5,379 research outputs found

    Heat flow in the postquasistatic approximation

    Full text link
    We apply the postquasistatic approximation to study the evolution of spherically symmetric fluid distributions undergoing dissipation in the form of radial heat flow. For a model which corresponds to an incompressible fluid departing from the static equilibrium, it is not possible to go far from the initial state after the emission of a small amount of energy. Initially collapsing distributions of matter are not permitted. Emission of energy can be considered as a mechanism to avoid the collapse. If the distribution collapses initially and emits one hundredth of the initial mass only the outermost layers evolve. For a model which corresponds to a highly compressed Fermi gas, only the outermost shell can evolve with a shorter hydrodynamic time scale.Comment: 5 pages, 5 figure

    Equation of state and transport processes in self--similar spheres

    Full text link
    We study the effect of transport processes (diffusion and free--streaming) on a collapsing spherically symmetric distribution of matter in a self--similar space--time. A very simple solution shows interesting features when it is matched with the Vaidya exterior solution. In the mixed case (diffusion and free--streaming), we find a barotropic equation of state in the stationary regime. In the diffusion approximation the gravitational potential at the surface is always constant; if we perturb the stationary state, the system is very stable, recovering the barotropic equation of state as time progresses. In the free--streaming case the self--similar evolution is stationary but with a non--barotropic equation of state.Comment: 9 pages, 2 figure

    A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM

    Get PDF
    Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation. We construct a round-optimal (2 rounds) universally composable (UC) protocol for oblivious transfer secure against active adaptive adversaries from any OW-CPA secure public-key encryption scheme with certain properties in the random oracle model (ROM). In terms of computation, our protocol only requires the generation of a public/secret-key pair, two encryption operations and one decryption operation, apart from a few calls to the random oracle. In~terms of communication, our protocol only requires the transfer of one public-key, two ciphertexts, and three binary strings of roughly the same size as the message. Next, we show how to instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE, and CDH assumptions. Our instantiations based on the low noise LPN, McEliece, and QC-MDPC assumptions are the first UC-secure OT protocols based on coding assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3) low communication and computational complexities. Previous results in this setting only achieved static security and used costly cut-and-choose techniques.Our instantiation based on CDH achieves adaptive security at the small cost of communicating only two more group elements as compared to the gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which only achieves static security in the ROM

    Irrigação por bacias em nível na cultura da bananeira.

    Get PDF
    Descrição do sistema de irrigação; Vantagens, desvantagens e adaptabilidade; Bases para o dimensionamento; Operação e manejo do sistema de irrigação; Considerações sobre a exploração comercial da bananeira irrigada por bacias em nível.bitstream/item/71927/1/CPAMN-CIR.-TEC.-04-92.pd
    corecore