9,112 research outputs found

    Higgs dark energy in inert doublet model

    Full text link
    Scalar fields are among the possible candidates for dark energy. This paper is devoted to the scalar fields from the inert doublet model, where instead of one as in the standard model, two SU(2) Higgs doublets are used. The component fields of one SU(2) doublet (ϕ1\phi_1) act in an identical way to the standard model Higgs while the component fields of the second SU(2) doublet (ϕ2\phi_2) are taken to be the dark energy candidate (which is done by assuming that the phase transition in the field has not yet occurred). It is found that one can arrange for late time acceleration (dark energy) by using an SU(2) Higgs doublet in the inert Higgs doublet model, whose vacuum expectation value is zero, in the quintessential regime.Comment: 6 pages, 4 figure

    Money Supply, Food Prices and Manufactured Product Prices: A Causality Analysis for Pakistan Economy

    Get PDF
    This pioneer research for Pakistan uses monthly time series data for the period of 1997-1 to 2008-4 to determine the causal relationship between the money supply, food prices and manufactured product prices in developing country like Pakistan. Empirical analysis is performed by using the ARDL and Toda Yamamoto causality test. The results show that the bidirectional causality between the food prices and money supply and unidirectional causality from money supply to manufactured product prices. On the other hand there is no causal relationship between the food prices and manufactured product prices. The important finding of this study is that food prices response faster then the manufactured product prices to a change in money supply in the Pakistan.

    Linearizability of Systems of Ordinary Differential Equations Obtained by Complex Symmetry Analysis

    Get PDF
    Five equivalence classes had been found for systems of two second-order ordinary differential equations, transformable to linear equations (linearizable systems) by a change of variables. An "optimal (or simplest) canonical form" of linear systems had been established to obtain the symmetry structure, namely with 5, 6, 7, 8 and 15 dimensional Lie algebras. For those systems that arise from a scalar complex second-order ordinary differential equation, treated as a pair of real ordinary differential equations, a "reduced optimal canonical form" is obtained. This form yields three of the five equivalence classes of linearizable systems of two dimensions. We show that there exist 6, 7 and 15-dimensional algebras for these systems and illustrate our results with examples

    ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments

    Get PDF
    The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies. However, if such access is allowed in an untrusted environment then confidential information might be leaked by the policies. Current solutions are based on cryptographic operations that embed security policies with the security mechanism. Therefore, the enforcement of such policies is performed by allowing the authorised parties to access the appropriate keys. We believe that such solutions are far too rigid because they strictly intertwine authorisation policies with the enforcing mechanism. In this paper, we want to address the issue of enforcing security policies in an untrusted environment while protecting the policy confidentiality. Our solution ESPOON is aiming at providing a clear separation between security policies and the enforcement mechanism. However, the enforcement mechanism should learn as less as possible about both the policies and the requester attributes.Comment: The final version of this paper has been published at ARES 201

    Cell degradation detection based on an inter-cell approach

    Get PDF
    Fault management is a crucial part of cellular network management systems. The status of the base stations is usually monitored by well-defined key performance indicators (KPIs). The approaches for cell degradation detection are based on either intra-cell or inter-cell analysis of the KPIs. In intra-cell analysis, KPI profiles are built based on their local history data whereas in inter-cell analysis, KPIs of one cell are compared with the corresponding KPIs of the other cells. In this work, we argue in favor of the inter-cell approach and apply a degradation detection method that is able to detect a sleeping cell that could be difficult to observe using traditional intra-cell methods. We demonstrate its use for detecting emulated degradations among performance data recorded from a live LTE network. The method can be integrated in current systems because it can operate using existing KPIs without any major modification to the network infrastructure

    A Marketplace for Efficient and Secure Caching for IoT Applications in 5G Networks

    Get PDF
    As the communication industry is progressing towards fifth generation (5G) of cellular networks, the traffic it carries is also shifting from high data rate traffic from cellular users to a mixture of high data rate and low data rate traffic from Internet of Things (IoT) applications. Moreover, the need to efficiently access Internet data is also increasing across 5G networks. Caching contents at the network edge is considered as a promising approach to reduce the delivery time. In this paper, we propose a marketplace for providing a number of caching options for a broad range of applications. In addition, we propose a security scheme to secure the caching contents with a simultaneous potential of reducing the duplicate contents from the caching server by dividing a file into smaller chunks. We model different caching scenarios in NS-3 and present the performance evaluation of our proposal in terms of latency and throughput gains for various chunk sizes

    Ordered semigroups characterized by (ϵ ϵ vqk)-fuzzy generalized bi-ideals

    Get PDF
    In this paper, we introduce a considerable machinery that permits us to characterize a number of special (fuzzy) subsets in ordered semigroups. In this regard, we generalize (Davvaz and Khan in Inform Sci 181:1759-1770 2011) and define (is an element of, is an element of boolean (ϵ ϵ vqk)-fuzzy generalized bi-ideals in ordered semigroups, which is a generalization of the concept of an (alpha, beta)-fuzzy generalized bi-ideal in an ordered semi-group. We also define (is an element of, is an element of boolean (ϵ ϵ vqk)-fuzzy left (resp. right)ideals. Using these concept, some characterization theorems of regular, left (resp. right) regular, completely regular and weakly regular ordered semigroups are provided. The upper/lower parts of an (is an element of, is an element of boolean (ϵ ϵ vqk)-fuzzy generalized bi-ideal and (is an element of, is an element of boolean (ϵ ϵ vqk)-fuzzy left (resp. right)-ideal are given, and some characterizations are provided
    corecore