246 resultados para zero-point quantum fluctuations
Resumo:
Radial Hele-Shaw flows are treated analytically using conformal mapping techniques. The geometry of interest has a doubly-connected annular region of viscous fluid surrounding an inviscid bubble that is either expanding or contracting due to a pressure difference caused by injection or suction of the inviscid fluid. The zero-surface-tension problem is ill-posed for both bubble expansion and contraction, as both scenarios involve viscous fluid displacing inviscid fluid. Exact solutions are derived by tracking the location of singularities and critical points in the analytic continuation of the mapping function. We show that by treating the critical points, it is easy to observe finite-time blow-up, and the evolution equations may be written in exact form using complex residues. We present solutions that start with cusps on one interface and end with cusps on the other, as well as solutions that have the bubble contracting to a point. For the latter solutions, the bubble approaches an ellipse in shape at extinction.
Resumo:
Growth in productivity is the key determinant of the long-term health and prosperity of an economy. The construction industry being one of major strategic importance, its productivity performance has a significant effect on national economic growth. The relationship between construction output and economy has received intensive studies, but there is lack of empirical study on the relationship between construction productivity and economic fluctuations. Fluctuations in construction output are endemic in the industry. In part they are caused by the boom and slump of the economy as a whole and in part by the nature of the construction product. This research aims to uncover how the productivity of construction sector is influenced in the course of economic fluctuations in Malaysia. Malaysia has adopted three economic policies – New Economic Policy (1971-1990), National Development Policy (1991-2000) and the National Vision Policy (2001-2010) since gaining independence in 1959. The Privatisation Master Plan was introduced in 1991. Operating within this historical context, the Malaysian construction sector has experienced four business cycles since 1960. A mixed-method design approach is adopted in this study. Quantitative analysis was conducted on the published official statistics of the construction industry and the overall economy in Malaysia between 1970 and 2009. Qualitative study involved interviews with a purposive sample of 21 industrial participants. This study identified a 32-year long building cycle appears in 1975-2006. It is superimposed with three shorter construction business cycles in 1975-1987, 1987-1999 and 1999-2006. The correlations of Construction labour productivity (CLP) and GDP per capita are statistically significant for the 1975-2006 building cycle, 1987-1999 and 1999-2006 construction business cycles. It was not significant in 1975-1987 construction business cycles. The Construction Industry Surveys/Census over the period from 1996 to 2007 show that the average growth rate of total output per employee expanded but the added value per employee contracted which imply high cost of bought-in materials and services and inefficient usage of purchases. The construction labour productivity is peaked at 2004 although there is contraction of construction sector in 2004. The residential subsector performed relatively better than the other sub-sectors in most of the productivity indicators. Improvements are found in output per employee, value added per employee, labour competitiveness and capital investment but declines are recorded in value added content and capital productivity. The civil engineering construction is most productive in the labour productivity nevertheless relatively poorer in the capital productivity. The labour cost is more competitive in the larger size establishment. The added value per labour cost is higher in larger sized establishment attributed to efficient in utilization of capital. The interview with the industrial participant reveals that the productivity of the construction sector is influenced by the economic environment, the construction methods, contract arrangement, payment chain and regulatory policies. The fluctuations of construction demand have caused companies switched to defensive strategy during the economic downturn and to ensure short-term survival than to make a profit for the long-term survival and growth. It leads the company to take drastic measures to curb expenses, downsizing, employ contract employment, diversification and venture overseas market. There is no empirical evidence supports downsizing as a necessary step in a process of reviving productivity. The productivity does not correlate with size of firm. A relatively smaller and focused firm is more productive than the larger and diversified organisation. However diversified company experienced less fluctuation in both labour and capital productivity. In order to improve the productivity of the construction sector, it is necessary to remove the negatives and flaws from past practices. The recommended measures include long-term strategic planning and coordinated approaches of government agencies in planning of infrastructure development and to provide regulatory environments which encourage competition and facilitate productivity improvement.
Resumo:
The draft of the first stage of the national curriculum has now been published. Its final form to be presented in December 2010 should be the centrepiece of Labor’s Educational Revolution. All the other aspects – personal computers, new school buildings, rebates for uniforms and even the MySchool report card – are marginal to the prescription of what is to be taught and learnt in schools. The seven authors in this journal’s Point and Counterpoint (Curriculum Perspectives, 30(1) 2010, pp.53-74) raise a number of both large and small issues in education as a whole, and in science education more particularly. Two of them (Groves and McGarry) make brief reference to earlier attempts to achieve national curriculum in Australia. Those writing from New Zealand and USA will be unaware of just how ambitious this project is for Australia - a bold and overdue educational adventure or a foolish political decision destined to failure, as happened in the later 1970s and the 1990s.
Resumo:
We utilise the well-developed quantum decision models known to the QI community to create a higher order social decision making model. A simple Agent Based Model (ABM) of a society of agents with changing attitudes towards a social issue is presented, where the private attitudes of individuals in the system are represented using a geometric structure inspired by quantum theory. We track the changing attitudes of the members of that society, and their resulting propensities to act, or not, in a given social context. A number of new issues surrounding this "scaling up" of quantum decision theories are discussed, as well as new directions and opportunities.
Resumo:
Nitrate reduction with nanoscale zero-valent iron (NZVI) was reported as a potential technology to remove nitrate from nitrate-contaminated water. In this paper, nitrate reduction with NZVI prepared by hydrogen reduction of natural goethite (NZVI-N, -N represents natural goethite) and hydrothermal goethite (NZVI-H, -H represents hydrothermal goethite) was conducted. Besides, the effects of reaction time, nitrate concentration, iron-to-nitrate ratio on nitrate removal rate over NZVI-H and NZVI-N were investigated. To prove their excellent nitrate reduction capacities, NZVI-N and NZVI-H were compared with ordinary zero-valent iron (OZVI-N) through the static experiments. Based on all above investigations, the mechanism of nitrate reduction with NZVI-N was proposed. The result showed that reaction time, nitrate concentration, iron-to-nitrate ratio played an important role in nitrate reduction by NZVI-N and NZVI-H. Compared with OZVI, NZVI-N and NZVI-H showed little relationship with pH. And NZVI-N for nitrate composition offers a higher stability than NZVI-H because of the existence of Al-substitution. Furthermore, NZVI-N, prepared by hydrogen reduction of goethite, has higher activity for nitrate reduction and the products contain hydrogen, nitrogen, NH 4 +, a little nitrite, but no NOx, meanwhile NZVI-N was oxidized to Fe 2+. It is a relatively easy and cost-effective method for nitrate removal, so NZVI-N reducing nitrate has a great potential application in nitrate removal of groundwater. © 2012 Elsevier B.V.
Resumo:
This work is a theoretical investigation into the coupling of a single excited quantum emitter to the plasmon mode of a V groove waveguide. The V groove waveguide consists of a triangular channel milled in gold and the emitter is modeled as a dipole emitter, and could represent a quantum dot, nitrogen vacancy in diamond, or similar. In this work the dependence of coupling efficiency of emitter to plasmon mode is determined for various geometrical parameters of the emitter-waveguide system. Using the finite element method, the effect on coupling efficiency of the emitter position and orientation, groove angle, groove depth, and tip radius, is studied in detail. We demonstrate that all parameters, with the exception of groove depth, have a significant impact on the attainable coupling efficiency. Understanding the effect of various geometrical parameters on the coupling between emitters and the plasmonic mode of the waveguide is essential for the design and optimization of quantum dot–V groove devices.
Resumo:
his paper formulates an edge-based smoothed conforming point interpolation method (ES-CPIM) for solid mechanics using the triangular background cells. In the ES-CPIM, a technique for obtaining conforming PIM shape functions (CPIM) is used to create a continuous and piecewise quadratic displacement field over the whole problem domain. The smoothed strain field is then obtained through smoothing operation over each smoothing domain associated with edges of the triangular background cells. The generalized smoothed Galerkin weak form is then used to create the discretized system equations. Numerical studies have demonstrated that the ES-CPIM possesses the following good properties: (1) ES-CPIM creates conforming quadratic PIM shape functions, and can always pass the standard patch test; (2) ES-CPIM produces a quadratic displacement field without introducing any additional degrees of freedom; (3) The results of ES-CPIM are generally of very high accuracy.
Resumo:
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.
Resumo:
Mutations in multiple oncogenes including KRAS, CTNNB1, PIK3CA and FGFR2 have been identified in endometrial cancer. The aim of this study was to provide insight into the clinicopathological features associated with patterns of mutation in these genes, a necessary step in planning targeted therapies for endometrial cancer. 466 endometrioid endometrial tumors were tested for mutations in FGFR2, KRAS, CTNNB1, and PIK3CA. The relationships between mutation status, tumor microsatellite instability (MSI) and clinicopathological features including overall survival (OS) and disease-free survival (DFS) were evaluated using Kaplan-Meier survival analysis and Cox proportional hazard models. Mutations were identified in FGFR2 (48/466); KRAS (87/464); CTNNB1 (88/454) and PIK3CA (104/464). KRAS and FGFR2 mutations were significantly more common, and CTNNB1 mutations less common, in MSI positive tumors. KRAS and FGFR2 occurred in a near mutually exclusive pattern (p = 0.05) and, surprisingly, mutations in KRAS and CTNNB1 also occurred in a near mutually exclusive pattern (p = 0.0002). Multivariate analysis revealed that mutation in KRAS and FGFR2 showed a trend (p = 0.06) towards longer and shorter DFS, respectively. In the 386 patients with early stage disease (stage I and II), FGFR2 mutation was significantly associated with shorter DFS (HR = 3.24; 95% confidence interval, CI, 1.35-7.77; p = 0.008) and OS (HR = 2.00; 95% CI 1.09-3.65; p = 0.025) and KRAS was associated with longer DFS (HR = 0.23; 95% CI 0.05-0.97; p = 0.045). In conclusion, although KRAS and FGFR2 mutations share similar activation of the MAPK pathway, our data suggest very different roles in tumor biology. This has implications for the implementation of anti-FGFR or anti-MEK biologic therapies.
Resumo:
Finding an appropriate linking method to connect different dimensional element types in a single finite element model is a key issue in the multi-scale modeling. This paper presents a mixed dimensional coupling method using multi-point constraint equations derived by equating the work done on either side of interface connecting beam elements and shell elements for constructing a finite element multiscale model. A typical steel truss frame structure is selected as case example and the reduced scale specimen of this truss section is then studied in the laboratory to measure its dynamic and static behavior in global truss and local welded details while the different analytical models are developed for numerical simulation. Comparison of dynamic and static response of the calculated results among different numerical models as well as the good agreement with those from experimental results indicates that the proposed multi-scale model is efficient and accurate.
Resumo:
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. The FS property was also shown to be achievable in (Hierarchical) Identity-Based Encryption (HIBE) by Yao, Fazio, Dodis, and Lysyanskaya (ACM CCS 2004). Yet, for emerging encryption techniques, offering flexible access control to encrypted data, by means of functional relationships between ciphertexts and decryption keys, FS protection was not known to exist.\smallskip In this paper we introduce FS to the powerful setting of \emph{Hierarchical Predicate Encryption (HPE)}, proposed by Okamoto and Takashima (Asiacrypt 2009). Anticipated applications of FS-HPE schemes can be found in searchable encryption and in fully private communication. Considering the dependencies amongst the concepts, our FS-HPE scheme implies forward-secure flavors of Predicate Encryption and (Hierarchical) Attribute-Based Encryption.\smallskip Our FS-HPE scheme guarantees forward security for plaintexts and for attributes that are hidden in HPE ciphertexts. It further allows delegation of decrypting abilities at any point in time, independent of FS time evolution. It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. As the ``cross-product" approach taken in FS-HIBE is not directly applicable to the HPE setting, our construction resorts to techniques that are specific to existing HPE schemes and extends them with what can be seen as a reminiscent of binary tree encryption from FS-PKE.