WorldWideScience

Sample records for scheme special symmetrical

  1. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  2. Design of a polynomial ring based symmetric homomorphic encryption scheme

    Directory of Open Access Journals (Sweden)

    Smaranika Dasgupta

    2016-09-01

    Full Text Available Security of data, especially in clouds, has become immensely essential for present-day applications. Fully homomorphic encryption (FHE is a great way to secure data which is used and manipulated by untrusted applications or systems. In this paper, we propose a symmetric FHE scheme based on polynomial over ring of integers. This scheme is somewhat homomorphic due to accumulation of noise after few operations, which is made fully homomorphic using a refresh procedure. After certain amount of homomorphic computations, large ciphertexts are refreshed for proper decryption. The hardness of the scheme is based on the difficulty of factorizing large integers. Also, it requires polynomial addition which is computationally cost effective. Experimental results are shown to support our claim.

  3. An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Xiuxiu Jiang

    2017-05-01

    Full Text Available Symmetric searchable encryption for cloud storage enables users to retrieve the documents they want in a privacy-preserving way, which has become a hotspot of research. In this paper, we propose an efficient keyword search scheme over encrypted cloud data. We firstly adopt a structure named as inverted matrix (IM to build search index. The IM is consisted of index vectors, each of which is associated with a keyword. Then we map a keyword to an address used to locate the corresponding index vector. Finally, we mask index vectors with pseudo-random bits to obtain an encrypted enlarged inverted matrix (EEIM. Through the security analysis and experimental evaluation, we demonstrate the privacy and efficiency of our scheme respectively. In addition, we further consider two extended practical search situations, i.e., occurrence queries and dynamic user management, and then give two relevant schemes.

  4. A Searchable Symmetric Encryption Scheme using BlockChain

    OpenAIRE

    Li, Huige; Zhang, Fangguo; He, Jiejie; Tian, Haibo

    2017-01-01

    At present, the cloud storage used in searchable symmetric encryption schemes (SSE) is provided in a private way, which cannot be seen as a true cloud. Moreover, the cloud server is thought to be credible, because it always returns the search result to the user, even they are not correct. In order to really resist this malicious adversary and accelerate the usage of the data, it is necessary to store the data on a public chain, which can be seen as a decentralized system. As the increasing am...

  5. Quantum Communication Scheme Using Non-symmetric Quantum Channel

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Zhonghua; Song Heshan

    2008-01-01

    A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel

  6. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  7. A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System

    International Nuclear Information System (INIS)

    Zhang Xiaohong; Min Lequan

    2005-01-01

    Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decrypt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security.

  8. A symmetrical image encryption scheme in wavelet and time domain

    Science.gov (United States)

    Luo, Yuling; Du, Minghui; Liu, Junxiu

    2015-02-01

    There has been an increasing concern for effective storages and secure transactions of multimedia information over the Internet. Then a great variety of encryption schemes have been proposed to ensure the information security while transmitting, but most of current approaches are designed to diffuse the data only in spatial domain which result in reducing storage efficiency. A lightweight image encryption strategy based on chaos is proposed in this paper. The encryption process is designed in transform domain. The original image is decomposed into approximation and detail components using integer wavelet transform (IWT); then as the more important component of the image, the approximation coefficients are diffused by secret keys generated from a spatiotemporal chaotic system followed by inverse IWT to construct the diffused image; finally a plain permutation is performed for diffusion image by the Logistic mapping in order to reduce the correlation between adjacent pixels further. Experimental results and performance analysis demonstrate the proposed scheme is an efficient, secure and robust encryption mechanism and it realizes effective coding compression to satisfy desirable storage.

  9. Schur rings and non-symmetric association schemes on 64 vertices

    DEFF Research Database (Denmark)

    Jørgensen, Leif Kjær

    2010-01-01

    In this paper we enumerate essentially all non-symmetric association schemes with three classes, less than 96 vertices and with a regular group of automorphisms. The enumeration is based on a computer search in Schur rings. The most interesting cases have 64 vertices. In one primitive case and in...

  10. Linear perturbation of spherically symmetric flows: a first-order upwind scheme for the gas dynamics equations in Lagrangian coordinates

    International Nuclear Information System (INIS)

    Clarisse, J.M.

    2007-01-01

    A numerical scheme for computing linear Lagrangian perturbations of spherically symmetric flows of gas dynamics is proposed. This explicit first-order scheme uses the Roe method in Lagrangian coordinates, for computing the radial spherically symmetric mean flow, and its linearized version, for treating the three-dimensional linear perturbations. Fulfillment of the geometric conservation law discrete formulations for both the mean flow and its perturbation is ensured. This scheme capabilities are illustrated by the computation of free-surface mode evolutions at the boundaries of a spherical hollow shell undergoing an homogeneous cumulative compression, showing excellent agreement with reference results. (author)

  11. A symmetric image encryption scheme based on 3D chaotic cat maps

    International Nuclear Information System (INIS)

    Chen Guanrong; Mao Yaobin; Chui, Charles K.

    2004-01-01

    Encryption of images is different from that of texts due to some intrinsic features of images such as bulk data capacity and high redundancy, which are generally difficult to handle by traditional methods. Due to the exceptionally desirable properties of mixing and sensitivity to initial conditions and parameters of chaotic maps, chaos-based encryption has suggested a new and efficient way to deal with the intractable problem of fast and highly secure image encryption. In this paper, the two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme. This new scheme employs the 3D cat map to shuffle the positions (and, if desired, grey values as well) of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security and fast encryption speed of the new scheme

  12. Special Semaphore Scheme for UHF Spacecraft Communications

    Science.gov (United States)

    Butman, Stanley; Satorius, Edgar; Ilott, Peter

    2006-01-01

    A semaphore scheme has been devised to satisfy a requirement to enable ultrahigh- frequency (UHF) radio communication between a spacecraft descending from orbit to a landing on Mars and a spacecraft, in orbit about Mars, that relays communications between Earth and the lander spacecraft. There are also two subsidiary requirements: (1) to use UHF transceivers, built and qualified for operation aboard the spacecraft that operate with residual-carrier binary phase-shift-keying (BPSK) modulation at a selectable data rate of 8, 32, 128, or 256 kb/s; and (2) to enable low-rate signaling even when received signals become so weak as to prevent communication at the minimum BPSK rate of 8 kHz. The scheme involves exploitation of Manchester encoding, which is used in conjunction with residual-carrier modulation to aid the carrier-tracking loop. By choosing various sequences of 1s, 0s, or 1s alternating with 0s to be fed to the residual-carrier modulator, one would cause the modulator to generate sidebands at a fundamental frequency of 4 or 8 kHz and harmonics thereof. These sidebands would constitute the desired semaphores. In reception, the semaphores would be detected by a software demodulator.

  13. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  14. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  15. On the security of 3D Cat map based symmetric image encryption scheme

    International Nuclear Information System (INIS)

    Wang Kai; Pei, W.-J.; Zou, Liuhua; Song Aiguo; He Zhenya

    2005-01-01

    A 3D Cat map based symmetric image encryption algorithm, which significantly increases the resistance against statistical and differential attacks, has been proposed recently. It employs a 3D Cat map to shuffle the positions of image pixels and uses the Logistic map to diffuse the relationship between the cipher-image and the plain-image. Based on the factor that it is sufficient to break this cryptosystem only with the equivalent control parameters, some fundamental weaknesses of the cryptosystem are pointed out. With the knowledge of symbolic dynamics and some specially designed plain-images, we can calculate the equivalent initial condition of diffusion process and rebuild a valid equivalent 3D Cat matrix. In this Letter, we will propose a successful chosen-plain-text cryptanalytic attack, which is composed of two mutually independent procedures: the cryptanalysis of the diffusion process and the cryptanalysis of the spatial permutation process. Both theoretical and experimental results show that the lack of security discourages the use of these cryptosystems for practical applications

  16. A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems.

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Di

    Full Text Available Both symmetric and asymmetric color image encryption have advantages and disadvantages. In order to combine their advantages and try to overcome their disadvantages, chaos synchronization is used to avoid the key transmission for the proposed semi-symmetric image encryption scheme. Our scheme is a hybrid chaotic encryption algorithm, and it consists of a scrambling stage and a diffusion stage. The control law and the update rule of function projective synchronization between the 3-cell quantum cellular neural networks (QCNN response system and the 6th-order cellular neural network (CNN drive system are formulated. Since the function projective synchronization is used to synchronize the response system and drive system, Alice and Bob got the key by two different chaotic systems independently and avoid the key transmission by some extra security links, which prevents security key leakage during the transmission. Both numerical simulations and security analyses such as information entropy analysis, differential attack are conducted to verify the feasibility, security, and efficiency of the proposed scheme.

  17. A space-time lower-upper symmetric Gauss-Seidel scheme for the time-spectral method

    Science.gov (United States)

    Zhan, Lei; Xiong, Juntao; Liu, Feng

    2016-05-01

    The time-spectral method (TSM) offers the advantage of increased order of accuracy compared to methods using finite-difference in time for periodic unsteady flow problems. Explicit Runge-Kutta pseudo-time marching and implicit schemes have been developed to solve iteratively the space-time coupled nonlinear equations resulting from TSM. Convergence of the explicit schemes is slow because of the stringent time-step limit. Many implicit methods have been developed for TSM. Their computational efficiency is, however, still limited in practice because of delayed implicit temporal coupling, multiple iterative loops, costly matrix operations, or lack of strong diagonal dominance of the implicit operator matrix. To overcome these shortcomings, an efficient space-time lower-upper symmetric Gauss-Seidel (ST-LU-SGS) implicit scheme with multigrid acceleration is presented. In this scheme, the implicit temporal coupling term is split as one additional dimension of space in the LU-SGS sweeps. To improve numerical stability for periodic flows with high frequency, a modification to the ST-LU-SGS scheme is proposed. Numerical results show that fast convergence is achieved using large or even infinite Courant-Friedrichs-Lewy (CFL) numbers for unsteady flow problems with moderately high frequency and with the use of moderately high numbers of time intervals. The ST-LU-SGS implicit scheme is also found to work well in calculating periodic flow problems where the frequency is not known a priori and needed to be determined by using a combined Fourier analysis and gradient-based search algorithm.

  18. An FFT-accelerated fdtd scheme with exact absorbing conditions for characterizing axially symmetric resonant structures

    KAUST Repository

    Sirenko, Kostyantyn

    2011-01-01

    An accurate and efficient finite-difference time-domain (FDTD) method for characterizing transient waves interactions on axially symmetric structures is presented. The method achieves its accuracy and efficiency by employing localized and/or fast Fourier transform (FFT) accelerated exact absorbing conditions (EACs). The paper details the derivation of the EACs, discusses their implementation and discretization in an FDTD method, and proposes utilization of a blocked-FFT based algorithm for accelerating the computation of temporal convolutions present in nonlocal EACs. The proposed method allows transient analyses to be carried for long time intervals without any loss of accuracy and provides reliable numerical data pertinent to physical processes under resonant conditions. This renders the method highly useful in characterization of high-Q microwave radiators and energy compressors. Numerical results that demonstrate the accuracy and efficiency of the method are presented.

  19. Representations of the symmetric group as special cases of the boson polynomials in U(n)

    International Nuclear Information System (INIS)

    Biedenharn, L.C.; Louck, J.D.

    1978-01-01

    The set of all real, orthogonal irreps of S/sub n/ are realized explicitly and nonrecursively by specializing the boson polynomials carrying irreps of the unitary group. This realization makes use of a 'calculus of patterns', which is discussed

  20. On the axially symmetric equilibrium of a magnetically confined plasma

    International Nuclear Information System (INIS)

    Lehnert, B.

    1975-01-01

    The axially symmetric equilibrium of a magnetically confined plasma is reconsidered, with the special purpose of studying high-beta schemes with a purely poloidal magnetic field. A number of special solutions of the pressure and magnetic flux functions are shown to exist, the obtained results may form starting-points in a further analysis of physically relevant configurations. (Auth.)

  1. Numerical solution of special ultra-relativistic Euler equations using central upwind scheme

    Science.gov (United States)

    Ghaffar, Tayabia; Yousaf, Muhammad; Qamar, Shamsul

    2018-06-01

    This article is concerned with the numerical approximation of one and two-dimensional special ultra-relativistic Euler equations. The governing equations are coupled first-order nonlinear hyperbolic partial differential equations. These equations describe perfect fluid flow in terms of the particle density, the four-velocity and the pressure. A high-resolution shock-capturing central upwind scheme is employed to solve the model equations. To avoid excessive numerical diffusion, the considered scheme avails the specific information of local propagation speeds. By using Runge-Kutta time stepping method and MUSCL-type initial reconstruction, we have obtained 2nd order accuracy of the proposed scheme. After discussing the model equations and the numerical technique, several 1D and 2D test problems are investigated. For all the numerical test cases, our proposed scheme demonstrates very good agreement with the results obtained by well-established algorithms, even in the case of highly relativistic 2D test problems. For validation and comparison, the staggered central scheme and the kinetic flux-vector splitting (KFVS) method are also implemented to the same model. The robustness and efficiency of central upwind scheme is demonstrated by the numerical results.

  2. Quantum dynamics calculations using symmetrized, orthogonal Weyl-Heisenberg wavelets with a phase space truncation scheme. II. Construction and optimization

    International Nuclear Information System (INIS)

    Poirier, Bill; Salam, A.

    2004-01-01

    In this paper, we extend and elaborate upon a wavelet method first presented in a previous publication [B. Poirier, J. Theo. Comput. Chem. 2, 65 (2003)]. In particular, we focus on construction and optimization of the wavelet functions, from theoretical and numerical viewpoints, and also examine their localization properties. The wavelets used are modified Wilson-Daubechies wavelets, which in conjunction with a simple phase space truncation scheme, enable one to solve the multidimensional Schroedinger equation. This approach is ideally suited to rovibrational spectroscopy applications, but can be used in any context where differential equations are involved

  3. Quantum dynamics calculations using symmetrized, orthogonal Weyl-Heisenberg wavelets with a phase space truncation scheme. III. Representations and calculations.

    Science.gov (United States)

    Poirier, Bill; Salam, A

    2004-07-22

    In a previous paper [J. Theo. Comput. Chem. 2, 65 (2003)], one of the authors (B.P.) presented a method for solving the multidimensional Schrodinger equation, using modified Wilson-Daubechies wavelets, and a simple phase space truncation scheme. Unprecedented numerical efficiency was achieved, enabling a ten-dimensional calculation of nearly 600 eigenvalues to be performed using direct matrix diagonalization techniques. In a second paper [J. Chem. Phys. 121, 1690 (2004)], and in this paper, we extend and elaborate upon the previous work in several important ways. The second paper focuses on construction and optimization of the wavelength functions, from theoretical and numerical viewpoints, and also examines their localization. This paper deals with their use in representations and eigenproblem calculations, which are extended to 15-dimensional systems. Even higher dimensionalities are possible using more sophisticated linear algebra techniques. This approach is ideally suited to rovibrational spectroscopy applications, but can be used in any context where differential equations are involved.

  4. Application of Central Upwind Scheme for Solving Special Relativistic Hydrodynamic Equations

    Science.gov (United States)

    Yousaf, Muhammad; Ghaffar, Tayabia; Qamar, Shamsul

    2015-01-01

    The accurate modeling of various features in high energy astrophysical scenarios requires the solution of the Einstein equations together with those of special relativistic hydrodynamics (SRHD). Such models are more complicated than the non-relativistic ones due to the nonlinear relations between the conserved and state variables. A high-resolution shock-capturing central upwind scheme is implemented to solve the given set of equations. The proposed technique uses the precise information of local propagation speeds to avoid the excessive numerical diffusion. The second order accuracy of the scheme is obtained with the use of MUSCL-type initial reconstruction and Runge-Kutta time stepping method. After a discussion of the equations solved and of the techniques employed, a series of one and two-dimensional test problems are carried out. To validate the method and assess its accuracy, the staggered central and the kinetic flux-vector splitting schemes are also applied to the same model. The scheme is robust and efficient. Its results are comparable to those obtained from the sophisticated algorithms, even in the case of highly relativistic two-dimensional test problems. PMID:26070067

  5. Satisfaction rates with the current Special Type Consultation (STC) reimbursement scheme among General Practitioners – A Mixed Methods Study.

    LENUS (Irish Health Repository)

    Kiely, A

    2017-03-01

    The Special Type Consultation (STC) scheme is a fee-for-service reimbursement scheme for General Practitioners (GPs) in Ireland. Introduced in 1989, the scheme includes specified patient services involving the application of a learned skill, e.g. suturing. This study aims to establish the extent to which GPs believe this scheme is appropriate for current General Practice. This is an embedded mixed-methods study combining quantitative data on GPs working experience of and qualitative data on GPs attitudes towards the scheme. Data were collected by means of an anonymous postal questionnaire. The response rate was 60.4% (n=159.) Twenty-nine percent (n=46) disagreed and 65% (n=104) strongly disagreed that the current list of special items is satisfactory. Two overriding themes were identified: economics and advancement of the STC process. This study demonstrates an overwhelming consensus among GPs that the current STC scheme is outdated and in urgent need of revision to reflect modern General Practice.

  6. Bilaterally symmetric Fourier approximations of the skull outlines of ...

    Indian Academy of Sciences (India)

    Present work illustrates a scheme of quantitative description of the shape of the skull outlines of temnospondyl amphibians using bilaterally symmetric closed Fourier curves. Some special points have been identified on the Fourier fits of the skull outlines, which are the local maxima, or minima of the distances from the ...

  7. Weakly Interacting Symmetric and Anti-Symmetric States in the Bilayer Systems

    Science.gov (United States)

    Marchewka, M.; Sheregii, E. M.; Tralle, I.; Tomaka, G.; Ploch, D.

    We have studied the parallel magneto-transport in DQW-structures of two different potential shapes: quasi-rectangular and quasi-triangular. The quantum beats effect was observed in Shubnikov-de Haas (SdH) oscillations for both types of the DQW structures in perpendicular magnetic filed arrangement. We developed a special scheme for the Landau levels energies calculation by means of which we carried out the necessary simulations of beating effect. In order to obtain the agreement between our experimental data and the results of simulations, we introduced two different quasi-Fermi levels which characterize symmetric and anti-symmetric states in DQWs. The existence of two different quasi Fermi-Levels simply means, that one can treat two sub-systems (charge carriers characterized by symmetric and anti-symmetric wave functions) as weakly interacting and having their own rate of establishing the equilibrium state.

  8. Symmetric eikonal expansion

    International Nuclear Information System (INIS)

    Matsuki, Takayuki

    1976-01-01

    Symmetric eikonal expansion for the scattering amplitude is formulated for nonrelativistic and relativistic potential scatterings and also for the quantum field theory. The first approximations coincide with those of Levy and Sucher. The obtained scattering amplitudes are time reversal invariant for all cases and are crossing symmetric for the quantum field theory in each order of approximation. The improved eikonal phase introduced by Levy and Sucher is also derived from the different approximation scheme from the above. (auth.)

  9. Distributed Searchable Symmetric Encryption

    NARCIS (Netherlands)

    Bösch, C.T.; Peter, Andreas; Leenders, Bram; Lim, Hoon Wei; Tang, Qiang; Wang, Huaxiong; Hartel, Pieter H.; Jonker, Willem

    Searchable Symmetric Encryption (SSE) allows a client to store encrypted data on a storage provider in such a way, that the client is able to search and retrieve the data selectively without the storage provider learning the contents of the data or the words being searched for. Practical SSE schemes

  10. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  11. Symmetric textures

    International Nuclear Information System (INIS)

    Ramond, P.

    1993-01-01

    The Wolfenstein parametrization is extended to the quark masses in the deep ultraviolet, and an algorithm to derive symmetric textures which are compatible with existing data is developed. It is found that there are only five such textures

  12. Linear perturbation of spherically symmetric flows: a first-order upwind scheme for the gas dynamics equations in Lagrangian coordinates; Perturbation lineaire d'ecoulements a symetrie spherique: schema decentre d'ordre 1 pour les equations de la dynamique des gaz en variables de Lagrange

    Energy Technology Data Exchange (ETDEWEB)

    Clarisse, J.M

    2007-07-01

    A numerical scheme for computing linear Lagrangian perturbations of spherically symmetric flows of gas dynamics is proposed. This explicit first-order scheme uses the Roe method in Lagrangian coordinates, for computing the radial spherically symmetric mean flow, and its linearized version, for treating the three-dimensional linear perturbations. Fulfillment of the geometric conservation law discrete formulations for both the mean flow and its perturbation is ensured. This scheme capabilities are illustrated by the computation of free-surface mode evolutions at the boundaries of a spherical hollow shell undergoing an homogeneous cumulative compression, showing excellent agreement with reference results. (author)

  13. Multi-Agent System Based Special Protection and Emergency Control Scheme against Cascading Events in Power System

    DEFF Research Database (Denmark)

    Liu, Zhou

    relay operations due to low voltage or overload state in the post stage of N-1 (or N-k) contingency. If such state could be sensed and adjusted appropriately before those relay actions, the system stability might be sustained. So it is of great significance to develop a suitable protection scheme...... the proposed protection strategy in this thesis, a real time simulation platform based on Real Time Digital Simulator (RTDS) and LabVIEW is built. In this platform, the cases of cascaded blackouts are simulated on the test system simplified from the East Denmark power system. For the MAS based control system......, the distributed power system agents are set up in RTDS, while the agents in higher level are designed by LabVIEW toolkits. The case studies and simulation results demonstrate the effectiveness of real time application of the proposed MAS based special protection and emergency control scheme against the cascaded...

  14. Utilization of symmetrical components in a communication-assisted protection scheme for radial MV feeders with variable or reduced short-circuit currents

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Bak, Claus Leth; Blaabjerg, Frede

    2017-01-01

    because the fault current is significantly lower in the islanded mode compared to the grid-connected mode and consequently a single set of settings for the OC relays is not sufficient. This paper propose a communication-assisted protection scheme that is able to operate correctly in a radial Medium...... over positive-sequence current, while the relays placed downstream the fault detect a zero magnitude for their corresponding ratios. Protection relays calculate the magnitude of the proposed ratio and then exchange the obtained value with the adjacent upstream relays using communication. Therefore......, each relay would have access to its own ratio and to the ratio provided by the adjacent relay. Finally, the relay with the highest calculated magnitude of the ratio of zero-sequence to positive-sequence current will trip, thus clearing the fault. The new protection scheme is implemented in a test...

  15. TAX AND ACCOUNTING IMPLICATIONS OF THE USE OF SPECIAL CHARGE SCHEME FOR SECOND-HAND GOODS TO THE PAWN SHOPS IN ROMANIA

    Directory of Open Access Journals (Sweden)

    NICOLAE ECOBICI

    2010-01-01

    Full Text Available In the same time with the crisis deepening in Romania, pawn businessesare also growing. In this paper we discussed several issues concerning the choice of the schemeof registration and determination of value added tax at Pawn Shops, together with the tax andaccounting implications of this choice. Therefore, we presented the theoretical aspectsregarding the likelihood of Pawn Shops to choose the special scheme for second-hand goods, asthey are covered by the Fiscal Code. At the end of this paper we presented based on an examplethe tax and accounting implications of such special scheme as compared with the “normal”scheme regarding VAT at the Pawn Shops in Romania.

  16. Connections of geometric measure of entanglement of pure symmetric states to quantum state estimation

    International Nuclear Information System (INIS)

    Chen Lin; Zhu Huangjun; Wei, Tzu-Chieh

    2011-01-01

    We study the geometric measure of entanglement (GM) of pure symmetric states related to rank 1 positive-operator-valued measures (POVMs) and establish a general connection with quantum state estimation theory, especially the maximum likelihood principle. Based on this connection, we provide a method for computing the GM of these states and demonstrate its additivity property under certain conditions. In particular, we prove the additivity of the GM of pure symmetric multiqubit states whose Majorana points under Majorana representation are distributed within a half sphere, including all pure symmetric three-qubit states. We then introduce a family of symmetric states that are generated from mutually unbiased bases and derive an analytical formula for their GM. These states include Dicke states as special cases, which have already been realized in experiments. We also derive the GM of symmetric states generated from symmetric informationally complete POVMs (SIC POVMs) and use it to characterize all inequivalent SIC POVMs in three-dimensional Hilbert space that are covariant with respect to the Heisenberg-Weyl group. Finally, we describe an experimental scheme for creating the symmetric multiqubit states studied in this article and a possible scheme for measuring the permanence of the related Gram matrix.

  17. A NUMERICAL SCHEME FOR SPECIAL RELATIVISTIC RADIATION MAGNETOHYDRODYNAMICS BASED ON SOLVING THE TIME-DEPENDENT RADIATIVE TRANSFER EQUATION

    Energy Technology Data Exchange (ETDEWEB)

    Ohsuga, Ken; Takahashi, Hiroyuki R. [National Astronomical Observatory of Japan, Osawa, Mitaka, Tokyo 181-8588 (Japan)

    2016-02-20

    We develop a numerical scheme for solving the equations of fully special relativistic, radiation magnetohydrodynamics (MHDs), in which the frequency-integrated, time-dependent radiation transfer equation is solved to calculate the specific intensity. The radiation energy density, the radiation flux, and the radiation stress tensor are obtained by the angular quadrature of the intensity. In the present method, conservation of total mass, momentum, and energy of the radiation magnetofluids is guaranteed. We treat not only the isotropic scattering but also the Thomson scattering. The numerical method of MHDs is the same as that of our previous work. The advection terms are explicitly solved, and the source terms, which describe the gas–radiation interaction, are implicitly integrated. Our code is suitable for massive parallel computing. We present that our code shows reasonable results in some numerical tests for propagating radiation and radiation hydrodynamics. Particularly, the correct solution is given even in the optically very thin or moderately thin regimes, and the special relativistic effects are nicely reproduced.

  18. SPECIAL ASPECTS OF INITIAL OPTICAL SCHEME SELECTION FOR DESIGN OF NON-IMAGING OPTICAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    R. V. Anitropov

    2016-01-01

    system for surgical room was obtained, consisting of three identical domes. The illuminator designed with the use of the proposed methodology showed high energy efficiency (92.3%. Practical Relevance. The results can find application in optical design of non-imaging systems having various functionality, for example, illuminators, concentrators, etc. and can provide import substitution of similar foreign devices. The results can be useful by engineers specializing in the design and/or operation of non-imaging optical systems.

  19. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  20. Commutative curvature operators over four-dimensional generalized symmetric

    Directory of Open Access Journals (Sweden)

    Ali Haji-Badali

    2014-12-01

    Full Text Available Commutative properties of four-dimensional generalized symmetric pseudo-Riemannian manifolds were considered. Specially, in this paper, we studied Skew-Tsankov and Jacobi-Tsankov conditions in 4-dimensional pseudo-Riemannian generalized symmetric manifolds.

  1. Causal symmetric spaces

    CERN Document Server

    Olafsson, Gestur; Helgason, Sigurdur

    1996-01-01

    This book is intended to introduce researchers and graduate students to the concepts of causal symmetric spaces. To date, results of recent studies considered standard by specialists have not been widely published. This book seeks to bring this information to students and researchers in geometry and analysis on causal symmetric spaces.Includes the newest results in harmonic analysis including Spherical functions on ordered symmetric space and the holmorphic discrete series and Hardy spaces on compactly casual symmetric spacesDeals with the infinitesimal situation, coverings of symmetric spaces, classification of causal symmetric pairs and invariant cone fieldsPresents basic geometric properties of semi-simple symmetric spacesIncludes appendices on Lie algebras and Lie groups, Bounded symmetric domains (Cayley transforms), Antiholomorphic Involutions on Bounded Domains and Para-Hermitian Symmetric Spaces

  2. Facade Layout Symmetrization

    KAUST Repository

    Jiang, Haiyong

    2016-04-11

    We present an automatic algorithm for symmetrizing facade layouts. Our method symmetrizes a given facade layout while minimally modifying the original layout. Based on the principles of symmetry in urban design, we formulate the problem of facade layout symmetrization as an optimization problem. Our system further enhances the regularity of the final layout by redistributing and aligning boxes in the layout. We demonstrate that the proposed solution can generate symmetric facade layouts efficiently. © 2015 IEEE.

  3. Symmetrization of Facade Layouts

    KAUST Repository

    Jiang, Haiyong; Yan, Dong-Ming; Dong, Weiming; Wu, Fuzhang; Nan, Liangliang; Zhang, Xiaopeng

    2016-01-01

    We present an automatic approach for symmetrizing urban facade layouts. Our method can generate a symmetric layout through minimally modifying the original input layout. Based on the principles of symmetry in urban design, we formulate facade layout symmetrization as an optimization problem. Our method further enhances the regularity of the final layout by redistributing and aligning elements in the layout. We demonstrate that the proposed solution can effectively generate symmetric facade layouts.

  4. Facade Layout Symmetrization

    KAUST Repository

    Jiang, Haiyong; Dong, Weiming; Yan, Dongming; Zhang, Xiaopeng

    2016-01-01

    We present an automatic algorithm for symmetrizing facade layouts. Our method symmetrizes a given facade layout while minimally modifying the original layout. Based on the principles of symmetry in urban design, we formulate the problem of facade layout symmetrization as an optimization problem. Our system further enhances the regularity of the final layout by redistributing and aligning boxes in the layout. We demonstrate that the proposed solution can generate symmetric facade layouts efficiently. © 2015 IEEE.

  5. Symmetrization of Facade Layouts

    KAUST Repository

    Jiang, Haiyong

    2016-02-26

    We present an automatic approach for symmetrizing urban facade layouts. Our method can generate a symmetric layout through minimally modifying the original input layout. Based on the principles of symmetry in urban design, we formulate facade layout symmetrization as an optimization problem. Our method further enhances the regularity of the final layout by redistributing and aligning elements in the layout. We demonstrate that the proposed solution can effectively generate symmetric facade layouts.

  6. Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container

    Science.gov (United States)

    Qin, Yi; Wang, Zhipeng; Wang, Hongjuan; Gong, Qiong; Zhou, Nanrun

    2018-06-01

    The diffractive-imaging-based encryption (DIBE) scheme has aroused wide interesting due to its compact architecture and low requirement of conditions. Nevertheless, the primary information can hardly be recovered exactly in the real applications when considering the speckle noise and potential occlusion imposed on the ciphertext. To deal with this issue, the customized data container (CDC) into DIBE is introduced and a new phase retrieval algorithm (PRA) for plaintext retrieval is proposed. The PRA, designed according to the peculiarity of the CDC, combines two key techniques from previous approaches, i.e., input-support-constraint and median-filtering. The proposed scheme can guarantee totally the reconstruction of the primary information despite heavy noise or occlusion and its effectiveness and feasibility have been demonstrated with simulation results.

  7. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  8. Special funding schemes for innovative medical devices in French hospitals: the pros and cons of two different approaches.

    Science.gov (United States)

    Martelli, Nicolas; van den Brink, Hélène

    2014-07-01

    Financing innovative medical devices is an important challenge for national health policy makers, and a crucial issue for hospitals. However, when innovative medical devices are launched on the European market there is generally little clinical evidence regarding both efficacy and safety, both because of the flaws in the European system for regulating such devices, and because they are at an early stage of development. To manage the uncertainty surrounding the reimbursement of innovation, several European countries have set up temporary funding schemes to generate evidence about the effectiveness of devices. This article explores two different French approaches to funding innovative in-hospital devices and collecting supplementary data: the coverage with evidence development (CED) scheme introduced under Article L. 165-1-1 of the French Social Security Code; and national programs for hospital-based research. We discuss pros and cons of both approaches in the light of CED policies in Germany and the UK. The CED policies for devices share common limitations. Thus, transparency of CED processes should be enhanced and decisions need to be made in a timely way. Finally, we think that closer collaboration between manufacturers, health authorities and hospitals is essential to make CED policies more operational. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  9. On Symmetric Polynomials

    OpenAIRE

    Golden, Ryan; Cho, Ilwoo

    2015-01-01

    In this paper, we study structure theorems of algebras of symmetric functions. Based on a certain relation on elementary symmetric polynomials generating such algebras, we consider perturbation in the algebras. In particular, we understand generators of the algebras as perturbations. From such perturbations, define injective maps on generators, which induce algebra-monomorphisms (or embeddings) on the algebras. They provide inductive structure theorems on algebras of symmetric polynomials. As...

  10. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  11. All-optical symmetric ternary logic gate

    Science.gov (United States)

    Chattopadhyay, Tanay

    2010-09-01

    Symmetric ternary number (radix=3) has three logical states (1¯, 0, 1). It is very much useful in carry free arithmetical operation. Beside this, the logical operation using this type of number system is also effective in high speed computation and communication in multi-valued logic. In this literature all-optical circuits for three basic symmetrical ternary logical operations (inversion, MIN and MAX) are proposed and described. Numerical simulation verifies the theoretical model. In this present scheme the different ternary logical states are represented by different polarized state of light. Terahertz optical asymmetric demultiplexer (TOAD) based interferometric switch has been used categorically in this manuscript.

  12. On the symmetric α-stable distribution with application to symbol error rate calculations

    KAUST Repository

    Soury, Hamza

    2016-12-24

    The probability density function (PDF) of the symmetric α-stable distribution is investigated using the inverse Fourier transform of its characteristic function. For general values of the stable parameter α, it is shown that the PDF and the cumulative distribution function of the symmetric stable distribution can be expressed in terms of the Fox H function as closed-form. As an application, the probability of error of single input single output communication systems using different modulation schemes with an α-stable perturbation is studied. In more details, a generic formula is derived for generalized fading distribution, such as the extended generalized-k distribution. Later, simpler expressions of these error rates are deduced for some selected special cases and compact approximations are derived using asymptotic expansions.

  13. Substring-Searchable Symmetric Encryption

    Directory of Open Access Journals (Sweden)

    Chase Melissa

    2015-06-01

    Full Text Available In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s. First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE and structured encryption. Then, we construct a queryable encryption scheme for substring queries. Our construction uses suffix trees and achieves asymptotic efficiency comparable to that of unencrypted suffix trees. Encryption of a string of length n takes O(λn time and produces a ciphertext of size O(λn, and querying for a substring of length m that occurs k times takes O(λm+k time and three rounds of communication. Our security definition guarantees correctness of query results and privacy of data and queries against a malicious adversary. Following the line of work started by Curtmola et al. (ACM CCS 2006, in order to construct more efficient schemes we allow the query protocol to leak some limited information that is captured precisely in the definition. We prove security of our substring-searchable encryption scheme against malicious adversaries, where the query protocol leaks limited information about memory access patterns through the suffix tree of the encrypted string.

  14. Centrioles in Symmetric Spaces

    OpenAIRE

    Quast, Peter

    2011-01-01

    We describe all centrioles in irreducible simply connected pointed symmetric spaces of compact type in terms of the root system of the ambient space, and we study some geometric properties of centrioles.

  15. A viewpoint on nearly conformally symmetric manifold

    International Nuclear Information System (INIS)

    Rahman, M.S.

    1990-06-01

    Some observations, with definition, on Nearly Conformally Symmetric (NCS) manifold are made. A number of theorems concerning conformal change of metric and parallel tensors on NCS manifolds are presented. It is illustrated that a manifold M = R n-1 x R + 1 , endowed with a special metric, is NCS but not of harmonic curvature. (author). 8 refs

  16. A symmetrical rail accelerator

    International Nuclear Information System (INIS)

    Igenbergs, E.

    1991-01-01

    This paper reports on the symmetrical rail accelerator that has four rails, which are arranged symmetrically around the bore. The opposite rails have the same polarity and the adjacent rails the opposite polarity. In this configuration the radial force acting upon the individual rails is significantly smaller than in a conventional 2-rail configuration and a plasma armature is focussed towards the axis of the barrel. Experimental results indicate a higher efficiency compared to a conventional rail accelerator

  17. Multiparty symmetric sum types

    DEFF Research Database (Denmark)

    Nielsen, Lasse; Yoshida, Nobuko; Honda, Kohei

    2010-01-01

    This paper introduces a new theory of multiparty session types based on symmetric sum types, by which we can type non-deterministic orchestration choice behaviours. While the original branching type in session types can represent a choice made by a single participant and accepted by others...... determining how the session proceeds, the symmetric sum type represents a choice made by agreement among all the participants of a session. Such behaviour can be found in many practical systems, including collaborative workflow in healthcare systems for clinical practice guidelines (CPGs). Processes...... with the symmetric sums can be embedded into the original branching types using conductor processes. We show that this type-driven embedding preserves typability, satisfies semantic soundness and completeness, and meets the encodability criteria adapted to the typed setting. The theory leads to an efficient...

  18. Counting with symmetric functions

    CERN Document Server

    Mendes, Anthony

    2015-01-01

    This monograph provides a self-contained introduction to symmetric functions and their use in enumerative combinatorics.  It is the first book to explore many of the methods and results that the authors present. Numerous exercises are included throughout, along with full solutions, to illustrate concepts and also highlight many interesting mathematical ideas. The text begins by introducing fundamental combinatorial objects such as permutations and integer partitions, as well as generating functions.  Symmetric functions are considered in the next chapter, with a unique emphasis on the combinatorics of the transition matrices between bases of symmetric functions.  Chapter 3 uses this introductory material to describe how to find an assortment of generating functions for permutation statistics, and then these techniques are extended to find generating functions for a variety of objects in Chapter 4.  The next two chapters present the Robinson-Schensted-Knuth algorithm and a method for proving Pólya’s enu...

  19. Symmetric Tensor Decomposition

    DEFF Research Database (Denmark)

    Brachat, Jerome; Comon, Pierre; Mourrain, Bernard

    2010-01-01

    We present an algorithm for decomposing a symmetric tensor, of dimension n and order d, as a sum of rank-1 symmetric tensors, extending the algorithm of Sylvester devised in 1886 for binary forms. We recall the correspondence between the decomposition of a homogeneous polynomial in n variables...... of polynomial equations of small degree in non-generic cases. We propose a new algorithm for symmetric tensor decomposition, based on this characterization and on linear algebra computations with Hankel matrices. The impact of this contribution is two-fold. First it permits an efficient computation...... of the decomposition of any tensor of sub-generic rank, as opposed to widely used iterative algorithms with unproved global convergence (e.g. Alternate Least Squares or gradient descents). Second, it gives tools for understanding uniqueness conditions and for detecting the rank....

  20. Symmetrized neutron transport equation and the fast Fourier transform method

    International Nuclear Information System (INIS)

    Sinh, N.Q.; Kisynski, J.; Mika, J.

    1978-01-01

    The differential equation obtained from the neutron transport equation by the application of the source iteration method in two-dimensional rectangular geometry is transformed into a symmetrized form with respect to one of the angular variables. The discretization of the symmetrized equation leads to finite difference equations based on the five-point scheme and solved by use of the fast Fourier transform method. Possible advantages of the approach are shown on test calculations

  1. Nonlinear PT-symmetric plaquettes

    International Nuclear Information System (INIS)

    Li Kai; Kevrekidis, P G; Malomed, Boris A; Günther, Uwe

    2012-01-01

    We introduce four basic two-dimensional (2D) plaquette configurations with onsite cubic nonlinearities, which may be used as building blocks for 2D PT-symmetric lattices. For each configuration, we develop a dynamical model and examine its PTsymmetry. The corresponding nonlinear modes are analyzed starting from the Hamiltonian limit, with zero value of the gain–loss coefficient, γ. Once the relevant waveforms have been identified (chiefly, in an analytical form), their stability is examined by means of linearization in the vicinity of stationary points. This reveals diverse and, occasionally, fairly complex bifurcations. The evolution of unstable modes is explored by means of direct simulations. In particular, stable localized modes are found in these systems, although the majority of identified solutions are unstable. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’. (paper)

  2. Symmetric waterbomb origami.

    Science.gov (United States)

    Chen, Yan; Feng, Huijuan; Ma, Jiayao; Peng, Rui; You, Zhong

    2016-06-01

    The traditional waterbomb origami, produced from a pattern consisting of a series of vertices where six creases meet, is one of the most widely used origami patterns. From a rigid origami viewpoint, it generally has multiple degrees of freedom, but when the pattern is folded symmetrically, the mobility reduces to one. This paper presents a thorough kinematic investigation on symmetric folding of the waterbomb pattern. It has been found that the pattern can have two folding paths under certain circumstance. Moreover, the pattern can be used to fold thick panels. Not only do the additional constraints imposed to fold the thick panels lead to single degree of freedom folding, but the folding process is also kinematically equivalent to the origami of zero-thickness sheets. The findings pave the way for the pattern being readily used to fold deployable structures ranging from flat roofs to large solar panels.

  3. Symmetric modular torsatron

    Science.gov (United States)

    Rome, J.A.; Harris, J.H.

    1984-01-01

    A fusion reactor device is provided in which the magnetic fields for plasma confinement in a toroidal configuration is produced by a plurality of symmetrical modular coils arranged to form a symmetric modular torsatron referred to as a symmotron. Each of the identical modular coils is helically deformed and comprise one field period of the torsatron. Helical segments of each coil are connected by means of toroidally directed windbacks which may also provide part of the vertical field required for positioning the plasma. The stray fields of the windback segments may be compensated by toroidal coils. A variety of magnetic confinement flux surface configurations may be produced by proper modulation of the winding pitch of the helical segments of the coils, as in a conventional torsatron, winding the helix on a noncircular cross section and varying the poloidal and radial location of the windbacks and the compensating toroidal ring coils.

  4. Symmetric vectors and algebraic classification

    International Nuclear Information System (INIS)

    Leibowitz, E.

    1980-01-01

    The concept of symmetric vector field in Riemannian manifolds, which arises in the study of relativistic cosmological models, is analyzed. Symmetric vectors are tied up with the algebraic properties of the manifold curvature. A procedure for generating a congruence of symmetric fields out of a given pair is outlined. The case of a three-dimensional manifold of constant curvature (''isotropic universe'') is studied in detail, with all its symmetric vector fields being explicitly constructed

  5. Representations of locally symmetric spaces

    International Nuclear Information System (INIS)

    Rahman, M.S.

    1995-09-01

    Locally symmetric spaces in reference to globally and Hermitian symmetric Riemannian spaces are studied. Some relations between locally and globally symmetric spaces are exhibited. A lucid account of results on relevant spaces, motivated by fundamental problems, are formulated as theorems and propositions. (author). 10 refs

  6. Holographic Spherically Symmetric Metrics

    Science.gov (United States)

    Petri, Michael

    The holographic principle (HP) conjectures, that the maximum number of degrees of freedom of any realistic physical system is proportional to the system's boundary area. The HP has its roots in the study of black holes. It has recently been applied to cosmological solutions. In this article we apply the HP to spherically symmetric static space-times. We find that any regular spherically symmetric object saturating the HP is subject to tight constraints on the (interior) metric, energy-density, temperature and entropy-density. Whenever gravity can be described by a metric theory, gravity is macroscopically scale invariant and the laws of thermodynamics hold locally and globally, the (interior) metric of a regular holographic object is uniquely determined up to a constant factor and the interior matter-state must follow well defined scaling relations. When the metric theory of gravity is general relativity, the interior matter has an overall string equation of state (EOS) and a unique total energy-density. Thus the holographic metric derived in this article can serve as simple interior 4D realization of Mathur's string fuzzball proposal. Some properties of the holographic metric and its possible experimental verification are discussed. The geodesics of the holographic metric describe an isotropically expanding (or contracting) universe with a nearly homogeneous matter-distribution within the local Hubble volume. Due to the overall string EOS the active gravitational mass-density is zero, resulting in a coasting expansion with Ht = 1, which is compatible with the recent GRB-data.

  7. Symmetric extendibility of quantum states

    OpenAIRE

    Nowakowski, Marcin L.

    2015-01-01

    Studies on symmetric extendibility of quantum states become especially important in a context of analysis of one-way quantum measures of entanglement, distilabillity and security of quantum protocols. In this paper we analyse composite systems containing a symmetric extendible part with a particular attention devoted to one-way security of such systems. Further, we introduce a new one-way monotone based on the best symmetric approximation of quantum state. We underpin those results with geome...

  8. A symmetric safety valve

    International Nuclear Information System (INIS)

    Burtraw, Dallas; Palmer, Karen; Kahn, Danny

    2010-01-01

    How to set policy in the presence of uncertainty has been central in debates over climate policy. Concern about costs has motivated the proposal for a cap-and-trade program for carbon dioxide, with a 'safety valve' that would mitigate against spikes in the cost of emission reductions by introducing additional emission allowances into the market when marginal costs rise above the specified allowance price level. We find two significant problems, both stemming from the asymmetry of an instrument that mitigates only against a price increase. One is that most important examples of price volatility in cap-and-trade programs have occurred not when prices spiked, but instead when allowance prices collapsed. Second, a single-sided safety valve may have unintended consequences for investment. We illustrate that a symmetric safety valve provides environmental and welfare improvements relative to the conventional one-sided approach.

  9. Exact axially symmetric galactic dynamos

    Science.gov (United States)

    Henriksen, R. N.; Woodfinden, A.; Irwin, J. A.

    2018-05-01

    We give a selection of exact dynamos in axial symmetry on a galactic scale. These include some steady examples, at least one of which is wholly analytic in terms of simple functions and has been discussed elsewhere. Most solutions are found in terms of special functions, such as associated Lagrange or hypergeometric functions. They may be considered exact in the sense that they are known to any desired accuracy in principle. The new aspect developed here is to present scale-invariant solutions with zero resistivity that are self-similar in time. The time dependence is either a power law or an exponential factor, but since the geometry of the solution is self-similar in time we do not need to fix a time to study it. Several examples are discussed. Our results demonstrate (without the need to invoke any other mechanisms) X-shaped magnetic fields and (axially symmetric) magnetic spiral arms (both of which are well observed and documented) and predict reversing rotation measures in galaxy haloes (now observed in the CHANG-ES sample) as well as the fact that planar magnetic spirals are lifted into the galactic halo.

  10. Baryon symmetric big bang cosmology

    Science.gov (United States)

    Stecker, F. W.

    1978-01-01

    Both the quantum theory and Einsteins theory of special relativity lead to the supposition that matter and antimatter were produced in equal quantities during the big bang. It is noted that local matter/antimatter asymmetries may be reconciled with universal symmetry by assuming (1) a slight imbalance of matter over antimatter in the early universe, annihilation, and a subsequent remainder of matter; (2) localized regions of excess for one or the other type of matter as an initial condition; and (3) an extremely dense, high temperature state with zero net baryon number; i.e., matter/antimatter symmetry. Attention is given to the third assumption, which is the simplest and the most in keeping with current knowledge of the cosmos, especially as pertains the universality of 3 K background radiation. Mechanisms of galaxy formation are discussed, whereby matter and antimatter might have collided and annihilated each other, or have coexisted (and continue to coexist) at vast distances. It is pointed out that baryon symmetric big bang cosmology could probably be proved if an antinucleus could be detected in cosmic radiation.

  11. Symmetric q-Bessel functions

    Directory of Open Access Journals (Sweden)

    Giuseppe Dattoli

    1996-05-01

    Full Text Available q analog of bessel functions, symmetric under the interchange of q and q^ −1 are introduced. The definition is based on the generating function realized as product of symmetric q-exponential functions with appropriate arguments. Symmetric q-Bessel function are shown to satisfy various identities as well as second-order q-differential equations, which in the limit q → 1 reproduce those obeyed by the usual cylindrical Bessel functions. A brief discussion on the possible algebraic setting for symmetric q-Bessel functions is also provided.

  12. An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption

    Science.gov (United States)

    Sun, Xiaoqiang; Wang, Ting; Sun, Zhiwei; Wang, Ping; Yu, Jianping; Xie, Weixin

    2017-04-01

    In 2009, Gentry first introduced an ideal lattices fully homomorphic encryption (FHE) scheme. Later, based on the approximate greatest common divisor problem, learning with errors problem or learning with errors over rings problem, FHE has developed rapidly, along with the low efficiency and computational security. Combined with quantum mechanics, Liang proposed a symmetric quantum somewhat homomorphic encryption (QSHE) scheme based on quantum one-time pad, which is unconditional security. And it was converted to a quantum fully homomorphic encryption scheme, whose evaluation algorithm is based on the secret key. Compared with Liang's QSHE scheme, we propose a more efficient QSHE scheme for classical input states with perfect security, which is used to encrypt the classical message, and the secret key is not required in the evaluation algorithm. Furthermore, an efficient symmetric searchable encryption (SSE) scheme is constructed based on our QSHE scheme. SSE is important in the cloud storage, which allows users to offload search queries to the untrusted cloud. Then the cloud is responsible for returning encrypted files that match search queries (also encrypted), which protects users' privacy.

  13. Symmetrized exponential oscillator

    Czech Academy of Sciences Publication Activity Database

    Znojil, Miloslav

    2016-01-01

    Roč. 31, č. 34 (2016), č. článku 1650195. ISSN 0217-7323 R&D Projects: GA ČR GA16-22945S Institutional support: RVO:61389005 Keywords : quantum bound states * exactly solvable models * Bessel special funciton transcendental secular equation * numerical precision Subject RIV: BE - Theoretical Physics Impact factor: 1.165, year: 2016

  14. The symmetric MSD encoder for one-step adder of ternary optical computer

    Science.gov (United States)

    Kai, Song; LiPing, Yan

    2016-08-01

    The symmetric Modified Signed-Digit (MSD) encoding is important for achieving the one-step MSD adder of Ternary Optical Computer (TOC). The paper described the symmetric MSD encoding algorithm in detail, and developed its truth table which has nine rows and nine columns. According to the truth table, the state table was developed, and the optical-path structure and circuit-implementation scheme of the symmetric MSD encoder (SME) for one-step adder of TOC were proposed. Finally, a series of experiments were designed and performed. The observed results of the experiments showed that the scheme to implement SME was correct, feasible and efficient.

  15. Conformally symmetric traversable wormholes

    International Nuclear Information System (INIS)

    Boehmer, Christian G.; Harko, Tiberiu; Lobo, Francisco S. N.

    2007-01-01

    Exact solutions of traversable wormholes are found under the assumption of spherical symmetry and the existence of a nonstatic conformal symmetry, which presents a more systematic approach in searching for exact wormhole solutions. In this work, a wide variety of solutions are deduced by considering choices for the form function, a specific linear equation of state relating the energy density and the pressure anisotropy, and various phantom wormhole geometries are explored. A large class of solutions impose that the spatial distribution of the exotic matter is restricted to the throat neighborhood, with a cutoff of the stress-energy tensor at a finite junction interface, although asymptotically flat exact solutions are also found. Using the 'volume integral quantifier', it is found that the conformally symmetric phantom wormhole geometries may, in principle, be constructed by infinitesimally small amounts of averaged null energy condition violating matter. Considering the tidal acceleration traversability conditions for the phantom wormhole geometry, specific wormhole dimensions and the traversal velocity are also deduced

  16. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  17. Mesotherapy for benign symmetric lipomatosis.

    Science.gov (United States)

    Hasegawa, Toshio; Matsukura, Tomoyuki; Ikeda, Shigaku

    2010-04-01

    Benign symmetric lipomatosis, also known as Madelung disease, is a rare disorder characterized by fat distribution around the shoulders, arms, and neck in the context of chronic alcoholism. Complete excision of nonencapsulated lipomas is difficult. However, reports describing conservative therapeutic measures for lipomatosis are rare. The authors present the case of a 42-year-old man with a diagnosis of benign symmetric lipomatosis who had multiple, large, symmetrical masses in his neck. Multiple phosphatidylcholine injections in the neck were administered 4 weeks apart, a total of seven times to achieve lipolysis. The patient's lipomatosis improved in response to the injections, and he achieved good cosmetic results. Intralesional injection, termed mesotherapy, using phosphatidylcholine is a potentially effective therapy for benign symmetric lipomatosis that should be reconsidered as a therapeutic option for this disease.

  18. Initial value formulation for the spherically symmetric dust solution

    International Nuclear Information System (INIS)

    Liu, H.

    1990-01-01

    An initial value formulation for the dust solution with spherical symmetry is given explicitly in which the initial distributions of dust and its velocity on an initial surface are chosen to be the initial data. As special cases, the Friedmann universe, the Schwarzschild solution in comoving coordinates, and a spherically symmetric and radially inhomogeneous cosmological model are derived

  19. On the random geometry of a symmetric matter antimatter universe

    International Nuclear Information System (INIS)

    Aldrovandi, R.; Goto, M.

    1977-05-01

    A statistical analysis is made of the randon geometry of an early symmetric matter-antimatter universe model. Such a model is shown to determine the total number of the largest agglomerations in the universe, as well as of some special configurations. Constraints on the time development of the protoagglomerations are also obtained

  20. Looking for symmetric Bell inequalities

    OpenAIRE

    Bancal, Jean-Daniel; Gisin, Nicolas; Pironio, Stefano

    2010-01-01

    Finding all Bell inequalities for a given number of parties, measurement settings and measurement outcomes is in general a computationally hard task. We show that all Bell inequalities which are symmetric under the exchange of parties can be found by examining a symmetrized polytope which is simpler than the full Bell polytope. As an illustration of our method, we generate 238 885 new Bell inequalities and 1085 new Svetlichny inequalities. We find, in particular, facet inequalities for Bell e...

  1. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk

  2. Design and Analysis of Symmetric Primitives

    DEFF Research Database (Denmark)

    Lauridsen, Martin Mehl

    . In the second part, we delve into the matter of the various aspects of designing a symmetric cryptographic primitive. We start by considering generalizations of the widely acclaimed Advanced Encryption Standard (AES) block cipher. In particular, our focus is on a component operation in the cipher which permutes...... analyze and implement modes recommended by the National Institute of Standards and Technology (NIST), as well as authenticated encryption modes from the CAESAR competition, when instantiated with the AES. The data processed in our benchmarking has sizes representative to that of typical Internet traffic...... linear cryptanalysis. We apply this model to the standardized block cipher PRESENT. Finally, we present very generic attacks on two authenticated encryption schemes, AVALANCHE and RBS, by pointing out severe design flaws that can be leveraged to fully recover the secret key with very low complexity...

  3. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  4. On the construction of symmetric nonnegative matrix with prescribed Ritz values

    Directory of Open Access Journals (Sweden)

    Alimohammad Nazari

    2014-09-01

    Full Text Available In this paper for a given prescribed Ritz values that satisfy inthe some  special conditions,  we find a symmetric nonnegativematrix, such that  the given set be its Ritz values.

  5. Algorithms for sparse, symmetric, definite quadratic lambda-matrix eigenproblems

    International Nuclear Information System (INIS)

    Scott, D.S.; Ward, R.C.

    1981-01-01

    Methods are presented for computing eigenpairs of the quadratic lambda-matrix, M lambda 2 + C lambda + K, where M, C, and K are large and sparse, and have special symmetry-type properties. These properties are sufficient to insure that all the eigenvalues are real and that theory analogous to the standard symmetric eigenproblem exists. The methods employ some standard techniques such as partial tri-diagonalization via the Lanczos Method and subsequent eigenpair calculation, shift-and- invert strategy and subspace iteration. The methods also employ some new techniques such as Rayleigh-Ritz quadratic roots and the inertia of symmetric, definite, quadratic lambda-matrices

  6. Harmonic analysis on symmetric spaces

    CERN Document Server

    Terras, Audrey

    This text explores the geometry and analysis of higher rank analogues of the symmetric spaces introduced in volume one. To illuminate both the parallels and differences of the higher rank theory, the space of positive matrices is treated in a manner mirroring that of the upper-half space in volume one. This concrete example furnishes motivation for the general theory of noncompact symmetric spaces, which is outlined in the final chapter. The book emphasizes motivation and comprehensibility, concrete examples and explicit computations (by pen and paper, and by computer), history, and, above all, applications in mathematics, statistics, physics, and engineering. The second edition includes new sections on Donald St. P. Richards’s central limit theorem for O(n)-invariant random variables on the symmetric space of GL(n, R), on random  matrix theory, and on advances in the theory of automorphic forms on arithmetic groups.

  7. Looking for symmetric Bell inequalities

    International Nuclear Information System (INIS)

    Bancal, Jean-Daniel; Gisin, Nicolas; Pironio, Stefano

    2010-01-01

    Finding all Bell inequalities for a given number of parties, measurement settings and measurement outcomes is in general a computationally hard task. We show that all Bell inequalities which are symmetric under the exchange of parties can be found by examining a symmetrized polytope which is simpler than the full Bell polytope. As an illustration of our method, we generate 238 885 new Bell inequalities and 1085 new Svetlichny inequalities. We find, in particular, facet inequalities for Bell experiments involving two parties and two measurement settings that are not of the Collins-Gisin-Linden-Massar-Popescu type.

  8. Symmetric normalisation for intuitionistic logic

    DEFF Research Database (Denmark)

    Guenot, Nicolas; Straßburger, Lutz

    2014-01-01

    We present two proof systems for implication-only intuitionistic logic in the calculus of structures. The first is a direct adaptation of the standard sequent calculus to the deep inference setting, and we describe a procedure for cut elimination, similar to the one from the sequent calculus......, but using a non-local rewriting. The second system is the symmetric completion of the first, as normally given in deep inference for logics with a DeMorgan duality: all inference rules have duals, as cut is dual to the identity axiom. We prove a generalisation of cut elimination, that we call symmetric...

  9. Diagrams for symmetric product orbifolds

    International Nuclear Information System (INIS)

    Pakman, Ari; Rastelli, Leonardo; Razamat, Shlomo S.

    2009-01-01

    We develop a diagrammatic language for symmetric product orbifolds of two-dimensional conformal field theories. Correlation functions of twist operators are written as sums of diagrams: each diagram corresponds to a branched covering map from a surface where the fields are single-valued to the base sphere where twist operators are inserted. This diagrammatic language facilitates the study of the large N limit and makes more transparent the analogy between symmetric product orbifolds and free non-abelian gauge theories. We give a general algorithm to calculate the leading large N contribution to four-point correlators of twist fields.

  10. Looking for symmetric Bell inequalities

    Energy Technology Data Exchange (ETDEWEB)

    Bancal, Jean-Daniel; Gisin, Nicolas [Group of Applied Physics, University of Geneva, 20 rue de l' Ecole-de Medecine, CH-1211 Geneva 4 (Switzerland); Pironio, Stefano, E-mail: jean-daniel.bancal@unige.c [Laboratoire d' Information Quantique, Universite Libre de Bruxelles (Belgium)

    2010-09-24

    Finding all Bell inequalities for a given number of parties, measurement settings and measurement outcomes is in general a computationally hard task. We show that all Bell inequalities which are symmetric under the exchange of parties can be found by examining a symmetrized polytope which is simpler than the full Bell polytope. As an illustration of our method, we generate 238 885 new Bell inequalities and 1085 new Svetlichny inequalities. We find, in particular, facet inequalities for Bell experiments involving two parties and two measurement settings that are not of the Collins-Gisin-Linden-Massar-Popescu type.

  11. A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-Box Matrix

    OpenAIRE

    Subhranil Som; Soumasree Banerjee

    2014-01-01

    In this paper a symmetric key cryptographic algorithm named as “A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-box Matrix“ is proposed. Secret sharing is a technique by which any information can be break down into small pieces. The secret can be reconstructed only when a sufficient number of pieces of shares are combined together; individual shares are of no use on their own. Traditional secret sharing scheme possesses high computational ...

  12. Lovelock black holes with maximally symmetric horizons

    Energy Technology Data Exchange (ETDEWEB)

    Maeda, Hideki; Willison, Steven; Ray, Sourya, E-mail: hideki@cecs.cl, E-mail: willison@cecs.cl, E-mail: ray@cecs.cl [Centro de Estudios CientIficos (CECs), Casilla 1469, Valdivia (Chile)

    2011-08-21

    We investigate some properties of n( {>=} 4)-dimensional spacetimes having symmetries corresponding to the isometries of an (n - 2)-dimensional maximally symmetric space in Lovelock gravity under the null or dominant energy condition. The well-posedness of the generalized Misner-Sharp quasi-local mass proposed in the past study is shown. Using this quasi-local mass, we clarify the basic properties of the dynamical black holes defined by a future outer trapping horizon under certain assumptions on the Lovelock coupling constants. The C{sup 2} vacuum solutions are classified into four types: (i) Schwarzschild-Tangherlini-type solution; (ii) Nariai-type solution; (iii) special degenerate vacuum solution; and (iv) exceptional vacuum solution. The conditions for the realization of the last two solutions are clarified. The Schwarzschild-Tangherlini-type solution is studied in detail. We prove the first law of black-hole thermodynamics and present the expressions for the heat capacity and the free energy.

  13. Symmetric relations of finite negativity

    NARCIS (Netherlands)

    Kaltenbaeck, M.; Winkler, H.; Woracek, H.; Forster, KH; Jonas, P; Langer, H

    2006-01-01

    We construct and investigate a space which is related to a symmetric linear relation S of finite negativity on an almost Pontryagin space. This space is the indefinite generalization of the completion of dom S with respect to (S.,.) for a strictly positive S on a Hilbert space.

  14. Tilting-connected symmetric algebras

    OpenAIRE

    Aihara, Takuma

    2010-01-01

    The notion of silting mutation was introduced by Iyama and the author. In this paper we mainly study silting mutation for self-injective algebras and prove that any representation-finite symmetric algebra is tilting-connected. Moreover we give some sufficient conditions for a Bongartz-type Lemma to hold for silting objects.

  15. Symmetric group representations and Z

    OpenAIRE

    Adve, Anshul; Yong, Alexander

    2017-01-01

    We discuss implications of the following statement about the representation theory of symmetric groups: every integer appears infinitely often as an irreducible character evaluation, and every nonnegative integer appears infinitely often as a Littlewood-Richardson coefficient and as a Kronecker coefficient.

  16. Quantum systems and symmetric spaces

    International Nuclear Information System (INIS)

    Olshanetsky, M.A.; Perelomov, A.M.

    1978-01-01

    Certain class of quantum systems with Hamiltonians related to invariant operators on symmetric spaces has been investigated. A number of physical facts have been derived as a consequence. In the classical limit completely integrable systems related to root systems are obtained

  17. The symmetric longest queue system

    NARCIS (Netherlands)

    van Houtum, Geert-Jan; Adan, Ivo; van der Wal, Jan

    1997-01-01

    We derive the performance of the exponential symmetric longest queue system from two variants: a longest queue system with Threshold Rejection of jobs and one with Threshold Addition of jobs. It is shown that these two systems provide lower and upper bounds for the performance of the longest queue

  18. Symmetric imaging findings in neuroradiology

    International Nuclear Information System (INIS)

    Zlatareva, D.

    2015-01-01

    Full text: Learning objectives: to make a list of diseases and syndromes which manifest as bilateral symmetric findings on computed tomography and magnetic resonance imaging; to discuss the clinical and radiological differential diagnosis for these diseases; to explain which of these conditions necessitates urgent therapy and when additional studies and laboratory can precise diagnosis. There is symmetry in human body and quite often we compare the affected side to the normal one but in neuroradiology we might have bilateral findings which affected pair structures or corresponding anatomic areas. It is very rare when clinical data prompt diagnosis. Usually clinicians suspect such an involvement but Ct and MRI can reveal symmetric changes and are one of the leading diagnostic tool. The most common location of bilateral findings is basal ganglia and thalamus. There are a number of diseases affecting these structures symmetrically: metabolic and systemic diseases, intoxication, neurodegeneration and vascular conditions, toxoplasmosis, tumors and some infections. Malformations of cortical development and especially bilateral perisylvian polymicrogyria requires not only exact report on the most affected parts but in some cases genetic tests or combination with other clinical symptoms. In the case of herpes simplex encephalitis bilateral temporal involvement is common and this finding very often prompt therapy even before laboratory results. Posterior reversible encephalopathy syndrome (PReS) and some forms of hypoxic ischemic encephalopathy can lead to symmetric changes. In these acute conditions MR plays a crucial role not only in diagnosis but also in monitoring of the therapeutic effect. Patients with neurofibromatosis type 1 or type 2 can demonstrate bilateral optic glioma combined with spinal neurofibroma and bilateral acoustic schwanoma respectively. Mirror-image aneurysm affecting both internal carotid or middle cerebral arteries is an example of symmetry in

  19. Analytical Study on Propagation Dynamics of Optical Beam in Parity-Time Symmetric Optical Couplers

    International Nuclear Information System (INIS)

    Zhou Zheng; Zhang Li-Juan; Zhu Bo

    2015-01-01

    We present exact analytical solutions to parity-time (PT) symmetric optical system describing light transport in PT-symmetric optical couplers. We show that light intensity oscillates periodically between two waveguides for unbroken PT-symmetric phase, whereas light always leaves the system from the waveguide experiencing gain when light is initially input at either waveguide experiencing gain or waveguide experiencing loss for broken PT-symmetric phase. These analytical results agree with the recent experimental observation reported by Rüter et al. [Nat. Phys. 6 (2010) 192]. Besides, we present a scheme for manipulating PT symmetry by applying a periodic modulation. Our results provide an efficient way to control light propagation in periodically modulated PT-symmetric system by tuning the modulation amplitude and frequency. (paper)

  20. Duality, phase structures, and dilemmas in symmetric quantum games

    International Nuclear Information System (INIS)

    Ichikawa, Tsubasa; Tsutsui, Izumi

    2007-01-01

    Symmetric quantum games for 2-player, 2-qubit strategies are analyzed in detail by using a scheme in which all pure states in the 2-qubit Hilbert space are utilized for strategies. We consider two different types of symmetric games exemplified by the familiar games, the Battle of the Sexes (BoS) and the Prisoners' Dilemma (PD). These two types of symmetric games are shown to be related by a duality map, which ensures that they share common phase structures with respect to the equilibria of the strategies. We find eight distinct phase structures possible for the symmetric games, which are determined by the classical payoff matrices from which the quantum games are defined. We also discuss the possibility of resolving the dilemmas in the classical BoS, PD, and the Stag Hunt (SH) game based on the phase structures obtained in the quantum games. It is observed that quantization cannot resolve the dilemma fully for the BoS, while it generically can for the PD and SH if appropriate correlations for the strategies of the players are provided

  1. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  2. Parity-Time Symmetric Photonics

    KAUST Repository

    Zhao, Han

    2018-01-17

    The establishment of non-Hermitian quantum mechanics (such as parity-time (PT) symmetry) stimulates a paradigmatic shift for studying symmetries of complex potentials. Owing to the convenient manipulation of optical gain and loss in analogy to the complex quantum potentials, photonics provides an ideal platform for visualization of many conceptually striking predictions from the non-Hermitian quantum theory. A rapidly developing field has emerged, namely, PT symmetric photonics, demonstrating intriguing optical phenomena including eigenstate coalescence and spontaneous PT symmetry breaking. The advance of quantum physics, as the feedback, provides photonics with brand-new paradigms to explore the entire complex permittivity plane for novel optical functionalities. Here, we review recent exciting breakthroughs in PT symmetric photonics while systematically presenting their underlying principles guided by non-Hermitian symmetries. The potential device applications for optical communication and computing, bio-chemical sensing, and healthcare are also discussed.

  3. Homotheties of cylindrically symmetric static spacetimes

    International Nuclear Information System (INIS)

    Qadir, A.; Ziad, M.; Sharif, M.

    1998-08-01

    In this note we consider the homotheties of cylindrically symmetric static spacetimes. We find that we can provide a complete list of all metrics that admit non-trivial homothetic motions and are cylindrically symmetric static. (author)

  4. Maximally Symmetric Composite Higgs Models.

    Science.gov (United States)

    Csáki, Csaba; Ma, Teng; Shu, Jing

    2017-09-29

    Maximal symmetry is a novel tool for composite pseudo Goldstone boson Higgs models: it is a remnant of an enhanced global symmetry of the composite fermion sector involving a twisting with the Higgs field. Maximal symmetry has far-reaching consequences: it ensures that the Higgs potential is finite and fully calculable, and also minimizes the tuning. We present a detailed analysis of the maximally symmetric SO(5)/SO(4) model and comment on its observational consequences.

  5. On symmetric structures of order two

    Directory of Open Access Journals (Sweden)

    Michel Bousquet

    2008-04-01

    Full Text Available Let (ω n 0 < n be the sequence known as Integer Sequence A047749 http://www.research.att.com/ njas/sequences/A047749 In this paper, we show that the integer ω n enumerates various kinds of symmetric structures of order two. We first consider ternary trees having a reflexive symmetry and we relate all symmetric combinatorial objects by means of bijection. We then generalize the symmetric structures and correspondences to an infinite family of symmetric objects.

  6. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  7. Symmetric vs. asymmetric stem cell divisions: an adaptation against cancer?

    Directory of Open Access Journals (Sweden)

    Leili Shahriyari

    Full Text Available Traditionally, it has been held that a central characteristic of stem cells is their ability to divide asymmetrically. Recent advances in inducible genetic labeling provided ample evidence that symmetric stem cell divisions play an important role in adult mammalian homeostasis. It is well understood that the two types of cell divisions differ in terms of the stem cells' flexibility to expand when needed. On the contrary, the implications of symmetric and asymmetric divisions for mutation accumulation are still poorly understood. In this paper we study a stochastic model of a renewing tissue, and address the optimization problem of tissue architecture in the context of mutant production. Specifically, we study the process of tumor suppressor gene inactivation which usually takes place as a consequence of two "hits", and which is one of the most common patterns in carcinogenesis. We compare and contrast symmetric and asymmetric (and mixed stem cell divisions, and focus on the rate at which double-hit mutants are generated. It turns out that symmetrically-dividing cells generate such mutants at a rate which is significantly lower than that of asymmetrically-dividing cells. This result holds whether single-hit (intermediate mutants are disadvantageous, neutral, or advantageous. It is also independent on whether the carcinogenic double-hit mutants are produced only among the stem cells or also among more specialized cells. We argue that symmetric stem cell divisions in mammals could be an adaptation which helps delay the onset of cancers. We further investigate the question of the optimal fraction of stem cells in the tissue, and quantify the contribution of non-stem cells in mutant production. Our work provides a hypothesis to explain the observation that in mammalian cells, symmetric patterns of stem cell division seem to be very common.

  8. Experimental pseudo-symmetric trap EPSILON

    International Nuclear Information System (INIS)

    Skovoroda, A.A.; Arsenin, V.V.; Dlougach, E.D.; Kulygin, V.M.; Kuyanov, A.Yu.; Timofeev, A.V.; Zhil'tsov, V.A.; Zvonkov, A.V.

    2001-01-01

    Within the framework of the conceptual project 'Adaptive Plasma EXperiment' a trap with the closed magnetic field lines 'Experimental Pseudo-Symmetric trap' is examined. The project APEX is directed at the theoretical and experimental development of physical foundations for stationary thermonuclear reactor on the basis of an alternative magnetic trap with tokamak-level confinement of high β plasma. The fundamental principle of magnetic field pseudosymmetry that should be satisfied for plasma to have tokamak-like confinement is discussed. The calculated in paraxial approximation examples of pseudosymmetric curvilinear elements with poloidal direction of B isolines are adduced. The EPSILON trap consisting of two straight axisymmetric mirrors linked by two curvilinear pseudosymmetric elements is considered. The plasma currents are short-circuited within the curvilinear element what increases the equilibrium β. The untraditional scheme of MHD stabilization of a trap with the closed field lines by the use of divertor inserted into axisymmetric mirror is analyzed. The experimental installation EPSILON-OME that is under construction for experimental check of divertor stabilization is discussed. The possibility of ECR plasma production in EPSILON-OME under conditions of high density and small magnetic field is examined. (author)

  9. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  10. Baryon symmetric big bang cosmology

    International Nuclear Information System (INIS)

    Stecker, F.W.

    1978-01-01

    It is stated that the framework of baryon symmetric big bang (BSBB) cosmology offers our greatest potential for deducting the evolution of the Universe because its physical laws and processes have the minimum number of arbitrary assumptions about initial conditions in the big-bang. In addition, it offers the possibility of explaining the photon-baryon ratio in the Universe and how galaxies and galaxy clusters are formed. BSBB cosmology also provides the only acceptable explanation at present for the origin of the cosmic γ-ray background radiation. (author)

  11. Symmetric functions and orthogonal polynomials

    CERN Document Server

    Macdonald, I G

    1997-01-01

    One of the most classical areas of algebra, the theory of symmetric functions and orthogonal polynomials has long been known to be connected to combinatorics, representation theory, and other branches of mathematics. Written by perhaps the most famous author on the topic, this volume explains some of the current developments regarding these connections. It is based on lectures presented by the author at Rutgers University. Specifically, he gives recent results on orthogonal polynomials associated with affine Hecke algebras, surveying the proofs of certain famous combinatorial conjectures.

  12. Immanant Conversion on Symmetric Matrices

    Directory of Open Access Journals (Sweden)

    Purificação Coelho M.

    2014-01-01

    Full Text Available Letr Σn(C denote the space of all n χ n symmetric matrices over the complex field C. The main objective of this paper is to prove that the maps Φ : Σn(C -> Σn (C satisfying for any fixed irre- ducible characters X, X' -SC the condition dx(A +aB = dχ·(Φ(Α + αΦ(Β for all matrices A,В ε Σ„(С and all scalars a ε C are automatically linear and bijective. As a corollary of the above result we characterize all such maps Φ acting on ΣИ(С.

  13. Dispersion in a bent-solenoid channel with symmetric focusing

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Chun-xi [Argonne National Lab. (ANL), Argonne, IL (United States)

    2001-08-21

    Longitudinal ionization cooling of a muon beam is essential for muon colliders and will be useful for neutrino factories. Bent-solenoid channels with symmetric focusing has been considered for beam focusing and for generating the required dispersion in the ``emittance exchange'' scheme of longitudinal cooling. In this paper, we derive the Hamiltonian that governs the linear beam dynamics of a bent-solenoid channel, solve the single-particle dynamics, and give equations for determining the lattice functions, in particular, the dispersion functions.

  14. The generalised Sylvester matrix equations over the generalised bisymmetric and skew-symmetric matrices

    Science.gov (United States)

    Dehghan, Mehdi; Hajarian, Masoud

    2012-08-01

    A matrix P is called a symmetric orthogonal if P = P T = P -1. A matrix X is said to be a generalised bisymmetric with respect to P if X = X T = PXP. It is obvious that any symmetric matrix is also a generalised bisymmetric matrix with respect to I (identity matrix). By extending the idea of the Jacobi and the Gauss-Seidel iterations, this article proposes two new iterative methods, respectively, for computing the generalised bisymmetric (containing symmetric solution as a special case) and skew-symmetric solutions of the generalised Sylvester matrix equation ? (including Sylvester and Lyapunov matrix equations as special cases) which is encountered in many systems and control applications. When the generalised Sylvester matrix equation has a unique generalised bisymmetric (skew-symmetric) solution, the first (second) iterative method converges to the generalised bisymmetric (skew-symmetric) solution of this matrix equation for any initial generalised bisymmetric (skew-symmetric) matrix. Finally, some numerical results are given to illustrate the effect of the theoretical results.

  15. Quantum work relations and response theory in parity-time-symmetric quantum systems

    Science.gov (United States)

    Wei, Bo-Bo

    2018-01-01

    In this work, we show that a universal quantum work relation for a quantum system driven arbitrarily far from equilibrium extends to a parity-time- (PT -) symmetric quantum system with unbroken PT symmetry, which is a consequence of microscopic reversibility. The quantum Jarzynski equality, linear response theory, and Onsager reciprocal relations for the PT -symmetric quantum system are recovered as special cases of the universal quantum work relation in a PT -symmetric quantum system. In the regime of broken PT symmetry, the universal quantum work relation does not hold because the norm is not preserved during the dynamics.

  16. Symmetric coupling of angular momenta, quadratic algebras and discrete polynomials

    International Nuclear Information System (INIS)

    Aquilanti, V; Marinelli, D; Marzuoli, A

    2014-01-01

    Eigenvalues and eigenfunctions of the volume operator, associated with the symmetric coupling of three SU(2) angular momentum operators, can be analyzed on the basis of a discrete Schrödinger–like equation which provides a semiclassical Hamiltonian picture of the evolution of a 'quantum of space', as shown by the authors in [1]. Emphasis is given here to the formalization in terms of a quadratic symmetry algebra and its automorphism group. This view is related to the Askey scheme, the hierarchical structure which includes all hypergeometric polynomials of one (discrete or continuous) variable. Key tool for this comparative analysis is the duality operation defined on the generators of the quadratic algebra and suitably extended to the various families of overlap functions (generalized recoupling coefficients). These families, recognized as lying at the top level of the Askey scheme, are classified and a few limiting cases are addressed

  17. Stabilization of self-mode-locked quantum dash lasers by symmetric dual-loop optical feedback

    Science.gov (United States)

    Asghar, Haroon; Wei, Wei; Kumar, Pramod; Sooudi, Ehsan; McInerney, John. G.

    2018-02-01

    We report experimental studies of the influence of symmetric dual-loop optical feedback on the RF linewidth and timing jitter of self-mode-locked two-section quantum dash lasers emitting at 1550 nm. Various feedback schemes were investigated and optimum levels determined for narrowest RF linewidth and low timing jitter, for single-loop and symmetric dual-loop feedback. Two symmetric dual-loop configurations, with balanced and unbalanced feedback ratios, were studied. We demonstrate that unbalanced symmetric dual loop feedback, with the inner cavity resonant and fine delay tuning of the outer loop, gives narrowest RF linewidth and reduced timing jitter over a wide range of delay, unlike single and balanced symmetric dual-loop configurations. This configuration with feedback lengths 80 and 140 m narrows the RF linewidth by 4-67x and 10-100x, respectively, across the widest delay range, compared to free-running. For symmetric dual-loop feedback, the influence of different power split ratios through the feedback loops was determined. Our results show that symmetric dual-loop feedback is markedly more effective than single-loop feedback in reducing RF linewidth and timing jitter, and is much less sensitive to delay phase, making this technique ideal for applications where robustness and alignment tolerance are essential.

  18. Quantum secure direct communication scheme using a W state and teleportation

    International Nuclear Information System (INIS)

    Cao Haijing; Song Heshan

    2006-01-01

    A theoretical scheme for quantum secure direct communication (QSDC) is proposed, where a three-qubit symmetric W state functions as a quantum channel. Two legitimate communicators can transmit their secret information by using quantum teleportation and local measurements

  19. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2018-03-07

    Mar 7, 2018 ... Eurostat and the Ministry of Economic Development. 4. .... regard to the application of special national schemes for small enterprises. ... 2013) mentions a two-year exemption from the tax on joint stock companies and local taxes. ... specialized support programs are developed, such as the introduction of the ...

  20. Symmetric large momentum transfer for atom interferometry with BECs

    Science.gov (United States)

    Abend, Sven; Gebbe, Martina; Gersemann, Matthias; Rasel, Ernst M.; Quantus Collaboration

    2017-04-01

    We develop and demonstrate a novel scheme for a symmetric large momentum transfer beam splitter for interferometry with Bose-Einstein condensates. Large momentum transfer beam splitters are a key technique to enhance the scaling factor and sensitivity of an atom interferometer and to create largely delocalized superposition states. To realize the beam splitter, double Bragg diffraction is used to create a superposition of two symmetric momentum states. Afterwards both momentum states are loaded into a retro-reflected optical lattice and accelerated by Bloch oscillations on opposite directions, keeping the initial symmetry. The favorable scaling behavior of this symmetric acceleration, allows to transfer more than 1000 ℏk of total differential splitting in a single acceleration sequence of 6 ms duration while we still maintain a fraction of approx. 25% of the initial atom number. As a proof of the coherence of this beam splitter, contrast in a closed Mach-Zehnder atom interferometer has been observed with up to 208 ℏk of momentum separation, which equals a differential wave-packet velocity of approx. 1.1 m/s for 87Rb. The presented work is supported by the CRC 1128 geo-Q and the DLR with funds provided by the Federal Ministry of Economic Affairs and Energy (BMWi) due to an enactment of the German Bundestag under Grant No. DLR 50WM1552-1557 (QUANTUS-IV-Fallturm).

  1. Probabilistic cloning of three symmetric states

    International Nuclear Information System (INIS)

    Jimenez, O.; Bergou, J.; Delgado, A.

    2010-01-01

    We study the probabilistic cloning of three symmetric states. These states are defined by a single complex quantity, the inner product among them. We show that three different probabilistic cloning machines are necessary to optimally clone all possible families of three symmetric states. We also show that the optimal cloning probability of generating M copies out of one original can be cast as the quotient between the success probability of unambiguously discriminating one and M copies of symmetric states.

  2. Classification of symmetric toroidal orbifolds

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, Maximilian; Ratz, Michael; Torrado, Jesus [Technische Univ. Muenchen, Garching (Germany). Physik-Department; Vaudrevange, Patrick K.S. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2012-09-15

    We provide a complete classification of six-dimensional symmetric toroidal orbifolds which yield N{>=}1 supersymmetry in 4D for the heterotic string. Our strategy is based on a classification of crystallographic space groups in six dimensions. We find in total 520 inequivalent toroidal orbifolds, 162 of them with Abelian point groups such as Z{sub 3}, Z{sub 4}, Z{sub 6}-I etc. and 358 with non-Abelian point groups such as S{sub 3}, D{sub 4}, A{sub 4} etc. We also briefly explore the properties of some orbifolds with Abelian point groups and N=1, i.e. specify the Hodge numbers and comment on the possible mechanisms (local or non-local) of gauge symmetry breaking.

  3. Relativistic fluids in spherically symmetric space

    International Nuclear Information System (INIS)

    Dipankar, R.

    1977-12-01

    Some of McVittie and Wiltshire's (1977) solutions of Walker's (1935) isotropy conditions for relativistic perfect fluid spheres are generalized. Solutions are spherically symmetric and conformally flat

  4. The Approximate Capacity Region of the Symmetric $K$-user Gaussian Interference Channel with Strong Interference

    KAUST Repository

    Chaaban, Anas; Sezgin, Aydin

    2016-01-01

    The symmetric K-user interference channel is studied with the goal of characterizing its capacity region in the strong interference regime within a constant gap. The achievable rate region of a scheme combining rate-splitting at the transmitters and interference alignment and successive decoding/computation at the receivers is derived. Next it is shown that this scheme achieves the so-called greedy-max corner points of the capacity region within a constant gap. By combining this result with previous results by Ordentlich et al. on the sum-capacity of the symmetric interference channel, a constant gap characterization of the capacity region for the strong interference regime is obtained. This leads to the first approximate characterization of the capacity region of the symmetric K-user IC. Furthermore, a new scheme that achieves the sum-capacity of the channel in the strong interference regime within a constant gap is also proposed, and the corresponding gap is calculated. The advantage of the new scheme is that it leads to a characterization within a constant gap without leaving an outage set contrary to the scheme by Ordentlich et al..

  5. The Approximate Capacity Region of the Symmetric $K$-user Gaussian Interference Channel with Strong Interference

    KAUST Repository

    Chaaban, Anas

    2016-03-01

    The symmetric K-user interference channel is studied with the goal of characterizing its capacity region in the strong interference regime within a constant gap. The achievable rate region of a scheme combining rate-splitting at the transmitters and interference alignment and successive decoding/computation at the receivers is derived. Next it is shown that this scheme achieves the so-called greedy-max corner points of the capacity region within a constant gap. By combining this result with previous results by Ordentlich et al. on the sum-capacity of the symmetric interference channel, a constant gap characterization of the capacity region for the strong interference regime is obtained. This leads to the first approximate characterization of the capacity region of the symmetric K-user IC. Furthermore, a new scheme that achieves the sum-capacity of the channel in the strong interference regime within a constant gap is also proposed, and the corresponding gap is calculated. The advantage of the new scheme is that it leads to a characterization within a constant gap without leaving an outage set contrary to the scheme by Ordentlich et al..

  6. Probabilistic Teleportation of Arbitrary Two-Qubit Quantum State via Non-Symmetric Quantum Channel

    Directory of Open Access Journals (Sweden)

    Kan Wang

    2018-03-01

    Full Text Available Quantum teleportation has significant meaning in quantum information. In particular, entangled states can also be used for perfectly teleporting the quantum state with some probability. This is more practical and efficient in practice. In this paper, we propose schemes to use non-symmetric quantum channel combinations for probabilistic teleportation of an arbitrary two-qubit quantum state from sender to receiver. The non-symmetric quantum channel is composed of a two-qubit partially entangled state and a three-qubit partially entangled state, where partially entangled Greenberger–Horne–Zeilinger (GHZ state and W state are considered, respectively. All schemes are presented in detail and the unitary operations required are given in concise formulas. Methods are provided for reducing classical communication cost and combining operations to simplify the manipulation. Moreover, our schemes are flexible and applicable in different situations.

  7. Two-level schemes for the advection equation

    Science.gov (United States)

    Vabishchevich, Petr N.

    2018-06-01

    The advection equation is the basis for mathematical models of continuum mechanics. In the approximate solution of nonstationary problems it is necessary to inherit main properties of the conservatism and monotonicity of the solution. In this paper, the advection equation is written in the symmetric form, where the advection operator is the half-sum of advection operators in conservative (divergent) and non-conservative (characteristic) forms. The advection operator is skew-symmetric. Standard finite element approximations in space are used. The standard explicit two-level scheme for the advection equation is absolutely unstable. New conditionally stable regularized schemes are constructed, on the basis of the general theory of stability (well-posedness) of operator-difference schemes, the stability conditions of the explicit Lax-Wendroff scheme are established. Unconditionally stable and conservative schemes are implicit schemes of the second (Crank-Nicolson scheme) and fourth order. The conditionally stable implicit Lax-Wendroff scheme is constructed. The accuracy of the investigated explicit and implicit two-level schemes for an approximate solution of the advection equation is illustrated by the numerical results of a model two-dimensional problem.

  8. The arbitrary order mimetic finite difference method for a diffusion equation with a non-symmetric diffusion tensor

    Science.gov (United States)

    Gyrya, V.; Lipnikov, K.

    2017-11-01

    We present the arbitrary order mimetic finite difference (MFD) discretization for the diffusion equation with non-symmetric tensorial diffusion coefficient in a mixed formulation on general polygonal meshes. The diffusion tensor is assumed to be positive definite. The asymmetry of the diffusion tensor requires changes to the standard MFD construction. We present new approach for the construction that guarantees positive definiteness of the non-symmetric mass matrix in the space of discrete velocities. The numerically observed convergence rate for the scalar quantity matches the predicted one in the case of the lowest order mimetic scheme. For higher orders schemes, we observed super-convergence by one order for the scalar variable which is consistent with the previously published result for a symmetric diffusion tensor. The new scheme was also tested on a time-dependent problem modeling the Hall effect in the resistive magnetohydrodynamics.

  9. Comprehensive asynchronous symmetric rendezvous algorithm in ...

    Indian Academy of Sciences (India)

    Meenu Chawla

    2017-11-10

    Nov 10, 2017 ... Simulation results affirm that CASR algorithm performs better in terms of average time-to-rendezvous as compared ... process; neighbour discovery; symmetric rendezvous algorithm. 1. .... dezvous in finite time under the symmetric model. The CH ..... CASR algorithm in Matlab 7.11 and performed several.

  10. Symmetric splitting of very light systems

    International Nuclear Information System (INIS)

    Grotowski, K.; Majka, Z.; Planeta, R.

    1985-01-01

    Fission reactions that produce fragments close to one half the mass of the composite system are traditionally observed in heavy nuclei. In light systems, symmetric splitting is rarely observed and poorly understood. It would be interesting to verify the existence of the symmetric splitting of compound nuclei with A 12 C + 40 Ca, 141 MeV 9 Be + 40 Ca and 153 MeV 6 Li + 40 Ca. The out-of-plane correlation of symmetric products was also measured for the reaction 186 MeV 12 C + 40 Ca. The coincidence measurements of the 12 C + 40 Ca system demonstrated that essentially all of the inclusive yield of symmetric products around 40 0 results from a binary decay. To characterize the dependence of the symmetric splitting process on the excitation energy of the 12 C + 40 C system, inclusive measurements were made at bombarding energies of 74, 132, 162, and 185 MeV

  11. Spherically symmetric charged compact stars

    Energy Technology Data Exchange (ETDEWEB)

    Maurya, S.K. [University of Nizwa, Department of Mathematical and Physical Sciences, College of Arts and Science, Nizwa (Oman); Gupta, Y.K. [Jaypee Institute of Information Technology University, Department of Mathematics, Noida, Uttar Pradesh (India); Ray, Saibal [Government College of Engineering and Ceramic Technology, Department of Physics, Kolkata, West Bengal (India); Chowdhury, Sourav Roy [Seth Anandaram Jaipuria College, Department of Physics, Kolkata, West Bengal (India)

    2015-08-15

    In this article we consider the static spherically symmetric metric of embedding class 1. When solving the Einstein-Maxwell field equations we take into account the presence of ordinary baryonic matter together with the electric charge. Specific new charged stellar models are obtained where the solutions are entirely dependent on the electromagnetic field, such that the physical parameters, like density, pressure etc. do vanish for the vanishing charge. We systematically analyze altogether the three sets of Solutions I, II, and III of the stellar models for a suitable functional relation of ν(r). However, it is observed that only the Solution I provides a physically valid and well-behaved situation, whereas the Solutions II and III are not well behaved and hence not included in the study. Thereafter it is exclusively shown that the Solution I can pass through several standard physical tests performed by us. To validate the solution set presented here a comparison has also been made with that of the compact stars, like RX J 1856 - 37, Her X - 1, PSR 1937+21, PSRJ 1614-2230, and PSRJ 0348+0432, and we have shown the feasibility of the models. (orig.)

  12. Symmetric low-voltage powering system for relativistic electronic devices

    International Nuclear Information System (INIS)

    Agafonov, A.V.; Lebedev, A.N.; Krastelev, E.G.

    2005-01-01

    A special driver for double-sided powering of relativistic magnetrons and several methods of localized electron flow forming in the interaction region of relativistic magnetrons are proposed and discussed. Two experimental installations are presented and discussed. One of them is designed for laboratory research and demonstration experiments at a rather low voltage. The other one is a prototype of a full-scale installation for an experimental research at relativistic levels of voltages on the microwave generation in the new integrated system consisting of a relativistic magnetron and symmetrical induction driver

  13. Diagonalization of the symmetrized discrete i th right shift operator

    Science.gov (United States)

    Fuentes, Marc

    2007-01-01

    In this paper, we consider the symmetric part of the so-called ith right shift operator. We determine its eigenvalues as also the associated eigenvectors in a complete and closed form. The proposed proof is elementary, using only basical skills such as Trigonometry, Arithmetic and Linear algebra. The first section is devoted to the introduction of the tackled problem. Second and third parts contain almost all the ?technical? stuff of the proofE Afterwards, we continue with the end of the proof, provide a graphical illustration of the results, as well as an application on the polyhedral ?sandwiching? of a special compact of arising in Signal theory.

  14. Uniqueness of flat spherically symmetric spacelike hypersurfaces admitted by spherically symmetric static spacetimes

    Science.gov (United States)

    Beig, Robert; Siddiqui, Azad A.

    2007-11-01

    It is known that spherically symmetric static spacetimes admit a foliation by flat hypersurfaces. Such foliations have explicitly been constructed for some spacetimes, using different approaches, but none of them have proved or even discussed the uniqueness of these foliations. The issue of uniqueness becomes more important due to suitability of flat foliations for studying black hole physics. Here, flat spherically symmetric spacelike hypersurfaces are obtained by a direct method. It is found that spherically symmetric static spacetimes admit flat spherically symmetric hypersurfaces, and that these hypersurfaces are unique up to translation under the timelike Killing vector. This result guarantees the uniqueness of flat spherically symmetric foliations for such spacetimes.

  15. Complex {PT}-symmetric extensions of the nonlinear ultra-short light pulse model

    Science.gov (United States)

    Yan, Zhenya

    2012-11-01

    The short pulse equation u_{xt}=u+\\frac{1}{2}(u^2u_x)_x is PT symmetric, which arises in nonlinear optics for the ultra-short pulse case. We present a family of new complex PT-symmetric extensions of the short pulse equation, i[(iu_x)^{\\sigma }]_t=au+bu^m+ic[u^n(iu_x)^{\\epsilon }]_x \\,\\, (\\sigma ,\\, \\epsilon ,\\,a,\\,b,\\,c,\\,m,\\,n \\in {R}), based on the complex PT-symmetric extension principle. Some properties of these equations with some chosen parameters are studied including the Hamiltonian structures and exact solutions such as solitary wave solutions, doubly periodic wave solutions and compacton solutions. Our results may be useful to understand complex PT-symmetric nonlinear physical models. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’.

  16. A symmetric positive definite formulation for monolithic fluid structure interaction

    KAUST Repository

    Robinson-Mosher, Avi; Schroeder, Craig; Fedkiw, Ronald

    2011-01-01

    In this paper we consider a strongly coupled (monolithic) fluid structure interaction framework for incompressible flow, as opposed to a loosely coupled (partitioned) method. This requires solving a single linear system that combines the unknown velocities of the structure with the unknown pressures of the fluid. In our previous work, we were able to obtain a symmetric formulation of this coupled system; however, it was also indefinite, making it more difficult to solve. In fact in practice there have been cases where we have been unable to invert the system. In this paper we take a novel approach that consists of factoring the damping matrix of deformable structures and show that this can be used to obtain a symmetric positive definite system, at least to the extent that the uncoupled systems were symmetric positive definite. We use a traditional MAC grid discretization of the fluid and a fully Lagrangian discretization of the structures for the sake of exposition, noting that our procedure can be generalized to other scenarios. For the special case of rigid bodies, where there are no internal damping forces, we exactly recover the system of Batty et al. (2007) [4]. © 2010 Elsevier Inc.

  17. A symmetric positive definite formulation for monolithic fluid structure interaction

    KAUST Repository

    Robinson-Mosher, Avi

    2011-02-01

    In this paper we consider a strongly coupled (monolithic) fluid structure interaction framework for incompressible flow, as opposed to a loosely coupled (partitioned) method. This requires solving a single linear system that combines the unknown velocities of the structure with the unknown pressures of the fluid. In our previous work, we were able to obtain a symmetric formulation of this coupled system; however, it was also indefinite, making it more difficult to solve. In fact in practice there have been cases where we have been unable to invert the system. In this paper we take a novel approach that consists of factoring the damping matrix of deformable structures and show that this can be used to obtain a symmetric positive definite system, at least to the extent that the uncoupled systems were symmetric positive definite. We use a traditional MAC grid discretization of the fluid and a fully Lagrangian discretization of the structures for the sake of exposition, noting that our procedure can be generalized to other scenarios. For the special case of rigid bodies, where there are no internal damping forces, we exactly recover the system of Batty et al. (2007) [4]. © 2010 Elsevier Inc.

  18. The critical current of point symmetric Josephson tunnel junctions

    International Nuclear Information System (INIS)

    Monaco, Roberto

    2016-01-01

    Highlights: • We disclose some geometrical properties of the critical current field dependence that apply to a large class of Josephson junctions characterized by a point symmetric shape. • The developed theory is valid for any orientation of the applied magnetic field, therefore it allows the determine the consequences of field misalignment in the experimental setups. • We also address that the threshold curves of Josephson tunnel junctions with complex shapes can be expressed as a linear combination of the threshold curves of junctions with simpler point symmetric shapes. - Abstract: The physics of Josephson tunnel junctions drastically depends on their geometrical configurations. The shape of the junction determines the specific form of the magnetic-field dependence of its Josephson current. Here we address the magnetic diffraction patterns of specially shaped planar Josephson tunnel junctions in the presence of an in-plane magnetic field of arbitrary orientations. We focus on a wide ensemble of junctions whose shape is invariant under point reflection. We analyze the implications of this type of isometry and derive the threshold curves of junctions whose shape is the union or the relative complement of two point symmetric plane figures.

  19. Generalization of binary tensor product schemes depends upon four parameters

    International Nuclear Information System (INIS)

    Bashir, R.; Bari, M.; Mustafa, G.

    2018-01-01

    This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)

  20. The symmetric extendibility of quantum states

    International Nuclear Information System (INIS)

    Nowakowski, Marcin L

    2016-01-01

    Studies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement monotone based on the best symmetric approximation of a quantum state and the extendible number of a quantum state. We underpin these results with geometric observations about the structures of multi-party settings which posses substantial symmetric extendible components in their subspaces. The impossibility of reducing the maximal symmetric extendibility by means of the one-way local operations and classical communication method is pointed out on multiple copies. Finally, we state a conjecture linking symmetric extendibility with the one-way distillability and security of all quantum states, analyzing the behavior of a private key in the neighborhood of symmetric extendible states. (paper)

  1. Averaging in spherically symmetric cosmology

    International Nuclear Information System (INIS)

    Coley, A. A.; Pelavas, N.

    2007-01-01

    The averaging problem in cosmology is of fundamental importance. When applied to study cosmological evolution, the theory of macroscopic gravity (MG) can be regarded as a long-distance modification of general relativity. In the MG approach to the averaging problem in cosmology, the Einstein field equations on cosmological scales are modified by appropriate gravitational correlation terms. We study the averaging problem within the class of spherically symmetric cosmological models. That is, we shall take the microscopic equations and effect the averaging procedure to determine the precise form of the correlation tensor in this case. In particular, by working in volume-preserving coordinates, we calculate the form of the correlation tensor under some reasonable assumptions on the form for the inhomogeneous gravitational field and matter distribution. We find that the correlation tensor in a Friedmann-Lemaitre-Robertson-Walker (FLRW) background must be of the form of a spatial curvature. Inhomogeneities and spatial averaging, through this spatial curvature correction term, can have a very significant dynamical effect on the dynamics of the Universe and cosmological observations; in particular, we discuss whether spatial averaging might lead to a more conservative explanation of the observed acceleration of the Universe (without the introduction of exotic dark matter fields). We also find that the correlation tensor for a non-FLRW background can be interpreted as the sum of a spatial curvature and an anisotropic fluid. This may lead to interesting effects of averaging on astrophysical scales. We also discuss the results of averaging an inhomogeneous Lemaitre-Tolman-Bondi solution as well as calculations of linear perturbations (that is, the backreaction) in an FLRW background, which support the main conclusions of the analysis

  2. Linac design algorithm with symmetric segments

    International Nuclear Information System (INIS)

    Takeda, Harunori; Young, L.M.; Nath, S.; Billen, J.H.; Stovall, J.E.

    1996-01-01

    The cell lengths in linacs of traditional design are typically graded as a function of particle velocity. By making groups of cells and individual cells symmetric in both the CCDTL AND CCL, the cavity design as well as mechanical design and fabrication is simplified without compromising the performance. We have implemented a design algorithm in the PARMILA code in which cells and multi-cavity segments are made symmetric, significantly reducing the number of unique components. Using the symmetric algorithm, a sample linac design was generated and its performance compared with a similar one of conventional design

  3. Symmetric nuclear matter with Skyrme interaction

    International Nuclear Information System (INIS)

    Manisa, K.; Bicer, A.; Atav, U.

    2010-01-01

    The equation of state (EOS) and some properties of symmetric nuclear matter, such as the saturation density, saturation energy and incompressibility, are obtained by using Skyrme's density-dependent effective nucleon-nucleon interaction.

  4. Performance limitations of translationally symmetric nonimaging devices

    Science.gov (United States)

    Bortz, John C.; Shatz, Narkis E.; Winston, Roland

    2001-11-01

    The component of the optical direction vector along the symmetry axis is conserved for all rays propagated through a translationally symmetric optical device. This quality, referred to herein as the translational skew invariant, is analogous to the conventional skew invariant, which is conserved in rotationally symmetric optical systems. The invariance of both of these quantities is a consequence of Noether's theorem. We show how performance limits for translationally symmetric nonimaging optical devices can be derived from the distributions of the translational skew invariant for the optical source and for the target to which flux is to be transferred. Examples of computed performance limits are provided. In addition, we show that a numerically optimized non-tracking solar concentrator utilizing symmetry-breaking surface microstructure can overcome the performance limits associated with translational symmetry. The optimized design provides a 47.4% increase in efficiency and concentration relative to an ideal translationally symmetric concentrator.

  5. Symmetrical parahiliar infiltrated, cough and dyspnoea

    International Nuclear Information System (INIS)

    Giraldo Estrada, Horacio; Escalante, Hector

    2004-01-01

    It is the case a patient to who is diagnosed symmetrical parahiliar infiltrated; initially she is diagnosed lymphoma Hodgkin, treaty with radiotherapy and chemotherapy, but the X rays of the thorax demonstrated parahiliars and paramediastinals infiltrated

  6. Introduction to left-right symmetric models

    International Nuclear Information System (INIS)

    Grimus, W.

    1993-01-01

    We motivate left-right symmetric models by the possibility of spontaneous parity breaking. Then we describe the multiplets and the Lagrangian of such models. Finally we discuss lower bounds on the right-handed scale. (author)

  7. A cosmological problem for maximally symmetric supergravity

    International Nuclear Information System (INIS)

    German, G.; Ross, G.G.

    1986-01-01

    Under very general considerations it is shown that inflationary models of the universe based on maximally symmetric supergravity with flat potentials are unable to resolve the cosmological energy density (Polonyi) problem. (orig.)

  8. Theorem on axially symmetric gravitational vacuum configurations

    Energy Technology Data Exchange (ETDEWEB)

    Papadopoulos, A; Le Denmat, G [Paris-6 Univ., 75 (France). Inst. Henri Poincare

    1977-01-24

    A theorem is proved which asserts the non-existence of axially symmetric gravitational vacuum configurations with non-stationary rotation only. The eventual consequences in black-hole physics are suggested.

  9. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  10. Morse potential, symmetric Morse potential and bracketed bound-state energies

    Czech Academy of Sciences Publication Activity Database

    Znojil, Miloslav

    2016-01-01

    Roč. 31, č. 14 (2016), s. 1650088 ISSN 0217-7323 R&D Projects: GA ČR GA16-22945S Institutional support: RVO:61389005 Keywords : quantum bound states * special functions * Morse potential * symmetrized Morse potential * upper and lower energy estimates * computer-assisted symbolic manipulations Subject RIV: BE - Theoretical Physics Impact factor: 1.165, year: 2016

  11. Analytical results for non-Hermitian parity–time-symmetric and ...

    Indian Academy of Sciences (India)

    Abstract. We investigate both the non-Hermitian parity–time-(PT-)symmetric and Hermitian asymmetric volcano potentials, and present the analytical solution in terms of the confluent Heun function. Under certain special conditions, the confluent Heun function can be terminated as a polynomial, thereby leading to certain ...

  12. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  13. Symmetric Imidazolium-Based Paramagnetic Ionic Liquids

    Science.gov (United States)

    2017-11-29

    Charts N/A Unclassified Unclassified Unclassified SAR 14 Kamran Ghiassi N/A 1 Symmetric Imidazolium-Based Paramagnetic Ionic Liquids Kevin T. Greeson...NUMBER (Include area code) 29 November 2017 Briefing Charts 01 November 2017 - 30 November 2017 Symmetric Imidazolium-Based Paramagnetic Ionic ... Liquids K. Greeson, K. Ghiassi, J. Alston, N. Redeker, J. Marcischak, L. Gilmore, A. Guenthner Air Force Research Laboratory (AFMC) AFRL/RQRP 9 Antares

  14. The Symmetric Rudin-Shapiro Transform

    DEFF Research Database (Denmark)

    Harbo, Anders La-Cour

    2003-01-01

    A method for constructing spread spectrum sequences is presented. The method is based on a linear, orthogonal, and symmetric transform given as the Rudin-Shapiro transform (RST), which is in many respects quite similar to the Haar wavelet packet transform. The RST provides the means for generatin...... large sets of spread spectrum signals. This presentation provides a simple definition of the symmetric RST that leads to a fast N log(N) and numerically stable implementation of the transform....

  15. The Symmetric Rudin-Shapiro Transform

    DEFF Research Database (Denmark)

    Harbo, Anders La-Cour

    2003-01-01

    A method for constructing spread spectrum sequences is presented. The method is based on a linear, orthogonal, symmetric transform, the Rudin-Shapiro transform (RST), which is in many respects quite similar to the Haar wavelet packet transform. The RST provides the means for generating large sets...... of spread spectrum signals. This presentation provides a simple definition of the symmetric RST that leads to a fast N log(N) and numerically stable implementation of the transform....

  16. Pion condensation in symmetric nuclear matter

    International Nuclear Information System (INIS)

    Kabir, K.; Saha, S.; Nath, L.M.

    1987-09-01

    Using a model which is based essentially on the chiral SU(2)xSU(2) symmetry of the pion-nucleon interaction, we examine the possibility of pion condensation in symmetric nucleon matter. We find that the pion condensation is not likely to occur in symmetric nuclear matter for any finite value of the nuclear density. Consequently, no critical opalescence phenomenon is expected to be seen in the pion-nucleus interaction. (author). 20 refs

  17. Pion condensation in symmetric nuclear matter

    Science.gov (United States)

    Kabir, K.; Saha, S.; Nath, L. M.

    1988-01-01

    Using a model which is based essentially on the chiral SU(2)×SU(2) symmetry of the pion-nucleon interaction, we examine the possibility of pion condensation in symmetric nucleon matter. We find that the pion condensation is not likely to occur in symmetric nuclear matter for any finite value of the nuclear density. Consequently, no critical opalescence phenomenom is expected to be seen in the pion-nucleus interaction.

  18. Combinatorial interpretations of particular evaluations of complete and elementary symmetric functions

    OpenAIRE

    Mongelli, Pietro

    2011-01-01

    The Jacobi-Stirling numbers and the Legendre-Stirling numbers of the first and second kind were first introduced in [6], [7]. In this paper we note that Jacobi-Stirling numbers and Legendre-Stirling numbers are specializations of elementary and complete symmetric functions. We then study combinatorial interpretations of this specialization and obtain new combinatorial interpretations of the Jacobi-Stirling and Legendre-Stirling numbers.

  19. Capacity Bounds and Mapping Design for Binary Symmetric Relay Channels

    Directory of Open Access Journals (Sweden)

    Majid Nasiri Khormuji

    2012-12-01

    Full Text Available Capacity bounds for a three-node binary symmetric relay channel with orthogonal components at the destination are studied. The cut-set upper bound and the rates achievable using decode-and-forward (DF, partial DF and compress-and-forward (CF relaying are first evaluated. Then relaying strategies with finite memory-length are considered. An efficient algorithm for optimizing the relay functions is presented. The Boolean Fourier transform is then employed to unveil the structure of the optimized mappings. Interestingly, the optimized relay functions exhibit a simple structure. Numerical results illustrate that the rates achieved using the optimized low-dimensional functions are either comparable to those achieved by CF or superior to those achieved by DF relaying. In particular, the optimized low-dimensional relaying scheme can improve on DF relaying when the quality of the source-relay link is worse than or comparable to that of other links.

  20. Hardware Realization of Chaos-based Symmetric Video Encryption

    KAUST Repository

    Ibrahim, Mohamad A.

    2013-05-01

    This thesis reports original work on hardware realization of symmetric video encryption using chaos-based continuous systems as pseudo-random number generators. The thesis also presents some of the serious degradations caused by digitally implementing chaotic systems. Subsequently, some techniques to eliminate such defects, including the ultimately adopted scheme are listed and explained in detail. Moreover, the thesis describes original work on the design of an encryption system to encrypt MPEG-2 video streams. Information about the MPEG-2 standard that fits this design context is presented. Then, the security of the proposed system is exhaustively analyzed and the performance is compared with other reported systems, showing superiority in performance and security. The thesis focuses more on the hardware and the circuit aspect of the system’s design. The system is realized on Xilinx Vetrix-4 FPGA with hardware parameters and throughput performance surpassing conventional encryption systems.

  1. Thermoacoustic focusing lens by symmetric Airy beams with phase manipulations

    Science.gov (United States)

    Liu, Chen; Xia, Jian-Ping; Sun, Hong-Xiang; Yuan, Shou-Qi

    2017-12-01

    We report the realization of broadband acoustic focusing lenses based on two symmetric thermoacoustic phased arrays of Airy beams, in which the units of thermoacoustic phase control are designed by employing air with different temperatures surrounded by rigid insulated boundaries and thermal insulation films. The phase delays of the transmitted and reflected units could cover a whole 2π interval, which arises from the change of the sound velocity of air induced by the variation of the temperature. Based on the units of phase control, we design the transmitted and reflected acoustic focusing lenses with two symmetric Airy beams, and verify the high self-healing focusing characteristic and the feasibility of the thermal insulation films. Besides, the influences of the bending angle of the Airy beam on the focusing performance are discussed in detail. The proposed acoustic lens has advantages of broad bandwidth (about 4.8 kHz), high focusing performance, self-healing feature, and simple structure, which enable it to provide more schemes for acoustic focusing. It has excellent potential applications in acoustic devices.

  2. Closed Form Aliasing Probability For Q-ary Symmetric Errors

    Directory of Open Access Journals (Sweden)

    Geetani Edirisooriya

    1996-01-01

    Full Text Available In Built-In Self-Test (BIST techniques, test data reduction can be achieved using Linear Feedback Shift Registers (LFSRs. A faulty circuit may escape detection due to loss of information inherent to data compaction schemes. This is referred to as aliasing. The probability of aliasing in Multiple-Input Shift-Registers (MISRs has been studied under various bit error models. By modeling the signature analyzer as a Markov process we show that the closed form expression derived for aliasing probability previously, for MISRs with primitive polynomials under q-ary symmetric error model holds for all MISRs irrespective of their feedback polynomials and for group cellular automata signature analyzers as well. If the erroneous behaviour of a circuit can be modelled with q-ary symmetric errors, then the test circuit complexity and propagation delay associated with the signature analyzer can be minimized by using a set of m single bit LFSRs without increasing the probability of aliasing.

  3. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  4. Generation of Symmetric Dicke States of Remote Qubits with Linear Optics

    International Nuclear Information System (INIS)

    Thiel, C.; Zanthier, J. von; Bastin, T.; Solano, E.; Agarwal, G. S.

    2007-01-01

    We propose a method for generating all symmetric Dicke states, either in the long-lived internal levels of N massive particles or in the polarization degrees of freedom of photonic qubits, using linear optical tools only. By means of a suitable multiphoton detection technique, erasing Welcher-Weg information, our proposed scheme allows the generation and measurement of an important class of entangled multiqubit states

  5. Solving symmetric-definite quadratic lambda-matrix problems without factorization

    International Nuclear Information System (INIS)

    Scott, D.S.; Ward, R.C.

    1982-01-01

    Algorithms are presented for computing some of the eigenvalues and their associated eigenvectors of the quadratic lambda-matrix M lambda 2 C lambda + K. M, C, and K are assumed to have special symmetry-type properties which insure that theory analogous to the standard symmetric eigenproblem exists. The algorithms are based on a generalization of the Rayleigh quotient and the Lanczos method for computing eigenpairs of standard symmetric eigenproblems. Monotone quadratic convergence of the basic method is proved. Test examples are presented

  6. Crossing-symmetric solutions to low equations

    International Nuclear Information System (INIS)

    McLeod, R.J.; Ernst, D.J.

    1985-01-01

    Crossing symmetric models of the pion-nucleon interaction in which crossing symmetry is kept to lowest order in msub(π)/msub(N) are investigated. Two iterative techniques are developed to solve the crossing-symmetric Low equation. The techniques are used to solve the original Chew-Low equations and their generalizations to include the coupling to the pion-production channels. Small changes are found in comparison with earlier results which used an iterative technique proposed by Chew and Low and which did not produce crossing-symmetric results. The iterative technique of Chew and Low is shown to fail because of its inability to produce zeroes in the amplitude at complex energies while physical solutions to the model require such zeroes. We also prove that, within the class of solutions such that phase shifts approach zero for infinite energy, the solution to the Low equation is unique. (orig.)

  7. Revisiting the Optical PT-Symmetric Dimer

    Directory of Open Access Journals (Sweden)

    José Delfino Huerta Morales

    2016-08-01

    Full Text Available Optics has proved a fertile ground for the experimental simulation of quantum mechanics. Most recently, optical realizations of PT -symmetric quantum mechanics have been shown, both theoretically and experimentally, opening the door to international efforts aiming at the design of practical optical devices exploiting this symmetry. Here, we focus on the optical PT -symmetric dimer, a two-waveguide coupler where the materials show symmetric effective gain and loss, and provide a review of the linear and nonlinear optical realizations from a symmetry-based point of view. We go beyond a simple review of the literature and show that the dimer is just the smallest of a class of planar N-waveguide couplers that are the optical realization of the Lorentz group in 2 + 1 dimensions. Furthermore, we provide a formulation to describe light propagation through waveguide couplers described by non-Hermitian mode coupling matrices based on a non-Hermitian generalization of the Ehrenfest theorem.

  8. PT symmetric Aubry–Andre model

    International Nuclear Information System (INIS)

    Yuce, C.

    2014-01-01

    PT symmetric Aubry–Andre model describes an array of N coupled optical waveguides with position-dependent gain and loss. We show that the reality of the spectrum depends sensitively on the degree of quasi-periodicity for small number of lattice sites. We obtain the Hofstadter butterfly spectrum and discuss the existence of the phase transition from extended to localized states. We show that rapidly changing periodical gain/loss materials almost conserve the total intensity. - Highlights: • We show that PT symmetric Aubry–Andre model may have real spectrum. • We show that the reality of the spectrum depends sensitively on the degree of disorder. • We obtain the Hofstadter butterfly spectrum for PT symmetric Aubry–Andre model. • We discuss that phase transition from extended to localized states exists

  9. PT symmetric Aubry–Andre model

    Energy Technology Data Exchange (ETDEWEB)

    Yuce, C., E-mail: cyuce@anadolu.edu.tr

    2014-06-13

    PT symmetric Aubry–Andre model describes an array of N coupled optical waveguides with position-dependent gain and loss. We show that the reality of the spectrum depends sensitively on the degree of quasi-periodicity for small number of lattice sites. We obtain the Hofstadter butterfly spectrum and discuss the existence of the phase transition from extended to localized states. We show that rapidly changing periodical gain/loss materials almost conserve the total intensity. - Highlights: • We show that PT symmetric Aubry–Andre model may have real spectrum. • We show that the reality of the spectrum depends sensitively on the degree of disorder. • We obtain the Hofstadter butterfly spectrum for PT symmetric Aubry–Andre model. • We discuss that phase transition from extended to localized states exists.

  10. Symmetry theorems via the continuous steiner symmetrization

    Directory of Open Access Journals (Sweden)

    L. Ragoub

    2000-06-01

    Full Text Available Using a new approach due to F. Brock called the Steiner symmetrization, we show first that if $u$ is a solution of an overdetermined problem in the divergence form satisfying the Neumann and non-constant Dirichlet boundary conditions, then $Omega$ is an N-ball. In addition, we show that we can relax the condition on the value of the Dirichlet boundary condition in the case of superharmonicity. Finally, we give an application to positive solutions of some semilinear elliptic problems in symmetric domains for the divergence case.

  11. The Axially Symmetric One-Monopole

    International Nuclear Information System (INIS)

    Wong, K.-M.; Teh, Rosy

    2009-01-01

    We present new classical generalized one-monopole solution of the SU(2) Yang-Mills-Higgs theory with the Higgs field in the adjoint representation. We show that this solution with θ-winding number m = 1 and φ-winding number n = 1 is an axially symmetric generalization of the 't Hooft-Polyakov one-monopole. We construct this axially symmetric one-monopole solution by generalizing the large distance asymptotic solutions of the 't Hooft-Polyakov one-monopole to the Jacobi elliptic functions and solving the second order equations of motion numerically when the Higgs potential is vanishing. This solution is a non-BPS solution.

  12. Symmetric splitting of very light systems

    International Nuclear Information System (INIS)

    Grotowski, K.; Majka, Z.; Planeta, R.

    1984-01-01

    Inclusive and coincidence measurements have been performed to study symmetric products from the reactions 74--186 MeV 12 C+ 40 Ca, 141 MeV 9 Be+ 40 Ca, and 153 MeV 6 Li+ 40 Ca. The binary decay of the composite system has been verified. Energy spectra, angular distributions, and fragment correlations are presented. The total kinetic energies for the symmetric products from these very light composite systems are compared to liquid drop model calculations and fission systematics

  13. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  14. The theory of spherically symmetric thin shells in conformal gravity

    Science.gov (United States)

    Berezin, Victor; Dokuchaev, Vyacheslav; Eroshenko, Yury

    The spherically symmetric thin shells are the nearest generalizations of the point-like particles. Moreover, they serve as the simple sources of the gravitational fields both in General Relativity and much more complex quadratic gravity theories. We are interested in the special and physically important case when all the quadratic in curvature tensor (Riemann tensor) and its contractions (Ricci tensor and scalar curvature) terms are present in the form of the square of Weyl tensor. By definition, the energy-momentum tensor of the thin shell is proportional to Diracs delta-function. We constructed the theory of the spherically symmetric thin shells for three types of gravitational theories with the shell: (1) General Relativity; (2) Pure conformal (Weyl) gravity where the gravitational part of the total Lagrangian is just the square of the Weyl tensor; (3) Weyl-Einstein gravity. The results are compared with these in General Relativity (Israel equations). We considered in detail the shells immersed in the vacuum. Some peculiar properties of such shells are found. In particular, for the traceless ( = massless) shell, it is shown that their dynamics cannot be derived from the matching conditions and, thus, is completely arbitrary. On the contrary, in the case of the Weyl-Einstein gravity, the trajectory of the same type of shell is completely restored even without knowledge of the outside solution.

  15. WKB analysis of PT-symmetric Sturm–Liouville problems

    International Nuclear Information System (INIS)

    Bender, Carl M; Jones, Hugh F

    2012-01-01

    Most studies of PT-symmetric quantum-mechanical Hamiltonians have considered the Schrödinger eigenvalue problem on an infinite domain. This paper examines the consequences of imposing the boundary conditions on a finite domain. As is the case with regular Hermitian Sturm–Liouville problems, the eigenvalues of the PT-symmetric Sturm–Liouville problem grow like n 2 for large n. However, the novelty is that a PT eigenvalue problem on a finite domain typically exhibits a sequence of critical points at which pairs of eigenvalues cease to be real and become complex conjugates of one another. For the potentials considered here this sequence of critical points is associated with a turning point on the imaginary axis in the complex plane. WKB analysis is used to calculate the asymptotic behaviours of the real eigenvalues and the locations of the critical points. The method turns out to be surprisingly accurate even at low energies. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’. (paper)

  16. Spherically symmetric solutions of general second-order gravity

    International Nuclear Information System (INIS)

    Whitt, B.

    1988-01-01

    The general second-order gravity theory, whose Lagrangian includes higher powers of the curvature, is considered in arbitrary dimensions. It is shown that spherically symmetric solutions are static, except in certain, special, unphysical cases. Spherically symmetric solutions are found and classified. Each theory's solutions fall into a number of distinct branches, which may represent finite space with two singular boundaries, or an asymptotically either flat or (anti--)de Sitter space with one singular boundary. A theory may contain at most one branch of solutions in which all singularities are hidden by event horizons. Such horizons generally emit Hawking radiation, though in certain cases the horizon may have zero temperature. Black holes do not necessarily radiate away all their mass: they may terminate in a zero-temperature black hole, a naked singularity, or a hot black hole in equilibrium with a ''cosmological'' event horizon. The thermodynamics of black-hole solutions is discussed; entropy is found to be an increasing function of horizon area, and the first law is shown to hold

  17. Practical Leakage-Resilient Symmetric Cryptography

    DEFF Research Database (Denmark)

    Faust, Sebastian; Pietrzak, Krzysztof; Schipper, Joachim

    2012-01-01

    Leakage resilient cryptography attempts to incorporate side-channel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount of arbitr......Leakage resilient cryptography attempts to incorporate side-channel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount...

  18. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  19. Spherically symmetric solutions in abelian Kaluza-Klein theories

    International Nuclear Information System (INIS)

    Angus, I.G.

    1986-01-01

    We present the most general spherically symmetric solution to the field equations of the truncated five-dimensional Kaluza-Klein theory. We also detail some of the special forms of this solution. With the exception of the Gross-Perry-Sorkin monopole and the Schwarzschild solutions we find that most, and we conjecture all, of the solutions have naked curvature singularities. We then proceed to consider higher-dimensional theories with toroidal compactification and we exhibit a class of nonsingular monopole solutions which are the natural generalization of the Gross-Perry-Sorkin monopole to more than five dimensions. We also present some selected solutions including a solution pertaining to a model with a Ricci-flat, but not curvature-flat, internal manifold. All of these other solutions have naked curvature singularities. (orig.)

  20. Generalized transformations and coordinates for static spherically symmetric general relativity

    Science.gov (United States)

    Hill, James M.; O'Leary, Joseph

    2018-04-01

    We examine a static, spherically symmetric solution of the empty space field equations of general relativity with a non-orthogonal line element which gives rise to an opportunity that does not occur in the standard derivations of the Schwarzschild solution. In these derivations, convenient coordinate transformations and dynamical assumptions inevitably lead to the Schwarzschild solution. By relaxing these conditions, a new solution possibility arises and the resulting formalism embraces the Schwarzschild solution as a special case. The new solution avoids the coordinate singularity associated with the Schwarzschild solution and is achieved by obtaining a more suitable coordinate chart. The solution embodies two arbitrary constants, one of which can be identified as the Newtonian gravitational potential using the weak field limit. The additional arbitrary constant gives rise to a situation that allows for generalizations of the Eddington-Finkelstein transformation and the Kruskal-Szekeres coordinates.

  1. A symmetric geometric measure and the dynamics of quantum discord

    International Nuclear Information System (INIS)

    Jiang Feng-Jian; Shi Ming-Jun; Lü Hai-Jiang; Yan Xin-Hu

    2013-01-01

    A symmetric measure of quantum correlation based on the Hilbert—Schmidt distance is presented in this paper. For two-qubit states, we considerably simplify the optimization procedure so that numerical evaluation can be performed efficiently. Analytical expressions for the quantum correlation are attained for some special states. We further investigate the dynamics of quantum correlation of the system qubits in the presence of independent dissipative environments. Several nontrivial aspects are demonstrated. We find that the quantum correlation can increase even if the system state is suffering from dissipative noise. Sudden changes occur, even twice, in the time evolution of quantum correlation. There exists a certain correspondence between the evolution of quantum correlation in the systems and that in the environments, and the quantum correlation in the systems will be transferred into the environments completely and asymptotically. (general)

  2. Symmetric nonnegative matrix factorization: algorithms and applications to probabilistic clustering.

    Science.gov (United States)

    He, Zhaoshui; Xie, Shengli; Zdunek, Rafal; Zhou, Guoxu; Cichocki, Andrzej

    2011-12-01

    Nonnegative matrix factorization (NMF) is an unsupervised learning method useful in various applications including image processing and semantic analysis of documents. This paper focuses on symmetric NMF (SNMF), which is a special case of NMF decomposition. Three parallel multiplicative update algorithms using level 3 basic linear algebra subprograms directly are developed for this problem. First, by minimizing the Euclidean distance, a multiplicative update algorithm is proposed, and its convergence under mild conditions is proved. Based on it, we further propose another two fast parallel methods: α-SNMF and β -SNMF algorithms. All of them are easy to implement. These algorithms are applied to probabilistic clustering. We demonstrate their effectiveness for facial image clustering, document categorization, and pattern clustering in gene expression.

  3. Generalized transformations and coordinates for static spherically symmetric general relativity.

    Science.gov (United States)

    Hill, James M; O'Leary, Joseph

    2018-04-01

    We examine a static, spherically symmetric solution of the empty space field equations of general relativity with a non-orthogonal line element which gives rise to an opportunity that does not occur in the standard derivations of the Schwarzschild solution. In these derivations, convenient coordinate transformations and dynamical assumptions inevitably lead to the Schwarzschild solution. By relaxing these conditions, a new solution possibility arises and the resulting formalism embraces the Schwarzschild solution as a special case. The new solution avoids the coordinate singularity associated with the Schwarzschild solution and is achieved by obtaining a more suitable coordinate chart. The solution embodies two arbitrary constants, one of which can be identified as the Newtonian gravitational potential using the weak field limit. The additional arbitrary constant gives rise to a situation that allows for generalizations of the Eddington-Finkelstein transformation and the Kruskal-Szekeres coordinates.

  4. Emittance growth in non-symmetric beam configurations

    International Nuclear Information System (INIS)

    Anderson, O.A.

    1996-06-01

    Emittance growth in intense beams due to nonuniformity, mismatch, and misalignment has been analyzed by Reiser for the special case of axisymmetry. A more complex problem occurs in cases where a number of discrete beamlets are to be merged into a single focusing channel, for example, in designs for Heavy Ion Fusion drivers or Magnetic Fusion negative-ion systems. Celata, assuming the system to be perfectly matched and aligned, analyzed the case of four round beamlets arranged in a square array. We generalize these previous studies and analyze emittance growth in systems that are less symmetric. We include beam systems that are not necessarily matched and where the x and y moments may be unequal. We also include the possibility of initial convergence velocities that may differ in the two planes and allow for misalignment of the beam center-of-mass position and direction

  5. Small diameter symmetric networks from linear groups

    Science.gov (United States)

    Campbell, Lowell; Carlsson, Gunnar E.; Dinneen, Michael J.; Faber, Vance; Fellows, Michael R.; Langston, Michael A.; Moore, James W.; Multihaupt, Andrew P.; Sexton, Harlan B.

    1992-01-01

    In this note is reported a collection of constructions of symmetric networks that provide the largest known values for the number of nodes that can be placed in a network of a given degree and diameter. Some of the constructions are in the range of current potential engineering significance. The constructions are Cayley graphs of linear groups obtained by experimental computation.

  6. Sobolev spaces on bounded symmetric domains

    Czech Academy of Sciences Publication Activity Database

    Engliš, Miroslav

    Roč. 60, č. 12 ( 2015 ), s. 1712-1726 ISSN 1747-6933 Institutional support: RVO:67985840 Keywords : bounded symmetric domain * Sobolev space * Bergman space Subject RIV: BA - General Mathematics Impact factor: 0.466, year: 2015 http://www.tandfonline.com/doi/abs/10.1080/17476933. 2015 .1043910

  7. Cuspidal discrete series for semisimple symmetric spaces

    DEFF Research Database (Denmark)

    Andersen, Nils Byrial; Flensted-Jensen, Mogens; Schlichtkrull, Henrik

    2012-01-01

    We propose a notion of cusp forms on semisimple symmetric spaces. We then study the real hyperbolic spaces in detail, and show that there exists both cuspidal and non-cuspidal discrete series. In particular, we show that all the spherical discrete series are non-cuspidal. (C) 2012 Elsevier Inc. All...

  8. Exact solutions of the spherically symmetric multidimensional ...

    African Journals Online (AJOL)

    The complete orthonormalised energy eigenfunctions and the energy eigenvalues of the spherically symmetric isotropic harmonic oscillator in N dimensions, are obtained through the methods of separation of variables. Also, the degeneracy of the energy levels are examined. KEY WORDS: - Schrödinger Equation, Isotropic ...

  9. Super-symmetric informationally complete measurements

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Huangjun, E-mail: hzhu@pitp.ca

    2015-11-15

    Symmetric informationally complete measurements (SICs in short) are highly symmetric structures in the Hilbert space. They possess many nice properties which render them an ideal candidate for fiducial measurements. The symmetry of SICs is intimately connected with the geometry of the quantum state space and also has profound implications for foundational studies. Here we explore those SICs that are most symmetric according to a natural criterion and show that all of them are covariant with respect to the Heisenberg–Weyl groups, which are characterized by the discrete analog of the canonical commutation relation. Moreover, their symmetry groups are subgroups of the Clifford groups. In particular, we prove that the SIC in dimension 2, the Hesse SIC in dimension 3, and the set of Hoggar lines in dimension 8 are the only three SICs up to unitary equivalence whose symmetry groups act transitively on pairs of SIC projectors. Our work not only provides valuable insight about SICs, Heisenberg–Weyl groups, and Clifford groups, but also offers a new approach and perspective for studying many other discrete symmetric structures behind finite state quantum mechanics, such as mutually unbiased bases and discrete Wigner functions.

  10. Harmonic maps of the bounded symmetric domains

    International Nuclear Information System (INIS)

    Xin, Y.L.

    1994-06-01

    A shrinking property of harmonic maps into R IV (2) is proved which is used to classify complete spacelike surfaces of the parallel mean curvature in R 4 2 with a reasonable condition on the Gauss image. Liouville-type theorems of harmonic maps from the higher dimensional bounded symmetric domains are also established. (author). 25 refs

  11. On isotropic cylindrically symmetric stellar models

    International Nuclear Information System (INIS)

    Nolan, Brien C; Nolan, Louise V

    2004-01-01

    We attempt to match the most general cylindrically symmetric vacuum spacetime with a Robertson-Walker interior. The matching conditions show that the interior must be dust filled and that the boundary must be comoving. Further, we show that the vacuum region must be polarized. Imposing the condition that there are no trapped cylinders on an initial time slice, we can apply a result of Thorne's and show that trapped cylinders never evolve. This results in a simplified line element which we prove to be incompatible with the dust interior. This result demonstrates the impossibility of the existence of an isotropic cylindrically symmetric star (or even a star which has a cylindrically symmetric portion). We investigate the problem from a different perspective by looking at the expansion scalars of invariant null geodesic congruences and, applying to the cylindrical case, the result that the product of the signs of the expansion scalars must be continuous across the boundary. The result may also be understood in relation to recent results about the impossibility of the static axially symmetric analogue of the Einstein-Straus model

  12. The Mathematics of Symmetrical Factorial Designs

    Indian Academy of Sciences (India)

    The Mathematics of Symmetrical Factorial Designs. Mausumi Bose (nee Sen) obtained her MSc degree in. Statistics from the Calcutta. University and PhD degree from the Indian Statistical. Institute. She is on the faculty of the Indian. Statistical Institute. Her main field of research interest is design and analysis of experiments.

  13. Symmetric intersections of Rauzy fractals | Sellami | Quaestiones ...

    African Journals Online (AJOL)

    In this article we study symmetric subsets of Rauzy fractals of unimodular irreducible Pisot substitutions. The symmetry considered is re ection through the origin. Given an unimodular irreducible Pisot substitution, we consider the intersection of its Rauzy fractal with the Rauzy fractal of the reverse substitution. This set is ...

  14. Fourier inversion on a reductive symmetric space

    NARCIS (Netherlands)

    Ban, E.P. van den

    1999-01-01

    Let X be a semisimple symmetric space. In previous papers, [8] and [9], we have dened an explicit Fourier transform for X and shown that this transform is injective on the space C 1 c (X) ofcompactly supported smooth functions on X. In the present paper, which is a continuation of these papers, we

  15. Harmonic analysis on reductive symmetric spaces

    NARCIS (Netherlands)

    Ban, E.P. van den; Schlichtkrull, H.

    2000-01-01

    We give a relatively non-technical survey of some recent advances in the Fourier theory for semisimple symmetric spaces. There are three major results: An inversion formula for the Fourier transform, a Palley-Wiener theorem, which describes the Fourier image of the space of completely supported

  16. Fourier transforms on a semisimple symmetric space

    NARCIS (Netherlands)

    Ban, E.P. van den; Schlichtkrull, H.

    1994-01-01

    Let G=H be a semisimple symmetric space, that is, G is a connected semisimple real Lie group with an involution ?, and H is an open subgroup of the group of xed points for ? in G. The main purpose of this paper is to study an explicit Fourier transform on G=H. In terms of general representation

  17. Fourier transforms on a semisimple symmetric space

    NARCIS (Netherlands)

    Ban, E.P. van den; Carmona, J.; Delorme, P.

    1997-01-01

    Let G=H be a semisimple symmetric space, that is, G is a connected semisimple real Lie group with an involution ?, and H is an open subgroup of the group of xed points for ? in G. The main purpose of this paper is to study an explicit Fourier transform on G=H. In terms of general representation

  18. A differential equation for Lerch's transcendent and associated symmetric operators in Hilbert space

    International Nuclear Information System (INIS)

    Kaplitskii, V M

    2014-01-01

    The function Ψ(x,y,s)=e iy Φ(−e iy ,s,x), where Φ(z,s,v) is Lerch's transcendent, satisfies the following two-dimensional formally self-adjoint second-order hyperbolic differential equation, where s=1/2+iλ. The corresponding differential expression determines a densely defined symmetric operator (the minimal operator) on the Hilbert space L 2 (Π), where Π=(0,1)×(0,2π). We obtain a description of the domains of definition of some symmetric extensions of the minimal operator. We show that formal solutions of the eigenvalue problem for these symmetric extensions are represented by functional series whose structure resembles that of the Fourier series of Ψ(x,y,s). We discuss sufficient conditions for these formal solutions to be eigenfunctions of the resulting symmetric differential operators. We also demonstrate a close relationship between the spectral properties of these symmetric differential operators and the distribution of the zeros of some special analytic functions analogous to the Riemann zeta function. Bibliography: 15 titles

  19. Stationary states of a PT symmetric two-mode Bose–Einstein condensate

    International Nuclear Information System (INIS)

    Graefe, Eva-Maria

    2012-01-01

    The understanding of nonlinear PT symmetric quantum systems, arising for example in the theory of Bose–Einstein condensates in PT symmetric potentials, is widely based on numerical investigations, and little is known about generic features induced by the interplay of PT symmetry and nonlinearity. To gain deeper insights it is important to have analytically solvable toy models at hand. In the present paper the stationary states of a simple toy model of a PT symmetric system previously introduced in [1, 2] are investigated. The model can be interpreted as a simple description of a Bose–Einstein condensate in a PT symmetric double well trap in a two-mode approximation. The eigenvalues and eigenstates of the system can be explicitly calculated in a straightforward manner; the resulting structures resemble those that have recently been found numerically for a more realistic PT symmetric double delta potential. In addition, a continuation of the system is introduced that allows an interpretation in terms of a simple linear matrix model. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’. (paper)

  20. Ultrastrong extraordinary transmission and reflection in PT-symmetric Thue-Morse optical waveguide networks.

    Science.gov (United States)

    Wu, Jiaye; Yang, Xiangbo

    2017-10-30

    In this paper, we construct a 1D PT-symmetric Thue-Morse aperiodic optical waveguide network (PTSTMAOWN) and mainly investigate the ultrastrong extraordinary transmission and reflection. We propose an approach to study the photonic modes and solve the problem of calculating photonic modes distributions in aperiodic networks due to the lack of dispersion functions and find that in a PTSTMAOWN there exist more photonic modes and more spontaneous PT-symmetric breaking points, which are quite different from other reported PT-symmetric optical systems. Additionally, we develop a method to sort spontaneous PT-symmetric breaking point zones to seek the strongest extraordinary point and obtain that at this point the strongest extraordinary transmission and reflection arrive at 2.96316 × 10 5 and 1.32761 × 10 5 , respectively, due to the PT-symmetric coupling resonance and the special symmetry pattern of TM networks. These enormous gains are several orders of magnitude larger than the previous results. This optical system may possess potential in designing optical amplifier, optical logic elements in photon computers and ultrasensitive optical switches with ultrahigh monochromatity.

  1. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  2. Explicit TE/TM scheme for particle beam simulations

    International Nuclear Information System (INIS)

    Dohlus, M.; Zagorodnov, I.

    2008-10-01

    In this paper we propose an explicit two-level conservative scheme based on a TE/TM like splitting of the field components in time. Its dispersion properties are adjusted to accelerator problems. It is simpler and faster than the implicit version. It does not have dispersion in the longitudinal direction and the dispersion properties in the transversal plane are improved. The explicit character of the new scheme allows a uniformly stable conformal method without iterations and the scheme can be parallelized easily. It assures energy and charge conservation. A version of this explicit scheme for rotationally symmetric structures is free from the progressive time step reducing for higher order azimuthal modes as it takes place for Yee's explicit method used in the most popular electrodynamics codes. (orig.)

  3. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  4. An accurate scheme by block method for third order ordinary ...

    African Journals Online (AJOL)

    problems of ordinary differential equations is presented in this paper. The approach of collocation approximation is adopted in the derivation of the scheme and then the scheme is applied as simultaneous integrator to special third order initial value problem of ordinary differential equations. This implementation strategy is ...

  5. 2 × 2 random matrix ensembles with reduced symmetry: from Hermitian to PT -symmetric matrices

    International Nuclear Information System (INIS)

    Gong Jiangbin; Wang Qinghai

    2012-01-01

    A possibly fruitful extension of conventional random matrix ensembles is proposed by imposing symmetry constraints on conventional Hermitian matrices or parity–time (PT)-symmetric matrices. To illustrate the main idea, we first study 2 × 2 complex Hermitian matrix ensembles with O(2)-invariant constraints, yielding novel level-spacing statistics such as singular distributions, the half-Gaussian distribution, distributions interpolating between the GOE (Gaussian orthogonal ensemble) distribution and half-Gaussian distributions, as well as the gapped-GOE distribution. Such a symmetry-reduction strategy is then used to explore 2 × 2 PT-symmetric matrix ensembles with real eigenvalues. In particular, PT-symmetric random matrix ensembles with U(2) invariance can be constructed, with the conventional complex Hermitian random matrix ensemble being a special case. In two examples of PT-symmetric random matrix ensembles, the level-spacing distributions are found to be the standard GUE (Gaussian unitary ensemble) statistics or the ‘truncated-GUE’ statistics. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’. (paper)

  6. A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

    Science.gov (United States)

    Luo, Guangchun; Qin, Ke

    2014-01-01

    Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. We prove that asymmetric searchable structure could be converted to symmetric structure, and functions could be modeled separately apart from the core searchable structure. Based on this observation, we propose a layered searchable encryption (LSE) scheme, which provides compatibility, flexibility, and security for various settings and functionalities. In this scheme, the outputs of the core searchable component based on either symmetric or asymmetric setting are converted to some uniform mappings, which are then transmitted to loosely coupled functional components to further filter the results. In such a way, all functional components could directly support both symmetric and asymmetric settings. Based on LSE, we propose two representative and novel constructions for ranked keyword query (previously only available in symmetric scheme) and range query (previously only available in asymmetric scheme). PMID:24719565

  7. Physical aspects of pseudo-Hermitian and PT-symmetric quantum mechanics

    International Nuclear Information System (INIS)

    Mostafazadeh, Ali; Batal, Ahmet

    2004-01-01

    For a non-Hermitian Hamiltonian H possessing a real spectrum, we introduce a canonical orthonormal basis in which a previously introduced unitary mapping of H to a Hermitian Hamiltonian h takes a simple form. We use this basis to construct the observables O α of the quantum mechanics based on H. In particular, we introduce pseudo-Hermitian position and momentum operators and a pseudo-Hermitian quantization scheme that relates the latter to the ordinary classical position and momentum observables. These allow us to address the problem of determining the conserved probability density and the underlying classical system for pseudo-Hermitian and in particular PT-symmetric quantum systems. As a concrete example we construct the Hermitian Hamiltonian h, the physical observables O α , the localized states and the conserved probability density for the non-Hermitian PT-symmetric square well. We achieve this by employing an appropriate perturbation scheme. For this system, we conduct a comprehensive study of both the kinematical and dynamical effects of the non-Hermiticity of the Hamiltonian on various physical quantities. In particular, we show that these effects are quantum mechanical in nature and diminish in the classical limit. Our results provide an objective assessment of the physical aspects of PT-symmetric quantum mechanics and clarify its relationship with both conventional quantum mechanics and classical mechanics

  8. Remote unambiguous discrimination of linearly independent symmetric d-level quantum states

    International Nuclear Information System (INIS)

    Chen Libing; Liu Yuhua; Tan Peng; Lu Hong

    2009-01-01

    A set of linearly independent nonorthogonal symmetric d-level quantum states can be discriminated remotely and unambiguously with the aid of two-level Einstein-Podolsky-Rosen (EPR) states. We present a scheme for such a kind of remote unambiguous quantum state discrimination (UD). The probability of discrimination is in agreement with the optimal probability for local unambiguous discrimination among d symmetric states (Chefles and Barnettt 1998 Phys. Lett. A 250 223). This scheme consists of a remote generalized measurement described by a positive operator valued measurement (POVM). This remote POVM can be realized by performing a nonlocal 2d x 2d unitary operation on two spatially separated systems, one is the qudit which is encoded by one of the d symmetric nonorthogonal states to be distinguished and the other is an ancillary qubit, and a conventional local von Neumann orthogonal measurement on the ancilla. By decomposing the evolution process from the initial state to the final state, we construct a quantum network for realizing the remote POVM with a set of two-level nonlocal controlled-rotation gates, and thus provide a feasible physical means to realize the remote UD. A two-level nonlocal controlled-rotation gate can be implemented by using a two-level EPR pair in addition to local operations and classical communications (LOCCs)

  9. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  10. An FFT-accelerated fdtd scheme with exact absorbing conditions for characterizing axially symmetric resonant structures

    KAUST Repository

    Sirenko, Kostyantyn; Pazynin, Vadim L.; Sirenko, Yu K.; Bagci, Hakan

    2011-01-01

    under resonant conditions. This renders the method highly useful in characterization of high-Q microwave radiators and energy compressors. Numerical results that demonstrate the accuracy and efficiency of the method are presented.

  11. Representations of the infinite symmetric group

    CERN Document Server

    Borodin, Alexei

    2016-01-01

    Representation theory of big groups is an important and quickly developing part of modern mathematics, giving rise to a variety of important applications in probability and mathematical physics. This book provides the first concise and self-contained introduction to the theory on the simplest yet very nontrivial example of the infinite symmetric group, focusing on its deep connections to probability, mathematical physics, and algebraic combinatorics. Following a discussion of the classical Thoma's theorem which describes the characters of the infinite symmetric group, the authors describe explicit constructions of an important class of representations, including both the irreducible and generalized ones. Complete with detailed proofs, as well as numerous examples and exercises which help to summarize recent developments in the field, this book will enable graduates to enhance their understanding of the topic, while also aiding lecturers and researchers in related areas.

  12. Symmetric, discrete fractional splines and Gabor systems

    DEFF Research Database (Denmark)

    Søndergaard, Peter Lempel

    2006-01-01

    In this paper we consider fractional splines as windows for Gabor frames. We introduce two new types of symmetric, fractional splines in addition to one found by Unser and Blu. For the finite, discrete case we present two families of splines: One is created by sampling and periodizing the continu......In this paper we consider fractional splines as windows for Gabor frames. We introduce two new types of symmetric, fractional splines in addition to one found by Unser and Blu. For the finite, discrete case we present two families of splines: One is created by sampling and periodizing...... the continuous splines, and one is a truly finite, discrete construction. We discuss the properties of these splines and their usefulness as windows for Gabor frames and Wilson bases....

  13. Symmetric configurations highlighted by collective quantum coherence

    Energy Technology Data Exchange (ETDEWEB)

    Obster, Dennis [Radboud University, Institute for Mathematics, Astrophysics and Particle Physics, Nijmegen (Netherlands); Kyoto University, Yukawa Institute for Theoretical Physics, Kyoto (Japan); Sasakura, Naoki [Kyoto University, Yukawa Institute for Theoretical Physics, Kyoto (Japan)

    2017-11-15

    Recent developments in quantum gravity have shown the Lorentzian treatment to be a fruitful approach towards the emergence of macroscopic space-times. In this paper, we discuss another related aspect of the Lorentzian treatment: we argue that collective quantum coherence may provide a simple mechanism for highlighting symmetric configurations over generic non-symmetric ones. After presenting the general framework of the mechanism, we show the phenomenon in some concrete simple examples in the randomly connected tensor network, which is tightly related to a certain model of quantum gravity, i.e., the canonical tensor model. We find large peaks at configurations invariant under Lie-group symmetries as well as a preference for charge quantization, even in the Abelian case. In future study, this simple mechanism may provide a way to analyze the emergence of macroscopic space-times with global symmetries as well as various other symmetries existing in nature, which are usually postulated. (orig.)

  14. Overlap-free symmetric D 0 Lwords

    Directory of Open Access Journals (Sweden)

    Anna Frid

    2001-12-01

    Full Text Available A D0L word on an alphabet Σ={0,1,…,q-1} is called symmetric if it is a fixed point w=φ(w of a morphism φ:Σ * → Σ * defined by φ(i= t 1 + i t 2 + i … t m + i for some word t 1 t 2 … t m (equal to φ(0 and every i ∈ Σ; here a means a mod q. We prove a result conjectured by J. Shallit: if all the symbols in φ(0 are distinct (i.e., if t i ≠ t j for i ≠ j, then the symmetric D0L word w is overlap-free, i.e., contains no factor of the form axaxa for any x ∈ Σ * and a ∈ Σ.

  15. Young—Capelli symmetrizers in superalgebras†

    Science.gov (United States)

    Brini, Andrea; Teolis, Antonio G. B.

    1989-01-01

    Let Supern[U [unk] V] be the nth homogeneous subspace of the supersymmetric algebra of U [unk] V, where U and V are Z2-graded vector spaces over a field K of characteristic zero. The actions of the general linear Lie superalgebras pl(U) and pl(V) span two finite-dimensional K-subalgebras B and [unk] of EndK(Supern[U [unk] V]) that are the centralizers of each other. Young—Capelli symmetrizers and Young—Capelli *-symmetrizers give rise to K-linear bases of B and [unk] containing orthogonal systems of idempotents; thus they yield complete decompositions of B and [unk] into minimal left and right ideals, respectively. PMID:16594014

  16. Factored Facade Acquisition using Symmetric Line Arrangements

    KAUST Repository

    Ceylan, Duygu

    2012-05-01

    We introduce a novel framework for image-based 3D reconstruction of urban buildings based on symmetry priors. Starting from image-level edges, we generate a sparse and approximate set of consistent 3D lines. These lines are then used to simultaneously detect symmetric line arrangements while refining the estimated 3D model. Operating both on 2D image data and intermediate 3D feature representations, we perform iterative feature consolidation and effective outlier pruning, thus eliminating reconstruction artifacts arising from ambiguous or wrong stereo matches. We exploit non-local coherence of symmetric elements to generate precise model reconstructions, even in the presence of a significant amount of outlier image-edges arising from reflections, shadows, outlier objects, etc. We evaluate our algorithm on several challenging test scenarios, both synthetic and real. Beyond reconstruction, the extracted symmetry patterns are useful towards interactive and intuitive model manipulations.

  17. Irreducible complexity of iterated symmetric bimodal maps

    Directory of Open Access Journals (Sweden)

    J. P. Lampreia

    2005-01-01

    Full Text Available We introduce a tree structure for the iterates of symmetric bimodal maps and identify a subset which we prove to be isomorphic to the family of unimodal maps. This subset is used as a second factor for a ∗-product that we define in the space of bimodal kneading sequences. Finally, we give some properties for this product and study the ∗-product induced on the associated Markov shifts.

  18. A symmetric Roos bound for linear codes

    NARCIS (Netherlands)

    Duursma, I.M.; Pellikaan, G.R.

    2006-01-01

    The van Lint–Wilson AB-method yields a short proof of the Roos bound for the minimum distance of a cyclic code. We use the AB-method to obtain a different bound for the weights of a linear code. In contrast to the Roos bound, the role of the codes A and B in our bound is symmetric. We use the bound

  19. Symmetric voltage-controlled variable resistance

    Science.gov (United States)

    Vanelli, J. C.

    1978-01-01

    Feedback network makes resistance of field-effect transistor (FET) same for current flowing in either direction. It combines control voltage with source and load voltages to give symmetric current/voltage characteristics. Since circuit produces same magnitude output voltage for current flowing in either direction, it introduces no offset in presense of altering polarity signals. It is therefore ideal for sensor and effector circuits in servocontrol systems.

  20. Resistor Networks based on Symmetrical Polytopes

    Directory of Open Access Journals (Sweden)

    Jeremy Moody

    2015-03-01

    Full Text Available This paper shows how a method developed by Van Steenwijk can be generalized to calculate the resistance between any two vertices of a symmetrical polytope all of whose edges are identical resistors. The method is applied to a number of cases that have not been studied earlier such as the Archimedean polyhedra and their duals in three dimensions, the regular polytopes in four dimensions and the hypercube in any number of dimensions.

  1. Symmetric vs. asymmetric punishment regimes for bribery

    OpenAIRE

    Engel, Christoph; Goerg, Sebastian J.; Yu, Gaoneng

    2012-01-01

    In major legal orders such as UK, the U.S., Germany, and France, bribers and recipients face equally severe criminal sanctions. In contrast, countries like China, Russia, and Japan treat the briber more mildly. Given these differences between symmetric and asymmetric punishment regimes for bribery, one may wonder which punishment strategy is more effective in curbing corruption. For this purpose, we designed and ran a lab experiment in Bonn (Germany) and Shanghai (China) with exactly the same...

  2. Symmetric scrolled packings of multilayered carbon nanoribbons

    Science.gov (United States)

    Savin, A. V.; Korznikova, E. A.; Lobzenko, I. P.; Baimova, Yu. A.; Dmitriev, S. V.

    2016-06-01

    Scrolled packings of single-layer and multilayer graphene can be used for the creation of supercapacitors, nanopumps, nanofilters, and other nanodevices. The full atomistic simulation of graphene scrolls is restricted to consideration of relatively small systems in small time intervals. To overcome this difficulty, a two-dimensional chain model making possible an efficient calculation of static and dynamic characteristics of nanoribbon scrolls with allowance for the longitudinal and bending stiffness of nanoribbons is proposed. The model is extended to the case of scrolls of multilayer graphene. Possible equilibrium states of symmetric scrolls of multilayer carbon nanotribbons rolled up so that all nanoribbons in the scroll are equivalent are found. Dependences of the number of coils, the inner and outer radii, lowest vibrational eigenfrequencies of rolled packages on the length L of nanoribbons are obtained. It is shown that the lowest vibrational eigenfrequency of a symmetric scroll decreases with a nanoribbon length proportionally to L -1. It is energetically unfavorable for too short nanoribbons to roll up, and their ground state is a stack of plane nanoribbons. With an increasing number k of layers, the nanoribbon length L necessary for creation of symmetric scrolls increases. For a sufficiently small number of layers k and a sufficiently large nanoribbon length L, the scrolled packing has the lowest energy as compared to that of stack of plane nanoribbons and folded structures. The results can be used for development of nanomaterials and nanodevices on the basis of graphene scrolled packings.

  3. Is the Universe matter-antimatter symmetric

    International Nuclear Information System (INIS)

    Alfven, H.

    1976-09-01

    According to the symmetric cosmology there should be antimatter regions in space which are equally as large as the matter regions. The regions of different kind are separated by Leidenfrost layers, which may be very thin and not observable from a distance. This view has met resistance which in part is based on the old view that the dilute interstellar and intergalactic medium is more or less homogeneous. However, through space research in the magnetosphere and interplanetary space we know that thin layers, dividing space into regions of different magnetisation, exist and based on this it is concluded that space in general has a cellular structure. This result may break down the psychological resistance to the symmetric theory. The possibility that every second star in our galaxy consists of antimatter is discussed, and it is shown that this view is not in conflict with any observations. As most stars are likely to be surrounded by solar systems of a structure like our own, it is concluded that collisions between comets and antistars (or anticomets and stars) would be rather frequent. Such collisions would result in phenomena of the same type as the observed cosmic γ-ray bursts. Another support for the symmetric cosmology is the continuous X-ray background radiation. Also many of the observed large energy releases in cosmos are likely to be due to annihilation

  4. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  5. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  6. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  7. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  8. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  9. Program specialization

    CERN Document Server

    Marlet, Renaud

    2013-01-01

    This book presents the principles and techniques of program specialization - a general method to make programs faster (and possibly smaller) when some inputs can be known in advance. As an illustration, it describes the architecture of Tempo, an offline program specializer for C that can also specialize code at runtime, and provides figures for concrete applications in various domains. Technical details address issues related to program analysis precision, value reification, incomplete program specialization, strategies to exploit specialized program, incremental specialization, and data speci

  10. Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography

    Science.gov (United States)

    Ma, Lihong; Jin, Weimin

    2018-01-01

    A novel symmetric and asymmetric hybrid optical cryptosystem is proposed based on compressive sensing combined with computer generated holography. In this method there are six encryption keys, among which two decryption phase masks are different from the two random phase masks used in the encryption process. Therefore, the encryption system has the feature of both symmetric and asymmetric cryptography. On the other hand, because computer generated holography can flexibly digitalize the encrypted information and compressive sensing can significantly reduce data volume, what is more, the final encryption image is real function by phase truncation, the method favors the storage and transmission of the encryption data. The experimental results demonstrate that the proposed encryption scheme boosts the security and has high robustness against noise and occlusion attacks.

  11. Infrared behavior of gluons and ghosts in ghost-antighost symmetric gauges

    International Nuclear Information System (INIS)

    Alkofer, R.; Fischer, C.S.; Reinhardt, H.; Smekal, L. von

    2003-01-01

    To investigate the possibility of a ghost-antighost condensate, the coupled Dyson-Schwinger equations for the gluon and ghost propagators in Yang-Mills theories are derived in general covariant gauges, including ghost-antighost symmetric gauges. The infrared behavior of these two-point functions is studied in a bare-vertex truncation scheme which has proven to be successful in the Landau gauge. In all linear covariant gauges the same infrared behavior as in the Landau gauge is found: The gluon propagator is infrared-suppressed whereas the ghost propagator is infrared-enhanced. This infrared singular behavior provides an indication against a ghost-antighost condensate. In the ghost-antighost symmetric gauges we find that the infrared behavior of the gluon and ghost propagators cannot be determined when replacing all dressed vertices by bare ones. The question of a BRS invariant dimension-2 condensate remains to be further studied

  12. On the harmonic starlike functions with respect to symmetric ...

    African Journals Online (AJOL)

    In the present paper, we introduce the notions of functions harmonic starlike with respect to symmetric, conjugate and symmetric conjugate points. Such results as coefficient inequalities and structural formulae for these function classes are proved. Keywords: Harmonic functions, harmonic starlike functions, symmetric points, ...

  13. A Modified Computational Scheme for the Stochastic Perturbation Finite Element Method

    Directory of Open Access Journals (Sweden)

    Feng Wu

    Full Text Available Abstract A modified computational scheme of the stochastic perturbation finite element method (SPFEM is developed for structures with low-level uncertainties. The proposed scheme can provide second-order estimates of the mean and variance without differentiating the system matrices with respect to the random variables. When the proposed scheme is used, it involves finite analyses of deterministic systems. In the case of one random variable with a symmetric probability density function, the proposed computational scheme can even provide a result with fifth-order accuracy. Compared with the traditional computational scheme of SPFEM, the proposed scheme is more convenient for numerical implementation. Four numerical examples demonstrate that the proposed scheme can be used in linear or nonlinear structures with correlated or uncorrelated random variables.

  14. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  15. Dual formulation of covariant nonlinear duality-symmetric action of kappa-symmetric D3-brane

    Science.gov (United States)

    Vanichchapongjaroen, Pichet

    2018-02-01

    We study the construction of covariant nonlinear duality-symmetric actions in dual formulation. Essentially, the construction is the PST-covariantisation and nonlinearisation of Zwanziger action. The covariantisation made use of three auxiliary scalar fields. Apart from these, the construction proceed in a similar way to that of the standard formulation. For example, the theories can be extended to include interactions with external fields, and that the theories possess two local PST symmetries. We then explicitly demonstrate the construction of covariant nonlinear duality-symmetric actions in dual formulation of DBI theory, and D3-brane. For each of these theories, the twisted selfduality condition obtained from duality-symmetric actions are explicitly shown to match with the duality relation between field strength and its dual from the one-potential actions. Their on-shell actions between the duality-symmetric and the one-potential versions are also shown to match. We also explicitly prove kappa-symmetry of the covariant nonlinear duality-symmetric D3-brane action in dual formulation.

  16. Symmetric and asymmetric nuclear matter in the Thomas-Fermi model at finite temperatures

    International Nuclear Information System (INIS)

    Strobel, K.; Weber, F.; Weigel, M.K.

    1999-01-01

    The properties of warm symmetric and asymmetric nuclear matter are investigated in the frame of the Thomas-Fermi approximation using a recent modern parameterization of the effective nucleon-nucleon interaction of Myers and Swiatecki. Special attention is paid to the liquid-gas phase transition, which is of special interest in modern nuclear physics. We have determined the critical temperature, critical density and the so-called flash temperature. Furthermore, the equation of state for cold neutron star matter is calculated. (orig.)

  17. Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage

    Directory of Open Access Journals (Sweden)

    Juha Partala

    2017-01-01

    Full Text Available A distributed storage system (DSS is a fundamental building block in many distributed applications. It applies linear network coding to achieve an optimal tradeoff between storage and repair bandwidth when node failures occur. Additively homomorphic encryption is compatible with linear network coding. The homomorphic property ensures that a linear combination of ciphertext messages decrypts to the same linear combination of the corresponding plaintext messages. In this paper, we construct a linearly homomorphic symmetric encryption scheme that is designed for a DSS. Our proposal provides simultaneous encryption and error correction by applying linear error correcting codes. We show its IND-CPA security for a limited number of messages based on binary Goppa codes and the following assumption: when dividing a scrambled generator matrix G^ into two parts G1^ and G2^, it is infeasible to distinguish G2^ from random and to find a statistical connection between G1^ and G2^. Our infeasibility assumptions are closely related to those underlying the McEliece public key cryptosystem but are considerably weaker. We believe that the proposed problem has independent cryptographic interest.

  18. Sparse-matrix factorizations for fast symmetric Fourier transforms

    International Nuclear Information System (INIS)

    Sequel, J.

    1987-01-01

    This work proposes new fast algorithms computing the discrete Fourier transform of certain families of symmetric sequences. Sequences commonly found in problems of structure determination by x-ray crystallography and in numerical solutions of boundary-value problems in partial differential equations are dealt with. In the algorithms presented, the redundancies in the input and output data, due to the presence of symmetries in the input data sequence, were eliminated. Using ring-theoretical methods a matrix representation is obtained for the remaining calculations; which factors as the product of a complex block-diagonal matrix times as integral matrix. A basic two-step algorithm scheme arises from this factorization with a first step consisting of pre-additions and a second step containing the calculations involved in computing with the blocks in the block-diagonal factor. These blocks are structured as block-Hankel matrices, and two sparse-matrix factoring formulas are developed in order to diminish their arithmetic complexity

  19. Modulation of precipitation by conditional symmetric instability release

    Science.gov (United States)

    Glinton, Michael R.; Gray, Suzanne L.; Chagnon, Jeffrey M.; Morcrette, Cyril J.

    2017-03-01

    Although many theoretical and observational studies have investigated the mechanism of conditional symmetric instability (CSI) release and associated it with mesoscale atmospheric phenomena such as frontal precipitation bands, cloud heads in rapidly developing extratropical cyclones and sting jets, its climatology and contribution to precipitation have not been extensively documented. The aim of this paper is to quantify the contribution of CSI release, yielding slantwise convection, to climatological precipitation accumulations for the North Atlantic and western Europe. Case studies reveal that CSI release could be common along cold fronts of mature extratropical cyclones and the North Atlantic storm track is found to be a region with large CSI according to two independent CSI metrics. Correlations of CSI with accumulated precipitation are also large in this region and CSI release is inferred to be occurring about 20% of the total time over depths of over 1 km. We conclude that the inability of current global weather forecast and climate prediction models to represent CSI release (due to insufficient resolution yet lack of subgrid parametrization schemes) may lead to errors in precipitation distributions, particularly in the region of the North Atlantic storm track.

  20. Probabilistic teleportation scheme of two-mode entangled photon states by using linear optic element

    Institute of Scientific and Technical Information of China (English)

    XIANG Shao-hua

    2003-01-01

    A scheme for teleporting two-mode entangled photon states with the successful probability 33.3% is proposed. In the scheme, the teleporte d qubit is two-mode photon entangled states, and two pairs of EPR pair are used as quantum channel between a sender and a receiver. This procedure is achieved by using two 50/50 symmetric beam splitters and four photon number detectors wit h the help of classical information.

  1. Spherically symmetric self-similar universe

    Energy Technology Data Exchange (ETDEWEB)

    Dyer, C C [Toronto Univ., Ontario (Canada)

    1979-10-01

    A spherically symmetric self-similar dust-filled universe is considered as a simple model of a hierarchical universe. Observable differences between the model in parabolic expansion and the corresponding homogeneous Einstein-de Sitter model are considered in detail. It is found that an observer at the centre of the distribution has a maximum observable redshift and can in principle see arbitrarily large blueshifts. It is found to yield an observed density-distance law different from that suggested by the observations of de Vaucouleurs. The use of these solutions as central objects for Swiss-cheese vacuoles is discussed.

  2. Dijet rates with symmetric Et cuts

    International Nuclear Information System (INIS)

    Banfi, Andrea; Dasgupta, Mrinal

    2004-01-01

    We consider dijet production in the region where symmetric cuts on the transverse energy, E t , are applied to the jets. In this region next-to-leading order calculations are unreliable and an all-order resummation of soft gluon effects is needed, which we carry out. Although, for illustrative purposes, we choose dijets produced in deep inelastic scattering, our general ideas apply additionally to dijets produced in photoproduction or gamma-gamma processes and should be relevant also to the study of prompt di-photon E t spectra in association with a recoiling jet, in hadron-hadron processes. (author)

  3. Covariant, chirally symmetric, confining model of mesons

    International Nuclear Information System (INIS)

    Gross, F.; Milana, J.

    1991-01-01

    We introduce a new model of mesons as quark-antiquark bound states. The model is covariant, confining, and chirally symmetric. Our equations give an analytic solution for a zero-mass pseudoscalar bound state in the case of exact chiral symmetry, and also reduce to the familiar, highly successful nonrelativistic linear potential models in the limit of heavy-quark mass and lightly bound systems. In this fashion we are constructing a unified description of all the mesons from the π through the Υ. Numerical solutions for other cases are also presented

  4. Symmetric Logic Synthesis with Phase Assignment

    OpenAIRE

    Benschop, N. F.

    2001-01-01

    Decomposition of any Boolean Function BF_n of n binary inputs into an optimal inverter coupled network of Symmetric Boolean functions SF_k (k \\leq n) is described. Each SF component is implemented by Threshold Logic Cells, forming a complete and compact T-Cell Library. Optimal phase assignment of input polarities maximizes local symmetries. The "rank spectrum" is a new BF_n description independent of input ordering, obtained by mapping its minterms onto an othogonal n \\times n grid of (transi...

  5. Elastic energy for reflection-symmetric topologies

    International Nuclear Information System (INIS)

    Majumdar, A; Robbins, J M; Zyskin, M

    2006-01-01

    Nematic liquid crystals in a polyhedral domain, a prototype for bistable displays, may be described by a unit-vector field subject to tangent boundary conditions. Here we consider the case of a rectangular prism. For configurations with reflection-symmetric topologies, we derive a new lower bound for the one-constant elastic energy. For certain topologies, called conformal and anticonformal, the lower bound agrees with a previous result. For the remaining topologies, called nonconformal, the new bound is an improvement. For nonconformal topologies we derive an upper bound, which differs from the lower bound by a factor depending only on the aspect ratios of the prism

  6. Nanotribology of Symmetric and Asymmetric Liquid Lubricants

    Directory of Open Access Journals (Sweden)

    Shinji Yamada

    2010-03-01

    Full Text Available When liquid molecules are confined in a narrow gap between smooth surfaces, their dynamic properties are completely different from those of the bulk. The molecular motions are highly restricted and the system exhibits solid-like responses when sheared slowly. This solidification behavior is very dependent on the molecular geometry (shape of liquids because the solidification is induced by the packing of molecules into ordered structures in confinement. This paper reviews the measurements of confined structures and friction of symmetric and asymmetric liquid lubricants using the surface forces apparatus. The results show subtle and complex friction mechanisms at the molecular scale.

  7. Unary self-verifying symmetric difference automata

    CSIR Research Space (South Africa)

    Marais, Laurette

    2016-07-01

    Full Text Available stream_source_info Marais_2016_ABSTRACT.pdf.txt stream_content_type text/plain stream_size 796 Content-Encoding ISO-8859-1 stream_name Marais_2016_ABSTRACT.pdf.txt Content-Type text/plain; charset=ISO-8859-1 18th... International Workshop on Descriptional Complexity of Formal Systems, 5 - 8 July 2016, Bucharest, Romania Unary self-verifying symmetric difference automata Laurette Marais1,2 and Lynette van Zijl1(B) 1 Department of Computer Science, Stellenbosch...

  8. Characterisation of an AGATA symmetric prototype detector

    International Nuclear Information System (INIS)

    Nelson, L.; Dimmock, M.R.; Boston, A.J.; Boston, H.C.; Cresswell, J.R.; Nolan, P.J.; Lazarus, I.; Simpson, J.; Medina, P.; Santos, C.; Parisel, C.

    2007-01-01

    The Advanced GAmma Tracking Array (AGATA) symmetric prototype detector has been tested at University of Liverpool. A 137 Ce source, collimated to a 2 mm diameter, was scanned across the front face of the detector and data were acquired utilising digital electronics. Pulse shapes from a selection of well-defined photon interaction positions have been analysed to investigate the position sensitivity of the detector. Furthermore, the application of the electric field simulation software, Multi Geometry Simulation (MGS) to generate theoretical pulse shapes for AGATA detectors has been presented

  9. How Symmetrical Assumptions Advance Strategic Management Research

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Hallberg, Hallberg

    2014-01-01

    We develop the case for symmetrical assumptions in strategic management theory. Assumptional symmetry obtains when assumptions made about certain actors and their interactions in one of the application domains of a theory are also made about this set of actors and their interactions in other...... application domains of the theory. We argue that assumptional symmetry leads to theoretical advancement by promoting the development of theory with greater falsifiability and stronger ontological grounding. Thus, strategic management theory may be advanced by systematically searching for asymmetrical...

  10. Characterisation of an AGATA symmetric prototype detector

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, L. [Oliver Lodge Laboratory, University of Liverpool, Oxford Street, Liverpool L69 7ZE (United Kingdom)]. E-mail: ln@ns.ph.liv.ac.uk; Dimmock, M.R. [Oliver Lodge Laboratory, University of Liverpool, Oxford Street, Liverpool L69 7ZE (United Kingdom)]. E-mail: mrd@ns.ph.liv.ac.uk; Boston, A.J. [Oliver Lodge Laboratory, University of Liverpool, Oxford Street, Liverpool L69 7ZE (United Kingdom)]. E-mail: ajb@ns.ph.liv.ac.uk; Boston, H.C. [Oliver Lodge Laboratory, University of Liverpool, Oxford Street, Liverpool L69 7ZE (United Kingdom); Cresswell, J.R. [Oliver Lodge Laboratory, University of Liverpool, Oxford Street, Liverpool L69 7ZE (United Kingdom); Nolan, P.J. [Oliver Lodge Laboratory, University of Liverpool, Oxford Street, Liverpool L69 7ZE (United Kingdom); Lazarus, I. [CCLRC Daresbury Laboratory, Daresbury, Warrington WA4 4AD (United Kingdom); Simpson, J. [CCLRC Daresbury Laboratory, Daresbury, Warrington WA4 4AD (United Kingdom); Medina, P. [Institut de Recherches Subatomiques, Strasbourg BP28 67037 (France); Santos, C. [Institut de Recherches Subatomiques, Strasbourg BP28 67037 (France); Parisel, C. [Institut de Recherches Subatomiques, Strasbourg BP28 67037 (France)

    2007-04-01

    The Advanced GAmma Tracking Array (AGATA) symmetric prototype detector has been tested at University of Liverpool. A {sup 137}Ce source, collimated to a 2 mm diameter, was scanned across the front face of the detector and data were acquired utilising digital electronics. Pulse shapes from a selection of well-defined photon interaction positions have been analysed to investigate the position sensitivity of the detector. Furthermore, the application of the electric field simulation software, Multi Geometry Simulation (MGS) to generate theoretical pulse shapes for AGATA detectors has been presented.

  11. Soft theorems for shift-symmetric cosmologies

    Science.gov (United States)

    Finelli, Bernardo; Goon, Garrett; Pajer, Enrico; Santoni, Luca

    2018-03-01

    We derive soft theorems for single-clock cosmologies that enjoy a shift symmetry. These so-called consistency conditions arise from a combination of a large diffeomorphism and the internal shift symmetry and fix the squeezed limit of all correlators with a soft scalar mode. As an application, we show that our results reproduce the squeezed bispectrum for ultra-slow-roll inflation, a particular shift-symmetric, nonattractor model which is known to violate Maldacena's consistency relation. Similar results have been previously obtained by Mooij and Palma using background-wave methods. Our results shed new light on the infrared structure of single-clock cosmological spacetimes.

  12. Pion condensation in symmetric nuclear matter

    International Nuclear Information System (INIS)

    Shamsunnahar, T.; Saha, S.; Kabir, K.; Nath, L.M.

    1991-01-01

    We have investigated the possibility of pion condensation in symmetric nuclear matter using a model of pion-nucleon interaction based essentially on chiral SU(2) x SU(2) symmetry. We have found that pion condensation is not possible for any finite value of the density. Consequently, no critical opalescence phenomenon is likely to be seen in pion-nucleus scattering nor is it likely to be possible to explain the EMC effect in terms of an increased number of pions in the nucleus. (author)

  13. Baryon symmetric big-bang cosmology

    Energy Technology Data Exchange (ETDEWEB)

    Stecker, F.W.

    1978-04-01

    The framework of baryon-symmetric big-bang cosmology offers the greatest potential for deducing the evolution of the universe as a consequence of physical laws and processes with the minimum number of arbitrary assumptions as to initial conditions in the big-bang. In addition, it offers the possibility of explaining the photon-baryon ratio in the universe and how galaxies and galaxy clusters are formed, and also provides the only acceptable explanation at present for the origin of the cosmic gamma ray background radiation.

  14. Baryon symmetric big-bang cosmology

    International Nuclear Information System (INIS)

    Stecker, F.W.

    1978-04-01

    The framework of baryon-symmetric big-bang cosmology offers the greatest potential for deducing the evolution of the universe as a consequence of physical laws and processes with the minimum number of arbitrary assumptions as to initial conditions in the big-bang. In addition, it offers the possibility of explaining the photon-baryon ratio in the universe and how galaxies and galaxy clusters are formed, and also provides the only acceptable explanation at present for the origin of the cosmic gamma ray background radiation

  15. Geometrodynamics of spherically symmetric Lovelock gravity

    International Nuclear Information System (INIS)

    Kunstatter, Gabor; Taves, Tim; Maeda, Hideki

    2012-01-01

    We derive the Hamiltonian for spherically symmetric Lovelock gravity using the geometrodynamics approach pioneered by Kuchar (1994 Phys. Rev. D 50 3961) in the context of four-dimensional general relativity. When written in terms of the areal radius, the generalized Misner-Sharp mass and their conjugate momenta, the generic Lovelock action and Hamiltonian take on precisely the same simple forms as in general relativity. This result supports the interpretation of Lovelock gravity as the natural higher dimensional extension of general relativity. It also provides an important first step towards the study of the quantum mechanics, Hamiltonian thermodynamics and formation of generic Lovelock black holes. (fast track communication)

  16. A new method for generating axially-symmetric and radially-polarized beams

    International Nuclear Information System (INIS)

    Niu Chunhui; Gu Benyuan; Dong Bizhen; Zhang Yan

    2005-01-01

    A scheme for generating axially-symmetric and radially-polarized beams is proposed by using two diffractive phase elements (DPEs) made of birefringent materials. The design of these two DPEs is based on the general theory of phase-retrieval of optical system in combination with an iterative algorithm. The first DPE is used for demultiplexing two orthogonally linearly-polarized light beams to produce diffractive patterns, and the second DPE is used for compensating the phase difference to obtain the desired radially-polarized beam

  17. Symmetric Anderson impurity model: Magnetic susceptibility, specific heat and Wilson ratio

    Science.gov (United States)

    Zalom, Peter; Pokorný, Vladislav; Janiš, Václav

    2018-05-01

    We extend the spin-polarized effective-interaction approximation of the parquet renormalization scheme from Refs. [1,2] applied on the symmetric Anderson model by adding the low-temperature asymptotics of the total energy and the specific heat. We calculate numerically the Wilson ratio and determine analytically its asymptotic value in the strong-coupling limit. We demonstrate in this way that the exponentially small Kondo scale from the strong-coupling regime emerges in qualitatively the same way in the spectral function, magnetic susceptibility and the specific heat.

  18. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  19. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  20. Non-symmetric bi-stable flow around the Ahmed body

    International Nuclear Information System (INIS)

    Meile, W.; Ladinek, T.; Brenn, G.; Reppenhagen, A.; Fuchs, A.

    2016-01-01

    Highlights: • The non-symmetric bi-stable flow around the Ahmed body is investigated experimentally. • Bi-stability, described for symmetric flow by Cadot and co-workers, was found in nonsymmetric flow also. • The flow field randomly switches between two states. • The flow is subject to a spanwise instability identified by Cadot and co-workers for symmetric flow. • Aerodynamic forces fluctuate strongly due to the bi-stability. - Abstract: The flow around the Ahmed body at varying Reynolds numbers under yawing conditions is investigated experimentally. The body geometry belongs to a regime subject to spanwise flow instability identified in symmetric flow by Cadot and co-workers (Grandemange et al., 2013b). Our experiments cover the two slant angles 25° and 35° and Reynolds numbers up to 2.784 × 10"6. Special emphasis lies on the aerodynamics under side wind influence. For the 35° slant angle, forces and moments change significantly with the yawing angle in the range 10° ≤ |β| ≤ 15°. The lift and the pitching moment exhibit strong fluctuations due to bi-stable flow around a critical angle β of ±12.5°, where the pitching moment changes sign. Time series of the forces and moments are studied and explained by PIV measurements in the flow field near the rear of the body.

  1. Optimality and stability of symmetric evolutionary games with applications in genetic selection.

    Science.gov (United States)

    Huang, Yuanyuan; Hao, Yiping; Wang, Min; Zhou, Wen; Wu, Zhijun

    2015-06-01

    Symmetric evolutionary games, i.e., evolutionary games with symmetric fitness matrices, have important applications in population genetics, where they can be used to model for example the selection and evolution of the genotypes of a given population. In this paper, we review the theory for obtaining optimal and stable strategies for symmetric evolutionary games, and provide some new proofs and computational methods. In particular, we review the relationship between the symmetric evolutionary game and the generalized knapsack problem, and discuss the first and second order necessary and sufficient conditions that can be derived from this relationship for testing the optimality and stability of the strategies. Some of the conditions are given in different forms from those in previous work and can be verified more efficiently. We also derive more efficient computational methods for the evaluation of the conditions than conventional approaches. We demonstrate how these conditions can be applied to justifying the strategies and their stabilities for a special class of genetic selection games including some in the study of genetic disorders.

  2. Inverse scattering scheme for the Dirac equation at fixed energy

    International Nuclear Information System (INIS)

    Leeb, H.; Lehninger, H.; Schilder, C.

    2001-01-01

    Full text: Based on the concept of generalized transformation operators a new hierarchy of Dirac equations with spherical symmetric scalar and fourth component vector potentials is presented. Within this hierarchy closed form expressions for the solutions, the potentials and the S-matrix can be given in terms of solutions of the original Dirac equation. Using these transformations an inverse scattering scheme has been constructed for the Dirac equation which is the analog to the rational scheme in the non-relativistic case. The given method provides for the first time an inversion scheme with closed form expressions for the S-matrix for non-relativistic scattering problems with central and spin-orbit potentials. (author)

  3. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  4. SU(2) X SU(2) X U(1) basis for symmetric SO(6) representations: matrix elements of the generators

    International Nuclear Information System (INIS)

    Piepenbring, R.; Silvestre-Brac, B.; Szymanski, Z.

    1987-01-01

    Matrix elements of the group generators for the symmetric irreducible representations of SO(6) are explicitly calculated in a closed form employing thedecomposition chain SO(6) is contained in SU(2) X SU(2) X U(1) (which is different from the well known Wigner supermultiplet scheme). The relation to the Gel'fand Tsetlin method using SO(6) contained in SO(5) up to ... SO(2) is indicated. An example of a physical application is given

  5. Specialization Patterns

    DEFF Research Database (Denmark)

    Schultz, Ulrik Pagh; Lawall, Julia Laetitia; Consel, Charles

    2000-01-01

    Design patterns offer many advantages for software development, but can introduce inefficiency into the final program. Program specialization can eliminate such overheads, but is most effective when targeted by the user to specific bottlenecks. Consequently, we propose that these concepts...... are complementary. Program specialization can optimize programs written using design patterns, and design patterns provide information about the program structure that can guide specialization. Concretely, we propose specialization patterns, which describe how to apply program specialization to optimize uses...... of design patterns. In this paper, we analyze the specialization opportunities provided by specific uses of design patterns. Based on the analysis of each design pattern, we define the associated specialization pattern. These specialization opportunities can be declared using the specialization classes...

  6. Electroweak Baryogenesis in R-symmetric Supersymmetry

    Energy Technology Data Exchange (ETDEWEB)

    Fok, R.; Kribs, Graham D.; Martin, Adam; Tsai, Yuhsin

    2013-03-01

    We demonstrate that electroweak baryogenesis can occur in a supersymmetric model with an exact R-symmetry. The minimal R-symmetric supersymmetric model contains chiral superfields in the adjoint representation, giving Dirac gaugino masses, and an additional set of "R-partner" Higgs superfields, giving R-symmetric \\mu-terms. New superpotential couplings between the adjoints and the Higgs fields can simultaneously increase the strength of the electroweak phase transition and provide additional tree-level contributions to the lightest Higgs mass. Notably, no light stop is present in this framework, and in fact, we require both stops to be above a few TeV to provide sufficient radiative corrections to the lightest Higgs mass to bring it up to 125 GeV. Large CP-violating phases in the gaugino/higgsino sector allow us to match the baryon asymmetry of the Universe with no constraints from electric dipole moments due to R-symmetry. We briefly discuss some of the more interesting phenomenology, particularly of the of the lightest CP-odd scalar.

  7. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  8. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  9. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  10. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  11. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  12. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  13. Some algorithms for the solution of the symmetric eigenvalue problem on a multiprocessor electronic computer

    International Nuclear Information System (INIS)

    Molchanov, I.N.; Khimich, A.N.

    1984-01-01

    This article shows how a reflection method can be used to find the eigenvalues of a matrix by transforming the matrix to tridiagonal form. The method of conjugate gradients is used to find the smallest eigenvalue and the corresponding eigenvector of symmetric positive-definite band matrices. Topics considered include the computational scheme of the reflection method, the organization of parallel calculations by the reflection method, the computational scheme of the conjugate gradient method, the organization of parallel calculations by the conjugate gradient method, and the effectiveness of parallel algorithms. It is concluded that it is possible to increase the overall effectiveness of the multiprocessor electronic computers by either letting the newly available processors of a new problem operate in the multiprocessor mode, or by improving the coefficient of uniform partition of the original information

  14. Two-Beam Linear Colliders - Special Issues

    CERN Document Server

    Corsini, Roberto

    2010-01-01

    The path towards a multi-TeV e+e- linear collider proposed by the CLIC study is based on the Two-Beam Acceleration (TBA) scheme. Such a scheme is promising in term of efficiency, reliability and cost. The rationale behind the two-beam scheme is discussed in the paper, together with the special issues related to this technology and the R&D needed to demonstrate its feasibility.

  15. Spin symmetry in the relativistic symmetrical well potential including a proper approximation to the spin-orbit coupling term

    International Nuclear Information System (INIS)

    Wei Gaofeng; Dong Shihai

    2010-01-01

    In the case of exact spin symmetry, we approximately solve the Dirac equation with scalar and vector symmetrical well potentials by using a proper approximation to the spin-orbit coupling term, and obtain the corresponding energy equation and spinor wave functions for the bound states. We find that there exist only positive-energy bound states in the case of spin symmetry. Also, the energy eigenvalue approaches a constant when the potential parameter α goes to zero. The special case for equally scalar and vector symmetrical well potentials is studied briefly.

  16. An integrable symmetric (2+1)-dimensional Lotka-Volterra equation and a family of its solutions

    International Nuclear Information System (INIS)

    Hu Xingbiao; Li Chunxia; Nimmo, Jonathan J C; Yu Guofu

    2005-01-01

    A symmetric (2+1)-dimensional Lotka-Volterra equation is proposed. By means of a dependent variable transformation, the equation is firstly transformed into multilinear form and further decoupled into bilinear form by introducing auxiliary independent variables. A bilinear Baecklund transformation is found and then the corresponding Lax pair is derived. Explicit solutions expressed in terms of pfaffian solutions of the bilinear form of the symmetric (2+1)-dimensional Lotka-Volterra equation are given. As a special case of the pfaffian solutions, we obtain soliton solutions and dromions

  17. Symmetric grey box identification and distributed beam-based controller design for free-electron lasers

    Energy Technology Data Exchange (ETDEWEB)

    Pfeiffer, Sven

    2014-09-15

    The European X-ray Free-Electron Laser (XFEL) at the Deutsches Elektronen Synchtrotron (DESY) in Hamburg will, starting in 2015, open up completely new research opportunities for scientist and industrial users by exploiting ultrashort X-ray laser pulses. Bunches of electrons are accelerated by a radio frequency field inside superconducting cavities up to an energy of 17.5 GeV. A periodic arrangement of magnets forces the accelerated electrons onto a tight slalom path leading to a process in that the electrons emit extremely short and intense X-ray flashes. The generation of equidistant X-ray flashes with a constant intensity requires an extremely high precision field control in combination with beam-based signals. FLASH, which can be seen as a pilot test facility, allows to develop and test controller concepts even before the European XFEL is in operation. In this thesis it is shown that a physical white box model structure, which describes the behavior of each subsystem within the radio frequency field control loop, obeys as first-order approximation the special orthogonal group of dimension two (SO(2)). Presented is a grey box identification approach, which combines the physical model structure with general identification methods. The accelerator modules are operated in a pulsed mode. Thus, the excitation of the system and therefore the identification of the input-output behavior is only possible within a short time period. Developed is an adaptive identification approach with a specified SO(2) symmetric model structure. The proposed controller design strategy fulfills the requirements of a high precision field performance. Adapting the feedforward signal by using an iterative learning control (ILC) algorithm reduces remaining repetitive field errors from pulse to pulse. It is shown, that exploiting the SO(2) symmetric structure and using the developed tensor based ILC representation simplifies the feedforward update computation. Magnetic chicanes, so

  18. Symmetric grey box identification and distributed beam-based controller design for free-electron lasers

    International Nuclear Information System (INIS)

    Pfeiffer, Sven

    2014-09-01

    The European X-ray Free-Electron Laser (XFEL) at the Deutsches Elektronen Synchtrotron (DESY) in Hamburg will, starting in 2015, open up completely new research opportunities for scientist and industrial users by exploiting ultrashort X-ray laser pulses. Bunches of electrons are accelerated by a radio frequency field inside superconducting cavities up to an energy of 17.5 GeV. A periodic arrangement of magnets forces the accelerated electrons onto a tight slalom path leading to a process in that the electrons emit extremely short and intense X-ray flashes. The generation of equidistant X-ray flashes with a constant intensity requires an extremely high precision field control in combination with beam-based signals. FLASH, which can be seen as a pilot test facility, allows to develop and test controller concepts even before the European XFEL is in operation. In this thesis it is shown that a physical white box model structure, which describes the behavior of each subsystem within the radio frequency field control loop, obeys as first-order approximation the special orthogonal group of dimension two (SO(2)). Presented is a grey box identification approach, which combines the physical model structure with general identification methods. The accelerator modules are operated in a pulsed mode. Thus, the excitation of the system and therefore the identification of the input-output behavior is only possible within a short time period. Developed is an adaptive identification approach with a specified SO(2) symmetric model structure. The proposed controller design strategy fulfills the requirements of a high precision field performance. Adapting the feedforward signal by using an iterative learning control (ILC) algorithm reduces remaining repetitive field errors from pulse to pulse. It is shown, that exploiting the SO(2) symmetric structure and using the developed tensor based ILC representation simplifies the feedforward update computation. Magnetic chicanes, so

  19. Optimal cloning of arbitrary mirror-symmetric distributions on the Bloch sphere: a proposal for practical photonic realization

    International Nuclear Information System (INIS)

    Bartkiewicz, Karol; Miranowicz, Adam

    2012-01-01

    We study state-dependent quantum cloning that can outperform universal cloning (UC). This is possible by using some a priori information on a given quantum state to be cloned. Specifically, we propose a generalization and optical implementation of quantum optimal mirror phase-covariant cloning, which refers to optimal cloning of sets of qubits of known modulus of the expectation value of Pauli's Z operator. Our results can be applied to cloning of an arbitrary mirror-symmetric distribution of qubits on the Bloch sphere including in special cases UC and phase-covariant cloning. We show that the cloning is optimal by adapting our former optimality proof for axisymmetric cloning (Bartkiewicz and Miranowicz 2010 Phys. Rev. A 82 042330). Moreover, we propose an optical realization of the optimal mirror phase-covariant 1→2 cloning of a qubit, for which the mean probability of successful cloning varies from 1/6 to 1/3 depending on prior information on the set of qubits to be cloned. The qubits are represented by polarization states of photons generated by the type-I spontaneous parametric down-conversion. The scheme is based on the interference of two photons on an unbalanced polarization-dependent beam splitter with different splitting ratios for vertical and horizontal polarization components and the additional application of feedforward by means of Pockels cells. The experimental feasibility of the proposed setup is carefully studied including various kinds of imperfections and losses. Moreover, we briefly describe two possible cryptographic applications of the optimal mirror phase-covariant cloning corresponding to state discrimination (or estimation) and secure quantum teleportation.

  20. Axion-photon conversion in space and in low symmetrical dielectric crystals

    International Nuclear Information System (INIS)

    Gorelik, V S

    2016-01-01

    The opportunities of axions detection as the result of axion-photon conversion processes in the space and in low symmetrical dielectric crystals are discussed. In accordance with the modern theory predictions, axions are pseudoscalar vacuum particles having very small (0.001-1.0 meV) rest energy. The possibility of axions conversion into photons and vice-versa processes in vacuum at the presence of outer magnetic field has been analyzed before. Pseudoscalar (axion type) modes are existing in some types of crystals. Polar pseudoscalar lattice and exciton modes in low symmetrical crystals are strongly interacted with axions. In this work, optical excitation of axion-type modes in low symmetrical crystals is proposed for observation of axion - photon conversion processes. Instead of outer magnetic field, the crystalline field of such crystals may be used. The experimental schemes for axion-photon conversion processes observation with recording the secondary emission of luminescence, infrared or Stimulated Raman Scattering in some dielectric crystals are discussed. (paper)

  1. Optical detection of symmetric and antisymmetric states in double quantum wells at room temperature

    Science.gov (United States)

    Marchewka, M.; Sheregii, E. M.; Tralle, I.; Marcelli, A.; Piccinini, M.; Cebulski, J.

    2009-09-01

    We studied the optical reflectivity of a specially grown double quantum well (DQW) structure characterized by a rectangular shape and a high electron density at room temperature. Assuming that the QWs depth is known, reflectivity spectra in the mid-IR range allow to carry out the precise measurements of the SAS-gap values (the energy gap between the symmetric and anti-symmetric states) and the absolute energies of both symmetric and antisymmetric electron states. The results of our experiments are in favor of the existence of the SAS splitting in the DQWs at room temperature. Here we have shown that the SAS gap increases proportionally to the subband quantum number and the optical electron transitions between symmetric and antisymmetric states belonging to different subbands are allowed. These results were used for interpretation of the beating effect in the Shubnikov-de Haas (SdH) oscillations at low temperatures (0.6 and 4.2 K). The approach to the calculation of the Landau-levels energies for DQW structures developed earlier [D. Ploch , Phys. Rev. B 79, 195434 (2009)] is used for the analysis and interpretation of the experimental data related to the beating effect. We also argue that in order to explain the beating effect in the SdH oscillations, one should introduce two different quasi-Fermi levels characterizing the two electron subsystems regarding symmetry properties of their wave functions, symmetric and antisymmetric ones. These states are not mixed neither by electron-electron interaction nor probably by electron-phonon interaction.

  2. Geometric inequalities for axially symmetric black holes

    International Nuclear Information System (INIS)

    Dain, Sergio

    2012-01-01

    A geometric inequality in general relativity relates quantities that have both a physical interpretation and a geometrical definition. It is well known that the parameters that characterize the Kerr-Newman black hole satisfy several important geometric inequalities. Remarkably enough, some of these inequalities also hold for dynamical black holes. This kind of inequalities play an important role in the characterization of the gravitational collapse; they are closely related with the cosmic censorship conjecture. Axially symmetric black holes are the natural candidates to study these inequalities because the quasi-local angular momentum is well defined for them. We review recent results in this subject and we also describe the main ideas behind the proofs. Finally, a list of relevant open problems is presented. (topical review)

  3. A symmetric bipolar nebula around MWC 922.

    Science.gov (United States)

    Tuthill, P G; Lloyd, J P

    2007-04-13

    We report regular and symmetric structure around dust-enshrouded Be star MWC 922 obtained with infrared imaging. Biconical lobes that appear nearly square in aspect, forming this "Red Square" nebula, are crossed by a series of rungs that terminate in bright knots or "vortices," and an equatorial dark band crossing the core delimits twin hyperbolic arcs. The intricate yet cleanly constructed forms that comprise the skeleton of the object argue for minimal perturbation from global turbulent or chaotic effects. We also report the presence of a linear comb structure, which may arise from optically projected shadows of a periodic feature in the inner regions, such as corrugations in the rim of a circumstellar disk. The sequence of nested polar rings draws comparison with the triple-ring system seen around the only naked-eye supernova in recent history: SN1987A.

  4. Minimal Left-Right Symmetric Dark Matter.

    Science.gov (United States)

    Heeck, Julian; Patra, Sudhanwa

    2015-09-18

    We show that left-right symmetric models can easily accommodate stable TeV-scale dark matter particles without the need for an ad hoc stabilizing symmetry. The stability of a newly introduced multiplet either arises accidentally as in the minimal dark matter framework or comes courtesy of the remaining unbroken Z_{2} subgroup of B-L. Only one new parameter is introduced: the mass of the new multiplet. As minimal examples, we study left-right fermion triplets and quintuplets and show that they can form viable two-component dark matter. This approach is, in particular, valid for SU(2)×SU(2)×U(1) models that explain the recent diboson excess at ATLAS in terms of a new charged gauge boson of mass 2 TeV.

  5. Quasiaxially symmetric stellarators with three field periods

    International Nuclear Information System (INIS)

    Garabedian, P.; Ku, L.

    1999-01-01

    Compact hybrid configurations with two field periods have been studied recently as candidates for a proof of principle experiment at the Princeton Plasma Physics Laboratory. This project has led us to the discovery of a family of quasiaxially symmetric stellarators with three field periods that have significant advantages, although their aspect ratios are a little larger. They have reversed shear and perform better in a local analysis of ballooning modes. Nonlinear equilibrium and stability calculations predict that the average beta limit will be at least as high as 4% if the bootstrap current turns out to be as big as that expected in comparable tokamaks. The concept relies on a combination of helical fields and bootstrap current to achieve adequate rotational transform at low aspect ratio. copyright 1999 American Institute of Physics

  6. Primordial two-component maximally symmetric inflation

    Science.gov (United States)

    Enqvist, K.; Nanopoulos, D. V.; Quirós, M.; Kounnas, C.

    1985-12-01

    We propose a two-component inflation model, based on maximally symmetric supergravity, where the scales of reheating and the inflation potential at the origin are decoupled. This is possible because of the second-order phase transition from SU(5) to SU(3)×SU(2)×U(1) that takes place when φ≅φcinflation at the global minimum, and leads to a reheating temperature TR≅(1015-1016) GeV. This makes it possible to generate baryon asymmetry in the conventional way without any conflict with experimental data on proton lifetime. The mass of the gravitinos is m3/2≅1012 GeV, thus avoiding the gravitino problem. Monopoles are diluted by residual inflation in the broken phase below the cosmological bounds if φcUSA.

  7. Polyhomogeneous expansions from time symmetric initial data

    Science.gov (United States)

    Gasperín, E.; Valiente Kroon, J. A.

    2017-10-01

    We make use of Friedrich’s construction of the cylinder at spatial infinity to relate the logarithmic terms appearing in asymptotic expansions of components of the Weyl tensor to the freely specifiable parts of time symmetric initial data sets for the Einstein field equations. Our analysis is based on the assumption that a particular type of formal expansions near the cylinder at spatial infinity corresponds to the leading terms of actual solutions to the Einstein field equations. In particular, we show that if the Bach tensor of the initial conformal metric does not vanish at the point at infinity then the most singular component of the Weyl tensor decays near null infinity as O(\\tilde{r}-3\\ln \\tilde{r}) so that spacetime will not peel. We also provide necessary conditions on the initial data which should lead to a peeling spacetime. Finally, we show how to construct global spacetimes which are candidates for non-peeling (polyhomogeneous) asymptotics.

  8. From Symmetric Glycerol Derivatives to Dissymmetric Chlorohydrins

    Directory of Open Access Journals (Sweden)

    Gemma Villorbina

    2011-03-01

    Full Text Available The anticipated worldwide increase in biodiesel production will result in an accumulation of glycerol for which there are insufficient conventional uses. The surplus of this by-product has increased rapidly during the last decade, prompting a search for new glycerol applications. We describe here the synthesis of dissymmetric chlorohydrin esters from symmetric 1,3-dichloro-2-propyl esters obtained from glycerol. We studied the influence of two solvents: 1,4-dioxane and 1-butanol and two bases: sodium carbonate and 1-butylimidazole, on the synthesis of dissymmetric chlorohydrin esters. In addition, we studied the influence of other bases (potassium and lithium carbonates in the reaction using 1,4-dioxane as the solvent. The highest yield was obtained using 1,4-dioxane and sodium carbonate.

  9. Bidding behavior in a symmetric Chinese auction

    Directory of Open Access Journals (Sweden)

    Mauricio Benegas

    2015-01-01

    Full Text Available This paper purposes a symmetric all-pay auction where the bidders compete neither for an object nor the object itself but for a lottery on receive. That lottery is determined endogenously through the bids. This auction is known as chance auction or more popularly as Chinese auction. The model considers the possibility that for some bidders the optimal strategy is to bid zero and to rely on luck. It showed that bidders become less aggressive when the lottery satisfies a variational condition. It was also shown that luck factor is decisive to determine if the expected payoff in Chinese auction is bigger or smaller than expected payoff in standard all-pay auction.

  10. Canonical quantization of static spherically symmetric geometries

    International Nuclear Information System (INIS)

    Christodoulakis, T; Dimakis, N; Terzis, P A; Doulis, G; Grammenos, Th; Melas, E; Spanou, A

    2013-01-01

    The conditional symmetries of the reduced Einstein–Hilbert action emerging from a static, spherically symmetric geometry are used as supplementary conditions on the wave function. Based on their integrability conditions, only one of the three existing symmetries can be consistently imposed, while the unique Casimir invariant, being the product of the remaining two symmetries, is calculated as the only possible second condition on the wave function. This quadratic integral of motion is identified with the reparametrization generator, as an implication of the uniqueness of the dynamical evolution, by fixing a suitable parametrization of the r-lapse function. In this parametrization, the determinant of the supermetric plays the role of the mesure. The combined Wheeler – DeWitt and linear conditional symmetry equations are analytically solved. The solutions obtained depend on the product of the two ''scale factors''

  11. Cryptanalysis of Some Lightweight Symmetric Ciphers

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed Awadelkareem Mohamed Ahmed

    In recent years, the need for lightweight encryption systems has been increasing as many applications use RFID and sensor networks which have a very low computational power and thus incapable of performing standard cryptographic operations. In response to this problem, the cryptographic community...... on a variant of PRESENT with identical round keys. We propose a new attack named the Invariant Subspace Attack that was specifically mounted against the lightweight block cipher PRINTcipher. Furthermore, we mount several attacks on a recently proposed stream cipher called A2U2....... of the international standards in lightweight cryptography. This thesis aims at analyzing and evaluating the security of some the recently proposed lightweight symmetric ciphers with a focus on PRESENT-like ciphers, namely, the block cipher PRESENT and the block cipher PRINTcipher. We provide an approach to estimate...

  12. Cosmic ray antimatter and baryon symmetric cosmology

    Science.gov (United States)

    Stecker, F. W.; Protheroe, R. J.; Kazanas, D.

    1982-01-01

    The relative merits and difficulties of the primary and secondary origin hypotheses for the observed cosmic-ray antiprotons, including the new low-energy measurement of Buffington, et al. We conclude that the cosmic-ray antiproton data may be evidence for antimatter galaxies and baryon symmetric cosmology. The present bar P data are consistent with a primary extragalactic component having /p=/equiv 1+/- 3.2/0.7x10 = to the -4 independent of energy. We propose that the primary extragalactic cosmic ray antiprotons are most likely from active galaxies and that expected disintegration of bar alpha/alpha ban alpha/alpha. We further predict a value for ban alpha/alpha =/equiv 10 to the -5, within range of future cosmic ray detectors.

  13. Spherically symmetric Einstein-aether perfect fluid models

    Energy Technology Data Exchange (ETDEWEB)

    Coley, Alan A.; Latta, Joey [Department of Mathematics and Statistics, Dalhousie University, Halifax, Nova Scotia, B3H 3J5 (Canada); Leon, Genly [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4950, Valparaíso (Chile); Sandin, Patrik, E-mail: aac@mathstat.dal.ca, E-mail: genly.leon@ucv.cl, E-mail: patrik.sandin@aei.mpg.de, E-mail: lattaj@mathstat.dal.ca [Max-Planck-Institut für Gravitationsphysik (Albert-Einstein-Institut), Am Mühlenberg 1, D-14476 Potsdam (Germany)

    2015-12-01

    We investigate spherically symmetric cosmological models in Einstein-aether theory with a tilted (non-comoving) perfect fluid source. We use a 1+3 frame formalism and adopt the comoving aether gauge to derive the evolution equations, which form a well-posed system of first order partial differential equations in two variables. We then introduce normalized variables. The formalism is particularly well-suited for numerical computations and the study of the qualitative properties of the models, which are also solutions of Horava gravity. We study the local stability of the equilibrium points of the resulting dynamical system corresponding to physically realistic inhomogeneous cosmological models and astrophysical objects with values for the parameters which are consistent with current constraints. In particular, we consider dust models in (β−) normalized variables and derive a reduced (closed) evolution system and we obtain the general evolution equations for the spatially homogeneous Kantowski-Sachs models using appropriate bounded normalized variables. We then analyse these models, with special emphasis on the future asymptotic behaviour for different values of the parameters. Finally, we investigate static models for a mixture of a (necessarily non-tilted) perfect fluid with a barotropic equations of state and a scalar field.

  14. Constructing exact symmetric informationally complete measurements from numerical solutions

    Science.gov (United States)

    Appleby, Marcus; Chien, Tuan-Yow; Flammia, Steven; Waldron, Shayne

    2018-04-01

    Recently, several intriguing conjectures have been proposed connecting symmetric informationally complete quantum measurements (SIC POVMs, or SICs) and algebraic number theory. These conjectures relate the SICs to their minimal defining algebraic number field. Testing or sharpening these conjectures requires that the SICs are expressed exactly, rather than as numerical approximations. While many exact solutions of SICs have been constructed previously using Gröbner bases, this method has probably been taken as far as is possible with current computer technology (except in special cases where there are additional symmetries). Here, we describe a method for converting high-precision numerical solutions into exact ones using an integer relation algorithm in conjunction with the Galois symmetries of an SIC. Using this method, we have calculated 69 new exact solutions, including nine new dimensions, where previously only numerical solutions were known—which more than triples the number of known exact solutions. In some cases, the solutions require number fields with degrees as high as 12 288. We use these solutions to confirm that they obey the number-theoretic conjectures, and address two questions suggested by the previous work.

  15. Symmetric Topological Phases and Tensor Network States

    Science.gov (United States)

    Jiang, Shenghan

    Classification and simulation of quantum phases are one of main themes in condensed matter physics. Quantum phases can be distinguished by their symmetrical and topological properties. The interplay between symmetry and topology in condensed matter physics often leads to exotic quantum phases and rich phase diagrams. Famous examples include quantum Hall phases, spin liquids and topological insulators. In this thesis, I present our works toward a more systematically understanding of symmetric topological quantum phases in bosonic systems. In the absence of global symmetries, gapped quantum phases are characterized by topological orders. Topological orders in 2+1D are well studied, while a systematically understanding of topological orders in 3+1D is still lacking. By studying a family of exact solvable models, we find at least some topological orders in 3+1D can be distinguished by braiding phases of loop excitations. In the presence of both global symmetries and topological orders, the interplay between them leads to new phases termed as symmetry enriched topological (SET) phases. We develop a framework to classify a large class of SET phases using tensor networks. For each tensor class, we can write down generic variational wavefunctions. We apply our method to study gapped spin liquids on the kagome lattice, which can be viewed as SET phases of on-site symmetries as well as lattice symmetries. In the absence of topological order, symmetry could protect different topological phases, which are often referred to as symmetry protected topological (SPT) phases. We present systematic constructions of tensor network wavefunctions for bosonic symmetry protected topological (SPT) phases respecting both onsite and spatial symmetries.

  16. The radiation chemistry of symmetric aliphatic polyesters

    International Nuclear Information System (INIS)

    Babanalbandi, A.; Hill, D.J.T.; Pomery, P.J.; Whittaker, A.K.

    1996-01-01

    Full text: Naturally occurring, symmetric polyesters, including polyglycolic acid, polylactic acid and polyhydroxybutyrate, have found biomedical applications in areas as diverse as the controlled release of pharmaceuticals and the manufacture of surgical sutures. As biomedical products, the materials require sterilization by high energy radiation. This has provided the motivation for the present work. D'Alelio et al. have reported that linear, asymmetric polyesters undergo scission on irradiation, but that branched polyesters containing a methyl group in the diol segments undergo crosslinking. However, for the symmetric polyhydroxybutyrate, Carswell-Pomerantz et al. have reported that only scission occurs on radiolysis, with the evolution of CO and CO 2 as a result of the loss of ester linkages. These workers also found that G(CO + CO 2 ) was approximately equal to G(S) for this polyester. By contrast, Collett et al. have reported that G(S) = 1.26 and G(X) = 0.53 for polylactic acid, which indicates that the polymer undergoes nett crosslinking on radiolysis to form a gel. They have also reported that poly(lactic-co-glycolic acid) should form a gel on radiolysis, since G(S) = 1.66 and G(X) = 0.65 for a 1:1 copolymer composition. In the present work the radiolysis of polylactic acid and poly(lactic-co-glycolic acid) have been reinvestigated in order to resolve the differences between the work of Collett et al. and that of Carswell-Pomerantz et al. In these studies, ESR has been used to study the radicals formed, GPC has been used to investigate scission and crosslinking, GC has been used to study the small molecule volatile products and NMR spectroscopy has been used to identify and measure the new chemical structures formed in the polymers

  17. FFLP problem with symmetric trapezoidal fuzzy numbers

    Directory of Open Access Journals (Sweden)

    Reza Daneshrad

    2015-04-01

    Full Text Available The most popular approach for solving fully fuzzy linear programming (FFLP problems is to convert them into the corresponding deterministic linear programs. Khan et al. (2013 [Khan, I. U., Ahmad, T., & Maan, N. (2013. A simplified novel technique for solving fully fuzzy linear programming problems. Journal of Optimization Theory and Applications, 159(2, 536-546.] claimed that there had been no method in the literature to find the fuzzy optimal solution of a FFLP problem without converting it into crisp linear programming problem, and proposed a technique for the same. Others showed that the fuzzy arithmetic operation used by Khan et al. (2013 had some problems in subtraction and division operations, which could lead to misleading results. Recently, Ezzati et al. (2014 [Ezzati, R., Khorram, E., & Enayati, R. (2014. A particular simplex algorithm to solve fuzzy lexicographic multi-objective linear programming problems and their sensitivity analysis on the priority of the fuzzy objective functions. Journal of Intelligent and Fuzzy Systems, 26(5, 2333-2358.] defined a new operation on symmetric trapezoidal fuzzy numbers and proposed a new algorithm to find directly a lexicographic/preemptive fuzzy optimal solution of a fuzzy lexicographic multi-objective linear programming problem by using new fuzzy arithmetic operations, but their model was not fully fuzzy optimization. In this paper, a new method, by using Ezzati et al. (2014’s fuzzy arithmetic operation and a fuzzy version of simplex algorithm, is proposed for solving FFLP problem whose parameters are represented by symmetric trapezoidal fuzzy number without converting the given problem into crisp equivalent problem. By using the proposed method, the fuzzy optimal solution of FFLP problem can be easily obtained. A numerical example is provided to illustrate the proposed method.

  18. Axially symmetric Lorentzian wormholes in general relativity

    International Nuclear Information System (INIS)

    Schein, F.

    1997-11-01

    The field equations of Einstein's theory of general relativity, being local, do not fix the global structure of space-time. They admit topologically non-trivial solutions, including spatially closed universes and the amazing possibility of shortcuts for travel between distant regions in space and time - so-called Lorentzian wormholes. The aim of this thesis is to (mathematically) construct space-times which contain traversal wormholes connecting arbitrary distant regions of an asymptotically flat or asymptotically de Sitter universe. Since the wormhole mouths appear as two separate masses in the exterior space, space-time can at best be axially symmetric. We eliminate the non-staticity caused by the gravitational attraction of the mouths by anchoring them by strings held at infinity or, alternatively, by electric repulsion. The space-times are obtained by surgically grafting together well-known solutions of Einstein's equations along timelike hypersurfaces. This surgery naturally concentrates a non-zero stress-energy tensor on the boundary between the two space-times which can be investigated by using the standard thin shell formalism. It turns out that, when using charged black holes, the provided constructions are possible without violation of any of the energy conditions. In general, observers living in the axially symmetric, asymptotically flat (respectively asymptotically de Sitter) region axe able to send causal signals through the topologically non-trivial region. However, the wormhole space-times contain closed timelike curves. Because of this explicit violation of global hyperbolicity these models do not serve as counterexamples to known topological censorship theorems. (author)

  19. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  20. A multigrid algorithm for the cell-centered finite difference scheme

    Science.gov (United States)

    Ewing, Richard E.; Shen, Jian

    1993-01-01

    In this article, we discuss a non-variational V-cycle multigrid algorithm based on the cell-centered finite difference scheme for solving a second-order elliptic problem with discontinuous coefficients. Due to the poor approximation property of piecewise constant spaces and the non-variational nature of our scheme, one step of symmetric linear smoothing in our V-cycle multigrid scheme may fail to be a contraction. Again, because of the simple structure of the piecewise constant spaces, prolongation and restriction are trivial; we save significant computation time with very promising computational results.

  1. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  2. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  3. Symmetric tax competition under formula apportionment

    OpenAIRE

    Eggert, Wolfgang; Schjelderup, Guttorm

    2002-01-01

    This paper compares property taxation to a corporate income tax based on formula apportionment in a model where identical countries compete to attract capital. We find that if countries can pair a residence-based capital tax with a property tax (source tax on capital) the tax equilibrium is efficient. In contrast, the use of a 2-factor FA scheme based on sales and capital combined with a residence-based capital tax leads to an inefficient outcome.

  4. Stationary axially symmetric exterior solutions in the five-dimensional representation of the Brans-Dicke-Jordan theory of gravitation

    International Nuclear Information System (INIS)

    Bruckman, W.

    1986-01-01

    The inverse scattering method of Belinsky and Zakharov is used to investigate axially symmetric stationary vacuum soliton solutions in the five-dimensional representation of the Brans-Dicke-Jordan theory of gravitation, where the scalar field of the theory is an element of a five-dimensional metric. The resulting equations for the spacetime metric are similar to those of solitons in general relativity, while the scalar field generated is the product of a simple function of the coordinates and an already known scalar field solution. A family of solutions is considered that reduce, in the absence of rotation, to the five-dimensional form of a well-known Weyl-Levi Civita axially symmetric static vacuum solution. With a suitable choice of parameters, this static limit becomes equivalent to the spherically symmetric solution of the Brans-Dicke theory. An exact metric, in which the Kerr-scalar McIntosh solution is a special case, is given explicitly

  5. Magnetospectroscopy of symmetric and anti-symmetric states in double quantum wells

    Science.gov (United States)

    Marchewka, M.; Sheregii, E. M.; Tralle, I.; Ploch, D.; Tomaka, G.; Furdak, M.; Kolek, A.; Stadler, A.; Mleczko, K.; Zak, D.; Strupinski, W.; Jasik, A.; Jakiela, R.

    2008-02-01

    The experimental results obtained for magnetotransport in the InGaAs/InAlAs double quantum well (DQW) structures of two different shapes of wells are reported. A beating effect occurring in the Shubnikov-de Haas (SdH) oscillations was observed for both types of structures at low temperatures in the parallel transport when the magnetic field was perpendicular to the layers. An approach for the calculation of the Landau level energies for DQW structures was developed and then applied to the analysis and interpretation of the experimental data related to the beating effect. We also argue that in order to account for the observed magnetotransport phenomena (SdH and integer quantum Hall effect), one should introduce two different quasi-Fermi levels characterizing two electron subsystems regarding the symmetry properties of their states, symmetric and anti-symmetric ones, which are not mixed by electron-electron interaction.

  6. Symmetric compression of 'laser greenhouse' targets by a few laser beams

    International Nuclear Information System (INIS)

    Gus'kov, Sergei Yu; Demchenko, N N; Rozanov, Vladislav B; Stepanov, R V; Zmitrenko, N V; Caruso, A; Strangio, C

    2003-01-01

    The possibility of efficient and symmetric compression of a target with a low-density structured absorber by a few laser beams is considered. An equation of state is proposed for a porous medium, which takes into account the special features of the absorption of high-power nanosecond laser pulses. The open version of this target is shown to allow the use of ordinary Gaussian beams, requiring no special profiling of the absorber surface. The conditions are defined under which such targets can be compressed efficiently by only two laser beams (or beam clusters). Simulations show that for a 2.1-MJ laser pulse, a seven-fold gain for the target under study is achieved. (special issue devoted to the 80th anniversary of academician n g basov's birth)

  7. Pressure correction schemes for compressible flows

    International Nuclear Information System (INIS)

    Kheriji, W.

    2011-01-01

    This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)

  8. Patterns of agri-environmental scheme participation in Europe

    DEFF Research Database (Denmark)

    Pavlis, Evangelos S.; Terkenli, Theano S.; Kristensen, Søren Bech Pilgaard

    2016-01-01

    This paper investigates the personal and property characteristics of landowners who use EU Rural Development agri-environmental schemes (AES), as well as their motives for participation or non-participation in such schemes. The study is based on a questionnaire survey with landowners, in selected...... areas with marginal potential for agriculture. Motives for non-participation were also found to be dependent on the level of farming engagement and on case-area landscape types.......This paper investigates the personal and property characteristics of landowners who use EU Rural Development agri-environmental schemes (AES), as well as their motives for participation or non-participation in such schemes. The study is based on a questionnaire survey with landowners, in selected...... geographical particularities and on subjective factors, farmers' individualities, different rural cultures, landscape types, EU and national policies and special needs of the study areas—all areas where agricultural production is increasingly marginalized, for different reasons. Subsidy scheme participation...

  9. AN ADVANCED LEAKAGE SCHEME FOR NEUTRINO TREATMENT IN ASTROPHYSICAL SIMULATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Perego, A. [Institut für Kernphysik, Technische Universität Darmstadt, Schlossgartenstraße 2, D-64289 Darmstadt (Germany); Cabezón, R. M. [Physics Department, University of Basel, Klingelbergstrasse 82, CH-4056 Basel (Switzerland); Käppeli, R., E-mail: albino.perego@physik.tu-darmstadt.de [Seminar for Applied Mathematics, ETH Zürich, Rämistrasse 101, 8092 Zürich (Switzerland)

    2016-04-15

    We present an Advanced Spectral Leakage (ASL) scheme to model neutrinos in the context of core-collapse supernovae (CCSNe) and compact binary mergers. Based on previous gray leakage schemes, the ASL scheme computes the neutrino cooling rates by interpolating local production and diffusion rates (relevant in optically thin and thick regimes, respectively) separately for discretized values of the neutrino energy. Neutrino trapped components are also modeled, based on equilibrium and timescale arguments. The better accuracy achieved by the spectral treatment allows a more reliable computation of neutrino heating rates in optically thin conditions. The scheme has been calibrated and tested against Boltzmann transport in the context of Newtonian spherically symmetric models of CCSNe. ASL shows a very good qualitative and a partial quantitative agreement for key quantities from collapse to a few hundreds of milliseconds after core bounce. We have proved the adaptability and flexibility of our ASL scheme, coupling it to an axisymmetric Eulerian and to a three-dimensional smoothed particle hydrodynamics code to simulate core collapse. Therefore, the neutrino treatment presented here is ideal for large parameter-space explorations, parametric studies, high-resolution tests, code developments, and long-term modeling of asymmetric configurations, where more detailed neutrino treatments are not available or are currently computationally too expensive.

  10. Maclaurin symmetric mean operators of linguistic intuitionistic fuzzy numbers and their application to multiple-attribute decision-making

    Science.gov (United States)

    Liu, Peide; Qin, Xiyou

    2017-11-01

    Linguistic intuitionistic fuzzy number (LIFN) is a special intuitionistic fuzzy number which can more easily describe the vagueness existing in the real decision-making. Maclaurin symmetric mean (MSM) operator has the characteristic of considering the interrelationships among any number of input parameters. In this paper, we extended the MSM operator to the LIFNs and some extended MSM operators for LIFNs were proposed, some new decision-making methods were developed. Firstly, we introduced the definition, score function, properties and operational rules of the LIFNs. Then, we proposed some linguistic intuitionistic fuzzy MSM operators, such as linguistic intuitionistic fuzzy Maclaurin symmetric mean operator, weighted linguistic intuitionistic fuzzy Maclaurin symmetric mean (WLIFMSM) operator, linguistic intuitionistic fuzzy dual Maclaurin symmetric mean operator, weighted linguistic intuitionistic fuzzy dual Maclaurin symmetric mean (WLIFDMSM) operator. In the meantime, we studied some important properties of these operators, and developed some methods based on WLIFMSM operator and WLIFDMSM operator for multi-attribute decision-making. Finally, we use an example to demonstrate the effectiveness of the proposed methods.

  11. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  12. Entangling capabilities of symmetric two-qubit gates

    Indian Academy of Sciences (India)

    Com- putational investigation of entanglement of such ensembles is therefore impractical for ... the computational complexity. Pairs of spin-1 ... tensor operators which can also provide different symmetric logic gates for quantum pro- ... that five of the eight, two-qubit symmetric quantum gates expressed in terms of our newly.

  13. SUSY formalism for the symmetric double well potential

    Indian Academy of Sciences (India)

    symmetric double well potential barrier we have obtained a class of exactly solvable potentials subject to moving boundary condition. The eigenstates are also obtained by the same technique. Keywords. SUSY; moving boundary condition; exactly solvable; symmetric double well; NH3 molecule. PACS Nos 02.30.Ik; 03.50.

  14. A New Formulation for Symmetric Implicit Runge-Kutta-Nystrom ...

    African Journals Online (AJOL)

    In this paper we derive symmetric stable Implicit Runge-Kutta –Nystrom Method for the Integration of General Second Order ODEs by using the collocation approach.The block hybrid method obtained by the evaluation of the continuous interpolant at different nodes of the polynomial is symmetric and suitable for stiff intial ...

  15. Crossing symmetric solution of the Chew-Low equation

    International Nuclear Information System (INIS)

    McLeod, R.J.; Ernst, D.J.

    1982-01-01

    An N/D dispersion theory is developed which solves crossing symmetric Low equations. The method is used to generate crossing symmetric solutions to the Chew-Low model. We show why the technique originally proposed by Chew and Low was incapable of producing solutions. (orig.)

  16. Sparse symmetric preconditioners for dense linear systems in electromagnetism

    NARCIS (Netherlands)

    Carpentieri, Bruno; Duff, Iain S.; Giraud, Luc; Monga Made, M. Magolu

    2004-01-01

    We consider symmetric preconditioning strategies for the iterative solution of dense complex symmetric non-Hermitian systems arising in computational electromagnetics. In particular, we report on the numerical behaviour of the classical incomplete Cholesky factorization as well as some of its recent

  17. Stability of transparent spherically symmetric thin shells and wormholes

    International Nuclear Information System (INIS)

    Ishak, Mustapha; Lake, Kayll

    2002-01-01

    The stability of transparent spherically symmetric thin shells (and wormholes) to linearized spherically symmetric perturbations about static equilibrium is examined. This work generalizes and systematizes previous studies and explores the consequences of including the cosmological constant. The approach shows how the existence (or not) of a domain wall dominates the landscape of possible equilibrium configurations

  18. Coupled dilaton and electromagnetic field in cylindrically symmetric ...

    Indian Academy of Sciences (India)

    The dilaton black hole solutions have attracted considerable attention for the ... theory and study the corresponding cylindrically symmetric spacetime, where .... where Йm and Йe are integration constants to be interpreted later as the ..... feature is apparent for the cylindrically symmetric spacetime in the presence of the dila-.

  19. Radon transformation on reductive symmetric spaces: support theorems

    NARCIS (Netherlands)

    Kuit, J.J.|info:eu-repo/dai/nl/313872589

    2011-01-01

    In this thesis we introduce a class of Radon transforms for reductive symmetric spaces, including the horospherical transforms, and study some of their properties. In particular we obtain a generalization of Helgason's support theorem for the horospherical transform on a Riemannian symmetric space.

  20. New approach to solve symmetric fully fuzzy linear systems

    Indian Academy of Sciences (India)

    In this paper, we present a method to solve fully fuzzy linear systems with symmetric coefficient matrix. The symmetric coefficient matrix is decomposed into two systems of equations by using Cholesky method and then a solution can be obtained. Numerical examples are given to illustrate our method.

  1. Synthesis & Characterization of New bis-Symmetrical Adipoyl ...

    African Journals Online (AJOL)

    Full Title: Synthesis and Characterization of New bis-Symmetrical Adipoyl, Terepthaloyl, Chiral Diimido-di-L-alanine Diesters and Chiral Phthaloyl-L-alanine Ester of Tripropoxy p-tert-Butyl Calix[4]arene and Study of Their Hosting Ability for Alanine and Na+. Bis-symmetrical tripropoxy p-tert-butyl calix[4]arene esters were ...

  2. FACES WITH LARGE DIAMETER ON THE SYMMETRICAL TRAVELING SALESMAN POLYTOPE

    NARCIS (Netherlands)

    SIERKSMA, G; TIJSSEN, GA

    This paper deals with the symmetric traveling salesman polytope and contains three main theorems. The first one gives a new characterization of (non)adjacency. Based on this characterization a new upper bound for the diameter of the symmetric traveling salesman polytope (conjectured to be 2 by M.

  3. Specialization Patterns

    OpenAIRE

    Schultz , Ulrik Pagh; Lawall , Julia ,; Consel , Charles

    1999-01-01

    Design patterns offer numerous advantages for software development, but can introduce inefficiency into the finished program. Program specialization can eliminate such overheads, but is most effective when targeted by the user to specific bottlenecks. Consequently, we propose to consider program specialization and design patterns as complementary concepts. On the one hand, program specialization can optimize object-oriented programs written using design patterns. On the other hand, design pat...

  4. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  5. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  6. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  7. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  8. Symmetric metamaterials based on flower-shaped structure

    International Nuclear Information System (INIS)

    Tuong, P.V.; Park, J.W.; Rhee, J.Y.; Kim, K.W.; Cheong, H.; Jang, W.H.; Lee, Y.P.

    2013-01-01

    We proposed new models of metamaterials (MMs) based on a flower-shaped structure (FSS), whose “meta-atoms” consist of two flower-shaped metallic parts separated by a dielectric layer. Like the non-symmetric MMs based on cut-wire-pairs or electric ring resonators, the symmetrical FSS demonstrates the negative permeability at GHz frequencies. Employing the results, we designed a symmetric negative-refractive-index MM [a symmetric combined structure (SCS)], which is composed of FSSs and cross continuous wires. The MM properties of the FSS and the SCS are presented numerically and experimentally. - Highlights: • A new designed of sub-wavelength metamaterial, flower-shaped structure was proposed. • Flower-shaped meta-atom illustrated effective negative permeability. • Based on the meta-atom, negative refractive index was conventionally gained. • Negative refractive index was demonstrated with symmetric properties for electromagnetic wave. • Dimensional parameters were studied under normal electromagnetic wave

  9. On a broken - symmetric theory of gravity

    International Nuclear Information System (INIS)

    Fleming, H.

    1979-09-01

    A theory of gravity recently proposed by Zee is examined. The propagation of the special scalar field introduced by this theory is studied in cosmological models, and some problems are pointed out, connected with the possibility of a time-dependent vacuum expectation value for this scalar field. (Author) [pt

  10. Spherical spacelike geometries in static spherically symmetric spacetimes: Generalized Painlevè–Gullstrand coordinates, foliation, and embedding

    Energy Technology Data Exchange (ETDEWEB)

    Akbar, M.M., E-mail: akbar@utdallas.edu

    2017-06-10

    It is well known that static spherically symmetric spacetimes can admit foliations by flat spacelike hypersurfaces, which are best described in terms of the Painlevè–Gullstrand coordinates. The uniqueness and existence of such foliations were addressed earlier. In this paper, we prove, purely geometrically, that any possible foliation of a static spherically symmetric spacetime by an arbitrary codimension-one spherical spacelike geometry, up to time translation and rotation, is unique, and we find the algebraic condition under which it exists. This leads us to what can be considered as the most natural generalization of the Painlevè–Gullstrand coordinate system for static spherically symmetric metrics, which, in turn, makes it easy to derive generic conclusions on foliation and to study specific cases as well as to easily reproduce previously obtained generalizations as special cases. In particular, we note that the existence of foliation by flat hypersurfaces guarantees the existence of foliation by hypersurfaces whose Ricci curvature tensor is everywhere non-positive (constant negative curvature is a special case). The study of uniqueness and the existence concurrently solves the question of embeddability of a spherical spacelike geometry in one-dimensional higher static spherically symmetric spacetimes, and this produces known and new results geometrically, without having to go through the momentum and Hamiltonian constraints.

  11. Skyrmions and vector mesons: a symmetric approach

    International Nuclear Information System (INIS)

    Caldi, D.G.

    1984-01-01

    We propose an extension of the effective, low-energy chiral Lagrangian known as the Skyrme model, to one formulated by a non-linear sigma model generalized to include vector mesons in a symmetric way. The model is based on chiral SU(6) x SU(6) symmetry spontaneously broken to static SU(6). The rho and other vector mesons are dormant Goldstone bosons since they are in the same SU(6) multiplet as the pion and other pseudoscalars. Hence the manifold of our generalized non-linear sigma model is the coset space (SU(6) x SU(6))/Su(6). Relativistic effects, via a spin-dependent mass term, break the static SU(6) and give the vectors a mass. The model can then be fully relativistic and covariant. The lowest-lying Skyrmion in this model is the whole baryonic 56-plet, which splits into the octet and decuplet in the presence of relativistic SU(6)-breaking. Due to the built-in SU(6) and the presence of vector mesons, the model is expected to have better phenomenological results, as well as providing a conceptually more unified picture of mesons and baryons. 29 references

  12. Randomized Symmetric Crypto Spatial Fusion Steganographic System

    Directory of Open Access Journals (Sweden)

    Viswanathan Perumal

    2016-06-01

    Full Text Available The image fusion steganographic system embeds encrypted messages in decomposed multimedia carriers using a pseudorandom generator but it fails to evaluate the contents of the cover image. This results in the secret data being embedded in smooth regions, which leads to visible distortion that affects the imperceptibility and confidentiality. To solve this issue, as well as to improve the quality and robustness of the system, the Randomized Symmetric Crypto Spatial Fusion Steganography System is proposed in this study. It comprises three-subsystem bitwise encryption, spatial fusion, and bitwise embedding. First, bitwise encryption encrypts the message using bitwise operation to improve the confidentiality. Then, spatial fusion decomposes and evaluates the region of embedding on the basis of sharp intensity and capacity. This restricts the visibility of distortion and provides a high embedding capacity. Finally, the bitwise embedding system embeds the encrypted message through differencing the pixels in the region by 1, checking even or odd options and not equal to zero constraints. This reduces the modification rate to avoid distortion. The proposed heuristic algorithm is implemented in the blue channel, to which the human visual system is less sensitive. It was tested using standard IST natural images with steganalysis algorithms and resulted in better quality, imperceptibility, embedding capacity and invulnerability to various attacks compared to other steganographic systems.

  13. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  14. Left-right symmetric superstring supergravitation

    International Nuclear Information System (INIS)

    Burova, M.V.; Ter-Martirosyan, K.E.

    1988-01-01

    A left-right (L-R) symmetric model of four-dimensional supergravitation with a SO(10) gauge group obtained as the low-energy limit is superstring theory is considered. The spectrum of the gauge fields and their interactions are in agreement with the Weinberg-Salam theory. In addition, the model includes heavy W R ± and Z μ ' bosons. Beside the N g =3 generations of the 16-plets the SO(10) model includes the fragments of such generations which play the role of Higgs particles and also scalar chiral filds, the number of which exceeds by one the number of generations. As a result the neutrinos of each generation obtain a stable small Majorana mass. It is shown that the scalar field potential leads to spontaneous violation of the SU(2) R group and L-R symmetry and at low energies the standard Weinberg-Salam theory appears. However, reasonable values of X bosons masses M x and sun 2 Θ W (Θ W is the Weinberg angle) can be obtained in the model only in the case of high mass scale M R ∼10 10 -10 12 GeV of the right group SU(2) R violation

  15. Symmetric charge transfer cross section of uranium

    International Nuclear Information System (INIS)

    Shibata, Takemasa; Ogura, Koichi

    1995-03-01

    Symmetric charge transfer cross section of uranium was calculated under consideration of reaction paths. In the charge transfer reaction a d 3/2 electron in the U atom transfers into the d-electron site of U + ( 4 I 9/2 ) ion. The J value of the U atom produced after the reaction is 6, 5, 4 or 3, at impact energy below several tens eV, only resonant charge transfer in which the product atom is ground state (J=6) takes place. Therefore, the cross section is very small (4-5 x 10 -15 cm 2 ) compared with that considered so far. In the energy range of 100-1000eV the cross section increases with the impact energy because near resonant charge transfer in which an s-electron in the U atom transfers into the d-electron site of U + ion. Charge transfer cross section between U + in the first excited state (289 cm -1 ) and U in the ground state was also obtained. (author)

  16. THE COVARIATION FUNCTION FOR SYMMETRIC &ALPHA;-STABLE RANDOM VARIABLES WITH FINITE FIRST MOMENTS

    Directory of Open Access Journals (Sweden)

    Dedi Rosadi

    2012-05-01

    Full Text Available In this paper, we discuss a generalized dependence measure which is designed to measure dependence of two symmetric α-stable random variables with finite mean(1<α<=2 and contains the covariance function as the special case (when α=2. Weshortly discuss some basic properties of the function and consider several methods to estimate the function and further investigate the numerical properties of the estimatorusing the simulated data. We show how to apply this function to measure dependence of some stock returns on the composite index LQ45 in Indonesia Stock Exchange.

  17. Spherically Symmetric Solutions of the Einstein-Bach Equations and a Consistent Spin-2 Field Theory

    International Nuclear Information System (INIS)

    Janda, A.

    2006-01-01

    We briefly present a relationship between General Relativity coupled to certain spin-0 and spin-2 field theories and higher derivatives metric theories of gravity. In a special case, described by the Einstein-Bach equations, the spin-0 field drops out from the theory and we obtain a consistent spin-two field theory interacting gravitationally, which overcomes a well known inconsistency of the theory for a linear spin-two field coupled to the Einstein's gravity. Then we discuss basic properties of static spherically symmetric solutions of the Einstein-Bach equations. (author)

  18. Cylindrically symmetric solutions of a scalar--tensor theory of gravitation

    International Nuclear Information System (INIS)

    Singh, T.

    1975-01-01

    The cylindrically symmetric solutions for the Einstein--Rosen metric of a scalar--tensor theory proposed by Dunn have been obtained. A method has been given by which one can obtain, under certain conditions, solutions of this scalar--tensor theory from known solutions of the empty space field equations of Einstein's theory of gravitation. It is also found that one of the solutions of the scalar--tensor theory is nonsingular in the sense of Bonnor. Further some special solutions are obtained which reduce to the well-known solution of Levi-Civita and a time dependent solution obtained by Misra and Radhakrishna

  19. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  20. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  1. Specialized science.

    Science.gov (United States)

    Casadevall, Arturo; Fang, Ferric C

    2014-04-01

    As the body of scientific knowledge in a discipline increases, there is pressure for specialization. Fields spawn subfields that then become entities in themselves that promote further specialization. The process by which scientists join specialized groups has remarkable similarities to the guild system of the middle ages. The advantages of specialization of science include efficiency, the establishment of normative standards, and the potential for greater rigor in experimental research. However, specialization also carries risks of monopoly, monotony, and isolation. The current tendency to judge scientific work by the impact factor of the journal in which it is published may have roots in overspecialization, as scientists are less able to critically evaluate work outside their field than before. Scientists in particular define themselves through group identity and adopt practices that conform to the expectations and dynamics of such groups. As part of our continuing analysis of issues confronting contemporary science, we analyze the emergence and consequences of specialization in science, with a particular emphasis on microbiology, a field highly vulnerable to balkanization along microbial phylogenetic boundaries, and suggest that specialization carries significant costs. We propose measures to mitigate the detrimental effects of scientific specialism.

  2. Spherically symmetric analysis on open FLRW solution in non-linear massive gravity

    Energy Technology Data Exchange (ETDEWEB)

    Chiang, Chien-I; Izumi, Keisuke; Chen, Pisin, E-mail: chienichiang@berkeley.edu, E-mail: izumi@phys.ntu.edu.tw, E-mail: chen@slac.stanford.edu [Leung Center for Cosmology and Particle Astrophysics, National Taiwan University, Taipei 10617, Taiwan (China)

    2012-12-01

    We study non-linear massive gravity in the spherically symmetric context. Our main motivation is to investigate the effect of helicity-0 mode which remains elusive after analysis of cosmological perturbation around an open Friedmann-Lemaitre-Robertson-Walker (FLRW) universe. The non-linear form of the effective energy-momentum tensor stemming from the mass term is derived for the spherically symmetric case. Only in the special case where the area of the two sphere is not deviated away from the FLRW universe, the effective energy momentum tensor becomes completely the same as that of cosmological constant. This opens a window for discriminating the non-linear massive gravity from general relativity (GR). Indeed, by further solving these spherically symmetric gravitational equations of motion in vacuum to the linear order, we obtain a solution which has an arbitrary time-dependent parameter. In GR, this parameter is a constant and corresponds to the mass of a star. Our result means that Birkhoff's theorem no longer holds in the non-linear massive gravity and suggests that energy can probably be emitted superluminously (with infinite speed) on the self-accelerating background by the helicity-0 mode, which could be a potential plague of this theory.

  3. Special geometry

    International Nuclear Information System (INIS)

    Strominger, A.

    1990-01-01

    A special manifold is an allowed target manifold for the vector multiplets of D=4, N=2 supergravity. These manifolds are of interest for string theory because the moduli spaces of Calabi-Yau threefolds and c=9, (2,2) conformal field theories are special. Previous work has given a local, coordinate-dependent characterization of special geometry. A global description of special geometries is given herein, and their properties are studied. A special manifold M of complex dimension n is characterized by the existence of a holomorphic Sp(2n+2,R)xGL(1,C) vector bundle over M with a nowhere-vanishing holomorphic section Ω. The Kaehler potential on M is the logarithm of the Sp(2n+2,R) invariant norm of Ω. (orig.)

  4. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  5. In search of new relationship in NpNn scheme

    International Nuclear Information System (INIS)

    Kumar, Pradeep; Singh, M.; Gupta, K.K.; Singh, Y.; Bihari, Chhail; Varshney, A.K.; Gupta, D.K.

    2013-01-01

    It is well understood now that the use of quantity N p N n as a variable to gauge the structure of a given nucleus, and to track the evolution of structure, is called the N p N n scheme. In recent years, effort have been made for minimizing the uncertainties in Grodzins Rule introducing asymmetry in the even symmetric nuclei of medium mass range and to provide new relationship on moment of inertia in N p N n . This new relationship need to be tested in broader way also. Presented here are Ru, Xe, Ba, and Hf isotopic chain covering medium and heavy mass of nuclear chart in N p N n scheme, where the above view point is clearly verified in wider sense

  6. The use of the MacCormack scheme in computational hydraulics

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, R. [Universidad Central de Venezuela, Inst. de Mecanica de Fluidos, Caracas (Venezuela); Zhang, H.; Kahawita, R. [Ecole Polytechnique, Dept. of Civil Engineering, Montreal, Quebec (Canada)

    1985-07-01

    This manuscript describes the development of a numerical model that solves shallow water problems based upon an enhanced version of the MacCormack explicit scheme (MS). The MS has been successfully applied to solve numerous problems in gas dynamics. However, the standard application of the MS to solve the shallow water equations can cause in certain test cases non-linear instabilities and non-symmetrical results that eventually destroy the solution. By examining the calculation 'cell' one can show that the MS is not symmetric in space, which explains why it cannot be used directly in the treatment of hydraulic problems most of which possess irregular boundaries thereby resulting in a flow with no 'preferred direction'. This is contrary to what is usually encountered in aerodynamics. The enhanced MacCormack scheme is obtained by a simple modification to the original formulation resulting in a symmetric scheme. The scheme has been applied to the computation of the flowfield in a real life situation with satisfactory results. (author)

  7. The use of the MacCormack scheme in computational hydraulics

    International Nuclear Information System (INIS)

    Garcia, R.; Zhang, H.; Kahawita, R.

    1985-01-01

    This manuscript describes the development of a numerical model that solves shallow water problems based upon an enhanced version of the MacCormack explicit scheme (MS). The MS has been successfully applied to solve numerous problems in gas dynamics. However, the standard application of the MS to solve the shallow water equations can cause in certain test cases non-linear instabilities and non-symmetrical results that eventually destroy the solution. By examining the calculation 'cell' one can show that the MS is not symmetric in space, which explains why it cannot be used directly in the treatment of hydraulic problems most of which possess irregular boundaries thereby resulting in a flow with no 'preferred direction'. This is contrary to what is usually encountered in aerodynamics. The enhanced MacCormack scheme is obtained by a simple modification to the original formulation resulting in a symmetric scheme. The scheme has been applied to the computation of the flowfield in a real life situation with satisfactory results. (author)

  8. Comparison of eigensolvers for symmetric band matrices.

    Science.gov (United States)

    Moldaschl, Michael; Gansterer, Wilfried N

    2014-09-15

    We compare different algorithms for computing eigenvalues and eigenvectors of a symmetric band matrix across a wide range of synthetic test problems. Of particular interest is a comparison of state-of-the-art tridiagonalization-based methods as implemented in Lapack or Plasma on the one hand, and the block divide-and-conquer (BD&C) algorithm as well as the block twisted factorization (BTF) method on the other hand. The BD&C algorithm does not require tridiagonalization of the original band matrix at all, and the current version of the BTF method tridiagonalizes the original band matrix only for computing the eigenvalues. Avoiding the tridiagonalization process sidesteps the cost of backtransformation of the eigenvectors. Beyond that, we discovered another disadvantage of the backtransformation process for band matrices: In several scenarios, a lot of gradual underflow is observed in the (optional) accumulation of the transformation matrix and in the (obligatory) backtransformation step. According to the IEEE 754 standard for floating-point arithmetic, this implies many operations with subnormal (denormalized) numbers, which causes severe slowdowns compared to the other algorithms without backtransformation of the eigenvectors. We illustrate that in these cases the performance of existing methods from Lapack and Plasma reaches a competitive level only if subnormal numbers are disabled (and thus the IEEE standard is violated). Overall, our performance studies illustrate that if the problem size is large enough relative to the bandwidth, BD&C tends to achieve the highest performance of all methods if the spectrum to be computed is clustered. For test problems with well separated eigenvalues, the BTF method tends to become the fastest algorithm with growing problem size.

  9. Survival and transmission of symmetrical chromosomal aberrations

    International Nuclear Information System (INIS)

    Savage, J.R.K.

    1979-01-01

    The interaction between the lesions to produce chromosomal structural changes may be either asymmetrical (A) or symmetrical (S). In A, one or more acentric fragments are always produced, and there may also be the mechanical separation problems resulting from bridges at anaphase, while S-changes never produce fragment, and pose no mechanical problem in cell division. If A and S events occur with equal frequency, it might be an indication that they are truly the alternative modes of lesion interaction. Unstimulated lymphocytes were irradiated with 2.68 Gy 250 kV X-ray, and metaphases were sampled at 50 h after the stimulation. Preparations were complete diploid cells, and any obvious second division cells were rejected. So far as dermal repair and fibroblast functions are concerned, aberration burden seems to have little consequence from the view-point of the long-term survival in vivo. Large numbers of aberrations (mainly S translocation and terminal deletion) were found in the samples taken up to 60 years after therapy. Skin biopsies were removed 1 day and 6 months after irradiation and cultured. In irradiated cells, reciprocal translocations dominated, followed by terminal deletions, then inversions, while no chromosome-type aberration was seen in the control cells. a) The relative occurrence of A : S changes, b) long-term survival in vivo, c) the possibility of in vivo repair, and d) some unusual features of translocation found in Syrian hamsters are reviewed. The relevance or importance of major S events is clearly dependent upon the cells, the tissues or the organisms in which they occur. (Yamashita, S.)

  10. Radon transformation on reductive symmetric spaces:Support theorems

    DEFF Research Database (Denmark)

    Kuit, Job Jacob

    2013-01-01

    We introduce a class of Radon transforms for reductive symmetric spaces, including the horospherical transforms, and derive support theorems for these transforms. A reductive symmetric space is a homogeneous space G/H for a reductive Lie group G of the Harish-Chandra class, where H is an open sub...... is based on the relation between the Radon transform and the Fourier transform on G/H, and a Paley–Wiener-shift type argument. Our results generalize the support theorem of Helgason for the Radon transform on a Riemannian symmetric space....

  11. Nilpotent orbits in real symmetric pairs and stationary black holes

    International Nuclear Information System (INIS)

    Dietrich, Heiko; De Graaf, Willem A.; Ruggeri, Daniele; Trigiante, Mario

    2017-01-01

    In the study of stationary solutions in extended supergravities with symmetric scalar manifolds, the nilpotent orbits of a real symmetric pair play an important role. In this paper we discuss two approaches to determine the nilpotent orbits of a real symmetric pair. We apply our methods to an explicit example, and thereby classify the nilpotent orbits of (SL 2 (R)) 4 acting on the fourth tensor power of the natural 2-dimensional SL 2 (R)-module. This makes it possible to classify all stationary solutions of the so-called STU-supergravity model. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  12. Color symmetrical superconductivity in a schematic nuclear quark model

    DEFF Research Database (Denmark)

    Bohr, Henrik; Providencia, C.; da Providencia, J.

    2010-01-01

    In this letter, a novel BCS-type formalism is constructed in the framework of a schematic QCD inspired quark model, having in mind the description of color symmetrical superconducting states. In the usual approach to color superconductivity, the pairing correlations affect only the quasi-particle...... states of two colors, the single-particle states of the third color remaining unaffected by the pairing correlations. In the theory of color symmetrical superconductivity here proposed, the pairing correlations affect symmetrically the quasi-particle states of the three colors and vanishing net color...

  13. Highly-dispersive electromagnetic induced transparency in planar symmetric metamaterials.

    Science.gov (United States)

    Lu, Xiqun; Shi, Jinhui; Liu, Ran; Guan, Chunying

    2012-07-30

    We propose, design and experimentally demonstrate highly-dispersive electromagnetically induced transparency (EIT) in planar symmetric metamaterials actively switched and controlled by angles of incidence. Full-wave simulation and measurement results show EIT phenomena, trapped-mode excitations and the associated local field enhancement of two symmetric metamaterials consisting of symmetrically split rings (SSR) and a fishscale (FS) metamaterial pattern, respectively, strongly depend on angles of incidence. The FS metamaterial shows much broader spectral splitting than the SSR metamaterial due to the surface current distribution variation.

  14. Geometric characteristics of aberrations of plane-symmetric optical systems

    International Nuclear Information System (INIS)

    Lu Lijun; Deng Zhiyong

    2009-01-01

    The geometric characteristics of aberrations of plane-symmetric optical systems are studied in detail with a wave-aberration theory. It is dealt with as an extension of the Seidel aberrations to realize a consistent aberration theory from axially symmetric to plane-symmetric systems. The aberration distribution is analyzed with the spot diagram of a ray and an aberration curve. Moreover, the root-mean-square value and the centroid of aberration distribution are discussed. The numerical results are obtained with the focusing optics of a toroidal mirror at grazing incidence.

  15. Specialized languages

    DEFF Research Database (Denmark)

    Mousten, Birthe; Laursen, Anne Lise

    2016-01-01

    Across different fields of research, one feature is often overlooked: the use of language for specialized purposes (LSP) as a cross-discipline. Mastering cross-disciplinarity is the precondition for communicating detailed results within any field. Researchers in specialized languages work cross...... science fields communicate their findings. With this article, we want to create awareness of the work in this special area of language studies and of the inherent cross-disciplinarity that makes LSP special compared to common-core language. An acknowledgement of the importance of this field both in terms...... of more empirical studies and in terms of a greater application of the results would give language specialists in trade and industry a solid and updated basis for communication and language use....

  16. On zero variance Monte Carlo path-stretching schemes

    International Nuclear Information System (INIS)

    Lux, I.

    1983-01-01

    A zero variance path-stretching biasing scheme proposed for a special case by Dwivedi is derived in full generality. The procedure turns out to be the generalization of the exponential transform. It is shown that the biased game can be interpreted as an analog simulation procedure, thus saving some computational effort in comparison with the corresponding nonanalog game

  17. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  18. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  19. 6j-symbols for symmetric representations of SO(n) as the double series

    International Nuclear Information System (INIS)

    Alisauskas, Sigitas

    2002-01-01

    The corrected triple sum expression of Alisauskas (1987 J. Phys. A: Math. Gen. 20 35) for the recoupling (Racah) coefficients (6j-symbols) of the symmetric (most degenerate) representations of the orthogonal groups SO(n) (previously derived from the fourfold sum expression of Alisauskas also related to the result of Hormess and Junker (1999 J. Phys. A: Math. Gen. 32 4249) is rearranged into three new different double sum expressions (related to the hypergeometric Kampe de Feriet type series) and a new triple sum expression with preferable summation condition. The Regge type symmetry of special 6j-symbols of the orthogonal groups SO(n) in terms of special Kampe de Feriet F 1:4 1:3 series is revealed. The recoupling coefficients for antisymmetric representations of symplectic group Sp(2n) are derived using their relation with the recoupling coefficients of the formal orthogonal group SO(-2n)

  20. Path integral representation of the symmetric Rosen-Morse potential

    International Nuclear Information System (INIS)

    Duru, I.H.

    1983-09-01

    An integral formula for the Green's function of symmetric Rosen-Morse potential is obtained by solving path integrals. The correctly normalized wave functions and bound state energy spectrum are derived. (author)

  1. The geometrical theory of diffraction for axially symmetric reflectors

    DEFF Research Database (Denmark)

    Rusch, W.; Sørensen, O.

    1975-01-01

    The geometrical theory of diffraction (GTD) (cf. [1], for example) may be applied advantageously to many axially symmetric reflector antenna geometries. The material in this communication presents analytical, computational, and experimental results for commonly encountered reflector geometries...

  2. Filtering microfluidic bubble trains at a symmetric junction.

    Science.gov (United States)

    Parthiban, Pravien; Khan, Saif A

    2012-02-07

    We report how a nominally symmetric microfluidic junction can be used to sort all bubbles of an incoming train exclusively into one of its arms. The existence of this "filter" regime is unexpected, given that the junction is symmetric. We analyze this behavior by quantifying how bubbles modulate the hydrodynamic resistance in microchannels and show how speeding up a bubble train whilst preserving its spatial periodicity can lead to filtering at a nominally symmetric junction. We further show how such an asymmetric traffic of bubble trains can be triggered in symmetric geometries by identifying conditions wherein the resistance to flow decreases with an increase in the number of bubbles in the microchannel and derive an exact criterion to predict the same.

  3. Symmetric Pin Diversion Detection using a Partial Defect Detector (PDET)

    International Nuclear Information System (INIS)

    Sitaraman, S.; Ham, Y.S.

    2009-01-01

    Since the signature from the Partial Defect Detector (PDET) is principally dependent on the geometric layout of the guide tube locations, the capability of the technique in detecting symmetric diversion of pins needs to be determined. The Monte Carlo simulation study consisted of cases where pins were removed in a symmetric manner and the resulting signatures were examined. In addition to the normalized gamma-to-neutron ratios, the neutron and gamma signatures normalized to their maximum values, were also examined. Examination of the shape of the three curves as well as of the peak-to-valley differences in excess of the maximum expected in intact assemblies, indicated pin diversion. A set of simulations with various symmetric patterns of diversion were examined. The results from these studies indicated that symmetric diversions as low as twelve percent could be detected by this methodology

  4. Systems of Differential Equations with Skew-Symmetric, Orthogonal Matrices

    Science.gov (United States)

    Glaister, P.

    2008-01-01

    The solution of a system of linear, inhomogeneous differential equations is discussed. The particular class considered is where the coefficient matrix is skew-symmetric and orthogonal, and where the forcing terms are sinusoidal. More general matrices are also considered.

  5. A Paley-Wiener theorem for reductive symmetric spaces

    NARCIS (Netherlands)

    Ban, E.P. van den; Schlichtkrull, H.

    2006-01-01

    Let X = G/H be a reductive symmetric space and K a maximal compact subgroup of G. The image under the Fourier transform of the space of K-finite compactly supported smooth functions on X is characterized.

  6. Report on the Dynamical Evolution of an Axially Symmetric Quasar ...

    Indian Academy of Sciences (India)

    retical arguments together with some numerical evidence. The evolution of the orbits is studied, as mass is transported from the disk to the nucleus. ... galaxies and non-axially symmetric quasar models (see Papadopoulos & Caranicolas.

  7. first principles derivation of a stress function for axially symmetric

    African Journals Online (AJOL)

    HOD

    governing partial differential equations of linear isotropic elasticity were reduced to the solution of the biharmonic ... The stress function was then applied to solve the axially symmetric ..... [1] Borg S.K.: Fundamentals of Engineering Elasticity,.

  8. Symmetrization of mathematical model of charge transport in semiconductors

    Directory of Open Access Journals (Sweden)

    Alexander M. Blokhin

    2002-11-01

    Full Text Available A mathematical model of charge transport in semiconductors is considered. The model is a quasilinear system of differential equations. A problem of finding an additional entropy conservation law and system symmetrization are solved.

  9. An algebraic approach to the non-symmetric Macdonald polynomial

    International Nuclear Information System (INIS)

    Nishino, Akinori; Ujino, Hideaki; Wadati, Miki

    1999-01-01

    In terms of the raising and lowering operators, we algebraically construct the non-symmetric Macdonald polynomials which are simultaneous eigenfunctions of the commuting Cherednik operators. We also calculate Cherednik's scalar product of them

  10. Hardware Realization of Chaos Based Symmetric Image Encryption

    KAUST Repository

    Barakat, Mohamed L.

    2012-01-01

    This thesis presents a novel work on hardware realization of symmetric image encryption utilizing chaos based continuous systems as pseudo random number generators. Digital implementation of chaotic systems results in serious degradations

  11. Experimental technique of calibration of symmetrical air pollution ...

    Indian Academy of Sciences (India)

    Based on the inherent property of symmetry of air pollution models, a Symmetrical Air Pollution. Model ... process is in compliance with air pollution regula- ..... Ground simulation is achieved through MATLAB package which is based on least-.

  12. Hardware Realization of Chaos-based Symmetric Video Encryption

    KAUST Repository

    Ibrahim, Mohamad A.

    2013-01-01

    This thesis reports original work on hardware realization of symmetric video encryption using chaos-based continuous systems as pseudo-random number generators. The thesis also presents some of the serious degradations caused by digitally

  13. Invariant subspaces in some function spaces on symmetric spaces. II

    International Nuclear Information System (INIS)

    Platonov, S S

    1998-01-01

    Let G be a semisimple connected Lie group with finite centre, K a maximal compact subgroup of G, and M=G/K a Riemannian symmetric space of non-compact type. We study the problem of describing the structure of closed linear subspaces in various function spaces on M that are invariant under the quasiregular representation of the group G. We consider the case when M is a symplectic symmetric space of rank 1

  14. Symmetric coupling of four spin-1/2 systems

    Science.gov (United States)

    Suzuki, Jun; Englert, Berthold-Georg

    2012-06-01

    We address the non-binary coupling of identical angular momenta based upon the representation theory for the symmetric group. A correspondence is pointed out between the complete set of commuting operators and the reference-frame-free subsystems. We provide a detailed analysis of the coupling of three and four spin-1/2 systems and discuss a symmetric coupling of four spin-1/2 systems.

  15. Multiple symmetrical lipomatosis (Madelung's disease) - a case report

    International Nuclear Information System (INIS)

    Vieira, Marcelo Vasconcelos; Abreu, Marcelo de; Furtado, Claudia Dietz; Silveira, Marcio Fleck da; Furtado, Alvaro Porto Alegre; Genro, Carlos Horacio; Grazziotin, Rossano Ughini

    2001-01-01

    Multiple symmetrical lipomatosis (Madelung's disease) is a rare disorder characterized by deep accumulation of fat tissue, involving mainly the neck, shoulders and chest. This disease is associated with heavy alcohol intake and it is more common in men of Mediterranean origin. This disease can cause severe aesthetic deformities and progressive respiratory dysfunction. We report a case of a patient with multiple symmetrical lipomatosis and describe the clinical and radiological features of this disorder. (author)

  16. A Numerical Scheme Based on an Immersed Boundary Method for Compressible Turbulent Flows with Shocks: Application to Two-Dimensional Flows around Cylinders

    Directory of Open Access Journals (Sweden)

    Shun Takahashi

    2014-01-01

    Full Text Available A computational code adopting immersed boundary methods for compressible gas-particle multiphase turbulent flows is developed and validated through two-dimensional numerical experiments. The turbulent flow region is modeled by a second-order pseudo skew-symmetric form with minimum dissipation, while the monotone upstream-centered scheme for conservation laws (MUSCL scheme is employed in the shock region. The present scheme is applied to the flow around a two-dimensional cylinder under various freestream Mach numbers. Compared with the original MUSCL scheme, the minimum dissipation enabled by the pseudo skew-symmetric form significantly improves the resolution of the vortex generated in the wake while retaining the shock capturing ability. In addition, the resulting aerodynamic force is significantly improved. Also, the present scheme is successfully applied to moving two-cylinder problems.

  17. Solutions for the conductivity of multi-coated spheres and spherically symmetric inclusion problems

    Science.gov (United States)

    Pham, Duc Chinh

    2018-02-01

    Variational results on the macroscopic conductivity (thermal, electrical, etc.) of the multi-coated sphere assemblage have been used to derive the explicit expression of the respective field (thermal, electrical, etc.) within the spheres in d dimensions (d=2,3). A differential substitution approach has been developed to construct various explicit expressions or determining equations for the effective spherically symmetric inclusion problems, which include those with radially variable conductivity, different radially variable transverse and normal conductivities, and those involving imperfect interfaces, in d dimensions. When the volume proportion of the outermost spherical shell increases toward 1, one obtains the respective exact results for the most important specific cases: the dilute solutions for the compound inhomogeneities suspended in a major matrix phase. Those dilute solution results are also needed for other effective medium approximation schemes.

  18. Self-gravitating axially symmetric disks in general-relativistic rotation

    Science.gov (United States)

    Karkowski, Janusz; Kulczycki, Wojciech; Mach, Patryk; Malec, Edward; Odrzywołek, Andrzej; Piróg, Michał

    2018-05-01

    We integrate numerically axially symmetric stationary Einstein equations describing self-gravitating disks around spinless black holes. The numerical scheme is based on a method developed by Shibata, but contains important new ingredients. We derive a new general-relativistic Keplerian rotation law for self-gravitating disks around spinning black holes. Former results concerning rotation around spinless black holes emerge in the limit of a vanishing spin parameter. These rotation curves might be used for the description of rotating stars, after appropriate modification around the symmetry axis. They can be applied to the description of compact torus-black hole configurations, including active galactic nuclei or products of coalescences of two neutron stars.

  19. An analytical drain current model for symmetric double-gate MOSFETs

    Directory of Open Access Journals (Sweden)

    Fei Yu

    2018-04-01

    Full Text Available An analytical surface-potential-based drain current model of symmetric double-gate (sDG MOSFETs is described as a SPICE compatible model in this paper. The continuous surface and central potentials from the accumulation to the strong inversion regions are solved from the 1-D Poisson’s equation in sDG MOSFETs. Furthermore, the drain current is derived from the charge sheet model as a function of the surface potential. Over a wide range of terminal voltages, doping concentrations, and device geometries, the surface potential calculation scheme and drain current model are verified by solving the 1-D Poisson’s equation based on the least square method and using the Silvaco Atlas simulation results and experimental data, respectively. Such a model can be adopted as a useful platform to develop the circuit simulator and provide the clear understanding of sDG MOSFET device physics.

  20. An analytical drain current model for symmetric double-gate MOSFETs

    Science.gov (United States)

    Yu, Fei; Huang, Gongyi; Lin, Wei; Xu, Chuanzhong

    2018-04-01

    An analytical surface-potential-based drain current model of symmetric double-gate (sDG) MOSFETs is described as a SPICE compatible model in this paper. The continuous surface and central potentials from the accumulation to the strong inversion regions are solved from the 1-D Poisson's equation in sDG MOSFETs. Furthermore, the drain current is derived from the charge sheet model as a function of the surface potential. Over a wide range of terminal voltages, doping concentrations, and device geometries, the surface potential calculation scheme and drain current model are verified by solving the 1-D Poisson's equation based on the least square method and using the Silvaco Atlas simulation results and experimental data, respectively. Such a model can be adopted as a useful platform to develop the circuit simulator and provide the clear understanding of sDG MOSFET device physics.

  1. Symmetric Kullback-Leibler Metric Based Tracking Behaviors for Bioinspired Robotic Eyes.

    Science.gov (United States)

    Liu, Hengli; Luo, Jun; Wu, Peng; Xie, Shaorong; Li, Hengyu

    2015-01-01

    A symmetric Kullback-Leibler metric based tracking system, capable of tracking moving targets, is presented for a bionic spherical parallel mechanism to minimize a tracking error function to simulate smooth pursuit of human eyes. More specifically, we propose a real-time moving target tracking algorithm which utilizes spatial histograms taking into account symmetric Kullback-Leibler metric. In the proposed algorithm, the key spatial histograms are extracted and taken into particle filtering framework. Once the target is identified, an image-based control scheme is implemented to drive bionic spherical parallel mechanism such that the identified target is to be tracked at the center of the captured images. Meanwhile, the robot motion information is fed forward to develop an adaptive smooth tracking controller inspired by the Vestibuloocular Reflex mechanism. The proposed tracking system is designed to make the robot track dynamic objects when the robot travels through transmittable terrains, especially bumpy environment. To perform bumpy-resist capability under the condition of violent attitude variation when the robot works in the bumpy environment mentioned, experimental results demonstrate the effectiveness and robustness of our bioinspired tracking system using bionic spherical parallel mechanism inspired by head-eye coordination.

  2. Symmetric Kullback-Leibler Metric Based Tracking Behaviors for Bioinspired Robotic Eyes

    Directory of Open Access Journals (Sweden)

    Hengli Liu

    2015-01-01

    Full Text Available A symmetric Kullback-Leibler metric based tracking system, capable of tracking moving targets, is presented for a bionic spherical parallel mechanism to minimize a tracking error function to simulate smooth pursuit of human eyes. More specifically, we propose a real-time moving target tracking algorithm which utilizes spatial histograms taking into account symmetric Kullback-Leibler metric. In the proposed algorithm, the key spatial histograms are extracted and taken into particle filtering framework. Once the target is identified, an image-based control scheme is implemented to drive bionic spherical parallel mechanism such that the identified target is to be tracked at the center of the captured images. Meanwhile, the robot motion information is fed forward to develop an adaptive smooth tracking controller inspired by the Vestibuloocular Reflex mechanism. The proposed tracking system is designed to make the robot track dynamic objects when the robot travels through transmittable terrains, especially bumpy environment. To perform bumpy-resist capability under the condition of violent attitude variation when the robot works in the bumpy environment mentioned, experimental results demonstrate the effectiveness and robustness of our bioinspired tracking system using bionic spherical parallel mechanism inspired by head-eye coordination.

  3. Successful application and research of modularized scheme of containment liner of CPR1000+ reactor building

    International Nuclear Information System (INIS)

    Lu Qinwu; Zhang Shuxia; Guo Junying

    2012-01-01

    Research of modularized scheme in design, special grid structure spreader, crane, and successful applied in Yangjiang NPP project 3 will instruct and promote modularized construction of containment liner in construction projects. (authors)

  4. Special relativity

    International Nuclear Information System (INIS)

    Taylor, J.G.

    1975-01-01

    It is stated that the early chapters review special relativity from an elementary mathematical viewpoint, and include discussion of recent experiments which set out to test Einstein's predictions. The theory of relativity is then reformulated in more sophisticated mathematical language to show its relation to electro-magnetism, and to lay the foundation for more general viewpoints. The final chapter discusses in simple terms where activity in the field is currently centred, and where future interest lies. Chapter headings include: the constant speed of light; measuring time and distance; the Lorentz transformation (relativity of simultaneity, space-time and causality); relativistic kinematics (including - the Dopper effect); relativistic dynamics (including - nuclear binding energy, particle creation, electrodynamics); the structure of special relativity (including - the Lorentz group, the rotation group, elementary particle scattering); extensions of special relativity. (U.K.)

  5. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  6. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  7. The new social housing scheme in Nigeria: How beneficial for the ...

    African Journals Online (AJOL)

    The Nigerian government recently inaugurated a Special Committee on National Social Housing Scheme (NSHS) with a presidential mandate to provide housing for its less privileged citizens. In the pilot phase of the scheme, the committee was to build 18,000 units of houses across the country before the end of 2006.

  8. On the pseudo-norm in some PT-symmetric potentials

    International Nuclear Information System (INIS)

    Levai, G.

    2005-01-01

    Complete text of publication follows. PT-symmetric quantum mechanical systems possess non-hermitian Hamiltonian, still they have some characteristics similar to hermitian problems. The most notable of these is their discrete energy spectrum, which can be partly or completely real. These systems are invariant under the simultaneous action of the P space and T time inversion operations. Perhaps the simplest PT-symmetric Hamiltonian contains a one-dimensional Schroedinger operator with a complex potential satisfying the V*(-x) = V (x) relation. Another typical feature PT-symmetric systems have in common with hermitian problems is that their basis states form an orthogonal set provided that the inner product is redefined as (ψ φ)PT ≡ (ψ Pφ). However, the norm defined by this inner product, the pseudo-norm turned out to possess indefinite sign, and this raised the question of the probabilistic interpretation of PT-symmetric systems. This problem was later put into a more general context when it was found that PT symmetry is a special case of pseudo-hermiticity, and this explains most of the peculiar features of PT-symmetric systems. There have been several attempts to link PT-symmetric, and in general, pseudo- hermitian systems with equivalent hermitian ones, and the sign of the pseudo-norm was found to play an important role in this respect. It is thus essential to evaluate the pseudo- norm for various potentials, especially considering the fact that there are some inconsistencies in the available results. Numerical studies indicated that the sign of the pseudo-norm typically alternates according to the n principal quantum number as (-1) n , and this was later proven for a class of potentials that are written in a polynomial form of ix. However, some potentials of other type did not fit into this line: this was the case for the Scarf II potential, the most well-known exactly solvable PT-symmetric potential. In contrast with the other examples, this potential is

  9. On some Approximation Schemes for Steady Compressible Viscous Flow

    Science.gov (United States)

    Bause, M.; Heywood, J. G.; Novotny, A.; Padula, M.

    This paper continues our development of approximation schemes for steady compressible viscous flow based on an iteration between a Stokes like problem for the velocity and a transport equation for the density, with the aim of improving their suitability for computations. Such schemes seem attractive for computations because they offer a reduction to standard problems for which there is already highly refined software, and because of the guidance that can be drawn from an existence theory based on them. Our objective here is to modify a recent scheme of Heywood and Padula [12], to improve its convergence properties. This scheme improved upon an earlier scheme of Padula [21], [23] through the use of a special ``effective pressure'' in linking the Stokes and transport problems. However, its convergence is limited for several reasons. Firstly, the steady transport equation itself is only solvable for general velocity fields if they satisfy certain smallness conditions. These conditions are met here by using a rescaled variant of the steady transport equation based on a pseudo time step for the equation of continuity. Another matter limiting the convergence of the scheme in [12] is that the Stokes linearization, which is a linearization about zero, has an inevitably small range of convergence. We replace it here with an Oseen or Newton linearization, either of which has a wider range of convergence, and converges more rapidly. The simplicity of the scheme offered in [12] was conducive to a relatively simple and clearly organized proof of its convergence. The proofs of convergence for the more complicated schemes proposed here are structured along the same lines. They strengthen the theorems of existence and uniqueness in [12] by weakening the smallness conditions that are needed. The expected improvement in the computational performance of the modified schemes has been confirmed by Bause [2], in an ongoing investigation.

  10. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  11. Solar Special

    International Nuclear Information System (INIS)

    Van Roekel, A.; Osborne, J.; Schroeter, S.; De Jong, R.; De Saint Jacob, Y.

    2009-01-01

    Solar power is growing much faster than most policymakers and analysts realise. As costs come down and feed-in tariffs go up across Europe, a number of countries have started in pursuit of market leader Germany. But in Germany criticism is growing of the multi-billion-euro support schemes that keep the solar industry booming. In this section of the magazine several articles are dedicated to developments in solar energy in Europe. The first article is an overview story on the strong growing global market for solar cells, mainly thanks to subsidy schemes. The second article is on the position of foreign companies in the solar market in Italy. Article number three is dedicated to the conditions for solar technology companies to establish themselves in the German state of Saxony. Also the fifth article deals with the development of solar cells in Saxony: scientists, plant manufacturers and module producers in Saxony are working on new technologies that can be used to produce solar electricity cost-effectively. The goal is to bring the price down to match that of conventionally generated electricity within the next few years. The sixth article deals with the the solar power market in Belgium, which may be overheated or 'oversubsidized'. Article seven is on France, which used to be a pioneer in solar technology, but now produces only a fraction of the solar output of market leader Germany. However, new attractive feed-in-tariffs are changing the solar landscape drastically

  12. Cotangent bundles over all the Hermitian symmetric spaces

    International Nuclear Information System (INIS)

    Arai, Masato; Baba, Kurando

    2016-01-01

    We construct the N = 2 supersymmetric nonlinear sigma models on the cotangent bundles over all the compact and non-compact Hermitian symmetric spaces. In order to construct them we use the projective superspace formalism which is an N = 2 off-shell superfield formulation in four-dimensional space-time. This formalism allows us to obtain the explicit expression of N = 2 supersymmetric nonlinear sigma models on the cotangent bundles over any Hermitian symmetric spaces in terms of the N =1 superfields, once the Kähler potentials of the base manifolds are obtained. Starting with N = 1 supersymmetric Kähler nonlinear sigma models on the Hermitian symmetric spaces, we extend them into the N = 2 supersymmetric models by using the projective superspace formalism and derive the general formula for the cotangent bundles over all the compact and non-compact Hermitian symmetric spaces. We apply to the formula for the non-compact Hermitian symmetric space E 7 /E 6 × U(1) 1 . (paper)

  13. Optomechanically induced absorption in parity-time-symmetric optomechanical systems

    Science.gov (United States)

    Zhang, X. Y.; Guo, Y. Q.; Pei, P.; Yi, X. X.

    2017-06-01

    We explore the optomechanically induced absorption (OMIA) in a parity-time- (PT -) symmetric optomechanical system (OMS). By numerically calculating the Lyapunov exponents, we find out the stability border of the PT -symmetric OMS. The results show that in the PT -symmetric phase the system can be either stable or unstable depending on the coupling constant and the decay rate. In the PT -symmetric broken phase the system can have a stable state only for small gain rates. By calculating the transmission rate of the probe field, we find that there is an inverted optomechanically induced transparency (OMIT) at δ =-ωM and an OMIA at δ =ωM for the PT -symmetric optomechanical system. At each side of δ =-ωM there is an absorption window due to the resonance absorption of the two generated supermodes. Comparing with the case of optomechanics coupled to a passive cavity, we find that the active cavity can enhance the resonance absorption. The absorption rate at δ =ωM increases as the coupling strength between the two cavities increases. Our work provides us with a promising platform for controlling light propagation and light manipulation in terms of PT symmetry, which might have potential applications in quantum information processing and quantum optical devices.

  14. A cascaded three-phase symmetrical multistage voltage multiplier

    International Nuclear Information System (INIS)

    Iqbal, Shahid; Singh, G K; Besar, R; Muhammad, G

    2006-01-01

    A cascaded three-phase symmetrical multistage Cockcroft-Walton voltage multiplier (CW-VM) is proposed in this report. It consists of three single-phase symmetrical voltage multipliers, which are connected in series at their smoothing columns like string of batteries and are driven by three-phase ac power source. The smoothing column of each voltage multiplier is charged twice every cycle independently by respective oscillating columns and discharged in series through load. The charging discharging process completes six times a cycle and therefore the output voltage ripple's frequency is of sixth order of the drive signal frequency. Thus the proposed approach eliminates the first five harmonic components of load generated voltage ripples and sixth harmonic is the major ripple component. The proposed cascaded three-phase symmetrical voltage multiplier has less than half the voltage ripple, and three times larger output voltage and output power than the conventional single-phase symmetrical CW-VM. Experimental and simulation results of the laboratory prototype are given to show the feasibility of proposed cascaded three-phase symmetrical CW-VM

  15. Judgement of Design Scheme Based on Flexible Constraint in ICAD

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    The conception of flexible constraint is proposed in the paper. The solution of flexible constraint is in special range, and maybe different in different instances of same design scheme. The paper emphasis on how to evaluate and optimize a design scheme with flexible constraints based on the satisfaction degree function defined on flexible constraints. The conception of flexible constraint is used to solve constraint conflict and design optimization in complicated constraint-based assembly design by the PFM parametrization assembly design system. An instance of gear-box design is used for verifying optimization method.

  16. Conserving GW scheme for nonequilibrium quantum transport in molecular contacts

    DEFF Research Database (Denmark)

    Thygesen, Kristian Sommer; Rubio, Angel

    2008-01-01

    We give a detailed presentation of our recent scheme to include correlation effects in molecular transport calculations using the nonequilibrium Keldysh formalism. The scheme is general and can be used with any quasiparticle self-energy, but for practical reasons, we mainly specialize to the so......-called GW self-energy, widely used to describe the quasiparticle band structures and spectroscopic properties of extended and low-dimensional systems. We restrict the GW self-energy to a finite, central region containing the molecule, and we describe the leads by density functional theory (DFT). A minimal...

  17. International Specialization

    DEFF Research Database (Denmark)

    Kleindienst, Ingo; Geisler Asmussen, Christian; Hutzschenreuter, Thomas

    2012-01-01

    Whether and how international diversification and cross-border arbitrage affects firm performance remains one of the major unresolved research questions in the strategy and international business literatures. We propose that knowing how much a firm has internationally diversified tells us very...... little about performance implications, if we do not know, and do not ask, how the firm has diversified. Therefore, building on the two broad arguments of operating flexibility and location-specific commitment, we develop a theoretical framework that focuses on the extent to which a firm's international...... arbitrage strategy is characterized by specialization versus replication and argue that these different strategies may have differential impact on profitability and risk reduction. Developing a sophisticated measure of international specialization and using a unique panel data set of 92 German MNEs to test...

  18. Special offer

    CERN Multimedia

    Staff Association

    2010-01-01

    Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * next “vente privée” from 24th to 29th May 2010  

  19. Special lecture

    International Nuclear Information System (INIS)

    Yoshikawa, H.

    1998-01-01

    In his special lecture, given at the Artsimovich-Kadomtsev Memorial Session of the 17th IAEA Fusion Energy Conference in Yokohama, October 1998, Prof. H. Yoshikawa stated that the fusion program had come to a crossroads. He was wondering whether the future would lead to cooperation between nations, striving to overcome the difficulties the world is confronted with, or if it would lead to despair

  20. Special offer

    CERN Multimedia

    Staff Association

    2011-01-01

    SPECIAL OFFER FOR OUR MEMBERS Tarif unique Adulte/Enfant Entrée Zone terrestre 19 euros instead of 23 euros Entrée “Zone terrestre + aquatique” 24 euros instead of 31 euros Free for children under 3, with limited access to the attractions. Walibi Rhône-Alpes is open daily from 22 June to 31 August, and every week end from 3 September until 31 October. Closing of the “zone aquatique” 11 September.

  1. Special effects.

    Science.gov (United States)

    Davis, Carol

    The nursing team on the day case ward at Alder Hey Hospital has introduced changes to the environment to help children with special needs, who often attend the ward repeatedly. Small changes, such as keeping colours on the ward neutral, can help children relax. Nurses contact parents a week before admission to find out about their child's likes and dislikes. Parents are encouraged to bring a child's favourite items with them. Operating sessions are scheduled to meet these children's needs.

  2. Decomposition of a symmetric second-order tensor

    Science.gov (United States)

    Heras, José A.

    2018-05-01

    In the three-dimensional space there are different definitions for the dot and cross products of a vector with a second-order tensor. In this paper we show how these products can uniquely be defined for the case of symmetric tensors. We then decompose a symmetric second-order tensor into its ‘dot’ part, which involves the dot product, and the ‘cross’ part, which involves the cross product. For some physical applications, this decomposition can be interpreted as one in which the dot part identifies with the ‘parallel’ part of the tensor and the cross part identifies with the ‘perpendicular’ part. This decomposition of a symmetric second-order tensor may be suitable for undergraduate courses of vector calculus, mechanics and electrodynamics.

  3. Solitons in PT-symmetric potential with competing nonlinearity

    International Nuclear Information System (INIS)

    Khare, Avinash; Al-Marzoug, S.M.; Bahlouli, Hocine

    2012-01-01

    We investigate the effect of competing nonlinearities on beam dynamics in PT-symmetric potentials. In particular, we consider the stationary nonlinear Schrödinger equation (NLSE) in one dimension with competing cubic and generalized nonlinearity in the presence of a PT-symmetric potential. Closed form solutions for localized states are obtained. These solitons are shown to be stable over a wide range of potential parameters. The transverse power flow associated with these complex solitons is also examined. -- Highlights: ► Effect of competing nonlinearities on beam dynamics in PT-symmetric potentials. ► Closed form solutions for localized states are. ► The transverse power flow associated with these complex solitons is also examined.

  4. Nilpotent orbits in real symmetric pairs and stationary black holes

    Energy Technology Data Exchange (ETDEWEB)

    Dietrich, Heiko [School of Mathematical Sciences, Monash University, VIC (Australia); De Graaf, Willem A. [Department of Mathematics, University of Trento, Povo (Italy); Ruggeri, Daniele [Universita di Torino, Dipartimento di Fisica (Italy); INFN, Sezione di Torino (Italy); Trigiante, Mario [DISAT, Politecnico di Torino (Italy)

    2017-02-15

    In the study of stationary solutions in extended supergravities with symmetric scalar manifolds, the nilpotent orbits of a real symmetric pair play an important role. In this paper we discuss two approaches to determine the nilpotent orbits of a real symmetric pair. We apply our methods to an explicit example, and thereby classify the nilpotent orbits of (SL{sub 2}(R)){sup 4} acting on the fourth tensor power of the natural 2-dimensional SL{sub 2}(R)-module. This makes it possible to classify all stationary solutions of the so-called STU-supergravity model. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  5. Tourist Demand Reactions: Symmetric or Asymmetric across the Business Cycle?

    Science.gov (United States)

    Bronner, Fred; de Hoog, Robert

    2017-09-01

    Economizing and spending priorities on different types of vacations are investigated during two periods: an economic downturn and returning prosperity. Two nation-wide samples of vacationers are used: one during a downturn, the other one at the start of the recovery period. Through comparing the results, conclusions can be drawn about symmetric or asymmetric tourist demand across the business cycle. The main summer holiday has an asymmetric profile: being fairly crisis-resistant during a recession and showing considerable growth during an expansion. This does not apply to short vacations and day trips, each having a symmetric profile: during a recession they experience substantial reductions and during expansion comparable growth. So when talking about tourist demand in general , one cannot say that it is symmetric or asymmetric across the business cycle: it depends on the type of vacation. Differences in tourist demand are best explained by the role of Quality-of-Life for vacationers.

  6. Symmetric spaces and the Kashiwara-Vergne method

    CERN Document Server

    Rouvière, François

    2014-01-01

    Gathering and updating results scattered in journal articles over thirty years, this self-contained monograph gives a comprehensive introduction to the subject. Its goal is to: - motivate and explain the method for general Lie groups, reducing the proof of deep results in invariant analysis to the verification of two formal Lie bracket identities related to the Campbell-Hausdorff formula (the "Kashiwara-Vergne conjecture"); - give a detailed proof of the conjecture for quadratic and solvable Lie algebras, which is relatively elementary; - extend the method to symmetric spaces; here an obstruction appears, embodied in a single remarkable object called an "e-function"; - explain the role of this function in invariant analysis on symmetric spaces, its relation to invariant differential operators, mean value operators and spherical functions; - give an explicit e-function for rank one spaces (the hyperbolic spaces); - construct an e-function for general symmetric spaces, in the spirit of Kashiwara and Vergne's or...

  7. Rings with involution whose symmetric elements are central

    Directory of Open Access Journals (Sweden)

    Taw Pin Lim

    1980-01-01

    Full Text Available In a ring R with involution whose symmetric elements S are central, the skew-symmetric elements K form a Lie algebra over the commutative ring S. The classification of such rings which are 2-torsion free is equivalent to the classification of Lie algebras K over S equipped with a bilinear form f that is symmetric, invariant and satisfies [[x,y],z]=f(y,zx−f(z,xy. If S is a field of char ≠2, f≠0 and dimK>1 then K is a semisimple Lie algebra if and only if f is nondegenerate. Moreover, the derived algebra K′ is either the pure quaternions over S or a direct sum of mutually orthogonal abelian Lie ideals of dim≤2.

  8. Kinetic-energy distribution for symmetric fission of 236U

    International Nuclear Information System (INIS)

    Brissot, R.; Bocquet, J.P.; Ristori, C.; Crancon, J.; Guet, C.R.; Nifenecker, H.A.; Montoya, M.

    1980-01-01

    Fission fragment kinetic-energy distributions have been measured at the Grenoble high-flux reactor with the Lohengrin facility. Spurious events were eliminated in the symmetric region by a coherence test based on a time-of-flight measurement of fragment velocities. A Monte-Carlo calculation is then performed to correct the experimental data for neutron evaporation. The difference between the most probable kinetic energy in symmetric fission and the fission in which the heavy fragment is 'magic' (Zsub(H)=50) is found to be approximately =30 MeV. The results suggest that for the symmetric case the total excitation energy available at scission is shared equally among the fragments. (author)

  9. The discrete dynamics of symmetric competition in the plane.

    Science.gov (United States)

    Jiang, H; Rogers, T D

    1987-01-01

    We consider the generalized Lotka-Volterra two-species system xn + 1 = xn exp(r1(1 - xn) - s1yn) yn + 1 = yn exp(r2(1 - yn) - s2xn) originally proposed by R. M. May as a model for competitive interaction. In the symmetric case that r1 = r2 and s1 = s2, a region of ultimate confinement is found and the dynamics therein are described in some detail. The bifurcations of periodic points of low period are studied, and a cascade of period-doubling bifurcations is indicated. Within the confinement region, a parameter region is determined for the stable Hopf bifurcation of a pair of symmetrically placed period-two points, which imposes a second component of oscillation near the stable cycles. It is suggested that the symmetric competitive model contains much of the dynamical complexity to be expected in any discrete two-dimensional competitive model.

  10. Bound states for non-symmetric evolution Schroedinger potentials

    Energy Technology Data Exchange (ETDEWEB)

    Corona, Gulmaro Corona [Area de Analisis Matematico y sus Aplicaciones, Universidad Autonoma Metropolitana-Azcapotalco, Atzcapotzalco, DF (Mexico)). E-mail: ccg@correo.azc.uam.mx

    2001-09-14

    We consider the spectral problem associated with the evolution Schroedinger equation, (D{sup 2}+ k{sup 2}){phi}=u{phi}, where u is a matrix-square-valued function, with entries in the Schwartz class defined on the real line. The solution {phi}, called the wavefunction, consists of a function of one real variable, matrix-square-valued with entries in the Schwartz class. This problem has been dealt for symmetric potentials u. We found for the present case that the bound states are localized similarly to the scalar and symmetric cases, but by the zeroes of an analytic matrix-valued function. If we add an extra condition to the potential u, we can determine these states by an analytic scalar function. We do this by generalizing the scalar and symmetric cases but without using the fact that the Wronskian of a pair of wavefunction is constant. (author)

  11. Solution of generalized shifted linear systems with complex symmetric matrices

    International Nuclear Information System (INIS)

    Sogabe, Tomohiro; Hoshi, Takeo; Zhang, Shao-Liang; Fujiwara, Takeo

    2012-01-01

    We develop the shifted COCG method [R. Takayama, T. Hoshi, T. Sogabe, S.-L. Zhang, T. Fujiwara, Linear algebraic calculation of Green’s function for large-scale electronic structure theory, Phys. Rev. B 73 (165108) (2006) 1–9] and the shifted WQMR method [T. Sogabe, T. Hoshi, S.-L. Zhang, T. Fujiwara, On a weighted quasi-residual minimization strategy of the QMR method for solving complex symmetric shifted linear systems, Electron. Trans. Numer. Anal. 31 (2008) 126–140] for solving generalized shifted linear systems with complex symmetric matrices that arise from the electronic structure theory. The complex symmetric Lanczos process with a suitable bilinear form plays an important role in the development of the methods. The numerical examples indicate that the methods are highly attractive when the inner linear systems can efficiently be solved.

  12. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  13. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  14. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  15. A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy

    Directory of Open Access Journals (Sweden)

    Chong Fu

    2014-02-01

    Full Text Available Very recently, several chaos-based image ciphers using a bit-level permutation have been suggested and shown promising results. Due to the diffusion effect introduced in the permutation stage, the workload of the time-consuming diffusion stage is reduced, and hence the performance of the cryptosystem is improved. In this paper, a symmetric chaos-based image cipher with a 3D cat map-based spatial bit-level permutation strategy is proposed. Compared with those recently proposed bit-level permutation methods, the diffusion effect of the new method is superior as the bits are shuffled among different bit-planes rather than within the same bit-plane. Moreover, the diffusion key stream extracted from hyperchaotic system is related to both the secret key and the plain image, which enhances the security against known/chosen plaintext attack. Extensive security analysis has been performed on the proposed scheme, including the most important ones like key space analysis, key sensitivity analysis, plaintext sensitivity analysis and various statistical analyses, which has demonstrated the satisfactory security of the proposed scheme

  16. A Novel Symmetrical Split Ring Resonator Based on Microstrip for Microwave Sensors

    Directory of Open Access Journals (Sweden)

    Alahnomi Rammah A.

    2016-02-01

    Full Text Available In this paper, novel symmetrical split ring resonator (SSRR is proposed as a suitable component for performance enhancement of microwave sensors. SSRR has been employed for enhancing the insertion loss of the microwave sensors. Using the same device area, we can achieve a high Q-factor of 141.54 from the periphery enhancement using Quasi-linear coupling SSRR, whereas loose coupling SSRR can achieve a Q-factor of 33.98 only. Using Quasi-linear coupling SSRR, the Q-factor is enhanced 4.16 times the loose coupling SSRR using the same device area. After the optimization was made, the SSRR sensor with loose coupling scheme has achieved a very high Qfactor value around 407.34 while quasi-linear scheme has achieved high Q-factor value of 278.78 at the same operating frequency with smaller insertion loss. Spurious passbands at 1st, 2nd, 3rd, and 4th harmonics have been completely suppressed well above -20 dB rejection level without visible changes in the passband filter characteristics. The most significant of using SSRR is to be used for various industrial applications such as food industry, quality control, bio-sensing medicine and pharmacy. The simulation result that Quasi-linear coupling SSRR is a viable candidate for the performance enhancement of microwave sensors has been verified.

  17. Classification of Teleparallel Homothetic Vector Fields in Cylindrically Symmetric Static Space-Times in Teleparallel Theory of Gravitation

    International Nuclear Information System (INIS)

    Shabbir, Ghulam; Khan, Suhail

    2010-01-01

    In this paper we classify cylindrically symmetric static space-times according to their teleparallel homothetic vector fields using direct integration technique. It turns out that the dimensions of the teleparallel homothetic vector fields are 4, 5, 7 or 11, which are the same in numbers as in general relativity. In case of 4, 5 or 7 proper teleparallel homothetic vector fields exist for the special choice to the space-times. In the case of 11 teleparallel homothetic vector fields the space-time becomes Minkowski with all the zero torsion components. Teleparallel homothetic vector fields in this case are exactly the same as in general relativity. It is important to note that this classification also covers the plane symmetric static space-times. (general)

  18. Non-skew-symmetric classical r-matrices, algebraic Bethe ansatz, and Bardeen-Cooper-Schrieffer-type integrable systems

    International Nuclear Information System (INIS)

    Skrypnyk, T.

    2009-01-01

    We construct quantum integrable systems associated with non-skew-symmetric gl(2)-valued classical r-matrices. We find a new explicit multiparametric family of such the non-skew-symmetric classical r-matrices. We consider two classes of examples of the corresponding integrable systems, namely generalized Gaudin systems with and without an external magnetic field. In the case of arbitrary r-matrices diagonal in a standard gl(2)-basis, we calculate the spectrum of the corresponding quantum integrable systems using the algebraic Bethe ansatz. We apply these results to a construction of integrable fermionic models and obtain a wide class of integrable Bardeen-Cooper-Schrieffer (BCS)-type fermionic Hamiltonians containing the pairing and electrostatic interaction terms. We also consider special cases when the corresponding integrable Hamiltonians contain only pairing interaction term and are exact analogs of the 'reduced BCS Hamiltonian' of Richardson

  19. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  20. Parallel coupling of symmetric and asymmetric exclusion processes

    International Nuclear Information System (INIS)

    Tsekouras, K; Kolomeisky, A B

    2008-01-01

    A system consisting of two parallel coupled channels where particles in one of them follow the rules of totally asymmetric exclusion processes (TASEP) and in another one move as in symmetric simple exclusion processes (SSEP) is investigated theoretically. Particles interact with each other via hard-core exclusion potential, and in the asymmetric channel they can only hop in one direction, while on the symmetric lattice particles jump in both directions with equal probabilities. Inter-channel transitions are also allowed at every site of both lattices. Stationary state properties of the system are solved exactly in the limit of strong couplings between the channels. It is shown that strong symmetric couplings between totally asymmetric and symmetric channels lead to an effective partially asymmetric simple exclusion process (PASEP) and properties of both channels become almost identical. However, strong asymmetric couplings between symmetric and asymmetric channels yield an effective TASEP with nonzero particle flux in the asymmetric channel and zero flux on the symmetric lattice. For intermediate strength of couplings between the lattices a vertical-cluster mean-field method is developed. This approximate approach treats exactly particle dynamics during the vertical transitions between the channels and it neglects the correlations along the channels. Our calculations show that in all cases there are three stationary phases defined by particle dynamics at entrances, at exits or in the bulk of the system, while phase boundaries depend on the strength and symmetry of couplings between the channels. Extensive Monte Carlo computer simulations strongly support our theoretical predictions. Theoretical calculations and computer simulations predict that inter-channel couplings have a strong effect on stationary properties. It is also argued that our results might be relevant for understanding multi-particle dynamics of motor proteins

  1. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  2. Some curvature properties of quarter symmetric metric connections

    International Nuclear Information System (INIS)

    Rastogi, S.C.

    1986-08-01

    A linear connection Γ ji h with torsion tensor T j h P i -T i h P j , where T j h is an arbitrary (1,1) tensor field and P i is a 1-form, has been called a quarter-symmetric connection by Golab. Some properties of such connections have been studied by Rastogi, Mishra and Pandey, and Yano and Imai. In this paper based on the curvature tensor of quarter-symmetric metric connection we define a tensor analogous to conformal curvature tensor and study some properties of such a tensor. (author)

  3. Symmetric bends how to join two lengths of cord

    CERN Document Server

    Miles, Roger E

    1995-01-01

    A bend is a knot securely joining together two lengths of cord (or string or rope), thereby yielding a single longer length. There are many possible different bends, and a natural question that has probably occurred to many is: "Is there a 'best' bend and, if so, what is it?"Most of the well-known bends happen to be symmetric - that is, the two constituent cords within the bend have the same geometric shape and size, and interrelationship with the other. Such 'symmetric bends' have great beauty, especially when the two cords bear different colours. Moreover, they have the practical advantage o

  4. Norm estimates of complex symmetric operators applied to quantum systems

    International Nuclear Information System (INIS)

    Prodan, Emil; Garcia, Stephan R; Putinar, Mihai

    2006-01-01

    This paper communicates recent results in the theory of complex symmetric operators and shows, through two non-trivial examples, their potential usefulness in the study of Schroedinger operators. In particular, we propose a formula for computing the norm of a compact complex symmetric operator. This observation is applied to two concrete problems related to quantum mechanical systems. First, we give sharp estimates on the exponential decay of the resolvent and the single-particle density matrix for Schroedinger operators with spectral gaps. Second, we provide new ways of evaluating the resolvent norm for Schroedinger operators appearing in the complex scaling theory of resonances

  5. Exploring plane-symmetric solutions in f(R) gravity

    Energy Technology Data Exchange (ETDEWEB)

    Shamir, M. F., E-mail: farasat.shamir@nu.edu.pk [National University of Computer and Emerging Sciences, Department of Sciences and Humanities (Pakistan)

    2016-02-15

    The modified theories of gravity, especially the f(R) gravity, have attracted much attention in the last decade. This paper is devoted to exploring plane-symmetric solutions in the context of metric f(R) gravity. We extend the work on static plane-symmetric vacuum solutions in f(R) gravity already available in the literature [1, 2]. The modified field equations are solved using the assumptions of both constant and nonconstant scalar curvature. Some well-known solutions are recovered with power-law and logarithmic forms of f(R) models.

  6. Characterization of Generalized Young Measures Generated by Symmetric Gradients

    Science.gov (United States)

    De Philippis, Guido; Rindler, Filip

    2017-06-01

    This work establishes a characterization theorem for (generalized) Young measures generated by symmetric derivatives of functions of bounded deformation (BD) in the spirit of the classical Kinderlehrer-Pedregal theorem. Our result places such Young measures in duality with symmetric-quasiconvex functions with linear growth. The "local" proof strategy combines blow-up arguments with the singular structure theorem in BD (the analogue of Alberti's rank-one theorem in BV), which was recently proved by the authors. As an application of our characterization theorem we show how an atomic part in a BD-Young measure can be split off in generating sequences.

  7. Integrability and symmetric spaces. II- The coset spaces

    International Nuclear Information System (INIS)

    Ferreira, L.A.

    1987-01-01

    It shown that a sufficient condition for a model describing the motion of a particle on a coset space to possess a fundamental Poisson bracket relation, and consequently charges involution, is that it must be a symmetric space. The conditions a hamiltonian, or any function of the canonical variables, has to satisfy in order to commute with these charges are studied. It is shown that, for the case of non compact symmetric space, these conditions lead to an algebraic structure which plays an important role in the construction of conserved quantities. (author) [pt

  8. Color-symmetric superconductivity in a phenomenological QCD model

    DEFF Research Database (Denmark)

    Bohr, Henrik; Providencia, C.; Providencia, J. da

    2009-01-01

    In this paper, we construct a theory of the NJL type where superconductivity is present, and yet the superconducting state remains, in the average, color symmetric. This shows that the present approach to color superconductivity is consistent with color singletness. Indeed, quarks are free...... in the deconfined phase, but the deconfined phase itself is believed to be a color singlet. The usual description of the color superconducting state violates color singletness. On the other hand, the color superconducting state here proposed is color symmetric in the sense that an arbitrary color rotation leads...

  9. (Anti)symmetric multivariate exponential functions and corresponding Fourier transforms

    International Nuclear Information System (INIS)

    Klimyk, A U; Patera, J

    2007-01-01

    We define and study symmetrized and antisymmetrized multivariate exponential functions. They are defined as determinants and antideterminants of matrices whose entries are exponential functions of one variable. These functions are eigenfunctions of the Laplace operator on the corresponding fundamental domains satisfying certain boundary conditions. To symmetric and antisymmetric multivariate exponential functions there correspond Fourier transforms. There are three types of such Fourier transforms: expansions into the corresponding Fourier series, integral Fourier transforms and multivariate finite Fourier transforms. Eigenfunctions of the integral Fourier transforms are found

  10. Positive projections of symmetric matrices and Jordan algebras

    DEFF Research Database (Denmark)

    Fuglede, Bent; Jensen, Søren Tolver

    2013-01-01

    An elementary proof is given that the projection from the space of all symmetric p×p matrices onto a linear subspace is positive if and only if the subspace is a Jordan algebra. This solves a problem in a statistical model.......An elementary proof is given that the projection from the space of all symmetric p×p matrices onto a linear subspace is positive if and only if the subspace is a Jordan algebra. This solves a problem in a statistical model....

  11. Determination of symmetrical index for 3H in river waters

    International Nuclear Information System (INIS)

    Jankovic, M.; Todorovic, D.; Jankovic, B.; Nikolic, J.; Sarap, N.

    2011-01-01

    The paper presents the results of determining the symmetric index, which describes the magnitude of the tritium content changes with time, for samples of Sava and Danube river waters and Mlaka creek water. The results cover the period from 2003 to 2008. It was shown that the value of the symmetric index is the highest for Mlaka samples, which is in accordance with the fact that in these samples the highest concentration of tritium was found in comparison with samples of the Sava and Danube. [sr

  12. Flat synchronizations in spherically symmetric space-times

    International Nuclear Information System (INIS)

    Herrero, Alicia; Morales-Lladosa, Juan Antonio

    2010-01-01

    It is well known that the Schwarzschild space-time admits a spacelike slicing by flat instants and that the metric is regular at the horizon in the associated adapted coordinates (Painleve-Gullstrand metric form). We consider this type of flat slicings in an arbitrary spherically symmetric space-time. The condition ensuring its existence is analyzed, and then, we prove that, for any spherically symmetric flat slicing, the densities of the Weinberg momenta vanish. Finally, we deduce the Schwarzschild solution in the extended Painleve-Gullstrand-LemaItre metric form by considering the coordinate decomposition of the vacuum Einstein equations with respect to a flat spacelike slicing.

  13. Simple schemes for generation of W-type multipartite entangled states and realization of quantum-information concentration

    International Nuclear Information System (INIS)

    Deng-Yu, Zhang; Shi-Qing, Tang; Li-Jun, Xie; Xiao-Gui, Zhan; Yin-Hua, Chen; Feng, Gao

    2010-01-01

    We propose simple schemes for generating W-type multipartite entangled states in cavity quantum electrodynamics (CQED). Our schemes involve a largely detuned interaction of Λ-type three-level atoms with a single-mode cavity field and a classical laser, and both the symmetric and asymmetric W states can be created in a single step. Our schemes are insensitive to both the cavity decay and atomic spontaneous emission. With the above system, we also propose a scheme for realizing quantum-information concentration which is the reverse process of quantum cloning. In this scheme, quantum-information originally coming from a single qubit, but now distributed into many qubits, is concentrated back to a single qubit in only one step. (general)

  14. Generalized Weyl–Heisenberg Algebra, Qudit Systems and Entanglement Measure of Symmetric States via Spin Coherent States

    Directory of Open Access Journals (Sweden)

    Mohammed Daoud

    2018-04-01

    Full Text Available A relation is established in the present paper between Dicke states in a d-dimensional space and vectors in the representation space of a generalized Weyl–Heisenberg algebra of finite dimension d. This provides a natural way to deal with the separable and entangled states of a system of N = d − 1 symmetric qubit states. Using the decomposition property of Dicke states, it is shown that the separable states coincide with the Perelomov coherent states associated with the generalized Weyl–Heisenberg algebra considered in this paper. In the so-called Majorana scheme, the qudit (d-level states are represented by N points on the Bloch sphere; roughly speaking, it can be said that a qudit (in a d-dimensional space is describable by a N-qubit vector (in a N-dimensional space. In such a scheme, the permanent of the matrix describing the overlap between the N qubits makes it possible to measure the entanglement between the N qubits forming the qudit. This is confirmed by a Fubini–Study metric analysis. A new parameter, proportional to the permanent and called perma-concurrence, is introduced for characterizing the entanglement of a symmetric qudit arising from N qubits. For d = 3 ( ⇔ N = 2 , this parameter constitutes an alternative to the concurrence for two qubits. Other examples are given for d = 4 and 5. A connection between Majorana stars and zeros of a Bargmmann function for qudits closes this article.

  15. Efficient Nonlocal M-Control and N-Target Controlled Unitary Gate Using Non-symmetric GHZ States

    Science.gov (United States)

    Chen, Li-Bing; Lu, Hong

    2018-03-01

    Efficient local implementation of a nonlocal M-control and N-target controlled unitary gate is considered. We first show that with the assistance of two non-symmetric qubit(1)-qutrit(N) Greenberger-Horne-Zeilinger (GHZ) states, a nonlocal 2-control and N-target controlled unitary gate can be constructed from 2 local two-qubit CNOT gates, 2 N local two-qutrit conditional SWAP gates, N local qutrit-qubit controlled unitary gates, and 2 N single-qutrit gates. At each target node, the two third levels of the two GHZ target qutrits are used to expose one and only one initial computational state to the local qutrit-qubit controlled unitary gate, instead of being used to hide certain states from the conditional dynamics. This scheme can be generalized straightforwardly to implement a higher-order nonlocal M-control and N-target controlled unitary gate by using M non-symmetric qubit(1)-qutrit(N) GHZ states as quantum channels. Neither the number of the additional levels of each GHZ target particle nor that of single-qutrit gates needs to increase with M. For certain realistic physical systems, the total gate time may be reduced compared with that required in previous schemes.

  16. Numerical schemes for dynamically orthogonal equations of stochastic fluid and ocean flows

    International Nuclear Information System (INIS)

    Ueckermann, M.P.; Lermusiaux, P.F.J.; Sapsis, T.P.

    2013-01-01

    The quantification of uncertainties is critical when systems are nonlinear and have uncertain terms in their governing equations or are constrained by limited knowledge of initial and boundary conditions. Such situations are common in multiscale, intermittent and non-homogeneous fluid and ocean flows. The dynamically orthogonal (DO) field equations provide an adaptive methodology to predict the probability density functions of such flows. The present work derives efficient computational schemes for the DO methodology applied to unsteady stochastic Navier–Stokes and Boussinesq equations, and illustrates and studies the numerical aspects of these schemes. Semi-implicit projection methods are developed for the mean and for the DO modes, and time-marching schemes of first to fourth order are used for the stochastic coefficients. Conservative second-order finite-volumes are employed in physical space with new advection schemes based on total variation diminishing methods. Other results include: (i) the definition of pseudo-stochastic pressures to obtain a number of pressure equations that is linear in the subspace size instead of quadratic; (ii) symmetric advection schemes for the stochastic velocities; (iii) the use of generalized inversion to deal with singular subspace covariances or deterministic modes; and (iv) schemes to maintain orthonormal modes at the numerical level. To verify our implementation and study the properties of our schemes and their variations, a set of stochastic flow benchmarks are defined including asymmetric Dirac and symmetric lock-exchange flows, lid-driven cavity flows, and flows past objects in a confined channel. Different Reynolds number and Grashof number regimes are employed to illustrate robustness. Optimal convergence under both time and space refinements is shown as well as the convergence of the probability density functions with the number of stochastic realizations.

  17. Special energies and special frequencies

    International Nuclear Information System (INIS)

    Endrullis, M.; Englisch, H.

    1987-01-01

    ''Special frequencies'' have been asserted to be zeros of the density of frequencies corresponding to a random chain of coupled oscillators. Our investigation includes both this model and the random one-dimensional Schroedinger operator describing an alloy or its discrete analogue. Using the phase method we exactly determine a bilateral Lifsic asymptotic of the integrated density of states k(E) at special energies G s , which is not only of the classical type exp(-c/vertical strokeE-E s vertical stroke 1/2 ) but also exp(-c'/vertical strokeE-E s vertical stroke) is a typical behaviour. In addition, other asymptotics occur, e.g. vertical strokeE-E c vertical stroke c '', which show that k(E) need not be C ∞ . (orig.)

  18. Some exact solutions for maximally symmetric topological defects in Anti de Sitter space

    Science.gov (United States)

    Alvarez, Orlando; Haddad, Matthew

    2018-03-01

    We obtain exact analytical solutions for a class of SO( l) Higgs field theories in a non-dynamic background n-dimensional anti de Sitter space. These finite transverse energy solutions are maximally symmetric p-dimensional topological defects where n = ( p + 1) + l. The radius of curvature of anti de Sitter space provides an extra length scale that allows us to study the equations of motion in a limit where the masses of the Higgs field and the massive vector bosons are both vanishing. We call this the double BPS limit. In anti de Sitter space, the equations of motion depend on both p and l. The exact analytical solutions are expressed in terms of standard special functions. The known exact analytical solutions are for kink-like defects ( p = 0 , 1 , 2 , . . . ; l = 1), vortex-like defects ( p = 1 , 2 , 3; l = 2), and the 't Hooft-Polyakov monopole ( p = 0; l = 3). A bonus is that the double BPS limit automatically gives a maximally symmetric classical glueball type solution. In certain cases where we did not find an analytic solution, we present numerical solutions to the equations of motion. The asymptotically exponentially increasing volume with distance of anti de Sitter space imposes different constraints than those found in the study of defects in Minkowski space.

  19. Exact and analytic solutions of the Ernst equation governing axially symmetric stationary vacuum gravitational fields

    International Nuclear Information System (INIS)

    Baxter, Mathew; Van Gorder, Robert A

    2013-01-01

    We obtain solutions to a transformation of the axially symmetric Ernst equation, which governs a class of exact solutions of Einstein's field equations. Physically, the equation serves as a model of axially symmetric stationary vacuum gravitational fields. By an application of the method of homotopy analysis, we are able to construct approximate analytic solutions to the relevant boundary value problem in the case where exact solutions are not possible. The results presented constitute a solution for a complicated nonlinear and singular initial value problem. Through appropriate selection of the auxiliary linear operator and convergence control parameter, we are able to obtain low order approximations which minimize residual error over the problem domain. The benefit to such approach is that we obtain very accurate approximations after computing very few terms, hence the computational efficiency is high. Finally, an exact solution is provided in a special case, and this corresponds to the analytical solutions obtained in the more general case. The approximate solutions agree qualitatively with the exact solutions. (paper)

  20. Present and future nuclear power financing schemes

    International Nuclear Information System (INIS)

    Diel, R.

    1977-01-01

    The financial requirement for nuclear power plants in the Federal Republic of Germany for the period up until 1985 was estimated to run up to some DM 100 billion already in the Nuclear Energy Study published by the Dresdner Bank in 1974. This figure is not changed in any way by the reduction the nuclear power program has suffered in the meantime, because the lower requirement for investment capital is more than offset by the price increases that have occurred meanwhile. A capital requirement in the order of DM 100 billion raises major problems for the power producing industry and the banks which, however, are not going to hamper the further expansion of nuclear power, because new financing schemes have been specially developed for the nuclear field. They include financing by leasing, the use of funds from real estate credit institutions for long term financing, borrowing of long term funds in the Euro market, and financing through subsidiaries of the utilities. The new financing schemes also apply to the large financial requirement associated with the nuclear fuel cycle, waste management in particular. In this sector the utilities agree to bear the economic risk of the companies implementing the respective projects. Accordingly, financing will not entail any major difficulties. Another area of great importance is export financing. The German-Brazilian nuclear agreement is a model of this instrument. (orig.) [de

  1. Special offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions. TPG: reduced rates on annual transport passes for active and retired staff. Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret. FNAC: 5% reduction on FNAC vouchers. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  2. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions. TPG: reduced rates on annual transport passes for active and retired staff. Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret. Walibi: reduced prices for children and adults at this French attraction park in Les Avenières. FNAC: 5% reduction on FNAC vouchers. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  3. Special offer

    CERN Multimedia

    Staff Association

    2011-01-01

    OFFRE SPECIALE POUR NOS MEMBRES Les vendredis 29 juillet, 5 et 12 août, Aquaparc fermera ses portes exceptionnellement à 22h00. Pour ces évènements, des tarifs défiant toute concurrence vous sont proposés. Au programme : Clown spécialiste de la sculpture de ballons de 16h00 à 21h00 Ambiance Salsa avec danseurs professionnel : Démonstration et Cours de Salsa. Les tarifs : Pour une entrée à partir de 15h00 : Enfant : CHF 22.- Adulte : CHF 26.-  

  4. Special graphites

    International Nuclear Information System (INIS)

    Leveque, P.

    1964-01-01

    A large fraction of the work undertaken jointly by the Commissariat a l'Energie Atomique (CEA) and the Pechiney Company has been the improvement of the properties of nuclear pile graphite and the opening up of new fields of graphite application. New processes for the manufacture of carbons and special graphites have been developed: forged graphite, pyro-carbons, high density graphite agglomeration of graphite powders by cracking of natural gas, impervious graphites. The physical properties of these products and their reaction with various oxidising gases are described. The first irradiation results are also given. (authors) [fr

  5. Charge-exchange QRPA with the Gogny Force for Axially-symmetric Deformed Nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Martini, M., E-mail: martini.marco@gmail.com [Institut d' Astronomie et d' Astrophysique, Université Libre de Bruxelles, CP-226, 1050 Brussels (Belgium); CEA, DAM, DIF, F-91297 Arpajon (France); Goriely, S. [Institut d' Astronomie et d' Astrophysique, Université Libre de Bruxelles, CP-226, 1050 Brussels (Belgium); Péru, S. [CEA, DAM, DIF, F-91297 Arpajon (France)

    2014-06-15

    In recent years fully consistent quasiparticle random-phase approximation (QRPA) calculations using finite range Gogny force have been performed to study electromagnetic excitations of several axially-symmetric deformed nuclei up to the {sup 238}U. Here we present the extension of this approach to the charge-exchange nuclear excitations (pnQRPA). In particular we focus on the Isobaric Analog and Gamow-Teller resonances. A comparison of the predicted GT strength distribution with existing experimental data is presented. The role of nuclear deformation is shown. Special attention is paid to β-decay half-lives calculations for which experimental data exist and for specific isotone chains of relevance for the r-process nucleosynthesis.

  6. PEO nanocomposite polymer electrolyte for solid state symmetric

    Indian Academy of Sciences (India)

    Physical and electrochemical properties of polyethylene oxide (PEO)-based nanocomposite solid polymer electrolytes (NPEs) were investigated for symmetric capacitor applications. Nanosize fillers, i.e., Al2O3 and SiO2 incorporated polymer electrolyte exhibited higher ionic conductivity than those with filler-free composites ...

  7. Symmetric approximations of the Navier-Stokes equations

    International Nuclear Information System (INIS)

    Kobel'kov, G M

    2002-01-01

    A new method for the symmetric approximation of the non-stationary Navier-Stokes equations by a Cauchy-Kovalevskaya-type system is proposed. Properties of the modified problem are studied. In particular, the convergence as ε→0 of the solutions of the modified problem to the solutions of the original problem on an infinite interval is established

  8. SUSY formalism for the symmetric double well potential

    Indian Academy of Sciences (India)

    Using first- and second-order supersymmetric Darboüx formalism and starting with symmetric double well potential barrier we have obtained a class of exactly solvable potentials subject to moving boundary condition. The eigenstates are also obtained by the same technique.

  9. Coupled dilaton and electromagnetic field in cylindrically symmetric ...

    Indian Academy of Sciences (India)

    An exact solution is obtained for coupled dilaton and electromagnetic field in a cylindrically symmetric spacetime where an axial magnetic field as well as a radial electric field both are present. Depending on the choice of the arbitrary constants our solution reduces either to dilatonic gravity with pure electric field or to that ...

  10. PT-Symmetric Waveguides and the Lack of Variational Techniques

    Czech Academy of Sciences Publication Activity Database

    Krejčiřík, David

    2012-01-01

    Roč. 73, č. 1 (2012), s. 1-2 ISSN 0378-620X Institutional support: RVO:61389005 Keywords : Robin Laplacian * non-self-adjoint boundary conditions * complex symmetric operator * PT-symmetry * waveguides * discrete and essential spectra Subject RIV: BA - General Mathematics Impact factor: 0.713, year: 2012

  11. Confining but chirally symmetric dense and cold matter

    International Nuclear Information System (INIS)

    Glozman, L. Ya.

    2012-01-01

    The possibility for existence of cold, dense chirally symmetric matter with confinement is reviewed. The answer to this question crucially depends on the mechanism of mass generation in QCD and interconnection of confinement and chiral symmetry breaking. This question can be clarified from spectroscopy of hadrons and their axial properties. Almost systematical parity doubling of highly excited hadrons suggests that their mass is not related to chiral symmetry breaking in the vacuum and is approximately chirally symmetric. Then there is a possibility for existence of confining but chirally symmetric matter. We clarify a possible mechanism underlying such a phase at low temperatures and large density. Namely, at large density the Pauli blocking prevents the gap equation to generate a solution with broken chiral symmetry. However, the chirally symmetric part of the quark Green function as well as all color non-singlet quantities are still infrared divergent, meaning that the system is with confinement. A possible phase transition to such a matter is most probably of the first order. This is because there are no chiral partners to the lowest lying hadrons.

  12. Technical report: Electric field in not completely symmetric systems

    International Nuclear Information System (INIS)

    Vila, F.

    1994-08-01

    In this paper it is studied theoretically the electric field in the not completely symmetric system earthed metallic sphere-uniformly charged dielectric plan, for sphere surface points situated in the plan that contains sphere's center and vertical symmetry axe of dielectric plan. (author). 11 refs, 1 fig

  13. Symmetrical waveguide devices fabricated by direct UV writing

    DEFF Research Database (Denmark)

    Færch, Kjartan Ullitz; Svalgaard, Mikael

    2002-01-01

    Power splitters and directional couplers fabricated by direct UV writing in index matched silica-on-silicon samples can suffer from an asymmetrical device performance, even though the UV writing is carried out in a symmetrical fashion. This effect originates from a reduced photosensitivity...

  14. Symmetric structures of coherent states in superfluid helium-4

    International Nuclear Information System (INIS)

    Ahmad, M.

    1981-02-01

    Coherent States in superfluid helium-4 are discussed and symmetric structures are assigned to these states. Discrete and continuous series functions are exhibited for such states. Coherent State structure has been assigned to oscillating condensed bosons and their inter-relations and their effects on the superfluid system are analysed. (author)

  15. Spectra of PT -symmetric Hamiltonians on tobogganic contours

    Indian Academy of Sciences (India)

    The term PT -symmetric quantum mechanics, although defined to be of a much broader use, was coined in tight connection with C. Bender's analysis of one- ... on the other hand, the other members of the family were strange Hamiltonians with imaginary potentials which do not appear physical at all. The aim of the.

  16. Symmetrical and asymmetrical growth restriction in preterm-born children

    NARCIS (Netherlands)

    Bocca-Tjeertes, Inger; Bos, Arend; Kerstjens, Jorien; de Winter, Andrea; Reijneveld, Sijmen

    OBJECTIVE: To determine how symmetric (proportionate; SGR) and asymmetric (disproportionate; AGR) growth restriction influence growth and development in preterms from birth to 4 years. METHODS: This community-based cohort study of 810 children comprised 86 SGR, 61 AGR, and 663 non-growth restricted

  17. Perception of the Symmetrical Patterning of Human Gait by Infants.

    Science.gov (United States)

    Booth, Amy E.; Pinto, Jeannine; Bertenthal, Bennett I.

    2002-01-01

    Two experiments tested infants' sensitivity to properties of point-light displays of a walker and a runner that were equivalent regarding the phasing of limb movements. Found that 3-, but not 5-month-olds, discriminated these displays. When the symmetrical phase-patterning of the runner display was perturbed by advancing two of its limbs by 25…

  18. Rotationally symmetric numerical solutions to the sine-Gordon equation

    DEFF Research Database (Denmark)

    Olsen, O. H.; Samuelsen, Mogens Rugholm

    1981-01-01

    We examine numerically the properties of solutions to the spherically symmetric sine-Gordon equation given an initial profile which coincides with the one-dimensional breather solution and refer to such solutions as ring waves. Expanding ring waves either exhibit a return effect or expand towards...

  19. Symmetrical Womanhood: The Educational Ideology of Activism at Wellesley.

    Science.gov (United States)

    Palmieri, Patricia Ann

    1995-01-01

    The ideology of higher education for women at Wellesley College in the late 19th and early 20th centuries is discussed in the context of feminism and the women's suffrage movement. "Symmetrical womanhood," a concept emphasizing balance of traditional roles and intellectual and community involvement, was a goal of Wellesley faculty of…

  20. Normalizations of Eisenstein integrals for reductive symmetric spaces

    NARCIS (Netherlands)

    van den Ban, E.P.; Kuit, Job

    2017-01-01

    We construct minimal Eisenstein integrals for a reductive symmetric space G/H as matrix coefficients of the minimal principal series of G. The Eisenstein integrals thus obtained include those from the \\sigma-minimal principal series. In addition, we obtain related Eisenstein integrals, but with

  1. Analytic families of eigenfunctions on a reductive symmetric space

    NARCIS (Netherlands)

    Ban, E.P. van den; Schlichtkrull, H.

    2000-01-01

    In harmonic analysis on a reductive symmetric space X an important role is played by families of generalized eigenfunctions for the algebra D (X) of invariant dierential operators. Such families arise for instance as matrix coeÆcients of representations that come in series, such as the (generalized)

  2. Whittaker Vector of Deformed Virasoro Algebra and Macdonald Symmetric Functions

    Science.gov (United States)

    Yanagida, Shintarou

    2016-03-01

    We give a proof of Awata and Yamada's conjecture for the explicit formula of Whittaker vector of the deformed Virasoro algebra realized in the Fock space. The formula is expressed as a summation over Macdonald symmetric functions with factored coefficients. In the proof, we fully use currents appearing in the Fock representation of Ding-Iohara-Miki quantum algebra.

  3. Plane Symmetric Cosmological Model with Quark and Strange ...

    Indian Academy of Sciences (India)

    Keywords. f(R,T) theory of gravity—plane symmetric space-time—quark and strange quark matter—constant deceleration parameter. 1. Introduction. Modern astrophysical observations point out that present expansion of the Universe is an accelerated epoch. The most fascinating evidence for this is found in measurements ...

  4. Separator-Integrated, Reversely Connectable Symmetric Lithium-Ion Battery.

    Science.gov (United States)

    Wang, Yuhang; Zeng, Jiren; Cui, Xiaoqi; Zhang, Lijuan; Zheng, Gengfeng

    2016-02-24

    A separator-integrated, reversely connectable, symmetric lithium-ion battery is developed based on carbon-coated Li3V2(PO4)3 nanoparticles and polyvinylidene fluoride-treated separators. The Li3V2(PO4)3 nanoparticles are synthesized via a facile solution route followed by calcination in Ar/H2 atmosphere. Sucrose solution is used as the carbon source for uniform carbon coating on the Li3V2(PO4)3 nanoparticles. Both the carbon and the polyvinylidene fluoride treatments substantially improve the cycling life of the symmetric battery by preventing the dissolution and shuttle of the electroactive Li3V2(PO4)3. The obtained symmetric full cell exhibits a reversible capacity of ≈ 87 mA h g(-1), good cycling stability, and capacity retention of ≈ 70% after 70 cycles. In addition, this type of symmetric full cell can be operated in both forward and reverse connection modes, without any influence on the cycling of the battery. Furthermore, a new separator integration approach is demonstrated, which enables the direct deposition of electroactive materials for the battery assembly and does not affect the electrochemical performance. A 10-tandem-cell battery assembled without differentiating the electrode polarity exhibits a low thickness of ≈ 4.8 mm and a high output voltage of 20.8 V. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Strong orientational coordinates and orientational order parameters for symmetric objects

    International Nuclear Information System (INIS)

    Haji-Akbari, Amir; Glotzer, Sharon C

    2015-01-01

    Recent advancements in the synthesis of anisotropic macromolecules and nanoparticles have spurred an immense interest in theoretical and computational studies of self-assembly. The cornerstone of such studies is the role of shape in self-assembly and in inducing complex order. The problem of identifying different types of order that can emerge in such systems can, however, be challenging. Here, we revisit the problem of quantifying orientational order in systems of building blocks with non-trivial rotational symmetries. We first propose a systematic way of constructing orientational coordinates for such symmetric building blocks. We call the arising tensorial coordinates strong orientational coordinates (SOCs) as they fully and exclusively specify the orientation of a symmetric object. We then use SOCs to describe and quantify local and global orientational order, and spatiotemporal orientational correlations in systems of symmetric building blocks. The SOCs and the orientational order parameters developed in this work are not only useful in performing and analyzing computer simulations of symmetric molecules or particles, but can also be utilized for the efficient storage of rotational information in long trajectories of evolving many-body systems. (paper)

  6. Is PT -symmetric quantum theory false as a fundamental theory?

    Czech Academy of Sciences Publication Activity Database

    Znojil, Miloslav

    2016-01-01

    Roč. 56, č. 3 (2016), s. 254-257 ISSN 1210-2709 R&D Projects: GA ČR GA16-22945S Institutional support: RVO:61389005 Keywords : quantum mechanics * PT-symmetric representations of observables * masurement outcomes Subject RIV: BE - Theoretical Physics

  7. A New Symmetrical Unit for Breakwater Armour : First Tests

    NARCIS (Netherlands)

    Salauddin, M.; Broere, A.; Van der Meer, J.W.; Verhagen, H.J.; Bijl, E.

    2015-01-01

    A new and symmetrical single layer armour unit, the crablock, has been designed in the UAE. One breakwater was reconstructed with crablock, but very limited testing had been performed. Just to become more acquainted with this new unit, pre-competitive research at a university has been performed,

  8. Helically symmetric experiment, (HSX) goals, design and status

    International Nuclear Information System (INIS)

    Anderson, F.S.B.; Almagri, A.F.; Anderson, D.T.; Matthews, P.G.; Talmadge, J.N.; Shohet, J.L.

    1995-01-01

    HSX is a quasi-helically symmetric (QHS) stellarator currently under construction at the Torsatron-Stellarator Laboratory of the University of Wisconsin-Madison. This device is unique in its magnetic design in that the magnetic field spectrum possesses only a single dominant (helical) component. This design avoids the large direct orbit losses and the low-collisionality neoclassical losses associated with conventional stellarators. The restoration of symmetry to the confining magnetic field makes the neoclassical confinement in this device analogous to an axisymmetric q=1/3 tokamak. The HSX device has been designed with a clear set of primary physics goals: demonstrate the feasibility of construction of a QHS device, examine single particle confinement of injected ions with regard to magnetic field symmetry breaking, compare density and temperature profiles in this helically symmetric system to those for axisymmetric tokamaks and conventional stellarators, examine electric fields and plasma rotation with edge biasing in relation to L-H transitions in symmetric versus non-symmetric stellarator systems, investigate QHS effects on 1/v regime electron confinement, and examine how greatly-reduced neoclassical electron thermal conductivity compares to the experimental χ e profile. 3 refs., 4 figs., 1 tab

  9. On Split Lie Algebras with Symmetric Root Systems

    Indian Academy of Sciences (India)

    ... and any I j a well described ideal of , satisfying [ I j , I k ] = 0 if j ≠ k . Under certain conditions, the simplicity of is characterized and it is shown that is the direct sum of the family of its minimal ideals, each one being a simple split Lie algebra with a symmetric root system and having all its nonzero roots connected.

  10. On split Lie algebras with symmetric root systems

    Indian Academy of Sciences (India)

    ideal of L, satisfying [Ij ,Ik] = 0 if j = k. Under certain conditions, the simplicity of L is characterized and it is shown that L is the direct sum of the family of its minimal ideals, each one being a simple split Lie algebra with a symmetric root system and having all its nonzero roots connected. Keywords. Infinite dimensional Lie ...

  11. A summary view of the symmetric cosmological model

    International Nuclear Information System (INIS)

    Aldrovandi, R.

    1975-01-01

    A brief analysis of cosmological models is done, beginning with the standard model and following with the symmetric model of Omnes. Some attempts have been made for the phase transition in thermal radiation at high temperatures, to the annihilation period and to coalescence. One model with equal amounts of matter and antimatter seems to be reasonable [pt

  12. Compactons in PT-symmetric generalized Korteweg–de Vries ...

    Indian Academy of Sciences (India)

    ... Lecture Workshops · Refresher Courses · Symposia · Live Streaming. Home; Journals; Pramana – Journal of Physics; Volume 73; Issue 2. Compactons in P T -symmetric generalized Korteweg–de Vries equations. Carl M Bender Fred Cooper Avinash Khare Bogdan Mihaila Avadh Saxena. Volume 73 Issue 2 August 2009 ...

  13. New algorithms for the symmetric tridiagonal eigenvalue computation

    Energy Technology Data Exchange (ETDEWEB)

    Pan, V. [City Univ. of New York, Bronx, NY (United States)]|[International Computer Sciences Institute, Berkeley, CA (United States)

    1994-12-31

    The author presents new algorithms that accelerate the bisection method for the symmetric eigenvalue problem. The algorithms rely on some new techniques, which include acceleration of Newton`s iteration and can also be further applied to acceleration of some other iterative processes, in particular, of iterative algorithms for approximating polynomial zeros.

  14. Design of special facility for liquor irradiation

    International Nuclear Information System (INIS)

    Yao Shibin; Chen Zigen

    1989-01-01

    The design principle, physical scheme, technological process, construction and safety features of a special facility used for irradiating liquors is briefly described. 0.925 x 10 15 Bq cobalt source is used and the irradiation capacity for liquors approaches 10 t per day. The facility bears advantages of simple in construction, easy to operate, safe, reliable and efficient in source utilization

  15. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  16. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  17. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  18. Propagation of symmetric and anti-symmetric surface waves in aself-gravitating magnetized dusty plasma layer with generalized (r, q) distribution

    Science.gov (United States)

    Lee, Myoung-Jae; Jung, Young-Dae

    2018-05-01

    The dispersion properties of surface dust ion-acoustic waves in a self-gravitating magnetized dusty plasma layer with the (r, q) distribution are investigated. The result shows that the wave frequency of the symmetric mode in the plasma layer decreases with an increase in the wave number. It is also shown that the wave frequency of the symmetric mode decreases with an increase in the spectral index r. However, the wave frequency of the anti-symmetric mode increases with an increase in the wave number. It is also found that the anti-symmetric mode wave frequency increases with an increase in the spectral index r. In addition, it is found that the influence of the self-gravitation on the symmetric mode wave frequency decreases with increasing scaled Jeans frequency. Moreover, it is found that the wave frequency of the symmetric mode increases with an increase in the dust charge; however, the anti-symmetric mode shows opposite behavior.

  19. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions.     TPG: reduced rates on annual transport passes for active and retired staff.     Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret.     Walibi: reduced prices for children and adults at this French attraction park in Les Avenières.       FNAC: 5% reduction on FNAC vouchers.       For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  20. Special Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions.     TPG: reduced rates on annual transport passes for all active and retired staff.     Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret.     Walibi: reduced prices for children and adults at this French attraction park in Les Avenières.       FNAC: 5% reduction on FNAC vouchers.       For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  1. Special relativity

    CERN Document Server

    Faraoni, Valerio

    2013-01-01

    This book offers an essential bridge between college-level introductions and advanced graduate-level books on special relativity. It begins at an elementary level, presenting and discussing the basic concepts normally covered in college-level works, including the Lorentz transformation. Subsequent chapters introduce the four-dimensional worldview implied by the Lorentz transformations, mixing time and space coordinates, before continuing on to the formalism of tensors, a topic usually avoided in lower-level courses. The book’s second half addresses a number of essential points, including the concept of causality; the equivalence between mass and energy, including applications; relativistic optics; and measurements and matter in Minkowski spacetime. The closing chapters focus on the energy-momentum tensor of a continuous distribution of mass-energy and its covariant conservation; angular momentum; a discussion of the scalar field of perfect fluids and the Maxwell field; and general coordinates. Every chapter...

  2. Special relativity

    International Nuclear Information System (INIS)

    French, A.P.

    1982-01-01

    This book is an introduction to special relativity theory. After a discussion of the limits of Newton's mechanics and the pecularities in the propagation of light the Lorentz transformation is introduced. Then the measurement of space and time intervals in the framework of relativity theory is considered. Thereafter the addition of velocities and acceleration are considered in this framework. Then relativistic kinematics of particle interactions are described. Then the four-dimensional calculus in space-time coordinates is introduced. Finally an introduction is given to the treatment of the electromagnetic field in the framework of relativity theory. Every chapter contains exercise problems with solutions. This book is suited for all students who want to get some fundamental knowledge about relativity theory. (HSI) [de

  3. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  4. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  5. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  6. Efficient hybrid non-equilibrium molecular dynamics--Monte Carlo simulations with symmetric momentum reversal.

    Science.gov (United States)

    Chen, Yunjie; Roux, Benoît

    2014-09-21

    Hybrid schemes combining the strength of molecular dynamics (MD) and Metropolis Monte Carlo (MC) offer a promising avenue to improve the sampling efficiency of computer simulations of complex systems. A number of recently proposed hybrid methods consider new configurations generated by driving the system via a non-equilibrium MD (neMD) trajectory, which are subsequently treated as putative candidates for Metropolis MC acceptance or rejection. To obey microscopic detailed balance, it is necessary to alter the momentum of the system at the beginning and/or the end of the neMD trajectory. This strict rule then guarantees that the random walk in configurational space generated by such hybrid neMD-MC algorithm will yield the proper equilibrium Boltzmann distribution. While a number of different constructs are possible, the most commonly used prescription has been to simply reverse the momenta of all the particles at the end of the neMD trajectory ("one-end momentum reversal"). Surprisingly, it is shown here that the choice of momentum reversal prescription can have a considerable effect on the rate of convergence of the hybrid neMD-MC algorithm, with the simple one-end momentum reversal encountering particularly acute problems. In these neMD-MC simulations, different regions of configurational space end up being essentially isolated from one another due to a very small transition rate between regions. In the worst-case scenario, it is almost as if the configurational space does not constitute a single communicating class that can be sampled efficiently by the algorithm, and extremely long neMD-MC simulations are needed to obtain proper equilibrium probability distributions. To address this issue, a novel momentum reversal prescription, symmetrized with respect to both the beginning and the end of the neMD trajectory ("symmetric two-ends momentum reversal"), is introduced. Illustrative simulations demonstrate that the hybrid neMD-MC algorithm robustly yields a correct

  7. Efficient hybrid non-equilibrium molecular dynamics - Monte Carlo simulations with symmetric momentum reversal

    Science.gov (United States)

    Chen, Yunjie; Roux, Benoît

    2014-09-01

    Hybrid schemes combining the strength of molecular dynamics (MD) and Metropolis Monte Carlo (MC) offer a promising avenue to improve the sampling efficiency of computer simulations of complex systems. A number of recently proposed hybrid methods consider new configurations generated by driving the system via a non-equilibrium MD (neMD) trajectory, which are subsequently treated as putative candidates for Metropolis MC acceptance or rejection. To obey microscopic detailed balance, it is necessary to alter the momentum of the system at the beginning and/or the end of the neMD trajectory. This strict rule then guarantees that the random walk in configurational space generated by such hybrid neMD-MC algorithm will yield the proper equilibrium Boltzmann distribution. While a number of different constructs are possible, the most commonly used prescription has been to simply reverse the momenta of all the particles at the end of the neMD trajectory ("one-end momentum reversal"). Surprisingly, it is shown here that the choice of momentum reversal prescription can have a considerable effect on the rate of convergence of the hybrid neMD-MC algorithm, with the simple one-end momentum reversal encountering particularly acute problems. In these neMD-MC simulations, different regions of configurational space end up being essentially isolated from one another due to a very small transition rate between regions. In the worst-case scenario, it is almost as if the configurational space does not constitute a single communicating class that can be sampled efficiently by the algorithm, and extremely long neMD-MC simulations are needed to obtain proper equilibrium probability distributions. To address this issue, a novel momentum reversal prescription, symmetrized with respect to both the beginning and the end of the neMD trajectory ("symmetric two-ends momentum reversal"), is introduced. Illustrative simulations demonstrate that the hybrid neMD-MC algorithm robustly yields a correct

  8. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  9. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping

    2014-01-01

    the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost

  10. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  11. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  12. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  13. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  14. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  15. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  16. Low-Dissipation Advection Schemes Designed for Large Eddy Simulations of Hypersonic Propulsion Systems

    Science.gov (United States)

    White, Jeffrey A.; Baurle, Robert A.; Fisher, Travis C.; Quinlan, Jesse R.; Black, William S.

    2012-01-01

    The 2nd-order upwind inviscid flux scheme implemented in the multi-block, structured grid, cell centered, finite volume, high-speed reacting flow code VULCAN has been modified to reduce numerical dissipation. This modification was motivated by the desire to improve the codes ability to perform large eddy simulations. The reduction in dissipation was accomplished through a hybridization of non-dissipative and dissipative discontinuity-capturing advection schemes that reduces numerical dissipation while maintaining the ability to capture shocks. A methodology for constructing hybrid-advection schemes that blends nondissipative fluxes consisting of linear combinations of divergence and product rule forms discretized using 4th-order symmetric operators, with dissipative, 3rd or 4th-order reconstruction based upwind flux schemes was developed and implemented. A series of benchmark problems with increasing spatial and fluid dynamical complexity were utilized to examine the ability of the candidate schemes to resolve and propagate structures typical of turbulent flow, their discontinuity capturing capability and their robustness. A realistic geometry typical of a high-speed propulsion system flowpath was computed using the most promising of the examined schemes and was compared with available experimental data to demonstrate simulation fidelity.

  17. Special offers

    CERN Multimedia

    Association du personnel

    2012-01-01

    Special discount to the members of the Staff Association Aquaparc Discounted prices on admission of whole day. Children from 5 to 15 years: 26.– CHF instead of 35.– CHF; Adults from 16 years: 32.– CHF instead of 43.– CHF.Tickets on sale to the Staff Association Secretariat. BCGE Account management on salary account and annual subscription to credit cards free of charge. Other benefits on mortgage loan and financial planning. Comédie de Genève 20% off on full price tickets (also available for partner): from 24 to 32 CHF a ticket instead of 30 to 40 CHF depending on the shows. Ezee Suisse 15% off on the range of electric bikes upon presentation of your Staff Association membership card before payment. FNAC 5% discount on gifts card available in four Swiss shops without any restriction. Gifts card on sale to the Staff Association Secretariat. FutureKids 15% off for the Staff Association members who enrol their children of 5 to 16 years old in ...

  18. PT-symmetric planar devices for field transformation and imaging

    International Nuclear Information System (INIS)

    Valagiannopoulos, C A; Monticone, F; Alù, A

    2016-01-01

    The powerful tools of transformation optics (TO) allow an effective distortion of a region of space by carefully engineering the material inhomogeneity and anisotropy, and have been successfully applied in recent years to control electromagnetic fields in many different scenarios, e.g., to realize invisibility cloaks and planar lenses. For various field transformations, it is not necessary to use volumetric inhomogeneous materials, and suitably designed ultrathin metasurfaces with tailored spatial or spectral responses may be able to realize similar functionalities within smaller footprints and more robust mechanisms. Here, inspired by the concept of metamaterial TO lenses, we discuss field transformations enabled by parity-time (PT) symmetric metasurfaces, which can emulate negative refraction. We first analyze a simple realization based on homogeneous and local metasurfaces to achieve negative refraction and imaging, and we then extend our results to arbitrary PT-symmetric two-port networks to realize aberration-free planar imaging. (paper)

  19. Nonstandard jump functions for radically symmetric shock waves

    International Nuclear Information System (INIS)

    Baty, Roy S.; Tucker, Don H.; Stanescu, Dan

    2008-01-01

    Nonstandard analysis is applied to derive generalized jump functions for radially symmetric, one-dimensional, magnetogasdynamic shock waves. It is assumed that the shock wave jumps occur on infinitesimal intervals and the jump functions for the physical parameters occur smoothly across these intervals. Locally integrable predistributions of the Heaviside function are used to model the flow variables across a shock wave. The equations of motion expressed in nonconservative form are then applied to derive unambiguous relationships between the jump functions for the physical parameters for two families of self-similar flows. It is shown that the microstructures for these families of radially symmetric, magnetogasdynamic shock waves coincide in a nonstandard sense for a specified density jump function.

  20. Random matrix ensembles for PT-symmetric systems

    International Nuclear Information System (INIS)

    Graefe, Eva-Maria; Mudute-Ndumbe, Steve; Taylor, Matthew

    2015-01-01

    Recently much effort has been made towards the introduction of non-Hermitian random matrix models respecting PT-symmetry. Here we show that there is a one-to-one correspondence between complex PT-symmetric matrices and split-complex and split-quaternionic versions of Hermitian matrices. We introduce two new random matrix ensembles of (a) Gaussian split-complex Hermitian; and (b) Gaussian split-quaternionic Hermitian matrices, of arbitrary sizes. We conjecture that these ensembles represent universality classes for PT-symmetric matrices. For the case of 2 × 2 matrices we derive analytic expressions for the joint probability distributions of the eigenvalues, the one-level densities and the level spacings in the case of real eigenvalues. (fast track communication)