941 resultados para Symmetric Kravchuk polynomials
Resumo:
Choudhuri and Gilman (1987) considered certain implications of the hypothesis that the magnetic flux within the Sun is generated at the bottom of the convection zone and then rises through it. Taking flux rings symmetric around the rotation axis and using reasonable values of different parameters, they found that the Coriolis force deflects these flux rings into trajectories parallel to the rotation axis so that they emerge at rather high latitudes. This paper looks into the question of whether the action of the Coriolis force is subdued when the initial configuration of the flux ring has non-axisymmetries in the form of loop structures. The results depend dramatically on whether the flux ring with the loops lies completely within the convection zone or whether the lower parts of it are embedded in the stable layers underneath the convection zone. In the first case, the Coriolis force supresses the non-axisymmetric perturbations so that the flux ring tends to remain symmetric and the trajectories are very similar to those of Choudhuri and Gilman (1987). In the second case, however, the lower parts of the flux ring may remain anchored underneath the bottom of the convection zone, but the upper parts of the loops still tend to move parallel to the rotation axis and emerge at high latitudes. Thus the problem of the magnetic flux not being able to come out at the sunspot latitudes still persists after the non-axisymmetries in the flux rings are taken into account.
Resumo:
CTRU, a public key cryptosystem was proposed by Gaborit, Ohler and Sole. It is analogue of NTRU, the ring of integers replaced by the ring of polynomials $\mathbb{F}_2[T]$ . It attracted attention as the attacks based on either LLL algorithm or the Chinese Remainder Theorem are avoided on it, which is most common on NTRU. In this paper we presents a polynomial-time algorithm that breaks CTRU for all recommended parameter choices that were derived to make CTRU secure against popov normal form attack. The paper shows if we ascertain the constraints for perfect decryption then either plaintext or private key can be achieved by polynomial time linear algebra attack.
Resumo:
High-pressure Raman and mid-infrared spectroscopic studies were carried out on ZrP2O7 to 23.2 and 13 GPa respectively. In the pressure range 0.7-4.3 GPa the lattice mode at 248 cm(-1) disappears, new modes appear around 380 and 1111 cm(-1) and the strong symmetric stretching mode at 476 cm(-1) softens, possibly indicating a subtle phase transition. Above 8 GPa all the modes broaden, and all of the Raman modes disappear beyond 18 GPa. On decompression from the highest pressure, 23.2, to 0 GPa all of the modes reappear but with larger full width at half maximum. Lattice dynamics of the high temperature phase of ZrP2O7 were studied using first principles method and compared with experimental values. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
The well known features of crack face interpenetration/contact at the tip of an interface crack is re-examined using finite element analysis and assuming material nonlinear properties for the adherends. It was assumed in literature that the crack tips are fully open at all load levels in the presence of material nonlinearity of the adherends. Analysis for the case of remote tension shows that even in the presence of material nonlinearity, crack tip closes at small load levels and opens above a certain load level. Mixed-mode fracture parameters are evaluated for the situation when the crack tips are fully open. Due to the presence of nonlinearity, the mixed-mode fracture parameters are measured with the symmetric and anti-symmetric components of J-integral. The present analysis explains the sequence of events at the interface crack tip with progressively increasing remote tension load for the case of adherends with material nonlinear behaviour.
Resumo:
We derive expressions for convolution multiplication properties of discrete cosine transform II (DCT II) starting from equivalent discrete Fourier transform (DFT) representations. Using these expressions, a method for implementing linear filtering through block convolution in the DCT II domain is presented. For the case of nonsymmetric impulse response, additional discrete sine transform II (DST II) is required for implementing the filter in DCT II domain, where as for a symmetric impulse response, the additional transform is not required. Comparison with recently proposed circular convolution technique in DCT II domain shows that the proposed new method is computationally more efficient.
Resumo:
In recent work (Int. J. Mass Spec., vol. 282, pp. 112–122) we have considered the effect of apertures on the fields inside rf traps at points on the trap axis. We now complement and complete that work by considering off-axis fields in axially symmetric (referred to as “3D”) and in two dimensional (“2D”) ion traps whose electrodes have apertures, i.e., holes in 3D and slits in 2D. Our approximation has two parts. The first, EnoAperture, is the field obtained numerically for the trap under study with apertures artificially closed. We have used the boundary element method (BEM) for obtaining this field. The second part, EdueToAperture, is an analytical expression for the field contribution of the aperture. In EdueToAperture, aperture size is a free parameter. A key element in our approximation is the electrostatic field near an infinite thin plate with an aperture, and with different constant-valued far field intensities on either side. Compact expressions for this field can be found using separation of variables, wherein the choice of coordinate system is crucial. This field is, in turn, used four times within our trap-specific approximation. The off-axis field expressions for the 3D geometries were tested on the quadrupole ion trap (QIT) and the cylindrical ion trap (CIT), and the corresponding expressions for the 2D geometries were tested on the linear ion trap (LIT) and the rectilinear ion trap (RIT). For each geometry, we have considered apertures which are 10%, 30%, and 50% of the trap dimension. We have found that our analytical correction term EdueToAperture, though based on a classical small-aperture approximation, gives good results even for relatively large apertures.
Resumo:
By using the Y(gl(m|n)) super Yangian symmetry of the SU(m|n) supersymmetric Haldane-Shastry spin chain, we show that the partition function of this model satisfies a duality relation under the exchange of bosonic and fermionic spin degrees of freedom. As a byproduct of this study of the duality relation, we find a novel combinatorial formula for the super Schur polynomials associated with some irreducible representations of the Y(gl(m|n)) Yangian algebra. Finally, we reveal an intimate connection between the global SU(m|n) symmetry of a spin chain and the boson-fermion duality relation. (C) 2007 Elsevier B.V. All rights reserved.
Resumo:
In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel complete connectivity schemes are proposed and an analytical comparison, in terms of security and connectivity, between the schemes is shown. Motivated by the schemes, we derive general expressions for security and connectivity. A number of conclusions are made using these general expressions.
A Legendre spectral element model for sloshing and acoustic analysis in nearly incompressible fluids
Resumo:
A new spectral finite element formulation is presented for modeling the sloshing and the acoustic waves in nearly incompressible fluids. The formulation makes use of the Legendre polynomials in deriving the finite element interpolation shape functions in the Lagrangian frame of reference. The formulated element uses Gauss-Lobatto-Legendre quadrature scheme for integrating the volumetric stiffness and the mass matrices while the conventional Gauss-Legendre quadrature scheme is used on the rotational stiffness matrix to completely eliminate the zero energy modes, which are normally associated with the Lagrangian FE formulation. The numerical performance of the spectral element formulated here is examined by doing the inf-sup test oil a standard rectangular rigid tank partially filled with liquid The eigenvalues obtained from the formulated spectral element are compared with the conventional equally spaced node locations of the h-type Lagrangian finite element and the predicted results show that these spectral elements are more accurate and give superior convergence The efficiency and robustness of the formulated elements are demonstrated by solving few standard problems involving free vibration and dynamic response analysis with undistorted and distorted spectral elements. and the obtained results are compared with available results in the published literature (C) 2009 Elsevier Inc All rights reserved
Resumo:
We prove that if (M-n, g), n >= 4, is a compact, orientable, locally irreducible Riemannian manifold with nonnegative isotropic curvature,then one of the following possibilities hold: (i) M admits a metric with positive isotropic curvature. (ii) (M, g) is isometric to a locally symmetric space. (iii) (M, g) is Kahler and biholomorphic to CPn/2. (iv) (M, g) is quaternionic-Kahler. This is implied by the following result: Let (M-2n, g) be a compact, locally irreducible Kahler manifold with nonnegative isotropic curvature. Then either M is biholomorphic to CPn or isometric to a compact Hermitian symmetric space. This answers a question of Micallef and Wang in the affirmative. The proof is based on the recent work of Brendle and Schoen on the Ricci flow.
Resumo:
We study giant magnons in the the D1-D5 system from both the boundary CFT and as classical solutions of the string sigma model in AdS(3) x S-3 x T-4. Re-examining earlier studies of the symmetric product conformal field theory we argue that giant magnons in the symmetric product are BPS states in a centrally extended SU(1 vertical bar 1) x SU(1 vertical bar 1) superalgebra with two more additional central charges. The magnons carry these additional central charges locally but globally they vanish. Using a spin chain description of these magnons and the extended superalgebra we show that these magnons obey a dispersion relation which is periodic in momentum. We then identify these states on the string theory side and show that here too they are BPS in the same centrally extended algebra and obey the same dispersion relation which is periodic in momentum. This dispersion relation arises as the BPS condition for the extended algebra and is similar to that of magnons in N = 4 Yang-Mills Yang-Mills.
Resumo:
(CH3)4NGeCl3 is prepared, characterized and studied using 1H NMR spin lattice relaxation time and second moment to understand the internal motions and quantum rotational tunneling. Proton second moment is measured at 7 MHz as function of temperature in the range 300-77 K and spin lattice relaxation time (T1) is measured at two Larmor frequencies, as a function of temperature in the range 270-17 K employing a homemade wide-line/pulsed NMR spectrometers. T1 data are analyzed in two temperature regions using relevant theoretical models. The relaxation in the higher temperatures (270-115 K) is attributed to the hindered reorientations of symmetric groups (CH3 and (CH3)4N). Broad asymmetric T1 minima observed below 115 K down to 17 K are attributed to quantum rotational tunneling of the inequivalent methyl groups.
Resumo:
In this paper we first describe a framework to model the sponsored search auction on the web as a mechanism design problem. Using this framework, we design a novel auction which we call the OPT (optimal) auction. The OPT mechanism maximizes the search engine's expected revenue while achieving Bayesian incentive compatibility and individual rationality of the advertisers. We show that the OPT mechanism is superior to two of the most commonly used mechanisms for sponsored search namely (1) GSP (Generalized Second Price) and (2) VCG (Vickrey-Clarke-Groves). We then show an important revenue equivalence result that the expected revenue earned by the search engine is the same for all the three mechanisms provided the advertisers are symmetric and the number of sponsored slots is strictly less than the number of advertisers.
Resumo:
In this paper, new results and insights are derived for the performance of multiple-input, single-output systems with beamforming at the transmitter, when the channel state information is quantized and sent to the transmitter over a noisy feedback channel. It is assumed that there exists a per-antenna power constraint at the transmitter, hence, the equal gain transmission (EGT) beamforming vector is quantized and sent from the receiver to the transmitter. The loss in received signal-to-noise ratio (SNR) relative to perfect beamforming is analytically characterized, and it is shown that at high rates, the overall distortion can be expressed as the sum of the quantization-induced distortion and the channel error-induced distortion, and that the asymptotic performance depends on the error-rate behavior of the noisy feedback channel as the number of codepoints gets large. The optimum density of codepoints (also known as the point density) that minimizes the overall distortion subject to a boundedness constraint is shown to be the same as the point density for a noiseless feedback channel, i.e., the uniform density. The binary symmetric channel with random index assignment is a special case of the analysis, and it is shown that as the number of quantized bits gets large the distortion approaches the same as that obtained with random beamforming. The accuracy of the theoretical expressions obtained are verified through Monte Carlo simulations.