WorldWideScience

Sample records for scheme special symmetrical

  1. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  2. A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System

    International Nuclear Information System (INIS)

    Zhang Xiaohong; Min Lequan

    2005-01-01

    Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decrypt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security.

  3. Schur rings and non-symmetric association schemes on 64 vertices

    DEFF Research Database (Denmark)

    Jørgensen, Leif Kjær

    2010-01-01

    In this paper we enumerate essentially all non-symmetric association schemes with three classes, less than 96 vertices and with a regular group of automorphisms. The enumeration is based on a computer search in Schur rings. The most interesting cases have 64 vertices. In one primitive case and in...

  4. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  5. Design of a polynomial ring based symmetric homomorphic encryption scheme

    Directory of Open Access Journals (Sweden)

    Smaranika Dasgupta

    2016-09-01

    Full Text Available Security of data, especially in clouds, has become immensely essential for present-day applications. Fully homomorphic encryption (FHE is a great way to secure data which is used and manipulated by untrusted applications or systems. In this paper, we propose a symmetric FHE scheme based on polynomial over ring of integers. This scheme is somewhat homomorphic due to accumulation of noise after few operations, which is made fully homomorphic using a refresh procedure. After certain amount of homomorphic computations, large ciphertexts are refreshed for proper decryption. The hardness of the scheme is based on the difficulty of factorizing large integers. Also, it requires polynomial addition which is computationally cost effective. Experimental results are shown to support our claim.

  6. Weakly Interacting Symmetric and Anti-Symmetric States in the Bilayer Systems

    Science.gov (United States)

    Marchewka, M.; Sheregii, E. M.; Tralle, I.; Tomaka, G.; Ploch, D.

    We have studied the parallel magneto-transport in DQW-structures of two different potential shapes: quasi-rectangular and quasi-triangular. The quantum beats effect was observed in Shubnikov-de Haas (SdH) oscillations for both types of the DQW structures in perpendicular magnetic filed arrangement. We developed a special scheme for the Landau levels energies calculation by means of which we carried out the necessary simulations of beating effect. In order to obtain the agreement between our experimental data and the results of simulations, we introduced two different quasi-Fermi levels which characterize symmetric and anti-symmetric states in DQWs. The existence of two different quasi Fermi-Levels simply means, that one can treat two sub-systems (charge carriers characterized by symmetric and anti-symmetric wave functions) as weakly interacting and having their own rate of establishing the equilibrium state.

  7. An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Xiuxiu Jiang

    2017-05-01

    Full Text Available Symmetric searchable encryption for cloud storage enables users to retrieve the documents they want in a privacy-preserving way, which has become a hotspot of research. In this paper, we propose an efficient keyword search scheme over encrypted cloud data. We firstly adopt a structure named as inverted matrix (IM to build search index. The IM is consisted of index vectors, each of which is associated with a keyword. Then we map a keyword to an address used to locate the corresponding index vector. Finally, we mask index vectors with pseudo-random bits to obtain an encrypted enlarged inverted matrix (EEIM. Through the security analysis and experimental evaluation, we demonstrate the privacy and efficiency of our scheme respectively. In addition, we further consider two extended practical search situations, i.e., occurrence queries and dynamic user management, and then give two relevant schemes.

  8. A Searchable Symmetric Encryption Scheme using BlockChain

    OpenAIRE

    Li, Huige; Zhang, Fangguo; He, Jiejie; Tian, Haibo

    2017-01-01

    At present, the cloud storage used in searchable symmetric encryption schemes (SSE) is provided in a private way, which cannot be seen as a true cloud. Moreover, the cloud server is thought to be credible, because it always returns the search result to the user, even they are not correct. In order to really resist this malicious adversary and accelerate the usage of the data, it is necessary to store the data on a public chain, which can be seen as a decentralized system. As the increasing am...

  9. Linear perturbation of spherically symmetric flows: a first-order upwind scheme for the gas dynamics equations in Lagrangian coordinates

    International Nuclear Information System (INIS)

    Clarisse, J.M.

    2007-01-01

    A numerical scheme for computing linear Lagrangian perturbations of spherically symmetric flows of gas dynamics is proposed. This explicit first-order scheme uses the Roe method in Lagrangian coordinates, for computing the radial spherically symmetric mean flow, and its linearized version, for treating the three-dimensional linear perturbations. Fulfillment of the geometric conservation law discrete formulations for both the mean flow and its perturbation is ensured. This scheme capabilities are illustrated by the computation of free-surface mode evolutions at the boundaries of a spherical hollow shell undergoing an homogeneous cumulative compression, showing excellent agreement with reference results. (author)

  10. On the axially symmetric equilibrium of a magnetically confined plasma

    International Nuclear Information System (INIS)

    Lehnert, B.

    1975-01-01

    The axially symmetric equilibrium of a magnetically confined plasma is reconsidered, with the special purpose of studying high-beta schemes with a purely poloidal magnetic field. A number of special solutions of the pressure and magnetic flux functions are shown to exist, the obtained results may form starting-points in a further analysis of physically relevant configurations. (Auth.)

  11. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  12. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  13. Bilaterally symmetric Fourier approximations of the skull outlines of ...

    Indian Academy of Sciences (India)

    Present work illustrates a scheme of quantitative description of the shape of the skull outlines of temnospondyl amphibians using bilaterally symmetric closed Fourier curves. Some special points have been identified on the Fourier fits of the skull outlines, which are the local maxima, or minima of the distances from the ...

  14. A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems.

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Di

    Full Text Available Both symmetric and asymmetric color image encryption have advantages and disadvantages. In order to combine their advantages and try to overcome their disadvantages, chaos synchronization is used to avoid the key transmission for the proposed semi-symmetric image encryption scheme. Our scheme is a hybrid chaotic encryption algorithm, and it consists of a scrambling stage and a diffusion stage. The control law and the update rule of function projective synchronization between the 3-cell quantum cellular neural networks (QCNN response system and the 6th-order cellular neural network (CNN drive system are formulated. Since the function projective synchronization is used to synchronize the response system and drive system, Alice and Bob got the key by two different chaotic systems independently and avoid the key transmission by some extra security links, which prevents security key leakage during the transmission. Both numerical simulations and security analyses such as information entropy analysis, differential attack are conducted to verify the feasibility, security, and efficiency of the proposed scheme.

  15. A symmetric image encryption scheme based on 3D chaotic cat maps

    International Nuclear Information System (INIS)

    Chen Guanrong; Mao Yaobin; Chui, Charles K.

    2004-01-01

    Encryption of images is different from that of texts due to some intrinsic features of images such as bulk data capacity and high redundancy, which are generally difficult to handle by traditional methods. Due to the exceptionally desirable properties of mixing and sensitivity to initial conditions and parameters of chaotic maps, chaos-based encryption has suggested a new and efficient way to deal with the intractable problem of fast and highly secure image encryption. In this paper, the two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme. This new scheme employs the 3D cat map to shuffle the positions (and, if desired, grey values as well) of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security and fast encryption speed of the new scheme

  16. Connections of geometric measure of entanglement of pure symmetric states to quantum state estimation

    International Nuclear Information System (INIS)

    Chen Lin; Zhu Huangjun; Wei, Tzu-Chieh

    2011-01-01

    We study the geometric measure of entanglement (GM) of pure symmetric states related to rank 1 positive-operator-valued measures (POVMs) and establish a general connection with quantum state estimation theory, especially the maximum likelihood principle. Based on this connection, we provide a method for computing the GM of these states and demonstrate its additivity property under certain conditions. In particular, we prove the additivity of the GM of pure symmetric multiqubit states whose Majorana points under Majorana representation are distributed within a half sphere, including all pure symmetric three-qubit states. We then introduce a family of symmetric states that are generated from mutually unbiased bases and derive an analytical formula for their GM. These states include Dicke states as special cases, which have already been realized in experiments. We also derive the GM of symmetric states generated from symmetric informationally complete POVMs (SIC POVMs) and use it to characterize all inequivalent SIC POVMs in three-dimensional Hilbert space that are covariant with respect to the Heisenberg-Weyl group. Finally, we describe an experimental scheme for creating the symmetric multiqubit states studied in this article and a possible scheme for measuring the permanence of the related Gram matrix.

  17. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  18. A space-time lower-upper symmetric Gauss-Seidel scheme for the time-spectral method

    Science.gov (United States)

    Zhan, Lei; Xiong, Juntao; Liu, Feng

    2016-05-01

    The time-spectral method (TSM) offers the advantage of increased order of accuracy compared to methods using finite-difference in time for periodic unsteady flow problems. Explicit Runge-Kutta pseudo-time marching and implicit schemes have been developed to solve iteratively the space-time coupled nonlinear equations resulting from TSM. Convergence of the explicit schemes is slow because of the stringent time-step limit. Many implicit methods have been developed for TSM. Their computational efficiency is, however, still limited in practice because of delayed implicit temporal coupling, multiple iterative loops, costly matrix operations, or lack of strong diagonal dominance of the implicit operator matrix. To overcome these shortcomings, an efficient space-time lower-upper symmetric Gauss-Seidel (ST-LU-SGS) implicit scheme with multigrid acceleration is presented. In this scheme, the implicit temporal coupling term is split as one additional dimension of space in the LU-SGS sweeps. To improve numerical stability for periodic flows with high frequency, a modification to the ST-LU-SGS scheme is proposed. Numerical results show that fast convergence is achieved using large or even infinite Courant-Friedrichs-Lewy (CFL) numbers for unsteady flow problems with moderately high frequency and with the use of moderately high numbers of time intervals. The ST-LU-SGS implicit scheme is also found to work well in calculating periodic flow problems where the frequency is not known a priori and needed to be determined by using a combined Fourier analysis and gradient-based search algorithm.

  19. Symmetric eikonal expansion

    International Nuclear Information System (INIS)

    Matsuki, Takayuki

    1976-01-01

    Symmetric eikonal expansion for the scattering amplitude is formulated for nonrelativistic and relativistic potential scatterings and also for the quantum field theory. The first approximations coincide with those of Levy and Sucher. The obtained scattering amplitudes are time reversal invariant for all cases and are crossing symmetric for the quantum field theory in each order of approximation. The improved eikonal phase introduced by Levy and Sucher is also derived from the different approximation scheme from the above. (auth.)

  20. Quantum Communication Scheme Using Non-symmetric Quantum Channel

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Zhonghua; Song Heshan

    2008-01-01

    A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel

  1. On the symmetric α-stable distribution with application to symbol error rate calculations

    KAUST Repository

    Soury, Hamza

    2016-12-24

    The probability density function (PDF) of the symmetric α-stable distribution is investigated using the inverse Fourier transform of its characteristic function. For general values of the stable parameter α, it is shown that the PDF and the cumulative distribution function of the symmetric stable distribution can be expressed in terms of the Fox H function as closed-form. As an application, the probability of error of single input single output communication systems using different modulation schemes with an α-stable perturbation is studied. In more details, a generic formula is derived for generalized fading distribution, such as the extended generalized-k distribution. Later, simpler expressions of these error rates are deduced for some selected special cases and compact approximations are derived using asymptotic expansions.

  2. An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption

    Science.gov (United States)

    Sun, Xiaoqiang; Wang, Ting; Sun, Zhiwei; Wang, Ping; Yu, Jianping; Xie, Weixin

    2017-04-01

    In 2009, Gentry first introduced an ideal lattices fully homomorphic encryption (FHE) scheme. Later, based on the approximate greatest common divisor problem, learning with errors problem or learning with errors over rings problem, FHE has developed rapidly, along with the low efficiency and computational security. Combined with quantum mechanics, Liang proposed a symmetric quantum somewhat homomorphic encryption (QSHE) scheme based on quantum one-time pad, which is unconditional security. And it was converted to a quantum fully homomorphic encryption scheme, whose evaluation algorithm is based on the secret key. Compared with Liang's QSHE scheme, we propose a more efficient QSHE scheme for classical input states with perfect security, which is used to encrypt the classical message, and the secret key is not required in the evaluation algorithm. Furthermore, an efficient symmetric searchable encryption (SSE) scheme is constructed based on our QSHE scheme. SSE is important in the cloud storage, which allows users to offload search queries to the untrusted cloud. Then the cloud is responsible for returning encrypted files that match search queries (also encrypted), which protects users' privacy.

  3. Distributed Searchable Symmetric Encryption

    NARCIS (Netherlands)

    Bösch, C.T.; Peter, Andreas; Leenders, Bram; Lim, Hoon Wei; Tang, Qiang; Wang, Huaxiong; Hartel, Pieter H.; Jonker, Willem

    Searchable Symmetric Encryption (SSE) allows a client to store encrypted data on a storage provider in such a way, that the client is able to search and retrieve the data selectively without the storage provider learning the contents of the data or the words being searched for. Practical SSE schemes

  4. The symmetric MSD encoder for one-step adder of ternary optical computer

    Science.gov (United States)

    Kai, Song; LiPing, Yan

    2016-08-01

    The symmetric Modified Signed-Digit (MSD) encoding is important for achieving the one-step MSD adder of Ternary Optical Computer (TOC). The paper described the symmetric MSD encoding algorithm in detail, and developed its truth table which has nine rows and nine columns. According to the truth table, the state table was developed, and the optical-path structure and circuit-implementation scheme of the symmetric MSD encoder (SME) for one-step adder of TOC were proposed. Finally, a series of experiments were designed and performed. The observed results of the experiments showed that the scheme to implement SME was correct, feasible and efficient.

  5. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  6. Commutative curvature operators over four-dimensional generalized symmetric

    Directory of Open Access Journals (Sweden)

    Ali Haji-Badali

    2014-12-01

    Full Text Available Commutative properties of four-dimensional generalized symmetric pseudo-Riemannian manifolds were considered. Specially, in this paper, we studied Skew-Tsankov and Jacobi-Tsankov conditions in 4-dimensional pseudo-Riemannian generalized symmetric manifolds.

  7. Application of Central Upwind Scheme for Solving Special Relativistic Hydrodynamic Equations

    Science.gov (United States)

    Yousaf, Muhammad; Ghaffar, Tayabia; Qamar, Shamsul

    2015-01-01

    The accurate modeling of various features in high energy astrophysical scenarios requires the solution of the Einstein equations together with those of special relativistic hydrodynamics (SRHD). Such models are more complicated than the non-relativistic ones due to the nonlinear relations between the conserved and state variables. A high-resolution shock-capturing central upwind scheme is implemented to solve the given set of equations. The proposed technique uses the precise information of local propagation speeds to avoid the excessive numerical diffusion. The second order accuracy of the scheme is obtained with the use of MUSCL-type initial reconstruction and Runge-Kutta time stepping method. After a discussion of the equations solved and of the techniques employed, a series of one and two-dimensional test problems are carried out. To validate the method and assess its accuracy, the staggered central and the kinetic flux-vector splitting schemes are also applied to the same model. The scheme is robust and efficient. Its results are comparable to those obtained from the sophisticated algorithms, even in the case of highly relativistic two-dimensional test problems. PMID:26070067

  8. Numerical solution of special ultra-relativistic Euler equations using central upwind scheme

    Science.gov (United States)

    Ghaffar, Tayabia; Yousaf, Muhammad; Qamar, Shamsul

    2018-06-01

    This article is concerned with the numerical approximation of one and two-dimensional special ultra-relativistic Euler equations. The governing equations are coupled first-order nonlinear hyperbolic partial differential equations. These equations describe perfect fluid flow in terms of the particle density, the four-velocity and the pressure. A high-resolution shock-capturing central upwind scheme is employed to solve the model equations. To avoid excessive numerical diffusion, the considered scheme avails the specific information of local propagation speeds. By using Runge-Kutta time stepping method and MUSCL-type initial reconstruction, we have obtained 2nd order accuracy of the proposed scheme. After discussing the model equations and the numerical technique, several 1D and 2D test problems are investigated. For all the numerical test cases, our proposed scheme demonstrates very good agreement with the results obtained by well-established algorithms, even in the case of highly relativistic 2D test problems. For validation and comparison, the staggered central scheme and the kinetic flux-vector splitting (KFVS) method are also implemented to the same model. The robustness and efficiency of central upwind scheme is demonstrated by the numerical results.

  9. Two-level schemes for the advection equation

    Science.gov (United States)

    Vabishchevich, Petr N.

    2018-06-01

    The advection equation is the basis for mathematical models of continuum mechanics. In the approximate solution of nonstationary problems it is necessary to inherit main properties of the conservatism and monotonicity of the solution. In this paper, the advection equation is written in the symmetric form, where the advection operator is the half-sum of advection operators in conservative (divergent) and non-conservative (characteristic) forms. The advection operator is skew-symmetric. Standard finite element approximations in space are used. The standard explicit two-level scheme for the advection equation is absolutely unstable. New conditionally stable regularized schemes are constructed, on the basis of the general theory of stability (well-posedness) of operator-difference schemes, the stability conditions of the explicit Lax-Wendroff scheme are established. Unconditionally stable and conservative schemes are implicit schemes of the second (Crank-Nicolson scheme) and fourth order. The conditionally stable implicit Lax-Wendroff scheme is constructed. The accuracy of the investigated explicit and implicit two-level schemes for an approximate solution of the advection equation is illustrated by the numerical results of a model two-dimensional problem.

  10. On the security of 3D Cat map based symmetric image encryption scheme

    International Nuclear Information System (INIS)

    Wang Kai; Pei, W.-J.; Zou, Liuhua; Song Aiguo; He Zhenya

    2005-01-01

    A 3D Cat map based symmetric image encryption algorithm, which significantly increases the resistance against statistical and differential attacks, has been proposed recently. It employs a 3D Cat map to shuffle the positions of image pixels and uses the Logistic map to diffuse the relationship between the cipher-image and the plain-image. Based on the factor that it is sufficient to break this cryptosystem only with the equivalent control parameters, some fundamental weaknesses of the cryptosystem are pointed out. With the knowledge of symbolic dynamics and some specially designed plain-images, we can calculate the equivalent initial condition of diffusion process and rebuild a valid equivalent 3D Cat matrix. In this Letter, we will propose a successful chosen-plain-text cryptanalytic attack, which is composed of two mutually independent procedures: the cryptanalysis of the diffusion process and the cryptanalysis of the spatial permutation process. Both theoretical and experimental results show that the lack of security discourages the use of these cryptosystems for practical applications

  11. Satisfaction rates with the current Special Type Consultation (STC) reimbursement scheme among General Practitioners – A Mixed Methods Study.

    LENUS (Irish Health Repository)

    Kiely, A

    2017-03-01

    The Special Type Consultation (STC) scheme is a fee-for-service reimbursement scheme for General Practitioners (GPs) in Ireland. Introduced in 1989, the scheme includes specified patient services involving the application of a learned skill, e.g. suturing. This study aims to establish the extent to which GPs believe this scheme is appropriate for current General Practice. This is an embedded mixed-methods study combining quantitative data on GPs working experience of and qualitative data on GPs attitudes towards the scheme. Data were collected by means of an anonymous postal questionnaire. The response rate was 60.4% (n=159.) Twenty-nine percent (n=46) disagreed and 65% (n=104) strongly disagreed that the current list of special items is satisfactory. Two overriding themes were identified: economics and advancement of the STC process. This study demonstrates an overwhelming consensus among GPs that the current STC scheme is outdated and in urgent need of revision to reflect modern General Practice.

  12. Linear perturbation of spherically symmetric flows: a first-order upwind scheme for the gas dynamics equations in Lagrangian coordinates; Perturbation lineaire d'ecoulements a symetrie spherique: schema decentre d'ordre 1 pour les equations de la dynamique des gaz en variables de Lagrange

    Energy Technology Data Exchange (ETDEWEB)

    Clarisse, J.M

    2007-07-01

    A numerical scheme for computing linear Lagrangian perturbations of spherically symmetric flows of gas dynamics is proposed. This explicit first-order scheme uses the Roe method in Lagrangian coordinates, for computing the radial spherically symmetric mean flow, and its linearized version, for treating the three-dimensional linear perturbations. Fulfillment of the geometric conservation law discrete formulations for both the mean flow and its perturbation is ensured. This scheme capabilities are illustrated by the computation of free-surface mode evolutions at the boundaries of a spherical hollow shell undergoing an homogeneous cumulative compression, showing excellent agreement with reference results. (author)

  13. The use of the MacCormack scheme in computational hydraulics

    International Nuclear Information System (INIS)

    Garcia, R.; Zhang, H.; Kahawita, R.

    1985-01-01

    This manuscript describes the development of a numerical model that solves shallow water problems based upon an enhanced version of the MacCormack explicit scheme (MS). The MS has been successfully applied to solve numerous problems in gas dynamics. However, the standard application of the MS to solve the shallow water equations can cause in certain test cases non-linear instabilities and non-symmetrical results that eventually destroy the solution. By examining the calculation 'cell' one can show that the MS is not symmetric in space, which explains why it cannot be used directly in the treatment of hydraulic problems most of which possess irregular boundaries thereby resulting in a flow with no 'preferred direction'. This is contrary to what is usually encountered in aerodynamics. The enhanced MacCormack scheme is obtained by a simple modification to the original formulation resulting in a symmetric scheme. The scheme has been applied to the computation of the flowfield in a real life situation with satisfactory results. (author)

  14. All-optical symmetric ternary logic gate

    Science.gov (United States)

    Chattopadhyay, Tanay

    2010-09-01

    Symmetric ternary number (radix=3) has three logical states (1¯, 0, 1). It is very much useful in carry free arithmetical operation. Beside this, the logical operation using this type of number system is also effective in high speed computation and communication in multi-valued logic. In this literature all-optical circuits for three basic symmetrical ternary logical operations (inversion, MIN and MAX) are proposed and described. Numerical simulation verifies the theoretical model. In this present scheme the different ternary logical states are represented by different polarized state of light. Terahertz optical asymmetric demultiplexer (TOAD) based interferometric switch has been used categorically in this manuscript.

  15. The Approximate Capacity Region of the Symmetric $K$-user Gaussian Interference Channel with Strong Interference

    KAUST Repository

    Chaaban, Anas

    2016-03-01

    The symmetric K-user interference channel is studied with the goal of characterizing its capacity region in the strong interference regime within a constant gap. The achievable rate region of a scheme combining rate-splitting at the transmitters and interference alignment and successive decoding/computation at the receivers is derived. Next it is shown that this scheme achieves the so-called greedy-max corner points of the capacity region within a constant gap. By combining this result with previous results by Ordentlich et al. on the sum-capacity of the symmetric interference channel, a constant gap characterization of the capacity region for the strong interference regime is obtained. This leads to the first approximate characterization of the capacity region of the symmetric K-user IC. Furthermore, a new scheme that achieves the sum-capacity of the channel in the strong interference regime within a constant gap is also proposed, and the corresponding gap is calculated. The advantage of the new scheme is that it leads to a characterization within a constant gap without leaving an outage set contrary to the scheme by Ordentlich et al..

  16. The Approximate Capacity Region of the Symmetric $K$-user Gaussian Interference Channel with Strong Interference

    KAUST Repository

    Chaaban, Anas; Sezgin, Aydin

    2016-01-01

    The symmetric K-user interference channel is studied with the goal of characterizing its capacity region in the strong interference regime within a constant gap. The achievable rate region of a scheme combining rate-splitting at the transmitters and interference alignment and successive decoding/computation at the receivers is derived. Next it is shown that this scheme achieves the so-called greedy-max corner points of the capacity region within a constant gap. By combining this result with previous results by Ordentlich et al. on the sum-capacity of the symmetric interference channel, a constant gap characterization of the capacity region for the strong interference regime is obtained. This leads to the first approximate characterization of the capacity region of the symmetric K-user IC. Furthermore, a new scheme that achieves the sum-capacity of the channel in the strong interference regime within a constant gap is also proposed, and the corresponding gap is calculated. The advantage of the new scheme is that it leads to a characterization within a constant gap without leaving an outage set contrary to the scheme by Ordentlich et al..

  17. A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

    Science.gov (United States)

    Luo, Guangchun; Qin, Ke

    2014-01-01

    Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. We prove that asymmetric searchable structure could be converted to symmetric structure, and functions could be modeled separately apart from the core searchable structure. Based on this observation, we propose a layered searchable encryption (LSE) scheme, which provides compatibility, flexibility, and security for various settings and functionalities. In this scheme, the outputs of the core searchable component based on either symmetric or asymmetric setting are converted to some uniform mappings, which are then transmitted to loosely coupled functional components to further filter the results. In such a way, all functional components could directly support both symmetric and asymmetric settings. Based on LSE, we propose two representative and novel constructions for ranked keyword query (previously only available in symmetric scheme) and range query (previously only available in asymmetric scheme). PMID:24719565

  18. The generalised Sylvester matrix equations over the generalised bisymmetric and skew-symmetric matrices

    Science.gov (United States)

    Dehghan, Mehdi; Hajarian, Masoud

    2012-08-01

    A matrix P is called a symmetric orthogonal if P = P T = P -1. A matrix X is said to be a generalised bisymmetric with respect to P if X = X T = PXP. It is obvious that any symmetric matrix is also a generalised bisymmetric matrix with respect to I (identity matrix). By extending the idea of the Jacobi and the Gauss-Seidel iterations, this article proposes two new iterative methods, respectively, for computing the generalised bisymmetric (containing symmetric solution as a special case) and skew-symmetric solutions of the generalised Sylvester matrix equation ? (including Sylvester and Lyapunov matrix equations as special cases) which is encountered in many systems and control applications. When the generalised Sylvester matrix equation has a unique generalised bisymmetric (skew-symmetric) solution, the first (second) iterative method converges to the generalised bisymmetric (skew-symmetric) solution of this matrix equation for any initial generalised bisymmetric (skew-symmetric) matrix. Finally, some numerical results are given to illustrate the effect of the theoretical results.

  19. The use of the MacCormack scheme in computational hydraulics

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, R. [Universidad Central de Venezuela, Inst. de Mecanica de Fluidos, Caracas (Venezuela); Zhang, H.; Kahawita, R. [Ecole Polytechnique, Dept. of Civil Engineering, Montreal, Quebec (Canada)

    1985-07-01

    This manuscript describes the development of a numerical model that solves shallow water problems based upon an enhanced version of the MacCormack explicit scheme (MS). The MS has been successfully applied to solve numerous problems in gas dynamics. However, the standard application of the MS to solve the shallow water equations can cause in certain test cases non-linear instabilities and non-symmetrical results that eventually destroy the solution. By examining the calculation 'cell' one can show that the MS is not symmetric in space, which explains why it cannot be used directly in the treatment of hydraulic problems most of which possess irregular boundaries thereby resulting in a flow with no 'preferred direction'. This is contrary to what is usually encountered in aerodynamics. The enhanced MacCormack scheme is obtained by a simple modification to the original formulation resulting in a symmetric scheme. The scheme has been applied to the computation of the flowfield in a real life situation with satisfactory results. (author)

  20. Symmetrized neutron transport equation and the fast Fourier transform method

    International Nuclear Information System (INIS)

    Sinh, N.Q.; Kisynski, J.; Mika, J.

    1978-01-01

    The differential equation obtained from the neutron transport equation by the application of the source iteration method in two-dimensional rectangular geometry is transformed into a symmetrized form with respect to one of the angular variables. The discretization of the symmetrized equation leads to finite difference equations based on the five-point scheme and solved by use of the fast Fourier transform method. Possible advantages of the approach are shown on test calculations

  1. The arbitrary order mimetic finite difference method for a diffusion equation with a non-symmetric diffusion tensor

    Science.gov (United States)

    Gyrya, V.; Lipnikov, K.

    2017-11-01

    We present the arbitrary order mimetic finite difference (MFD) discretization for the diffusion equation with non-symmetric tensorial diffusion coefficient in a mixed formulation on general polygonal meshes. The diffusion tensor is assumed to be positive definite. The asymmetry of the diffusion tensor requires changes to the standard MFD construction. We present new approach for the construction that guarantees positive definiteness of the non-symmetric mass matrix in the space of discrete velocities. The numerically observed convergence rate for the scalar quantity matches the predicted one in the case of the lowest order mimetic scheme. For higher orders schemes, we observed super-convergence by one order for the scalar variable which is consistent with the previously published result for a symmetric diffusion tensor. The new scheme was also tested on a time-dependent problem modeling the Hall effect in the resistive magnetohydrodynamics.

  2. TAX AND ACCOUNTING IMPLICATIONS OF THE USE OF SPECIAL CHARGE SCHEME FOR SECOND-HAND GOODS TO THE PAWN SHOPS IN ROMANIA

    Directory of Open Access Journals (Sweden)

    NICOLAE ECOBICI

    2010-01-01

    Full Text Available In the same time with the crisis deepening in Romania, pawn businessesare also growing. In this paper we discussed several issues concerning the choice of the schemeof registration and determination of value added tax at Pawn Shops, together with the tax andaccounting implications of this choice. Therefore, we presented the theoretical aspectsregarding the likelihood of Pawn Shops to choose the special scheme for second-hand goods, asthey are covered by the Fiscal Code. At the end of this paper we presented based on an examplethe tax and accounting implications of such special scheme as compared with the “normal”scheme regarding VAT at the Pawn Shops in Romania.

  3. Probabilistic Teleportation of Arbitrary Two-Qubit Quantum State via Non-Symmetric Quantum Channel

    Directory of Open Access Journals (Sweden)

    Kan Wang

    2018-03-01

    Full Text Available Quantum teleportation has significant meaning in quantum information. In particular, entangled states can also be used for perfectly teleporting the quantum state with some probability. This is more practical and efficient in practice. In this paper, we propose schemes to use non-symmetric quantum channel combinations for probabilistic teleportation of an arbitrary two-qubit quantum state from sender to receiver. The non-symmetric quantum channel is composed of a two-qubit partially entangled state and a three-qubit partially entangled state, where partially entangled Greenberger–Horne–Zeilinger (GHZ state and W state are considered, respectively. All schemes are presented in detail and the unitary operations required are given in concise formulas. Methods are provided for reducing classical communication cost and combining operations to simplify the manipulation. Moreover, our schemes are flexible and applicable in different situations.

  4. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  5. Analytical Study on Propagation Dynamics of Optical Beam in Parity-Time Symmetric Optical Couplers

    International Nuclear Information System (INIS)

    Zhou Zheng; Zhang Li-Juan; Zhu Bo

    2015-01-01

    We present exact analytical solutions to parity-time (PT) symmetric optical system describing light transport in PT-symmetric optical couplers. We show that light intensity oscillates periodically between two waveguides for unbroken PT-symmetric phase, whereas light always leaves the system from the waveguide experiencing gain when light is initially input at either waveguide experiencing gain or waveguide experiencing loss for broken PT-symmetric phase. These analytical results agree with the recent experimental observation reported by Rüter et al. [Nat. Phys. 6 (2010) 192]. Besides, we present a scheme for manipulating PT symmetry by applying a periodic modulation. Our results provide an efficient way to control light propagation in periodically modulated PT-symmetric system by tuning the modulation amplitude and frequency. (paper)

  6. Duality, phase structures, and dilemmas in symmetric quantum games

    International Nuclear Information System (INIS)

    Ichikawa, Tsubasa; Tsutsui, Izumi

    2007-01-01

    Symmetric quantum games for 2-player, 2-qubit strategies are analyzed in detail by using a scheme in which all pure states in the 2-qubit Hilbert space are utilized for strategies. We consider two different types of symmetric games exemplified by the familiar games, the Battle of the Sexes (BoS) and the Prisoners' Dilemma (PD). These two types of symmetric games are shown to be related by a duality map, which ensures that they share common phase structures with respect to the equilibria of the strategies. We find eight distinct phase structures possible for the symmetric games, which are determined by the classical payoff matrices from which the quantum games are defined. We also discuss the possibility of resolving the dilemmas in the classical BoS, PD, and the Stag Hunt (SH) game based on the phase structures obtained in the quantum games. It is observed that quantization cannot resolve the dilemma fully for the BoS, while it generically can for the PD and SH if appropriate correlations for the strategies of the players are provided

  7. Solving symmetric-definite quadratic lambda-matrix problems without factorization

    International Nuclear Information System (INIS)

    Scott, D.S.; Ward, R.C.

    1982-01-01

    Algorithms are presented for computing some of the eigenvalues and their associated eigenvectors of the quadratic lambda-matrix M lambda 2 C lambda + K. M, C, and K are assumed to have special symmetry-type properties which insure that theory analogous to the standard symmetric eigenproblem exists. The algorithms are based on a generalization of the Rayleigh quotient and the Lanczos method for computing eigenpairs of standard symmetric eigenproblems. Monotone quadratic convergence of the basic method is proved. Test examples are presented

  8. Physical aspects of pseudo-Hermitian and PT-symmetric quantum mechanics

    International Nuclear Information System (INIS)

    Mostafazadeh, Ali; Batal, Ahmet

    2004-01-01

    For a non-Hermitian Hamiltonian H possessing a real spectrum, we introduce a canonical orthonormal basis in which a previously introduced unitary mapping of H to a Hermitian Hamiltonian h takes a simple form. We use this basis to construct the observables O α of the quantum mechanics based on H. In particular, we introduce pseudo-Hermitian position and momentum operators and a pseudo-Hermitian quantization scheme that relates the latter to the ordinary classical position and momentum observables. These allow us to address the problem of determining the conserved probability density and the underlying classical system for pseudo-Hermitian and in particular PT-symmetric quantum systems. As a concrete example we construct the Hermitian Hamiltonian h, the physical observables O α , the localized states and the conserved probability density for the non-Hermitian PT-symmetric square well. We achieve this by employing an appropriate perturbation scheme. For this system, we conduct a comprehensive study of both the kinematical and dynamical effects of the non-Hermiticity of the Hamiltonian on various physical quantities. In particular, we show that these effects are quantum mechanical in nature and diminish in the classical limit. Our results provide an objective assessment of the physical aspects of PT-symmetric quantum mechanics and clarify its relationship with both conventional quantum mechanics and classical mechanics

  9. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk

  10. Substring-Searchable Symmetric Encryption

    Directory of Open Access Journals (Sweden)

    Chase Melissa

    2015-06-01

    Full Text Available In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s. First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE and structured encryption. Then, we construct a queryable encryption scheme for substring queries. Our construction uses suffix trees and achieves asymptotic efficiency comparable to that of unencrypted suffix trees. Encryption of a string of length n takes O(λn time and produces a ciphertext of size O(λn, and querying for a substring of length m that occurs k times takes O(λm+k time and three rounds of communication. Our security definition guarantees correctness of query results and privacy of data and queries against a malicious adversary. Following the line of work started by Curtmola et al. (ACM CCS 2006, in order to construct more efficient schemes we allow the query protocol to leak some limited information that is captured precisely in the definition. We prove security of our substring-searchable encryption scheme against malicious adversaries, where the query protocol leaks limited information about memory access patterns through the suffix tree of the encrypted string.

  11. A viewpoint on nearly conformally symmetric manifold

    International Nuclear Information System (INIS)

    Rahman, M.S.

    1990-06-01

    Some observations, with definition, on Nearly Conformally Symmetric (NCS) manifold are made. A number of theorems concerning conformal change of metric and parallel tensors on NCS manifolds are presented. It is illustrated that a manifold M = R n-1 x R + 1 , endowed with a special metric, is NCS but not of harmonic curvature. (author). 8 refs

  12. Remote unambiguous discrimination of linearly independent symmetric d-level quantum states

    International Nuclear Information System (INIS)

    Chen Libing; Liu Yuhua; Tan Peng; Lu Hong

    2009-01-01

    A set of linearly independent nonorthogonal symmetric d-level quantum states can be discriminated remotely and unambiguously with the aid of two-level Einstein-Podolsky-Rosen (EPR) states. We present a scheme for such a kind of remote unambiguous quantum state discrimination (UD). The probability of discrimination is in agreement with the optimal probability for local unambiguous discrimination among d symmetric states (Chefles and Barnettt 1998 Phys. Lett. A 250 223). This scheme consists of a remote generalized measurement described by a positive operator valued measurement (POVM). This remote POVM can be realized by performing a nonlocal 2d x 2d unitary operation on two spatially separated systems, one is the qudit which is encoded by one of the d symmetric nonorthogonal states to be distinguished and the other is an ancillary qubit, and a conventional local von Neumann orthogonal measurement on the ancilla. By decomposing the evolution process from the initial state to the final state, we construct a quantum network for realizing the remote POVM with a set of two-level nonlocal controlled-rotation gates, and thus provide a feasible physical means to realize the remote UD. A two-level nonlocal controlled-rotation gate can be implemented by using a two-level EPR pair in addition to local operations and classical communications (LOCCs)

  13. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  14. Quantum work relations and response theory in parity-time-symmetric quantum systems

    Science.gov (United States)

    Wei, Bo-Bo

    2018-01-01

    In this work, we show that a universal quantum work relation for a quantum system driven arbitrarily far from equilibrium extends to a parity-time- (PT -) symmetric quantum system with unbroken PT symmetry, which is a consequence of microscopic reversibility. The quantum Jarzynski equality, linear response theory, and Onsager reciprocal relations for the PT -symmetric quantum system are recovered as special cases of the universal quantum work relation in a PT -symmetric quantum system. In the regime of broken PT symmetry, the universal quantum work relation does not hold because the norm is not preserved during the dynamics.

  15. Causal symmetric spaces

    CERN Document Server

    Olafsson, Gestur; Helgason, Sigurdur

    1996-01-01

    This book is intended to introduce researchers and graduate students to the concepts of causal symmetric spaces. To date, results of recent studies considered standard by specialists have not been widely published. This book seeks to bring this information to students and researchers in geometry and analysis on causal symmetric spaces.Includes the newest results in harmonic analysis including Spherical functions on ordered symmetric space and the holmorphic discrete series and Hardy spaces on compactly casual symmetric spacesDeals with the infinitesimal situation, coverings of symmetric spaces, classification of causal symmetric pairs and invariant cone fieldsPresents basic geometric properties of semi-simple symmetric spacesIncludes appendices on Lie algebras and Lie groups, Bounded symmetric domains (Cayley transforms), Antiholomorphic Involutions on Bounded Domains and Para-Hermitian Symmetric Spaces

  16. A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-Box Matrix

    OpenAIRE

    Subhranil Som; Soumasree Banerjee

    2014-01-01

    In this paper a symmetric key cryptographic algorithm named as “A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-box Matrix“ is proposed. Secret sharing is a technique by which any information can be break down into small pieces. The secret can be reconstructed only when a sufficient number of pieces of shares are combined together; individual shares are of no use on their own. Traditional secret sharing scheme possesses high computational ...

  17. A symmetrical image encryption scheme in wavelet and time domain

    Science.gov (United States)

    Luo, Yuling; Du, Minghui; Liu, Junxiu

    2015-02-01

    There has been an increasing concern for effective storages and secure transactions of multimedia information over the Internet. Then a great variety of encryption schemes have been proposed to ensure the information security while transmitting, but most of current approaches are designed to diffuse the data only in spatial domain which result in reducing storage efficiency. A lightweight image encryption strategy based on chaos is proposed in this paper. The encryption process is designed in transform domain. The original image is decomposed into approximation and detail components using integer wavelet transform (IWT); then as the more important component of the image, the approximation coefficients are diffused by secret keys generated from a spatiotemporal chaotic system followed by inverse IWT to construct the diffused image; finally a plain permutation is performed for diffusion image by the Logistic mapping in order to reduce the correlation between adjacent pixels further. Experimental results and performance analysis demonstrate the proposed scheme is an efficient, secure and robust encryption mechanism and it realizes effective coding compression to satisfy desirable storage.

  18. Algorithms for sparse, symmetric, definite quadratic lambda-matrix eigenproblems

    International Nuclear Information System (INIS)

    Scott, D.S.; Ward, R.C.

    1981-01-01

    Methods are presented for computing eigenpairs of the quadratic lambda-matrix, M lambda 2 + C lambda + K, where M, C, and K are large and sparse, and have special symmetry-type properties. These properties are sufficient to insure that all the eigenvalues are real and that theory analogous to the standard symmetric eigenproblem exists. The methods employ some standard techniques such as partial tri-diagonalization via the Lanczos Method and subsequent eigenpair calculation, shift-and- invert strategy and subspace iteration. The methods also employ some new techniques such as Rayleigh-Ritz quadratic roots and the inertia of symmetric, definite, quadratic lambda-matrices

  19. Combinatorial interpretations of particular evaluations of complete and elementary symmetric functions

    OpenAIRE

    Mongelli, Pietro

    2011-01-01

    The Jacobi-Stirling numbers and the Legendre-Stirling numbers of the first and second kind were first introduced in [6], [7]. In this paper we note that Jacobi-Stirling numbers and Legendre-Stirling numbers are specializations of elementary and complete symmetric functions. We then study combinatorial interpretations of this specialization and obtain new combinatorial interpretations of the Jacobi-Stirling and Legendre-Stirling numbers.

  20. Analytical results for non-Hermitian parity–time-symmetric and ...

    Indian Academy of Sciences (India)

    Abstract. We investigate both the non-Hermitian parity–time-(PT-)symmetric and Hermitian asymmetric volcano potentials, and present the analytical solution in terms of the confluent Heun function. Under certain special conditions, the confluent Heun function can be terminated as a polynomial, thereby leading to certain ...

  1. Explicit TE/TM scheme for particle beam simulations

    International Nuclear Information System (INIS)

    Dohlus, M.; Zagorodnov, I.

    2008-10-01

    In this paper we propose an explicit two-level conservative scheme based on a TE/TM like splitting of the field components in time. Its dispersion properties are adjusted to accelerator problems. It is simpler and faster than the implicit version. It does not have dispersion in the longitudinal direction and the dispersion properties in the transversal plane are improved. The explicit character of the new scheme allows a uniformly stable conformal method without iterations and the scheme can be parallelized easily. It assures energy and charge conservation. A version of this explicit scheme for rotationally symmetric structures is free from the progressive time step reducing for higher order azimuthal modes as it takes place for Yee's explicit method used in the most popular electrodynamics codes. (orig.)

  2. On the construction of symmetric nonnegative matrix with prescribed Ritz values

    Directory of Open Access Journals (Sweden)

    Alimohammad Nazari

    2014-09-01

    Full Text Available In this paper for a given prescribed Ritz values that satisfy inthe some  special conditions,  we find a symmetric nonnegativematrix, such that  the given set be its Ritz values.

  3. Stabilization of self-mode-locked quantum dash lasers by symmetric dual-loop optical feedback

    Science.gov (United States)

    Asghar, Haroon; Wei, Wei; Kumar, Pramod; Sooudi, Ehsan; McInerney, John. G.

    2018-02-01

    We report experimental studies of the influence of symmetric dual-loop optical feedback on the RF linewidth and timing jitter of self-mode-locked two-section quantum dash lasers emitting at 1550 nm. Various feedback schemes were investigated and optimum levels determined for narrowest RF linewidth and low timing jitter, for single-loop and symmetric dual-loop feedback. Two symmetric dual-loop configurations, with balanced and unbalanced feedback ratios, were studied. We demonstrate that unbalanced symmetric dual loop feedback, with the inner cavity resonant and fine delay tuning of the outer loop, gives narrowest RF linewidth and reduced timing jitter over a wide range of delay, unlike single and balanced symmetric dual-loop configurations. This configuration with feedback lengths 80 and 140 m narrows the RF linewidth by 4-67x and 10-100x, respectively, across the widest delay range, compared to free-running. For symmetric dual-loop feedback, the influence of different power split ratios through the feedback loops was determined. Our results show that symmetric dual-loop feedback is markedly more effective than single-loop feedback in reducing RF linewidth and timing jitter, and is much less sensitive to delay phase, making this technique ideal for applications where robustness and alignment tolerance are essential.

  4. A multigrid algorithm for the cell-centered finite difference scheme

    Science.gov (United States)

    Ewing, Richard E.; Shen, Jian

    1993-01-01

    In this article, we discuss a non-variational V-cycle multigrid algorithm based on the cell-centered finite difference scheme for solving a second-order elliptic problem with discontinuous coefficients. Due to the poor approximation property of piecewise constant spaces and the non-variational nature of our scheme, one step of symmetric linear smoothing in our V-cycle multigrid scheme may fail to be a contraction. Again, because of the simple structure of the piecewise constant spaces, prolongation and restriction are trivial; we save significant computation time with very promising computational results.

  5. A Modified Computational Scheme for the Stochastic Perturbation Finite Element Method

    Directory of Open Access Journals (Sweden)

    Feng Wu

    Full Text Available Abstract A modified computational scheme of the stochastic perturbation finite element method (SPFEM is developed for structures with low-level uncertainties. The proposed scheme can provide second-order estimates of the mean and variance without differentiating the system matrices with respect to the random variables. When the proposed scheme is used, it involves finite analyses of deterministic systems. In the case of one random variable with a symmetric probability density function, the proposed computational scheme can even provide a result with fifth-order accuracy. Compared with the traditional computational scheme of SPFEM, the proposed scheme is more convenient for numerical implementation. Four numerical examples demonstrate that the proposed scheme can be used in linear or nonlinear structures with correlated or uncorrelated random variables.

  6. Axion-photon conversion in space and in low symmetrical dielectric crystals

    International Nuclear Information System (INIS)

    Gorelik, V S

    2016-01-01

    The opportunities of axions detection as the result of axion-photon conversion processes in the space and in low symmetrical dielectric crystals are discussed. In accordance with the modern theory predictions, axions are pseudoscalar vacuum particles having very small (0.001-1.0 meV) rest energy. The possibility of axions conversion into photons and vice-versa processes in vacuum at the presence of outer magnetic field has been analyzed before. Pseudoscalar (axion type) modes are existing in some types of crystals. Polar pseudoscalar lattice and exciton modes in low symmetrical crystals are strongly interacted with axions. In this work, optical excitation of axion-type modes in low symmetrical crystals is proposed for observation of axion - photon conversion processes. Instead of outer magnetic field, the crystalline field of such crystals may be used. The experimental schemes for axion-photon conversion processes observation with recording the secondary emission of luminescence, infrared or Stimulated Raman Scattering in some dielectric crystals are discussed. (paper)

  7. 2 × 2 random matrix ensembles with reduced symmetry: from Hermitian to PT -symmetric matrices

    International Nuclear Information System (INIS)

    Gong Jiangbin; Wang Qinghai

    2012-01-01

    A possibly fruitful extension of conventional random matrix ensembles is proposed by imposing symmetry constraints on conventional Hermitian matrices or parity–time (PT)-symmetric matrices. To illustrate the main idea, we first study 2 × 2 complex Hermitian matrix ensembles with O(2)-invariant constraints, yielding novel level-spacing statistics such as singular distributions, the half-Gaussian distribution, distributions interpolating between the GOE (Gaussian orthogonal ensemble) distribution and half-Gaussian distributions, as well as the gapped-GOE distribution. Such a symmetry-reduction strategy is then used to explore 2 × 2 PT-symmetric matrix ensembles with real eigenvalues. In particular, PT-symmetric random matrix ensembles with U(2) invariance can be constructed, with the conventional complex Hermitian random matrix ensemble being a special case. In two examples of PT-symmetric random matrix ensembles, the level-spacing distributions are found to be the standard GUE (Gaussian unitary ensemble) statistics or the ‘truncated-GUE’ statistics. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’. (paper)

  8. Generation of Symmetric Dicke States of Remote Qubits with Linear Optics

    International Nuclear Information System (INIS)

    Thiel, C.; Zanthier, J. von; Bastin, T.; Solano, E.; Agarwal, G. S.

    2007-01-01

    We propose a method for generating all symmetric Dicke states, either in the long-lived internal levels of N massive particles or in the polarization degrees of freedom of photonic qubits, using linear optical tools only. By means of a suitable multiphoton detection technique, erasing Welcher-Weg information, our proposed scheme allows the generation and measurement of an important class of entangled multiqubit states

  9. Complex {PT}-symmetric extensions of the nonlinear ultra-short light pulse model

    Science.gov (United States)

    Yan, Zhenya

    2012-11-01

    The short pulse equation u_{xt}=u+\\frac{1}{2}(u^2u_x)_x is PT symmetric, which arises in nonlinear optics for the ultra-short pulse case. We present a family of new complex PT-symmetric extensions of the short pulse equation, i[(iu_x)^{\\sigma }]_t=au+bu^m+ic[u^n(iu_x)^{\\epsilon }]_x \\,\\, (\\sigma ,\\, \\epsilon ,\\,a,\\,b,\\,c,\\,m,\\,n \\in {R}), based on the complex PT-symmetric extension principle. Some properties of these equations with some chosen parameters are studied including the Hamiltonian structures and exact solutions such as solitary wave solutions, doubly periodic wave solutions and compacton solutions. Our results may be useful to understand complex PT-symmetric nonlinear physical models. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’.

  10. Multi-Agent System Based Special Protection and Emergency Control Scheme against Cascading Events in Power System

    DEFF Research Database (Denmark)

    Liu, Zhou

    relay operations due to low voltage or overload state in the post stage of N-1 (or N-k) contingency. If such state could be sensed and adjusted appropriately before those relay actions, the system stability might be sustained. So it is of great significance to develop a suitable protection scheme...... the proposed protection strategy in this thesis, a real time simulation platform based on Real Time Digital Simulator (RTDS) and LabVIEW is built. In this platform, the cases of cascaded blackouts are simulated on the test system simplified from the East Denmark power system. For the MAS based control system......, the distributed power system agents are set up in RTDS, while the agents in higher level are designed by LabVIEW toolkits. The case studies and simulation results demonstrate the effectiveness of real time application of the proposed MAS based special protection and emergency control scheme against the cascaded...

  11. Stationary states of a PT symmetric two-mode Bose–Einstein condensate

    International Nuclear Information System (INIS)

    Graefe, Eva-Maria

    2012-01-01

    The understanding of nonlinear PT symmetric quantum systems, arising for example in the theory of Bose–Einstein condensates in PT symmetric potentials, is widely based on numerical investigations, and little is known about generic features induced by the interplay of PT symmetry and nonlinearity. To gain deeper insights it is important to have analytically solvable toy models at hand. In the present paper the stationary states of a simple toy model of a PT symmetric system previously introduced in [1, 2] are investigated. The model can be interpreted as a simple description of a Bose–Einstein condensate in a PT symmetric double well trap in a two-mode approximation. The eigenvalues and eigenstates of the system can be explicitly calculated in a straightforward manner; the resulting structures resemble those that have recently been found numerically for a more realistic PT symmetric double delta potential. In addition, a continuation of the system is introduced that allows an interpretation in terms of a simple linear matrix model. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’. (paper)

  12. Dispersion in a bent-solenoid channel with symmetric focusing

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Chun-xi [Argonne National Lab. (ANL), Argonne, IL (United States)

    2001-08-21

    Longitudinal ionization cooling of a muon beam is essential for muon colliders and will be useful for neutrino factories. Bent-solenoid channels with symmetric focusing has been considered for beam focusing and for generating the required dispersion in the ``emittance exchange'' scheme of longitudinal cooling. In this paper, we derive the Hamiltonian that governs the linear beam dynamics of a bent-solenoid channel, solve the single-particle dynamics, and give equations for determining the lattice functions, in particular, the dispersion functions.

  13. Quantum secure direct communication scheme using a W state and teleportation

    International Nuclear Information System (INIS)

    Cao Haijing; Song Heshan

    2006-01-01

    A theoretical scheme for quantum secure direct communication (QSDC) is proposed, where a three-qubit symmetric W state functions as a quantum channel. Two legitimate communicators can transmit their secret information by using quantum teleportation and local measurements

  14. Initial value formulation for the spherically symmetric dust solution

    International Nuclear Information System (INIS)

    Liu, H.

    1990-01-01

    An initial value formulation for the dust solution with spherical symmetry is given explicitly in which the initial distributions of dust and its velocity on an initial surface are chosen to be the initial data. As special cases, the Friedmann universe, the Schwarzschild solution in comoving coordinates, and a spherically symmetric and radially inhomogeneous cosmological model are derived

  15. An entropy-variables-based formulation of residual distribution schemes for non-equilibrium flows

    Science.gov (United States)

    Garicano-Mena, Jesús; Lani, Andrea; Degrez, Gérard

    2018-06-01

    In this paper we present an extension of Residual Distribution techniques for the simulation of compressible flows in non-equilibrium conditions. The latter are modeled by means of a state-of-the-art multi-species and two-temperature model. An entropy-based variable transformation that symmetrizes the projected advective Jacobian for such a thermophysical model is introduced. Moreover, the transformed advection Jacobian matrix presents a block diagonal structure, with mass-species and electronic-vibrational energy being completely decoupled from the momentum and total energy sub-system. The advantageous structure of the transformed advective Jacobian can be exploited by contour-integration-based Residual Distribution techniques: established schemes that operate on dense matrices can be substituted by the same scheme operating on the momentum-energy subsystem matrix and repeated application of scalar scheme to the mass-species and electronic-vibrational energy terms. Finally, the performance gain of the symmetrizing-variables formulation is quantified on a selection of representative testcases, ranging from subsonic to hypersonic, in inviscid or viscous conditions.

  16. Facade Layout Symmetrization

    KAUST Repository

    Jiang, Haiyong

    2016-04-11

    We present an automatic algorithm for symmetrizing facade layouts. Our method symmetrizes a given facade layout while minimally modifying the original layout. Based on the principles of symmetry in urban design, we formulate the problem of facade layout symmetrization as an optimization problem. Our system further enhances the regularity of the final layout by redistributing and aligning boxes in the layout. We demonstrate that the proposed solution can generate symmetric facade layouts efficiently. © 2015 IEEE.

  17. Facade Layout Symmetrization

    KAUST Repository

    Jiang, Haiyong; Dong, Weiming; Yan, Dongming; Zhang, Xiaopeng

    2016-01-01

    We present an automatic algorithm for symmetrizing facade layouts. Our method symmetrizes a given facade layout while minimally modifying the original layout. Based on the principles of symmetry in urban design, we formulate the problem of facade layout symmetrization as an optimization problem. Our system further enhances the regularity of the final layout by redistributing and aligning boxes in the layout. We demonstrate that the proposed solution can generate symmetric facade layouts efficiently. © 2015 IEEE.

  18. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  19. A Numerical Scheme Based on an Immersed Boundary Method for Compressible Turbulent Flows with Shocks: Application to Two-Dimensional Flows around Cylinders

    Directory of Open Access Journals (Sweden)

    Shun Takahashi

    2014-01-01

    Full Text Available A computational code adopting immersed boundary methods for compressible gas-particle multiphase turbulent flows is developed and validated through two-dimensional numerical experiments. The turbulent flow region is modeled by a second-order pseudo skew-symmetric form with minimum dissipation, while the monotone upstream-centered scheme for conservation laws (MUSCL scheme is employed in the shock region. The present scheme is applied to the flow around a two-dimensional cylinder under various freestream Mach numbers. Compared with the original MUSCL scheme, the minimum dissipation enabled by the pseudo skew-symmetric form significantly improves the resolution of the vortex generated in the wake while retaining the shock capturing ability. In addition, the resulting aerodynamic force is significantly improved. Also, the present scheme is successfully applied to moving two-cylinder problems.

  20. On the random geometry of a symmetric matter antimatter universe

    International Nuclear Information System (INIS)

    Aldrovandi, R.; Goto, M.

    1977-05-01

    A statistical analysis is made of the randon geometry of an early symmetric matter-antimatter universe model. Such a model is shown to determine the total number of the largest agglomerations in the universe, as well as of some special configurations. Constraints on the time development of the protoagglomerations are also obtained

  1. Closed Form Aliasing Probability For Q-ary Symmetric Errors

    Directory of Open Access Journals (Sweden)

    Geetani Edirisooriya

    1996-01-01

    Full Text Available In Built-In Self-Test (BIST techniques, test data reduction can be achieved using Linear Feedback Shift Registers (LFSRs. A faulty circuit may escape detection due to loss of information inherent to data compaction schemes. This is referred to as aliasing. The probability of aliasing in Multiple-Input Shift-Registers (MISRs has been studied under various bit error models. By modeling the signature analyzer as a Markov process we show that the closed form expression derived for aliasing probability previously, for MISRs with primitive polynomials under q-ary symmetric error model holds for all MISRs irrespective of their feedback polynomials and for group cellular automata signature analyzers as well. If the erroneous behaviour of a circuit can be modelled with q-ary symmetric errors, then the test circuit complexity and propagation delay associated with the signature analyzer can be minimized by using a set of m single bit LFSRs without increasing the probability of aliasing.

  2. Ultrastrong extraordinary transmission and reflection in PT-symmetric Thue-Morse optical waveguide networks.

    Science.gov (United States)

    Wu, Jiaye; Yang, Xiangbo

    2017-10-30

    In this paper, we construct a 1D PT-symmetric Thue-Morse aperiodic optical waveguide network (PTSTMAOWN) and mainly investigate the ultrastrong extraordinary transmission and reflection. We propose an approach to study the photonic modes and solve the problem of calculating photonic modes distributions in aperiodic networks due to the lack of dispersion functions and find that in a PTSTMAOWN there exist more photonic modes and more spontaneous PT-symmetric breaking points, which are quite different from other reported PT-symmetric optical systems. Additionally, we develop a method to sort spontaneous PT-symmetric breaking point zones to seek the strongest extraordinary point and obtain that at this point the strongest extraordinary transmission and reflection arrive at 2.96316 × 10 5 and 1.32761 × 10 5 , respectively, due to the PT-symmetric coupling resonance and the special symmetry pattern of TM networks. These enormous gains are several orders of magnitude larger than the previous results. This optical system may possess potential in designing optical amplifier, optical logic elements in photon computers and ultrasensitive optical switches with ultrahigh monochromatity.

  3. Morse potential, symmetric Morse potential and bracketed bound-state energies

    Czech Academy of Sciences Publication Activity Database

    Znojil, Miloslav

    2016-01-01

    Roč. 31, č. 14 (2016), s. 1650088 ISSN 0217-7323 R&D Projects: GA ČR GA16-22945S Institutional support: RVO:61389005 Keywords : quantum bound states * special functions * Morse potential * symmetrized Morse potential * upper and lower energy estimates * computer-assisted symbolic manipulations Subject RIV: BE - Theoretical Physics Impact factor: 1.165, year: 2016

  4. Inverse scattering scheme for the Dirac equation at fixed energy

    International Nuclear Information System (INIS)

    Leeb, H.; Lehninger, H.; Schilder, C.

    2001-01-01

    Full text: Based on the concept of generalized transformation operators a new hierarchy of Dirac equations with spherical symmetric scalar and fourth component vector potentials is presented. Within this hierarchy closed form expressions for the solutions, the potentials and the S-matrix can be given in terms of solutions of the original Dirac equation. Using these transformations an inverse scattering scheme has been constructed for the Dirac equation which is the analog to the rational scheme in the non-relativistic case. The given method provides for the first time an inversion scheme with closed form expressions for the S-matrix for non-relativistic scattering problems with central and spin-orbit potentials. (author)

  5. Non-symmetric bi-stable flow around the Ahmed body

    International Nuclear Information System (INIS)

    Meile, W.; Ladinek, T.; Brenn, G.; Reppenhagen, A.; Fuchs, A.

    2016-01-01

    Highlights: • The non-symmetric bi-stable flow around the Ahmed body is investigated experimentally. • Bi-stability, described for symmetric flow by Cadot and co-workers, was found in nonsymmetric flow also. • The flow field randomly switches between two states. • The flow is subject to a spanwise instability identified by Cadot and co-workers for symmetric flow. • Aerodynamic forces fluctuate strongly due to the bi-stability. - Abstract: The flow around the Ahmed body at varying Reynolds numbers under yawing conditions is investigated experimentally. The body geometry belongs to a regime subject to spanwise flow instability identified in symmetric flow by Cadot and co-workers (Grandemange et al., 2013b). Our experiments cover the two slant angles 25° and 35° and Reynolds numbers up to 2.784 × 10"6. Special emphasis lies on the aerodynamics under side wind influence. For the 35° slant angle, forces and moments change significantly with the yawing angle in the range 10° ≤ |β| ≤ 15°. The lift and the pitching moment exhibit strong fluctuations due to bi-stable flow around a critical angle β of ±12.5°, where the pitching moment changes sign. Time series of the forces and moments are studied and explained by PIV measurements in the flow field near the rear of the body.

  6. Optimality and stability of symmetric evolutionary games with applications in genetic selection.

    Science.gov (United States)

    Huang, Yuanyuan; Hao, Yiping; Wang, Min; Zhou, Wen; Wu, Zhijun

    2015-06-01

    Symmetric evolutionary games, i.e., evolutionary games with symmetric fitness matrices, have important applications in population genetics, where they can be used to model for example the selection and evolution of the genotypes of a given population. In this paper, we review the theory for obtaining optimal and stable strategies for symmetric evolutionary games, and provide some new proofs and computational methods. In particular, we review the relationship between the symmetric evolutionary game and the generalized knapsack problem, and discuss the first and second order necessary and sufficient conditions that can be derived from this relationship for testing the optimality and stability of the strategies. Some of the conditions are given in different forms from those in previous work and can be verified more efficiently. We also derive more efficient computational methods for the evaluation of the conditions than conventional approaches. We demonstrate how these conditions can be applied to justifying the strategies and their stabilities for a special class of genetic selection games including some in the study of genetic disorders.

  7. Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography

    Science.gov (United States)

    Ma, Lihong; Jin, Weimin

    2018-01-01

    A novel symmetric and asymmetric hybrid optical cryptosystem is proposed based on compressive sensing combined with computer generated holography. In this method there are six encryption keys, among which two decryption phase masks are different from the two random phase masks used in the encryption process. Therefore, the encryption system has the feature of both symmetric and asymmetric cryptography. On the other hand, because computer generated holography can flexibly digitalize the encrypted information and compressive sensing can significantly reduce data volume, what is more, the final encryption image is real function by phase truncation, the method favors the storage and transmission of the encryption data. The experimental results demonstrate that the proposed encryption scheme boosts the security and has high robustness against noise and occlusion attacks.

  8. On the pseudo-norm in some PT-symmetric potentials

    International Nuclear Information System (INIS)

    Levai, G.

    2005-01-01

    Complete text of publication follows. PT-symmetric quantum mechanical systems possess non-hermitian Hamiltonian, still they have some characteristics similar to hermitian problems. The most notable of these is their discrete energy spectrum, which can be partly or completely real. These systems are invariant under the simultaneous action of the P space and T time inversion operations. Perhaps the simplest PT-symmetric Hamiltonian contains a one-dimensional Schroedinger operator with a complex potential satisfying the V*(-x) = V (x) relation. Another typical feature PT-symmetric systems have in common with hermitian problems is that their basis states form an orthogonal set provided that the inner product is redefined as (ψ φ)PT ≡ (ψ Pφ). However, the norm defined by this inner product, the pseudo-norm turned out to possess indefinite sign, and this raised the question of the probabilistic interpretation of PT-symmetric systems. This problem was later put into a more general context when it was found that PT symmetry is a special case of pseudo-hermiticity, and this explains most of the peculiar features of PT-symmetric systems. There have been several attempts to link PT-symmetric, and in general, pseudo- hermitian systems with equivalent hermitian ones, and the sign of the pseudo-norm was found to play an important role in this respect. It is thus essential to evaluate the pseudo- norm for various potentials, especially considering the fact that there are some inconsistencies in the available results. Numerical studies indicated that the sign of the pseudo-norm typically alternates according to the n principal quantum number as (-1) n , and this was later proven for a class of potentials that are written in a polynomial form of ix. However, some potentials of other type did not fit into this line: this was the case for the Scarf II potential, the most well-known exactly solvable PT-symmetric potential. In contrast with the other examples, this potential is

  9. Symmetric large momentum transfer for atom interferometry with BECs

    Science.gov (United States)

    Abend, Sven; Gebbe, Martina; Gersemann, Matthias; Rasel, Ernst M.; Quantus Collaboration

    2017-04-01

    We develop and demonstrate a novel scheme for a symmetric large momentum transfer beam splitter for interferometry with Bose-Einstein condensates. Large momentum transfer beam splitters are a key technique to enhance the scaling factor and sensitivity of an atom interferometer and to create largely delocalized superposition states. To realize the beam splitter, double Bragg diffraction is used to create a superposition of two symmetric momentum states. Afterwards both momentum states are loaded into a retro-reflected optical lattice and accelerated by Bloch oscillations on opposite directions, keeping the initial symmetry. The favorable scaling behavior of this symmetric acceleration, allows to transfer more than 1000 ℏk of total differential splitting in a single acceleration sequence of 6 ms duration while we still maintain a fraction of approx. 25% of the initial atom number. As a proof of the coherence of this beam splitter, contrast in a closed Mach-Zehnder atom interferometer has been observed with up to 208 ℏk of momentum separation, which equals a differential wave-packet velocity of approx. 1.1 m/s for 87Rb. The presented work is supported by the CRC 1128 geo-Q and the DLR with funds provided by the Federal Ministry of Economic Affairs and Energy (BMWi) due to an enactment of the German Bundestag under Grant No. DLR 50WM1552-1557 (QUANTUS-IV-Fallturm).

  10. On Symmetric Polynomials

    OpenAIRE

    Golden, Ryan; Cho, Ilwoo

    2015-01-01

    In this paper, we study structure theorems of algebras of symmetric functions. Based on a certain relation on elementary symmetric polynomials generating such algebras, we consider perturbation in the algebras. In particular, we understand generators of the algebras as perturbations. From such perturbations, define injective maps on generators, which induce algebra-monomorphisms (or embeddings) on the algebras. They provide inductive structure theorems on algebras of symmetric polynomials. As...

  11. Symmetrization of Facade Layouts

    KAUST Repository

    Jiang, Haiyong; Yan, Dong-Ming; Dong, Weiming; Wu, Fuzhang; Nan, Liangliang; Zhang, Xiaopeng

    2016-01-01

    We present an automatic approach for symmetrizing urban facade layouts. Our method can generate a symmetric layout through minimally modifying the original input layout. Based on the principles of symmetry in urban design, we formulate facade layout symmetrization as an optimization problem. Our method further enhances the regularity of the final layout by redistributing and aligning elements in the layout. We demonstrate that the proposed solution can effectively generate symmetric facade layouts.

  12. Symmetrization of Facade Layouts

    KAUST Repository

    Jiang, Haiyong

    2016-02-26

    We present an automatic approach for symmetrizing urban facade layouts. Our method can generate a symmetric layout through minimally modifying the original input layout. Based on the principles of symmetry in urban design, we formulate facade layout symmetrization as an optimization problem. Our method further enhances the regularity of the final layout by redistributing and aligning elements in the layout. We demonstrate that the proposed solution can effectively generate symmetric facade layouts.

  13. The critical current of point symmetric Josephson tunnel junctions

    International Nuclear Information System (INIS)

    Monaco, Roberto

    2016-01-01

    Highlights: • We disclose some geometrical properties of the critical current field dependence that apply to a large class of Josephson junctions characterized by a point symmetric shape. • The developed theory is valid for any orientation of the applied magnetic field, therefore it allows the determine the consequences of field misalignment in the experimental setups. • We also address that the threshold curves of Josephson tunnel junctions with complex shapes can be expressed as a linear combination of the threshold curves of junctions with simpler point symmetric shapes. - Abstract: The physics of Josephson tunnel junctions drastically depends on their geometrical configurations. The shape of the junction determines the specific form of the magnetic-field dependence of its Josephson current. Here we address the magnetic diffraction patterns of specially shaped planar Josephson tunnel junctions in the presence of an in-plane magnetic field of arbitrary orientations. We focus on a wide ensemble of junctions whose shape is invariant under point reflection. We analyze the implications of this type of isometry and derive the threshold curves of junctions whose shape is the union or the relative complement of two point symmetric plane figures.

  14. Uniqueness of flat spherically symmetric spacelike hypersurfaces admitted by spherically symmetric static spacetimes

    Science.gov (United States)

    Beig, Robert; Siddiqui, Azad A.

    2007-11-01

    It is known that spherically symmetric static spacetimes admit a foliation by flat hypersurfaces. Such foliations have explicitly been constructed for some spacetimes, using different approaches, but none of them have proved or even discussed the uniqueness of these foliations. The issue of uniqueness becomes more important due to suitability of flat foliations for studying black hole physics. Here, flat spherically symmetric spacelike hypersurfaces are obtained by a direct method. It is found that spherically symmetric static spacetimes admit flat spherically symmetric hypersurfaces, and that these hypersurfaces are unique up to translation under the timelike Killing vector. This result guarantees the uniqueness of flat spherically symmetric foliations for such spacetimes.

  15. Probabilistic teleportation scheme of two-mode entangled photon states by using linear optic element

    Institute of Scientific and Technical Information of China (English)

    XIANG Shao-hua

    2003-01-01

    A scheme for teleporting two-mode entangled photon states with the successful probability 33.3% is proposed. In the scheme, the teleporte d qubit is two-mode photon entangled states, and two pairs of EPR pair are used as quantum channel between a sender and a receiver. This procedure is achieved by using two 50/50 symmetric beam splitters and four photon number detectors wit h the help of classical information.

  16. Numerical schemes for dynamically orthogonal equations of stochastic fluid and ocean flows

    International Nuclear Information System (INIS)

    Ueckermann, M.P.; Lermusiaux, P.F.J.; Sapsis, T.P.

    2013-01-01

    The quantification of uncertainties is critical when systems are nonlinear and have uncertain terms in their governing equations or are constrained by limited knowledge of initial and boundary conditions. Such situations are common in multiscale, intermittent and non-homogeneous fluid and ocean flows. The dynamically orthogonal (DO) field equations provide an adaptive methodology to predict the probability density functions of such flows. The present work derives efficient computational schemes for the DO methodology applied to unsteady stochastic Navier–Stokes and Boussinesq equations, and illustrates and studies the numerical aspects of these schemes. Semi-implicit projection methods are developed for the mean and for the DO modes, and time-marching schemes of first to fourth order are used for the stochastic coefficients. Conservative second-order finite-volumes are employed in physical space with new advection schemes based on total variation diminishing methods. Other results include: (i) the definition of pseudo-stochastic pressures to obtain a number of pressure equations that is linear in the subspace size instead of quadratic; (ii) symmetric advection schemes for the stochastic velocities; (iii) the use of generalized inversion to deal with singular subspace covariances or deterministic modes; and (iv) schemes to maintain orthonormal modes at the numerical level. To verify our implementation and study the properties of our schemes and their variations, a set of stochastic flow benchmarks are defined including asymmetric Dirac and symmetric lock-exchange flows, lid-driven cavity flows, and flows past objects in a confined channel. Different Reynolds number and Grashof number regimes are employed to illustrate robustness. Optimal convergence under both time and space refinements is shown as well as the convergence of the probability density functions with the number of stochastic realizations.

  17. A new method for generating axially-symmetric and radially-polarized beams

    International Nuclear Information System (INIS)

    Niu Chunhui; Gu Benyuan; Dong Bizhen; Zhang Yan

    2005-01-01

    A scheme for generating axially-symmetric and radially-polarized beams is proposed by using two diffractive phase elements (DPEs) made of birefringent materials. The design of these two DPEs is based on the general theory of phase-retrieval of optical system in combination with an iterative algorithm. The first DPE is used for demultiplexing two orthogonally linearly-polarized light beams to produce diffractive patterns, and the second DPE is used for compensating the phase difference to obtain the desired radially-polarized beam

  18. Infrared behavior of gluons and ghosts in ghost-antighost symmetric gauges

    International Nuclear Information System (INIS)

    Alkofer, R.; Fischer, C.S.; Reinhardt, H.; Smekal, L. von

    2003-01-01

    To investigate the possibility of a ghost-antighost condensate, the coupled Dyson-Schwinger equations for the gluon and ghost propagators in Yang-Mills theories are derived in general covariant gauges, including ghost-antighost symmetric gauges. The infrared behavior of these two-point functions is studied in a bare-vertex truncation scheme which has proven to be successful in the Landau gauge. In all linear covariant gauges the same infrared behavior as in the Landau gauge is found: The gluon propagator is infrared-suppressed whereas the ghost propagator is infrared-enhanced. This infrared singular behavior provides an indication against a ghost-antighost condensate. In the ghost-antighost symmetric gauges we find that the infrared behavior of the gluon and ghost propagators cannot be determined when replacing all dressed vertices by bare ones. The question of a BRS invariant dimension-2 condensate remains to be further studied

  19. Special Semaphore Scheme for UHF Spacecraft Communications

    Science.gov (United States)

    Butman, Stanley; Satorius, Edgar; Ilott, Peter

    2006-01-01

    A semaphore scheme has been devised to satisfy a requirement to enable ultrahigh- frequency (UHF) radio communication between a spacecraft descending from orbit to a landing on Mars and a spacecraft, in orbit about Mars, that relays communications between Earth and the lander spacecraft. There are also two subsidiary requirements: (1) to use UHF transceivers, built and qualified for operation aboard the spacecraft that operate with residual-carrier binary phase-shift-keying (BPSK) modulation at a selectable data rate of 8, 32, 128, or 256 kb/s; and (2) to enable low-rate signaling even when received signals become so weak as to prevent communication at the minimum BPSK rate of 8 kHz. The scheme involves exploitation of Manchester encoding, which is used in conjunction with residual-carrier modulation to aid the carrier-tracking loop. By choosing various sequences of 1s, 0s, or 1s alternating with 0s to be fed to the residual-carrier modulator, one would cause the modulator to generate sidebands at a fundamental frequency of 4 or 8 kHz and harmonics thereof. These sidebands would constitute the desired semaphores. In reception, the semaphores would be detected by a software demodulator.

  20. Symmetric vs. asymmetric stem cell divisions: an adaptation against cancer?

    Directory of Open Access Journals (Sweden)

    Leili Shahriyari

    Full Text Available Traditionally, it has been held that a central characteristic of stem cells is their ability to divide asymmetrically. Recent advances in inducible genetic labeling provided ample evidence that symmetric stem cell divisions play an important role in adult mammalian homeostasis. It is well understood that the two types of cell divisions differ in terms of the stem cells' flexibility to expand when needed. On the contrary, the implications of symmetric and asymmetric divisions for mutation accumulation are still poorly understood. In this paper we study a stochastic model of a renewing tissue, and address the optimization problem of tissue architecture in the context of mutant production. Specifically, we study the process of tumor suppressor gene inactivation which usually takes place as a consequence of two "hits", and which is one of the most common patterns in carcinogenesis. We compare and contrast symmetric and asymmetric (and mixed stem cell divisions, and focus on the rate at which double-hit mutants are generated. It turns out that symmetrically-dividing cells generate such mutants at a rate which is significantly lower than that of asymmetrically-dividing cells. This result holds whether single-hit (intermediate mutants are disadvantageous, neutral, or advantageous. It is also independent on whether the carcinogenic double-hit mutants are produced only among the stem cells or also among more specialized cells. We argue that symmetric stem cell divisions in mammals could be an adaptation which helps delay the onset of cancers. We further investigate the question of the optimal fraction of stem cells in the tissue, and quantify the contribution of non-stem cells in mutant production. Our work provides a hypothesis to explain the observation that in mammalian cells, symmetric patterns of stem cell division seem to be very common.

  1. A differential equation for Lerch's transcendent and associated symmetric operators in Hilbert space

    International Nuclear Information System (INIS)

    Kaplitskii, V M

    2014-01-01

    The function Ψ(x,y,s)=e iy Φ(−e iy ,s,x), where Φ(z,s,v) is Lerch's transcendent, satisfies the following two-dimensional formally self-adjoint second-order hyperbolic differential equation, where s=1/2+iλ. The corresponding differential expression determines a densely defined symmetric operator (the minimal operator) on the Hilbert space L 2 (Π), where Π=(0,1)×(0,2π). We obtain a description of the domains of definition of some symmetric extensions of the minimal operator. We show that formal solutions of the eigenvalue problem for these symmetric extensions are represented by functional series whose structure resembles that of the Fourier series of Ψ(x,y,s). We discuss sufficient conditions for these formal solutions to be eigenfunctions of the resulting symmetric differential operators. We also demonstrate a close relationship between the spectral properties of these symmetric differential operators and the distribution of the zeros of some special analytic functions analogous to the Riemann zeta function. Bibliography: 15 titles

  2. Symmetric q-Bessel functions

    Directory of Open Access Journals (Sweden)

    Giuseppe Dattoli

    1996-05-01

    Full Text Available q analog of bessel functions, symmetric under the interchange of q and q^ −1 are introduced. The definition is based on the generating function realized as product of symmetric q-exponential functions with appropriate arguments. Symmetric q-Bessel function are shown to satisfy various identities as well as second-order q-differential equations, which in the limit q → 1 reproduce those obeyed by the usual cylindrical Bessel functions. A brief discussion on the possible algebraic setting for symmetric q-Bessel functions is also provided.

  3. Spherical spacelike geometries in static spherically symmetric spacetimes: Generalized Painlevè–Gullstrand coordinates, foliation, and embedding

    Energy Technology Data Exchange (ETDEWEB)

    Akbar, M.M., E-mail: akbar@utdallas.edu

    2017-06-10

    It is well known that static spherically symmetric spacetimes can admit foliations by flat spacelike hypersurfaces, which are best described in terms of the Painlevè–Gullstrand coordinates. The uniqueness and existence of such foliations were addressed earlier. In this paper, we prove, purely geometrically, that any possible foliation of a static spherically symmetric spacetime by an arbitrary codimension-one spherical spacelike geometry, up to time translation and rotation, is unique, and we find the algebraic condition under which it exists. This leads us to what can be considered as the most natural generalization of the Painlevè–Gullstrand coordinate system for static spherically symmetric metrics, which, in turn, makes it easy to derive generic conclusions on foliation and to study specific cases as well as to easily reproduce previously obtained generalizations as special cases. In particular, we note that the existence of foliation by flat hypersurfaces guarantees the existence of foliation by hypersurfaces whose Ricci curvature tensor is everywhere non-positive (constant negative curvature is a special case). The study of uniqueness and the existence concurrently solves the question of embeddability of a spherical spacelike geometry in one-dimensional higher static spherically symmetric spacetimes, and this produces known and new results geometrically, without having to go through the momentum and Hamiltonian constraints.

  4. Symmetric Anderson impurity model: Magnetic susceptibility, specific heat and Wilson ratio

    Science.gov (United States)

    Zalom, Peter; Pokorný, Vladislav; Janiš, Václav

    2018-05-01

    We extend the spin-polarized effective-interaction approximation of the parquet renormalization scheme from Refs. [1,2] applied on the symmetric Anderson model by adding the low-temperature asymptotics of the total energy and the specific heat. We calculate numerically the Wilson ratio and determine analytically its asymptotic value in the strong-coupling limit. We demonstrate in this way that the exponentially small Kondo scale from the strong-coupling regime emerges in qualitatively the same way in the spectral function, magnetic susceptibility and the specific heat.

  5. Symmetric coupling of angular momenta, quadratic algebras and discrete polynomials

    International Nuclear Information System (INIS)

    Aquilanti, V; Marinelli, D; Marzuoli, A

    2014-01-01

    Eigenvalues and eigenfunctions of the volume operator, associated with the symmetric coupling of three SU(2) angular momentum operators, can be analyzed on the basis of a discrete Schrödinger–like equation which provides a semiclassical Hamiltonian picture of the evolution of a 'quantum of space', as shown by the authors in [1]. Emphasis is given here to the formalization in terms of a quadratic symmetry algebra and its automorphism group. This view is related to the Askey scheme, the hierarchical structure which includes all hypergeometric polynomials of one (discrete or continuous) variable. Key tool for this comparative analysis is the duality operation defined on the generators of the quadratic algebra and suitably extended to the various families of overlap functions (generalized recoupling coefficients). These families, recognized as lying at the top level of the Askey scheme, are classified and a few limiting cases are addressed

  6. A NUMERICAL SCHEME FOR SPECIAL RELATIVISTIC RADIATION MAGNETOHYDRODYNAMICS BASED ON SOLVING THE TIME-DEPENDENT RADIATIVE TRANSFER EQUATION

    Energy Technology Data Exchange (ETDEWEB)

    Ohsuga, Ken; Takahashi, Hiroyuki R. [National Astronomical Observatory of Japan, Osawa, Mitaka, Tokyo 181-8588 (Japan)

    2016-02-20

    We develop a numerical scheme for solving the equations of fully special relativistic, radiation magnetohydrodynamics (MHDs), in which the frequency-integrated, time-dependent radiation transfer equation is solved to calculate the specific intensity. The radiation energy density, the radiation flux, and the radiation stress tensor are obtained by the angular quadrature of the intensity. In the present method, conservation of total mass, momentum, and energy of the radiation magnetofluids is guaranteed. We treat not only the isotropic scattering but also the Thomson scattering. The numerical method of MHDs is the same as that of our previous work. The advection terms are explicitly solved, and the source terms, which describe the gas–radiation interaction, are implicitly integrated. Our code is suitable for massive parallel computing. We present that our code shows reasonable results in some numerical tests for propagating radiation and radiation hydrodynamics. Particularly, the correct solution is given even in the optically very thin or moderately thin regimes, and the special relativistic effects are nicely reproduced.

  7. An integrable symmetric (2+1)-dimensional Lotka-Volterra equation and a family of its solutions

    International Nuclear Information System (INIS)

    Hu Xingbiao; Li Chunxia; Nimmo, Jonathan J C; Yu Guofu

    2005-01-01

    A symmetric (2+1)-dimensional Lotka-Volterra equation is proposed. By means of a dependent variable transformation, the equation is firstly transformed into multilinear form and further decoupled into bilinear form by introducing auxiliary independent variables. A bilinear Baecklund transformation is found and then the corresponding Lax pair is derived. Explicit solutions expressed in terms of pfaffian solutions of the bilinear form of the symmetric (2+1)-dimensional Lotka-Volterra equation are given. As a special case of the pfaffian solutions, we obtain soliton solutions and dromions

  8. Symmetric and asymmetric nuclear matter in the Thomas-Fermi model at finite temperatures

    International Nuclear Information System (INIS)

    Strobel, K.; Weber, F.; Weigel, M.K.

    1999-01-01

    The properties of warm symmetric and asymmetric nuclear matter are investigated in the frame of the Thomas-Fermi approximation using a recent modern parameterization of the effective nucleon-nucleon interaction of Myers and Swiatecki. Special attention is paid to the liquid-gas phase transition, which is of special interest in modern nuclear physics. We have determined the critical temperature, critical density and the so-called flash temperature. Furthermore, the equation of state for cold neutron star matter is calculated. (orig.)

  9. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  10. Design and Analysis of Symmetric Primitives

    DEFF Research Database (Denmark)

    Lauridsen, Martin Mehl

    . In the second part, we delve into the matter of the various aspects of designing a symmetric cryptographic primitive. We start by considering generalizations of the widely acclaimed Advanced Encryption Standard (AES) block cipher. In particular, our focus is on a component operation in the cipher which permutes...... analyze and implement modes recommended by the National Institute of Standards and Technology (NIST), as well as authenticated encryption modes from the CAESAR competition, when instantiated with the AES. The data processed in our benchmarking has sizes representative to that of typical Internet traffic...... linear cryptanalysis. We apply this model to the standardized block cipher PRESENT. Finally, we present very generic attacks on two authenticated encryption schemes, AVALANCHE and RBS, by pointing out severe design flaws that can be leveraged to fully recover the secret key with very low complexity...

  11. Efficient Nonlocal M-Control and N-Target Controlled Unitary Gate Using Non-symmetric GHZ States

    Science.gov (United States)

    Chen, Li-Bing; Lu, Hong

    2018-03-01

    Efficient local implementation of a nonlocal M-control and N-target controlled unitary gate is considered. We first show that with the assistance of two non-symmetric qubit(1)-qutrit(N) Greenberger-Horne-Zeilinger (GHZ) states, a nonlocal 2-control and N-target controlled unitary gate can be constructed from 2 local two-qubit CNOT gates, 2 N local two-qutrit conditional SWAP gates, N local qutrit-qubit controlled unitary gates, and 2 N single-qutrit gates. At each target node, the two third levels of the two GHZ target qutrits are used to expose one and only one initial computational state to the local qutrit-qubit controlled unitary gate, instead of being used to hide certain states from the conditional dynamics. This scheme can be generalized straightforwardly to implement a higher-order nonlocal M-control and N-target controlled unitary gate by using M non-symmetric qubit(1)-qutrit(N) GHZ states as quantum channels. Neither the number of the additional levels of each GHZ target particle nor that of single-qutrit gates needs to increase with M. For certain realistic physical systems, the total gate time may be reduced compared with that required in previous schemes.

  12. Self-gravitating axially symmetric disks in general-relativistic rotation

    Science.gov (United States)

    Karkowski, Janusz; Kulczycki, Wojciech; Mach, Patryk; Malec, Edward; Odrzywołek, Andrzej; Piróg, Michał

    2018-05-01

    We integrate numerically axially symmetric stationary Einstein equations describing self-gravitating disks around spinless black holes. The numerical scheme is based on a method developed by Shibata, but contains important new ingredients. We derive a new general-relativistic Keplerian rotation law for self-gravitating disks around spinning black holes. Former results concerning rotation around spinless black holes emerge in the limit of a vanishing spin parameter. These rotation curves might be used for the description of rotating stars, after appropriate modification around the symmetry axis. They can be applied to the description of compact torus-black hole configurations, including active galactic nuclei or products of coalescences of two neutron stars.

  13. A symmetric positive definite formulation for monolithic fluid structure interaction

    KAUST Repository

    Robinson-Mosher, Avi; Schroeder, Craig; Fedkiw, Ronald

    2011-01-01

    In this paper we consider a strongly coupled (monolithic) fluid structure interaction framework for incompressible flow, as opposed to a loosely coupled (partitioned) method. This requires solving a single linear system that combines the unknown velocities of the structure with the unknown pressures of the fluid. In our previous work, we were able to obtain a symmetric formulation of this coupled system; however, it was also indefinite, making it more difficult to solve. In fact in practice there have been cases where we have been unable to invert the system. In this paper we take a novel approach that consists of factoring the damping matrix of deformable structures and show that this can be used to obtain a symmetric positive definite system, at least to the extent that the uncoupled systems were symmetric positive definite. We use a traditional MAC grid discretization of the fluid and a fully Lagrangian discretization of the structures for the sake of exposition, noting that our procedure can be generalized to other scenarios. For the special case of rigid bodies, where there are no internal damping forces, we exactly recover the system of Batty et al. (2007) [4]. © 2010 Elsevier Inc.

  14. A symmetric positive definite formulation for monolithic fluid structure interaction

    KAUST Repository

    Robinson-Mosher, Avi

    2011-02-01

    In this paper we consider a strongly coupled (monolithic) fluid structure interaction framework for incompressible flow, as opposed to a loosely coupled (partitioned) method. This requires solving a single linear system that combines the unknown velocities of the structure with the unknown pressures of the fluid. In our previous work, we were able to obtain a symmetric formulation of this coupled system; however, it was also indefinite, making it more difficult to solve. In fact in practice there have been cases where we have been unable to invert the system. In this paper we take a novel approach that consists of factoring the damping matrix of deformable structures and show that this can be used to obtain a symmetric positive definite system, at least to the extent that the uncoupled systems were symmetric positive definite. We use a traditional MAC grid discretization of the fluid and a fully Lagrangian discretization of the structures for the sake of exposition, noting that our procedure can be generalized to other scenarios. For the special case of rigid bodies, where there are no internal damping forces, we exactly recover the system of Batty et al. (2007) [4]. © 2010 Elsevier Inc.

  15. Thermoacoustic focusing lens by symmetric Airy beams with phase manipulations

    Science.gov (United States)

    Liu, Chen; Xia, Jian-Ping; Sun, Hong-Xiang; Yuan, Shou-Qi

    2017-12-01

    We report the realization of broadband acoustic focusing lenses based on two symmetric thermoacoustic phased arrays of Airy beams, in which the units of thermoacoustic phase control are designed by employing air with different temperatures surrounded by rigid insulated boundaries and thermal insulation films. The phase delays of the transmitted and reflected units could cover a whole 2π interval, which arises from the change of the sound velocity of air induced by the variation of the temperature. Based on the units of phase control, we design the transmitted and reflected acoustic focusing lenses with two symmetric Airy beams, and verify the high self-healing focusing characteristic and the feasibility of the thermal insulation films. Besides, the influences of the bending angle of the Airy beam on the focusing performance are discussed in detail. The proposed acoustic lens has advantages of broad bandwidth (about 4.8 kHz), high focusing performance, self-healing feature, and simple structure, which enable it to provide more schemes for acoustic focusing. It has excellent potential applications in acoustic devices.

  16. Simple schemes for generation of W-type multipartite entangled states and realization of quantum-information concentration

    International Nuclear Information System (INIS)

    Deng-Yu, Zhang; Shi-Qing, Tang; Li-Jun, Xie; Xiao-Gui, Zhan; Yin-Hua, Chen; Feng, Gao

    2010-01-01

    We propose simple schemes for generating W-type multipartite entangled states in cavity quantum electrodynamics (CQED). Our schemes involve a largely detuned interaction of Λ-type three-level atoms with a single-mode cavity field and a classical laser, and both the symmetric and asymmetric W states can be created in a single step. Our schemes are insensitive to both the cavity decay and atomic spontaneous emission. With the above system, we also propose a scheme for realizing quantum-information concentration which is the reverse process of quantum cloning. In this scheme, quantum-information originally coming from a single qubit, but now distributed into many qubits, is concentrated back to a single qubit in only one step. (general)

  17. Symmetric vectors and algebraic classification

    International Nuclear Information System (INIS)

    Leibowitz, E.

    1980-01-01

    The concept of symmetric vector field in Riemannian manifolds, which arises in the study of relativistic cosmological models, is analyzed. Symmetric vectors are tied up with the algebraic properties of the manifold curvature. A procedure for generating a congruence of symmetric fields out of a given pair is outlined. The case of a three-dimensional manifold of constant curvature (''isotropic universe'') is studied in detail, with all its symmetric vector fields being explicitly constructed

  18. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  19. Nonlinear PT-symmetric plaquettes

    International Nuclear Information System (INIS)

    Li Kai; Kevrekidis, P G; Malomed, Boris A; Günther, Uwe

    2012-01-01

    We introduce four basic two-dimensional (2D) plaquette configurations with onsite cubic nonlinearities, which may be used as building blocks for 2D PT-symmetric lattices. For each configuration, we develop a dynamical model and examine its PTsymmetry. The corresponding nonlinear modes are analyzed starting from the Hamiltonian limit, with zero value of the gain–loss coefficient, γ. Once the relevant waveforms have been identified (chiefly, in an analytical form), their stability is examined by means of linearization in the vicinity of stationary points. This reveals diverse and, occasionally, fairly complex bifurcations. The evolution of unstable modes is explored by means of direct simulations. In particular, stable localized modes are found in these systems, although the majority of identified solutions are unstable. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’. (paper)

  20. Symmetric compression of 'laser greenhouse' targets by a few laser beams

    International Nuclear Information System (INIS)

    Gus'kov, Sergei Yu; Demchenko, N N; Rozanov, Vladislav B; Stepanov, R V; Zmitrenko, N V; Caruso, A; Strangio, C

    2003-01-01

    The possibility of efficient and symmetric compression of a target with a low-density structured absorber by a few laser beams is considered. An equation of state is proposed for a porous medium, which takes into account the special features of the absorption of high-power nanosecond laser pulses. The open version of this target is shown to allow the use of ordinary Gaussian beams, requiring no special profiling of the absorber surface. The conditions are defined under which such targets can be compressed efficiently by only two laser beams (or beam clusters). Simulations show that for a 2.1-MJ laser pulse, a seven-fold gain for the target under study is achieved. (special issue devoted to the 80th anniversary of academician n g basov's birth)

  1. WKB analysis of PT-symmetric Sturm–Liouville problems

    International Nuclear Information System (INIS)

    Bender, Carl M; Jones, Hugh F

    2012-01-01

    Most studies of PT-symmetric quantum-mechanical Hamiltonians have considered the Schrödinger eigenvalue problem on an infinite domain. This paper examines the consequences of imposing the boundary conditions on a finite domain. As is the case with regular Hermitian Sturm–Liouville problems, the eigenvalues of the PT-symmetric Sturm–Liouville problem grow like n 2 for large n. However, the novelty is that a PT eigenvalue problem on a finite domain typically exhibits a sequence of critical points at which pairs of eigenvalues cease to be real and become complex conjugates of one another. For the potentials considered here this sequence of critical points is associated with a turning point on the imaginary axis in the complex plane. WKB analysis is used to calculate the asymptotic behaviours of the real eigenvalues and the locations of the critical points. The method turns out to be surprisingly accurate even at low energies. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’. (paper)

  2. Spherically symmetric solutions of general second-order gravity

    International Nuclear Information System (INIS)

    Whitt, B.

    1988-01-01

    The general second-order gravity theory, whose Lagrangian includes higher powers of the curvature, is considered in arbitrary dimensions. It is shown that spherically symmetric solutions are static, except in certain, special, unphysical cases. Spherically symmetric solutions are found and classified. Each theory's solutions fall into a number of distinct branches, which may represent finite space with two singular boundaries, or an asymptotically either flat or (anti--)de Sitter space with one singular boundary. A theory may contain at most one branch of solutions in which all singularities are hidden by event horizons. Such horizons generally emit Hawking radiation, though in certain cases the horizon may have zero temperature. Black holes do not necessarily radiate away all their mass: they may terminate in a zero-temperature black hole, a naked singularity, or a hot black hole in equilibrium with a ''cosmological'' event horizon. The thermodynamics of black-hole solutions is discussed; entropy is found to be an increasing function of horizon area, and the first law is shown to hold

  3. Representations of locally symmetric spaces

    International Nuclear Information System (INIS)

    Rahman, M.S.

    1995-09-01

    Locally symmetric spaces in reference to globally and Hermitian symmetric Riemannian spaces are studied. Some relations between locally and globally symmetric spaces are exhibited. A lucid account of results on relevant spaces, motivated by fundamental problems, are formulated as theorems and propositions. (author). 10 refs

  4. Maclaurin symmetric mean operators of linguistic intuitionistic fuzzy numbers and their application to multiple-attribute decision-making

    Science.gov (United States)

    Liu, Peide; Qin, Xiyou

    2017-11-01

    Linguistic intuitionistic fuzzy number (LIFN) is a special intuitionistic fuzzy number which can more easily describe the vagueness existing in the real decision-making. Maclaurin symmetric mean (MSM) operator has the characteristic of considering the interrelationships among any number of input parameters. In this paper, we extended the MSM operator to the LIFNs and some extended MSM operators for LIFNs were proposed, some new decision-making methods were developed. Firstly, we introduced the definition, score function, properties and operational rules of the LIFNs. Then, we proposed some linguistic intuitionistic fuzzy MSM operators, such as linguistic intuitionistic fuzzy Maclaurin symmetric mean operator, weighted linguistic intuitionistic fuzzy Maclaurin symmetric mean (WLIFMSM) operator, linguistic intuitionistic fuzzy dual Maclaurin symmetric mean operator, weighted linguistic intuitionistic fuzzy dual Maclaurin symmetric mean (WLIFDMSM) operator. In the meantime, we studied some important properties of these operators, and developed some methods based on WLIFMSM operator and WLIFDMSM operator for multi-attribute decision-making. Finally, we use an example to demonstrate the effectiveness of the proposed methods.

  5. In search of new relationship in NpNn scheme

    International Nuclear Information System (INIS)

    Kumar, Pradeep; Singh, M.; Gupta, K.K.; Singh, Y.; Bihari, Chhail; Varshney, A.K.; Gupta, D.K.

    2013-01-01

    It is well understood now that the use of quantity N p N n as a variable to gauge the structure of a given nucleus, and to track the evolution of structure, is called the N p N n scheme. In recent years, effort have been made for minimizing the uncertainties in Grodzins Rule introducing asymmetry in the even symmetric nuclei of medium mass range and to provide new relationship on moment of inertia in N p N n . This new relationship need to be tested in broader way also. Presented here are Ru, Xe, Ba, and Hf isotopic chain covering medium and heavy mass of nuclear chart in N p N n scheme, where the above view point is clearly verified in wider sense

  6. Dual formulation of covariant nonlinear duality-symmetric action of kappa-symmetric D3-brane

    Science.gov (United States)

    Vanichchapongjaroen, Pichet

    2018-02-01

    We study the construction of covariant nonlinear duality-symmetric actions in dual formulation. Essentially, the construction is the PST-covariantisation and nonlinearisation of Zwanziger action. The covariantisation made use of three auxiliary scalar fields. Apart from these, the construction proceed in a similar way to that of the standard formulation. For example, the theories can be extended to include interactions with external fields, and that the theories possess two local PST symmetries. We then explicitly demonstrate the construction of covariant nonlinear duality-symmetric actions in dual formulation of DBI theory, and D3-brane. For each of these theories, the twisted selfduality condition obtained from duality-symmetric actions are explicitly shown to match with the duality relation between field strength and its dual from the one-potential actions. Their on-shell actions between the duality-symmetric and the one-potential versions are also shown to match. We also explicitly prove kappa-symmetry of the covariant nonlinear duality-symmetric D3-brane action in dual formulation.

  7. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  8. Symmetric low-voltage powering system for relativistic electronic devices

    International Nuclear Information System (INIS)

    Agafonov, A.V.; Lebedev, A.N.; Krastelev, E.G.

    2005-01-01

    A special driver for double-sided powering of relativistic magnetrons and several methods of localized electron flow forming in the interaction region of relativistic magnetrons are proposed and discussed. Two experimental installations are presented and discussed. One of them is designed for laboratory research and demonstration experiments at a rather low voltage. The other one is a prototype of a full-scale installation for an experimental research at relativistic levels of voltages on the microwave generation in the new integrated system consisting of a relativistic magnetron and symmetrical induction driver

  9. The symmetric extendibility of quantum states

    International Nuclear Information System (INIS)

    Nowakowski, Marcin L

    2016-01-01

    Studies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement monotone based on the best symmetric approximation of a quantum state and the extendible number of a quantum state. We underpin these results with geometric observations about the structures of multi-party settings which posses substantial symmetric extendible components in their subspaces. The impossibility of reducing the maximal symmetric extendibility by means of the one-way local operations and classical communication method is pointed out on multiple copies. Finally, we state a conjecture linking symmetric extendibility with the one-way distillability and security of all quantum states, analyzing the behavior of a private key in the neighborhood of symmetric extendible states. (paper)

  10. Symmetric Tensor Decomposition

    DEFF Research Database (Denmark)

    Brachat, Jerome; Comon, Pierre; Mourrain, Bernard

    2010-01-01

    We present an algorithm for decomposing a symmetric tensor, of dimension n and order d, as a sum of rank-1 symmetric tensors, extending the algorithm of Sylvester devised in 1886 for binary forms. We recall the correspondence between the decomposition of a homogeneous polynomial in n variables...... of polynomial equations of small degree in non-generic cases. We propose a new algorithm for symmetric tensor decomposition, based on this characterization and on linear algebra computations with Hankel matrices. The impact of this contribution is two-fold. First it permits an efficient computation...... of the decomposition of any tensor of sub-generic rank, as opposed to widely used iterative algorithms with unproved global convergence (e.g. Alternate Least Squares or gradient descents). Second, it gives tools for understanding uniqueness conditions and for detecting the rank....

  11. Symmetric extendibility of quantum states

    OpenAIRE

    Nowakowski, Marcin L.

    2015-01-01

    Studies on symmetric extendibility of quantum states become especially important in a context of analysis of one-way quantum measures of entanglement, distilabillity and security of quantum protocols. In this paper we analyse composite systems containing a symmetric extendible part with a particular attention devoted to one-way security of such systems. Further, we introduce a new one-way monotone based on the best symmetric approximation of quantum state. We underpin those results with geome...

  12. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2018-03-07

    Mar 7, 2018 ... Eurostat and the Ministry of Economic Development. 4. .... regard to the application of special national schemes for small enterprises. ... 2013) mentions a two-year exemption from the tax on joint stock companies and local taxes. ... specialized support programs are developed, such as the introduction of the ...

  13. On symmetric structures of order two

    Directory of Open Access Journals (Sweden)

    Michel Bousquet

    2008-04-01

    Full Text Available Let (ω n 0 < n be the sequence known as Integer Sequence A047749 http://www.research.att.com/ njas/sequences/A047749 In this paper, we show that the integer ω n enumerates various kinds of symmetric structures of order two. We first consider ternary trees having a reflexive symmetry and we relate all symmetric combinatorial objects by means of bijection. We then generalize the symmetric structures and correspondences to an infinite family of symmetric objects.

  14. Spin symmetry in the relativistic symmetrical well potential including a proper approximation to the spin-orbit coupling term

    International Nuclear Information System (INIS)

    Wei Gaofeng; Dong Shihai

    2010-01-01

    In the case of exact spin symmetry, we approximately solve the Dirac equation with scalar and vector symmetrical well potentials by using a proper approximation to the spin-orbit coupling term, and obtain the corresponding energy equation and spinor wave functions for the bound states. We find that there exist only positive-energy bound states in the case of spin symmetry. Also, the energy eigenvalue approaches a constant when the potential parameter α goes to zero. The special case for equally scalar and vector symmetrical well potentials is studied briefly.

  15. AN ADVANCED LEAKAGE SCHEME FOR NEUTRINO TREATMENT IN ASTROPHYSICAL SIMULATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Perego, A. [Institut für Kernphysik, Technische Universität Darmstadt, Schlossgartenstraße 2, D-64289 Darmstadt (Germany); Cabezón, R. M. [Physics Department, University of Basel, Klingelbergstrasse 82, CH-4056 Basel (Switzerland); Käppeli, R., E-mail: albino.perego@physik.tu-darmstadt.de [Seminar for Applied Mathematics, ETH Zürich, Rämistrasse 101, 8092 Zürich (Switzerland)

    2016-04-15

    We present an Advanced Spectral Leakage (ASL) scheme to model neutrinos in the context of core-collapse supernovae (CCSNe) and compact binary mergers. Based on previous gray leakage schemes, the ASL scheme computes the neutrino cooling rates by interpolating local production and diffusion rates (relevant in optically thin and thick regimes, respectively) separately for discretized values of the neutrino energy. Neutrino trapped components are also modeled, based on equilibrium and timescale arguments. The better accuracy achieved by the spectral treatment allows a more reliable computation of neutrino heating rates in optically thin conditions. The scheme has been calibrated and tested against Boltzmann transport in the context of Newtonian spherically symmetric models of CCSNe. ASL shows a very good qualitative and a partial quantitative agreement for key quantities from collapse to a few hundreds of milliseconds after core bounce. We have proved the adaptability and flexibility of our ASL scheme, coupling it to an axisymmetric Eulerian and to a three-dimensional smoothed particle hydrodynamics code to simulate core collapse. Therefore, the neutrino treatment presented here is ideal for large parameter-space explorations, parametric studies, high-resolution tests, code developments, and long-term modeling of asymmetric configurations, where more detailed neutrino treatments are not available or are currently computationally too expensive.

  16. Symmetric Kullback-Leibler Metric Based Tracking Behaviors for Bioinspired Robotic Eyes.

    Science.gov (United States)

    Liu, Hengli; Luo, Jun; Wu, Peng; Xie, Shaorong; Li, Hengyu

    2015-01-01

    A symmetric Kullback-Leibler metric based tracking system, capable of tracking moving targets, is presented for a bionic spherical parallel mechanism to minimize a tracking error function to simulate smooth pursuit of human eyes. More specifically, we propose a real-time moving target tracking algorithm which utilizes spatial histograms taking into account symmetric Kullback-Leibler metric. In the proposed algorithm, the key spatial histograms are extracted and taken into particle filtering framework. Once the target is identified, an image-based control scheme is implemented to drive bionic spherical parallel mechanism such that the identified target is to be tracked at the center of the captured images. Meanwhile, the robot motion information is fed forward to develop an adaptive smooth tracking controller inspired by the Vestibuloocular Reflex mechanism. The proposed tracking system is designed to make the robot track dynamic objects when the robot travels through transmittable terrains, especially bumpy environment. To perform bumpy-resist capability under the condition of violent attitude variation when the robot works in the bumpy environment mentioned, experimental results demonstrate the effectiveness and robustness of our bioinspired tracking system using bionic spherical parallel mechanism inspired by head-eye coordination.

  17. Symmetric Kullback-Leibler Metric Based Tracking Behaviors for Bioinspired Robotic Eyes

    Directory of Open Access Journals (Sweden)

    Hengli Liu

    2015-01-01

    Full Text Available A symmetric Kullback-Leibler metric based tracking system, capable of tracking moving targets, is presented for a bionic spherical parallel mechanism to minimize a tracking error function to simulate smooth pursuit of human eyes. More specifically, we propose a real-time moving target tracking algorithm which utilizes spatial histograms taking into account symmetric Kullback-Leibler metric. In the proposed algorithm, the key spatial histograms are extracted and taken into particle filtering framework. Once the target is identified, an image-based control scheme is implemented to drive bionic spherical parallel mechanism such that the identified target is to be tracked at the center of the captured images. Meanwhile, the robot motion information is fed forward to develop an adaptive smooth tracking controller inspired by the Vestibuloocular Reflex mechanism. The proposed tracking system is designed to make the robot track dynamic objects when the robot travels through transmittable terrains, especially bumpy environment. To perform bumpy-resist capability under the condition of violent attitude variation when the robot works in the bumpy environment mentioned, experimental results demonstrate the effectiveness and robustness of our bioinspired tracking system using bionic spherical parallel mechanism inspired by head-eye coordination.

  18. Some algorithms for the solution of the symmetric eigenvalue problem on a multiprocessor electronic computer

    International Nuclear Information System (INIS)

    Molchanov, I.N.; Khimich, A.N.

    1984-01-01

    This article shows how a reflection method can be used to find the eigenvalues of a matrix by transforming the matrix to tridiagonal form. The method of conjugate gradients is used to find the smallest eigenvalue and the corresponding eigenvector of symmetric positive-definite band matrices. Topics considered include the computational scheme of the reflection method, the organization of parallel calculations by the reflection method, the computational scheme of the conjugate gradient method, the organization of parallel calculations by the conjugate gradient method, and the effectiveness of parallel algorithms. It is concluded that it is possible to increase the overall effectiveness of the multiprocessor electronic computers by either letting the newly available processors of a new problem operate in the multiprocessor mode, or by improving the coefficient of uniform partition of the original information

  19. Mesotherapy for benign symmetric lipomatosis.

    Science.gov (United States)

    Hasegawa, Toshio; Matsukura, Tomoyuki; Ikeda, Shigaku

    2010-04-01

    Benign symmetric lipomatosis, also known as Madelung disease, is a rare disorder characterized by fat distribution around the shoulders, arms, and neck in the context of chronic alcoholism. Complete excision of nonencapsulated lipomas is difficult. However, reports describing conservative therapeutic measures for lipomatosis are rare. The authors present the case of a 42-year-old man with a diagnosis of benign symmetric lipomatosis who had multiple, large, symmetrical masses in his neck. Multiple phosphatidylcholine injections in the neck were administered 4 weeks apart, a total of seven times to achieve lipolysis. The patient's lipomatosis improved in response to the injections, and he achieved good cosmetic results. Intralesional injection, termed mesotherapy, using phosphatidylcholine is a potentially effective therapy for benign symmetric lipomatosis that should be reconsidered as a therapeutic option for this disease.

  20. Two-Beam Linear Colliders - Special Issues

    CERN Document Server

    Corsini, Roberto

    2010-01-01

    The path towards a multi-TeV e+e- linear collider proposed by the CLIC study is based on the Two-Beam Acceleration (TBA) scheme. Such a scheme is promising in term of efficiency, reliability and cost. The rationale behind the two-beam scheme is discussed in the paper, together with the special issues related to this technology and the R&D needed to demonstrate its feasibility.

  1. An accurate scheme by block method for third order ordinary ...

    African Journals Online (AJOL)

    problems of ordinary differential equations is presented in this paper. The approach of collocation approximation is adopted in the derivation of the scheme and then the scheme is applied as simultaneous integrator to special third order initial value problem of ordinary differential equations. This implementation strategy is ...

  2. Experimental pseudo-symmetric trap EPSILON

    International Nuclear Information System (INIS)

    Skovoroda, A.A.; Arsenin, V.V.; Dlougach, E.D.; Kulygin, V.M.; Kuyanov, A.Yu.; Timofeev, A.V.; Zhil'tsov, V.A.; Zvonkov, A.V.

    2001-01-01

    Within the framework of the conceptual project 'Adaptive Plasma EXperiment' a trap with the closed magnetic field lines 'Experimental Pseudo-Symmetric trap' is examined. The project APEX is directed at the theoretical and experimental development of physical foundations for stationary thermonuclear reactor on the basis of an alternative magnetic trap with tokamak-level confinement of high β plasma. The fundamental principle of magnetic field pseudosymmetry that should be satisfied for plasma to have tokamak-like confinement is discussed. The calculated in paraxial approximation examples of pseudosymmetric curvilinear elements with poloidal direction of B isolines are adduced. The EPSILON trap consisting of two straight axisymmetric mirrors linked by two curvilinear pseudosymmetric elements is considered. The plasma currents are short-circuited within the curvilinear element what increases the equilibrium β. The untraditional scheme of MHD stabilization of a trap with the closed field lines by the use of divertor inserted into axisymmetric mirror is analyzed. The experimental installation EPSILON-OME that is under construction for experimental check of divertor stabilization is discussed. The possibility of ECR plasma production in EPSILON-OME under conditions of high density and small magnetic field is examined. (author)

  3. Low-Dissipation Advection Schemes Designed for Large Eddy Simulations of Hypersonic Propulsion Systems

    Science.gov (United States)

    White, Jeffrey A.; Baurle, Robert A.; Fisher, Travis C.; Quinlan, Jesse R.; Black, William S.

    2012-01-01

    The 2nd-order upwind inviscid flux scheme implemented in the multi-block, structured grid, cell centered, finite volume, high-speed reacting flow code VULCAN has been modified to reduce numerical dissipation. This modification was motivated by the desire to improve the codes ability to perform large eddy simulations. The reduction in dissipation was accomplished through a hybridization of non-dissipative and dissipative discontinuity-capturing advection schemes that reduces numerical dissipation while maintaining the ability to capture shocks. A methodology for constructing hybrid-advection schemes that blends nondissipative fluxes consisting of linear combinations of divergence and product rule forms discretized using 4th-order symmetric operators, with dissipative, 3rd or 4th-order reconstruction based upwind flux schemes was developed and implemented. A series of benchmark problems with increasing spatial and fluid dynamical complexity were utilized to examine the ability of the candidate schemes to resolve and propagate structures typical of turbulent flow, their discontinuity capturing capability and their robustness. A realistic geometry typical of a high-speed propulsion system flowpath was computed using the most promising of the examined schemes and was compared with available experimental data to demonstrate simulation fidelity.

  4. Optical detection of symmetric and antisymmetric states in double quantum wells at room temperature

    Science.gov (United States)

    Marchewka, M.; Sheregii, E. M.; Tralle, I.; Marcelli, A.; Piccinini, M.; Cebulski, J.

    2009-09-01

    We studied the optical reflectivity of a specially grown double quantum well (DQW) structure characterized by a rectangular shape and a high electron density at room temperature. Assuming that the QWs depth is known, reflectivity spectra in the mid-IR range allow to carry out the precise measurements of the SAS-gap values (the energy gap between the symmetric and anti-symmetric states) and the absolute energies of both symmetric and antisymmetric electron states. The results of our experiments are in favor of the existence of the SAS splitting in the DQWs at room temperature. Here we have shown that the SAS gap increases proportionally to the subband quantum number and the optical electron transitions between symmetric and antisymmetric states belonging to different subbands are allowed. These results were used for interpretation of the beating effect in the Shubnikov-de Haas (SdH) oscillations at low temperatures (0.6 and 4.2 K). The approach to the calculation of the Landau-levels energies for DQW structures developed earlier [D. Ploch , Phys. Rev. B 79, 195434 (2009)] is used for the analysis and interpretation of the experimental data related to the beating effect. We also argue that in order to explain the beating effect in the SdH oscillations, one should introduce two different quasi-Fermi levels characterizing the two electron subsystems regarding symmetry properties of their wave functions, symmetric and antisymmetric ones. These states are not mixed neither by electron-electron interaction nor probably by electron-phonon interaction.

  5. Spherically symmetric analysis on open FLRW solution in non-linear massive gravity

    Energy Technology Data Exchange (ETDEWEB)

    Chiang, Chien-I; Izumi, Keisuke; Chen, Pisin, E-mail: chienichiang@berkeley.edu, E-mail: izumi@phys.ntu.edu.tw, E-mail: chen@slac.stanford.edu [Leung Center for Cosmology and Particle Astrophysics, National Taiwan University, Taipei 10617, Taiwan (China)

    2012-12-01

    We study non-linear massive gravity in the spherically symmetric context. Our main motivation is to investigate the effect of helicity-0 mode which remains elusive after analysis of cosmological perturbation around an open Friedmann-Lemaitre-Robertson-Walker (FLRW) universe. The non-linear form of the effective energy-momentum tensor stemming from the mass term is derived for the spherically symmetric case. Only in the special case where the area of the two sphere is not deviated away from the FLRW universe, the effective energy momentum tensor becomes completely the same as that of cosmological constant. This opens a window for discriminating the non-linear massive gravity from general relativity (GR). Indeed, by further solving these spherically symmetric gravitational equations of motion in vacuum to the linear order, we obtain a solution which has an arbitrary time-dependent parameter. In GR, this parameter is a constant and corresponds to the mass of a star. Our result means that Birkhoff's theorem no longer holds in the non-linear massive gravity and suggests that energy can probably be emitted superluminously (with infinite speed) on the self-accelerating background by the helicity-0 mode, which could be a potential plague of this theory.

  6. Generalization of binary tensor product schemes depends upon four parameters

    International Nuclear Information System (INIS)

    Bashir, R.; Bari, M.; Mustafa, G.

    2018-01-01

    This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)

  7. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  8. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  9. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  10. Multiparty symmetric sum types

    DEFF Research Database (Denmark)

    Nielsen, Lasse; Yoshida, Nobuko; Honda, Kohei

    2010-01-01

    This paper introduces a new theory of multiparty session types based on symmetric sum types, by which we can type non-deterministic orchestration choice behaviours. While the original branching type in session types can represent a choice made by a single participant and accepted by others...... determining how the session proceeds, the symmetric sum type represents a choice made by agreement among all the participants of a session. Such behaviour can be found in many practical systems, including collaborative workflow in healthcare systems for clinical practice guidelines (CPGs). Processes...... with the symmetric sums can be embedded into the original branching types using conductor processes. We show that this type-driven embedding preserves typability, satisfies semantic soundness and completeness, and meets the encodability criteria adapted to the typed setting. The theory leads to an efficient...

  11. Hardware Realization of Chaos-based Symmetric Video Encryption

    KAUST Repository

    Ibrahim, Mohamad A.

    2013-05-01

    This thesis reports original work on hardware realization of symmetric video encryption using chaos-based continuous systems as pseudo-random number generators. The thesis also presents some of the serious degradations caused by digitally implementing chaotic systems. Subsequently, some techniques to eliminate such defects, including the ultimately adopted scheme are listed and explained in detail. Moreover, the thesis describes original work on the design of an encryption system to encrypt MPEG-2 video streams. Information about the MPEG-2 standard that fits this design context is presented. Then, the security of the proposed system is exhaustively analyzed and the performance is compared with other reported systems, showing superiority in performance and security. The thesis focuses more on the hardware and the circuit aspect of the system’s design. The system is realized on Xilinx Vetrix-4 FPGA with hardware parameters and throughput performance surpassing conventional encryption systems.

  12. Symmetric splitting of very light systems

    International Nuclear Information System (INIS)

    Grotowski, K.; Majka, Z.; Planeta, R.

    1985-01-01

    Fission reactions that produce fragments close to one half the mass of the composite system are traditionally observed in heavy nuclei. In light systems, symmetric splitting is rarely observed and poorly understood. It would be interesting to verify the existence of the symmetric splitting of compound nuclei with A 12 C + 40 Ca, 141 MeV 9 Be + 40 Ca and 153 MeV 6 Li + 40 Ca. The out-of-plane correlation of symmetric products was also measured for the reaction 186 MeV 12 C + 40 Ca. The coincidence measurements of the 12 C + 40 Ca system demonstrated that essentially all of the inclusive yield of symmetric products around 40 0 results from a binary decay. To characterize the dependence of the symmetric splitting process on the excitation energy of the 12 C + 40 C system, inclusive measurements were made at bombarding energies of 74, 132, 162, and 185 MeV

  13. Cylindrically symmetric solutions of a scalar--tensor theory of gravitation

    International Nuclear Information System (INIS)

    Singh, T.

    1975-01-01

    The cylindrically symmetric solutions for the Einstein--Rosen metric of a scalar--tensor theory proposed by Dunn have been obtained. A method has been given by which one can obtain, under certain conditions, solutions of this scalar--tensor theory from known solutions of the empty space field equations of Einstein's theory of gravitation. It is also found that one of the solutions of the scalar--tensor theory is nonsingular in the sense of Bonnor. Further some special solutions are obtained which reduce to the well-known solution of Levi-Civita and a time dependent solution obtained by Misra and Radhakrishna

  14. Propagation of symmetric and anti-symmetric surface waves in aself-gravitating magnetized dusty plasma layer with generalized (r, q) distribution

    Science.gov (United States)

    Lee, Myoung-Jae; Jung, Young-Dae

    2018-05-01

    The dispersion properties of surface dust ion-acoustic waves in a self-gravitating magnetized dusty plasma layer with the (r, q) distribution are investigated. The result shows that the wave frequency of the symmetric mode in the plasma layer decreases with an increase in the wave number. It is also shown that the wave frequency of the symmetric mode decreases with an increase in the spectral index r. However, the wave frequency of the anti-symmetric mode increases with an increase in the wave number. It is also found that the anti-symmetric mode wave frequency increases with an increase in the spectral index r. In addition, it is found that the influence of the self-gravitation on the symmetric mode wave frequency decreases with increasing scaled Jeans frequency. Moreover, it is found that the wave frequency of the symmetric mode increases with an increase in the dust charge; however, the anti-symmetric mode shows opposite behavior.

  15. An FFT-accelerated fdtd scheme with exact absorbing conditions for characterizing axially symmetric resonant structures

    KAUST Repository

    Sirenko, Kostyantyn

    2011-01-01

    An accurate and efficient finite-difference time-domain (FDTD) method for characterizing transient waves interactions on axially symmetric structures is presented. The method achieves its accuracy and efficiency by employing localized and/or fast Fourier transform (FFT) accelerated exact absorbing conditions (EACs). The paper details the derivation of the EACs, discusses their implementation and discretization in an FDTD method, and proposes utilization of a blocked-FFT based algorithm for accelerating the computation of temporal convolutions present in nonlocal EACs. The proposed method allows transient analyses to be carried for long time intervals without any loss of accuracy and provides reliable numerical data pertinent to physical processes under resonant conditions. This renders the method highly useful in characterization of high-Q microwave radiators and energy compressors. Numerical results that demonstrate the accuracy and efficiency of the method are presented.

  16. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  17. Symmetric textures

    International Nuclear Information System (INIS)

    Ramond, P.

    1993-01-01

    The Wolfenstein parametrization is extended to the quark masses in the deep ultraviolet, and an algorithm to derive symmetric textures which are compatible with existing data is developed. It is found that there are only five such textures

  18. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  19. Probabilistic cloning of three symmetric states

    International Nuclear Information System (INIS)

    Jimenez, O.; Bergou, J.; Delgado, A.

    2010-01-01

    We study the probabilistic cloning of three symmetric states. These states are defined by a single complex quantity, the inner product among them. We show that three different probabilistic cloning machines are necessary to optimally clone all possible families of three symmetric states. We also show that the optimal cloning probability of generating M copies out of one original can be cast as the quotient between the success probability of unambiguously discriminating one and M copies of symmetric states.

  20. UTV Expansion Pack: Special-Purpose Rank-Revealing Algorithms

    DEFF Research Database (Denmark)

    Fierro, Ricardo D.; Hansen, Per Christian

    2005-01-01

    This collection of Matlab 7.0 software supplements and complements the package UTV Tools from 1999, and includes implementations of special-purpose rank-revealing algorithms developed since the publication of the original package. We provide algorithms for computing and modifying symmetric rank-r...... values of a sparse or structured matrix. These new algorithms have applications in signal processing, optimization and LSI information retrieval.......This collection of Matlab 7.0 software supplements and complements the package UTV Tools from 1999, and includes implementations of special-purpose rank-revealing algorithms developed since the publication of the original package. We provide algorithms for computing and modifying symmetric rank......-revealing VSV decompositions, we expand the algorithms for the ULLV decomposition of a matrix pair to handle interference-type problems with a rank-deficient covariance matrix, and we provide a robust and reliable Lanczos algorithm which - despite its simplicity - is able to capture all the dominant singular...

  1. A symmetrical rail accelerator

    International Nuclear Information System (INIS)

    Igenbergs, E.

    1991-01-01

    This paper reports on the symmetrical rail accelerator that has four rails, which are arranged symmetrically around the bore. The opposite rails have the same polarity and the adjacent rails the opposite polarity. In this configuration the radial force acting upon the individual rails is significantly smaller than in a conventional 2-rail configuration and a plasma armature is focussed towards the axis of the barrel. Experimental results indicate a higher efficiency compared to a conventional rail accelerator

  2. A multipoint flux mixed finite element method on distorted quadrilaterals and hexahedra

    KAUST Repository

    Wheeler, Mary; Xue, Guangri; Yotov, Ivan

    2011-01-01

    In this paper, we develop a new mixed finite element method for elliptic problems on general quadrilateral and hexahedral grids that reduces to a cell-centered finite difference scheme. A special non-symmetric quadrature rule is employed that yields

  3. The new social housing scheme in Nigeria: How beneficial for the ...

    African Journals Online (AJOL)

    The Nigerian government recently inaugurated a Special Committee on National Social Housing Scheme (NSHS) with a presidential mandate to provide housing for its less privileged citizens. In the pilot phase of the scheme, the committee was to build 18,000 units of houses across the country before the end of 2006.

  4. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  5. A Fast CT Reconstruction Scheme for a General Multi-Core PC

    Directory of Open Access Journals (Sweden)

    Kai Zeng

    2007-01-01

    Full Text Available Expensive computational cost is a severe limitation in CT reconstruction for clinical applications that need real-time feedback. A primary example is bolus-chasing computed tomography (CT angiography (BCA that we have been developing for the past several years. To accelerate the reconstruction process using the filtered backprojection (FBP method, specialized hardware or graphics cards can be used. However, specialized hardware is expensive and not flexible. The graphics processing unit (GPU in a current graphic card can only reconstruct images in a reduced precision and is not easy to program. In this paper, an acceleration scheme is proposed based on a multi-core PC. In the proposed scheme, several techniques are integrated, including utilization of geometric symmetry, optimization of data structures, single-instruction multiple-data (SIMD processing, multithreaded computation, and an Intel C++ compilier. Our scheme maintains the original precision and involves no data exchange between the GPU and CPU. The merits of our scheme are demonstrated in numerical experiments against the traditional implementation. Our scheme achieves a speedup of about 40, which can be further improved by several folds using the latest quad-core processors.

  6. A fast CT reconstruction scheme for a general multi-core PC.

    Science.gov (United States)

    Zeng, Kai; Bai, Erwei; Wang, Ge

    2007-01-01

    Expensive computational cost is a severe limitation in CT reconstruction for clinical applications that need real-time feedback. A primary example is bolus-chasing computed tomography (CT) angiography (BCA) that we have been developing for the past several years. To accelerate the reconstruction process using the filtered backprojection (FBP) method, specialized hardware or graphics cards can be used. However, specialized hardware is expensive and not flexible. The graphics processing unit (GPU) in a current graphic card can only reconstruct images in a reduced precision and is not easy to program. In this paper, an acceleration scheme is proposed based on a multi-core PC. In the proposed scheme, several techniques are integrated, including utilization of geometric symmetry, optimization of data structures, single-instruction multiple-data (SIMD) processing, multithreaded computation, and an Intel C++ compilier. Our scheme maintains the original precision and involves no data exchange between the GPU and CPU. The merits of our scheme are demonstrated in numerical experiments against the traditional implementation. Our scheme achieves a speedup of about 40, which can be further improved by several folds using the latest quad-core processors.

  7. Sparse-matrix factorizations for fast symmetric Fourier transforms

    International Nuclear Information System (INIS)

    Sequel, J.

    1987-01-01

    This work proposes new fast algorithms computing the discrete Fourier transform of certain families of symmetric sequences. Sequences commonly found in problems of structure determination by x-ray crystallography and in numerical solutions of boundary-value problems in partial differential equations are dealt with. In the algorithms presented, the redundancies in the input and output data, due to the presence of symmetries in the input data sequence, were eliminated. Using ring-theoretical methods a matrix representation is obtained for the remaining calculations; which factors as the product of a complex block-diagonal matrix times as integral matrix. A basic two-step algorithm scheme arises from this factorization with a first step consisting of pre-additions and a second step containing the calculations involved in computing with the blocks in the block-diagonal factor. These blocks are structured as block-Hankel matrices, and two sparse-matrix factoring formulas are developed in order to diminish their arithmetic complexity

  8. Homotheties of cylindrically symmetric static spacetimes

    International Nuclear Information System (INIS)

    Qadir, A.; Ziad, M.; Sharif, M.

    1998-08-01

    In this note we consider the homotheties of cylindrically symmetric static spacetimes. We find that we can provide a complete list of all metrics that admit non-trivial homothetic motions and are cylindrically symmetric static. (author)

  9. Generalized Weyl–Heisenberg Algebra, Qudit Systems and Entanglement Measure of Symmetric States via Spin Coherent States

    Directory of Open Access Journals (Sweden)

    Mohammed Daoud

    2018-04-01

    Full Text Available A relation is established in the present paper between Dicke states in a d-dimensional space and vectors in the representation space of a generalized Weyl–Heisenberg algebra of finite dimension d. This provides a natural way to deal with the separable and entangled states of a system of N = d − 1 symmetric qubit states. Using the decomposition property of Dicke states, it is shown that the separable states coincide with the Perelomov coherent states associated with the generalized Weyl–Heisenberg algebra considered in this paper. In the so-called Majorana scheme, the qudit (d-level states are represented by N points on the Bloch sphere; roughly speaking, it can be said that a qudit (in a d-dimensional space is describable by a N-qubit vector (in a N-dimensional space. In such a scheme, the permanent of the matrix describing the overlap between the N qubits makes it possible to measure the entanglement between the N qubits forming the qudit. This is confirmed by a Fubini–Study metric analysis. A new parameter, proportional to the permanent and called perma-concurrence, is introduced for characterizing the entanglement of a symmetric qudit arising from N qubits. For d = 3 ( ⇔ N = 2 , this parameter constitutes an alternative to the concurrence for two qubits. Other examples are given for d = 4 and 5. A connection between Majorana stars and zeros of a Bargmmann function for qudits closes this article.

  10. Baryon symmetric big bang cosmology

    Science.gov (United States)

    Stecker, F. W.

    1978-01-01

    Both the quantum theory and Einsteins theory of special relativity lead to the supposition that matter and antimatter were produced in equal quantities during the big bang. It is noted that local matter/antimatter asymmetries may be reconciled with universal symmetry by assuming (1) a slight imbalance of matter over antimatter in the early universe, annihilation, and a subsequent remainder of matter; (2) localized regions of excess for one or the other type of matter as an initial condition; and (3) an extremely dense, high temperature state with zero net baryon number; i.e., matter/antimatter symmetry. Attention is given to the third assumption, which is the simplest and the most in keeping with current knowledge of the cosmos, especially as pertains the universality of 3 K background radiation. Mechanisms of galaxy formation are discussed, whereby matter and antimatter might have collided and annihilated each other, or have coexisted (and continue to coexist) at vast distances. It is pointed out that baryon symmetric big bang cosmology could probably be proved if an antinucleus could be detected in cosmic radiation.

  11. Counting with symmetric functions

    CERN Document Server

    Mendes, Anthony

    2015-01-01

    This monograph provides a self-contained introduction to symmetric functions and their use in enumerative combinatorics.  It is the first book to explore many of the methods and results that the authors present. Numerous exercises are included throughout, along with full solutions, to illustrate concepts and also highlight many interesting mathematical ideas. The text begins by introducing fundamental combinatorial objects such as permutations and integer partitions, as well as generating functions.  Symmetric functions are considered in the next chapter, with a unique emphasis on the combinatorics of the transition matrices between bases of symmetric functions.  Chapter 3 uses this introductory material to describe how to find an assortment of generating functions for permutation statistics, and then these techniques are extended to find generating functions for a variety of objects in Chapter 4.  The next two chapters present the Robinson-Schensted-Knuth algorithm and a method for proving Pólya’s enu...

  12. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  13. Diagonalization of the symmetrized discrete i th right shift operator

    Science.gov (United States)

    Fuentes, Marc

    2007-01-01

    In this paper, we consider the symmetric part of the so-called ith right shift operator. We determine its eigenvalues as also the associated eigenvectors in a complete and closed form. The proposed proof is elementary, using only basical skills such as Trigonometry, Arithmetic and Linear algebra. The first section is devoted to the introduction of the tackled problem. Second and third parts contain almost all the ?technical? stuff of the proofE Afterwards, we continue with the end of the proof, provide a graphical illustration of the results, as well as an application on the polyhedral ?sandwiching? of a special compact of arising in Signal theory.

  14. Characteristic function-based semiparametric inference for skew-symmetric models

    KAUST Repository

    Potgieter, Cornelis J.

    2012-12-26

    Skew-symmetric models offer a very flexible class of distributions for modelling data. These distributions can also be viewed as selection models for the symmetric component of the specified skew-symmetric distribution. The estimation of the location and scale parameters corresponding to the symmetric component is considered here, with the symmetric component known. Emphasis is placed on using the empirical characteristic function to estimate these parameters. This is made possible by an invariance property of the skew-symmetric family of distributions, namely that even transformations of random variables that are skew-symmetric have a distribution only depending on the symmetric density. A distance metric between the real components of the empirical and true characteristic functions is minimized to obtain the estimators. The method is semiparametric, in that the symmetric component is specified, but the skewing function is assumed unknown. Furthermore, the methodology is extended to hypothesis testing. Two tests for a hypothesis of specific parameter values are considered, as well as a test for the hypothesis that the symmetric component has a specific parametric form. A resampling algorithm is described for practical implementation of these tests. The outcomes of various numerical experiments are presented. © 2012 Board of the Foundation of the Scandinavian Journal of Statistics.

  15. Symmetric metamaterials based on flower-shaped structure

    International Nuclear Information System (INIS)

    Tuong, P.V.; Park, J.W.; Rhee, J.Y.; Kim, K.W.; Cheong, H.; Jang, W.H.; Lee, Y.P.

    2013-01-01

    We proposed new models of metamaterials (MMs) based on a flower-shaped structure (FSS), whose “meta-atoms” consist of two flower-shaped metallic parts separated by a dielectric layer. Like the non-symmetric MMs based on cut-wire-pairs or electric ring resonators, the symmetrical FSS demonstrates the negative permeability at GHz frequencies. Employing the results, we designed a symmetric negative-refractive-index MM [a symmetric combined structure (SCS)], which is composed of FSSs and cross continuous wires. The MM properties of the FSS and the SCS are presented numerically and experimentally. - Highlights: • A new designed of sub-wavelength metamaterial, flower-shaped structure was proposed. • Flower-shaped meta-atom illustrated effective negative permeability. • Based on the meta-atom, negative refractive index was conventionally gained. • Negative refractive index was demonstrated with symmetric properties for electromagnetic wave. • Dimensional parameters were studied under normal electromagnetic wave

  16. Stationary axially symmetric exterior solutions in the five-dimensional representation of the Brans-Dicke-Jordan theory of gravitation

    International Nuclear Information System (INIS)

    Bruckman, W.

    1986-01-01

    The inverse scattering method of Belinsky and Zakharov is used to investigate axially symmetric stationary vacuum soliton solutions in the five-dimensional representation of the Brans-Dicke-Jordan theory of gravitation, where the scalar field of the theory is an element of a five-dimensional metric. The resulting equations for the spacetime metric are similar to those of solitons in general relativity, while the scalar field generated is the product of a simple function of the coordinates and an already known scalar field solution. A family of solutions is considered that reduce, in the absence of rotation, to the five-dimensional form of a well-known Weyl-Levi Civita axially symmetric static vacuum solution. With a suitable choice of parameters, this static limit becomes equivalent to the spherically symmetric solution of the Brans-Dicke theory. An exact metric, in which the Kerr-scalar McIntosh solution is a special case, is given explicitly

  17. Patterns of agri-environmental scheme participation in Europe

    DEFF Research Database (Denmark)

    Pavlis, Evangelos S.; Terkenli, Theano S.; Kristensen, Søren Bech Pilgaard

    2016-01-01

    This paper investigates the personal and property characteristics of landowners who use EU Rural Development agri-environmental schemes (AES), as well as their motives for participation or non-participation in such schemes. The study is based on a questionnaire survey with landowners, in selected...... areas with marginal potential for agriculture. Motives for non-participation were also found to be dependent on the level of farming engagement and on case-area landscape types.......This paper investigates the personal and property characteristics of landowners who use EU Rural Development agri-environmental schemes (AES), as well as their motives for participation or non-participation in such schemes. The study is based on a questionnaire survey with landowners, in selected...... geographical particularities and on subjective factors, farmers' individualities, different rural cultures, landscape types, EU and national policies and special needs of the study areas—all areas where agricultural production is increasingly marginalized, for different reasons. Subsidy scheme participation...

  18. Super-symmetric informationally complete measurements

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Huangjun, E-mail: hzhu@pitp.ca

    2015-11-15

    Symmetric informationally complete measurements (SICs in short) are highly symmetric structures in the Hilbert space. They possess many nice properties which render them an ideal candidate for fiducial measurements. The symmetry of SICs is intimately connected with the geometry of the quantum state space and also has profound implications for foundational studies. Here we explore those SICs that are most symmetric according to a natural criterion and show that all of them are covariant with respect to the Heisenberg–Weyl groups, which are characterized by the discrete analog of the canonical commutation relation. Moreover, their symmetry groups are subgroups of the Clifford groups. In particular, we prove that the SIC in dimension 2, the Hesse SIC in dimension 3, and the set of Hoggar lines in dimension 8 are the only three SICs up to unitary equivalence whose symmetry groups act transitively on pairs of SIC projectors. Our work not only provides valuable insight about SICs, Heisenberg–Weyl groups, and Clifford groups, but also offers a new approach and perspective for studying many other discrete symmetric structures behind finite state quantum mechanics, such as mutually unbiased bases and discrete Wigner functions.

  19. An analytical approach for a nodal scheme of two-dimensional neutron transport problems

    International Nuclear Information System (INIS)

    Barichello, L.B.; Cabrera, L.C.; Prolo Filho, J.F.

    2011-01-01

    Research highlights: → Nodal equations for a two-dimensional neutron transport problem. → Analytical Discrete Ordinates Method. → Numerical results compared with the literature. - Abstract: In this work, a solution for a two-dimensional neutron transport problem, in cartesian geometry, is proposed, on the basis of nodal schemes. In this context, one-dimensional equations are generated by an integration process of the multidimensional problem. Here, the integration is performed for the whole domain such that no iterative procedure between nodes is needed. The ADO method is used to develop analytical discrete ordinates solution for the one-dimensional integrated equations, such that final solutions are analytical in terms of the spatial variables. The ADO approach along with a level symmetric quadrature scheme, lead to a significant order reduction of the associated eigenvalues problems. Relations between the averaged fluxes and the unknown fluxes at the boundary are introduced as the usually needed, in nodal schemes, auxiliary equations. Numerical results are presented and compared with test problems.

  20. A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy

    Directory of Open Access Journals (Sweden)

    Chong Fu

    2014-02-01

    Full Text Available Very recently, several chaos-based image ciphers using a bit-level permutation have been suggested and shown promising results. Due to the diffusion effect introduced in the permutation stage, the workload of the time-consuming diffusion stage is reduced, and hence the performance of the cryptosystem is improved. In this paper, a symmetric chaos-based image cipher with a 3D cat map-based spatial bit-level permutation strategy is proposed. Compared with those recently proposed bit-level permutation methods, the diffusion effect of the new method is superior as the bits are shuffled among different bit-planes rather than within the same bit-plane. Moreover, the diffusion key stream extracted from hyperchaotic system is related to both the secret key and the plain image, which enhances the security against known/chosen plaintext attack. Extensive security analysis has been performed on the proposed scheme, including the most important ones like key space analysis, key sensitivity analysis, plaintext sensitivity analysis and various statistical analyses, which has demonstrated the satisfactory security of the proposed scheme

  1. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  2. Spherically symmetric solutions in abelian Kaluza-Klein theories

    International Nuclear Information System (INIS)

    Angus, I.G.

    1986-01-01

    We present the most general spherically symmetric solution to the field equations of the truncated five-dimensional Kaluza-Klein theory. We also detail some of the special forms of this solution. With the exception of the Gross-Perry-Sorkin monopole and the Schwarzschild solutions we find that most, and we conjecture all, of the solutions have naked curvature singularities. We then proceed to consider higher-dimensional theories with toroidal compactification and we exhibit a class of nonsingular monopole solutions which are the natural generalization of the Gross-Perry-Sorkin monopole to more than five dimensions. We also present some selected solutions including a solution pertaining to a model with a Ricci-flat, but not curvature-flat, internal manifold. All of these other solutions have naked curvature singularities. (orig.)

  3. A Semi-implicit Numerical Scheme for a Two-dimensional, Three-field Thermo-Hydraulic Modeling

    International Nuclear Information System (INIS)

    Hwang, Moonkyu; Jeong, Jaejoon

    2007-07-01

    The behavior of two-phase flow is modeled, depending on the purpose, by either homogeneous model, drift flux model, or separated flow model, Among these model, in the separated flow model, the behavior of each flow phase is modeled by its own governing equation, together with the interphase models which describe the thermal and mechanical interactions between the phases involved. In this study, a semi-implicit numerical scheme for two-dimensional, transient, two-fluid, three-field is derived. The work is an extension to the previous study for the staggered, semi-implicit numerical scheme in one-dimensional geometry (KAERI/TR-3239/2006). The two-dimensional extension is performed by specifying a relevant governing equation set and applying the related finite differencing method. The procedure for employing the semi-implicit scheme is also described in detail. Verifications are performed for a 2-dimensional vertical plate for a single-phase and two-phase flows. The calculations verify the mass and energy conservations. The symmetric flow behavior, for the verification problem, also confirms the momentum conservation of the numerical scheme

  4. An analytical drain current model for symmetric double-gate MOSFETs

    Science.gov (United States)

    Yu, Fei; Huang, Gongyi; Lin, Wei; Xu, Chuanzhong

    2018-04-01

    An analytical surface-potential-based drain current model of symmetric double-gate (sDG) MOSFETs is described as a SPICE compatible model in this paper. The continuous surface and central potentials from the accumulation to the strong inversion regions are solved from the 1-D Poisson's equation in sDG MOSFETs. Furthermore, the drain current is derived from the charge sheet model as a function of the surface potential. Over a wide range of terminal voltages, doping concentrations, and device geometries, the surface potential calculation scheme and drain current model are verified by solving the 1-D Poisson's equation based on the least square method and using the Silvaco Atlas simulation results and experimental data, respectively. Such a model can be adopted as a useful platform to develop the circuit simulator and provide the clear understanding of sDG MOSFET device physics.

  5. Linac design algorithm with symmetric segments

    International Nuclear Information System (INIS)

    Takeda, Harunori; Young, L.M.; Nath, S.; Billen, J.H.; Stovall, J.E.

    1996-01-01

    The cell lengths in linacs of traditional design are typically graded as a function of particle velocity. By making groups of cells and individual cells symmetric in both the CCDTL AND CCL, the cavity design as well as mechanical design and fabrication is simplified without compromising the performance. We have implemented a design algorithm in the PARMILA code in which cells and multi-cavity segments are made symmetric, significantly reducing the number of unique components. Using the symmetric algorithm, a sample linac design was generated and its performance compared with a similar one of conventional design

  6. SU(2) X SU(2) X U(1) basis for symmetric SO(6) representations: matrix elements of the generators

    International Nuclear Information System (INIS)

    Piepenbring, R.; Silvestre-Brac, B.; Szymanski, Z.

    1987-01-01

    Matrix elements of the group generators for the symmetric irreducible representations of SO(6) are explicitly calculated in a closed form employing thedecomposition chain SO(6) is contained in SU(2) X SU(2) X U(1) (which is different from the well known Wigner supermultiplet scheme). The relation to the Gel'fand Tsetlin method using SO(6) contained in SO(5) up to ... SO(2) is indicated. An example of a physical application is given

  7. Classification of Teleparallel Homothetic Vector Fields in Cylindrically Symmetric Static Space-Times in Teleparallel Theory of Gravitation

    International Nuclear Information System (INIS)

    Shabbir, Ghulam; Khan, Suhail

    2010-01-01

    In this paper we classify cylindrically symmetric static space-times according to their teleparallel homothetic vector fields using direct integration technique. It turns out that the dimensions of the teleparallel homothetic vector fields are 4, 5, 7 or 11, which are the same in numbers as in general relativity. In case of 4, 5 or 7 proper teleparallel homothetic vector fields exist for the special choice to the space-times. In the case of 11 teleparallel homothetic vector fields the space-time becomes Minkowski with all the zero torsion components. Teleparallel homothetic vector fields in this case are exactly the same as in general relativity. It is important to note that this classification also covers the plane symmetric static space-times. (general)

  8. PT symmetric Aubry–Andre model

    International Nuclear Information System (INIS)

    Yuce, C.

    2014-01-01

    PT symmetric Aubry–Andre model describes an array of N coupled optical waveguides with position-dependent gain and loss. We show that the reality of the spectrum depends sensitively on the degree of quasi-periodicity for small number of lattice sites. We obtain the Hofstadter butterfly spectrum and discuss the existence of the phase transition from extended to localized states. We show that rapidly changing periodical gain/loss materials almost conserve the total intensity. - Highlights: • We show that PT symmetric Aubry–Andre model may have real spectrum. • We show that the reality of the spectrum depends sensitively on the degree of disorder. • We obtain the Hofstadter butterfly spectrum for PT symmetric Aubry–Andre model. • We discuss that phase transition from extended to localized states exists

  9. PT symmetric Aubry–Andre model

    Energy Technology Data Exchange (ETDEWEB)

    Yuce, C., E-mail: cyuce@anadolu.edu.tr

    2014-06-13

    PT symmetric Aubry–Andre model describes an array of N coupled optical waveguides with position-dependent gain and loss. We show that the reality of the spectrum depends sensitively on the degree of quasi-periodicity for small number of lattice sites. We obtain the Hofstadter butterfly spectrum and discuss the existence of the phase transition from extended to localized states. We show that rapidly changing periodical gain/loss materials almost conserve the total intensity. - Highlights: • We show that PT symmetric Aubry–Andre model may have real spectrum. • We show that the reality of the spectrum depends sensitively on the degree of disorder. • We obtain the Hofstadter butterfly spectrum for PT symmetric Aubry–Andre model. • We discuss that phase transition from extended to localized states exists.

  10. Comprehensive asynchronous symmetric rendezvous algorithm in ...

    Indian Academy of Sciences (India)

    Meenu Chawla

    2017-11-10

    Nov 10, 2017 ... Simulation results affirm that CASR algorithm performs better in terms of average time-to-rendezvous as compared ... process; neighbour discovery; symmetric rendezvous algorithm. 1. .... dezvous in finite time under the symmetric model. The CH ..... CASR algorithm in Matlab 7.11 and performed several.

  11. Emittance growth in non-symmetric beam configurations

    International Nuclear Information System (INIS)

    Anderson, O.A.

    1996-06-01

    Emittance growth in intense beams due to nonuniformity, mismatch, and misalignment has been analyzed by Reiser for the special case of axisymmetry. A more complex problem occurs in cases where a number of discrete beamlets are to be merged into a single focusing channel, for example, in designs for Heavy Ion Fusion drivers or Magnetic Fusion negative-ion systems. Celata, assuming the system to be perfectly matched and aligned, analyzed the case of four round beamlets arranged in a square array. We generalize these previous studies and analyze emittance growth in systems that are less symmetric. We include beam systems that are not necessarily matched and where the x and y moments may be unequal. We also include the possibility of initial convergence velocities that may differ in the two planes and allow for misalignment of the beam center-of-mass position and direction

  12. Special issue on quantum physics with non-Hermitian operators Special issue on quantum physics with non-Hermitian operators

    Science.gov (United States)

    Bender, Carl M.; Fring, Andreas; Guenther, Uwe; Jones, Hugh F.

    2012-01-01

    This is a call for contributions to a special issue of Journal of Physics A: Mathematical and Theoretical dedicated to quantum physics with non-Hermitian operators. The main motivation behind this special issue is to gather together recent results, developments and open problems in this rapidly evolving field of research in a single comprehensive volume. We expect that such a special issue will become a valuable reference for the broad scientific community working in mathematical and theoretical physics. The issue will be open to all contributions containing new results on non-Hermitian theories which are explicitly PT-symmetric and/or pseudo-Hermitian or quasi-Hermitian. The main novelties in the past years in this area have been many experimental observations, realizations, and applications of PT symmetric Hamiltonians in optics and microwave cavities. We especially invite contributions on the theoretical interpretations of these recent PT-symmetric experiments and on theoretical proposals for new experiments. Editorial policy The Guest Editors for this issue are Carl Bender, Andreas Fring, Uwe Guenther and Hugh Jones. The areas and topics for this issue include, but are not limited to: spectral problems novel properties of complex optical potentials PT-symmetry related threshold lasers and spectral singularities construction of metric operators scattering theory supersymmetric theories Lie algebraic and Krein-space methods random matrix models classical and semi-classical models exceptional points in model systems operator theoretic approaches microwave cavities aspects of integrability and exact solvability field theories with indefinite metric All contributions will be refereed and processed according to the usual procedure of the journal. Papers should report original and significant research that has not already been published. Guidelines for preparation of contributions The deadline for contributed papers will be 31 March 2012. This deadline will allow the

  13. The Symmetric Rudin-Shapiro Transform

    DEFF Research Database (Denmark)

    Harbo, Anders La-Cour

    2003-01-01

    A method for constructing spread spectrum sequences is presented. The method is based on a linear, orthogonal, symmetric transform, the Rudin-Shapiro transform (RST), which is in many respects quite similar to the Haar wavelet packet transform. The RST provides the means for generating large sets...... of spread spectrum signals. This presentation provides a simple definition of the symmetric RST that leads to a fast N log(N) and numerically stable implementation of the transform....

  14. Symmetric imaging findings in neuroradiology

    International Nuclear Information System (INIS)

    Zlatareva, D.

    2015-01-01

    Full text: Learning objectives: to make a list of diseases and syndromes which manifest as bilateral symmetric findings on computed tomography and magnetic resonance imaging; to discuss the clinical and radiological differential diagnosis for these diseases; to explain which of these conditions necessitates urgent therapy and when additional studies and laboratory can precise diagnosis. There is symmetry in human body and quite often we compare the affected side to the normal one but in neuroradiology we might have bilateral findings which affected pair structures or corresponding anatomic areas. It is very rare when clinical data prompt diagnosis. Usually clinicians suspect such an involvement but Ct and MRI can reveal symmetric changes and are one of the leading diagnostic tool. The most common location of bilateral findings is basal ganglia and thalamus. There are a number of diseases affecting these structures symmetrically: metabolic and systemic diseases, intoxication, neurodegeneration and vascular conditions, toxoplasmosis, tumors and some infections. Malformations of cortical development and especially bilateral perisylvian polymicrogyria requires not only exact report on the most affected parts but in some cases genetic tests or combination with other clinical symptoms. In the case of herpes simplex encephalitis bilateral temporal involvement is common and this finding very often prompt therapy even before laboratory results. Posterior reversible encephalopathy syndrome (PReS) and some forms of hypoxic ischemic encephalopathy can lead to symmetric changes. In these acute conditions MR plays a crucial role not only in diagnosis but also in monitoring of the therapeutic effect. Patients with neurofibromatosis type 1 or type 2 can demonstrate bilateral optic glioma combined with spinal neurofibroma and bilateral acoustic schwanoma respectively. Mirror-image aneurysm affecting both internal carotid or middle cerebral arteries is an example of symmetry in

  15. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  16. Strong-coupling constant at three loops in momentum subtraction scheme

    International Nuclear Information System (INIS)

    Chetyrkin, K.G.; Russian Academy of Sciences, Moscow; Kniehl, B.A.; Steinhauser, M.

    2008-12-01

    In this paper we compute the three-loop corrections to the β function in a momentum subtraction (MOM) scheme with a massive quark. The calculation is performed in the background field formalism applying asymptotic expansions for small and large momenta. Special emphasis is devoted to the relation between the coupling constant in the MOM and MS schemes as well as their ability to describe the phenomenon of decoupling. It is demonstrated by an explicit comparison that the MS scheme can be consistently used to relate the values of the MOM-scheme strong-coupling constant in the energy regions higher and lower than the massive-quark production threshold. This procedure obviates the necessity to know the full mass dependence of the MOM β function and clearly demonstrates the equivalence of both schemes for the description of physics outside the threshold region. (orig.)

  17. Strong-coupling constant at three loops in momentum subtraction scheme

    Energy Technology Data Exchange (ETDEWEB)

    Chetyrkin, K.G. [Karlsruhe Univ. (T.H.), Karlsruhe Inst. of Technology (KIT) (Germany). Inst. fuer Theoretische Teilchenphysik]|[Russian Academy of Sciences, Moscow (Russian Federation). Inst. for Nuclear Research; Kniehl, B.A. [Hamburg Univ. (Germany). II. Inst. fuer Theoretische Physik; Steinhauser, M. [Karlsruhe Univ. (T.H.), Karlsruhe Inst. of Technology (KIT) (Germany). Inst. fuer Theoretische Teilchenphysik

    2008-12-15

    In this paper we compute the three-loop corrections to the {beta} function in a momentum subtraction (MOM) scheme with a massive quark. The calculation is performed in the background field formalism applying asymptotic expansions for small and large momenta. Special emphasis is devoted to the relation between the coupling constant in the MOM and MS schemes as well as their ability to describe the phenomenon of decoupling. It is demonstrated by an explicit comparison that the MS scheme can be consistently used to relate the values of the MOM-scheme strong-coupling constant in the energy regions higher and lower than the massive-quark production threshold. This procedure obviates the necessity to know the full mass dependence of the MOM {beta} function and clearly demonstrates the equivalence of both schemes for the description of physics outside the threshold region. (orig.)

  18. Looking for symmetric Bell inequalities

    OpenAIRE

    Bancal, Jean-Daniel; Gisin, Nicolas; Pironio, Stefano

    2010-01-01

    Finding all Bell inequalities for a given number of parties, measurement settings and measurement outcomes is in general a computationally hard task. We show that all Bell inequalities which are symmetric under the exchange of parties can be found by examining a symmetrized polytope which is simpler than the full Bell polytope. As an illustration of our method, we generate 238 885 new Bell inequalities and 1085 new Svetlichny inequalities. We find, in particular, facet inequalities for Bell e...

  19. The Symmetric Rudin-Shapiro Transform

    DEFF Research Database (Denmark)

    Harbo, Anders La-Cour

    2003-01-01

    A method for constructing spread spectrum sequences is presented. The method is based on a linear, orthogonal, and symmetric transform given as the Rudin-Shapiro transform (RST), which is in many respects quite similar to the Haar wavelet packet transform. The RST provides the means for generatin...... large sets of spread spectrum signals. This presentation provides a simple definition of the symmetric RST that leads to a fast N log(N) and numerically stable implementation of the transform....

  20. Harmonic analysis on symmetric spaces

    CERN Document Server

    Terras, Audrey

    This text explores the geometry and analysis of higher rank analogues of the symmetric spaces introduced in volume one. To illuminate both the parallels and differences of the higher rank theory, the space of positive matrices is treated in a manner mirroring that of the upper-half space in volume one. This concrete example furnishes motivation for the general theory of noncompact symmetric spaces, which is outlined in the final chapter. The book emphasizes motivation and comprehensibility, concrete examples and explicit computations (by pen and paper, and by computer), history, and, above all, applications in mathematics, statistics, physics, and engineering. The second edition includes new sections on Donald St. P. Richards’s central limit theorem for O(n)-invariant random variables on the symmetric space of GL(n, R), on random  matrix theory, and on advances in the theory of automorphic forms on arithmetic groups.

  1. Exact axially symmetric galactic dynamos

    Science.gov (United States)

    Henriksen, R. N.; Woodfinden, A.; Irwin, J. A.

    2018-05-01

    We give a selection of exact dynamos in axial symmetry on a galactic scale. These include some steady examples, at least one of which is wholly analytic in terms of simple functions and has been discussed elsewhere. Most solutions are found in terms of special functions, such as associated Lagrange or hypergeometric functions. They may be considered exact in the sense that they are known to any desired accuracy in principle. The new aspect developed here is to present scale-invariant solutions with zero resistivity that are self-similar in time. The time dependence is either a power law or an exponential factor, but since the geometry of the solution is self-similar in time we do not need to fix a time to study it. Several examples are discussed. Our results demonstrate (without the need to invoke any other mechanisms) X-shaped magnetic fields and (axially symmetric) magnetic spiral arms (both of which are well observed and documented) and predict reversing rotation measures in galaxy haloes (now observed in the CHANG-ES sample) as well as the fact that planar magnetic spirals are lifted into the galactic halo.

  2. On isotropic cylindrically symmetric stellar models

    International Nuclear Information System (INIS)

    Nolan, Brien C; Nolan, Louise V

    2004-01-01

    We attempt to match the most general cylindrically symmetric vacuum spacetime with a Robertson-Walker interior. The matching conditions show that the interior must be dust filled and that the boundary must be comoving. Further, we show that the vacuum region must be polarized. Imposing the condition that there are no trapped cylinders on an initial time slice, we can apply a result of Thorne's and show that trapped cylinders never evolve. This results in a simplified line element which we prove to be incompatible with the dust interior. This result demonstrates the impossibility of the existence of an isotropic cylindrically symmetric star (or even a star which has a cylindrically symmetric portion). We investigate the problem from a different perspective by looking at the expansion scalars of invariant null geodesic congruences and, applying to the cylindrical case, the result that the product of the signs of the expansion scalars must be continuous across the boundary. The result may also be understood in relation to recent results about the impossibility of the static axially symmetric analogue of the Einstein-Straus model

  3. Non-skew-symmetric classical r-matrices, algebraic Bethe ansatz, and Bardeen-Cooper-Schrieffer-type integrable systems

    International Nuclear Information System (INIS)

    Skrypnyk, T.

    2009-01-01

    We construct quantum integrable systems associated with non-skew-symmetric gl(2)-valued classical r-matrices. We find a new explicit multiparametric family of such the non-skew-symmetric classical r-matrices. We consider two classes of examples of the corresponding integrable systems, namely generalized Gaudin systems with and without an external magnetic field. In the case of arbitrary r-matrices diagonal in a standard gl(2)-basis, we calculate the spectrum of the corresponding quantum integrable systems using the algebraic Bethe ansatz. We apply these results to a construction of integrable fermionic models and obtain a wide class of integrable Bardeen-Cooper-Schrieffer (BCS)-type fermionic Hamiltonians containing the pairing and electrostatic interaction terms. We also consider special cases when the corresponding integrable Hamiltonians contain only pairing interaction term and are exact analogs of the 'reduced BCS Hamiltonian' of Richardson

  4. Capacity Bounds and Mapping Design for Binary Symmetric Relay Channels

    Directory of Open Access Journals (Sweden)

    Majid Nasiri Khormuji

    2012-12-01

    Full Text Available Capacity bounds for a three-node binary symmetric relay channel with orthogonal components at the destination are studied. The cut-set upper bound and the rates achievable using decode-and-forward (DF, partial DF and compress-and-forward (CF relaying are first evaluated. Then relaying strategies with finite memory-length are considered. An efficient algorithm for optimizing the relay functions is presented. The Boolean Fourier transform is then employed to unveil the structure of the optimized mappings. Interestingly, the optimized relay functions exhibit a simple structure. Numerical results illustrate that the rates achieved using the optimized low-dimensional functions are either comparable to those achieved by CF or superior to those achieved by DF relaying. In particular, the optimized low-dimensional relaying scheme can improve on DF relaying when the quality of the source-relay link is worse than or comparable to that of other links.

  5. An analytical drain current model for symmetric double-gate MOSFETs

    Directory of Open Access Journals (Sweden)

    Fei Yu

    2018-04-01

    Full Text Available An analytical surface-potential-based drain current model of symmetric double-gate (sDG MOSFETs is described as a SPICE compatible model in this paper. The continuous surface and central potentials from the accumulation to the strong inversion regions are solved from the 1-D Poisson’s equation in sDG MOSFETs. Furthermore, the drain current is derived from the charge sheet model as a function of the surface potential. Over a wide range of terminal voltages, doping concentrations, and device geometries, the surface potential calculation scheme and drain current model are verified by solving the 1-D Poisson’s equation based on the least square method and using the Silvaco Atlas simulation results and experimental data, respectively. Such a model can be adopted as a useful platform to develop the circuit simulator and provide the clear understanding of sDG MOSFET device physics.

  6. Lovelock black holes with maximally symmetric horizons

    Energy Technology Data Exchange (ETDEWEB)

    Maeda, Hideki; Willison, Steven; Ray, Sourya, E-mail: hideki@cecs.cl, E-mail: willison@cecs.cl, E-mail: ray@cecs.cl [Centro de Estudios CientIficos (CECs), Casilla 1469, Valdivia (Chile)

    2011-08-21

    We investigate some properties of n( {>=} 4)-dimensional spacetimes having symmetries corresponding to the isometries of an (n - 2)-dimensional maximally symmetric space in Lovelock gravity under the null or dominant energy condition. The well-posedness of the generalized Misner-Sharp quasi-local mass proposed in the past study is shown. Using this quasi-local mass, we clarify the basic properties of the dynamical black holes defined by a future outer trapping horizon under certain assumptions on the Lovelock coupling constants. The C{sup 2} vacuum solutions are classified into four types: (i) Schwarzschild-Tangherlini-type solution; (ii) Nariai-type solution; (iii) special degenerate vacuum solution; and (iv) exceptional vacuum solution. The conditions for the realization of the last two solutions are clarified. The Schwarzschild-Tangherlini-type solution is studied in detail. We prove the first law of black-hole thermodynamics and present the expressions for the heat capacity and the free energy.

  7. On the harmonic starlike functions with respect to symmetric ...

    African Journals Online (AJOL)

    In the present paper, we introduce the notions of functions harmonic starlike with respect to symmetric, conjugate and symmetric conjugate points. Such results as coefficient inequalities and structural formulae for these function classes are proved. Keywords: Harmonic functions, harmonic starlike functions, symmetric points, ...

  8. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  9. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  10. An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard

    Science.gov (United States)

    Fan, Yibo; Wang, Jidong; Ikenaga, Takeshi; Tsunoo, Yukiyasu; Goto, Satoshi

    H.264/AVC is the newest video coding standard. There are many new features in it which can be easily used for video encryption. In this paper, we propose a new scheme to do video encryption for H.264/AVC video compression standard. We define Unequal Secure Encryption (USE) as an approach that applies different encryption schemes (with different security strength) to different parts of compressed video data. This USE scheme includes two parts: video data classification and unequal secure video data encryption. Firstly, we classify the video data into two partitions: Important data partition and unimportant data partition. Important data partition has small size with high secure protection, while unimportant data partition has large size with low secure protection. Secondly, we use AES as a block cipher to encrypt the important data partition and use LEX as a stream cipher to encrypt the unimportant data partition. AES is the most widely used symmetric cryptography which can ensure high security. LEX is a new stream cipher which is based on AES and its computational cost is much lower than AES. In this way, our scheme can achieve both high security and low computational cost. Besides the USE scheme, we propose a low cost design of hybrid AES/LEX encryption module. Our experimental results show that the computational cost of the USE scheme is low (about 25% of naive encryption at Level 0 with VEA used). The hardware cost for hybrid AES/LEX module is 4678 Gates and the AES encryption throughput is about 50Mbps.

  11. Cotangent bundles over all the Hermitian symmetric spaces

    International Nuclear Information System (INIS)

    Arai, Masato; Baba, Kurando

    2016-01-01

    We construct the N = 2 supersymmetric nonlinear sigma models on the cotangent bundles over all the compact and non-compact Hermitian symmetric spaces. In order to construct them we use the projective superspace formalism which is an N = 2 off-shell superfield formulation in four-dimensional space-time. This formalism allows us to obtain the explicit expression of N = 2 supersymmetric nonlinear sigma models on the cotangent bundles over any Hermitian symmetric spaces in terms of the N =1 superfields, once the Kähler potentials of the base manifolds are obtained. Starting with N = 1 supersymmetric Kähler nonlinear sigma models on the Hermitian symmetric spaces, we extend them into the N = 2 supersymmetric models by using the projective superspace formalism and derive the general formula for the cotangent bundles over all the compact and non-compact Hermitian symmetric spaces. We apply to the formula for the non-compact Hermitian symmetric space E 7 /E 6 × U(1) 1 . (paper)

  12. Symmetric waterbomb origami.

    Science.gov (United States)

    Chen, Yan; Feng, Huijuan; Ma, Jiayao; Peng, Rui; You, Zhong

    2016-06-01

    The traditional waterbomb origami, produced from a pattern consisting of a series of vertices where six creases meet, is one of the most widely used origami patterns. From a rigid origami viewpoint, it generally has multiple degrees of freedom, but when the pattern is folded symmetrically, the mobility reduces to one. This paper presents a thorough kinematic investigation on symmetric folding of the waterbomb pattern. It has been found that the pattern can have two folding paths under certain circumstance. Moreover, the pattern can be used to fold thick panels. Not only do the additional constraints imposed to fold the thick panels lead to single degree of freedom folding, but the folding process is also kinematically equivalent to the origami of zero-thickness sheets. The findings pave the way for the pattern being readily used to fold deployable structures ranging from flat roofs to large solar panels.

  13. Symmetric modular torsatron

    Science.gov (United States)

    Rome, J.A.; Harris, J.H.

    1984-01-01

    A fusion reactor device is provided in which the magnetic fields for plasma confinement in a toroidal configuration is produced by a plurality of symmetrical modular coils arranged to form a symmetric modular torsatron referred to as a symmotron. Each of the identical modular coils is helically deformed and comprise one field period of the torsatron. Helical segments of each coil are connected by means of toroidally directed windbacks which may also provide part of the vertical field required for positioning the plasma. The stray fields of the windback segments may be compensated by toroidal coils. A variety of magnetic confinement flux surface configurations may be produced by proper modulation of the winding pitch of the helical segments of the coils, as in a conventional torsatron, winding the helix on a noncircular cross section and varying the poloidal and radial location of the windbacks and the compensating toroidal ring coils.

  14. Performance limitations of translationally symmetric nonimaging devices

    Science.gov (United States)

    Bortz, John C.; Shatz, Narkis E.; Winston, Roland

    2001-11-01

    The component of the optical direction vector along the symmetry axis is conserved for all rays propagated through a translationally symmetric optical device. This quality, referred to herein as the translational skew invariant, is analogous to the conventional skew invariant, which is conserved in rotationally symmetric optical systems. The invariance of both of these quantities is a consequence of Noether's theorem. We show how performance limits for translationally symmetric nonimaging optical devices can be derived from the distributions of the translational skew invariant for the optical source and for the target to which flux is to be transferred. Examples of computed performance limits are provided. In addition, we show that a numerically optimized non-tracking solar concentrator utilizing symmetry-breaking surface microstructure can overcome the performance limits associated with translational symmetry. The optimized design provides a 47.4% increase in efficiency and concentration relative to an ideal translationally symmetric concentrator.

  15. Embedding SAS approach into conjugate gradient algorithms for asymmetric 3D elasticity problems

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hsin-Chu; Warsi, N.A. [Clark Atlanta Univ., GA (United States); Sameh, A. [Univ. of Minnesota, Minneapolis, MN (United States)

    1996-12-31

    In this paper, we present two strategies to embed the SAS (symmetric-and-antisymmetric) scheme into conjugate gradient (CG) algorithms to make solving 3D elasticity problems, with or without global reflexive symmetry, more efficient. The SAS approach is physically a domain decomposition scheme that takes advantage of reflexive symmetry of discretized physical problems, and algebraically a matrix transformation method that exploits special reflexivity properties of the matrix resulting from discretization. In addition to offering large-grain parallelism, which is valuable in a multiprocessing environment, the SAS scheme also has the potential for reducing arithmetic operations in the numerical solution of a reasonably wide class of scientific and engineering problems. This approach can be applied directly to problems that have global reflexive symmetry, yielding smaller and independent subproblems to solve, or indirectly to problems with partial symmetry, resulting in loosely coupled subproblems. The decomposition is achieved by separating the reflexive subspace from the antireflexive one, possessed by a special class of matrices A, A {element_of} C{sup n x n} that satisfy the relation A = PAP where P is a reflection matrix (symmetric signed permutation matrix).

  16. Symmetric nonnegative matrix factorization: algorithms and applications to probabilistic clustering.

    Science.gov (United States)

    He, Zhaoshui; Xie, Shengli; Zdunek, Rafal; Zhou, Guoxu; Cichocki, Andrzej

    2011-12-01

    Nonnegative matrix factorization (NMF) is an unsupervised learning method useful in various applications including image processing and semantic analysis of documents. This paper focuses on symmetric NMF (SNMF), which is a special case of NMF decomposition. Three parallel multiplicative update algorithms using level 3 basic linear algebra subprograms directly are developed for this problem. First, by minimizing the Euclidean distance, a multiplicative update algorithm is proposed, and its convergence under mild conditions is proved. Based on it, we further propose another two fast parallel methods: α-SNMF and β -SNMF algorithms. All of them are easy to implement. These algorithms are applied to probabilistic clustering. We demonstrate their effectiveness for facial image clustering, document categorization, and pattern clustering in gene expression.

  17. High speed corner and gap-seal computations using an LU-SGS scheme

    Science.gov (United States)

    Coirier, William J.

    1989-01-01

    The hybrid Lower-Upper Symmetric Gauss-Seidel (LU-SGS) algorithm was added to a widely used series of 2D/3D Euler/Navier-Stokes solvers and was demonstrated for a particular class of high-speed flows. A limited study was conducted to compare the hybrid LU-SGS for approximate Newton iteration and diagonalized Beam-Warming (DBW) schemes on a work and convergence history basis. The hybrid LU-SGS algorithm is more efficient and easier to implement than the DBW scheme originally present in the code for the cases considered. The code was validated for the hypersonic flow through two mutually perpendicular flat plates and then used to investigate the flow field in and around a simplified scramjet module gap seal configuration. Due to the similarities, the gap seal flow was compared to hypersonic corner flow at the same freestream conditions and Reynolds number.

  18. Symmetric Imidazolium-Based Paramagnetic Ionic Liquids

    Science.gov (United States)

    2017-11-29

    Charts N/A Unclassified Unclassified Unclassified SAR 14 Kamran Ghiassi N/A 1 Symmetric Imidazolium-Based Paramagnetic Ionic Liquids Kevin T. Greeson...NUMBER (Include area code) 29 November 2017 Briefing Charts 01 November 2017 - 30 November 2017 Symmetric Imidazolium-Based Paramagnetic Ionic ... Liquids K. Greeson, K. Ghiassi, J. Alston, N. Redeker, J. Marcischak, L. Gilmore, A. Guenthner Air Force Research Laboratory (AFMC) AFRL/RQRP 9 Antares

  19. Magnetospectroscopy of symmetric and anti-symmetric states in double quantum wells

    Science.gov (United States)

    Marchewka, M.; Sheregii, E. M.; Tralle, I.; Ploch, D.; Tomaka, G.; Furdak, M.; Kolek, A.; Stadler, A.; Mleczko, K.; Zak, D.; Strupinski, W.; Jasik, A.; Jakiela, R.

    2008-02-01

    The experimental results obtained for magnetotransport in the InGaAs/InAlAs double quantum well (DQW) structures of two different shapes of wells are reported. A beating effect occurring in the Shubnikov-de Haas (SdH) oscillations was observed for both types of structures at low temperatures in the parallel transport when the magnetic field was perpendicular to the layers. An approach for the calculation of the Landau level energies for DQW structures was developed and then applied to the analysis and interpretation of the experimental data related to the beating effect. We also argue that in order to account for the observed magnetotransport phenomena (SdH and integer quantum Hall effect), one should introduce two different quasi-Fermi levels characterizing two electron subsystems regarding the symmetry properties of their states, symmetric and anti-symmetric ones, which are not mixed by electron-electron interaction.

  20. An Employer of Last Resort Scheme which Resembles a Free Labour Market

    OpenAIRE

    MUSGRAVE, Ralph S.

    2017-01-01

    Abstract. The idea that government should act as employer of last resort (ELR) is an old one. That idea is often referred to nowadays as “job guarantee”. Many ELR schemes to date have been confined to the public sector. There is no good reason for that limitation: i.e. the private sector should use ELR labour as well.  A second common characteristic of ELR schemes has been that (like the WPA in the US in the 1930s) they involve specially set up projects or schemes as distinct from subsidising...

  1. THE COVARIATION FUNCTION FOR SYMMETRIC &ALPHA;-STABLE RANDOM VARIABLES WITH FINITE FIRST MOMENTS

    Directory of Open Access Journals (Sweden)

    Dedi Rosadi

    2012-05-01

    Full Text Available In this paper, we discuss a generalized dependence measure which is designed to measure dependence of two symmetric α-stable random variables with finite mean(1<α<=2 and contains the covariance function as the special case (when α=2. Weshortly discuss some basic properties of the function and consider several methods to estimate the function and further investigate the numerical properties of the estimatorusing the simulated data. We show how to apply this function to measure dependence of some stock returns on the composite index LQ45 in Indonesia Stock Exchange.

  2. A modified chaos-based communication scheme using Hamiltonian forms and observer

    International Nuclear Information System (INIS)

    Lopez-Mancilla, D; Cruz-Hernandez, C; Posadas-Castillo, C

    2005-01-01

    In this work, a modified chaos-based communication scheme is presented. In particular, we use the modified scheme proposed by Lopez-Mancilla and Cruz-Hernandez (2005), that improves the basic scheme for chaotic masking using a single transmission channel proposed by Cuomo and coworkers (1993). It is extended for a special class of Generalized Hamiltonian systems. Substantial differences that significantly affect the reception quality of the sent message, with or without considering noise effect in the transmission channel are given. We use two Hamiltonian Lorenz systems unidirectionally coupled, the first like a master/transmitter system and the other like a slave/receiver system in order to illustrate with numerical simulations the effectiveness of the modified scheme, using chaos synchronization with Hamiltonian forms and observer

  3. A modified chaos-based communication scheme using Hamiltonian forms and observer

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Mancilla, D [Engineering Faculty, Baja California Autonomous University (UABC), Km. 103, Carretera Tijuana-Ensenada, 22860, Ensenada, B.C. (Mexico); Cruz-Hernandez, C [Telematics Direction, Scientific Research and Advanced Studies of Ensenada (CICESE), Km. 107 Carretera Tijuana-Ensenada, 22860 Ensenada, B.C. (Mexico); Posadas-Castillo, C [Engineering Faculty, Baja California Autonomous University (UABC), Km. 103, Carretera Tijuana-Ensenada, 22860, Ensenada, B.C. (Mexico); Faculty of Engineering Mechanic and Electrical (FIME), Nuevo Leon Autonomous University (UANL), Pedro de alba s/n Cd. Universitaria San Nicolas de los Garza N.L. (Mexico)

    2005-01-01

    In this work, a modified chaos-based communication scheme is presented. In particular, we use the modified scheme proposed by Lopez-Mancilla and Cruz-Hernandez (2005), that improves the basic scheme for chaotic masking using a single transmission channel proposed by Cuomo and coworkers (1993). It is extended for a special class of Generalized Hamiltonian systems. Substantial differences that significantly affect the reception quality of the sent message, with or without considering noise effect in the transmission channel are given. We use two Hamiltonian Lorenz systems unidirectionally coupled, the first like a master/transmitter system and the other like a slave/receiver system in order to illustrate with numerical simulations the effectiveness of the modified scheme, using chaos synchronization with Hamiltonian forms and observer.

  4. The theory of spherically symmetric thin shells in conformal gravity

    Science.gov (United States)

    Berezin, Victor; Dokuchaev, Vyacheslav; Eroshenko, Yury

    The spherically symmetric thin shells are the nearest generalizations of the point-like particles. Moreover, they serve as the simple sources of the gravitational fields both in General Relativity and much more complex quadratic gravity theories. We are interested in the special and physically important case when all the quadratic in curvature tensor (Riemann tensor) and its contractions (Ricci tensor and scalar curvature) terms are present in the form of the square of Weyl tensor. By definition, the energy-momentum tensor of the thin shell is proportional to Diracs delta-function. We constructed the theory of the spherically symmetric thin shells for three types of gravitational theories with the shell: (1) General Relativity; (2) Pure conformal (Weyl) gravity where the gravitational part of the total Lagrangian is just the square of the Weyl tensor; (3) Weyl-Einstein gravity. The results are compared with these in General Relativity (Israel equations). We considered in detail the shells immersed in the vacuum. Some peculiar properties of such shells are found. In particular, for the traceless ( = massless) shell, it is shown that their dynamics cannot be derived from the matching conditions and, thus, is completely arbitrary. On the contrary, in the case of the Weyl-Einstein gravity, the trajectory of the same type of shell is completely restored even without knowledge of the outside solution.

  5. Filtering microfluidic bubble trains at a symmetric junction.

    Science.gov (United States)

    Parthiban, Pravien; Khan, Saif A

    2012-02-07

    We report how a nominally symmetric microfluidic junction can be used to sort all bubbles of an incoming train exclusively into one of its arms. The existence of this "filter" regime is unexpected, given that the junction is symmetric. We analyze this behavior by quantifying how bubbles modulate the hydrodynamic resistance in microchannels and show how speeding up a bubble train whilst preserving its spatial periodicity can lead to filtering at a nominally symmetric junction. We further show how such an asymmetric traffic of bubble trains can be triggered in symmetric geometries by identifying conditions wherein the resistance to flow decreases with an increase in the number of bubbles in the microchannel and derive an exact criterion to predict the same.

  6. Charge-exchange QRPA with the Gogny Force for Axially-symmetric Deformed Nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Martini, M., E-mail: martini.marco@gmail.com [Institut d' Astronomie et d' Astrophysique, Université Libre de Bruxelles, CP-226, 1050 Brussels (Belgium); CEA, DAM, DIF, F-91297 Arpajon (France); Goriely, S. [Institut d' Astronomie et d' Astrophysique, Université Libre de Bruxelles, CP-226, 1050 Brussels (Belgium); Péru, S. [CEA, DAM, DIF, F-91297 Arpajon (France)

    2014-06-15

    In recent years fully consistent quasiparticle random-phase approximation (QRPA) calculations using finite range Gogny force have been performed to study electromagnetic excitations of several axially-symmetric deformed nuclei up to the {sup 238}U. Here we present the extension of this approach to the charge-exchange nuclear excitations (pnQRPA). In particular we focus on the Isobaric Analog and Gamow-Teller resonances. A comparison of the predicted GT strength distribution with existing experimental data is presented. The role of nuclear deformation is shown. Special attention is paid to β-decay half-lives calculations for which experimental data exist and for specific isotone chains of relevance for the r-process nucleosynthesis.

  7. 6j-symbols for symmetric representations of SO(n) as the double series

    International Nuclear Information System (INIS)

    Alisauskas, Sigitas

    2002-01-01

    The corrected triple sum expression of Alisauskas (1987 J. Phys. A: Math. Gen. 20 35) for the recoupling (Racah) coefficients (6j-symbols) of the symmetric (most degenerate) representations of the orthogonal groups SO(n) (previously derived from the fourfold sum expression of Alisauskas also related to the result of Hormess and Junker (1999 J. Phys. A: Math. Gen. 32 4249) is rearranged into three new different double sum expressions (related to the hypergeometric Kampe de Feriet type series) and a new triple sum expression with preferable summation condition. The Regge type symmetry of special 6j-symbols of the orthogonal groups SO(n) in terms of special Kampe de Feriet F 1:4 1:3 series is revealed. The recoupling coefficients for antisymmetric representations of symplectic group Sp(2n) are derived using their relation with the recoupling coefficients of the formal orthogonal group SO(-2n)

  8. Entangling capabilities of symmetric two-qubit gates

    Indian Academy of Sciences (India)

    Com- putational investigation of entanglement of such ensembles is therefore impractical for ... the computational complexity. Pairs of spin-1 ... tensor operators which can also provide different symmetric logic gates for quantum pro- ... that five of the eight, two-qubit symmetric quantum gates expressed in terms of our newly.

  9. Pion condensation in symmetric nuclear matter

    Science.gov (United States)

    Kabir, K.; Saha, S.; Nath, L. M.

    1988-01-01

    Using a model which is based essentially on the chiral SU(2)×SU(2) symmetry of the pion-nucleon interaction, we examine the possibility of pion condensation in symmetric nucleon matter. We find that the pion condensation is not likely to occur in symmetric nuclear matter for any finite value of the nuclear density. Consequently, no critical opalescence phenomenom is expected to be seen in the pion-nucleus interaction.

  10. A cascaded three-phase symmetrical multistage voltage multiplier

    International Nuclear Information System (INIS)

    Iqbal, Shahid; Singh, G K; Besar, R; Muhammad, G

    2006-01-01

    A cascaded three-phase symmetrical multistage Cockcroft-Walton voltage multiplier (CW-VM) is proposed in this report. It consists of three single-phase symmetrical voltage multipliers, which are connected in series at their smoothing columns like string of batteries and are driven by three-phase ac power source. The smoothing column of each voltage multiplier is charged twice every cycle independently by respective oscillating columns and discharged in series through load. The charging discharging process completes six times a cycle and therefore the output voltage ripple's frequency is of sixth order of the drive signal frequency. Thus the proposed approach eliminates the first five harmonic components of load generated voltage ripples and sixth harmonic is the major ripple component. The proposed cascaded three-phase symmetrical voltage multiplier has less than half the voltage ripple, and three times larger output voltage and output power than the conventional single-phase symmetrical CW-VM. Experimental and simulation results of the laboratory prototype are given to show the feasibility of proposed cascaded three-phase symmetrical CW-VM

  11. Centrioles in Symmetric Spaces

    OpenAIRE

    Quast, Peter

    2011-01-01

    We describe all centrioles in irreducible simply connected pointed symmetric spaces of compact type in terms of the root system of the ambient space, and we study some geometric properties of centrioles.

  12. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  13. Pion condensation in symmetric nuclear matter

    International Nuclear Information System (INIS)

    Kabir, K.; Saha, S.; Nath, L.M.

    1987-09-01

    Using a model which is based essentially on the chiral SU(2)xSU(2) symmetry of the pion-nucleon interaction, we examine the possibility of pion condensation in symmetric nucleon matter. We find that the pion condensation is not likely to occur in symmetric nuclear matter for any finite value of the nuclear density. Consequently, no critical opalescence phenomenon is expected to be seen in the pion-nucleus interaction. (author). 20 refs

  14. Topologically protected bound states in photonic parity-time-symmetric crystals.

    Science.gov (United States)

    Weimann, S; Kremer, M; Plotnik, Y; Lumer, Y; Nolte, S; Makris, K G; Segev, M; Rechtsman, M C; Szameit, A

    2017-04-01

    Parity-time (PT)-symmetric crystals are a class of non-Hermitian systems that allow, for example, the existence of modes with real propagation constants, for self-orthogonality of propagating modes, and for uni-directional invisibility at defects. Photonic PT-symmetric systems that also support topological states could be useful for shaping and routing light waves. However, it is currently debated whether topological interface states can exist at all in PT-symmetric systems. Here, we show theoretically and demonstrate experimentally the existence of such states: states that are localized at the interface between two topologically distinct PT-symmetric photonic lattices. We find analytical closed form solutions of topological PT-symmetric interface states, and observe them through fluorescence microscopy in a passive PT-symmetric dimerized photonic lattice. Our results are relevant towards approaches to localize light on the interface between non-Hermitian crystals.

  15. Synthesis & Characterization of New bis-Symmetrical Adipoyl ...

    African Journals Online (AJOL)

    Full Title: Synthesis and Characterization of New bis-Symmetrical Adipoyl, Terepthaloyl, Chiral Diimido-di-L-alanine Diesters and Chiral Phthaloyl-L-alanine Ester of Tripropoxy p-tert-Butyl Calix[4]arene and Study of Their Hosting Ability for Alanine and Na+. Bis-symmetrical tripropoxy p-tert-butyl calix[4]arene esters were ...

  16. Looking for symmetric Bell inequalities

    Energy Technology Data Exchange (ETDEWEB)

    Bancal, Jean-Daniel; Gisin, Nicolas [Group of Applied Physics, University of Geneva, 20 rue de l' Ecole-de Medecine, CH-1211 Geneva 4 (Switzerland); Pironio, Stefano, E-mail: jean-daniel.bancal@unige.c [Laboratoire d' Information Quantique, Universite Libre de Bruxelles (Belgium)

    2010-09-24

    Finding all Bell inequalities for a given number of parties, measurement settings and measurement outcomes is in general a computationally hard task. We show that all Bell inequalities which are symmetric under the exchange of parties can be found by examining a symmetrized polytope which is simpler than the full Bell polytope. As an illustration of our method, we generate 238 885 new Bell inequalities and 1085 new Svetlichny inequalities. We find, in particular, facet inequalities for Bell experiments involving two parties and two measurement settings that are not of the Collins-Gisin-Linden-Massar-Popescu type.

  17. Looking for symmetric Bell inequalities

    International Nuclear Information System (INIS)

    Bancal, Jean-Daniel; Gisin, Nicolas; Pironio, Stefano

    2010-01-01

    Finding all Bell inequalities for a given number of parties, measurement settings and measurement outcomes is in general a computationally hard task. We show that all Bell inequalities which are symmetric under the exchange of parties can be found by examining a symmetrized polytope which is simpler than the full Bell polytope. As an illustration of our method, we generate 238 885 new Bell inequalities and 1085 new Svetlichny inequalities. We find, in particular, facet inequalities for Bell experiments involving two parties and two measurement settings that are not of the Collins-Gisin-Linden-Massar-Popescu type.

  18. Diagrams for symmetric product orbifolds

    International Nuclear Information System (INIS)

    Pakman, Ari; Rastelli, Leonardo; Razamat, Shlomo S.

    2009-01-01

    We develop a diagrammatic language for symmetric product orbifolds of two-dimensional conformal field theories. Correlation functions of twist operators are written as sums of diagrams: each diagram corresponds to a branched covering map from a surface where the fields are single-valued to the base sphere where twist operators are inserted. This diagrammatic language facilitates the study of the large N limit and makes more transparent the analogy between symmetric product orbifolds and free non-abelian gauge theories. We give a general algorithm to calculate the leading large N contribution to four-point correlators of twist fields.

  19. Symmetric normalisation for intuitionistic logic

    DEFF Research Database (Denmark)

    Guenot, Nicolas; Straßburger, Lutz

    2014-01-01

    We present two proof systems for implication-only intuitionistic logic in the calculus of structures. The first is a direct adaptation of the standard sequent calculus to the deep inference setting, and we describe a procedure for cut elimination, similar to the one from the sequent calculus......, but using a non-local rewriting. The second system is the symmetric completion of the first, as normally given in deep inference for logics with a DeMorgan duality: all inference rules have duals, as cut is dual to the identity axiom. We prove a generalisation of cut elimination, that we call symmetric...

  20. The Axially Symmetric One-Monopole

    International Nuclear Information System (INIS)

    Wong, K.-M.; Teh, Rosy

    2009-01-01

    We present new classical generalized one-monopole solution of the SU(2) Yang-Mills-Higgs theory with the Higgs field in the adjoint representation. We show that this solution with θ-winding number m = 1 and φ-winding number n = 1 is an axially symmetric generalization of the 't Hooft-Polyakov one-monopole. We construct this axially symmetric one-monopole solution by generalizing the large distance asymptotic solutions of the 't Hooft-Polyakov one-monopole to the Jacobi elliptic functions and solving the second order equations of motion numerically when the Higgs potential is vanishing. This solution is a non-BPS solution.

  1. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  2. Symmetrized partial-wave method for density-functional cluster calculations

    International Nuclear Information System (INIS)

    Averill, F.W.; Painter, G.S.

    1994-01-01

    The computational advantage and accuracy of the Harris method is linked to the simplicity and adequacy of the reference-density model. In an earlier paper, we investigated one way the Harris functional could be extended to systems outside the limits of weakly interacting atoms by making the charge density of the interacting atoms self-consistent within the constraints of overlapping spherical atomic densities. In the present study, a method is presented for augmenting the interacting atom charge densities with symmetrized partial-wave expansions on each atomic site. The added variational freedom of the partial waves leads to a scheme capable of giving exact results within a given exchange-correlation approximation while maintaining many of the desirable convergence and stability properties of the original Harris method. Incorporation of the symmetry of the cluster in the partial-wave construction further reduces the level of computational effort. This partial-wave cluster method is illustrated by its application to the dimer C 2 , the hypothetical atomic cluster Fe 6 Al 8 , and the benzene molecule

  3. Solutions for the conductivity of multi-coated spheres and spherically symmetric inclusion problems

    Science.gov (United States)

    Pham, Duc Chinh

    2018-02-01

    Variational results on the macroscopic conductivity (thermal, electrical, etc.) of the multi-coated sphere assemblage have been used to derive the explicit expression of the respective field (thermal, electrical, etc.) within the spheres in d dimensions (d=2,3). A differential substitution approach has been developed to construct various explicit expressions or determining equations for the effective spherically symmetric inclusion problems, which include those with radially variable conductivity, different radially variable transverse and normal conductivities, and those involving imperfect interfaces, in d dimensions. When the volume proportion of the outermost spherical shell increases toward 1, one obtains the respective exact results for the most important specific cases: the dilute solutions for the compound inhomogeneities suspended in a major matrix phase. Those dilute solution results are also needed for other effective medium approximation schemes.

  4. Modulation of precipitation by conditional symmetric instability release

    Science.gov (United States)

    Glinton, Michael R.; Gray, Suzanne L.; Chagnon, Jeffrey M.; Morcrette, Cyril J.

    2017-03-01

    Although many theoretical and observational studies have investigated the mechanism of conditional symmetric instability (CSI) release and associated it with mesoscale atmospheric phenomena such as frontal precipitation bands, cloud heads in rapidly developing extratropical cyclones and sting jets, its climatology and contribution to precipitation have not been extensively documented. The aim of this paper is to quantify the contribution of CSI release, yielding slantwise convection, to climatological precipitation accumulations for the North Atlantic and western Europe. Case studies reveal that CSI release could be common along cold fronts of mature extratropical cyclones and the North Atlantic storm track is found to be a region with large CSI according to two independent CSI metrics. Correlations of CSI with accumulated precipitation are also large in this region and CSI release is inferred to be occurring about 20% of the total time over depths of over 1 km. We conclude that the inability of current global weather forecast and climate prediction models to represent CSI release (due to insufficient resolution yet lack of subgrid parametrization schemes) may lead to errors in precipitation distributions, particularly in the region of the North Atlantic storm track.

  5. On zero variance Monte Carlo path-stretching schemes

    International Nuclear Information System (INIS)

    Lux, I.

    1983-01-01

    A zero variance path-stretching biasing scheme proposed for a special case by Dwivedi is derived in full generality. The procedure turns out to be the generalization of the exponential transform. It is shown that the biased game can be interpreted as an analog simulation procedure, thus saving some computational effort in comparison with the corresponding nonanalog game

  6. Crossing-symmetric solutions to low equations

    International Nuclear Information System (INIS)

    McLeod, R.J.; Ernst, D.J.

    1985-01-01

    Crossing symmetric models of the pion-nucleon interaction in which crossing symmetry is kept to lowest order in msub(π)/msub(N) are investigated. Two iterative techniques are developed to solve the crossing-symmetric Low equation. The techniques are used to solve the original Chew-Low equations and their generalizations to include the coupling to the pion-production channels. Small changes are found in comparison with earlier results which used an iterative technique proposed by Chew and Low and which did not produce crossing-symmetric results. The iterative technique of Chew and Low is shown to fail because of its inability to produce zeroes in the amplitude at complex energies while physical solutions to the model require such zeroes. We also prove that, within the class of solutions such that phase shifts approach zero for infinite energy, the solution to the Low equation is unique. (orig.)

  7. Radon transformation on reductive symmetric spaces:Support theorems

    DEFF Research Database (Denmark)

    Kuit, Job Jacob

    2013-01-01

    We introduce a class of Radon transforms for reductive symmetric spaces, including the horospherical transforms, and derive support theorems for these transforms. A reductive symmetric space is a homogeneous space G/H for a reductive Lie group G of the Harish-Chandra class, where H is an open sub...... is based on the relation between the Radon transform and the Fourier transform on G/H, and a Paley–Wiener-shift type argument. Our results generalize the support theorem of Helgason for the Radon transform on a Riemannian symmetric space....

  8. Spherically Symmetric Solutions of the Einstein-Bach Equations and a Consistent Spin-2 Field Theory

    International Nuclear Information System (INIS)

    Janda, A.

    2006-01-01

    We briefly present a relationship between General Relativity coupled to certain spin-0 and spin-2 field theories and higher derivatives metric theories of gravity. In a special case, described by the Einstein-Bach equations, the spin-0 field drops out from the theory and we obtain a consistent spin-two field theory interacting gravitationally, which overcomes a well known inconsistency of the theory for a linear spin-two field coupled to the Einstein's gravity. Then we discuss basic properties of static spherically symmetric solutions of the Einstein-Bach equations. (author)

  9. Conserving GW scheme for nonequilibrium quantum transport in molecular contacts

    DEFF Research Database (Denmark)

    Thygesen, Kristian Sommer; Rubio, Angel

    2008-01-01

    We give a detailed presentation of our recent scheme to include correlation effects in molecular transport calculations using the nonequilibrium Keldysh formalism. The scheme is general and can be used with any quasiparticle self-energy, but for practical reasons, we mainly specialize to the so......-called GW self-energy, widely used to describe the quasiparticle band structures and spectroscopic properties of extended and low-dimensional systems. We restrict the GW self-energy to a finite, central region containing the molecule, and we describe the leads by density functional theory (DFT). A minimal...

  10. Judgement of Design Scheme Based on Flexible Constraint in ICAD

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    The conception of flexible constraint is proposed in the paper. The solution of flexible constraint is in special range, and maybe different in different instances of same design scheme. The paper emphasis on how to evaluate and optimize a design scheme with flexible constraints based on the satisfaction degree function defined on flexible constraints. The conception of flexible constraint is used to solve constraint conflict and design optimization in complicated constraint-based assembly design by the PFM parametrization assembly design system. An instance of gear-box design is used for verifying optimization method.

  11. Young—Capelli symmetrizers in superalgebras†

    Science.gov (United States)

    Brini, Andrea; Teolis, Antonio G. B.

    1989-01-01

    Let Supern[U [unk] V] be the nth homogeneous subspace of the supersymmetric algebra of U [unk] V, where U and V are Z2-graded vector spaces over a field K of characteristic zero. The actions of the general linear Lie superalgebras pl(U) and pl(V) span two finite-dimensional K-subalgebras B and [unk] of EndK(Supern[U [unk] V]) that are the centralizers of each other. Young—Capelli symmetrizers and Young—Capelli *-symmetrizers give rise to K-linear bases of B and [unk] containing orthogonal systems of idempotents; thus they yield complete decompositions of B and [unk] into minimal left and right ideals, respectively. PMID:16594014

  12. Symmetric splitting of very light systems

    International Nuclear Information System (INIS)

    Grotowski, K.; Majka, Z.; Planeta, R.

    1984-01-01

    Inclusive and coincidence measurements have been performed to study symmetric products from the reactions 74--186 MeV 12 C+ 40 Ca, 141 MeV 9 Be+ 40 Ca, and 153 MeV 6 Li+ 40 Ca. The binary decay of the composite system has been verified. Energy spectra, angular distributions, and fragment correlations are presented. The total kinetic energies for the symmetric products from these very light composite systems are compared to liquid drop model calculations and fission systematics

  13. Radon transformation on reductive symmetric spaces: support theorems

    NARCIS (Netherlands)

    Kuit, J.J.|info:eu-repo/dai/nl/313872589

    2011-01-01

    In this thesis we introduce a class of Radon transforms for reductive symmetric spaces, including the horospherical transforms, and study some of their properties. In particular we obtain a generalization of Helgason's support theorem for the horospherical transform on a Riemannian symmetric space.

  14. Decomposition of a symmetric second-order tensor

    Science.gov (United States)

    Heras, José A.

    2018-05-01

    In the three-dimensional space there are different definitions for the dot and cross products of a vector with a second-order tensor. In this paper we show how these products can uniquely be defined for the case of symmetric tensors. We then decompose a symmetric second-order tensor into its ‘dot’ part, which involves the dot product, and the ‘cross’ part, which involves the cross product. For some physical applications, this decomposition can be interpreted as one in which the dot part identifies with the ‘parallel’ part of the tensor and the cross part identifies with the ‘perpendicular’ part. This decomposition of a symmetric second-order tensor may be suitable for undergraduate courses of vector calculus, mechanics and electrodynamics.

  15. Technical Note: Adjoint formulation of the TOMCAT atmospheric transport scheme in the Eulerian backtracking framework (RETRO-TOM)

    Science.gov (United States)

    Haines, P. E.; Esler, J. G.; Carver, G. D.

    2014-06-01

    A new methodology for the formulation of an adjoint to the transport component of the chemistry transport model TOMCAT is described and implemented in a new model, RETRO-TOM. The Eulerian backtracking method is used, allowing the forward advection scheme (Prather's second-order moments) to be efficiently exploited in the backward adjoint calculations. Prather's scheme is shown to be time symmetric, suggesting the possibility of high accuracy. To attain this accuracy, however, it is necessary to make a careful treatment of the "density inconsistency" problem inherent to offline transport models. The results are verified using a series of test experiments. These demonstrate the high accuracy of RETRO-TOM when compared with direct forward sensitivity calculations, at least for problems in which flux limiters in the advection scheme are not required. RETRO-TOM therefore combines the flexibility and stability of a "finite difference of adjoint" formulation with the accuracy of an "adjoint of finite difference" formulation.

  16. Revisiting the Optical PT-Symmetric Dimer

    Directory of Open Access Journals (Sweden)

    José Delfino Huerta Morales

    2016-08-01

    Full Text Available Optics has proved a fertile ground for the experimental simulation of quantum mechanics. Most recently, optical realizations of PT -symmetric quantum mechanics have been shown, both theoretically and experimentally, opening the door to international efforts aiming at the design of practical optical devices exploiting this symmetry. Here, we focus on the optical PT -symmetric dimer, a two-waveguide coupler where the materials show symmetric effective gain and loss, and provide a review of the linear and nonlinear optical realizations from a symmetry-based point of view. We go beyond a simple review of the literature and show that the dimer is just the smallest of a class of planar N-waveguide couplers that are the optical realization of the Lorentz group in 2 + 1 dimensions. Furthermore, we provide a formulation to describe light propagation through waveguide couplers described by non-Hermitian mode coupling matrices based on a non-Hermitian generalization of the Ehrenfest theorem.

  17. Analysis of a Multilevel Dual Active Bridge (ML-DAB DC-DC Converter Using Symmetric Modulation

    Directory of Open Access Journals (Sweden)

    M. A. Moonem

    2015-04-01

    Full Text Available Dual active bridge (DAB converters have been popular in high voltage, low and medium power DC-DC applications, as well as an intermediate high frequency link in solid state transformers. In this paper, a multilevel DAB (ML-DAB has been proposed in which two active bridges produce two-level (2L-5L, 5L-2L and 3L-5L voltage waveforms across the high frequency transformer. The proposed ML-DAB has the advantage of being used in high step-up/down converters, which deal with higher voltages, as compared to conventional two-level DABs. A three-level neutral point diode clamped (NPC topology has been used in the high voltage bridge, which enables the semiconductor switches to be operated within a higher voltage range without the need for cascaded bridges or multiple two-level DAB converters. A symmetric modulation scheme, based on the least number of angular parameters rather than the duty-ratio, has been proposed for a different combination of bridge voltages. This ML-DAB is also suitable for maximum power point tracking (MPPT control in photovoltaic applications. Steady-state analysis of the converter with symmetric phase-shift modulation is presented and verified using simulation and hardware experiments.

  18. GAME ANALYSIS OF KYOTO AND POST-KYOTO SCHEMES

    Energy Technology Data Exchange (ETDEWEB)

    Haruo Imai [Kyoto Institute of Economic Research, Kyoto University, Sakyo, Kyoto (Japan)

    2008-09-30

    Kyoto protocol, put in force in Feb. 2005, is criticized from both sides, those demanding a stricter target for GHG (green house gas) emission reduction on the one side, and those claiming for more flexible and comprehensive controls of the emission on the other side, for its modest target and narrow coverage. Even though its value could be that of a mere precedent and experimentation, Kyoto protocol includes very special experimentation to assist the world wide cooperation for a mitigation of climate change, i.e. the introduction of three mechanisms, emissions trading, joint implementation, and clean development mechanism (CDM). Together, they are called Kyoto mechanisms. Evaluation of mechanisms is one important role of microeconomics and the game theory is a major tool for it. We shall scrutinize these mechanisms from such viewpoint. A special attention is placed on CDM, as it is the novel mechanism introduced by Kyoto protocol, and gives a unique link between Annex I nations (mostly developed countries) and non-Annex I nations (mostly developing countries). Next, we examine some of the currently proposed schemes after 2013, the post Kyoto schemes. One of the chief issues is the possibility of making a comprehensive agreement including both the USA and large developing countries with rapidly increasing emission levels of GHG like China and India. Adding to these, not only the proposed schemes themselves, but the process of negotiation itself inspired several researches in cooperative game theory and in particular, coalition formation theory. We shall touch upon this issue separately, and examine how successfully they predicted the outcome leading to Kyoto, retrospectively. Finally, we end our discussion with a brief consideration over the underlining normative argument concerning these schemes.

  19. Parity-Time Symmetric Photonics

    KAUST Repository

    Zhao, Han

    2018-01-17

    The establishment of non-Hermitian quantum mechanics (such as parity-time (PT) symmetry) stimulates a paradigmatic shift for studying symmetries of complex potentials. Owing to the convenient manipulation of optical gain and loss in analogy to the complex quantum potentials, photonics provides an ideal platform for visualization of many conceptually striking predictions from the non-Hermitian quantum theory. A rapidly developing field has emerged, namely, PT symmetric photonics, demonstrating intriguing optical phenomena including eigenstate coalescence and spontaneous PT symmetry breaking. The advance of quantum physics, as the feedback, provides photonics with brand-new paradigms to explore the entire complex permittivity plane for novel optical functionalities. Here, we review recent exciting breakthroughs in PT symmetric photonics while systematically presenting their underlying principles guided by non-Hermitian symmetries. The potential device applications for optical communication and computing, bio-chemical sensing, and healthcare are also discussed.

  20. Physics-preserving averaging scheme based on Grunwald-Letnikov formula for gas flow in fractured media

    KAUST Repository

    Amir, Sahar Z.

    2018-01-02

    The heterogeneous natures of rock fabrics, due to the existence of multi-scale fractures and geological formations, led to the deviations from unity in the flux-equations fractional-exponent magnitudes. In this paper, the resulting non-Newtonian non-Darcy fractional-derivatives flux equations are solved using physics-preserving averaging schemes that incorporates both, original and shifted, Grunwald-Letnikov (GL) approximation formulas preserving the physics, by reducing the shifting effects, while maintaining the stability of the system, by keeping one shifted expansion. The proposed way of using the GL expansions also generate symmetrical coefficient matrices that significantly reduces the discretization complexities appearing with all shifted cases from literature, and help considerably in 2D and 3D systems. Systems equations derivations and discretization details are discussed. Then, the physics-preserving averaging scheme is explained and illustrated. Finally, results are presented and reviewed. Edge-based original GL expansions are unstable as also illustrated in literatures. Shifted GL expansions are stable but add a lot of additional weights to both discretization sides affecting the physical accuracy. In comparison, the physics-preserving averaging scheme balances the physical accuracy and stability requirements leading to a more physically conservative scheme that is more stable than the original GL approximation but might be slightly less stable than the shifted GL approximations. It is a locally conservative Single-Continuum averaging scheme that applies a finite-volume viewpoint.

  1. Physics-preserving averaging scheme based on Grunwald-Letnikov formula for gas flow in fractured media

    KAUST Repository

    Amir, Sahar Z.; Sun, Shuyu

    2018-01-01

    The heterogeneous natures of rock fabrics, due to the existence of multi-scale fractures and geological formations, led to the deviations from unity in the flux-equations fractional-exponent magnitudes. In this paper, the resulting non-Newtonian non-Darcy fractional-derivatives flux equations are solved using physics-preserving averaging schemes that incorporates both, original and shifted, Grunwald-Letnikov (GL) approximation formulas preserving the physics, by reducing the shifting effects, while maintaining the stability of the system, by keeping one shifted expansion. The proposed way of using the GL expansions also generate symmetrical coefficient matrices that significantly reduces the discretization complexities appearing with all shifted cases from literature, and help considerably in 2D and 3D systems. Systems equations derivations and discretization details are discussed. Then, the physics-preserving averaging scheme is explained and illustrated. Finally, results are presented and reviewed. Edge-based original GL expansions are unstable as also illustrated in literatures. Shifted GL expansions are stable but add a lot of additional weights to both discretization sides affecting the physical accuracy. In comparison, the physics-preserving averaging scheme balances the physical accuracy and stability requirements leading to a more physically conservative scheme that is more stable than the original GL approximation but might be slightly less stable than the shifted GL approximations. It is a locally conservative Single-Continuum averaging scheme that applies a finite-volume viewpoint.

  2. Crossing symmetric solution of the Chew-Low equation

    International Nuclear Information System (INIS)

    McLeod, R.J.; Ernst, D.J.

    1982-01-01

    An N/D dispersion theory is developed which solves crossing symmetric Low equations. The method is used to generate crossing symmetric solutions to the Chew-Low model. We show why the technique originally proposed by Chew and Low was incapable of producing solutions. (orig.)

  3. Exact and analytic solutions of the Ernst equation governing axially symmetric stationary vacuum gravitational fields

    International Nuclear Information System (INIS)

    Baxter, Mathew; Van Gorder, Robert A

    2013-01-01

    We obtain solutions to a transformation of the axially symmetric Ernst equation, which governs a class of exact solutions of Einstein's field equations. Physically, the equation serves as a model of axially symmetric stationary vacuum gravitational fields. By an application of the method of homotopy analysis, we are able to construct approximate analytic solutions to the relevant boundary value problem in the case where exact solutions are not possible. The results presented constitute a solution for a complicated nonlinear and singular initial value problem. Through appropriate selection of the auxiliary linear operator and convergence control parameter, we are able to obtain low order approximations which minimize residual error over the problem domain. The benefit to such approach is that we obtain very accurate approximations after computing very few terms, hence the computational efficiency is high. Finally, an exact solution is provided in a special case, and this corresponds to the analytical solutions obtained in the more general case. The approximate solutions agree qualitatively with the exact solutions. (paper)

  4. Asymptotically stable fourth-order accurate schemes for the diffusion equation on complex shapes

    International Nuclear Information System (INIS)

    Abarbanel, S.; Ditkowski, A.

    1997-01-01

    An algorithm which solves the multidimensional diffusion equation on complex shapes to fourth-order accuracy and is asymptotically stable in time is presented. This bounded-error result is achieved by constructing, on a rectangular grid, a differentiation matrix whose symmetric part is negative definite. The differentiation matrix accounts for the Dirichlet boundary condition by imposing penalty-like terms. Numerical examples in 2-D show that the method is effective even where standard schemes, stable by traditional definitions, fail. The ability of the paradigm to be applied to arbitrary geometric domains is an important feature of the algorithm. 5 refs., 14 figs

  5. A Novel Symmetrical Split Ring Resonator Based on Microstrip for Microwave Sensors

    Directory of Open Access Journals (Sweden)

    Alahnomi Rammah A.

    2016-02-01

    Full Text Available In this paper, novel symmetrical split ring resonator (SSRR is proposed as a suitable component for performance enhancement of microwave sensors. SSRR has been employed for enhancing the insertion loss of the microwave sensors. Using the same device area, we can achieve a high Q-factor of 141.54 from the periphery enhancement using Quasi-linear coupling SSRR, whereas loose coupling SSRR can achieve a Q-factor of 33.98 only. Using Quasi-linear coupling SSRR, the Q-factor is enhanced 4.16 times the loose coupling SSRR using the same device area. After the optimization was made, the SSRR sensor with loose coupling scheme has achieved a very high Qfactor value around 407.34 while quasi-linear scheme has achieved high Q-factor value of 278.78 at the same operating frequency with smaller insertion loss. Spurious passbands at 1st, 2nd, 3rd, and 4th harmonics have been completely suppressed well above -20 dB rejection level without visible changes in the passband filter characteristics. The most significant of using SSRR is to be used for various industrial applications such as food industry, quality control, bio-sensing medicine and pharmacy. The simulation result that Quasi-linear coupling SSRR is a viable candidate for the performance enhancement of microwave sensors has been verified.

  6. Symmetric webs, Jones-Wenzl recursions and q-Howe duality

    DEFF Research Database (Denmark)

    Rose, David; Tubbenhauer, Daniel

    We define and study the category of symmetric sl2-webs. This category is a combinatorial description of the category of all finite dimensional quantum sl2-modules. Explicitly, we show that (the additive closure of) the symmetric sl2-spider is (braided monoidally) equivalent to the latter. Our mai...... tool is a quantum version of symmetric Howe duality. As a corollary of our construction, we provide new insight into Jones-Wenzl projectors and the colored Jones polynomials....

  7. Revealed Comparative Advantage and the Alternatives as Measures of International Specialization

    DEFF Research Database (Denmark)

    Laursen, Keld

    2015-01-01

    This paper provides an analysis of Balassa's 'revealed comparative advantage' (RCA). It shows that when using RCA, it should be adjusted such that it becomes symmetric around its neutral value. The proposed adjusted index is called 'revealed symmetric comparative advantage' (RSCA). The theoretica...... Balance, Chi Square, and Bowen's Net Trade Index. The result of the analysis is that RSCA-on balance-is the best measure of comparative advantage....... discussion focuses on the properties of RSCA and empirical evidence, based on the Jarque-Bera test for normality of the regression error terms, using both the RCA and RSCA indices. We compare RSCA to other measures of international trade specialization including the Michaely index, the Contribution to Trade...

  8. SUSY formalism for the symmetric double well potential

    Indian Academy of Sciences (India)

    symmetric double well potential barrier we have obtained a class of exactly solvable potentials subject to moving boundary condition. The eigenstates are also obtained by the same technique. Keywords. SUSY; moving boundary condition; exactly solvable; symmetric double well; NH3 molecule. PACS Nos 02.30.Ik; 03.50.

  9. Coupled dilaton and electromagnetic field in cylindrically symmetric ...

    Indian Academy of Sciences (India)

    The dilaton black hole solutions have attracted considerable attention for the ... theory and study the corresponding cylindrically symmetric spacetime, where .... where Йm and Йe are integration constants to be interpreted later as the ..... feature is apparent for the cylindrically symmetric spacetime in the presence of the dila-.

  10. LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Song Li

    2017-01-01

    Full Text Available From smart watch to remote healthcare system, wireless body sensor networks (WBSNs play an important role in modern healthcare system. However, the weak capacity of devices has limited WBSNs development. Considering the huge processing and storage capacity of the cloud, it can be merged with WBSNs to make up for the deficiencies of weak capacity. Based on this consideration, the concept of cloud-assisted WBSNs has been proposed recently. In contrast to generic data, the data in cloud-assisted WBSNs will be used for providing medical diagnosis, so the integrity of data is very important because any modification will result in severe consequences such as misdiagnosis. The public auditing scheme could provide an efficient solution to check the data integrity remotely without downloading them. However, the traditional public auditing scheme for cloud cannot be used directly due to the high data density and weak processing capacity in WBSNs. So, in this paper, we proposed a lightweight and efficient public auditing scheme, LEPA, for cloud-assisted WBSNs. Compared with similar schemes, the WBSNs’ client only needs to do one symmetrical encryption with low computational cost in LEPA. Security proof shows that LEPA can resist two types of adversaries in random oracle model. The efficiency evaluation also shows that LEPA outperforms previous proposals.

  11. Generalized transformations and coordinates for static spherically symmetric general relativity

    Science.gov (United States)

    Hill, James M.; O'Leary, Joseph

    2018-04-01

    We examine a static, spherically symmetric solution of the empty space field equations of general relativity with a non-orthogonal line element which gives rise to an opportunity that does not occur in the standard derivations of the Schwarzschild solution. In these derivations, convenient coordinate transformations and dynamical assumptions inevitably lead to the Schwarzschild solution. By relaxing these conditions, a new solution possibility arises and the resulting formalism embraces the Schwarzschild solution as a special case. The new solution avoids the coordinate singularity associated with the Schwarzschild solution and is achieved by obtaining a more suitable coordinate chart. The solution embodies two arbitrary constants, one of which can be identified as the Newtonian gravitational potential using the weak field limit. The additional arbitrary constant gives rise to a situation that allows for generalizations of the Eddington-Finkelstein transformation and the Kruskal-Szekeres coordinates.

  12. A symmetric geometric measure and the dynamics of quantum discord

    International Nuclear Information System (INIS)

    Jiang Feng-Jian; Shi Ming-Jun; Lü Hai-Jiang; Yan Xin-Hu

    2013-01-01

    A symmetric measure of quantum correlation based on the Hilbert—Schmidt distance is presented in this paper. For two-qubit states, we considerably simplify the optimization procedure so that numerical evaluation can be performed efficiently. Analytical expressions for the quantum correlation are attained for some special states. We further investigate the dynamics of quantum correlation of the system qubits in the presence of independent dissipative environments. Several nontrivial aspects are demonstrated. We find that the quantum correlation can increase even if the system state is suffering from dissipative noise. Sudden changes occur, even twice, in the time evolution of quantum correlation. There exists a certain correspondence between the evolution of quantum correlation in the systems and that in the environments, and the quantum correlation in the systems will be transferred into the environments completely and asymptotically. (general)

  13. Generalized transformations and coordinates for static spherically symmetric general relativity.

    Science.gov (United States)

    Hill, James M; O'Leary, Joseph

    2018-04-01

    We examine a static, spherically symmetric solution of the empty space field equations of general relativity with a non-orthogonal line element which gives rise to an opportunity that does not occur in the standard derivations of the Schwarzschild solution. In these derivations, convenient coordinate transformations and dynamical assumptions inevitably lead to the Schwarzschild solution. By relaxing these conditions, a new solution possibility arises and the resulting formalism embraces the Schwarzschild solution as a special case. The new solution avoids the coordinate singularity associated with the Schwarzschild solution and is achieved by obtaining a more suitable coordinate chart. The solution embodies two arbitrary constants, one of which can be identified as the Newtonian gravitational potential using the weak field limit. The additional arbitrary constant gives rise to a situation that allows for generalizations of the Eddington-Finkelstein transformation and the Kruskal-Szekeres coordinates.

  14. UTV Expansion Pack - Special-Purpose Rank Revealing Algorithms (version 1.0 for Matlab 6.5)

    DEFF Research Database (Denmark)

    Fierro, Ricardo D.; Hansen, Per Christian

    This collection of Matlab software supplements and complements the package UTV Tools from 1999, and includes implementations of special-purpose rank-revealing algorithms developed since the publication of the original package. We provide algorithms for computing and modifying symmetric rank...

  15. Diversity-Multiplexing Trade-off for Coordinated Direct and Relay Schemes

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar; De Carvalho, Elisabeth

    2013-01-01

    The recent years have brought a significant body of research on wireless Two-Way Relaying (TWR), where the use of network coding brings an evident advantage in terms of data rates. Yet, TWR scenarios represent only a special case and it is of interest to devise similar techniques in more general...... Direct/Relay (CDR) schemes, which involve two flows, of a direct and a relayed user. In this paper we characterize a CDR scheme by deriving/bounding the Diversity-Multiplexing Trade-off (DMT) function. Two cases are considered. In the first case a transmitter knows the Channel State Information (CSI...

  16. Highly-dispersive electromagnetic induced transparency in planar symmetric metamaterials.

    Science.gov (United States)

    Lu, Xiqun; Shi, Jinhui; Liu, Ran; Guan, Chunying

    2012-07-30

    We propose, design and experimentally demonstrate highly-dispersive electromagnetically induced transparency (EIT) in planar symmetric metamaterials actively switched and controlled by angles of incidence. Full-wave simulation and measurement results show EIT phenomena, trapped-mode excitations and the associated local field enhancement of two symmetric metamaterials consisting of symmetrically split rings (SSR) and a fishscale (FS) metamaterial pattern, respectively, strongly depend on angles of incidence. The FS metamaterial shows much broader spectral splitting than the SSR metamaterial due to the surface current distribution variation.

  17. Parallel coupling of symmetric and asymmetric exclusion processes

    International Nuclear Information System (INIS)

    Tsekouras, K; Kolomeisky, A B

    2008-01-01

    A system consisting of two parallel coupled channels where particles in one of them follow the rules of totally asymmetric exclusion processes (TASEP) and in another one move as in symmetric simple exclusion processes (SSEP) is investigated theoretically. Particles interact with each other via hard-core exclusion potential, and in the asymmetric channel they can only hop in one direction, while on the symmetric lattice particles jump in both directions with equal probabilities. Inter-channel transitions are also allowed at every site of both lattices. Stationary state properties of the system are solved exactly in the limit of strong couplings between the channels. It is shown that strong symmetric couplings between totally asymmetric and symmetric channels lead to an effective partially asymmetric simple exclusion process (PASEP) and properties of both channels become almost identical. However, strong asymmetric couplings between symmetric and asymmetric channels yield an effective TASEP with nonzero particle flux in the asymmetric channel and zero flux on the symmetric lattice. For intermediate strength of couplings between the lattices a vertical-cluster mean-field method is developed. This approximate approach treats exactly particle dynamics during the vertical transitions between the channels and it neglects the correlations along the channels. Our calculations show that in all cases there are three stationary phases defined by particle dynamics at entrances, at exits or in the bulk of the system, while phase boundaries depend on the strength and symmetry of couplings between the channels. Extensive Monte Carlo computer simulations strongly support our theoretical predictions. Theoretical calculations and computer simulations predict that inter-channel couplings have a strong effect on stationary properties. It is also argued that our results might be relevant for understanding multi-particle dynamics of motor proteins

  18. Optimized helper data scheme for biometric verification under zero leakage constraint

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2012-01-01

    In biometric verication, special measures are needed to prevent that a dishon- est verier can steal privacy-sensitive information about the prover from the template database. We introduce an improved version of the zero leakage quan- tization scheme, which optimizes detection performance in terms of

  19. Confining but chirally symmetric dense and cold matter

    International Nuclear Information System (INIS)

    Glozman, L. Ya.

    2012-01-01

    The possibility for existence of cold, dense chirally symmetric matter with confinement is reviewed. The answer to this question crucially depends on the mechanism of mass generation in QCD and interconnection of confinement and chiral symmetry breaking. This question can be clarified from spectroscopy of hadrons and their axial properties. Almost systematical parity doubling of highly excited hadrons suggests that their mass is not related to chiral symmetry breaking in the vacuum and is approximately chirally symmetric. Then there is a possibility for existence of confining but chirally symmetric matter. We clarify a possible mechanism underlying such a phase at low temperatures and large density. Namely, at large density the Pauli blocking prevents the gap equation to generate a solution with broken chiral symmetry. However, the chirally symmetric part of the quark Green function as well as all color non-singlet quantities are still infrared divergent, meaning that the system is with confinement. A possible phase transition to such a matter is most probably of the first order. This is because there are no chiral partners to the lowest lying hadrons.

  20. Spin and pseudospin symmetric Dirac particles in the field of Tietz—Hua potential including Coulomb tensor interaction

    International Nuclear Information System (INIS)

    Ikhdair, Sameer M.; Hamzavi, Majid

    2013-01-01

    Approximate analytical solutions of the Dirac equation for Tietz—Hua (TH) potential including Coulomb-like tensor (CLT) potential with arbitrary spin—orbit quantum number κ are obtained within the Pekeris approximation scheme to deal with the spin—orbit coupling terms κ(κ ± 1)r −2 . Under the exact spin and pseudospin symmetric limitation, bound state energy eigenvalues and associated unnormalized two-component wave functions of the Dirac particle in the field of both attractive and repulsive TH potential with tensor potential are found using the parametric Nikiforov—Uvarov (NU) method. The cases of the Morse oscillator with tensor potential, the generalized Morse oscillator with tensor potential, and the non-relativistic limits have been investigated. (general)

  1. Solitons in PT-symmetric potential with competing nonlinearity

    International Nuclear Information System (INIS)

    Khare, Avinash; Al-Marzoug, S.M.; Bahlouli, Hocine

    2012-01-01

    We investigate the effect of competing nonlinearities on beam dynamics in PT-symmetric potentials. In particular, we consider the stationary nonlinear Schrödinger equation (NLSE) in one dimension with competing cubic and generalized nonlinearity in the presence of a PT-symmetric potential. Closed form solutions for localized states are obtained. These solitons are shown to be stable over a wide range of potential parameters. The transverse power flow associated with these complex solitons is also examined. -- Highlights: ► Effect of competing nonlinearities on beam dynamics in PT-symmetric potentials. ► Closed form solutions for localized states are. ► The transverse power flow associated with these complex solitons is also examined.

  2. Optimal cloning of arbitrary mirror-symmetric distributions on the Bloch sphere: a proposal for practical photonic realization

    International Nuclear Information System (INIS)

    Bartkiewicz, Karol; Miranowicz, Adam

    2012-01-01

    We study state-dependent quantum cloning that can outperform universal cloning (UC). This is possible by using some a priori information on a given quantum state to be cloned. Specifically, we propose a generalization and optical implementation of quantum optimal mirror phase-covariant cloning, which refers to optimal cloning of sets of qubits of known modulus of the expectation value of Pauli's Z operator. Our results can be applied to cloning of an arbitrary mirror-symmetric distribution of qubits on the Bloch sphere including in special cases UC and phase-covariant cloning. We show that the cloning is optimal by adapting our former optimality proof for axisymmetric cloning (Bartkiewicz and Miranowicz 2010 Phys. Rev. A 82 042330). Moreover, we propose an optical realization of the optimal mirror phase-covariant 1→2 cloning of a qubit, for which the mean probability of successful cloning varies from 1/6 to 1/3 depending on prior information on the set of qubits to be cloned. The qubits are represented by polarization states of photons generated by the type-I spontaneous parametric down-conversion. The scheme is based on the interference of two photons on an unbalanced polarization-dependent beam splitter with different splitting ratios for vertical and horizontal polarization components and the additional application of feedforward by means of Pockels cells. The experimental feasibility of the proposed setup is carefully studied including various kinds of imperfections and losses. Moreover, we briefly describe two possible cryptographic applications of the optimal mirror phase-covariant cloning corresponding to state discrimination (or estimation) and secure quantum teleportation.

  3. Some exact solutions for maximally symmetric topological defects in Anti de Sitter space

    Science.gov (United States)

    Alvarez, Orlando; Haddad, Matthew

    2018-03-01

    We obtain exact analytical solutions for a class of SO( l) Higgs field theories in a non-dynamic background n-dimensional anti de Sitter space. These finite transverse energy solutions are maximally symmetric p-dimensional topological defects where n = ( p + 1) + l. The radius of curvature of anti de Sitter space provides an extra length scale that allows us to study the equations of motion in a limit where the masses of the Higgs field and the massive vector bosons are both vanishing. We call this the double BPS limit. In anti de Sitter space, the equations of motion depend on both p and l. The exact analytical solutions are expressed in terms of standard special functions. The known exact analytical solutions are for kink-like defects ( p = 0 , 1 , 2 , . . . ; l = 1), vortex-like defects ( p = 1 , 2 , 3; l = 2), and the 't Hooft-Polyakov monopole ( p = 0; l = 3). A bonus is that the double BPS limit automatically gives a maximally symmetric classical glueball type solution. In certain cases where we did not find an analytic solution, we present numerical solutions to the equations of motion. The asymptotically exponentially increasing volume with distance of anti de Sitter space imposes different constraints than those found in the study of defects in Minkowski space.

  4. Color symmetrical superconductivity in a schematic nuclear quark model

    DEFF Research Database (Denmark)

    Bohr, Henrik; Providencia, C.; da Providencia, J.

    2010-01-01

    In this letter, a novel BCS-type formalism is constructed in the framework of a schematic QCD inspired quark model, having in mind the description of color symmetrical superconducting states. In the usual approach to color superconductivity, the pairing correlations affect only the quasi-particle...... states of two colors, the single-particle states of the third color remaining unaffected by the pairing correlations. In the theory of color symmetrical superconductivity here proposed, the pairing correlations affect symmetrically the quasi-particle states of the three colors and vanishing net color...

  5. Geometric characteristics of aberrations of plane-symmetric optical systems

    International Nuclear Information System (INIS)

    Lu Lijun; Deng Zhiyong

    2009-01-01

    The geometric characteristics of aberrations of plane-symmetric optical systems are studied in detail with a wave-aberration theory. It is dealt with as an extension of the Seidel aberrations to realize a consistent aberration theory from axially symmetric to plane-symmetric systems. The aberration distribution is analyzed with the spot diagram of a ray and an aberration curve. Moreover, the root-mean-square value and the centroid of aberration distribution are discussed. The numerical results are obtained with the focusing optics of a toroidal mirror at grazing incidence.

  6. Kinematics in special and general relativity

    International Nuclear Information System (INIS)

    Woodside, R.W.M.

    1979-05-01

    This thesis investigates the problem of motion for extended bodies from the viewpoint of classical field theory, where the classical field is the body's energy-momentum or matter tensor. In special relativity a symmetric and divergence-free matter tensor combined with inertial frames is used to generate a kinematics for extended bodies. In general relativity the author suggests an analogous kinematics and applies it to the simplest non-trivial example of static, spherical stars, looking for special sets of vector fields whose matter currents are conserved. Such a set of ten vector fields defines a special frame, and integrals of the conserved matter currents define ten momenta whcih give the kinematics. Application of de Rham cohomology theory shows that the conserved matter currents for isolated bodies will have mechanical potentials which enable the momenta to be found from flux integrals evaluated in the vacuum region surrounding the body. These potentials contain the full Riemann curvature, allowing a body's general relativistic momenta to be determined by its vacuum graviational field

  7. Sparse symmetric preconditioners for dense linear systems in electromagnetism

    NARCIS (Netherlands)

    Carpentieri, Bruno; Duff, Iain S.; Giraud, Luc; Monga Made, M. Magolu

    2004-01-01

    We consider symmetric preconditioning strategies for the iterative solution of dense complex symmetric non-Hermitian systems arising in computational electromagnetics. In particular, we report on the numerical behaviour of the classical incomplete Cholesky factorization as well as some of its recent

  8. Spherically symmetric Einstein-aether perfect fluid models

    Energy Technology Data Exchange (ETDEWEB)

    Coley, Alan A.; Latta, Joey [Department of Mathematics and Statistics, Dalhousie University, Halifax, Nova Scotia, B3H 3J5 (Canada); Leon, Genly [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4950, Valparaíso (Chile); Sandin, Patrik, E-mail: aac@mathstat.dal.ca, E-mail: genly.leon@ucv.cl, E-mail: patrik.sandin@aei.mpg.de, E-mail: lattaj@mathstat.dal.ca [Max-Planck-Institut für Gravitationsphysik (Albert-Einstein-Institut), Am Mühlenberg 1, D-14476 Potsdam (Germany)

    2015-12-01

    We investigate spherically symmetric cosmological models in Einstein-aether theory with a tilted (non-comoving) perfect fluid source. We use a 1+3 frame formalism and adopt the comoving aether gauge to derive the evolution equations, which form a well-posed system of first order partial differential equations in two variables. We then introduce normalized variables. The formalism is particularly well-suited for numerical computations and the study of the qualitative properties of the models, which are also solutions of Horava gravity. We study the local stability of the equilibrium points of the resulting dynamical system corresponding to physically realistic inhomogeneous cosmological models and astrophysical objects with values for the parameters which are consistent with current constraints. In particular, we consider dust models in (β−) normalized variables and derive a reduced (closed) evolution system and we obtain the general evolution equations for the spatially homogeneous Kantowski-Sachs models using appropriate bounded normalized variables. We then analyse these models, with special emphasis on the future asymptotic behaviour for different values of the parameters. Finally, we investigate static models for a mixture of a (necessarily non-tilted) perfect fluid with a barotropic equations of state and a scalar field.

  9. On some Approximation Schemes for Steady Compressible Viscous Flow

    Science.gov (United States)

    Bause, M.; Heywood, J. G.; Novotny, A.; Padula, M.

    This paper continues our development of approximation schemes for steady compressible viscous flow based on an iteration between a Stokes like problem for the velocity and a transport equation for the density, with the aim of improving their suitability for computations. Such schemes seem attractive for computations because they offer a reduction to standard problems for which there is already highly refined software, and because of the guidance that can be drawn from an existence theory based on them. Our objective here is to modify a recent scheme of Heywood and Padula [12], to improve its convergence properties. This scheme improved upon an earlier scheme of Padula [21], [23] through the use of a special ``effective pressure'' in linking the Stokes and transport problems. However, its convergence is limited for several reasons. Firstly, the steady transport equation itself is only solvable for general velocity fields if they satisfy certain smallness conditions. These conditions are met here by using a rescaled variant of the steady transport equation based on a pseudo time step for the equation of continuity. Another matter limiting the convergence of the scheme in [12] is that the Stokes linearization, which is a linearization about zero, has an inevitably small range of convergence. We replace it here with an Oseen or Newton linearization, either of which has a wider range of convergence, and converges more rapidly. The simplicity of the scheme offered in [12] was conducive to a relatively simple and clearly organized proof of its convergence. The proofs of convergence for the more complicated schemes proposed here are structured along the same lines. They strengthen the theorems of existence and uniqueness in [12] by weakening the smallness conditions that are needed. The expected improvement in the computational performance of the modified schemes has been confirmed by Bause [2], in an ongoing investigation.

  10. Tilting-connected symmetric algebras

    OpenAIRE

    Aihara, Takuma

    2010-01-01

    The notion of silting mutation was introduced by Iyama and the author. In this paper we mainly study silting mutation for self-injective algebras and prove that any representation-finite symmetric algebra is tilting-connected. Moreover we give some sufficient conditions for a Bongartz-type Lemma to hold for silting objects.

  11. Rings with involution whose symmetric elements are central

    Directory of Open Access Journals (Sweden)

    Taw Pin Lim

    1980-01-01

    Full Text Available In a ring R with involution whose symmetric elements S are central, the skew-symmetric elements K form a Lie algebra over the commutative ring S. The classification of such rings which are 2-torsion free is equivalent to the classification of Lie algebras K over S equipped with a bilinear form f that is symmetric, invariant and satisfies [[x,y],z]=f(y,zx−f(z,xy. If S is a field of char ≠2, f≠0 and dimK>1 then K is a semisimple Lie algebra if and only if f is nondegenerate. Moreover, the derived algebra K′ is either the pure quaternions over S or a direct sum of mutually orthogonal abelian Lie ideals of dim≤2.

  12. A General Scheme for Information Interception in the Ping-Pong Protocol

    Directory of Open Access Journals (Sweden)

    Piotr Zawadzki

    2016-01-01

    Full Text Available The existence of undetectable eavesdropping of dense coded information has been already demonstrated by Pavičić for the quantum direct communication based on the ping-pong paradigm. However, (a the explicit scheme of the circuit is only given and no design rules are provided; (b the existence of losses is implicitly assumed; (c the attack has been formulated against qubit based protocol only and it is not clear whether it can be adapted to higher dimensional systems. These deficiencies are removed in the presented contribution. A new generic eavesdropping scheme built on a firm theoretical background is proposed. In contrast to the previous approach, it does not refer to the properties of the vacuum state, so it is fully consistent with the absence of losses assumption. Moreover, the scheme applies to the communication paradigm based on signal particles of any dimensionality. It is also shown that some well known attacks are special cases of the proposed scheme.

  13. Pressure correction schemes for compressible flows

    International Nuclear Information System (INIS)

    Kheriji, W.

    2011-01-01

    This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)

  14. Optomechanically induced absorption in parity-time-symmetric optomechanical systems

    Science.gov (United States)

    Zhang, X. Y.; Guo, Y. Q.; Pei, P.; Yi, X. X.

    2017-06-01

    We explore the optomechanically induced absorption (OMIA) in a parity-time- (PT -) symmetric optomechanical system (OMS). By numerically calculating the Lyapunov exponents, we find out the stability border of the PT -symmetric OMS. The results show that in the PT -symmetric phase the system can be either stable or unstable depending on the coupling constant and the decay rate. In the PT -symmetric broken phase the system can have a stable state only for small gain rates. By calculating the transmission rate of the probe field, we find that there is an inverted optomechanically induced transparency (OMIT) at δ =-ωM and an OMIA at δ =ωM for the PT -symmetric optomechanical system. At each side of δ =-ωM there is an absorption window due to the resonance absorption of the two generated supermodes. Comparing with the case of optomechanics coupled to a passive cavity, we find that the active cavity can enhance the resonance absorption. The absorption rate at δ =ωM increases as the coupling strength between the two cavities increases. Our work provides us with a promising platform for controlling light propagation and light manipulation in terms of PT symmetry, which might have potential applications in quantum information processing and quantum optical devices.

  15. Symmetric spaces and the Kashiwara-Vergne method

    CERN Document Server

    Rouvière, François

    2014-01-01

    Gathering and updating results scattered in journal articles over thirty years, this self-contained monograph gives a comprehensive introduction to the subject. Its goal is to: - motivate and explain the method for general Lie groups, reducing the proof of deep results in invariant analysis to the verification of two formal Lie bracket identities related to the Campbell-Hausdorff formula (the "Kashiwara-Vergne conjecture"); - give a detailed proof of the conjecture for quadratic and solvable Lie algebras, which is relatively elementary; - extend the method to symmetric spaces; here an obstruction appears, embodied in a single remarkable object called an "e-function"; - explain the role of this function in invariant analysis on symmetric spaces, its relation to invariant differential operators, mean value operators and spherical functions; - give an explicit e-function for rank one spaces (the hyperbolic spaces); - construct an e-function for general symmetric spaces, in the spirit of Kashiwara and Vergne's or...

  16. Social Protection Schemes in Pakistan: assessment of existing programs

    Directory of Open Access Journals (Sweden)

    Yu ShuHong

    2017-07-01

    Full Text Available Social protection is regarded as a basic human right guaranteed in several International Covenants and Treaties. The Constitution of Pakistan exclusively stipulates the provision of social security for all citizens of the country. The aim of the study is to explore and evaluate the social protection schemes with regards to its coverage, scope and outreach. The country has number of social security schemes that are being carried out by provincial and federal governments for the welfare of workers like old age benefits, disablement, health and medical facilities. However, these schemes have failed to extend their benefits to home based, part-time, temporary or contract and agricultural workers. This paper attempts to highlight the shortcomings of existing social protection programs that are obstructing their benefit distribution and limiting their outreach. It underlines the challenges faced by the implementing agencies. This paper also suggests some improvements in the structural design of social security mechanism with special focus on the scope, coverage, outreach and effective delivery mechanism. Since, the proper allocation of resources and effective implementation of these schemes can ensure the assistance and welfare of the targeted population.

  17. Improvements and validation of the linear surface characteristics scheme

    International Nuclear Information System (INIS)

    Santandrea, S.; Jaboulay, J.C.; Bellier, P.; Fevotte, F.; Golfier, H.

    2009-01-01

    In this paper we present the last improvements of the recently proposed linear surface (LS) characteristics scheme for unstructured meshes. First we introduce a new numerical tracking technique, specifically adapted to the LS method, which tailors transverse integration weights to take into account the geometrical discontinuities that appear along the pipe affected to every trajectory in classical characteristics schemes. Another development allows using the volumetric flux variation of the LS method to re-compute step-wise constant fluxes to be used in other parts of a computational scheme. This permits to take greater advantage of the higher precision of the LS method without necessarily conceiving specialized theories for all the modular functionalities of a spectral code such as APOLLO2. Moreover we present a multi-level domain decomposition method for solving the synthetic acceleration operator that is used to accelerate the free iterations for the LS method. We discuss all these new developments by illustrating some benchmarks results obtained with the LS method. This is done by detailed comparisons with Monte-Carlo calculations. In particular we show that the new method can be used not only as a reference tool, but also inside a suitable industrial calculation scheme

  18. Chaos-based CAZAC scheme for secure transmission in OFDM-PON

    Science.gov (United States)

    Fu, Xiaosong; Bi, Meihua; Zhou, Xuefang; Yang, Guowei; Lu, Yang; Hu, Miao

    2018-01-01

    To effectively resist malicious eavesdropping and performance deterioration, a novel chaos-based secure transmission scheme is proposed to enhance the physical layer security and reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing passive optical network (OFDM-PON). By the randomly extracting operation of common CAZAC values, the specially-designed constant amplitude zero autocorrelation (CAZAC) is created for system encryption and PAPR reduction enhancing the transmission security. This method is verified in {10-Gb/s encrypted OFDM-PON with 20-km fiber transmission. Results show that, compared to common OFDM-PON, our scheme achieves {3-dB PAPR reduction and {1-dB receiver sensitivity improvement.

  19. Helically symmetric experiment, (HSX) goals, design and status

    International Nuclear Information System (INIS)

    Anderson, F.S.B.; Almagri, A.F.; Anderson, D.T.; Matthews, P.G.; Talmadge, J.N.; Shohet, J.L.

    1995-01-01

    HSX is a quasi-helically symmetric (QHS) stellarator currently under construction at the Torsatron-Stellarator Laboratory of the University of Wisconsin-Madison. This device is unique in its magnetic design in that the magnetic field spectrum possesses only a single dominant (helical) component. This design avoids the large direct orbit losses and the low-collisionality neoclassical losses associated with conventional stellarators. The restoration of symmetry to the confining magnetic field makes the neoclassical confinement in this device analogous to an axisymmetric q=1/3 tokamak. The HSX device has been designed with a clear set of primary physics goals: demonstrate the feasibility of construction of a QHS device, examine single particle confinement of injected ions with regard to magnetic field symmetry breaking, compare density and temperature profiles in this helically symmetric system to those for axisymmetric tokamaks and conventional stellarators, examine electric fields and plasma rotation with edge biasing in relation to L-H transitions in symmetric versus non-symmetric stellarator systems, investigate QHS effects on 1/v regime electron confinement, and examine how greatly-reduced neoclassical electron thermal conductivity compares to the experimental χ e profile. 3 refs., 4 figs., 1 tab

  20. Symmetric coupling of four spin-1/2 systems

    Science.gov (United States)

    Suzuki, Jun; Englert, Berthold-Georg

    2012-06-01

    We address the non-binary coupling of identical angular momenta based upon the representation theory for the symmetric group. A correspondence is pointed out between the complete set of commuting operators and the reference-frame-free subsystems. We provide a detailed analysis of the coupling of three and four spin-1/2 systems and discuss a symmetric coupling of four spin-1/2 systems.

  1. A Distributed Intrusion Detection Scheme about Communication Optimization in Smart Grid

    Directory of Open Access Journals (Sweden)

    Yunfa Li

    2013-01-01

    Full Text Available We first propose an efficient communication optimization algorithm in smart grid. Based on the optimization algorithm, we propose an intrusion detection algorithm to detect malicious data and possible cyberattacks. In this scheme, each node acts independently when it processes communication flows or cybersecurity threats. And neither special hardware nor nodes cooperation is needed. In order to justify the feasibility and the availability of this scheme, a series of experiments have been done. The results show that it is feasible and efficient to detect malicious data and possible cyberattacks with less computation and communication cost.

  2. Semiconductor drift chamber: an application of a novel charge transport scheme

    International Nuclear Information System (INIS)

    Gatti, E.; Rehak, P.

    1983-08-01

    The purpose of this paper is to describe a novel charge tranport scheme in semiconductors in which the field responsible for the charge transport is independent of the depletion field. The application of the novel charge transport scheme leads to the following new semiconductor detectors: (1) Semiconductor Draft Chamber; (2) Ultra low capacitance - large semiconductor x-ray spectrometers and photodiodes; and (3) Fully depleted thick CCD. Special attention is paid to the concept of the Semiconductor Draft Chamber as a position sensing detector for high energy charged particles. Position resolution limiting factors are considered, and the values of the resolutions are given

  3. New approach to solve symmetric fully fuzzy linear systems

    Indian Academy of Sciences (India)

    In this paper, we present a method to solve fully fuzzy linear systems with symmetric coefficient matrix. The symmetric coefficient matrix is decomposed into two systems of equations by using Cholesky method and then a solution can be obtained. Numerical examples are given to illustrate our method.

  4. Local and global synchronization in general complex dynamical networks with delay coupling

    International Nuclear Information System (INIS)

    Lu Jianquan; Ho, Daniel W.C.

    2008-01-01

    Local and global synchronization of complex dynamical networks are studied in this paper. Some simple yet generic criteria ensuring delay-independent and delay-dependent synchronization are derived in terms of linear matrix inequalities (LMIs), which can be verified easily via interior-point algorithm. The assumption that the coupling configuration matrix is symmetric and irreducible, which is frequently used in other literatures, is removed. A network with a fixed delay and a special coupling scheme is given as an example to illustrate the theoretical results and the effectiveness of the proposed synchronization scheme

  5. Practical Leakage-Resilient Symmetric Cryptography

    DEFF Research Database (Denmark)

    Faust, Sebastian; Pietrzak, Krzysztof; Schipper, Joachim

    2012-01-01

    Leakage resilient cryptography attempts to incorporate side-channel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount of arbitr......Leakage resilient cryptography attempts to incorporate side-channel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount...

  6. Kinetic-energy distribution for symmetric fission of 236U

    International Nuclear Information System (INIS)

    Brissot, R.; Bocquet, J.P.; Ristori, C.; Crancon, J.; Guet, C.R.; Nifenecker, H.A.; Montoya, M.

    1980-01-01

    Fission fragment kinetic-energy distributions have been measured at the Grenoble high-flux reactor with the Lohengrin facility. Spurious events were eliminated in the symmetric region by a coherence test based on a time-of-flight measurement of fragment velocities. A Monte-Carlo calculation is then performed to correct the experimental data for neutron evaporation. The difference between the most probable kinetic energy in symmetric fission and the fission in which the heavy fragment is 'magic' (Zsub(H)=50) is found to be approximately =30 MeV. The results suggest that for the symmetric case the total excitation energy available at scission is shared equally among the fragments. (author)

  7. Special functions and the theory of group representations

    CERN Document Server

    Vilenkin, N Ja

    1968-01-01

    A standard scheme for a relation between special functions and group representation theory is the following: certain classes of special functions are interpreted as matrix elements of irreducible representations of a certain Lie group, and then properties of special functions are related to (and derived from) simple well-known facts of representation theory. The book combines the majority of known results in this direction. In particular, the author describes connections between the exponential functions and the additive group of real numbers (Fourier analysis), Legendre and Jacobi polynomials and representations of the group SU(2), and the hypergeometric function and representations of the group SL(2,R), as well as many other classes of special functions.

  8. Symmetry theorems via the continuous steiner symmetrization

    Directory of Open Access Journals (Sweden)

    L. Ragoub

    2000-06-01

    Full Text Available Using a new approach due to F. Brock called the Steiner symmetrization, we show first that if $u$ is a solution of an overdetermined problem in the divergence form satisfying the Neumann and non-constant Dirichlet boundary conditions, then $Omega$ is an N-ball. In addition, we show that we can relax the condition on the value of the Dirichlet boundary condition in the case of superharmonicity. Finally, we give an application to positive solutions of some semilinear elliptic problems in symmetric domains for the divergence case.

  9. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  10. Symmetric group representations and Z

    OpenAIRE

    Adve, Anshul; Yong, Alexander

    2017-01-01

    We discuss implications of the following statement about the representation theory of symmetric groups: every integer appears infinitely often as an irreducible character evaluation, and every nonnegative integer appears infinitely often as a Littlewood-Richardson coefficient and as a Kronecker coefficient.

  11. Quantum systems and symmetric spaces

    International Nuclear Information System (INIS)

    Olshanetsky, M.A.; Perelomov, A.M.

    1978-01-01

    Certain class of quantum systems with Hamiltonians related to invariant operators on symmetric spaces has been investigated. A number of physical facts have been derived as a consequence. In the classical limit completely integrable systems related to root systems are obtained

  12. An Authenticated Key Agreement Scheme Based on Cyclic Automorphism Subgroups of Random Orders

    Directory of Open Access Journals (Sweden)

    Yang Jun

    2017-01-01

    Full Text Available Group-based cryptography is viewed as a modern cryptographic candidate solution to blocking quantum computer attacks, and key exchange protocols on the Internet are one of the primitives to ensure the security of communication. In 2016 Habeeb et al proposed a “textbook” key exchange protocol based on the semidirect product of two groups, which is insecure for use in real-world applications. In this paper, after discarding the unnecessary disguising notion of semidirect product in the protocol, we establish a simplified yet enhanced authenticated key agreement scheme based on cyclic automorphism subgroups of random orders by making hybrid use of certificates and symmetric-key encryption as challenge-and-responses in the public-key setting. Its passive security is formally analyzed, which is relative to the cryptographic hardness assumption of a computational number-theoretic problem. Cryptanalysis of this scheme shows that it is secure against the intruder-in-the-middle attack even in the worst case of compromising the signatures, and provides explicit key confirmation to both parties.

  13. Hypercyclic operators on algebra of symmetric snalytic functions on $\\ell_p$

    Directory of Open Access Journals (Sweden)

    Z. H. Mozhyrovska

    2016-06-01

    Full Text Available In the paper, it is proposed a method of construction of hypercyclic composition operators on $H(\\mathbb{C}^n$ using polynomial automorphisms of $\\mathbb{C}^n$ and symmetric analytic functions on $\\ell_p.$ In particular, we show that an ``symmetric translation'' operator is hypercyclic on a Frechet algebra of symmetric entire functions on $\\ell_p$ which are bounded on bounded subsets.

  14. A New Formulation for Symmetric Implicit Runge-Kutta-Nystrom ...

    African Journals Online (AJOL)

    In this paper we derive symmetric stable Implicit Runge-Kutta –Nystrom Method for the Integration of General Second Order ODEs by using the collocation approach.The block hybrid method obtained by the evaluation of the continuous interpolant at different nodes of the polynomial is symmetric and suitable for stiff intial ...

  15. Relativistic fluids in spherically symmetric space

    International Nuclear Information System (INIS)

    Dipankar, R.

    1977-12-01

    Some of McVittie and Wiltshire's (1977) solutions of Walker's (1935) isotropy conditions for relativistic perfect fluid spheres are generalized. Solutions are spherically symmetric and conformally flat

  16. Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage

    Directory of Open Access Journals (Sweden)

    Juha Partala

    2017-01-01

    Full Text Available A distributed storage system (DSS is a fundamental building block in many distributed applications. It applies linear network coding to achieve an optimal tradeoff between storage and repair bandwidth when node failures occur. Additively homomorphic encryption is compatible with linear network coding. The homomorphic property ensures that a linear combination of ciphertext messages decrypts to the same linear combination of the corresponding plaintext messages. In this paper, we construct a linearly homomorphic symmetric encryption scheme that is designed for a DSS. Our proposal provides simultaneous encryption and error correction by applying linear error correcting codes. We show its IND-CPA security for a limited number of messages based on binary Goppa codes and the following assumption: when dividing a scrambled generator matrix G^ into two parts G1^ and G2^, it is infeasible to distinguish G2^ from random and to find a statistical connection between G1^ and G2^. Our infeasibility assumptions are closely related to those underlying the McEliece public key cryptosystem but are considerably weaker. We believe that the proposed problem has independent cryptographic interest.

  17. Perturbation solutions for flow through symmetrical hoppers with inserts and asymmetrical wedge hoppers

    Science.gov (United States)

    Cox, G. M.; Mccue, S. W.; Thamwattana, N.; Hill, J. M.

    Under certain circumstances, an industrial hopper which operates under the "funnel-flow" regime can be converted to the "mass-flow" regime with the addition of a flow-corrective insert. This paper is concerned with calculating granular flow patterns near the outlet of hoppers that incorporate a particular type of insert, the cone-in-cone insert. The flow is considered to be quasi-static, and governed by the Coulomb-Mohr yield condition together with the non-dilatant double-shearing theory. In two-dimensions, the hoppers are wedge-shaped, and as such the formulation for the wedge-in-wedge hopper also includes the case of asymmetrical hoppers. A perturbation approach, valid for high angles of internal friction, is used for both two-dimensional and axially symmetric flows, with analytic results possible for both leading order and correction terms. This perturbation scheme is compared with numerical solutions to the governing equations, and is shown to work very well for angles of internal friction in excess of 45°.

  18. Symmetric Pin Diversion Detection using a Partial Defect Detector (PDET)

    International Nuclear Information System (INIS)

    Sitaraman, S.; Ham, Y.S.

    2009-01-01

    Since the signature from the Partial Defect Detector (PDET) is principally dependent on the geometric layout of the guide tube locations, the capability of the technique in detecting symmetric diversion of pins needs to be determined. The Monte Carlo simulation study consisted of cases where pins were removed in a symmetric manner and the resulting signatures were examined. In addition to the normalized gamma-to-neutron ratios, the neutron and gamma signatures normalized to their maximum values, were also examined. Examination of the shape of the three curves as well as of the peak-to-valley differences in excess of the maximum expected in intact assemblies, indicated pin diversion. A set of simulations with various symmetric patterns of diversion were examined. The results from these studies indicated that symmetric diversions as low as twelve percent could be detected by this methodology

  19. Stability of transparent spherically symmetric thin shells and wormholes

    International Nuclear Information System (INIS)

    Ishak, Mustapha; Lake, Kayll

    2002-01-01

    The stability of transparent spherically symmetric thin shells (and wormholes) to linearized spherically symmetric perturbations about static equilibrium is examined. This work generalizes and systematizes previous studies and explores the consequences of including the cosmological constant. The approach shows how the existence (or not) of a domain wall dominates the landscape of possible equilibrium configurations

  20. Multiple symmetrical lipomatosis (Madelung's disease) - a case report

    International Nuclear Information System (INIS)

    Vieira, Marcelo Vasconcelos; Abreu, Marcelo de; Furtado, Claudia Dietz; Silveira, Marcio Fleck da; Furtado, Alvaro Porto Alegre; Genro, Carlos Horacio; Grazziotin, Rossano Ughini

    2001-01-01

    Multiple symmetrical lipomatosis (Madelung's disease) is a rare disorder characterized by deep accumulation of fat tissue, involving mainly the neck, shoulders and chest. This disease is associated with heavy alcohol intake and it is more common in men of Mediterranean origin. This disease can cause severe aesthetic deformities and progressive respiratory dysfunction. We report a case of a patient with multiple symmetrical lipomatosis and describe the clinical and radiological features of this disorder. (author)

  1. Successful application and research of modularized scheme of containment liner of CPR1000+ reactor building

    International Nuclear Information System (INIS)

    Lu Qinwu; Zhang Shuxia; Guo Junying

    2012-01-01

    Research of modularized scheme in design, special grid structure spreader, crane, and successful applied in Yangjiang NPP project 3 will instruct and promote modularized construction of containment liner in construction projects. (authors)

  2. On-chip broadband ultra-compact optical couplers and polarization splitters based on off-centered and non-symmetric slotted Si-wire waveguides

    Science.gov (United States)

    Haldar, Raktim; Mishra, V.; Dutt, Avik; Varshney, Shailendra K.

    2016-10-01

    In this work, we propose novel schemes to design on-chip ultra-compact optical directional couplers (DC) and broadband polarization beam splitters (PBS) based on off-centered and asymmetric dielectric slot waveguides, respectively. Slot dimensions and positions are optimized to achieve maximum coupling coefficients between two symmetric and non-symmetric slotted Si wire waveguides through overlap integral method. We observe >88% of enhancement in the coupling coefficients when the size-optimized slots are placed in optimal positions, with respect to the same waveguides with no slot. When the waveguides are parallel, in that case, a coupling length as short as 1.73 μm is accomplished for TM mode with the off-centered and optimized slots. This scheme enables us to design optical DC with very small footprint, L c ∼ 0.9 μm in the presence of S-bends. We also report a compact (L c ∼ 1.1 μm) on-chip broadband PBS with hybrid slots. Extinction ratios of 13 dB and 22.3 dB are realized with very low insertion loss (0.055 dB and 0.008 dB) for TM and TE modes at 1.55 μm, respectively. The designed PBS exhibits a bandwidth of 78 nm for the TM mode (C-and partial L-bands) and >100 nm for the TE mode (S + C + L wavelength bands). Such on-chip devices can be used to design compact photonic interconnects and quantum information processing units efficiently. We have also investigated the fabrication tolerances of the proposed devices and described the fabrication steps to realize such hybrid devices. Our results are in good agreement with 3D FDTD simulations.

  3. Higher-Order Scheme-Independent Calculations of Physical Quantities in the Conformal Phase of a Gauge Theory

    DEFF Research Database (Denmark)

    Ryttov, Thomas A.; Shrock, Robert

    2017-01-01

    , adjoint, and symmetric rank-2 tensor representation are considered. We present scheme-independent calculations of the anomalous dimension $\\gamma_{\\bar\\psi\\psi,IR}$ to $O(\\Delta_f^4)$ and $\\beta'_{IR}$ to $O(\\Delta_f^5)$ at this IRFP, where $\\Delta_f$ is an $N_f$-dependent expansion parameter. Comparisons...... are made with conventional $n$-loop calculations and lattice measurements. As a test of the accuracy of the $\\Delta_f$ expansion, we calculate $\\gamma_{\\bar\\psi\\psi,IR}$ to $O(\\Delta_f^3)$ in ${\\cal N}=1$ SU($N_c$) supersymmetric quantum chromodynamics and find complete agreement, to this order...

  4. Bound states for non-symmetric evolution Schroedinger potentials

    Energy Technology Data Exchange (ETDEWEB)

    Corona, Gulmaro Corona [Area de Analisis Matematico y sus Aplicaciones, Universidad Autonoma Metropolitana-Azcapotalco, Atzcapotzalco, DF (Mexico)). E-mail: ccg@correo.azc.uam.mx

    2001-09-14

    We consider the spectral problem associated with the evolution Schroedinger equation, (D{sup 2}+ k{sup 2}){phi}=u{phi}, where u is a matrix-square-valued function, with entries in the Schwartz class defined on the real line. The solution {phi}, called the wavefunction, consists of a function of one real variable, matrix-square-valued with entries in the Schwartz class. This problem has been dealt for symmetric potentials u. We found for the present case that the bound states are localized similarly to the scalar and symmetric cases, but by the zeroes of an analytic matrix-valued function. If we add an extra condition to the potential u, we can determine these states by an analytic scalar function. We do this by generalizing the scalar and symmetric cases but without using the fact that the Wronskian of a pair of wavefunction is constant. (author)

  5. Effect of intermolecular dipole-dipole interactions on interfacial supramolecular structures of C3-symmetric hexa-peri-hexabenzocoronene derivatives.

    Science.gov (United States)

    Mu, Zhongcheng; Shao, Qi; Ye, Jun; Zeng, Zebing; Zhao, Yang; Hng, Huey Hoon; Boey, Freddy Yin Chiang; Wu, Jishan; Chen, Xiaodong

    2011-02-15

    Two-dimensional (2D) supramolecular assemblies of a series of novel C(3)-symmetric hexa-peri-hexabenzocoronene (HBC) derivatives bearing different substituents adsorbed on highly oriented pyrolytic graphite were studied by using scanning tunneling microscopy at a solid-liquid interface. It was found that the intermolecular dipole-dipole interactions play a critical role in controlling the interfacial supramolecular assembly of these C(3)-symmetric HBC derivatives at the solid-liquid interface. The HBC molecule bearing three -CF(3) groups could form 2D honeycomb structures because of antiparallel dipole-dipole interactions, whereas HBC molecules bearing three -CN or -NO(2) groups could form hexagonal superstructures because of a special trimeric arrangement induced by dipole-dipole interactions and weak hydrogen bonding interactions ([C-H···NC-] or [C-H···O(2)N-]). Molecular mechanics and dynamics simulations were performed to reveal the physics behind the 2D structures as well as detailed functional group interactions. This work provides an example of how intermolecular dipole-dipole interactions could enable fine control over the self-assembly of disklike π-conjugated molecules.

  6. Symmetric nuclear matter with Skyrme interaction

    International Nuclear Information System (INIS)

    Manisa, K.; Bicer, A.; Atav, U.

    2010-01-01

    The equation of state (EOS) and some properties of symmetric nuclear matter, such as the saturation density, saturation energy and incompressibility, are obtained by using Skyrme's density-dependent effective nucleon-nucleon interaction.

  7. Separator-Integrated, Reversely Connectable Symmetric Lithium-Ion Battery.

    Science.gov (United States)

    Wang, Yuhang; Zeng, Jiren; Cui, Xiaoqi; Zhang, Lijuan; Zheng, Gengfeng

    2016-02-24

    A separator-integrated, reversely connectable, symmetric lithium-ion battery is developed based on carbon-coated Li3V2(PO4)3 nanoparticles and polyvinylidene fluoride-treated separators. The Li3V2(PO4)3 nanoparticles are synthesized via a facile solution route followed by calcination in Ar/H2 atmosphere. Sucrose solution is used as the carbon source for uniform carbon coating on the Li3V2(PO4)3 nanoparticles. Both the carbon and the polyvinylidene fluoride treatments substantially improve the cycling life of the symmetric battery by preventing the dissolution and shuttle of the electroactive Li3V2(PO4)3. The obtained symmetric full cell exhibits a reversible capacity of ≈ 87 mA h g(-1), good cycling stability, and capacity retention of ≈ 70% after 70 cycles. In addition, this type of symmetric full cell can be operated in both forward and reverse connection modes, without any influence on the cycling of the battery. Furthermore, a new separator integration approach is demonstrated, which enables the direct deposition of electroactive materials for the battery assembly and does not affect the electrochemical performance. A 10-tandem-cell battery assembled without differentiating the electrode polarity exhibits a low thickness of ≈ 4.8 mm and a high output voltage of 20.8 V. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Unit Root Properties of Seasonal Adjustment and Related Filters: Special Cases

    Directory of Open Access Journals (Sweden)

    Bell William.R.

    2017-03-01

    Full Text Available Bell (2012 catalogued unit root factors contained in linear filters used in seasonal adjustment (model-based or from the X-11 method but noted that, for model-based seasonal adjustment, special cases could arise where filters could contain more unit root factors than was indicated by the general results. This article reviews some special cases that occur with canonical ARIMA model based adjustment in which, with some commonly used ARIMA models, the symmetric seasonal filters contain two extra nonseasonal differences (i.e., they include an extra (1 - B(1 - F. This increases by two the degree of polynomials in time that are annihilated by the seasonal filter and reproduced by the seasonal adjustment filter. Other results for canonical ARIMA adjustment that are reported in Bell (2012, including properties of the trend and irregular filters, and properties of the asymmetric and finite filters, are unaltered in these special cases. Special cases for seasonal adjustment with structural ARIMA component models are also briefly discussed.

  9. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  10. Is the Universe matter-antimatter symmetric

    International Nuclear Information System (INIS)

    Alfven, H.

    1976-09-01

    According to the symmetric cosmology there should be antimatter regions in space which are equally as large as the matter regions. The regions of different kind are separated by Leidenfrost layers, which may be very thin and not observable from a distance. This view has met resistance which in part is based on the old view that the dilute interstellar and intergalactic medium is more or less homogeneous. However, through space research in the magnetosphere and interplanetary space we know that thin layers, dividing space into regions of different magnetisation, exist and based on this it is concluded that space in general has a cellular structure. This result may break down the psychological resistance to the symmetric theory. The possibility that every second star in our galaxy consists of antimatter is discussed, and it is shown that this view is not in conflict with any observations. As most stars are likely to be surrounded by solar systems of a structure like our own, it is concluded that collisions between comets and antistars (or anticomets and stars) would be rather frequent. Such collisions would result in phenomena of the same type as the observed cosmic γ-ray bursts. Another support for the symmetric cosmology is the continuous X-ray background radiation. Also many of the observed large energy releases in cosmos are likely to be due to annihilation

  11. Utilisation of symmetrical components in a communication-based protection for loop MV feeders with variable short-circuit power

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Bak, Claus Leth; Blaabjerg, Frede

    2018-01-01

    -circuit power is presented. It relies on utilisation of symmetrical components of the short-circuit currents and on communication between the protection relays. The proposed method addresses the Single Phase to Ground (SPG) faults occurring in directly grounded distribution networks, with focus on closed......Variability of the available short-circuit power also implies variation of the fault level, which can potentially cause several protection problems in the electric networks. In this paper, a novel protection method that is insensitive to the fault level changes caused by variable short......-loop Medium Voltage (MV) feeders. Case studies are presented, which demonstrate that the proposed protection scheme is capable of effectively detecting the SPG faults in closed-loop feeders with variable short-circuit power....

  12. Development of highly accurate approximate scheme for computing the charge transfer integral

    Energy Technology Data Exchange (ETDEWEB)

    Pershin, Anton; Szalay, Péter G. [Laboratory for Theoretical Chemistry, Institute of Chemistry, Eötvös Loránd University, P.O. Box 32, H-1518 Budapest (Hungary)

    2015-08-21

    The charge transfer integral is a key parameter required by various theoretical models to describe charge transport properties, e.g., in organic semiconductors. The accuracy of this important property depends on several factors, which include the level of electronic structure theory and internal simplifications of the applied formalism. The goal of this paper is to identify the performance of various approximate approaches of the latter category, while using the high level equation-of-motion coupled cluster theory for the electronic structure. The calculations have been performed on the ethylene dimer as one of the simplest model systems. By studying different spatial perturbations, it was shown that while both energy split in dimer and fragment charge difference methods are equivalent with the exact formulation for symmetrical displacements, they are less efficient when describing transfer integral along the asymmetric alteration coordinate. Since the “exact” scheme was found computationally expensive, we examine the possibility to obtain the asymmetric fluctuation of the transfer integral by a Taylor expansion along the coordinate space. By exploring the efficiency of this novel approach, we show that the Taylor expansion scheme represents an attractive alternative to the “exact” calculations due to a substantial reduction of computational costs, when a considerably large region of the potential energy surface is of interest. Moreover, we show that the Taylor expansion scheme, irrespective of the dimer symmetry, is very accurate for the entire range of geometry fluctuations that cover the space the molecule accesses at room temperature.

  13. Quantum gauge freedom in very special relativity

    Energy Technology Data Exchange (ETDEWEB)

    Upadhyay, Sudhaker, E-mail: sudhakerupadhyay@gmail.com [Centre for Theoretical Studies, Indian Institute of Technology Kharagpur, Kharagpur-721302, West Bengal (India); Panigrahi, Prasanta K., E-mail: pprasanta@iiserkol.ac.in [Indian Institute of Science Education and Research Kolkata, Mohanpur 741246, West Bengal (India)

    2017-02-15

    We demonstrate Yokoyama gaugeon formalism for the Abelian one-form gauge (Maxwell) as well as for Abelian two-form gauge theory in the very special relativity (VSR) framework. In VSR scenario, the extended action due to introduction of gaugeon fields also possesses form invariance under quantum gauge transformations. It is observed that the gaugeon field together with gauge field naturally acquire mass, which is different from the conventional Higgs mechanism. The quantum gauge transformation implements a shift in gauge parameter. Further, we analyze the BRST symmetric gaugeon formalism in VSR which embeds only one subsidiary condition rather than two.

  14. FACES WITH LARGE DIAMETER ON THE SYMMETRICAL TRAVELING SALESMAN POLYTOPE

    NARCIS (Netherlands)

    SIERKSMA, G; TIJSSEN, GA

    This paper deals with the symmetric traveling salesman polytope and contains three main theorems. The first one gives a new characterization of (non)adjacency. Based on this characterization a new upper bound for the diameter of the symmetric traveling salesman polytope (conjectured to be 2 by M.

  15. Utilization of symmetrical components in a communication-assisted protection scheme for radial MV feeders with variable or reduced short-circuit currents

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Bak, Claus Leth; Blaabjerg, Frede

    2017-01-01

    because the fault current is significantly lower in the islanded mode compared to the grid-connected mode and consequently a single set of settings for the OC relays is not sufficient. This paper propose a communication-assisted protection scheme that is able to operate correctly in a radial Medium...... over positive-sequence current, while the relays placed downstream the fault detect a zero magnitude for their corresponding ratios. Protection relays calculate the magnitude of the proposed ratio and then exchange the obtained value with the adjacent upstream relays using communication. Therefore......, each relay would have access to its own ratio and to the ratio provided by the adjacent relay. Finally, the relay with the highest calculated magnitude of the ratio of zero-sequence to positive-sequence current will trip, thus clearing the fault. The new protection scheme is implemented in a test...

  16. Symmetric relations of finite negativity

    NARCIS (Netherlands)

    Kaltenbaeck, M.; Winkler, H.; Woracek, H.; Forster, KH; Jonas, P; Langer, H

    2006-01-01

    We construct and investigate a space which is related to a symmetric linear relation S of finite negativity on an almost Pontryagin space. This space is the indefinite generalization of the completion of dom S with respect to (S.,.) for a strictly positive S on a Hilbert space.

  17. The symmetric longest queue system

    NARCIS (Netherlands)

    van Houtum, Geert-Jan; Adan, Ivo; van der Wal, Jan

    1997-01-01

    We derive the performance of the exponential symmetric longest queue system from two variants: a longest queue system with Threshold Rejection of jobs and one with Threshold Addition of jobs. It is shown that these two systems provide lower and upper bounds for the performance of the longest queue

  18. Representations of the symmetric group as special cases of the boson polynomials in U(n)

    International Nuclear Information System (INIS)

    Biedenharn, L.C.; Louck, J.D.

    1978-01-01

    The set of all real, orthogonal irreps of S/sub n/ are realized explicitly and nonrecursively by specializing the boson polynomials carrying irreps of the unitary group. This realization makes use of a 'calculus of patterns', which is discussed

  19. Overlap-free symmetric D 0 Lwords

    Directory of Open Access Journals (Sweden)

    Anna Frid

    2001-12-01

    Full Text Available A D0L word on an alphabet Σ={0,1,…,q-1} is called symmetric if it is a fixed point w=φ(w of a morphism φ:Σ * → Σ * defined by φ(i= t 1 + i t 2 + i … t m + i for some word t 1 t 2 … t m (equal to φ(0 and every i ∈ Σ; here a means a mod q. We prove a result conjectured by J. Shallit: if all the symbols in φ(0 are distinct (i.e., if t i ≠ t j for i ≠ j, then the symmetric D0L word w is overlap-free, i.e., contains no factor of the form axaxa for any x ∈ Σ * and a ∈ Σ.

  20. Building fast well-balanced two-stage numerical schemes for a model of two-phase flows

    Science.gov (United States)

    Thanh, Mai Duc

    2014-06-01

    We present a set of well-balanced two-stage schemes for an isentropic model of two-phase flows arisen from the modeling of deflagration-to-detonation transition in granular materials. The first stage is to absorb the source term in nonconservative form into equilibria. Then in the second stage, these equilibria will be composed into a numerical flux formed by using a convex combination of the numerical flux of a stable Lax-Friedrichs-type scheme and the one of a higher-order Richtmyer-type scheme. Numerical schemes constructed in such a way are expected to get the interesting property: they are fast and stable. Tests show that the method works out until the parameter takes on the value CFL, and so any value of the parameter between zero and this value is expected to work as well. All the schemes in this family are shown to capture stationary waves and preserves the positivity of the volume fractions. The special values of the parameter 0,1/2,1/(1+CFL), and CFL in this family define the Lax-Friedrichs-type, FAST1, FAST2, and FAST3 schemes, respectively. These schemes are shown to give a desirable accuracy. The errors and the CPU time of these schemes and the Roe-type scheme are calculated and compared. The constructed schemes are shown to be well-balanced and faster than the Roe-type scheme.

  1. Flat synchronizations in spherically symmetric space-times

    International Nuclear Information System (INIS)

    Herrero, Alicia; Morales-Lladosa, Juan Antonio

    2010-01-01

    It is well known that the Schwarzschild space-time admits a spacelike slicing by flat instants and that the metric is regular at the horizon in the associated adapted coordinates (Painleve-Gullstrand metric form). We consider this type of flat slicings in an arbitrary spherically symmetric space-time. The condition ensuring its existence is analyzed, and then, we prove that, for any spherically symmetric flat slicing, the densities of the Weinberg momenta vanish. Finally, we deduce the Schwarzschild solution in the extended Painleve-Gullstrand-LemaItre metric form by considering the coordinate decomposition of the vacuum Einstein equations with respect to a flat spacelike slicing.

  2. Introduction to left-right symmetric models

    International Nuclear Information System (INIS)

    Grimus, W.

    1993-01-01

    We motivate left-right symmetric models by the possibility of spontaneous parity breaking. Then we describe the multiplets and the Lagrangian of such models. Finally we discuss lower bounds on the right-handed scale. (author)

  3. Positive projections of symmetric matrices and Jordan algebras

    DEFF Research Database (Denmark)

    Fuglede, Bent; Jensen, Søren Tolver

    2013-01-01

    An elementary proof is given that the projection from the space of all symmetric p×p matrices onto a linear subspace is positive if and only if the subspace is a Jordan algebra. This solves a problem in a statistical model.......An elementary proof is given that the projection from the space of all symmetric p×p matrices onto a linear subspace is positive if and only if the subspace is a Jordan algebra. This solves a problem in a statistical model....

  4. Design and operation of an interlaboratory comparison scheme

    International Nuclear Information System (INIS)

    Voiculescu, R. M.; Olteanu, M. C.; Nistor, V. M.

    2013-01-01

    The competence of laboratories is assessed by two complementary techniques. One of the techniques is the on-site evaluation following the requirements of ISO/IEC 17025:2005. The other one implies the proficiency testing which involves the determination of laboratory performance by means of interlaboratory comparisons, whereby the laboratory performs practical tests and their results are further compared with those of other laboratories. The paper treats one of the most important topics of the proficiency testing – the interlaboratory comparison (ILC). There will be presented the need, the purpose and the main objectives of an ILC and also a typically situation where an interlaboratory comparison exercise (for radio-analytical methods) was planned. A fully description of the design and operation of an ILC scheme is the main purpose of this paper. A special attention will be given to the data analysis and evaluation of interlaboratory comparison scheme results. (authors)

  5. Nilpotent orbits in real symmetric pairs and stationary black holes

    Energy Technology Data Exchange (ETDEWEB)

    Dietrich, Heiko [School of Mathematical Sciences, Monash University, VIC (Australia); De Graaf, Willem A. [Department of Mathematics, University of Trento, Povo (Italy); Ruggeri, Daniele [Universita di Torino, Dipartimento di Fisica (Italy); INFN, Sezione di Torino (Italy); Trigiante, Mario [DISAT, Politecnico di Torino (Italy)

    2017-02-15

    In the study of stationary solutions in extended supergravities with symmetric scalar manifolds, the nilpotent orbits of a real symmetric pair play an important role. In this paper we discuss two approaches to determine the nilpotent orbits of a real symmetric pair. We apply our methods to an explicit example, and thereby classify the nilpotent orbits of (SL{sub 2}(R)){sup 4} acting on the fourth tensor power of the natural 2-dimensional SL{sub 2}(R)-module. This makes it possible to classify all stationary solutions of the so-called STU-supergravity model. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  6. Nilpotent orbits in real symmetric pairs and stationary black holes

    International Nuclear Information System (INIS)

    Dietrich, Heiko; De Graaf, Willem A.; Ruggeri, Daniele; Trigiante, Mario

    2017-01-01

    In the study of stationary solutions in extended supergravities with symmetric scalar manifolds, the nilpotent orbits of a real symmetric pair play an important role. In this paper we discuss two approaches to determine the nilpotent orbits of a real symmetric pair. We apply our methods to an explicit example, and thereby classify the nilpotent orbits of (SL 2 (R)) 4 acting on the fourth tensor power of the natural 2-dimensional SL 2 (R)-module. This makes it possible to classify all stationary solutions of the so-called STU-supergravity model. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  7. Symmetrical parahiliar infiltrated, cough and dyspnoea

    International Nuclear Information System (INIS)

    Giraldo Estrada, Horacio; Escalante, Hector

    2004-01-01

    It is the case a patient to who is diagnosed symmetrical parahiliar infiltrated; initially she is diagnosed lymphoma Hodgkin, treaty with radiotherapy and chemotherapy, but the X rays of the thorax demonstrated parahiliars and paramediastinals infiltrated

  8. Assessment of remedial control schemes for damping transient oscillations in the Mexican system

    Energy Technology Data Exchange (ETDEWEB)

    Castellanos, R.B.; Sarmiento, H.U.; Pampin, G. [Inst.de Investigaciones Electricas, Morelos (Mexico); Messina, A.R. [Cinvestav, San Pedro Zacatenco (Mexico)

    2008-07-01

    In order to enhance voltage control and power system dynamic performance, special protection systems (SPS) are increasingly being used in the Mexican Interconnected System (MIS). These include extensive use of direct load shedding schemes, generator tripping schemes, controlled disconnection of lines, and automatic generation rejection and single phase reclosing schemes. Generator tripping based on local detection of severe disturbance is of particular importance and has been used to enhance transient stability. In addition, the onset of system instability has become more complex, often involving interactions between major system modes. Post-fault transient oscillations have become more common following the loss of major system elements and may result in uncontrolled system separation. This has motivated the need to develop system-wide special protection systems. This paper explored the possible benefits and feasibility of employing SPSs to mitigate wide-area inter-area oscillations in the MIS. The paper described the exploratory studies such as the coordinated application of automatic generation tripping schemes and automatic load shedding to enhance system dynamic performance. The paper also explained sensitivity studies that were conducted to determine the amount and location of generation (load) to be shed and suggested extensions to the basic security criteria to maintain network stability. The proposed techniques were developed and tested on a large-scale representation of the Mexican system that included the operation of several FACTS controllers. It was concluded that automatic generation shedding and automatic loading shedding were efficient alternatives to improve generation and transmission use, reliability and flexibility. 7 refs., 1 tab., 3 figs.

  9. Exploring plane-symmetric solutions in f(R) gravity

    Energy Technology Data Exchange (ETDEWEB)

    Shamir, M. F., E-mail: farasat.shamir@nu.edu.pk [National University of Computer and Emerging Sciences, Department of Sciences and Humanities (Pakistan)

    2016-02-15

    The modified theories of gravity, especially the f(R) gravity, have attracted much attention in the last decade. This paper is devoted to exploring plane-symmetric solutions in the context of metric f(R) gravity. We extend the work on static plane-symmetric vacuum solutions in f(R) gravity already available in the literature [1, 2]. The modified field equations are solved using the assumptions of both constant and nonconstant scalar curvature. Some well-known solutions are recovered with power-law and logarithmic forms of f(R) models.

  10. Integrability and symmetric spaces. II- The coset spaces

    International Nuclear Information System (INIS)

    Ferreira, L.A.

    1987-01-01

    It shown that a sufficient condition for a model describing the motion of a particle on a coset space to possess a fundamental Poisson bracket relation, and consequently charges involution, is that it must be a symmetric space. The conditions a hamiltonian, or any function of the canonical variables, has to satisfy in order to commute with these charges are studied. It is shown that, for the case of non compact symmetric space, these conditions lead to an algebraic structure which plays an important role in the construction of conserved quantities. (author) [pt

  11. Some curvature properties of quarter symmetric metric connections

    International Nuclear Information System (INIS)

    Rastogi, S.C.

    1986-08-01

    A linear connection Γ ji h with torsion tensor T j h P i -T i h P j , where T j h is an arbitrary (1,1) tensor field and P i is a 1-form, has been called a quarter-symmetric connection by Golab. Some properties of such connections have been studied by Rastogi, Mishra and Pandey, and Yano and Imai. In this paper based on the curvature tensor of quarter-symmetric metric connection we define a tensor analogous to conformal curvature tensor and study some properties of such a tensor. (author)

  12. Color-symmetric superconductivity in a phenomenological QCD model

    DEFF Research Database (Denmark)

    Bohr, Henrik; Providencia, C.; Providencia, J. da

    2009-01-01

    In this paper, we construct a theory of the NJL type where superconductivity is present, and yet the superconducting state remains, in the average, color symmetric. This shows that the present approach to color superconductivity is consistent with color singletness. Indeed, quarks are free...... in the deconfined phase, but the deconfined phase itself is believed to be a color singlet. The usual description of the color superconducting state violates color singletness. On the other hand, the color superconducting state here proposed is color symmetric in the sense that an arbitrary color rotation leads...

  13. Representations of the infinite symmetric group

    CERN Document Server

    Borodin, Alexei

    2016-01-01

    Representation theory of big groups is an important and quickly developing part of modern mathematics, giving rise to a variety of important applications in probability and mathematical physics. This book provides the first concise and self-contained introduction to the theory on the simplest yet very nontrivial example of the infinite symmetric group, focusing on its deep connections to probability, mathematical physics, and algebraic combinatorics. Following a discussion of the classical Thoma's theorem which describes the characters of the infinite symmetric group, the authors describe explicit constructions of an important class of representations, including both the irreducible and generalized ones. Complete with detailed proofs, as well as numerous examples and exercises which help to summarize recent developments in the field, this book will enable graduates to enhance their understanding of the topic, while also aiding lecturers and researchers in related areas.

  14. Asymptotic properties of solvable PT-symmetric potentials

    International Nuclear Information System (INIS)

    Levai, G.

    2010-01-01

    Compete text of publication follows. The introduction of PT-symmetric quantum mechanics generated renewed interest in non-hermitian quantum mechanical systems in the past decade. PT symmetry means the invariance of a Hamiltonian under the simultaneous P space and T time reflection, the latter understood as complex conjugation. Considering the Schroedinger equation in one dimension, this corresponds to a potential with even real and odd imaginary components. This implies a delicate balance of emissive and absorptive regions that eventually manifests itself in properties that typically characterize real potentials, i.e. hermitian systems. These include partly or fully real energy spectrum and conserved (pseudo-)norm. A particularly notable feature of these systems is the spontaneous breakdown of PT symmetry, which typically occurs when the magnitude of the imaginary potential component exceeds a certain limit. At this point the real energy eigenvalues begin to merge pairwise and re-emerge as complex conjugate pairs. Another unusual property of PT-symmetric potentials is that they can, or sometimes have to be defined off the real x axis on trajectories that are symmetric with respect to the imaginary x axis. After more than a decade of theoretical investigations a remarkable recent development was the experimental verification of the existence of PT-symmetric systems in nature and the occurrence of spontaneous PT symmetry breaking in them. The experimental setup was a waveguide containing regions where loss and gain of flux occurred in a set out prescribed by PT symmetry. These experimental developments require the study of PT -symmetric potentials with various asymptotics, in which, furthermore, the complex potential component is finite in its range and/or its magnitude. Having in mind that PT symmetry allows for a wider variety of asymptotic properties than hermeticity, we studied three exactly solvable PT-symmetric potentials and compared their scattering and bound

  15. NSVZ scheme with the higher derivative regularization for N=1 SQED

    International Nuclear Information System (INIS)

    Kataev, A.L.; Stepanyantz, K.V.

    2013-01-01

    The exact NSVZ relation between a β-function of N=1 SQED and an anomalous dimension of the matter superfields is studied within the Slavnov higher derivative regularization approach. It is shown that if the renormalization group functions are defined in terms of the bare coupling constant, this relation is always valid. In the renormalized theory the NSVZ relation is obtained in the momentum subtraction scheme supplemented by a special finite renormalization. Unlike the dimensional reduction, the higher derivative regularization allows to fix this finite renormalization. This is made by imposing the conditions Z 3 (α,μ=Λ)=1 and Z(α,μ=Λ)=1 on the renormalization constants of N=1 SQED, where Λ is a parameter in the higher derivative term. The results are verified by the explicit three-loop calculation. In this approximation we relate the DR ¯ scheme and the NSVZ scheme defined within the higher derivative approach by the finite renormalization

  16. Entanglement of three-qubit Greenberger-Horne-Zeilinger-symmetric states.

    Science.gov (United States)

    Eltschka, Christopher; Siewert, Jens

    2012-01-13

    The first characterization of mixed-state entanglement was achieved for two-qubit states in Werner's seminal work [Phys. Rev. A 40, 4277 (1989)]. A physically important extension concerns mixtures of a pure entangled state [such as the Greenberger-Horne-Zeilinger (GHZ) state] and the unpolarized state. These mixed states serve as benchmark for the robustness of multipartite entanglement. They share the symmetries of the GHZ state. We call such states GHZ symmetric. Here we give a complete description of the entanglement in the family of three-qubit GHZ-symmetric states and, in particular, of the three-qubit generalized Werner states. Our method relies on the appropriate parametrization of the states and on the invariance of entanglement properties under general local operations. An application is the definition of a symmetrization witness for the entanglement class of arbitrary three-qubit states.

  17. Random matrix ensembles for PT-symmetric systems

    International Nuclear Information System (INIS)

    Graefe, Eva-Maria; Mudute-Ndumbe, Steve; Taylor, Matthew

    2015-01-01

    Recently much effort has been made towards the introduction of non-Hermitian random matrix models respecting PT-symmetry. Here we show that there is a one-to-one correspondence between complex PT-symmetric matrices and split-complex and split-quaternionic versions of Hermitian matrices. We introduce two new random matrix ensembles of (a) Gaussian split-complex Hermitian; and (b) Gaussian split-quaternionic Hermitian matrices, of arbitrary sizes. We conjecture that these ensembles represent universality classes for PT-symmetric matrices. For the case of 2 × 2 matrices we derive analytic expressions for the joint probability distributions of the eigenvalues, the one-level densities and the level spacings in the case of real eigenvalues. (fast track communication)

  18. Time cycle calculation procedure for the special crew during the mining mobile machine complex operation

    International Nuclear Information System (INIS)

    Shmurygin, V; Lukyanov, V; Maslovsky, A

    2015-01-01

    The relevance of the research is specified by the necessity to optimize the delft mobile tunneling equipment operation. Target of the research is tunneling time cycle justification for the special crew during the mining mobile machine complex operation. Methods of the research included the consideration of operation organization schemes in the drifting face and effective use of the mobile equipment during mine exploratory working operations. Time cycle calculation procedures for major processes have been considered. This has been done for the special crew during the mobile machine complex operations for several working faces and various organization schemes

  19. Separation of attractors in 1-modulus quantum corrected special geometry

    CERN Document Server

    Bellucci, S; Marrani, A; Shcherbakov, A

    2008-01-01

    We study the solutions to the N=2, d=4 Attractor Equations in a dyonic, extremal, static, spherically symmetric and asymptotically flat black hole background, in the simplest case of perturbative quantum corrected cubic Special Kahler geometry consistent with continuous axion-shift symmetry, namely in the 1-modulus Special Kahler geometry described (in a suitable special symplectic coordinate) by the holomorphic Kahler gauge-invariant prepotential F=t^3+i*lambda, with lambda real. By performing computations in the ``magnetic'' charge configuration, we find evidence for interesting phenomena (absent in the classical limit of vanishing lambda). Namely, for a certain range of the quantum parameter lambda we find a ``splitting'' of attractors, i.e. the existence of multiple solutions to the Attractor Equations for fixed supporting charge configuration. This corresponds to the existence of ``area codes'' in the radial evolution of the scalar t, determined by the various disconnected regions of the moduli space, wh...

  20. Brillouin-zone integration schemes: an efficiency study for the phonon frequency moments of the harmonic, solid, one-component plasma

    International Nuclear Information System (INIS)

    Albers, R.C.; Gubernatis, J.E.

    1981-01-01

    The efficiency of four different Brillouin-zone integration schemes including the uniform mesh, special point method, special directions method, and Holas method are compared for calculating moments of the harmonic phonon frequencies of the solid one-component plasma. Very accurate values for the moments are also presented. The Holas method for which weights and integration points can easily be generated has roughly the same efficiency as the special directions method, which is much superior to the uniform mesh and special point methods for this problem

  1. Upwind differencing scheme for the equations of ideal magnetohydrodynamics

    International Nuclear Information System (INIS)

    Brio, M.; Wu, C.C.

    1988-01-01

    Recently, upwind differencing schemes have become very popular for solving hyperbolic partial differential equations, especially when discontinuities exist in the solutions. Among many upwind schemes successfully applied to the problems in gas dynamics, Roe's method stands out for its relative simplicity and clarity of the underlying physical model. In this paper, an upwind differencing scheme of Roe-type for the MHD equations is constructed. In each computational cell, the problem is first linearized around some averaged state which preserves the flux differences. Then the solution is advanced in time by computing the wave contributions to the flux at the cell interfaces. One crucial task of the linearization procedure is the construction of a Roe matrix. For the special case γ = 2, a Roe matrix in the form of a mean value Jacobian is found, and for the general case, a simple averaging procedure is introduced. All other necessary ingredients of the construction, which include eigenvalues, and a complete set of right eigenvectors of the Roe matrix and decomposition coefficients are presented. As a numerical example, we chose a coplanar MHD Riemann problem. The problem is solved by the newly constructed second-order upwind scheme as well as by the Lax-Friedrichs, the Lax-Wendroff, and the flux-corrected transport schemes. The results demonstrate several advantages of the upwind scheme. In this paper, we also show that the MHD equations are nonconvex. This is a contrast to the general belief that the fast and slow waves are like sound waves in the Euler equations. As a consequence, the wave structure becomes more complicated; for example, compound waves consisting of a shock and attached to it a rarefaction wave of the same family can exist in MHD. copyright 1988 Academic Press, Inc

  2. Hybrid advection scheme for 3-dimensional atmospheric models. Testing and application for a study of NO{sub x} transport

    Energy Technology Data Exchange (ETDEWEB)

    Zubov, V.A.; Rozanov, E.V. [Main Geophysical Observatory, St.Petersburg (Russian Federation); Schlesinger, M.E.; Andronova, N.G. [Illinois Univ., Urbana-Champaign, IL (United States). Dept. of Atmospheric Sciences

    1997-12-31

    The problems of ozone depletion, climate change and atmospheric pollution strongly depend on the processes of production, destruction and transport of chemical species. A hybrid transport scheme was developed, consisting of the semi-Lagrangian scheme for horizontal advection and the Prather scheme for vertical transport, which have been used for the Atmospheric Chemical Transport model to calculate the distributions of different chemical species. The performance of the new hybrid scheme has been evaluated in comparison with other transport schemes on the basis of specially designed tests. The seasonal cycle of the distribution of N{sub 2}O simulated by the model, as well as the dispersion of NO{sub x} exhausted from subsonic aircraft, are in a good agreement with published data. (author) 8 refs.

  3. Hybrid advection scheme for 3-dimensional atmospheric models. Testing and application for a study of NO{sub x} transport

    Energy Technology Data Exchange (ETDEWEB)

    Zubov, V A; Rozanov, E V [Main Geophysical Observatory, St.Petersburg (Russian Federation); Schlesinger, M E; Andronova, N G [Illinois Univ., Urbana-Champaign, IL (United States). Dept. of Atmospheric Sciences

    1998-12-31

    The problems of ozone depletion, climate change and atmospheric pollution strongly depend on the processes of production, destruction and transport of chemical species. A hybrid transport scheme was developed, consisting of the semi-Lagrangian scheme for horizontal advection and the Prather scheme for vertical transport, which have been used for the Atmospheric Chemical Transport model to calculate the distributions of different chemical species. The performance of the new hybrid scheme has been evaluated in comparison with other transport schemes on the basis of specially designed tests. The seasonal cycle of the distribution of N{sub 2}O simulated by the model, as well as the dispersion of NO{sub x} exhausted from subsonic aircraft, are in a good agreement with published data. (author) 8 refs.

  4. Symmetric grey box identification and distributed beam-based controller design for free-electron lasers

    Energy Technology Data Exchange (ETDEWEB)

    Pfeiffer, Sven

    2014-09-15

    The European X-ray Free-Electron Laser (XFEL) at the Deutsches Elektronen Synchtrotron (DESY) in Hamburg will, starting in 2015, open up completely new research opportunities for scientist and industrial users by exploiting ultrashort X-ray laser pulses. Bunches of electrons are accelerated by a radio frequency field inside superconducting cavities up to an energy of 17.5 GeV. A periodic arrangement of magnets forces the accelerated electrons onto a tight slalom path leading to a process in that the electrons emit extremely short and intense X-ray flashes. The generation of equidistant X-ray flashes with a constant intensity requires an extremely high precision field control in combination with beam-based signals. FLASH, which can be seen as a pilot test facility, allows to develop and test controller concepts even before the European XFEL is in operation. In this thesis it is shown that a physical white box model structure, which describes the behavior of each subsystem within the radio frequency field control loop, obeys as first-order approximation the special orthogonal group of dimension two (SO(2)). Presented is a grey box identification approach, which combines the physical model structure with general identification methods. The accelerator modules are operated in a pulsed mode. Thus, the excitation of the system and therefore the identification of the input-output behavior is only possible within a short time period. Developed is an adaptive identification approach with a specified SO(2) symmetric model structure. The proposed controller design strategy fulfills the requirements of a high precision field performance. Adapting the feedforward signal by using an iterative learning control (ILC) algorithm reduces remaining repetitive field errors from pulse to pulse. It is shown, that exploiting the SO(2) symmetric structure and using the developed tensor based ILC representation simplifies the feedforward update computation. Magnetic chicanes, so

  5. Symmetric grey box identification and distributed beam-based controller design for free-electron lasers

    International Nuclear Information System (INIS)

    Pfeiffer, Sven

    2014-09-01

    The European X-ray Free-Electron Laser (XFEL) at the Deutsches Elektronen Synchtrotron (DESY) in Hamburg will, starting in 2015, open up completely new research opportunities for scientist and industrial users by exploiting ultrashort X-ray laser pulses. Bunches of electrons are accelerated by a radio frequency field inside superconducting cavities up to an energy of 17.5 GeV. A periodic arrangement of magnets forces the accelerated electrons onto a tight slalom path leading to a process in that the electrons emit extremely short and intense X-ray flashes. The generation of equidistant X-ray flashes with a constant intensity requires an extremely high precision field control in combination with beam-based signals. FLASH, which can be seen as a pilot test facility, allows to develop and test controller concepts even before the European XFEL is in operation. In this thesis it is shown that a physical white box model structure, which describes the behavior of each subsystem within the radio frequency field control loop, obeys as first-order approximation the special orthogonal group of dimension two (SO(2)). Presented is a grey box identification approach, which combines the physical model structure with general identification methods. The accelerator modules are operated in a pulsed mode. Thus, the excitation of the system and therefore the identification of the input-output behavior is only possible within a short time period. Developed is an adaptive identification approach with a specified SO(2) symmetric model structure. The proposed controller design strategy fulfills the requirements of a high precision field performance. Adapting the feedforward signal by using an iterative learning control (ILC) algorithm reduces remaining repetitive field errors from pulse to pulse. It is shown, that exploiting the SO(2) symmetric structure and using the developed tensor based ILC representation simplifies the feedforward update computation. Magnetic chicanes, so

  6. On the Huygens principle for bianisotropic mediums with symmetric permittivity and permeability dyadics

    Energy Technology Data Exchange (ETDEWEB)

    Faryad, Muhammad, E-mail: muhammad.faryad@lums.edu.pk [Department of Physics, Lahore University of Management Sciences, Lahore 54792 (Pakistan); Lakhtakia, Akhlesh [Department of Engineering Science and Mechanics, The Pennsylvania State University, University Park, PA 16802 (United States)

    2017-02-19

    Mathematical statements of the Huygens principle relate the electric and magnetic field phasors at an arbitrary location in a source-free region enclosed by a surface to the tangential components of the electric and magnetic field phasors over that surface, via the dyadic Green functions applicable to the linear homogeneous medium occupying that region. We have mathematically formulated the Huygens principle for the electric and magnetic field phasors when the permittivity and permeability dyadics of the medium are symmetric, the symmetric parts of the two magnetoelectric dyadics of the medium are negative of each other, and both magnetoelectric dyadics also contain anti-symmetric terms. We have also formulated the Huygens principle for the electric (resp. magnetic) field phasor in a medium whose permittivity (resp. permeability) is scalar, the permeability (resp. permittivity) is symmetric, the symmetric parts of the two magnetoelectric dyadics reduce to dissimilar scalars, and anti-symmetric parts of the two magnetoelectric dyadics are identical. - Highlights: • The Huygens principle was formulated for bianistropic mediums when the permittivity and permeability dyadics of the medium are symmetric. • The formulation covers isotropic, biisotropic, and gyrotropic-like uniaxial mediums for which the Huygens principle is already available. • The formulation also covers new mediums like biaxial, chiro-omega, pseudo chiral, gyrotropic-like biaxial, and Lorentz reciprocal mediums.

  7. Remitting seronegative symmetrical synovitis with pitting edema (RS3PE syndrome

    Directory of Open Access Journals (Sweden)

    Neslihan Gokcen

    2017-03-01

    Full Text Available Remitting seronegative symmetrical synovitis with pitting edema is a rare rheumatological disorder that presents with symmetrical hand and/or foot edema resembling rheumatoid arthritis. It is generally seen in male patients in older age, but atypical cases in different age groups have been documented. Although no clear mechanism has been described, certain genetic and environmental factors have been suggested for etiopathogenesis. Medical treatment is mainly focused on glucocorticoid therapy. This article aims to discuss the Remitting seronegative symmetrical synovitis with pitting edema syndrome and to review the current literature. [Cukurova Med J 2017; 42(1.000: 147-154

  8. Theorem on axially symmetric gravitational vacuum configurations

    Energy Technology Data Exchange (ETDEWEB)

    Papadopoulos, A; Le Denmat, G [Paris-6 Univ., 75 (France). Inst. Henri Poincare

    1977-01-24

    A theorem is proved which asserts the non-existence of axially symmetric gravitational vacuum configurations with non-stationary rotation only. The eventual consequences in black-hole physics are suggested.

  9. Time-reversal symmetric work distributions for closed quantum dynamics in the histories framework

    International Nuclear Information System (INIS)

    Miller, Harry J D; Anders, Janet

    2017-01-01

    A central topic in the emerging field of quantum thermodynamics is the definition of thermodynamic work in the quantum regime. One widely used solution is to define work for a closed system undergoing non-equilibrium dynamics according to the two-point energy measurement scheme. However, due to the invasive nature of measurement the two-point quantum work probability distribution cannot describe the statistics of energy change from the perspective of the system alone. We here introduce the quantum histories framework as a method to characterise the thermodynamic properties of the unmeasured , closed dynamics. Constructing continuous power operator trajectories allows us to derive an alternative quantum work distribution for closed quantum dynamics that fulfils energy conservation and is time-reversal symmetric. This opens the possibility to compare the measured work with the unmeasured work, contrasting with the classical situation where measurement does not affect the work statistics. We find that the work distribution of the unmeasured dynamics leads to deviations from the classical Jarzynski equality and can have negative values highlighting distinctly non-classical features of quantum work. (fast track communication)

  10. The discrete dynamics of symmetric competition in the plane.

    Science.gov (United States)

    Jiang, H; Rogers, T D

    1987-01-01

    We consider the generalized Lotka-Volterra two-species system xn + 1 = xn exp(r1(1 - xn) - s1yn) yn + 1 = yn exp(r2(1 - yn) - s2xn) originally proposed by R. M. May as a model for competitive interaction. In the symmetric case that r1 = r2 and s1 = s2, a region of ultimate confinement is found and the dynamics therein are described in some detail. The bifurcations of periodic points of low period are studied, and a cascade of period-doubling bifurcations is indicated. Within the confinement region, a parameter region is determined for the stable Hopf bifurcation of a pair of symmetrically placed period-two points, which imposes a second component of oscillation near the stable cycles. It is suggested that the symmetric competitive model contains much of the dynamical complexity to be expected in any discrete two-dimensional competitive model.

  11. Constructing exact symmetric informationally complete measurements from numerical solutions

    Science.gov (United States)

    Appleby, Marcus; Chien, Tuan-Yow; Flammia, Steven; Waldron, Shayne

    2018-04-01

    Recently, several intriguing conjectures have been proposed connecting symmetric informationally complete quantum measurements (SIC POVMs, or SICs) and algebraic number theory. These conjectures relate the SICs to their minimal defining algebraic number field. Testing or sharpening these conjectures requires that the SICs are expressed exactly, rather than as numerical approximations. While many exact solutions of SICs have been constructed previously using Gröbner bases, this method has probably been taken as far as is possible with current computer technology (except in special cases where there are additional symmetries). Here, we describe a method for converting high-precision numerical solutions into exact ones using an integer relation algorithm in conjunction with the Galois symmetries of an SIC. Using this method, we have calculated 69 new exact solutions, including nine new dimensions, where previously only numerical solutions were known—which more than triples the number of known exact solutions. In some cases, the solutions require number fields with degrees as high as 12 288. We use these solutions to confirm that they obey the number-theoretic conjectures, and address two questions suggested by the previous work.

  12. Distinction of impedance responses of Li-ion batteries for individual electrodes using symmetric cells

    International Nuclear Information System (INIS)

    Momma, Toshiyuki; Yokoshima, Tokihiko; Nara, Hiroki; Gima, Yuhei; Osaka, Tetsuya

    2014-01-01

    Graphical abstract: - Highlights: • Impedance of lithium ion battery and symmetric cells were analyzed. • Anode symmetric cells and cathode one were prepared with ca. 7 × 7 cm 2 electrodes. • Except for R ct in cathode, electrochemical parameters did not change by reassembling. • Fitting data for symmetric cell were found to be useful for full cell analysis. • Electrochemical parameters of battery were traced during cycling degradation. - Abstract: Symmetric cells were prepared with a newly designed separable cell module, which enabled ca. 70 mm by 70 mm electrode sheets to be used for a pouch type 5 Ah class Li-ion battery (LIB). Impedance analysis of the LIB as a full cell state was successfully performed with electrochemical parameters obtained by an impedance analysis of symmetric cells of anodes and cathodes obtained from the operated Li-ion batteries. While the charge transfer resistance of the cathode was found to increase after reassembling the cells symmetrically, other electrochemical parameters were found not to change when comparing the values obtained for full cells with symmetric cells. Eelectrodes degraded by charge/discharge cycling of the battery were also investigated, and the parameter change caused by the degradation was confirmed

  13. Design of special facility for liquor irradiation

    International Nuclear Information System (INIS)

    Yao Shibin; Chen Zigen

    1989-01-01

    The design principle, physical scheme, technological process, construction and safety features of a special facility used for irradiating liquors is briefly described. 0.925 x 10 15 Bq cobalt source is used and the irradiation capacity for liquors approaches 10 t per day. The facility bears advantages of simple in construction, easy to operate, safe, reliable and efficient in source utilization

  14. Symmetric, discrete fractional splines and Gabor systems

    DEFF Research Database (Denmark)

    Søndergaard, Peter Lempel

    2006-01-01

    In this paper we consider fractional splines as windows for Gabor frames. We introduce two new types of symmetric, fractional splines in addition to one found by Unser and Blu. For the finite, discrete case we present two families of splines: One is created by sampling and periodizing the continu......In this paper we consider fractional splines as windows for Gabor frames. We introduce two new types of symmetric, fractional splines in addition to one found by Unser and Blu. For the finite, discrete case we present two families of splines: One is created by sampling and periodizing...... the continuous splines, and one is a truly finite, discrete construction. We discuss the properties of these splines and their usefulness as windows for Gabor frames and Wilson bases....

  15. Solving the generalized symmetric eigenvalue problem using tile algorithms on multicore architectures

    KAUST Repository

    Ltaief, Hatem; Luszczek, Piotr R.; Haidar, Azzam; Dongarra, Jack

    2012-01-01

    This paper proposes an efficient implementation of the generalized symmetric eigenvalue problem on multicore architecture. Based on a four-stage approach and tile algorithms, the original problem is first transformed into a standard symmetric

  16. A simple, robust and efficient high-order accurate shock-capturing scheme for compressible flows: Towards minimalism

    Science.gov (United States)

    Ohwada, Taku; Shibata, Yuki; Kato, Takuma; Nakamura, Taichi

    2018-06-01

    Developed is a high-order accurate shock-capturing scheme for the compressible Euler/Navier-Stokes equations; the formal accuracy is 5th order in space and 4th order in time. The performance and efficiency of the scheme are validated in various numerical tests. The main ingredients of the scheme are nothing special; they are variants of the standard numerical flux, MUSCL, the usual Lagrange's polynomial and the conventional Runge-Kutta method. The scheme can compute a boundary layer accurately with a rational resolution and capture a stationary contact discontinuity sharply without inner points. And yet it is endowed with high resistance against shock anomalies (carbuncle phenomenon, post-shock oscillations, etc.). A good balance between high robustness and low dissipation is achieved by blending three types of numerical fluxes according to physical situation in an intuitively easy-to-understand way. The performance of the scheme is largely comparable to that of WENO5-Rusanov, while its computational cost is 30-40% less than of that of the advanced scheme.

  17. Strong orientational coordinates and orientational order parameters for symmetric objects

    International Nuclear Information System (INIS)

    Haji-Akbari, Amir; Glotzer, Sharon C

    2015-01-01

    Recent advancements in the synthesis of anisotropic macromolecules and nanoparticles have spurred an immense interest in theoretical and computational studies of self-assembly. The cornerstone of such studies is the role of shape in self-assembly and in inducing complex order. The problem of identifying different types of order that can emerge in such systems can, however, be challenging. Here, we revisit the problem of quantifying orientational order in systems of building blocks with non-trivial rotational symmetries. We first propose a systematic way of constructing orientational coordinates for such symmetric building blocks. We call the arising tensorial coordinates strong orientational coordinates (SOCs) as they fully and exclusively specify the orientation of a symmetric object. We then use SOCs to describe and quantify local and global orientational order, and spatiotemporal orientational correlations in systems of symmetric building blocks. The SOCs and the orientational order parameters developed in this work are not only useful in performing and analyzing computer simulations of symmetric molecules or particles, but can also be utilized for the efficient storage of rotational information in long trajectories of evolving many-body systems. (paper)

  18. Design and experimental realization of an optimal scheme for teleportation of an n-qubit quantum state

    Science.gov (United States)

    Sisodia, Mitali; Shukla, Abhishek; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    An explicit scheme (quantum circuit) is designed for the teleportation of an n-qubit quantum state. It is established that the proposed scheme requires an optimal amount of quantum resources, whereas larger amount of quantum resources have been used in a large number of recently reported teleportation schemes for the quantum states which can be viewed as special cases of the general n-qubit state considered here. A trade-off between our knowledge about the quantum state to be teleported and the amount of quantum resources required for the same is observed. A proof-of-principle experimental realization of the proposed scheme (for a 2-qubit state) is also performed using 5-qubit superconductivity-based IBM quantum computer. The experimental results show that the state has been teleported with high fidelity. Relevance of the proposed teleportation scheme has also been discussed in the context of controlled, bidirectional, and bidirectional controlled state teleportation.

  19. Schemes of radioactive decay, its interpretations in the scope of the radiological protection

    International Nuclear Information System (INIS)

    Mohamad, N.; Caro, R.A.; Bergoc, R.M.

    1998-01-01

    Full text: In our teaching experience we have verified that the interpretation of the symbols of radioactive decay schemes is one of the most difficult subject in the study of radioisotope methodologies for almost all professionals, and specially for those who have no solid background in mathematics or physics. The correct interpretation of decay schemes has fundamental importance for the proper election of measurement conditions and for performing the dosimetric and shielding calculations. Nuclides employed in Nuclear Medicine and Biomedicine are beta, gamma or beta/gamma emitters. Interpretation of decay schemes of beta emitters, by β + , β - or electronic capture are not difficult. In gamma emitting nuclides it is frequent that a particular level of energy is de-excited through more than one gamma transition of a given percentage and energy. On the other hand, it is also frequent that conversion electrons are emitted together with gamma photons, the proportion of which is usually given as the conversion factor, e/γ. The fraction of emitted photons is calculated as: 1 / [1+ (e/γ)], whereas the fraction of emitted conversion electrons is equal to: (e/γ) / [1+ (e/γ)]. Special attention should be given to the post-accommodation mechanism after disintegration in which orbital vacancies are produced: electron conversion or electron capture, in which the emission of X-rays and Auger electrons occur. All this information should be taken into account for the correct choice of measurement conditions, as well as internal and external dose calculations. In the present work we describe the analysis and interpretation of disintegration schemes in general and that of the most employed nuclides in Nuclear Medicine and Biomedicine. (author) [es

  20. A Time Marching Scheme for Solving Volume Integral Equations on Nonlinear Scatterers

    KAUST Repository

    Bagci, Hakan

    2015-01-07

    Transient electromagnetic field interactions on inhomogeneous penetrable scatterers can be analyzed by solving time domain volume integral equations (TDVIEs). TDVIEs are oftentimes solved using marchingon-in-time (MOT) schemes. Unlike finite difference and finite element schemes, MOT-TDVIE solvers require discretization of only the scatterers, do not call for artificial absorbing boundary conditions, and are more robust to numerical phase dispersion. On the other hand, their computational cost is high, they suffer from late-time instabilities, and their implicit nature makes incorporation of nonlinear constitutive relations more difficult. Development of plane-wave time-domain (PWTD) and FFT-based schemes has significantly reduced the computational cost of the MOT-TDVIE solvers. Additionally, latetime instability problem has been alleviated for all practical purposes with the development of accurate integration schemes and specially designed temporal basis functions. Addressing the third challenge is the topic of this presentation. I will talk about an explicit MOT scheme developed for solving the TDVIE on scatterers with nonlinear material properties. The proposed scheme separately discretizes the TDVIE and the nonlinear constitutive relation between electric field intensity and flux density. The unknown field intensity and flux density are expanded using half and full Schaubert-Wilton-Glisson (SWG) basis functions in space and polynomial temporal interpolators in time. The resulting coupled system of the discretized TDVIE and constitutive relation is integrated in time using an explicit P E(CE) m scheme to yield the unknown expansion coefficients. Explicitness of time marching allows for straightforward incorporation of the nonlinearity as a function evaluation on the right hand side of the coupled system of equations. Consequently, the resulting MOT scheme does not call for a Newton-like nonlinear solver. Numerical examples, which demonstrate the applicability

  1. A Time Marching Scheme for Solving Volume Integral Equations on Nonlinear Scatterers

    KAUST Repository

    Bagci, Hakan

    2015-01-01

    Transient electromagnetic field interactions on inhomogeneous penetrable scatterers can be analyzed by solving time domain volume integral equations (TDVIEs). TDVIEs are oftentimes solved using marchingon-in-time (MOT) schemes. Unlike finite difference and finite element schemes, MOT-TDVIE solvers require discretization of only the scatterers, do not call for artificial absorbing boundary conditions, and are more robust to numerical phase dispersion. On the other hand, their computational cost is high, they suffer from late-time instabilities, and their implicit nature makes incorporation of nonlinear constitutive relations more difficult. Development of plane-wave time-domain (PWTD) and FFT-based schemes has significantly reduced the computational cost of the MOT-TDVIE solvers. Additionally, latetime instability problem has been alleviated for all practical purposes with the development of accurate integration schemes and specially designed temporal basis functions. Addressing the third challenge is the topic of this presentation. I will talk about an explicit MOT scheme developed for solving the TDVIE on scatterers with nonlinear material properties. The proposed scheme separately discretizes the TDVIE and the nonlinear constitutive relation between electric field intensity and flux density. The unknown field intensity and flux density are expanded using half and full Schaubert-Wilton-Glisson (SWG) basis functions in space and polynomial temporal interpolators in time. The resulting coupled system of the discretized TDVIE and constitutive relation is integrated in time using an explicit P E(CE) m scheme to yield the unknown expansion coefficients. Explicitness of time marching allows for straightforward incorporation of the nonlinearity as a function evaluation on the right hand side of the coupled system of equations. Consequently, the resulting MOT scheme does not call for a Newton-like nonlinear solver. Numerical examples, which demonstrate the applicability

  2. A cosmological problem for maximally symmetric supergravity

    International Nuclear Information System (INIS)

    German, G.; Ross, G.G.

    1986-01-01

    Under very general considerations it is shown that inflationary models of the universe based on maximally symmetric supergravity with flat potentials are unable to resolve the cosmological energy density (Polonyi) problem. (orig.)

  3. Containment Domains: A Scalable, Efficient and Flexible Resilience Scheme for Exascale Systems

    Directory of Open Access Journals (Sweden)

    Jinsuk Chung

    2013-01-01

    Full Text Available This paper describes and evaluates a scalable and efficient resilience scheme based on the concept of containment domains. Containment domains are a programming construct that enable applications to express resilience needs and to interact with the system to tune and specialize error detection, state preservation and restoration, and recovery schemes. Containment domains have weak transactional semantics and are nested to take advantage of the machine and application hierarchies and to enable hierarchical state preservation, restoration and recovery. We evaluate the scalability and efficiency of containment domains using generalized trace-driven simulation and analytical analysis and show that containment domains are superior to both checkpoint restart and redundant execution approaches.

  4. Sobolev spaces on bounded symmetric domains

    Czech Academy of Sciences Publication Activity Database

    Engliš, Miroslav

    Roč. 60, č. 12 ( 2015 ), s. 1712-1726 ISSN 1747-6933 Institutional support: RVO:67985840 Keywords : bounded symmetric domain * Sobolev space * Bergman space Subject RIV: BA - General Mathematics Impact factor: 0.466, year: 2015 http://www.tandfonline.com/doi/abs/10.1080/17476933. 2015 .1043910

  5. Harmonic analysis on reductive symmetric spaces

    NARCIS (Netherlands)

    Ban, E.P. van den; Schlichtkrull, H.

    2000-01-01

    We give a relatively non-technical survey of some recent advances in the Fourier theory for semisimple symmetric spaces. There are three major results: An inversion formula for the Fourier transform, a Palley-Wiener theorem, which describes the Fourier image of the space of completely supported

  6. Identification and characterization of Department of Energy special-case radioactive waste

    International Nuclear Information System (INIS)

    Williams, R.E.; Kudera, D.E.

    1990-01-01

    This paper identifies and characterizes Department of Energy (DOE) special-case radioactive wastes. Included in this paper are descriptions of the special-case waste categories and their volumes and curie contents, as well as discussions of potential methods for management of these special-case wastes. Work on extensive inventories of DOE-titled special-case waste are still in progress. All radioactive waste is characterized to determine its waste category. Some wastes may have characteristics of more than one of the major waste types. These characteristics may prevent such wastes from being managed as typical high-level, low-level, or transuranic waste. DOE has termed these wastes special-case wastes. Special-case wastes may require special management and disposal schemes. Because of these special considerations, DOE-Headquarters (HQ) required the identification of all existing and potential DOE-owned special case waste to determine future management planning and funding requirements. The inventory effort includes all commercially held, DOE-owned radioactive materials

  7. Analog/RF performance of two tunnel FETs with symmetric structures

    Science.gov (United States)

    Chen, Shupeng; Liu, Hongxia; Wang, Shulong; Li, Wei; Wang, Qianqiong

    2017-11-01

    In this paper, the radio frequency and analog performance of two tunnel field-effect transistors with symmetric structures are analyzed. The symmetric U-shape gate tunnel field-effect transistor (SUTFET) and symmetric tunnel field-effect transistor (STFET) are investigated by Silvaco Atlas simulation. The basic electrical properties and the parameters related to frequency and analog characteristics are analyzed. Due to the lower off-state leakage current, the STFET has better power consumption performance. The SUTFET obtains larger operating current (242 μA/μm), transconductance (490 μS/μm), output conductance (494 μS/μm), gain bandwidth product (3.2 GHz) and cut-off frequency (27.7 GHz). The simulation result of these two devices can be used as a guideline for their analog/RF applications.

  8. Electroweak Baryogenesis in R-symmetric Supersymmetry

    Energy Technology Data Exchange (ETDEWEB)

    Fok, R.; Kribs, Graham D.; Martin, Adam; Tsai, Yuhsin

    2013-03-01

    We demonstrate that electroweak baryogenesis can occur in a supersymmetric model with an exact R-symmetry. The minimal R-symmetric supersymmetric model contains chiral superfields in the adjoint representation, giving Dirac gaugino masses, and an additional set of "R-partner" Higgs superfields, giving R-symmetric \\mu-terms. New superpotential couplings between the adjoints and the Higgs fields can simultaneously increase the strength of the electroweak phase transition and provide additional tree-level contributions to the lightest Higgs mass. Notably, no light stop is present in this framework, and in fact, we require both stops to be above a few TeV to provide sufficient radiative corrections to the lightest Higgs mass to bring it up to 125 GeV. Large CP-violating phases in the gaugino/higgsino sector allow us to match the baryon asymmetry of the Universe with no constraints from electric dipole moments due to R-symmetry. We briefly discuss some of the more interesting phenomenology, particularly of the of the lightest CP-odd scalar.

  9. Axially symmetrical stresses measurement in the cylindrical tube using DIC with hole-drilling

    Science.gov (United States)

    Ma, Yinji; Yao, Xuefeng; Zhang, Danwen

    2015-03-01

    In this paper, a new method combining the digital image correlation (DIC) with the hole-drilling technology to characterize the axially symmetrical stresses of the cylindrical tube is developed. First, the theoretical expressions of the axially symmetrical stresses in the cylindrical tube are derived based on the displacement or strain fields before and after hole-drilling. Second, the release of the axially symmetrical stresses for the cylindrical tube caused by hole-drilling is simulated by the finite element method (FEM), which indicates that the axially symmetrical stresses of the cylindrical tube calculated by the cylindrical solution is more accuracy than that for traditionally planar solution. Finally, both the speckle image information and the displacement field of the cylindrical tube before and after hole-drilling are extracted by combining the DIC with the hole-drilling technology, then the axially symmetrical loading induced stresses of the cylindrical tube are obtained, which agree well with the results from the strain gauge method.

  10. Particle in a box in PT-symmetric quantum mechanics and an electromagnetic analog

    Science.gov (United States)

    Dasarathy, Anirudh; Isaacson, Joshua P.; Jones-Smith, Katherine; Tabachnik, Jason; Mathur, Harsh

    2013-06-01

    In PT-symmetric quantum mechanics a fundamental principle of quantum mechanics, that the Hamiltonian must be Hermitian, is replaced by another set of requirements, including notably symmetry under PT, where P denotes parity and T denotes time reversal. Here we study the role of boundary conditions in PT-symmetric quantum mechanics by constructing a simple model that is the PT-symmetric analog of a particle in a box. The model has the usual particle-in-a-box Hamiltonian but boundary conditions that respect PT symmetry rather than Hermiticity. We find that for a broad class of PT-symmetric boundary conditions the model respects the condition of unbroken PT symmetry, namely, that the Hamiltonian and the symmetry operator PT have simultaneous eigenfunctions, implying that the energy eigenvalues are real. We also find that the Hamiltonian is self-adjoint under the PT-symmetric inner product. Thus we obtain a simple soluble model that fulfills all the requirements of PT-symmetric quantum mechanics. In the second part of this paper we formulate a variational principle for PT-symmetric quantum mechanics that is the analog of the textbook Rayleigh-Ritz principle. Finally we consider electromagnetic analogs of the PT-symmetric particle in a box. We show that the isolated particle in a box may be realized as a Fabry-Perot cavity between an absorbing medium and its conjugate gain medium. Coupling the cavity to an external continuum of incoming and outgoing states turns the energy levels of the box into sharp resonances. Remarkably we find that the resonances have a Breit-Wigner line shape in transmission and a Fano line shape in reflection; by contrast, in the corresponding Hermitian case the line shapes always have a Breit-Wigner form in both transmission and reflection.

  11. Solving the generalized symmetric eigenvalue problem using tile algorithms on multicore architectures

    KAUST Repository

    Ltaief, Hatem

    2012-01-01

    This paper proposes an efficient implementation of the generalized symmetric eigenvalue problem on multicore architecture. Based on a four-stage approach and tile algorithms, the original problem is first transformed into a standard symmetric eigenvalue problem by computing the Cholesky factorization of the right hand side symmetric definite positive matrix (first stage), and applying the inverse of the freshly computed triangular Cholesky factors to the original dense symmetric matrix of the problem (second stage). Calculating the eigenpairs of the resulting problem is then equivalent to the eigenpairs of the original problem. The computation proceeds by reducing the updated dense symmetric matrix to symmetric band form (third stage). The band structure is further reduced by applying a bulge chasing procedure, which annihilates the extra off-diagonal entries using orthogonal transformations (fourth stage). More details on the third and fourth stage can be found in Haidar et al. [Accepted at SC\\'11, November 2011]. The eigenvalues are then calculated from the tridiagonal form using the standard LAPACK QR algorithm (i.e., DTSEQR routine), while the complex and challenging eigenvector computations will be addressed in a companion paper. The tasks from the various stages can concurrently run in an out-of-order fashion. The data dependencies are cautiously tracked by the dynamic runtime system environment QUARK, which ensures the dependencies are not violated for numerical correctness purposes. The obtained tile four-stage generalized symmetric eigenvalue solver significantly outperforms the state-of-the-art numerical libraries (up to 21-fold speed up against multithreaded LAPACK with optimized multithreaded MKL BLAS and up to 4-fold speed up against the corresponding routine from the commercial numerical software Intel MKL) on four sockets twelve cores AMD system with a 24000×24000 matrix size. © 2012 The authors and IOS Press. All rights reserved.

  12. Marginal Stability Diagrams for Infinite-n Ballooning Modes in Quasi-symmetric Stellarators

    International Nuclear Information System (INIS)

    Hudson, S.R.; Hegna, C.C.; Torasso, R.; Ware, A.

    2003-01-01

    By perturbing the pressure and rotational-transform profiles at a selected surface in a given equilibrium, and by inducing a coordinate variation such that the perturbed state is in equilibrium, a family of magnetohydrodynamic equilibria local to the surface and parameterized by the pressure gradient and shear is constructed for arbitrary stellarator geometry. The geometry of the surface is not changed. The perturbed equilibria are analyzed for infinite-n ballooning stability and marginal stability diagrams are constructed that are analogous to the (s; alpha) diagrams constructed for axi-symmetric configurations. The method describes how pressure and rotational-transform gradients influence the local shear, which in turn influences the ballooning stability. Stability diagrams for the quasi-axially-symmetric NCSX (National Compact Stellarator Experiment), a quasi-poloidally-symmetric configuration and the quasi-helically-symmetric HSX (Helically Symmetric Experiment) are presented. Regions of second-stability are observed in both NCSX and the quasi-poloidal configuration, whereas no second stable region is observed for the quasi-helically symmetric device. To explain the different regions of stability, the curvature and local shear of the quasi-poloidal configuration are analyzed. The results are seemingly consistent with the simple explanation: ballooning instability results when the local shear is small in regions of bad curvature. Examples will be given that show that the structure, and stability, of the ballooning mode is determined by the structure of the potential function arising in the Schroedinger form of the ballooning equation

  13. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  14. (Anti)symmetric multivariate exponential functions and corresponding Fourier transforms

    International Nuclear Information System (INIS)

    Klimyk, A U; Patera, J

    2007-01-01

    We define and study symmetrized and antisymmetrized multivariate exponential functions. They are defined as determinants and antideterminants of matrices whose entries are exponential functions of one variable. These functions are eigenfunctions of the Laplace operator on the corresponding fundamental domains satisfying certain boundary conditions. To symmetric and antisymmetric multivariate exponential functions there correspond Fourier transforms. There are three types of such Fourier transforms: expansions into the corresponding Fourier series, integral Fourier transforms and multivariate finite Fourier transforms. Eigenfunctions of the integral Fourier transforms are found

  15. Rydberg atoms in weak magnetic fields

    International Nuclear Information System (INIS)

    Kazantsev, A.P.; Pokrovsky, V.L.; Bergou, J.

    1983-01-01

    The quadratic Zeeman effect of Rydberg atoms in the framework of perturbation theory is dealt with and a special quasiclassical approximation scheme is applied. The Bohr-Sommerfeld quantization condition is given in terms of complete elliptic integrals. It is shown that part of the spectrum is doubly degenerate, the corresponding states are asymmetric with respect to the Coulomb centre and have a non-zero dipole moment; the rest of the spectrum is nondegenerate, the states are symmetric and their dipole-moment vanishes. The transition from the symmetric to the asymmetric region is similar to a phase transition and it gives an experimental possibility to distinguish between the two types of states. (author)

  16. Block-classified bidirectional motion compensation scheme for wavelet-decomposed digital video

    Energy Technology Data Exchange (ETDEWEB)

    Zafar, S. [Argonne National Lab., IL (United States). Mathematics and Computer Science Div.; Zhang, Y.Q. [David Sarnoff Research Center, Princeton, NJ (United States); Jabbari, B. [George Mason Univ., Fairfax, VA (United States)

    1997-08-01

    In this paper the authors introduce a block-classified bidirectional motion compensation scheme for the previously developed wavelet-based video codec, where multiresolution motion estimation is performed in the wavelet domain. The frame classification structure described in this paper is similar to that used in the MPEG standard. Specifically, the I-frames are intraframe coded, the P-frames are interpolated from a previous I- or a P-frame, and the B-frames are bidirectional interpolated frames. They apply this frame classification structure to the wavelet domain with variable block sizes and multiresolution representation. They use a symmetric bidirectional scheme for the B-frames and classify the motion blocks as intraframe, compensated either from the preceding or the following frame, or bidirectional (i.e., compensated based on which type yields the minimum energy). They also introduce the concept of F-frames, which are analogous to P-frames but are predicted from the following frame only. This improves the overall quality of the reconstruction in a group of pictures (GOP) but at the expense of extra buffering. They also study the effect of quantization of the I-frames on the reconstruction of a GOP, and they provide intuitive explanation for the results. In addition, the authors study a variety of wavelet filter-banks to be used in a multiresolution motion-compensated hierarchical video codec.

  17. A direct Primitive Variable Recovery Scheme for hyperbolic conservative equations: The case of relativistic hydrodynamics.

    Science.gov (United States)

    Aguayo-Ortiz, A; Mendoza, S; Olvera, D

    2018-01-01

    In this article we develop a Primitive Variable Recovery Scheme (PVRS) to solve any system of coupled differential conservative equations. This method obtains directly the primitive variables applying the chain rule to the time term of the conservative equations. With this, a traditional finite volume method for the flux is applied in order avoid violation of both, the entropy and "Rankine-Hugoniot" jump conditions. The time evolution is then computed using a forward finite difference scheme. This numerical technique evades the recovery of the primitive vector by solving an algebraic system of equations as it is often used and so, it generalises standard techniques to solve these kind of coupled systems. The article is presented bearing in mind special relativistic hydrodynamic numerical schemes with an added pedagogical view in the appendix section in order to easily comprehend the PVRS. We present the convergence of the method for standard shock-tube problems of special relativistic hydrodynamics and a graphical visualisation of the errors using the fluctuations of the numerical values with respect to exact analytic solutions. The PVRS circumvents the sometimes arduous computation that arises from standard numerical methods techniques, which obtain the desired primitive vector solution through an algebraic polynomial of the charges.

  18. Symmetric mixed states of n qubits: Local unitary stabilizers and entanglement classes

    Energy Technology Data Exchange (ETDEWEB)

    Lyons, David W.; Walck, Scott N. [Lebanon Valley College, Annville, Pennsylvania 17003 (United States)

    2011-10-15

    We classify, up to local unitary equivalence, local unitary stabilizer Lie algebras for symmetric mixed states of n qubits into six classes. These include the stabilizer types of the Werner states, the Greenberger-Horne-Zeilinger state and its generalizations, and Dicke states. For all but the zero algebra, we classify entanglement types (local unitary equivalence classes) of symmetric mixed states that have those stabilizers. We make use of the identification of symmetric density matrices with polynomials in three variables with real coefficients and apply the representation theory of SO(3) on this space of polynomials.

  19. A tensor formulation of the equation of transfer for spherically symmetric flows. [radiative transfer in seven dimensional Riemannian space

    Science.gov (United States)

    Haisch, B. M.

    1976-01-01

    A tensor formulation of the equation of radiative transfer is derived in a seven-dimensional Riemannian space such that the resulting equation constitutes a divergence in any coordinate system. After being transformed to a spherically symmetric comoving coordinate system, the transfer equation contains partial derivatives in angle and frequency, as well as optical depth due to the effects of aberration and the Doppler shift. However, by virtue of the divergence form of this equation, the divergence theorem may be applied to yield a numerical differencing scheme which is expected to be stable and to conserve luminosity. It is shown that the equation of transfer derived by this method in a Lagrangian coordinate system may be reduced to that given by Castor (1972), although it is, of course, desirable to leave the equation in divergence form.

  20. PT-symmetric ladders with a scattering core

    Energy Technology Data Exchange (ETDEWEB)

    D' Ambroise, J. [Department of Mathematics, Amherst College, Amherst, MA 01002-5000 (United States); Lepri, S. [CNR – Consiglio Nazionale delle Ricerche, Istituto dei Sistemi Complessi, via Madonna del piano 10, I-50019 Sesto Fiorentino (Italy); Istituto Nazionale di Fisica Nucleare, Sezione di Firenze, via G. Sansone 1, I-50019 Sesto Fiorentino (Italy); Malomed, B.A. [Department of Physical Electronics, School of Electrical Engineering, Faculty of Engineering, Tel Aviv University, Tel Aviv 69978 (Israel); Kevrekidis, P.G. [Department of Mathematics and Statistics, University of Massachusetts, Amherst, MA 01003-9305 (United States)

    2014-08-01

    We consider a PT-symmetric chain (ladder-shaped) system governed by the discrete nonlinear Schrödinger equation where the cubic nonlinearity is carried solely by two central “rungs” of the ladder. Two branches of scattering solutions for incident plane waves are found. We systematically construct these solutions, analyze their stability, and discuss non-reciprocity of the transmission associated with them. To relate the results to finite-size wavepacket dynamics, we also perform direct simulations of the evolution of the wavepackets, which confirm that the transmission is indeed asymmetric in this nonlinear system with the mutually balanced gain and loss. - Highlights: • We model a PT-symmetric ladder system with cubic nonlinearity on two central rungs. • We examine non-reciprocity and stability of incident plane waves. • Simulations of wavepackets confirm our results.

  1. Symmetric voltage-controlled variable resistance

    Science.gov (United States)

    Vanelli, J. C.

    1978-01-01

    Feedback network makes resistance of field-effect transistor (FET) same for current flowing in either direction. It combines control voltage with source and load voltages to give symmetric current/voltage characteristics. Since circuit produces same magnitude output voltage for current flowing in either direction, it introduces no offset in presense of altering polarity signals. It is therefore ideal for sensor and effector circuits in servocontrol systems.

  2. On Special Functions in the Context of Clifford Analysis

    Science.gov (United States)

    Malonek, H. R.; Falcão, M. I.

    2010-09-01

    Considering the foundation of Quaternionic Analysis by R. Fueter and his collaborators in the beginning of the 1930s as starting point of Clifford Analysis, we can look back to 80 years of work in this field. However the interest in multivariate analysis using Clifford algebras only started to grow significantly in the 70s. Since then a great amount of papers on Clifford Analysis referring different classes of Special Functions have appeared. This situation may have been triggered by a more systematic treatment of monogenic functions by their multiple series development derived from Gegenbauer or associated Legendre polynomials (and not only by their integral representation). Also approaches to Special Functions by means of algebraic methods, either Lie algebras or through Lie groups and symmetric spaces gained by that time importance and influenced their treatment in Clifford Analysis. In our talk we will rely on the generalization of the classical approach to Special Functions through differential equations with respect to the hypercomplex derivative, which is a more recently developed tool in Clifford Analysis. In this context special attention will be payed to the role of Special Functions as intermediator between continuous and discrete mathematics. This corresponds to a more recent trend in combinatorics, since it has been revealed that many algebraic structures have hidden combinatorial underpinnings.

  3. A new open-source code for spherically symmetric stellar collapse to neutron stars and black holes

    International Nuclear Information System (INIS)

    O'Connor, Evan; Ott, Christian D

    2010-01-01

    We present the new open-source spherically symmetric general-relativistic (GR) hydrodynamics code GR1D. It is based on the Eulerian formulation of GR hydrodynamics (GRHD) put forth by Romero-Ibanez-Gourgoulhon and employs radial-gauge, polar-slicing coordinates in which the 3+1 equations simplify substantially. We discretize the GRHD equations with a finite-volume scheme, employing piecewise-parabolic reconstruction and an approximate Riemann solver. GR1D is intended for the simulation of stellar collapse to neutron stars and black holes and will also serve as a testbed for modeling technology to be incorporated in multi-D GR codes. Its GRHD part is coupled to various finite-temperature microphysical equations of state in tabulated form that we make available with GR1D. An approximate deleptonization scheme for the collapse phase and a neutrino-leakage/heating scheme for the postbounce epoch are included and described. We also derive the equations for effective rotation in 1D and implement them in GR1D. We present an array of standard test calculations and also show how simple analytic equations of state in combination with presupernova models from stellar evolutionary calculations can be used to study qualitative aspects of black hole formation in failing rotating core-collapse supernovae. In addition, we present a simulation with microphysical equations of state and neutrino leakage/heating of a failing core-collapse supernova and black hole formation in a presupernova model of a 40 M o-dot zero-age main-sequence star. We find good agreement on the time of black hole formation (within 20%) and last stable protoneutron star mass (within 10%) with predictions from simulations with full Boltzmann neutrino radiation hydrodynamics.

  4. A new open-source code for spherically symmetric stellar collapse to neutron stars and black holes

    Energy Technology Data Exchange (ETDEWEB)

    O' Connor, Evan; Ott, Christian D, E-mail: evanoc@tapir.caltech.ed, E-mail: cott@tapir.caltech.ed [TAPIR, Mail Code 350-17, California Institute of Technology, Pasadena, CA 91125 (United States)

    2010-06-07

    We present the new open-source spherically symmetric general-relativistic (GR) hydrodynamics code GR1D. It is based on the Eulerian formulation of GR hydrodynamics (GRHD) put forth by Romero-Ibanez-Gourgoulhon and employs radial-gauge, polar-slicing coordinates in which the 3+1 equations simplify substantially. We discretize the GRHD equations with a finite-volume scheme, employing piecewise-parabolic reconstruction and an approximate Riemann solver. GR1D is intended for the simulation of stellar collapse to neutron stars and black holes and will also serve as a testbed for modeling technology to be incorporated in multi-D GR codes. Its GRHD part is coupled to various finite-temperature microphysical equations of state in tabulated form that we make available with GR1D. An approximate deleptonization scheme for the collapse phase and a neutrino-leakage/heating scheme for the postbounce epoch are included and described. We also derive the equations for effective rotation in 1D and implement them in GR1D. We present an array of standard test calculations and also show how simple analytic equations of state in combination with presupernova models from stellar evolutionary calculations can be used to study qualitative aspects of black hole formation in failing rotating core-collapse supernovae. In addition, we present a simulation with microphysical equations of state and neutrino leakage/heating of a failing core-collapse supernova and black hole formation in a presupernova model of a 40 M{sub o-dot} zero-age main-sequence star. We find good agreement on the time of black hole formation (within 20%) and last stable protoneutron star mass (within 10%) with predictions from simulations with full Boltzmann neutrino radiation hydrodynamics.

  5. The Mathematics of Symmetrical Factorial Designs

    Indian Academy of Sciences (India)

    The Mathematics of Symmetrical Factorial Designs. Mausumi Bose (nee Sen) obtained her MSc degree in. Statistics from the Calcutta. University and PhD degree from the Indian Statistical. Institute. She is on the faculty of the Indian. Statistical Institute. Her main field of research interest is design and analysis of experiments.

  6. Solution of generalized shifted linear systems with complex symmetric matrices

    International Nuclear Information System (INIS)

    Sogabe, Tomohiro; Hoshi, Takeo; Zhang, Shao-Liang; Fujiwara, Takeo

    2012-01-01

    We develop the shifted COCG method [R. Takayama, T. Hoshi, T. Sogabe, S.-L. Zhang, T. Fujiwara, Linear algebraic calculation of Green’s function for large-scale electronic structure theory, Phys. Rev. B 73 (165108) (2006) 1–9] and the shifted WQMR method [T. Sogabe, T. Hoshi, S.-L. Zhang, T. Fujiwara, On a weighted quasi-residual minimization strategy of the QMR method for solving complex symmetric shifted linear systems, Electron. Trans. Numer. Anal. 31 (2008) 126–140] for solving generalized shifted linear systems with complex symmetric matrices that arise from the electronic structure theory. The complex symmetric Lanczos process with a suitable bilinear form plays an important role in the development of the methods. The numerical examples indicate that the methods are highly attractive when the inner linear systems can efficiently be solved.

  7. Quantum dynamics calculations using symmetrized, orthogonal Weyl-Heisenberg wavelets with a phase space truncation scheme. II. Construction and optimization

    International Nuclear Information System (INIS)

    Poirier, Bill; Salam, A.

    2004-01-01

    In this paper, we extend and elaborate upon a wavelet method first presented in a previous publication [B. Poirier, J. Theo. Comput. Chem. 2, 65 (2003)]. In particular, we focus on construction and optimization of the wavelet functions, from theoretical and numerical viewpoints, and also examine their localization properties. The wavelets used are modified Wilson-Daubechies wavelets, which in conjunction with a simple phase space truncation scheme, enable one to solve the multidimensional Schroedinger equation. This approach is ideally suited to rovibrational spectroscopy applications, but can be used in any context where differential equations are involved

  8. A comparison of lower bounds for the symmetric circulant traveling salesman problem

    NARCIS (Netherlands)

    de Klerk, E.; Dobre, C.

    2011-01-01

    When the matrix of distances between cities is symmetric and circulant, the traveling salesman problem (TSP) reduces to the so-called symmetric circulant traveling salesman problem (SCTSP), that has applications in the design of reconfigurable networks, and in minimizing wallpaper waste. The

  9. A class of non-symmetric band determinants with the Gaussian q ...

    African Journals Online (AJOL)

    A class of symmetric band matrices of bandwidth 2r+1 with the binomial coefficients entries was studied earlier. We consider a class of non-symmetric band matrices with the Gaussian q-binomial coefficients whose upper bandwith is s and lower bandwith is r. We give explicit formulæ for the determinant, the inverse (along ...

  10. Asymptotic expansions for Toeplitz operators on symmetric spaces of general type

    Czech Academy of Sciences Publication Activity Database

    Engliš, Miroslav; Upmeier, H.

    2015-01-01

    Roč. 367, č. 1 (2015), s. 423-476 ISSN 0002-9947 R&D Projects: GA ČR GA201/09/0473 Institutional support: RVO:67985840 Keywords : symmetric space * symmetric domain * Berezin quantization Subject RIV: BA - General Mathematics Impact factor: 1.196, year: 2015 http://www.ams.org/journals/tran/2015-367-01/S0002-9947-2014-06130-8/

  11. Symmetric minimally entangled typical thermal states for canonical and grand-canonical ensembles

    Science.gov (United States)

    Binder, Moritz; Barthel, Thomas

    2017-05-01

    Based on the density matrix renormalization group (DMRG), strongly correlated quantum many-body systems at finite temperatures can be simulated by sampling over a certain class of pure matrix product states (MPS) called minimally entangled typical thermal states (METTS). When a system features symmetries, these can be utilized to substantially reduce MPS computation costs. It is conceptually straightforward to simulate canonical ensembles using symmetric METTS. In practice, it is important to alternate between different symmetric collapse bases to decrease autocorrelations in the Markov chain of METTS. To this purpose, we introduce symmetric Fourier and Haar-random block bases that are efficiently mixing. We also show how grand-canonical ensembles can be simulated efficiently with symmetric METTS. We demonstrate these approaches for spin-1 /2 X X Z chains and discuss how the choice of the collapse bases influences autocorrelations as well as the distribution of measurement values and, hence, convergence speeds.

  12. Holographic Spherically Symmetric Metrics

    Science.gov (United States)

    Petri, Michael

    The holographic principle (HP) conjectures, that the maximum number of degrees of freedom of any realistic physical system is proportional to the system's boundary area. The HP has its roots in the study of black holes. It has recently been applied to cosmological solutions. In this article we apply the HP to spherically symmetric static space-times. We find that any regular spherically symmetric object saturating the HP is subject to tight constraints on the (interior) metric, energy-density, temperature and entropy-density. Whenever gravity can be described by a metric theory, gravity is macroscopically scale invariant and the laws of thermodynamics hold locally and globally, the (interior) metric of a regular holographic object is uniquely determined up to a constant factor and the interior matter-state must follow well defined scaling relations. When the metric theory of gravity is general relativity, the interior matter has an overall string equation of state (EOS) and a unique total energy-density. Thus the holographic metric derived in this article can serve as simple interior 4D realization of Mathur's string fuzzball proposal. Some properties of the holographic metric and its possible experimental verification are discussed. The geodesics of the holographic metric describe an isotropically expanding (or contracting) universe with a nearly homogeneous matter-distribution within the local Hubble volume. Due to the overall string EOS the active gravitational mass-density is zero, resulting in a coasting expansion with Ht = 1, which is compatible with the recent GRB-data.

  13. Invariant subspaces in some function spaces on symmetric spaces. II

    International Nuclear Information System (INIS)

    Platonov, S S

    1998-01-01

    Let G be a semisimple connected Lie group with finite centre, K a maximal compact subgroup of G, and M=G/K a Riemannian symmetric space of non-compact type. We study the problem of describing the structure of closed linear subspaces in various function spaces on M that are invariant under the quasiregular representation of the group G. We consider the case when M is a symplectic symmetric space of rank 1

  14. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.

  15. Tailoring Spectral Properties of Binary PT-Symmetric Gratings by Duty-Cycle Methods

    DEFF Research Database (Denmark)

    Lupu, Anatole T.; Benisty, Henri; Lavrinenko, Andrei

    2016-01-01

    We explore the frequency selective functionalities of a nonuniform PT-symmetric Bragg grating with modulated complex index profile. We start by assessing the possibility to achieve an efficient apodization of the PT-symmetric Bragg grating spectral response by using direct adaptations of the conv...

  16. Symmetric scrolled packings of multilayered carbon nanoribbons

    Science.gov (United States)

    Savin, A. V.; Korznikova, E. A.; Lobzenko, I. P.; Baimova, Yu. A.; Dmitriev, S. V.

    2016-06-01

    Scrolled packings of single-layer and multilayer graphene can be used for the creation of supercapacitors, nanopumps, nanofilters, and other nanodevices. The full atomistic simulation of graphene scrolls is restricted to consideration of relatively small systems in small time intervals. To overcome this difficulty, a two-dimensional chain model making possible an efficient calculation of static and dynamic characteristics of nanoribbon scrolls with allowance for the longitudinal and bending stiffness of nanoribbons is proposed. The model is extended to the case of scrolls of multilayer graphene. Possible equilibrium states of symmetric scrolls of multilayer carbon nanotribbons rolled up so that all nanoribbons in the scroll are equivalent are found. Dependences of the number of coils, the inner and outer radii, lowest vibrational eigenfrequencies of rolled packages on the length L of nanoribbons are obtained. It is shown that the lowest vibrational eigenfrequency of a symmetric scroll decreases with a nanoribbon length proportionally to L -1. It is energetically unfavorable for too short nanoribbons to roll up, and their ground state is a stack of plane nanoribbons. With an increasing number k of layers, the nanoribbon length L necessary for creation of symmetric scrolls increases. For a sufficiently small number of layers k and a sufficiently large nanoribbon length L, the scrolled packing has the lowest energy as compared to that of stack of plane nanoribbons and folded structures. The results can be used for development of nanomaterials and nanodevices on the basis of graphene scrolled packings.

  17. Maximum-confidence discrimination among symmetric qudit states

    International Nuclear Information System (INIS)

    Jimenez, O.; Solis-Prosser, M. A.; Delgado, A.; Neves, L.

    2011-01-01

    We study the maximum-confidence (MC) measurement strategy for discriminating among nonorthogonal symmetric qudit states. Restricting to linearly dependent and equally likely pure states, we find the optimal positive operator valued measure (POVM) that maximizes our confidence in identifying each state in the set and minimizes the probability of obtaining inconclusive results. The physical realization of this POVM is completely determined and it is shown that after an inconclusive outcome, the input states may be mapped into a new set of equiprobable symmetric states, restricted, however, to a subspace of the original qudit Hilbert space. By applying the MC measurement again onto this new set, we can still gain some information about the input states, although with less confidence than before. This leads us to introduce the concept of sequential maximum-confidence (SMC) measurements, where the optimized MC strategy is iterated in as many stages as allowed by the input set, until no further information can be extracted from an inconclusive result. Within each stage of this measurement our confidence in identifying the input states is the highest possible, although it decreases from one stage to the next. In addition, the more stages we accomplish within the maximum allowed, the higher will be the probability of correct identification. We will discuss an explicit example of the optimal SMC measurement applied in the discrimination among four symmetric qutrit states and propose an optical network to implement it.

  18. Nonstandard jump functions for radically symmetric shock waves

    International Nuclear Information System (INIS)

    Baty, Roy S.; Tucker, Don H.; Stanescu, Dan

    2008-01-01

    Nonstandard analysis is applied to derive generalized jump functions for radially symmetric, one-dimensional, magnetogasdynamic shock waves. It is assumed that the shock wave jumps occur on infinitesimal intervals and the jump functions for the physical parameters occur smoothly across these intervals. Locally integrable predistributions of the Heaviside function are used to model the flow variables across a shock wave. The equations of motion expressed in nonconservative form are then applied to derive unambiguous relationships between the jump functions for the physical parameters for two families of self-similar flows. It is shown that the microstructures for these families of radially symmetric, magnetogasdynamic shock waves coincide in a nonstandard sense for a specified density jump function.

  19. Are average and symmetric faces attractive to infants? Discrimination and looking preferences.

    Science.gov (United States)

    Rhodes, Gillian; Geddes, Keren; Jeffery, Linda; Dziurawiec, Suzanne; Clark, Alison

    2002-01-01

    Young infants prefer to look at faces that adults find attractive, suggesting a biological basis for some face preferences. However, the basis for infant preferences is not known. Adults find average and symmetric faces attractive. We examined whether 5-8-month-old infants discriminate between different levels of averageness and symmetry in faces, and whether they prefer to look at faces with higher levels of these traits. Each infant saw 24 pairs of female faces. Each pair consisted of two versions of the same face differing either in averageness (12 pairs) or symmetry (12 pairs). Data from the mothers confirmed that adults preferred the more average and more symmetric versions in each pair. The infants were sensitive to differences in both averageness and symmetry, but showed no looking preference for the more average or more symmetric versions. On the contrary, longest looks were significantly longer for the less average versions, and both longest looks and first looks were marginally longer for the less symmetric versions. Mean looking times were also longer for the less average and less symmetric versions, but those differences were not significant. We suggest that the infant looking behaviour may reflect a novelty preference rather than an aesthetic preference.

  20. Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container

    Science.gov (United States)

    Qin, Yi; Wang, Zhipeng; Wang, Hongjuan; Gong, Qiong; Zhou, Nanrun

    2018-06-01

    The diffractive-imaging-based encryption (DIBE) scheme has aroused wide interesting due to its compact architecture and low requirement of conditions. Nevertheless, the primary information can hardly be recovered exactly in the real applications when considering the speckle noise and potential occlusion imposed on the ciphertext. To deal with this issue, the customized data container (CDC) into DIBE is introduced and a new phase retrieval algorithm (PRA) for plaintext retrieval is proposed. The PRA, designed according to the peculiarity of the CDC, combines two key techniques from previous approaches, i.e., input-support-constraint and median-filtering. The proposed scheme can guarantee totally the reconstruction of the primary information despite heavy noise or occlusion and its effectiveness and feasibility have been demonstrated with simulation results.

  1. Faithful One-way Trip Deterministic Secure Quantum Communication Scheme Against Collective Rotating Noise Based on Order Rearrangement of Photon Pairs

    Science.gov (United States)

    Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong

    2014-08-01

    We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.

  2. Method and program for decay scheme reconstruction based on formal logical analysis of gamma-gamma coincidence matrix

    International Nuclear Information System (INIS)

    Adam, J.; Tsupko-Sitnikov, V.M.

    1996-01-01

    A new, rigorously substantiated approach to construction of decay schemes on the basis of γ-γ coincidence data is described. Complete decay modes (concrete cascades of transitions from excited to the ground-state of a nucleus excited in a decay or a reaction) and continuity regions in complete modes (regions of successive transitions) are isolated by logical operations with rows (columns) of a symmetrical coincidence matrix where rows (columns) correspond to energies of coinciding transitions and matrix elements are unities and zeros, depending on the presence or absence of the given coincidence. To reject false complete modes and continuity regions arising from incompleteness of the coincidence data and errors in them, energy selection is introduced for complete modes and continuity regions, which demands that total energy of their constituent transitions should be equal to total energy of some other complete modes and continuity regions and to the energies of singles. With the continuity regions found, it is possible to order transitions in the selected complete modes and to algorithmize matching of complete modes into a decay scheme. 10 refs., 3 figs

  3. The 1/ N Expansion of Tensor Models with Two Symmetric Tensors

    Science.gov (United States)

    Gurau, Razvan

    2018-06-01

    It is well known that tensor models for a tensor with no symmetry admit a 1/ N expansion dominated by melonic graphs. This result relies crucially on identifying jackets, which are globally defined ribbon graphs embedded in the tensor graph. In contrast, no result of this kind has so far been established for symmetric tensors because global jackets do not exist. In this paper we introduce a new approach to the 1/ N expansion in tensor models adapted to symmetric tensors. In particular we do not use any global structure like the jackets. We prove that, for any rank D, a tensor model with two symmetric tensors and interactions the complete graph K D+1 admits a 1/ N expansion dominated by melonic graphs.

  4. A new channel allocation scheme and performance optimizing for mobile multimedia wireless networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Fang-ming; JIANG Ling-ge; MA Ming-da

    2008-01-01

    A multimedia channel allocation scheme is proposed and studied in terms of the connection-level QoS. A new traffic model based on multidimensional Markov chain is developed considering the traffic charac-teristic of two special periods of time. And the pre-emptive priority strategies are used to classify real-time serv-ices and non-real-time services. Real-time service is given higher priority for its allowance to pre-empt channels used by non-real-time service. Considering the mobility of persons in a day, which affects the mobile user's den-sity, the simulation was conducted involving the two pre-emptive priority strategies. The result of some compari-sons shows the feasibility of the proposed scheme.

  5. Elastic-plastic analysis of an axi-symmetric problem by a finite element method

    International Nuclear Information System (INIS)

    Isozaki, Toshikuni

    1984-06-01

    Generally speaking, many structures are designed and fabricated on the basis of an axi-symmetric structure. Finite Element Method is the capable method to solve these axi-symmetric problems beyond the elastic limit. As the first step to solve these problems, the computer program for the elastic-plastic analysis of the axi-symmetric problem is composed. The basic program is based upon that described in Zienkiewicz's text book to solve the elastic plane stress problem, taking the plastic stress matrix by Yamada's method into consideration and it is converted to solve the axi-symmetric problem. For the verification of the program, the plane strain problem of a cylindrical tube under internal pressure was solved. The computed results were compared with those shown in ADINA's user's manual. They showed close agreement. (author)

  6. Faithful Controlled Teleportation of an Arbitrary Unknown Two-Atom State via Special W-States and QED Cavity

    International Nuclear Information System (INIS)

    Wang Yahong; Song Heshan; Yu Changshui

    2008-01-01

    A scheme is proposed for the controlled teleportation of an arbitrary two-atom state via special W-type entangled states and QED cavity. The scheme does not involve the direct joint Bell-state-measurement (BSM). We show that the quantum information is split into two parts, thus the original atomic state cannot be perfectly restored by the receiver without the other agent's collaboration and classical communication. In addition, the physical realization of this scheme is not difficult

  7. Symmetric bends how to join two lengths of cord

    CERN Document Server

    Miles, Roger E

    1995-01-01

    A bend is a knot securely joining together two lengths of cord (or string or rope), thereby yielding a single longer length. There are many possible different bends, and a natural question that has probably occurred to many is: "Is there a 'best' bend and, if so, what is it?"Most of the well-known bends happen to be symmetric - that is, the two constituent cords within the bend have the same geometric shape and size, and interrelationship with the other. Such 'symmetric bends' have great beauty, especially when the two cords bear different colours. Moreover, they have the practical advantage o

  8. Characterization of Generalized Young Measures Generated by Symmetric Gradients

    Science.gov (United States)

    De Philippis, Guido; Rindler, Filip

    2017-06-01

    This work establishes a characterization theorem for (generalized) Young measures generated by symmetric derivatives of functions of bounded deformation (BD) in the spirit of the classical Kinderlehrer-Pedregal theorem. Our result places such Young measures in duality with symmetric-quasiconvex functions with linear growth. The "local" proof strategy combines blow-up arguments with the singular structure theorem in BD (the analogue of Alberti's rank-one theorem in BV), which was recently proved by the authors. As an application of our characterization theorem we show how an atomic part in a BD-Young measure can be split off in generating sequences.

  9. Supersymmetry and cotangent bundle over non-compact exceptional Hermitian symmetric space

    International Nuclear Information System (INIS)

    Arai, Masato; Baba, Kurando

    2015-01-01

    We construct N=2 supersymmetric nonlinear sigma models on the cotangent bundles over the non-compact exceptional Hermitian symmetric spaces M=E 6(−14) /SO(10)×U(1) and E 7(−25) /E 6 ×U(1). In order to construct them we use the projective superspace formalism which is an N=2 off-shell superfield formulation in four-dimensional space-time. This formalism allows us to obtain the explicit expression of N=2 supersymmetric nonlinear sigma models on the cotangent bundles over any Hermitian symmetric spaces in terms of the N=1 superfields, once the Kähler potentials of the base manifolds are obtained. We derive the N=1 supersymmetric nonlinear sigma models on the Kähler manifolds M. Then we extend them into the N=2 supersymmetric models with the use of the result in arXiv:1211.1537 developed in the projective superspace formalism. The resultant models are the N=2 supersymmetric nonlinear sigma models on the cotangent bundles over the Hermitian symmetric spaces M. In this work we complete constructing the cotangent bundles over all the compact and non-compact Hermitian symmetric spaces.

  10. Parametric amplification and bidirectional invisibility in PT -symmetric time-Floquet systems

    Science.gov (United States)

    Koutserimpas, Theodoros T.; Alù, Andrea; Fleury, Romain

    2018-01-01

    Parity-time (PT )-symmetric wave devices, which exploit balanced interactions between material gain and loss, exhibit extraordinary properties, including lasing and flux-conserving scattering processes. In a seemingly different research field, periodically driven systems, also known as time-Floquet systems, have been widely studied as a relevant platform for reconfigurable active wave control and manipulation. In this article, we explore the connection between PT -symmetry and parametric time-Floquet systems. Instead of relying on material gain, we use parametric amplification by considering a time-periodic modulation of the refractive index at a frequency equal to twice the incident signal frequency. We show that the scattering from a simple parametric slab, whose dynamics follows the Mathieu equation, can be described by a PT -symmetric scattering matrix, whose PT -breaking threshold corresponds to the Mathieu instability threshold. By combining different parametric slabs modulated out of phase, we create PT -symmetric time-Floquet systems that feature exceptional scattering properties, such as coherent perfect absorption (CPA)-laser operation and bidirectional invisibility. These bidirectional properties, rare for regular PT -symmetric systems, are related to a compensation of parametric amplification due to multiple scattering between two parametric systems modulated with a phase difference.

  11. Factored Facade Acquisition using Symmetric Line Arrangements

    KAUST Repository

    Ceylan, Duygu

    2012-05-01

    We introduce a novel framework for image-based 3D reconstruction of urban buildings based on symmetry priors. Starting from image-level edges, we generate a sparse and approximate set of consistent 3D lines. These lines are then used to simultaneously detect symmetric line arrangements while refining the estimated 3D model. Operating both on 2D image data and intermediate 3D feature representations, we perform iterative feature consolidation and effective outlier pruning, thus eliminating reconstruction artifacts arising from ambiguous or wrong stereo matches. We exploit non-local coherence of symmetric elements to generate precise model reconstructions, even in the presence of a significant amount of outlier image-edges arising from reflections, shadows, outlier objects, etc. We evaluate our algorithm on several challenging test scenarios, both synthetic and real. Beyond reconstruction, the extracted symmetry patterns are useful towards interactive and intuitive model manipulations.

  12. Complex group algebras of the double covers of the symmetric and alternating group

    DEFF Research Database (Denmark)

    Bessenrodt, Christine; Nguyen, Hung Ngoc; Olsson, Jørn Børling

    2015-01-01

    We prove that the double covers of the alternating and symmetric groups are determined by their complex group algebras......We prove that the double covers of the alternating and symmetric groups are determined by their complex group algebras...

  13. Exotic fermions in the left-right symmetric model

    International Nuclear Information System (INIS)

    Choi, J.; Volkas, R.R.

    1992-01-01

    A systematic study is made of non-standard fermion multiplets in left-right symmetric models with gauge group SU(3) x SU(2) L x SU(2) R x U(1) BL . Constraints from gauge anomaly cancellation and invariance of Yukawa coupling terms are used to define interesting classes of exotic fermions. The standard quark lepton spectrum of left-right symmetric models was identified as the simplest member of an infinite class. Phenomenological implications of the next simplest member of this class are then studied. Classes of exotic fermions which may couple to the standard fermions through doublet Higgs bosons were also considered, then shown that some of these exotics may be used to induce a generalised universal see-saw mechanism. 12 refs., 1 tab

  14. The Higgs--physical and number theoretical arguments for the necessity of a triple elementary particle in super symmetric spacetime

    International Nuclear Information System (INIS)

    El Naschie, M.S.

    2004-01-01

    A careful counting routine of all experimentally confirmed elementary particles plus the theoretically conjectured ones needed for a sound formulation of a mathematically consistent field theory is undertaken within a minimal N=1 super symmetric extension of the standard model of high energy physics. The number arrived at is subsequently linked to certain massless on shell representations connected to the quantized gravity interaction. Finally with the help of number theoretical arguments arising from a rigorous application of the formalism of transfinite Heterotic super string and E-infinity theory, we show that the proposed scheme would lack mathematical consistency and elegant simplicity unless we retain a postulated triplet which is logically identified as the H + , H - and H 0 Higgs particles. Connections to the 11 dimensional M theory and Harari's extended 'sub-quarks' theory is also discussed

  15. Pseudo-Hermitian description of PT-symmetric systems defined on a complex contour

    International Nuclear Information System (INIS)

    Mostafazadeh, Ali

    2005-01-01

    We describe a method that allows for a practical application of the theory of pseudo-Hermitian operators to PT-symmetric systems defined on a complex contour. We apply this method to study the Hamiltonians H = p 2 + x 2 (ix) ν with ν ε (-2, ∞) that are defined along the corresponding anti-Stokes lines. In particular, we reveal the intrinsic non-Hermiticity of H for the cases that ν is an even integer, so that H p 2 ± x 2+ν , and give a proof of the discreteness of the spectrum of H for all ν ε (-2, ∞). Furthermore, we study the consequences of defining a square-well Hamiltonian on a wedge-shaped complex contour. This yields a PT-symmetric system with a finite number of real eigenvalues. We present a comprehensive analysis of this system within the framework of pseudo-Hermitian quantum mechanics. We also outline a direct pseudo-Hermitian treatment of PT-symmetric systems defined on a complex contour which clarifies the underlying mathematical structure of the formulation of PT-symmetric quantum mechanics based on the charge-conjugation operator. Our results provide conclusive evidence that pseudo-Hermitian quantum mechanics provides a complete description of general PT-symmetric systems regardless of whether they are defined along the real line or a complex contour

  16. Tourist Demand Reactions: Symmetric or Asymmetric across the Business Cycle?

    Science.gov (United States)

    Bronner, Fred; de Hoog, Robert

    2017-09-01

    Economizing and spending priorities on different types of vacations are investigated during two periods: an economic downturn and returning prosperity. Two nation-wide samples of vacationers are used: one during a downturn, the other one at the start of the recovery period. Through comparing the results, conclusions can be drawn about symmetric or asymmetric tourist demand across the business cycle. The main summer holiday has an asymmetric profile: being fairly crisis-resistant during a recession and showing considerable growth during an expansion. This does not apply to short vacations and day trips, each having a symmetric profile: during a recession they experience substantial reductions and during expansion comparable growth. So when talking about tourist demand in general , one cannot say that it is symmetric or asymmetric across the business cycle: it depends on the type of vacation. Differences in tourist demand are best explained by the role of Quality-of-Life for vacationers.

  17. Phase behaviour of the symmetric binary mixture from thermodynamic perturbation theory.

    Science.gov (United States)

    Dorsaz, N; Foffi, G

    2010-03-17

    We study the phase behaviour of symmetric binary mixtures of hard core Yukawa (HCY) particles via thermodynamic perturbation theory (TPT). We show that all the topologies of phase diagram reported for the symmetric binary mixtures are correctly reproduced within the TPT approach. In a second step we use the capability of TPT to be straightforwardly extended to mixtures that are nonsymmetric in size. Starting from mixtures that belong to the different topologies of symmetric binary mixtures we investigate the effect on the phase behaviour when an asymmetry in the diameters of the two components is introduced. Interestingly, when the energy of interaction between unlike particles is weaker than the interaction between like particles, the propensity for the solution to demix is found to increase strongly with size asymmetry.

  18. [Occlusal schemes of complete dentures--a review of the literature].

    Science.gov (United States)

    Tarazi, E; Ticotsky-Zadok, N

    2007-01-01

    Occlusal scheme is defined as the form and the arrangement of the occlusal contacts in natural and artificial dentition. The choice of an occlusal scheme will determine the pattern of occlusal contacts between opposing teeth during centric relation and functional movement of the mandible. With dentures, the quantity and the intensity of these contacts determine the amount and the direction of the forces that are transmitted through the bases of the denture to the residual ridges. That is why the occlusal scheme is an important factor in the design of complete dentures. Three occlusal schemes are viewed in this review: bilateral balanced occlusion, monplane occlusion, and linear occlusion scheme. Each scheme represents a different concept of occlusion. Comparisons between these schemes are also reviewed and analyzed. The reasoning underlying the bilateral balanced occlusion scheme is that stability of the dentures is attained when bilateral contacts exist throughout all dynamic and static states of the denture during function. Anatomic teeth are used: the upper anterior teeth are set to satisfy aesthetics, and the posterior teeth are arranged in a compensatory curve and a medial curve. This scheme is adequate for well developed residual ridges, with skeletal class I relation. With highly resorbed residual ridges, the vectors of force that are transmitted through anatomic cusps will dislodge the lower denture and thus impair the comfort and efficiency of mastication experienced by the patient. In order to accommodate to the special needs posed by highly resorbed residual ridges and skeletal relations that are not class I, the monoplane scheme of occlusion was designed. This scheme consists of non anatomic (cuspless) teeth, which are set so that the anterior teeth provide the aesthetics, the premolars and the first molars are used for chewing, and the second molars do not occlude (although sometimes they are specifically used to establish bilateral contacts in lateral

  19. Fast Schemes for Computing Similarities between Gaussian HMMs and Their Applications in Texture Image Classification

    Directory of Open Access Journals (Sweden)

    Chen Ling

    2005-01-01

    Full Text Available An appropriate definition and efficient computation of similarity (or distance measures between two stochastic models are of theoretical and practical interest. In this work, a similarity measure, that is, a modified "generalized probability product kernel," of Gaussian hidden Markov models is introduced. Two efficient schemes for computing this similarity measure are presented. The first scheme adopts a forward procedure analogous to the approach commonly used in probability evaluation of observation sequences on HMMs. The second scheme is based on the specially defined similarity transition matrix of two Gaussian hidden Markov models. Two scaling procedures are also proposed to solve the out-of-precision problem in the implementation. The effectiveness of the proposed methods has been evaluated on simulated observations with predefined model parameters, and on natural texture images. Promising experimental results have been observed.

  20. The Optimal Configuration Scheme of the Virtual Power Plant Considering Benefits and Risks of Investors

    Directory of Open Access Journals (Sweden)

    Jingmin Wang

    2017-07-01

    Full Text Available A virtual power plant (VPP is a special virtual unit that integrates various distributed energy resources (DERs distributed in the generation and consumption sides. The optimal configuration scheme of the VPP needs to break the geographical restrictions to make full use of DERs, considering the uncertainties. First, the components of the DERs and the structure of the VPP are briefly introduced. Next, the cubic exponential smoothing method is adopted to predict the VPP load requirement. Finally, the optimal configuration of the DER capacities inside the VPP is calculated by using portfolio theory and genetic algorithms (GA. The results show that the configuration scheme can optimize the DER capacities considering uncertainties, guaranteeing economic benefits of investors, and fully utilizing the DERs. Therefore, this paper provides a feasible reference for the optimal configuration scheme of the VPP from the perspective of investors.

  1. Exact solutions of the spherically symmetric multidimensional ...

    African Journals Online (AJOL)

    The complete orthonormalised energy eigenfunctions and the energy eigenvalues of the spherically symmetric isotropic harmonic oscillator in N dimensions, are obtained through the methods of separation of variables. Also, the degeneracy of the energy levels are examined. KEY WORDS: - Schrödinger Equation, Isotropic ...

  2. Hardware Realization of Chaos Based Symmetric Image Encryption

    KAUST Repository

    Barakat, Mohamed L.

    2012-01-01

    This thesis presents a novel work on hardware realization of symmetric image encryption utilizing chaos based continuous systems as pseudo random number generators. Digital implementation of chaotic systems results in serious degradations

  3. Maximally Symmetric Composite Higgs Models.

    Science.gov (United States)

    Csáki, Csaba; Ma, Teng; Shu, Jing

    2017-09-29

    Maximal symmetry is a novel tool for composite pseudo Goldstone boson Higgs models: it is a remnant of an enhanced global symmetry of the composite fermion sector involving a twisting with the Higgs field. Maximal symmetry has far-reaching consequences: it ensures that the Higgs potential is finite and fully calculable, and also minimizes the tuning. We present a detailed analysis of the maximally symmetric SO(5)/SO(4) model and comment on its observational consequences.

  4. Determination of symmetrical index for 3H in river waters

    International Nuclear Information System (INIS)

    Jankovic, M.; Todorovic, D.; Jankovic, B.; Nikolic, J.; Sarap, N.

    2011-01-01

    The paper presents the results of determining the symmetric index, which describes the magnitude of the tritium content changes with time, for samples of Sava and Danube river waters and Mlaka creek water. The results cover the period from 2003 to 2008. It was shown that the value of the symmetric index is the highest for Mlaka samples, which is in accordance with the fact that in these samples the highest concentration of tritium was found in comparison with samples of the Sava and Danube. [sr

  5. A Derandomized Algorithm for RP-ADMM with Symmetric Gauss-Seidel Method

    OpenAIRE

    Xu, Jinchao; Xu, Kailai; Ye, Yinyu

    2017-01-01

    For multi-block alternating direction method of multipliers(ADMM), where the objective function can be decomposed into multiple block components, we show that with block symmetric Gauss-Seidel iteration, the algorithm will converge quickly. The method will apply a block symmetric Gauss-Seidel iteration in the primal update and a linear correction that can be derived in view of Richard iteration. We also establish the linear convergence rate for linear systems.

  6. Symmetric and asymmetric nuclear matter in the relativistic approach

    International Nuclear Information System (INIS)

    Huber, H.; Weber, F.; Weigel, M.K.

    1995-01-01

    Symmetric and asymmetric nuclear matter is studied in the framework of the relativistic Brueckner-Hartree-Fock and in the relativistic version of the so-called Λ 00 approximation. The equations are solved self-consistently in the full Dirac space, so avoiding the ambiguities in the choice of the effective scattering amplitude in matter. The calculations were performed for some modern meson-exchange potentials constructed by Brockmann and Machleidt. In some cases we used also the Groningen potentials. First, we examine the outcome for symmetric matter with respect to other calculations, which restrict themselves to positive-energy states only. The main part is devoted to the properties of asymmetric matter. In this case we obtain additionally to the good agreement with the parameters of symmetric matter, also a quite satisfactory agreement with the semiempirical macroscopic coefficients of asymmetric matter. Furthermore, we tested the assumption of a quadratic dependence of the asymmetry energy for a large range of asymmetries. Included is also the dependence of nucleon self-energies on density and neutron excess. For the purpose of comparison we discuss further the similarities and differences with relativistic Hartree and Hartree-Fock calculations and nonrelativistic Skyrme calculations

  7. Neutrinoless double-beta decay in left-right symmetric models

    International Nuclear Information System (INIS)

    Picciotto, C.E.; Zahir, M.S.

    1982-06-01

    Neutrinoless double-beta decay is calculated via doubly charged Higgs, which occur naturally in left-right symmetric models. We find that the comparison with known half-lives yields values of phenomenological parameters which are compatible with earlier analyses of neutral current data. In particular, we obtain a right-handed gauge-boson mass lower bound of the order of 240 GeV. Using this result and expressions for neutrino masses derived in a parity non-conserving left-right symmetric model, we obtain msub(νsub(e)) < 1.5 eV, msub(νsub(μ)) < 0.05 MeV and msub(νsub(tau)) < 18 MeV

  8. Variational and perturbative schemes for a spiked harmonic oscillator

    International Nuclear Information System (INIS)

    Aguilera-Navarro, V.C.; Estevez, G.A.; Guardiola, R.

    1989-01-01

    A variational analysis of the spiked harmonic-oscillator Hamiltonian operator -d 2 /dx 2 + x 2 + l(l+1)/x 2 + λ |x| -α , where α is a real positive parameter, is reported in this work. The formalism makes use of the functional space spanned by the solutions of the Schroedinger equation for the linear harmonic-oscillator Hamiltonian supplemented by a Dirichlet boundary condition, and a standard procedure for diagonalizing symmetric matrices. The eigenvalues obtained by increasing the dimension of the basis set provides accurate approximations for the ground-state energy of the model system, valid for positive and relatively large values of the coupling parameter λ. Additionally, a large-coupling pertubative-expansion is carried out and the contributions up to fourth order to the ground-state energy are explicitly evaluated. Numerical results are compared for the special case α=5/2. (author) [pt

  9. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  10. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  11. Long, partial-short, and special conformal fields

    Energy Technology Data Exchange (ETDEWEB)

    Metsaev, R.R. [Department of Theoretical Physics, P.N. Lebedev Physical Institute,Leninsky prospect 53, Moscow 119991 (Russian Federation)

    2016-05-17

    In the framework of metric-like approach, totally symmetric arbitrary spin bosonic conformal fields propagating in flat space-time are studied. Depending on the values of conformal dimension, spin, and dimension of space-time, we classify all conformal field as long, partial-short, short, and special conformal fields. An ordinary-derivative (second-derivative) Lagrangian formulation for such conformal fields is obtained. The ordinary-derivative Lagrangian formulation is realized by using double-traceless gauge fields, Stueckelberg fields, and auxiliary fields. Gauge-fixed Lagrangian invariant under global BRST transformations is obtained. The gauge-fixed BRST Lagrangian is used for the computation of partition functions for all conformal fields. Using the result for the partition functions, numbers of propagating D.o.F for the conformal fields are also found.

  12. Symmetric configurations highlighted by collective quantum coherence

    Energy Technology Data Exchange (ETDEWEB)

    Obster, Dennis [Radboud University, Institute for Mathematics, Astrophysics and Particle Physics, Nijmegen (Netherlands); Kyoto University, Yukawa Institute for Theoretical Physics, Kyoto (Japan); Sasakura, Naoki [Kyoto University, Yukawa Institute for Theoretical Physics, Kyoto (Japan)

    2017-11-15

    Recent developments in quantum gravity have shown the Lorentzian treatment to be a fruitful approach towards the emergence of macroscopic space-times. In this paper, we discuss another related aspect of the Lorentzian treatment: we argue that collective quantum coherence may provide a simple mechanism for highlighting symmetric configurations over generic non-symmetric ones. After presenting the general framework of the mechanism, we show the phenomenon in some concrete simple examples in the randomly connected tensor network, which is tightly related to a certain model of quantum gravity, i.e., the canonical tensor model. We find large peaks at configurations invariant under Lie-group symmetries as well as a preference for charge quantization, even in the Abelian case. In future study, this simple mechanism may provide a way to analyze the emergence of macroscopic space-times with global symmetries as well as various other symmetries existing in nature, which are usually postulated. (orig.)

  13. Hardware Realization of Chaos-based Symmetric Video Encryption

    KAUST Repository

    Ibrahim, Mohamad A.

    2013-01-01

    This thesis reports original work on hardware realization of symmetric video encryption using chaos-based continuous systems as pseudo-random number generators. The thesis also presents some of the serious degradations caused by digitally

  14. Implicit unified gas-kinetic scheme for steady state solutions in all flow regimes

    Science.gov (United States)

    Zhu, Yajun; Zhong, Chengwen; Xu, Kun

    2016-06-01

    This paper presents an implicit unified gas-kinetic scheme (UGKS) for non-equilibrium steady state flow computation. The UGKS is a direct modeling method for flow simulation in all regimes with the updates of both macroscopic flow variables and microscopic gas distribution function. By solving the macroscopic equations implicitly, a predicted equilibrium state can be obtained first through iterations. With the newly predicted equilibrium state, the evolution equation of the gas distribution function and the corresponding collision term can be discretized in a fully implicit way for fast convergence through iterations as well. The lower-upper symmetric Gauss-Seidel (LU-SGS) factorization method is implemented to solve both macroscopic and microscopic equations, which improves the efficiency of the scheme. Since the UGKS is a direct modeling method and its physical solution depends on the mesh resolution and the local time step, a physical time step needs to be fixed before using an implicit iterative technique with a pseudo-time marching step. Therefore, the physical time step in the current implicit scheme is determined by the same way as that in the explicit UGKS for capturing the physical solution in all flow regimes, but the convergence to a steady state speeds up through the adoption of a numerical time step with large CFL number. Many numerical test cases in different flow regimes from low speed to hypersonic ones, such as the Couette flow, cavity flow, and the flow passing over a cylinder, are computed to validate the current implicit method. The overall efficiency of the implicit UGKS can be improved by one or two orders of magnitude in comparison with the explicit one.

  15. Renormalization of period doubling in symmetric four-dimensional volume-preserving maps

    International Nuclear Information System (INIS)

    Mao, J.; Greene, J.M.

    1987-01-01

    We have determined three maps (truncated at quadratic terms) that are fixed under the renormalization operator of pitchfork period doubling in symmetric four-dimensional volume-preserving maps. Each of these contains the previously known two-dimensional area-preserving map that is fixed under the period-doubling operator. One of these three fixed maps consists of two uncoupled two-dimensional (nonlinear) area-preserving fixed maps. The other two contain also the two-dimensional area-preserving fixed map coupled (in general) with a linear two-dimensional map. The renormalization calculation recovers all numerical results for the pitchfork period doubling in the symmetric four-dimensional volume-preserving maps, reported by Mao and Helleman [Phys. Rev. A 35, 1847 (1987)]. For a large class of nonsymmetric four-dimensional volume-preserving maps, we found that the fixed maps are the same as those for the symmetric maps

  16. Knowledge and uptake of community-based health insurance scheme among residents of Olowora, Lagos

    Directory of Open Access Journals (Sweden)

    O A Ibukun

    2013-01-01

    Full Text Available Background and Objective: The informal sector population in developing nations has low health coverage from Community Based Health Insurance (CBHI and problems such as limited awareness about the potential impact of prepayment health financing and the limited resources to finance health care can impede success. This study assessed the community based health insurance scheme uptake and determinants in Olowora, Lagos State. Methods: This was a descriptive cross sectional study carried out in July 2010 in all households of 12 out of 41 streets in Olowora,by multistage sampling. Four hundred and sixteen interviewer-administered questionnaires were completed and returned. Analysis was by Epi- info version 3.5.1 software. Results: Although 75.5% of respondents were aware of the Community Health Insurance scheme at Olowora, just about half (49.5% of them had good knowledge of the scheme. A substantial proportion (44.2% of respondents did not believe in contributing money for illness yet to come, and majority (72.3% of such respondents prefers payment for health care when ill. While about half (53% of respondentshad enrolled into the community health insurance scheme, 45.6% of those who had not enrolled were not aware of the scheme. Lack of money was the main reason (51.5% why some enrollees had defaulted. Conclusion: The study identified information gaps and poor understanding of the scheme as well as poverty as factors that have negatively affected uptake. The scheme management has to re-evaluate its sensitization programmes, and also strengthen marketing strategies with special emphasis on the poor.

  17. An open-chain imaginary-time path-integral sampling approach to the calculation of approximate symmetrized quantum time correlation functions

    Science.gov (United States)

    Cendagorta, Joseph R.; Bačić, Zlatko; Tuckerman, Mark E.

    2018-03-01

    We introduce a scheme for approximating quantum time correlation functions numerically within the Feynman path integral formulation. Starting with the symmetrized version of the correlation function expressed as a discretized path integral, we introduce a change of integration variables often used in the derivation of trajectory-based semiclassical methods. In particular, we transform to sum and difference variables between forward and backward complex-time propagation paths. Once the transformation is performed, the potential energy is expanded in powers of the difference variables, which allows us to perform the integrals over these variables analytically. The manner in which this procedure is carried out results in an open-chain path integral (in the remaining sum variables) with a modified potential that is evaluated using imaginary-time path-integral sampling rather than requiring the generation of a large ensemble of trajectories. Consequently, any number of path integral sampling schemes can be employed to compute the remaining path integral, including Monte Carlo, path-integral molecular dynamics, or enhanced path-integral molecular dynamics. We believe that this approach constitutes a different perspective in semiclassical-type approximations to quantum time correlation functions. Importantly, we argue that our approximation can be systematically improved within a cumulant expansion formalism. We test this approximation on a set of one-dimensional problems that are commonly used to benchmark approximate quantum dynamical schemes. We show that the method is at least as accurate as the popular ring-polymer molecular dynamics technique and linearized semiclassical initial value representation for correlation functions of linear operators in most of these examples and improves the accuracy of correlation functions of nonlinear operators.

  18. An open-chain imaginary-time path-integral sampling approach to the calculation of approximate symmetrized quantum time correlation functions.

    Science.gov (United States)

    Cendagorta, Joseph R; Bačić, Zlatko; Tuckerman, Mark E

    2018-03-14

    We introduce a scheme for approximating quantum time correlation functions numerically within the Feynman path integral formulation. Starting with the symmetrized version of the correlation function expressed as a discretized path integral, we introduce a change of integration variables often used in the derivation of trajectory-based semiclassical methods. In particular, we transform to sum and difference variables between forward and backward complex-time propagation paths. Once the transformation is performed, the potential energy is expanded in powers of the difference variables, which allows us to perform the integrals over these variables analytically. The manner in which this procedure is carried out results in an open-chain path integral (in the remaining sum variables) with a modified potential that is evaluated using imaginary-time path-integral sampling rather than requiring the generation of a large ensemble of trajectories. Consequently, any number of path integral sampling schemes can be employed to compute the remaining path integral, including Monte Carlo, path-integral molecular dynamics, or enhanced path-integral molecular dynamics. We believe that this approach constitutes a different perspective in semiclassical-type approximations to quantum time correlation functions. Importantly, we argue that our approximation can be systematically improved within a cumulant expansion formalism. We test this approximation on a set of one-dimensional problems that are commonly used to benchmark approximate quantum dynamical schemes. We show that the method is at least as accurate as the popular ring-polymer molecular dynamics technique and linearized semiclassical initial value representation for correlation functions of linear operators in most of these examples and improves the accuracy of correlation functions of nonlinear operators.

  19. On the Effectiveness of Wastewater Cylindrical Reactors: an Analysis Through Steiner Symmetrization

    Science.gov (United States)

    Díaz, J. I.; Gómez-Castro, D.

    2016-03-01

    The mathematical analysis of the shape of chemical reactors is studied in this paper through the research of the optimization of its effectiveness η such as introduced by R. Aris around 1960. Although our main motivation is the consideration of reactors specially designed for the treatment of wastewaters our results are relevant also in more general frameworks. We simplify the modeling by assuming a single chemical reaction with a monotone kinetics leading to a parabolic equation with a non-necessarily differentiable function. In fact we consider here the case of a single, non-reversible catalysis reaction of chemical order q, 00). We assume the chemical reactor of cylindrical shape Ω =G× (0,H) with G and open regular set of {R}2 not necessarily symmetric. We show that among all the sections G with prescribed area the ball is the set of lowest effectiveness η (t,G). The proof uses the notions of Steiner rearrangement. Finally, we show that if the height H is small enough then the effectiveness can be made as close to 1 as desired.

  20. Determination of dosimetric parameters of Asymmetric fields from those of Symmetric fields for equinox 100 Cobalt-60 teletherapy machine

    International Nuclear Information System (INIS)

    Mensah, K.

    2014-07-01

    time calculatons, the existing beam data for symmetry PDD is maintained since the symmetry and asymmetry beam PDDs were close and the deviations among them were within the tolerance level for absorbed dose determination in the AAPM quality control report which is 3%; but the output factors had a greater deviation among the symmetry and asymmetry beams and so the beam data for symmetry output factors are converted by multiplying it by the off-axis ratio to determine the asymmetric output factor. The TPS used the same beam data used to model symmetric beams to model the asymmetric beams without special correction factors or additional measurements for off axis fields. This allowed the Prowess Panthers TPS to calculate dose distribution in asymmetric fields to the same degree of accuracy as for symmetric fields. (au)

  1. Efficient hybrid non-equilibrium molecular dynamics--Monte Carlo simulations with symmetric momentum reversal.

    Science.gov (United States)

    Chen, Yunjie; Roux, Benoît

    2014-09-21

    Hybrid schemes combining the strength of molecular dynamics (MD) and Metropolis Monte Carlo (MC) offer a promising avenue to improve the sampling efficiency of computer simulations of complex systems. A number of recently proposed hybrid methods consider new configurations generated by driving the system via a non-equilibrium MD (neMD) trajectory, which are subsequently treated as putative candidates for Metropolis MC acceptance or rejection. To obey microscopic detailed balance, it is necessary to alter the momentum of the system at the beginning and/or the end of the neMD trajectory. This strict rule then guarantees that the random walk in configurational space generated by such hybrid neMD-MC algorithm will yield the proper equilibrium Boltzmann distribution. While a number of different constructs are possible, the most commonly used prescription has been to simply reverse the momenta of all the particles at the end of the neMD trajectory ("one-end momentum reversal"). Surprisingly, it is shown here that the choice of momentum reversal prescription can have a considerable effect on the rate of convergence of the hybrid neMD-MC algorithm, with the simple one-end momentum reversal encountering particularly acute problems. In these neMD-MC simulations, different regions of configurational space end up being essentially isolated from one another due to a very small transition rate between regions. In the worst-case scenario, it is almost as if the configurational space does not constitute a single communicating class that can be sampled efficiently by the algorithm, and extremely long neMD-MC simulations are needed to obtain proper equilibrium probability distributions. To address this issue, a novel momentum reversal prescription, symmetrized with respect to both the beginning and the end of the neMD trajectory ("symmetric two-ends momentum reversal"), is introduced. Illustrative simulations demonstrate that the hybrid neMD-MC algorithm robustly yields a correct

  2. Efficient hybrid non-equilibrium molecular dynamics - Monte Carlo simulations with symmetric momentum reversal

    Science.gov (United States)

    Chen, Yunjie; Roux, Benoît

    2014-09-01

    Hybrid schemes combining the strength of molecular dynamics (MD) and Metropolis Monte Carlo (MC) offer a promising avenue to improve the sampling efficiency of computer simulations of complex systems. A number of recently proposed hybrid methods consider new configurations generated by driving the system via a non-equilibrium MD (neMD) trajectory, which are subsequently treated as putative candidates for Metropolis MC acceptance or rejection. To obey microscopic detailed balance, it is necessary to alter the momentum of the system at the beginning and/or the end of the neMD trajectory. This strict rule then guarantees that the random walk in configurational space generated by such hybrid neMD-MC algorithm will yield the proper equilibrium Boltzmann distribution. While a number of different constructs are possible, the most commonly used prescription has been to simply reverse the momenta of all the particles at the end of the neMD trajectory ("one-end momentum reversal"). Surprisingly, it is shown here that the choice of momentum reversal prescription can have a considerable effect on the rate of convergence of the hybrid neMD-MC algorithm, with the simple one-end momentum reversal encountering particularly acute problems. In these neMD-MC simulations, different regions of configurational space end up being essentially isolated from one another due to a very small transition rate between regions. In the worst-case scenario, it is almost as if the configurational space does not constitute a single communicating class that can be sampled efficiently by the algorithm, and extremely long neMD-MC simulations are needed to obtain proper equilibrium probability distributions. To address this issue, a novel momentum reversal prescription, symmetrized with respect to both the beginning and the end of the neMD trajectory ("symmetric two-ends momentum reversal"), is introduced. Illustrative simulations demonstrate that the hybrid neMD-MC algorithm robustly yields a correct

  3. Experimental technique of calibration of symmetrical air pollution ...

    Indian Academy of Sciences (India)

    Based on the inherent property of symmetry of air pollution models, a Symmetrical Air Pollution. Model ... process is in compliance with air pollution regula- ..... Ground simulation is achieved through MATLAB package which is based on least-.

  4. An iteration for indefinite and non-symmetric systems and its application to the Navier-Stokes equations

    Energy Technology Data Exchange (ETDEWEB)

    Wathen, A. [Oxford Univ. (United Kingdom); Golub, G. [Stanford Univ., CA (United States)

    1996-12-31

    A simple fixed point linearisation of the Navier-Stokes equations leads to the Oseen problem which after appropriate discretisation yields large sparse linear systems with coefficient matrices of the form (A B{sup T} B -C). Here A is non-symmetric but its symmetric part is positive definite, and C is symmetric and positive semi-definite. Such systems arise in other situations. In this talk we will describe and present some analysis for an iteration based on an indefinite and symmetric preconditioner of the form (D B{sup T} B -C).

  5. M-estimator for the 3D symmetric Helmert coordinate transformation

    Science.gov (United States)

    Chang, Guobin; Xu, Tianhe; Wang, Qianxin

    2018-01-01

    The M-estimator for the 3D symmetric Helmert coordinate transformation problem is developed. Small-angle rotation assumption is abandoned. The direction cosine matrix or the quaternion is used to represent the rotation. The 3 × 1 multiplicative error vector is defined to represent the rotation estimation error. An analytical solution can be employed to provide the initial approximate for iteration, if the outliers are not large. The iteration is carried out using the iterative reweighted least-squares scheme. In each iteration after the first one, the measurement equation is linearized using the available parameter estimates, the reweighting matrix is constructed using the residuals obtained in the previous iteration, and then the parameter estimates with their variance-covariance matrix are calculated. The influence functions of a single pseudo-measurement on the least-squares estimator and on the M-estimator are derived to theoretically show the robustness. In the solution process, the parameter is rescaled in order to improve the numerical stability. Monte Carlo experiments are conducted to check the developed method. Different cases to investigate whether the assumed stochastic model is correct are considered. The results with the simulated data slightly deviating from the true model are used to show the developed method's statistical efficacy at the assumed stochastic model, its robustness against the deviations from the assumed stochastic model, and the validity of the estimated variance-covariance matrix no matter whether the assumed stochastic model is correct or not.

  6. Focusing optical waves with a rotationally symmetric sharp-edge aperture

    Science.gov (United States)

    Hu, Yanwen; Fu, Shenhe; Li, Zhen; Yin, Hao; Zhou, Jianying; Chen, Zhenqiang

    2018-04-01

    While there has been various kinds of patterned structures proposed for wave focusing, these patterned structures usually involve complicated lithographic techniques since the element size of the patterned structures should be precisely controlled in microscale or even nanoscale. Here we propose a new and straightforward method for focusing an optical plane wave in free space with a rotationally symmetric sharp-edge aperture. The focusing phenomenon of wave is realized by superposition of a portion of the higher-order symmetric plane waves generated from the sharp edges of the apertures, in contrast to previously focusing techniques which usually depend on a curved phase. We demonstrate both experimentally and theoretically the focusing effect with a series of apertures having different rotational symmetry, and find that the intensity of the hotspots could be controlled by the symmetric strength of the sharp-edge apertures. The presented results would advance the conventional wisdom that light would diffract in all directions and become expanding when it propagates through an aperture. The proposed method is easy to be processed, and might open potential applications in interferometry, image, and superresolution.

  7. A Paley-Wiener theorem for reductive symmetric spaces

    NARCIS (Netherlands)

    Ban, E.P. van den; Schlichtkrull, H.

    2006-01-01

    Let X = G/H be a reductive symmetric space and K a maximal compact subgroup of G. The image under the Fourier transform of the space of K-finite compactly supported smooth functions on X is characterized.

  8. Symmetric and Programmable Multi-Chip Module for Low-Power Prototyping System

    OpenAIRE

    Yen, Mao-Hsu; Chen, Sao-Jie; Lan, Sanko H.

    2001-01-01

    The advantages of a Multi-Chip Module (MCM) product are its low-power and small-size. But the design of an MCM system usually requires weeks of engineering effort, thus we need a generic MCM substrate with programmable interconnections to accelerate system prototyping. In this paper, we propose a Symmetric and Programmable MCM (SPMCM) substrate for this purpose. This SPMCM substrate consists of a symmetrical array of slots for bare-chip attachment and Field Programmable Interco...

  9. Cuspidal discrete series for semisimple symmetric spaces

    DEFF Research Database (Denmark)

    Andersen, Nils Byrial; Flensted-Jensen, Mogens; Schlichtkrull, Henrik

    2012-01-01

    We propose a notion of cusp forms on semisimple symmetric spaces. We then study the real hyperbolic spaces in detail, and show that there exists both cuspidal and non-cuspidal discrete series. In particular, we show that all the spherical discrete series are non-cuspidal. (C) 2012 Elsevier Inc. All...

  10. Symmetric intersections of Rauzy fractals | Sellami | Quaestiones ...

    African Journals Online (AJOL)

    In this article we study symmetric subsets of Rauzy fractals of unimodular irreducible Pisot substitutions. The symmetry considered is re ection through the origin. Given an unimodular irreducible Pisot substitution, we consider the intersection of its Rauzy fractal with the Rauzy fractal of the reverse substitution. This set is ...

  11. Symmetrical and overloaded effect of diffusion in information filtering

    Science.gov (United States)

    Zhu, Xuzhen; Tian, Hui; Chen, Guilin; Cai, Shimin

    2017-10-01

    In physical dynamics, mass diffusion theory has been applied to design effective information filtering models on bipartite network. In previous works, researchers unilaterally believe objects' similarities are determined by single directional mass diffusion from the collected object to the uncollected, meanwhile, inadvertently ignore adverse influence of diffusion overload. It in some extent veils the essence of diffusion in physical dynamics and hurts the recommendation accuracy and diversity. After delicate investigation, we argue that symmetrical diffusion effectively discloses essence of mass diffusion, and high diffusion overload should be published. Accordingly, in this paper, we propose an symmetrical and overload penalized diffusion based model (SOPD), which shows excellent performances in extensive experiments on benchmark datasets Movielens and Netflix.

  12. Continuous symmetric reductions of the Adler-Bobenko-Suris equations

    International Nuclear Information System (INIS)

    Tsoubelis, D; Xenitidis, P

    2009-01-01

    Continuously symmetric solutions of the Adler-Bobenko-Suris class of discrete integrable equations are presented. Initially defined by their invariance under the action of both of the extended three-point generalized symmetries admitted by the corresponding equations, these solutions are shown to be determined by an integrable system of partial differential equations. The connection of this system to the Nijhoff-Hone-Joshi 'generating partial differential equations' is established and an auto-Baecklund transformation and a Lax pair for it are constructed. Applied to the H1 and Q1 δ=0 members of the Adler-Bobenko-Suris family, the method of continuously symmetric reductions yields explicit solutions determined by the Painleve trancendents

  13. Build of virtual instrument laboratory related to nuclear species specialized

    International Nuclear Information System (INIS)

    Shan Jian; Zhao Guizhi; Zhao Xiuliang; Tang Lingzhi

    2009-01-01

    As rapid development of specialized related to nuclear science,the requirement of laboratory construct is analyzed in this article at first, One total conceive, One scheme deploy soft and hardware,three concrete characteristics targets and five different phases of put in practice of virtual instrument laboratory of specialized related to nuclear science are suggest in the paper,the concrete hardware structure and the headway of build of virtual instrument laboratory are described,and the first step effect is introduced.Lastly,the forward target and the further deliberateness that the virtual instrument laboratory construct are set forth in the thesis. (authors)

  14. Symmetric functions and orthogonal polynomials

    CERN Document Server

    Macdonald, I G

    1997-01-01

    One of the most classical areas of algebra, the theory of symmetric functions and orthogonal polynomials has long been known to be connected to combinatorics, representation theory, and other branches of mathematics. Written by perhaps the most famous author on the topic, this volume explains some of the current developments regarding these connections. It is based on lectures presented by the author at Rutgers University. Specifically, he gives recent results on orthogonal polynomials associated with affine Hecke algebras, surveying the proofs of certain famous combinatorial conjectures.

  15. Baryon symmetric big-bang cosmology

    Energy Technology Data Exchange (ETDEWEB)

    Stecker, F.W.

    1978-04-01

    The framework of baryon-symmetric big-bang cosmology offers the greatest potential for deducing the evolution of the universe as a consequence of physical laws and processes with the minimum number of arbitrary assumptions as to initial conditions in the big-bang. In addition, it offers the possibility of explaining the photon-baryon ratio in the universe and how galaxies and galaxy clusters are formed, and also provides the only acceptable explanation at present for the origin of the cosmic gamma ray background radiation.

  16. Baryon symmetric big-bang cosmology

    International Nuclear Information System (INIS)

    Stecker, F.W.

    1978-04-01

    The framework of baryon-symmetric big-bang cosmology offers the greatest potential for deducing the evolution of the universe as a consequence of physical laws and processes with the minimum number of arbitrary assumptions as to initial conditions in the big-bang. In addition, it offers the possibility of explaining the photon-baryon ratio in the universe and how galaxies and galaxy clusters are formed, and also provides the only acceptable explanation at present for the origin of the cosmic gamma ray background radiation

  17. Indoor Trajectory Tracking Scheme Based on Delaunay Triangulation and Heuristic Information in Wireless Sensor Networks.

    Science.gov (United States)

    Qin, Junping; Sun, Shiwen; Deng, Qingxu; Liu, Limin; Tian, Yonghong

    2017-06-02

    Object tracking and detection is one of the most significant research areas for wireless sensor networks. Existing indoor trajectory tracking schemes in wireless sensor networks are based on continuous localization and moving object data mining. Indoor trajectory tracking based on the received signal strength indicator ( RSSI ) has received increased attention because it has low cost and requires no special infrastructure. However, RSSI tracking introduces uncertainty because of the inaccuracies of measurement instruments and the irregularities (unstable, multipath, diffraction) of wireless signal transmissions in indoor environments. Heuristic information includes some key factors for trajectory tracking procedures. This paper proposes a novel trajectory tracking scheme based on Delaunay triangulation and heuristic information (TTDH). In this scheme, the entire field is divided into a series of triangular regions. The common side of adjacent triangular regions is regarded as a regional boundary. Our scheme detects heuristic information related to a moving object's trajectory, including boundaries and triangular regions. Then, the trajectory is formed by means of a dynamic time-warping position-fingerprint-matching algorithm with heuristic information constraints. Field experiments show that the average error distance of our scheme is less than 1.5 m, and that error does not accumulate among the regions.

  18. A symmetrical treatment of bradyons and luxons by means of a non-real space

    International Nuclear Information System (INIS)

    Majernik, V.

    1983-01-01

    From the point of view of symmetry, it is interesting to note that there exist two kinds of physical particles - bradyons and luxons. In this connection the question arises whether it is not possible to treat luxons and bradyons in a symmetric way. The characteristic property of luxons is the fact that they move with the velocity of light. On the other hand, the characteristic property of bradyons is their ability to be localized. The bradyon-luxon symmetry would require such physical conditions in which luxons would behave as bradyons and bradyons as luxons. The author speculates that there exists a non-real space in addition to our real space in which bradyons would move with the velocity of light and luxons would be localized. This non-real, three-dimensional space (s-space), together with our three-dimensional real space (r-space), forms a suitable framework for the postulated bradyon-luxon symmetry. Within this framework he attempts to find the fundamental equations for bosons and fermions both in the s- and r-space, and to suggest a new hierarchy among the particles as well as a simple scheme of the fundamental physical interactions. (Auth.)

  19. Bright Solitons in a PT-Symmetric Chain of Dimers

    Directory of Open Access Journals (Sweden)

    Omar B. Kirikchi

    2016-01-01

    Full Text Available We study the existence and stability of fundamental bright discrete solitons in a parity-time- (PT- symmetric coupler composed by a chain of dimers that is modelled by linearly coupled discrete nonlinear Schrödinger equations with gain and loss terms. We use a perturbation theory for small coupling between the lattices to perform the analysis, which is then confirmed by numerical calculations. Such analysis is based on the concept of the so-called anticontinuum limit approach. We consider the fundamental onsite and intersite bright solitons. Each solution has symmetric and antisymmetric configurations between the arms. The stability of the solutions is then determined by solving the corresponding eigenvalue problem. We obtain that both symmetric and antisymmetric onsite mode can be stable for small coupling, in contrast to the reported continuum limit where the antisymmetric solutions are always unstable. The instability is either due to the internal modes crossing the origin or the appearance of a quartet of complex eigenvalues. In general, the gain-loss term can be considered parasitic as it reduces the stability region of the onsite solitons. Additionally, we analyse the dynamic behaviour of the onsite and intersite solitons when unstable, where typically it is either in the form of travelling solitons or soliton blow-ups.

  20. Application Of The Bertlmann-Martin Inequalities To Super Symmetric Partners

    International Nuclear Information System (INIS)

    IGHEZOU, F.Z.; KERRIS, A.T.; MESSAMAH, J.; LOMBARD, R.J.

    2011-01-01

    The purpose of the present study is to discuss some general aspects of the Bertlmann and Martin inequalities (BMI) in the case of the super symmetric partners. The (BMI) have been established by minoring the multipole sum rules according to a method initiated by Bertlmann and Martin. Application to different potentials and generalizations were derived and tested in various papers. We present new concepts of super symmetry in quantum mechanics (SUSYQM) and apply them to two exactly solvable potentials in the one dimensional space. We apply the (BMI) to their super symmetric partners and we examine the degree of saturation of the (BMI)

  1. Norm estimates of complex symmetric operators applied to quantum systems

    International Nuclear Information System (INIS)

    Prodan, Emil; Garcia, Stephan R; Putinar, Mihai

    2006-01-01

    This paper communicates recent results in the theory of complex symmetric operators and shows, through two non-trivial examples, their potential usefulness in the study of Schroedinger operators. In particular, we propose a formula for computing the norm of a compact complex symmetric operator. This observation is applied to two concrete problems related to quantum mechanical systems. First, we give sharp estimates on the exponential decay of the resolvent and the single-particle density matrix for Schroedinger operators with spectral gaps. Second, we provide new ways of evaluating the resolvent norm for Schroedinger operators appearing in the complex scaling theory of resonances

  2. The space-time outside a source of gravitational radiation: the axially symmetric null fluid

    Energy Technology Data Exchange (ETDEWEB)

    Herrera, L. [Universidad Central de Venezuela, Escuela de Fisica, Facultad de Ciencias, Caracas (Venezuela, Bolivarian Republic of); Universidad de Salamanca, Instituto Universitario de Fisica Fundamental y Matematicas, Salamanca (Spain); Di Prisco, A. [Universidad Central de Venezuela, Escuela de Fisica, Facultad de Ciencias, Caracas (Venezuela, Bolivarian Republic of); Ospino, J. [Universidad de Salamanca, Departamento de Matematica Aplicada and Instituto Universitario de Fisica Fundamental y Matematicas, Salamanca (Spain)

    2016-11-15

    We carry out a study of the exterior of an axially and reflection symmetric source of gravitational radiation. The exterior of such a source is filled with a null fluid produced by the dissipative processes inherent to the emission of gravitational radiation, thereby representing a generalization of the Vaidya metric for axially and reflection symmetric space-times. The role of the vorticity, and its relationship with the presence of gravitational radiation is put in evidence. The spherically symmetric case (Vaidya) is, asymptotically, recovered within the context of the 1 + 3 formalism. (orig.)

  3. The hidden symmetries and their algebraic structure of the static axially symmetric SDYM fields

    International Nuclear Information System (INIS)

    Hao Sanru

    1993-01-01

    A new explicit transformation about the static axially symmetric self-dual Yang-Mills (SDYM) fields is presented. The theory has proved that the new transformation is a symmetric one. For the two kinds of the Lie algebraic generators of the Lie group SL (N. R) /SO (N), the corresponding transformations are given. By making use of the Yang-Baxter equality and their square brackets, the loop and conformal algebraic structures of the symmetric transformations for the basic fields have been obtained. All the results obtained can be directly generalized to the other models

  4. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement

    Science.gov (United States)

    Nurdiyanto, Heri; Rahim, Robbi; Wulan, Nur

    2017-12-01

    Symmetric type cryptography algorithm is known many weaknesses in encryption process compared with asymmetric type algorithm, symmetric stream cipher are algorithm that works on XOR process between plaintext and key, to improve the security of symmetric stream cipher algorithm done improvisation by using Triple Transposition Key which developed from Transposition Cipher and also use Base64 algorithm for encryption ending process, and from experiment the ciphertext that produced good enough and very random.

  5. Large-eddy simulation/Reynolds-averaged Navier-Stokes hybrid schemes for high speed flows

    Science.gov (United States)

    Xiao, Xudong

    Three LES/RANS hybrid schemes have been proposed for the prediction of high speed separated flows. Each method couples the k-zeta (Enstrophy) BANS model with an LES subgrid scale one-equation model by using a blending function that is coordinate system independent. Two of these functions are based on turbulence dissipation length scale and grid size, while the third one has no explicit dependence on the grid. To implement the LES/RANS hybrid schemes, a new rescaling-reintroducing method is used to generate time-dependent turbulent inflow conditions. The hybrid schemes have been tested on a Mach 2.88 flow over 25 degree compression-expansion ramp and a Mach 2.79 flow over 20 degree compression ramp. A special computation procedure has been designed to prevent the separation zone from expanding upstream to the recycle-plane. The code is parallelized using Message Passing Interface (MPI) and is optimized for running on IBM-SP3 parallel machine. The scheme was validated first for a flat plate. It was shown that the blending function has to be monotonic to prevent the RANS region from appearing in the LES region. In the 25 deg ramp case, the hybrid schemes provided better agreement with experiment in the recovery region. Grid refinement studies demonstrated the importance of using a grid independent blend function and further improvement with experiment in the recovery region. In the 20 deg ramp case, with a relatively finer grid, the hybrid scheme characterized by grid independent blending function well predicted the flow field in both the separation region and the recovery region. Therefore, with "appropriately" fine grid, current hybrid schemes are promising for the simulation of shock wave/boundary layer interaction problems.

  6. Wake monochromator in asymmetric and symmetric Bragg and Laue geometry for self-seeding the European X-ray FEL

    International Nuclear Information System (INIS)

    Geloni, Gianluca; Kocharyan, Vitali; Saldin, Evgeni; Serkez, Svitozar; Tolkiehn, Martin

    2013-01-01

    We discuss the use of self-seeding schemes with wake monochromators to produce TW power, fully coherent pulses for applications at the dedicated bio-imaging beamline at the European X-ray FEL, a concept for an upgrade of the facility beyond the baseline previously proposed by the authors. We exploit the asymmetric and symmetric Bragg and Laue reflections (sigma polarization) in diamond crystal. Optimization of the bio-imaging beamline is performed with extensive start-to-end simulations, which also take into account effects such as the spatio-temporal coupling caused by the wake monochromator. The spatial shift is maximal in the range for small Bragg angles. A geometry with Bragg angles close to π/2 would be a more advantageous option from this viewpoint, albeit with decrease of the spectral tunability. We show that it will be possible to cover the photon energy range from 3 keV to 13 keV by using four different planes of the same crystal with one rotational degree of freedom.

  7. Wake monochromator in asymmetric and symmetric Bragg and Laue geometry for self-seeding the European X-ray FEL

    Energy Technology Data Exchange (ETDEWEB)

    Geloni, Gianluca [European XFEL GmbH, Hamburg (Germany); Kocharyan, Vitali; Saldin, Evgeni; Serkez, Svitozar; Tolkiehn, Martin [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2013-01-15

    We discuss the use of self-seeding schemes with wake monochromators to produce TW power, fully coherent pulses for applications at the dedicated bio-imaging beamline at the European X-ray FEL, a concept for an upgrade of the facility beyond the baseline previously proposed by the authors. We exploit the asymmetric and symmetric Bragg and Laue reflections (sigma polarization) in diamond crystal. Optimization of the bio-imaging beamline is performed with extensive start-to-end simulations, which also take into account effects such as the spatio-temporal coupling caused by the wake monochromator. The spatial shift is maximal in the range for small Bragg angles. A geometry with Bragg angles close to {pi}/2 would be a more advantageous option from this viewpoint, albeit with decrease of the spectral tunability. We show that it will be possible to cover the photon energy range from 3 keV to 13 keV by using four different planes of the same crystal with one rotational degree of freedom.

  8. The Lp Spectrum of Locally Symmetric Spaces with Small Fundamental Group

    International Nuclear Information System (INIS)

    Weber, Andreas

    2009-01-01

    We determine the L p spectrum of the Laplace-Beltrami operator on certain complete locally symmetric spaces M whose universal covering X is a symmetric space of non-compact type with rank one. More precisely, we show that the L p spectra of M and X coincide if the fundamental group of M is small and if the injectivity radius of M is bounded away from zero. In the L 2 case, the restriction on the injectivity radius is not needed

  9. Two-parametric PT-symmetric quartic family

    International Nuclear Information System (INIS)

    Eremenko, Alexandre; Gabrielov, Andrei

    2012-01-01

    We describe a parametrization of the real spectral locus of the two-parametric family of PT-symmetric quartic oscillators. For this family, we find a parameter region where all eigenvalues are real, extending the results of Dorey et al (2007 J. Phys. A: Math Theor. 40 R205–83) and Shin (2005 J. Phys. A: Math. Gen. 38 6147–66; 2002 Commun. Math. Phys. 229 543–64). (paper)

  10. SUSY formalism for the symmetric double well potential

    Indian Academy of Sciences (India)

    Using first- and second-order supersymmetric Darboüx formalism and starting with symmetric double well potential barrier we have obtained a class of exactly solvable potentials subject to moving boundary condition. The eigenstates are also obtained by the same technique.

  11. Time-invariant PT product and phase locking in PT -symmetric lattice models

    Science.gov (United States)

    Joglekar, Yogesh N.; Onanga, Franck Assogba; Harter, Andrew K.

    2018-01-01

    Over the past decade, non-Hermitian, PT -symmetric Hamiltonians have been investigated as candidates for both a fundamental, unitary, quantum theory and open systems with a nonunitary time evolution. In this paper, we investigate the implications of the former approach in the context of the latter. Motivated by the invariance of the PT (inner) product under time evolution, we discuss the dynamics of wave-function phases in a wide range of PT -symmetric lattice models. In particular, we numerically show that, starting with a random initial state, a universal, gain-site location dependent locking between wave-function phases at adjacent sites occurs in the PT -symmetry-broken region. Our results pave the way towards understanding the physically observable implications of time invariants in the nonunitary dynamics produced by PT -symmetric Hamiltonians.

  12. Mass generation for Abelian spin-1 particles via a symmetric tensor

    International Nuclear Information System (INIS)

    Dalmazi, D.; Mendonça, E.L.

    2012-01-01

    In the topologically massive BF model (TMBF) the photon becomes massive via coupling to an antisymmetric tensor, without breaking the U(1) gauge symmetry. There is no need of a Higgs field. The TMBF model is dual to a first-order (in derivatives) formulation of the Maxwell-Proca theory where the antisymmetric field plays the role of an auxiliary field. Since the Maxwell-Proca theory also admits a first-order version which makes use of an auxiliary symmetric tensor, we investigate here a possible generalization of the TMBF model where the photon acquires mass via coupling to a symmetric tensor. We show that it is indeed possible to build up dual models to the Maxwell-Proca theory where the U(1) gauge symmetry is manifest without Higgs field, but after a local field redefinition the vector field eats up the trace of the symmetric tensor and becomes massive. So the explicit U(1) symmetry can be removed unlike the TMBF model.

  13. Fourier inversion on a reductive symmetric space

    NARCIS (Netherlands)

    Ban, E.P. van den

    1999-01-01

    Let X be a semisimple symmetric space. In previous papers, [8] and [9], we have dened an explicit Fourier transform for X and shown that this transform is injective on the space C 1 c (X) ofcompactly supported smooth functions on X. In the present paper, which is a continuation of these papers, we

  14. Baryon symmetric big bang cosmology

    International Nuclear Information System (INIS)

    Stecker, F.W.

    1978-01-01

    It is stated that the framework of baryon symmetric big bang (BSBB) cosmology offers our greatest potential for deducting the evolution of the Universe because its physical laws and processes have the minimum number of arbitrary assumptions about initial conditions in the big-bang. In addition, it offers the possibility of explaining the photon-baryon ratio in the Universe and how galaxies and galaxy clusters are formed. BSBB cosmology also provides the only acceptable explanation at present for the origin of the cosmic γ-ray background radiation. (author)

  15. Symmetric lithium-ion cell based on lithium vanadium fluorophosphate with ionic liquid electrolyte

    International Nuclear Information System (INIS)

    Plashnitsa, Larisa S.; Kobayashi, Eiji; Okada, Shigeto; Yamaki, Jun-ichi

    2011-01-01

    Lithium vanadium fluorophosphate, LiVPO 4 F, was utilized as both cathode and anode for fabrication of a symmetric lithium-ion LiVPO 4 F//LiVPO 4 F cell. The electrochemical evolution of the LiVPO 4 F//LiVPO 4 F cell with the commonly used organic electrolyte LiPF 6 /EC-DMC has shown that this cell works as a secondary battery, but exhibits poor durability at room temperature and absolutely does not work at increased operating temperatures. To improve the performance and safety of this symmetric battery, we substituted a non-flammable ionic liquid (IL) LiBF 4 /EMIBF 4 electrolyte for the organic electrolyte. The symmetric battery using the IL electrolyte was examined galvanostatically at different rates and operating temperatures within the voltage range of 0.01-2.8 V. It was demonstrated that the IL-based symmetric cell worked as a secondary battery with a Coulombic efficiency of 77% at 0.1 mA cm -2 and 25 o C. It was also found that the use of the IL electrolyte instead of the organic one resulted in the general reduction of the first discharge capacity by about 20-25% but provided much more stable behavior and a longer cycle life. Moreover, an increase of the discharge capacity of the IL-based symmetric battery up to 120 mA h g -1 was observed when the operating temperature was increased up to 80 o C at 0.1 mA cm -2 . The obtained electrochemical behavior of both symmetric batteries was confirmed by complex-impedance measurements at different temperatures and cycling states. The thermal stability of LiVPO 4 F with both the IL and organic electrolytes was also examined.

  16. Conservation laws in baroclinic inertial-symmetric instabilities

    Science.gov (United States)

    Grisouard, Nicolas; Fox, Morgan B.; Nijjer, Japinder

    2017-04-01

    Submesoscale oceanic density fronts are structures in geostrophic and hydrostatic balance, but are more prone to instabilities than mesoscale flows. As a consequence, they are believed to play a large role in air-sea exchanges, near-surface turbulence and dissipation of kinetic energy of geostrophically and hydrostatically balanced flows. We will present two-dimensional (x, z) Boussinesq numerical experiments of submesoscale baroclinic fronts on the f-plane. Instabilities of the mixed inertial and symmetric types (the actual name varies across the literature) develop, with the absence of along-front variations prohibiting geostrophic baroclinic instabilities. Two new salient facts emerge. First, contrary to pure inertial and/or pure symmetric instability, the potential energy budget is affected, the mixed instability extracting significant available potential energy from the front and dissipating it locally. Second, in the submesoscale regime, the growth rate of this mixed instability is sufficiently large that significant radiation of near-inertial internal waves occurs. Although energetically small compared to e.g. local dissipation within the front, this process might be a significant source of near-inertial energy in the ocean.

  17. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  18. On some homological functors of a Bieberbach group with symmetric point group

    Science.gov (United States)

    Ting, Tan Yee; Idrus, Nor'ashiqin Mohd; Masri, Rohaidah; Ladi, Nor Fadzilah Abdul

    2017-05-01

    Bieberbach groups with symmetric point group are polycyclic. The properties of the groups can be explored by computing their homological functors. In this paper, some homological functors of a Bieberbach group with symmetric point group, such as the Schur multiplier and the G-trivial subgroup of the nonabelian tensor square, are generalized up to finite dimension and are represented in the form of direct product of cyclic groups.

  19. Information Retrieval and Criticality in Parity-Time-Symmetric Systems.

    Science.gov (United States)

    Kawabata, Kohei; Ashida, Yuto; Ueda, Masahito

    2017-11-10

    By investigating information flow between a general parity-time (PT-)symmetric non-Hermitian system and an environment, we find that the complete information retrieval from the environment can be achieved in the PT-unbroken phase, whereas no information can be retrieved in the PT-broken phase. The PT-transition point thus marks the reversible-irreversible criticality of information flow, around which many physical quantities such as the recurrence time and the distinguishability between quantum states exhibit power-law behavior. Moreover, by embedding a PT-symmetric system into a larger Hilbert space so that the entire system obeys unitary dynamics, we reveal that behind the information retrieval lies a hidden entangled partner protected by PT symmetry. Possible experimental situations are also discussed.

  20. Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing

    Energy Technology Data Exchange (ETDEWEB)

    Myhr, Geir Ove

    2010-11-08

    Just like we can divide the set of bipartite quantum states into separable states and entangled states, we can divide it into states with and without a symmetric extension. The states with a symmetric extension - which includes all the separable states - behave classically in many ways, while the states without a symmetric extension - which are all entangled - have the potential to exhibit quantum effects. The set of states with a symmetric extension is closed under local quantum operations assisted by one-way classical communication (1-LOCC) just like the set of separable states is closed under local operations assisted by two-way classical communication (LOCC). Because of this, states with a symmetric extension often play the same role in a one-way communication setting as the separable states play in a two-way communication setting. We show that any state with a symmetric extension can be decomposed into a convex combination of states that have a pure symmetric extension. A necessary condition for a state to have a pure symmetric extension is that the spectra of the local and global density matrices are equal. This condition is also sufficient for two qubits, but not for any larger systems. We present a conjectured necessary and sufficient condition for two-qubit states with a symmetric extension. Proofs are provided for some classes of states: rank-two states, states on the symmetric subspace, Bell-diagonal states and states that are invariant under S x S, where S is a phase gate. We also show how the symmetric extension problem for multi-qubit Bell-diagonal states can be simplified and the simplified problem implemented as a semidefinite program. Quantum key distribution protocols such as the six-state protocol and the BB84 protocol effectively gives Alice and Bob Bell-diagonal states that they measure in the standard basis to obtain a raw key which they may then process further to obtain a secret error-free key. When the raw key has a high error rate, the