4,252 research outputs found

    Particle displacements in the elastic deformation of amorphous materials: local fluctuations vs. non-affine field

    Full text link
    We study the local disorder in the deformation of amorphous materials by decomposing the particle displacements into a continuous, inhomogeneous field and the corresponding fluctuations. We compare these fields to the commonly used non-affine displacements in an elastically deformed 2D Lennard-Jones glass. Unlike the non-affine field, the fluctuations are very localized, and exhibit a much smaller (and system size independent) correlation length, on the order of a particle diameter, supporting the applicability of the notion of local "defects" to such materials. We propose a scalar "noise" field to characterize the fluctuations, as an additional field for extended continuum models, e.g., to describe the localized irreversible events observed during plastic deformation.Comment: Minor corrections to match the published versio

    Domino: exploring mobile collaborative software adaptation

    Get PDF
    Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach

    International study into the use of intermittent hormone therapy in the treatment of carcinoma of the prostate : A meta-analysis of 1446 patients

    Get PDF
    OBJECTIVE: To review pooled phase II data to identify features of different regimens of intermittent hormone therapy (IHT), developed to reduce the morbidity of treating metastatic prostate cancer, and which carries a theoretical advantage of delaying the onset of androgen-independent prostate cancer, (AIPC) that are associated with success, highlighting features which require exploration with prospective trials to establish the best strategies for using this treatment. METHODS: Individual data were collated on 1446 patients with adequate information, from 10 phase II studies with >50 cases, identified through Pubmed. RESULTS: Univariate and multivariate Cox proportional hazard models were developed to predict treatment success with a high degree of statistical success. The prostate-specific antigen (PSA) nadir, the PSA threshold to restart treatment, and medication type and duration, were important predictors of outcome. CONCLUSIONS: The duration of biochemical remission after a period of HT is a durable early indicator of how rapidly AIPC and death will occur, and will make a useful endpoint in future trials to investigate the best ways to use IHT based on the important treatment cycling variables described above. Patients spent a mean of 39% of the time off treatment. The initial PSA level and PSA nadir allow the identification of patients with prostate cancer in whom it might be possible to avoid radical therapy.Peer reviewe

    Error Prevention Scheme with Four Particles

    Full text link
    It is shown that a simplified version of the error correction code recently suggested by Shor exhibits manifestation of the quantum Zeno effect. Thus, under certain conditions, protection of an unknown quantum state is achieved. Error prevention procedures based on four-particle and two-particle encoding are proposed and it is argued that they have feasible practical implementations.Comment: 4 pages, RevTeX, references updated and improved protocol adde

    A Comparison of Blocking Methods for Record Linkage

    Full text link
    Record linkage seeks to merge databases and to remove duplicates when unique identifiers are not available. Most approaches use blocking techniques to reduce the computational complexity associated with record linkage. We review traditional blocking techniques, which typically partition the records according to a set of field attributes, and consider two variants of a method known as locality sensitive hashing, sometimes referred to as "private blocking." We compare these approaches in terms of their recall, reduction ratio, and computational complexity. We evaluate these methods using different synthetic datafiles and conclude with a discussion of privacy-related issues.Comment: 22 pages, 2 tables, 7 figure

    Shear-induced anisotropic decay of correlations in hard-sphere colloidal glasses

    Get PDF
    Spatial correlations of microscopic fluctuations are investigated via real-space experiments and computer simulations of colloidal glasses under steady shear. It is shown that while the distribution of one-particle fluctuations is always isotropic regardless of the relative importance of shear as compared to thermal fluctuations, their spatial correlations show a marked sensitivity to the competition between shear-induced and thermally activated relaxation. Correlations are isotropic in the thermally dominated regime, but develop strong anisotropy as shear dominates the dynamics of microscopic fluctuations. We discuss the relevance of this observation for a better understanding of flow heterogeneity in sheared amorphous solids.Comment: 6 pages, 4 figure

    Unjamming due to local perturbations in granular packings with and without gravity

    Full text link
    We investigate the unjamming response of disordered packings of frictional hard disks with the help of computer simulations. First, we generate jammed configurations of the disks and then force them to move again by local perturbations. We study the spatial distribution of the stress and displacement response and find long range effects of the perturbation in both cases. We record the penetration depth of the displacements and the critical force that is needed to make the system yield. These quantities are tested in two types of systems: in ideal homogeneous packings in zero gravity and in packings settled under gravity. The penetration depth and the critical force are sensitive to the interparticle friction coefficient. Qualitatively, the same nonmonotonic friction dependence is found both with and without gravity, however the location of the extrema are at different friction values. We discuss the role of the connectivity of the contact network and of the pressure gradient in the unjamming response.Comment: 12 pages, 13 figure

    Quantum data hiding with spontaneous parameter down-conversion

    Get PDF
    Here we analyze the practical implication of the existing quantum data hiding protocol with Bell states produced with optical downconverter. We show that the uncertainty for the producing of the Bell states with spontaneous parameter down-conversion should be taken into account, because it will cause serious trouble to the hider encoding procedure. A set of extended Bell states and a generalized Bell states analyzer are proposed to describe and analyze the possible states of two photons distributing in two paths. Then we present a method to integrate the above uncertainty of Bell states preparation into the dating hiding procedure, when we encode the secret with the set of extended Bell states. These modifications greatly simplify the hider's encoding operations, and thus paves the way for the implementation of quantum data hiding with present-day quantum optics.Comment: 4 pages, 1 figure, adding some analyse for security proof, to be appear in Phys. Rev.

    A random quantum key distribution by using Bell states

    Full text link
    We proposed a new scheme for quantum key distribution based on entanglement swapping. By this protocol \QTR{em}{Alice} can securely share a random quantum key with \QTR{em}{Bob}, without transporting any particle.Comment: Accepted by J. Opt. B: Quantum Semiclass. Op

    Bioactive ceramic-reinforced composites for bone augmentation

    Get PDF
    Biomaterials have been used to repair the human body for millennia, but it is only since the 1970s that man-made composites have been used. Hydroxyapatite (HA)-reinforced polyethylene (PE) is the first of the ‘second-generation’ biomaterials that have been developed to be bioactive rather than bioinert. The mechanical properties have been characterized using quasi-static, fatigue, creep and fracture toughness testing, and these studies have allowed optimization of the production method. The in vitro and in vivo biological properties have been investigated with a range of filler content and have shown that the presence of sufficient bioactive filler leads to a bioactive composite. Finally, the material has been applied clinically, initially in the orbital floor and later in the middle ear. From this initial combination of HA in PE other bioactive ceramic polymer composites have been developed
    • …
    corecore