorentz factor E/m >> 1 and so it takes place out of the nucleus. Using the methods of multiple scattering theory one can receive the connection between inclusive spectra on nuclei and those on nucleons. The calculations of inclusive spectra of different hadrons (p, p, πsup(-+), ksup(+-)) were done, and a satisfactory description of the experimental data was obtained. It should be noted that this description was done without introduction of any free parameters. Analogous models are discussed, and their diffference from the method proposed is outlined

  4. NA49: lead-lead collision

    CERN Multimedia

    1996-01-01

    This is an image of an actual lead ion collision taken from tracking detectors on the NA49 experiment, part of the heavy ion project at CERN. These collisions produce a very complicated array of hadrons as the heavy ions break up. It is hoped that one of these collisions will eventually create a new state of matter known as quark-gluon plasma.

  5. From collisions to clusters

    DEFF Research Database (Denmark)

    Loukonen, Ville; Bork, Nicolai; Vehkamaki, Hanna

    2014-01-01

    -principles molecular dynamics collision simulations of (sulphuric acid)1(water)0, 1 + (dimethylamine) → (sulphuric acid)1(dimethylamine)1(water)0, 1 cluster formation processes. The simulations indicate that the sticking factor in the collisions is unity: the interaction between the molecules is strong enough...... control. As a consequence, the clusters show very dynamic ion pair structure, which differs from both the static structure optimisation calculations and the equilibrium first-principles molecular dynamics simulations. In some of the simulation runs, water mediates the proton transfer by acting as a proton...... to overcome the possible initial non-optimal collision orientations. No post-collisional cluster break up is observed. The reasons for the efficient clustering are (i) the proton transfer reaction which takes place in each of the collision simulations and (ii) the subsequent competition over the proton...

  6. Random matrix theory and analysis of nucleus-nucleus collision at high energies

    International Nuclear Information System (INIS)

    Shahaliev, E.I.; Inst. of Radiation Problems, Baku; ); Kuznetsov, A.A.; Suleymanov, M.K.; ); Teryaev, O.V.; )

    2006-01-01

    A novel method for analysis of experimental data obtained at relativistic nucleus-nucleus collisions is proposed. The method, based on the ideas of Random Matrix Theory, is applied to detect systematic errors that occur at measurements of momentum distributions of emitted particles. The unfolded momentum distribution is well described by the Gaussian orthogonal ensemble of random matrices, when the uncertainty in the momentum distribution is maximal. The method is free from unwanted background contributions [ru

  7. Positronium collisions with molecular nitrogen

    Science.gov (United States)

    Wilde, R. S.; Fabrikant, I. I.

    2018-05-01

    For many atomic and molecular targets positronium (Ps) scattering looks very similar to electron scattering if total scattering cross sections are plotted as functions of the projectile velocity. Recently this similarity was observed for the resonant scattering by the N2 molecule. For correct treatment of Ps-molecule scattering incorporation of the exchange interaction and short-range correlations is of paramount importance. In the present work we have used a free-electron-gas model to describe these interactions in collisions of Ps with the N2 molecule. The results agree reasonably well with the experiment, but the position of the resonance is somewhat shifted towards lower energies, probably due to the fixed-nuclei approximation employed in the calculations. The partial-wave analysis of the resonant peak shows that its composition is more complex than in the case of e -N2 scattering.

  8. What implies the good work for registered nurses in municipal elderly care in Sweden?

    Science.gov (United States)

    Josefsson, Karin; Aling, Jenny; Östin, Britt-Louise

    2011-08-01

    The aim was to describe registered nurses' perceptions of what the good work implies to them in municipal elderly care. A descriptive design and a structured questionnaire specifically designed for this study were used. Sixty housing units for older people and 213 nurses participated, with a response rate of 62%. The good work included the following aspects: intellectually stimulating without guilt feelings; freedom and independence with the possibility to influence; having appreciative and pleasant fellow workers and a fair and understanding manager; a good physical and risk-free environment; work security and a steady income with the possibility of improving salary through work effort; work effort should be beneficial to others; innovative thinking and initiative should be highly valued; and pride in work without compromising personal values. Employers must take this into consideration to retain those nurses already employed and recruit nurses to municipal elderly care.

  9. The epidemiology of bicyclist's collision accidents

    DEFF Research Database (Denmark)

    Larsen, L. B.

    1994-01-01

    of bicyclists and risk situations. The findings should make a basis for preventive programmes in order to decrease the number and severity of bicyclists collision accidents. Data from the emergency room in a 2 year period was combined with data from questionnaires. The study group consisted of 1021 bicyclists......The number of bicyclists injured in the road traffic in collision accidents and treated at the emergency room at Odense University Hospital has increased 66% from 1980 to 1989. The aim of this study was to examine the epidemiology of bicyclist's collision accidents and identify risk groups...... injured in collision accidents, and 1502 bicyclists injured in single accidents was used as a reference group. The young bicyclists 10-19 years of age had the highest incidence of injuries caused by collision accidents. The collision accidents had different characteristics according to counterpart. One...

  10. Implied reading direction and prioritization of letter encoding.

    Science.gov (United States)

    Holcombe, Alex O; Nguyen, Elizabeth H L; Goodbourn, Patrick T

    2017-10-01

    Capacity limits hinder processing of multiple stimuli, contributing to poorer performance for identifying two briefly presented letters than for identifying a single letter. Higher accuracy is typically found for identifying the letter on the left, which has been attributed to a right-hemisphere dominance for selective attention. Here, we use rapid serial visual presentation (RSVP) of letters in two locations at once. The letters to be identified are simultaneous and cued by rings. In the first experiment, we manipulated implied reading direction by rotating or mirror-reversing the letters to face to the left rather than to the right. The left-side performance advantage was eliminated. In the second experiment, letters were positioned above and below fixation, oriented such that they appeared to face downward (90° clockwise rotation) or upward (90° counterclockwise rotation). Again consistent with an effect of implied reading direction, performance was better for the top position in the downward condition, but not in the upward condition. In both experiments, mixture modeling of participants' report errors revealed that attentional sampling from the two locations was approximately simultaneous, ruling out the theory that the letter on one side was processed first, followed by a shift of attention to sample the other letter. Thus, the orientation of the letters apparently controls not when the letters are sampled from the scene, but rather the dynamics of a subsequent process, such as tokenization or memory consolidation. Implied reading direction appears to determine the letter prioritized at a high-level processing bottleneck. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  11. Correlation Structures of Correlated Binomial Models and Implied Default Distribution

    Science.gov (United States)

    Mori, Shintaro; Kitsukawa, Kenji; Hisakado, Masato

    2008-11-01

    We show how to analyze and interpret the correlation structures, the conditional expectation values and correlation coefficients of exchangeable Bernoulli random variables. We study implied default distributions for the iTraxx-CJ tranches and some popular probabilistic models, including the Gaussian copula model, Beta binomial distribution model and long-range Ising model. We interpret the differences in their profiles in terms of the correlation structures. The implied default distribution has singular correlation structures, reflecting the credit market implications. We point out two possible origins of the singular behavior.

  12. Asset allocation using option-implied moments

    Science.gov (United States)

    Bahaludin, H.; Abdullah, M. H.; Tolos, S. M.

    2017-09-01

    This study uses an option-implied distribution as the input in asset allocation. The computation of risk-neutral densities (RND) are based on the Dow Jones Industrial Average (DJIA) index option and its constituents. Since the RNDs estimation does not incorporate risk premium, the conversion of RND into risk-world density (RWD) is required. The RWD is obtained through parametric calibration using the beta distributions. The mean, volatility, and covariance are then calculated to construct the portfolio. The performance of the portfolio is evaluated by using portfolio volatility and Sharpe ratio.

  13. Free-Free Transitions in the Presence of Laser Fields at Very Low Incident Electron Energy

    Science.gov (United States)

    Bhatia, A. K.; Sinha, Chandana

    2010-01-01

    We study the free-free transition in electron-hydrogenic systems in ground state in presence of an external laser field at very loud incident energies. The laser field is treated classically while the collision dynamics is treated quantum mechanically. The laser field is chosen to be monochromatic, linearly polarized and homogeneous. The incident electron is considered to be dressed by the laser in a nonperturbative manner by choosing a Volkov wave function for it. The scattering weave function for the electron is solved numerically by taking into account the effect of the electron exchange, short-range as well as of the long-range interactions to get the S and P wave phase shifts while for the higher angular momentum phase shifts the exchange approximation has only been considered. We calculate the laser assisted differential cross sections (LADCS) for the aforesaid free-free transition process for single photon absorption/emission. The laser intensity is chosen to be much less than the atomic field intensity. A strong suppression is noted in the LADCS as compared to the field free (FF) cross sections. Unlike the FF ones, the LADCS exhibit some oscillations having a distinct maximum at a low value of the scattering angle depending on the laser parameters as well as on the incident energies.

  14. Photodissociation from a manifold of rovibrational states and free-free absorption by a diatomic molecule

    International Nuclear Information System (INIS)

    Lebedev, V S; Presnyakov, L P

    2002-01-01

    An analytical approach for the description of photoabsorption by a gas or plasma medium containing atomic and molecular components in thermodynamic equilibrium is developed. Continuous absorption of radiation is due to the photodissociation of a diatomic molecule from a manifold of excited rovibrational states and free-free transitions between the two electronic terms of a quasimolecule temporarily formed during a collision of atomic particles. The formulae are obtained for individual photodissociation cross sections from a given rovibrational state and for the Boltzmann-averaged cross section. Particular attention is paid to the derivation of a general analytical expression for the total absorption coefficient including the integral contribution of bound-free and free-free radiative transitions. The consideration is based on the theory of nonadiabatic transitions combined with the approximation of a quasicontinuum for rovibrational states. The theory is applied to the investigation of photoabsorption by the H 2 + ion in the IR, visible and UV spectral regions. It is shown that our results are in good agreement with available ab initio quantal calculations of photodissociation cross sections and with semiclassical calculations of absorption coefficients. Special attention is paid to the investigation of the relative contributions of the H 2 + and H - ions to the total absorption in a wide range of wavelengths and temperatures

  15. Is the anomalous effect an experimental evidence for the excitation of new exotic states in heavy-ion collisions

    International Nuclear Information System (INIS)

    Ion, D.B.; Ion, R.; Topor Pop, V.

    1984-10-01

    Lower bound on the mean free path of the projectile fragments from the relativistic heavy ion collisions are drived using generalized Rarita-Schwed's theorems. These bounds are compared with the experimental data on the anomalous mean free path observed in recent experiments. The near saturation of these bounds provide a specific interpretation of the anomalous effects as an experimental evidence for the excitation of those extreme nuclear states which saturate the limits of the convetional nuclear physics. (authors)

  16. Electroweak bosons in Pb+Pb and p+Pb collisions from ATLAS

    CERN Document Server

    INSPIRE-00356981

    2015-01-01

    Electroweak boson ($W$, $Z$, $\\gamma$) measurements in Pb+Pb collisions at $\\sqrt{s_{NN}}=2.76$ TeV and in $p$+Pb collisions at $\\sqrt{s_{NN}}=5.02$ TeV are presented with the ATLAS detector at the LHC. In Pb+Pb, electroweak boson yields are shown to be independent of centrality. Differential measurements in absolute pseudorapidity are used to investigate nuclear effects to the free-proton parton distribution function (PDF). The distributions lack the experimental precision to unambiguously identify the presence of nuclear modifications. In $p$+Pb, the $Z$ boson cross section is measured as a function of center-of-mass rapidity $y_{Z}^{*}$ and the momentum fraction of the lead-going parton (Bjorken $x_{Pb}$). The distributions are asymmetric and model predictions underestimate the data at large $x_{Pb}$. The overall shape is best described by including nuclear effects. The differential cross section is also measured in different centrality classes and shows evidence of spatially-dependent nuclear PDFs. The $Z...

  17. Modeling and Forecasting the Implied Volatility of the WIG20 Index

    OpenAIRE

    Buszkowska-Khemissi, Eliza; Płuciennik, Piotr

    2007-01-01

    The implied volatility is one of the most important notions in the financial market. It informs about the volatility forecasted by the participans of the market. In this paper we calculate the daily implied volatility from options on the WIG20 index. First we test the long memory property of the time series obtained in such a way, and then we model and forcast it as ARFIMA process

  18. Photon collisions as a glueball source

    International Nuclear Information System (INIS)

    Liu, H.C.

    1984-01-01

    Photon-photon and photon-nucleon collisions are suggested as a glueball source at small x in the collision center-of-mass frame. The glueball-production cross section is estimated through the two-gluon-fusion mechanism in perturbative quantum chromodynamics. The pointlike component of the photon structure function has a distinctive feature in that it consists almost purely of gluons at small x, which turns out to be very effective in producing glueballs. A much larger signal-to-noise ratio is expected in the glueball search in high-energy photon-photon and photon-nucleon collisions compared with hadron-hadron collisions. It is argued that the background due to soft collisions of the photons can be effectively reduced

  19. Bubble collisions in general relativity

    International Nuclear Information System (INIS)

    Siklos, S.T.C.; Wu, Z.C.; University of Science and Technology of China, Hofei, Anhwei)

    1983-01-01

    The collision of two bubbles of true vacuum in a background of false vacuum is considered in the context of General Relativity. It is found that in the thin wall approximation, the problem, can be solved exactly. The region to the future of the collision is described by the pseudo-Schwarzschild de Sitter metric. The parameters in this metric are found by solving the junction conditions at each collision. (author)

  20. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  1. CHARACTERIZATION OF WILD PIG VEHICLE COLLISIONS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J; Paul E. Johns, P

    2007-05-23

    Wild pig (Sus scrofa) collisions with vehicles are known to occur in the United States, but only minimal information describing these accidents has been reported. In an effort to better characterize these accidents, data were collected from 179 wild pig-vehicle collisions from a location in west central South Carolina. Data included accident parameters pertaining to the animals involved, time, location, and human impacts. The age structure of the animals involved was significantly older than that found in the population. Most collisions involved single animals; however, up to seven animals were involved in individual accidents. As the number of animals per collision increased, the age and body mass of the individuals involved decreased. The percentage of males was significantly higher in the single-animal accidents. Annual attrition due to vehicle collisions averaged 0.8 percent of the population. Wild pig-vehicle collisions occurred year-round and throughout the 24-hour daily time period. Most accidents were at night. The presence of lateral barriers was significantly more frequent at the collision locations. Human injuries were infrequent but potentially serious. The mean vehicle damage estimate was $1,173.

  2. High energy nucleus-nucleus collisions

    International Nuclear Information System (INIS)

    Bhalla, K.B.

    1980-01-01

    An attempt is made to explain nucleus-nucleus collisions based on nuclear emulsion experiments. Peripheral and central collisions are described in detail. Assuming the fireball model, the concepts of geometry, kinematics and thermodynamics in this model are discussed. Projectile and target fragmentations are studied. The advantages of using nuclear emulsions as detectors, are mentioned. Proton-nucleus collisions and nucleus-nucleus collisions are compared. Interactions, of projectiles such as Ca, B and C on targets such as Pb, Ag, Br etc. at very high energies (approximately 300 to 1700 Gev) are listed. A comparison of the near multiplicities in these interactions is given. A generalized explanation is given on the processes involved in these interactions. (A.K.)

  3. High energy hadron-hadron collisions

    International Nuclear Information System (INIS)

    Chou, T.T.

    1990-01-01

    Results of a study on high energy collision with the geometrical model are summarized in three parts: (i) the elastic hadron-hadron collision, (ii) the inelastic hadron-hadron collision, and (iii) the e + e - annihilation. The geometrical description of high-energy elastic scattering developed earlier is still in general agreement with experiments at the CERN-S bar ppS energies. A simple one-parameter expression for the blackness of bar pp system has been proposed recently which describes very well all existing data from ISR to S bar ppS energies. The geometrical description has also been extended to include processes of fragmentation and diffraction dissociation and other phenomena. In the past five years, a unified physical picture for multiparticle emission in hadron-hadron and e + e - collisions was developed. It focuses on the idea of the wide range of values for the total angular momentum in hadron-hadron collisions. An extension of this consideration yields a theory for the momentum distribution of the outgoing particles which agrees with bar pp and e + e - collision experiments. The results and conclusions of this theory have been extrapolated to higher energies and yielded many predictions which can be experimentally tested. 37 refs

  4. Zero Distribution of System with Unknown Random Variables Case Study: Avoiding Collision Path

    Directory of Open Access Journals (Sweden)

    Parman Setyamartana

    2014-07-01

    Full Text Available This paper presents the stochastic analysis of finding the feasible trajectories of robotics arm motion at obstacle surrounding. Unknown variables are coefficients of polynomials joint angle so that the collision-free motion is achieved. ãk is matrix consisting of these unknown feasible polynomial coefficients. The pattern of feasible polynomial in the obstacle environment shows as random. This paper proposes to model the pattern of this randomness values using random polynomial with unknown variables as coefficients. The behavior of the system will be obtained from zero distribution as the characteristic of such random polynomial. Results show that the pattern of random polynomial of avoiding collision can be constructed from zero distribution. Zero distribution is like building block of the system with obstacles as uncertainty factor. By scale factor k, which has range, the random coefficient pattern can be predicted.

  5. Some recent results in Au+Au collisions at AGS

    International Nuclear Information System (INIS)

    Chen, Z.

    1996-01-01

    Many interesting results have been obtained for Au + Au reactions at AGS. The basic information about the reaction dynamics comes from the hadronic distribution. and this article reviews the recent progress of these distributions in details. The proton rapidity distribution shows significantly increased stopping compared to lighter systems, implying the formation of a state of high baryon density. Unlike reactions at this energy induced by lighter heavy ions, at low m t - m 0 the proton invariant spectra deviate from a single exponential shape and become fear,. while pion spectra are found to rise in this region, with the π - spectra rising faster than the π + spectra. The inverse slope parameter increases faster for particles of larger mass as the number of participants in the reaction increases, an indication of increased effect of radial expansion in central collision. Anti-proton Needs have been measured recently, and unfortunately a comparison among current results from different experiments indicates discrepancy

  6. The Profile of Inelastic Collisions from Elastic Scattering Data

    Directory of Open Access Journals (Sweden)

    I. M. Dremin

    2015-01-01

    Full Text Available Using the unitarity relation in combination with experimental data about the elastic scattering in the diffraction cone, it is shown how the shape and the darkness of the inelastic interaction region of colliding protons change with increase of their energies. In particular, the collisions become fully absorptive at small impact parameters at LHC energies that results in some special features of inelastic processes. Possible evolution of this shape with the dark core at the LHC to the fully transparent one at higher energies is discussed that implies that the terminology of the black disk would be replaced by the black toroid. The approach to asymptotics is disputed. The ratio of the real to imaginary parts of the nonforward elastic scattering amplitude is briefly discussed. All the conclusions are only obtained in the framework of the indubitable unitarity condition using experimental data about the elastic scattering of protons in the diffraction cone without any reference to quantum chromodynamics (QCD or phenomenological approaches.

  7. Formation of massive seed black holes via collisions and accretion

    Science.gov (United States)

    Boekholt, T. C. N.; Schleicher, D. R. G.; Fellhauer, M.; Klessen, R. S.; Reinoso, B.; Stutz, A. M.; Haemmerlé, L.

    2018-05-01

    Models aiming to explain the formation of massive black hole seeds, and in particular the direct collapse scenario, face substantial difficulties. These are rooted in rather ad hoc and fine-tuned initial conditions, such as the simultaneous requirements of extremely low metallicities and strong radiation backgrounds. Here, we explore a modification of such scenarios where a massive primordial star cluster is initially produced. Subsequent stellar collisions give rise to the formation of massive (104-105 M⊙) objects. Our calculations demonstrate that the interplay among stellar dynamics, gas accretion, and protostellar evolution is particularly relevant. Gas accretion on to the protostars enhances their radii, resulting in an enhanced collisional cross-section. We show that the fraction of collisions can increase from 0.1 to 1 per cent of the initial population to about 10 per cent when compared to gas-free models or models of protostellar clusters in the local Universe. We conclude that very massive objects can form in spite of initial fragmentation, making the first massive protostellar clusters viable candidate birth places for observed supermassive black holes.

  8. New space--time model for hadron--nucleus collisions at high energies

    International Nuclear Information System (INIS)

    Bialkowski, G.; Chiu, C.B.; Tow, D.M.

    1976-12-01

    A new space-time model for hadron-nucleus collisions is proposed, where particles at the instant of creation are immature and their maturity rate is enhanced in the presence of other hadronic matter, as in a nucleus. With only one free parameter, the model can explain dn/sub A//sup p//d eta, dn/sub A//sup pi//d eta, R/sub A//sup p/(E/sub L/), and the A-dependences of sigma/sub in/sup pA/ and sigma/sub in/sup pi A/

  9. Photon-photon collisions

    International Nuclear Information System (INIS)

    Burke, D.L.

    1982-10-01

    Studies of photon-photon collisions are reviewed with particular emphasis on new results reported to this conference. These include results on light meson spectroscopy and deep inelastic e#betta# scattering. Considerable work has now been accumulated on resonance production by #betta##betta# collisions. Preliminary high statistics studies of the photon structure function F 2 /sup #betta#/(x,Q 2 ) are given and comments are made on the problems that remain to be solved

  10. Photon-photon collisions

    International Nuclear Information System (INIS)

    Haissinski, J.

    1986-06-01

    The discussions presented in this paper deal with the following points: distinctive features of gamma-gamma collisions; related processes; photon-photon elastic scattering in the continuum and γγ →gg; total cross section; γγ → V 1 V 2 (V=vector meson); radiative width measurements and light meson spectroscopy; exclusive channels at large /t/; jets and inclusive particle distribution in γγ collisions; and, the photon structure function F γ 2

  11. Electron capture in ion-molecule collisions at intermediate energy

    International Nuclear Information System (INIS)

    Kumura, M.

    1986-01-01

    Recent progress of theoretical charge transfer study in ion-molecule collisions at the intermediate energy is reviewed. Concept of close and distant collisions obtained from extensive ion-atom collision studies is identified so that it can be utilized to model two distinct collision processes. For a close collision, explicit representation of the whole collision complex is necessary to describe collision dynamics correctly, while a model potential approach for molecule is appropriate for a distant collision. It is shown that these two distinct models are indeed capable of reproducing experimental charge transfer cross sections. Some remarks for further theoretical study of ion-molecule collisions are also given. 21 refs., 8 figs

  12. Market-implied risk-neutral probabilities, actual probabilities, credit risk and news

    Directory of Open Access Journals (Sweden)

    Shashidhar Murthy

    2011-09-01

    Full Text Available Motivated by the credit crisis, this paper investigates links between risk-neutral probabilities of default implied by markets (e.g. from yield spreads and their actual counterparts (e.g. from ratings. It discusses differences between the two and clarifies underlying economic intuition using simple representations of credit risk pricing. Observed large differences across bonds in the ratio of the two probabilities are shown to imply that apparently safer securities can be more sensitive to news.

  13. Dynamics and Instabilities of Free Surface and Vortex Flows

    DEFF Research Database (Denmark)

    Tophøj, Laust Emil Hjerrild

    2012-01-01

    This PhD thesis consists of two main parts. The first part describes the dynamics of an ideal fluid on a stationary free surface of a given shape. It turns out that one can formulate a set of self-contained equations of momentum conservation for the tangential flow, with no reference to the flow ......)]. Finally, an experimental work on elastic collisions of wet spheres is briefly discussed....

  14. About the Collision Repair Campaign

    Science.gov (United States)

    EPA developed the Collision Repair Campaign to focus on meaningful risk reduction in the Collision Repair source sector to complement ongoing community air toxics work and attain reductions at a faster rate.

  15. Distraction-related road traffic collisions

    African Journals Online (AJOL)

    drivers involved in road traffic collisions (RTC) were using mobile phones. Our study supports ... while driving. Keywords: Distraction, prevention, road traffic collision, mobile phone. ..... keeps us connected with others with great advantages.

  16. The temporal development of collision cascades in the binary collision approximation

    International Nuclear Information System (INIS)

    Robinson, M.T.

    1989-07-01

    A modified binary collision approximation (BCA) was developed to allow explicit evaluation of the times at which projectiles in a collision cascade reach significant points in their trajectories, without altering the ''event-driven'' character of the model. The modified BCA was used to study the temporal development of cascades in copper and gold, initiated by primary atoms of up to 10 keV initial kinetic energy. Cascades generated with time-ordered collisions show fewer ''distant'' Frenkel pairs than do cascades generated with velocity-ordered collisions. In the former, the slower projectiles tend to move in less-damaged crystal than they do in the latter. The effect is larger in Au than in Cu and increases with primary energy. As an approach to cascade nonlinearities, cascades were generated in which stopped cascade atoms were allowed to be redisplaced in later encounters. There were many more redisplacements in time-ordered cascades than in velocity-ordered ones. Because of the additional stopping introduced by the redisplacement events, the cascades in which they were allowed had fewer defects than occurred otherwise. This effect also was larger in Au than in Cu and larger at high energies although most of the redisplacement encounters involved only low-energy particles. 13 refs., 5 figs., 4 tabs

  17. Analysing Discursive Practices in Legal Research: How a Single Remark Implies a Paradigm

    Directory of Open Access Journals (Sweden)

    Paul van den Hoven

    2017-12-01

    Full Text Available Different linguistic theories of meaning (semantic theories imply different methods to discuss meaning. Discussing meaning is what legal practitioners frequently do to decide legal issues and, subsequently, legal scholars analyse in their studies these discursive practices of parties, judges and legal experts. Such scholarly analysis reveals a methodical choice on how to discuss meaning and therefore implies positioning oneself towards a semantic theory of meaning, whether the scholar is aware of this or not. Legal practitioners may not be bound to be consistent in their commitment to semantic theories, as their task is to decide legal issues. Legal scholars, however, should be consistent because commitment to a semantic theory implies a distinct position towards important legal theoretical doctrines. In this paper three examples are discussed that require an articulated position of the legal scholar because the discursive practices of legal practitioners show inconsistencies. For each of these examples it can be shown that a scholar’s methodic choice implies commitment to a specific semantic theory, and that adopting such a theory implies a distinct position towards the meaning of the Rule of Law, the separation of powers doctrine and the institutional position of the judge.

  18. Sixteenth International Conference on the physics of electronic and atomic collisions

    Energy Technology Data Exchange (ETDEWEB)

    Dalgarno, A.; Freund, R.S.; Lubell, M.S.; Lucatorto, T.B. (eds.)

    1989-01-01

    This report contains abstracts of papers on the following topics: photons, electron-atom collisions; electron-molecule collisions; electron-ion collisions; collisions involving exotic species; ion- atom collisions, ion-molecule or atom-molecule collisions; atom-atom collisions; ion-ion collisions; collisions involving rydberg atoms; field assisted collisions; collisions involving clusters and collisions involving condensed matter.

  19. Sixteenth International Conference on the physics of electronic and atomic collisions

    International Nuclear Information System (INIS)

    Dalgarno, A.; Freund, R.S.; Lubell, M.S.; Lucatorto, T.B.

    1989-01-01

    This report contains abstracts of papers on the following topics: photons, electron-atom collisions; electron-molecule collisions; electron-ion collisions; collisions involving exotic species; ion- atom collisions, ion-molecule or atom-molecule collisions; atom-atom collisions; ion-ion collisions; collisions involving rydberg atoms; field assisted collisions; collisions involving clusters and collisions involving condensed matter

  20. Energy transfer in diatom/diatom molecular collisions

    International Nuclear Information System (INIS)

    Sohlberg, K.W.

    1992-01-01

    In a collision of two molecules, the translational energy of the collision may be redistributed into internal energy of rotation, vibration, or electron motion, in one or both of the colliding partners. In addition, internal energy in one or more of these modes may be open-quotes quenchedclose quotes into translation, leading to a superelastic collision. Such energy transfer may take place by a number of mechanisms. This energy transfer is of fundamental importance in understanding chemical reaction dynamics. Nearly all chemical reactions take place through a bimolecular collision process (or multiple bimolecular collisions) and the quantum state specificity of the reaction can have a major role in determining the kinetics of the reaction, In particular, the author has investigated vibrational energy transfer in collisions between two diatomic molecules. In addition to serving as models for all molecular collision process, gas phase collisions of these species are ubiquitous in atmospheric phenomena which are of critical importance in answering the current questions about the human induced degradation of the earth's atmospheric. Classical trajectory methods have been used to explore the excitation of vibrations in gas-phase collisions of the nitrogen molecular ion with its parent molecule. The near symmetry of the reactants is shown to result in a high probability that the two molecules are excited by an equal amount of energy. This provides a possible explanation of the molecular beam measurements which show that the total number of vibrational energy quanta excited in the collision is, with a high probability that the two molecules are excited by an equal amount of energy. This provides a possible explanation of the molecular beam measurements which show that the total number of vibrational energy quanta excited in the collision is, with a high probability, even

  1. Conceptual model for collision detection and avoidance for runway incursion prevention

    Science.gov (United States)

    Latimer, Bridgette A.

    The Federal Aviation Administration (FAA), National Transportation and Safety Board (NTSB), National Aeronautics and Space Administration (NASA), numerous corporate entities, and research facilities have each come together to determine ways to make air travel safer and more efficient. These efforts have resulted in the development of a concept known as the Next Generation (Next Gen) of Aircraft or Next Gen. The Next Gen concept promises to be a clear departure from the way in which aircraft operations are performed today. The Next Gen initiatives require that modifications are made to the existing National Airspace System (NAS) concept of operations, system level requirements, software (SW) and hardware (HW) requirements, SW and HW designs and implementations. A second example of the changes in the NAS is the shift away from air traffic controllers having the responsibility for separation assurance. In the proposed new scheme of free flight, each aircraft would be responsible for assuring that it is safely separated from surrounding aircraft. Free flight would allow the separation minima for enroute aircraft to be reduced from 2000 nautical miles (nm) to 1000 nm. Simply put "Free Flight is a concept of air traffic management that permits pilots and controllers to share information and work together to manage air traffic from pre-flight through arrival without compromising safety [107]." The primary goal of this research project was to create a conceptual model that embodies the essential ingredients needed for a collision detection and avoidance system. This system was required to operate in two modes: air traffic controller's perspective and pilot's perspective. The secondary goal was to demonstrate that the technologies, procedures, and decision logic embedded in the conceptual model were able to effectively detect and avoid collision risks from both perspectives. Embodied in the conceptual model are five distinct software modules: Data Acquisition, State

  2. Tachyons imply the existence of a privileged frame

    Energy Technology Data Exchange (ETDEWEB)

    Sjoedin, T.; Heylighen, F.

    1985-12-16

    It is shown that the existence of faster-than-light signals (tachyons) would imply the existence (and detectability) of a privileged inertial frame and that one can avoid all problems with reversed-time order only by using absolute synchronization instead of the standard one. The connection between these results and the EPR-paradox is discussed.

  3. Microscopic model of nucleus-nucleus collisions

    International Nuclear Information System (INIS)

    Harvey, B.G.

    1986-04-01

    The collision of two nuclei is treated as a collection of collisions between the nucleons of the projectile and those of the target nucleus. The primary projectile fragments contain only those nucleons that did not undergo a collision. The inclusive and coincidence cross sections result from the decay of the excited primary fragments. 15 refs., 5 figs

  4. Collision dynamics and particle production in relativistic nucleus- nucleus collisions at CERN

    International Nuclear Information System (INIS)

    Harris, J.W.

    1990-03-01

    The possibility of forming a quark-gluon plasma is the primary motivation for studying nucleus-nucleus collisions at very high energies. Various ''signatures'' for the existence of a quark-gluon plasma in these collisions have been proposed. These include an enhancement in the production of strange particles, suppression of J/Ψ production, observation of direct photons from the plasma, event-by-event fluctuations in the rapidity distributions of produced particles, and various other observables. However, the system will evolve dynamically from a pure plasma or mixed phase through expansion, cooling, hadronization and freezeout into the final state particles. Therefore, to be able to determine that a new, transient state of matter has been formed it will be necessary to understand the space-time evolution of the collision process and the microscopic structure of hadronic interactions, at the level of quarks and gluons, at high temperatures and densities. In this talk I will review briefly the present state of our understanding of the dynamics of these collisions and, in addition, present a few recent results on particle production from the NA35 experiment at CERN. 21 refs., 5 figs

  5. Adiabatic translation factors in slow ion-atom collisions

    International Nuclear Information System (INIS)

    Vaaben, J.; Taulbjerg, K.

    1981-01-01

    The general properties of translation factors in slow atomic collisions are discussed. It is emphasised that an acceptable form of translation factors must be conceptually consistent with the basic underlying assumption of the molecular model; i.e. translation factors must relax adiabatically at intermediate and small internuclear separations. A simple physical argument is applied to derive a general parameter-free expression for the translation factor pertinent to an electron in a two-centre Coulomb field. Within the present approach the adiabatic translation factor is considered to be a property of the two-centre field independently of the molecular state under consideration. The generalisation to many-electron systems is therefore readily made. (author)

  6. Language comprehenders retain implied shape and orientation of objects.

    Science.gov (United States)

    Pecher, Diane; van Dantzig, Saskia; Zwaan, Rolf A; Zeelenberg, René

    2009-06-01

    According to theories of embodied cognition, language comprehenders simulate sensorimotor experiences to represent the meaning of what they read. Previous studies have shown that picture recognition is better if the object in the picture matches the orientation or shape implied by a preceding sentence. In order to test whether strategic imagery may explain previous findings, language comprehenders first read a list of sentences in which objects were mentioned. Only once the complete list had been read was recognition memory tested with pictures. Recognition performance was better if the orientation or shape of the object matched that implied by the sentence, both immediately after reading the complete list of sentences and after a 45-min delay. These results suggest that previously found match effects were not due to strategic imagery and show that details of sensorimotor simulations are retained over longer periods.

  7. Gyrokinetic linearized Landau collision operator

    DEFF Research Database (Denmark)

    Madsen, Jens

    2013-01-01

    , which is important in multiple ion-species plasmas. Second, the equilibrium operator describes drag and diffusion of the magnetic field aligned component of the vorticity associated with the E×B drift. Therefore, a correct description of collisional effects in turbulent plasmas requires the equilibrium......The full gyrokinetic electrostatic linearized Landau collision operator is calculated including the equilibrium operator, which represents the effect of collisions between gyrokinetic Maxwellian particles. First, the equilibrium operator describes energy exchange between different plasma species...... operator, even for like-particle collisions....

  8. CONFERENCE: Photon-photon collisions

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    Despite being difficult to observe, photon-photon collisions have opened up a range of physics difficult, or even impossible, to access by other methods. The progress which has been made in this field was evident at the fifth international workshop on photon-photon collisions, held in Aachen from 13-16 April and attended by some 120 physicists

  9. Heavy ion collisions in AdS5

    International Nuclear Information System (INIS)

    Kovchegov, Yuri V.

    2011-01-01

    We study heavy ion collisions at strong 't Hooft coupling using AdS/CFT correspondence. Heavy ion collisions correspond to gravitational shock wave collisions in AdS 5 . We construct the metric in the forward light cone after the collision perturbatively through expansion of Einstein equations in graviton exchanges. We obtain an analytic expression for the metric including all-order graviton exchanges with one shock wave, while keeping the exchanges with another shock wave at the lowest order. We read off the corresponding energy-momentum tensor of the produced medium. Unfortunately this energy-momentum tensor does not correspond to ideal hydrodynamics, indicating that higher order graviton exchanges are needed to construct the full solution of the problem. We also show that shock waves must completely stop almost immediately after the collision in AdS 5 , which, on the field theory side, corresponds to complete nuclear stopping due to strong coupling effects, likely leading to Landau hydrodynamics. Finally, we perform trapped surface analysis of the shock wave collisions demonstrating that a bulk black hole, corresponding to ideal hydrodynamics on the boundary, has to be created in such collisions, thus constructing a proof of thermalization in heavy ion collisions at strong coupling.

  10. Chirped Auger electron emission due to field-assisted post-collision interaction

    Directory of Open Access Journals (Sweden)

    Bonitz M.

    2013-03-01

    Full Text Available We have investigated the Auger decay in the temporal domain by applying a terahertz streaking light field. Xenon and krypton atoms were studied by implementing the free-electron laser in Hamburg (FLASH as well as a source of high-order harmonic radiation combined with terahertz pulses from an optical rectification source. The observed linewidth asymmetries in the streaked spectra suggest a chirped Auger electron emission which is understood in terms of field-assisted post-collision interaction. The experimentally obtained results agree well with model calculations.

  11. Entropy of the system formed in heavy ion collision

    International Nuclear Information System (INIS)

    Gudima, K.K.; Schulz, H.; Toneev, V.D.

    1985-01-01

    In frames of a cascade model the entropy evolution in a system producted in heavy ion collisions is investigated. Entropy calculation is based on smoothing of the distribution function over the momentum space by the temperature field introduction. The resulting entropy per one nucleon is shown to be rather sensitive to phase space subdivision into cells at the stage of free scattering of reaction products. Compared to recent experimental results for specific entropy values inferred from the composite particle yield of 4π measurements, it is found that cascade calculations do not favour some particular entropy model treatments and suggest smaller entropy values than following from consideration within equilibrium statistics

  12. Positron-atom collisions

    International Nuclear Information System (INIS)

    Drachman, R.J.

    1984-01-01

    The past decade has seen the field of positron-atom collisions mature into an important sub-field of atomic physics. Increasingly intense positron sources are leading towards a situation in which electron and positron collision experiments will be on almost an equal footing, challenging theory to analyze their similarities and differences. The author reviews the advances made in theory, including dispersion theory, resonances, and inelastic processes. A survey of experimental progress and a brief discussion of astrophysical positronics is also included. (Auth.)

  13. Analysis of possible free quarks production process at hadron colliders

    International Nuclear Information System (INIS)

    Boos, E.E.; Ermolov, P.F.; Golubkov, Yu.A.

    1990-01-01

    The authors regard the process of free b-quark production in proton-antiproton collisions at energies of new colliders. It is suggested to use the pair of unlike sign with transverse momenta in the range p tr >5 GeV/c to trigger this process. Additionally it is suggested to measure a weak ionization signal from free s-quark from b-quark decay. The calculations of free bb-quarks production cross-sections have been made taking into account their energy losses in strong colour field. It is shown that the most effective range of lepton transverse momenta for observation of the process does not depend on threshold energy and is approximately equal to one for usual b mesons. 16 refs.; 10 figs

  14. High energy nuclear collisions in the few GeV/nucleon region: projectile and target fragmentation

    International Nuclear Information System (INIS)

    Schroeder, L.S.

    1980-06-01

    A general review of nucleon-nucleus and nucleus-nucleus collisions for incident energies <10 GeV/nucleon is presented. The division of these interactions into peripheral and central collisions is briefly discussed. Subjects treated include the following: target and projectile fragmentation systematics, production of exotic nuclear fragments, studies of multiparticle final states, total cross section measurements, results from an experiment that indicate the production of projectile fragments with an anomalously short reaction mean free path, high-energy particle production at backward angles beyond simple N-N kinematic limits, and recent results on backward particle emission in studies with the Berkeley streamer chamber. Both the particle and nuclear physics aspects that are present are considered. A brief discussion of future trends in this energy range ends the presentation. 65 references, 37 figures

  15. Isotope correlations as a probe for freeze-out characterization: central {sup 124}Sn+{sup 64}Ni, {sup 112}Sn+{sup 58}Ni collisions

    Energy Technology Data Exchange (ETDEWEB)

    Geraci, E.; Alderighi, M.; Anzalone, A.; Auditore, L.; Baran, V.; Bartolucci, M.; Berceanu, I.; Blicharska, J.; Bonasera, A.; Borderie, B.; Bougault, R.; Bruno, M.; Brzychczyk, J.; Cardella, G.; Cavallaro, S.; Chbihi, A.; Cibor, J.; Colonna, M.; D' Agostino, M.; De Filippo, E.; Di Toro, M.; Giustolisi, F.; Grzeszczuk, A.; Guazzoni, P.; Guinet, D.; Iacono-Manno, M.; Kowalski, S.; La Guidara, E.; Lanzalone, G.; Lanzano, G.; Le Neindre, N.; Li, S.; Lo Nigro, S.; Maiolino, C.; Majka, Z.; Manfredi, G.; Paduszynski, T.; Pagano, A.; Papa, M.; Petrovici, M.; Piasecki, E.; Pirrone, S.; Politi, G.; Pop, A.; Porto, F.; Rivet, M.F.; Rosato, E.; Russo, S.; Russotto, P.; Sechi, G.; Simion, V.; Sperduto, M.L.; Steckmeyer, J.C.; Trifiro, A.; Trimarchi, M.; Vannini, G.; Vigilante, M.; Wieleczko, J.P.; Wilczynski, J.; Wu, H.; Xiao, Z.; Zetta, L.; Zipper, W

    2004-04-05

    {sup 124}Sn+{sup 64}Ni and {sup 112}Sn+{sup 58}Ni reactions at 35 AMeV incident energy were studied with the forward part of CHIMERA multi-detector. The most central collisions were selected by means of a multidimensional analysis. The characteristics of the source formed in the central collisions, as size, temperature and volume, were inspected. The measured isotopes of light fragments (3 {<=} Z {<=} 8) were used to examine isotope yield ratios that provide information on the free neutron to proton densities.

  16. Thermalization in nucleus-nucleus collisions

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, F.; Lynch, W.G.; Bowman, D.R.; De Souza, R.T.; Gelbke, C.K.; Kim, Y.D.; Phair, L.; Tsang, M.B.; Williams, C.; Xu, H.M.; Dinius, J. (Dept. of Physics and Astronomy, Michigan State Univ., East Lansing, MI (United States) National Superconducting Cyclotron Lab., Michigan State Univ., East Lansing, MI (United States))

    1992-05-28

    Impact parameter dependent excited state populations of intermediate mass fragments are investigated for {sup 36}Ar induced reactions on {sup 197}Au at E/A=35 MeV. Population inversions, indicative of non-thermal excitation mechanisms, are observed in peripheral collisions characterized by low associated charged particle multiplicities. These population inversions disappear for collisions with larger associated charged particle multiplicities, consistent with a more complete thermalization for more complex final states. Discrepancies, observed in central collisions, suggest that the limit of local thermal equilibrium has not yet been observed. (orig.).

  17. Atomic collisions involving pulsed positrons

    DEFF Research Database (Denmark)

    Merrison, J. P.; Bluhme, H.; Field, D.

    2000-01-01

    Conventional slow positron beams have been widely and profitably used to study atomic collisions and have been instrumental in understanding the dynamics of ionization. The next generation of positron atomic collision studies are possible with the use of charged particle traps. Not only can large...... instantaneous intensities be achieved with in-beam accumulation, but more importantly many orders of magnitude improvement in energy and spatial resolution can be achieved using positron cooling. Atomic collisions can be studied on a new energy scale with unprecedented precion and control. The use...

  18. Mean free paths, viscosity, and the limitations of perfect fluid hydrodynamics in the description of the quark-gluon plasma

    International Nuclear Information System (INIS)

    McLerran, L.

    1985-01-01

    The author discusses the applicability of a hydrodynamic description of high energy hadronic collisions. The author reviews the results of recent computations of the mean free paths of quarks and gluons in a quark-gluon plasma, and the corresponding results for viscous coefficients. These quantities are employed to evaluate the limits to the application of perfect fluid hydrodynamics as a description of the time evolution of matter produced in various hardronic collisions

  19. The Impact of Jump Distributions on the Implied Volatility of Variance

    DEFF Research Database (Denmark)

    Nicolato, Elisa; Pisani, Camilla; Pedersen, David Sloth

    2017-01-01

    We consider a tractable affine stochastic volatility model that generalizes the seminal Heston (1993) model by augmenting it with jumps in the instantaneous variance process. In this framework, we consider both realized variance options and VIX options, and we examine the impact of the distribution...... of jumps on the associated implied volatility smile. We provide sufficient conditions for the asymptotic behavior of the implied volatility of variance for small and large strikes. In particular, by selecting alternative jump distributions, we show that one can obtain fundamentally different shapes...

  20. The implied volatility of U.S. interest rates: evidence from callable U. S. Treasuries

    OpenAIRE

    Robert R. Bliss; Ehud I. Ronn

    1995-01-01

    The prices for callable U.S. Treasury securities provide the sole source of evidence concerning the implied volatility of interest rates over the extended 1926-1994 period. This paper uses the prices of callable as well as non-callable Treasury instruments to estimate implied interest rate volatilities for the past sixty years, and, for the more recent 1989-1994 period, the cross-sectional term structures of implied interest rate volatility. We utilize these estimates to perform cross-section...