9,112 research outputs found
Higgs dark energy in inert doublet model
Scalar fields are among the possible candidates for dark energy. This paper
is devoted to the scalar fields from the inert doublet model, where instead of
one as in the standard model, two SU(2) Higgs doublets are used. The component
fields of one SU(2) doublet () act in an identical way to the standard
model Higgs while the component fields of the second SU(2) doublet ()
are taken to be the dark energy candidate (which is done by assuming that the
phase transition in the field has not yet occurred). It is found that one can
arrange for late time acceleration (dark energy) by using an SU(2) Higgs
doublet in the inert Higgs doublet model, whose vacuum expectation value is
zero, in the quintessential regime.Comment: 6 pages, 4 figure
Money Supply, Food Prices and Manufactured Product Prices: A Causality Analysis for Pakistan Economy
This pioneer research for Pakistan uses monthly time series data for the period of 1997-1 to 2008-4 to determine the causal relationship between the money supply, food prices and manufactured product prices in developing country like Pakistan. Empirical analysis is performed by using the ARDL and Toda Yamamoto causality test. The results show that the bidirectional causality between the food prices and money supply and unidirectional causality from money supply to manufactured product prices. On the other hand there is no causal relationship between the food prices and manufactured product prices. The important finding of this study is that food prices response faster then the manufactured product prices to a change in money supply in the Pakistan.
Linearizability of Systems of Ordinary Differential Equations Obtained by Complex Symmetry Analysis
Five equivalence classes had been found for systems of two second-order
ordinary differential equations, transformable to linear equations
(linearizable systems) by a change of variables. An "optimal (or simplest)
canonical form" of linear systems had been established to obtain the symmetry
structure, namely with 5, 6, 7, 8 and 15 dimensional Lie algebras. For those
systems that arise from a scalar complex second-order ordinary differential
equation, treated as a pair of real ordinary differential equations, a "reduced
optimal canonical form" is obtained. This form yields three of the five
equivalence classes of linearizable systems of two dimensions. We show that
there exist 6, 7 and 15-dimensional algebras for these systems and illustrate
our results with examples
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments
The enforcement of security policies in outsourced environments is still an
open challenge for policy-based systems. On the one hand, taking the
appropriate security decision requires access to the policies. However, if such
access is allowed in an untrusted environment then confidential information
might be leaked by the policies. Current solutions are based on cryptographic
operations that embed security policies with the security mechanism. Therefore,
the enforcement of such policies is performed by allowing the authorised
parties to access the appropriate keys. We believe that such solutions are far
too rigid because they strictly intertwine authorisation policies with the
enforcing mechanism.
In this paper, we want to address the issue of enforcing security policies in
an untrusted environment while protecting the policy confidentiality. Our
solution ESPOON is aiming at providing a clear separation between security
policies and the enforcement mechanism. However, the enforcement mechanism
should learn as less as possible about both the policies and the requester
attributes.Comment: The final version of this paper has been published at ARES 201
Cell degradation detection based on an inter-cell approach
Fault management is a crucial part of cellular network management systems. The status of the base stations is usually monitored by well-defined key performance indicators (KPIs). The approaches for cell degradation detection are based on either intra-cell or inter-cell analysis of the KPIs. In intra-cell analysis, KPI profiles are built based on their local history data whereas in inter-cell analysis, KPIs of one cell are compared with the corresponding KPIs of the other cells. In this work, we argue in favor of the inter-cell approach and apply a degradation detection method that is able to detect a sleeping cell that could be difficult to observe using traditional intra-cell methods. We demonstrate its use for detecting emulated degradations among performance data recorded from a live LTE network. The method can be integrated in current systems because it can operate using existing KPIs without any major modification to the network infrastructure
A Marketplace for Efficient and Secure Caching for IoT Applications in 5G Networks
As the communication industry is progressing towards
fifth generation (5G) of cellular networks, the traffic it
carries is also shifting from high data rate traffic from cellular
users to a mixture of high data rate and low data rate traffic
from Internet of Things (IoT) applications. Moreover, the need
to efficiently access Internet data is also increasing across 5G
networks. Caching contents at the network edge is considered
as a promising approach to reduce the delivery time. In this
paper, we propose a marketplace for providing a number of
caching options for a broad range of applications. In addition,
we propose a security scheme to secure the caching contents
with a simultaneous potential of reducing the duplicate contents
from the caching server by dividing a file into smaller chunks.
We model different caching scenarios in NS-3 and present the
performance evaluation of our proposal in terms of latency and
throughput gains for various chunk sizes
Ordered semigroups characterized by (ϵ ϵ vqk)-fuzzy generalized bi-ideals
In this paper, we introduce a considerable machinery that permits us to characterize a number of special (fuzzy) subsets in ordered semigroups. In this regard, we generalize (Davvaz and Khan in Inform Sci 181:1759-1770 2011) and define (is an element of, is an element of boolean (ϵ ϵ vqk)-fuzzy generalized bi-ideals in ordered semigroups, which is a generalization of the concept of an (alpha, beta)-fuzzy generalized bi-ideal in an ordered semi-group. We also define (is an element of, is an element of boolean (ϵ ϵ vqk)-fuzzy left (resp. right)ideals. Using these concept, some characterization theorems of regular, left (resp. right) regular, completely regular and weakly regular ordered semigroups are provided. The upper/lower parts of an (is an element of, is an element of boolean (ϵ ϵ vqk)-fuzzy generalized bi-ideal and (is an element of, is an element of boolean (ϵ ϵ vqk)-fuzzy left (resp. right)-ideal are given, and some characterizations are provided
- …
