5,379 research outputs found
Heat flow in the postquasistatic approximation
We apply the postquasistatic approximation to study the evolution of
spherically symmetric fluid distributions undergoing dissipation in the form of
radial heat flow. For a model which corresponds to an incompressible fluid
departing from the static equilibrium, it is not possible to go far from the
initial state after the emission of a small amount of energy. Initially
collapsing distributions of matter are not permitted. Emission of energy can be
considered as a mechanism to avoid the collapse. If the distribution collapses
initially and emits one hundredth of the initial mass only the outermost layers
evolve. For a model which corresponds to a highly compressed Fermi gas, only
the outermost shell can evolve with a shorter hydrodynamic time scale.Comment: 5 pages, 5 figure
Equation of state and transport processes in self--similar spheres
We study the effect of transport processes (diffusion and free--streaming) on
a collapsing spherically symmetric distribution of matter in a self--similar
space--time. A very simple solution shows interesting features when it is
matched with the Vaidya exterior solution. In the mixed case (diffusion and
free--streaming), we find a barotropic equation of state in the stationary
regime. In the diffusion approximation the gravitational potential at the
surface is always constant; if we perturb the stationary state, the system is
very stable, recovering the barotropic equation of state as time progresses. In
the free--streaming case the self--similar evolution is stationary but with a
non--barotropic equation of state.Comment: 9 pages, 2 figure
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a
number of applications, in particular, as an essential building block for
two-party and multi-party computation. We construct a round-optimal (2 rounds)
universally composable (UC) protocol for oblivious transfer secure against
active adaptive adversaries from any OW-CPA secure public-key encryption scheme
with certain properties in the random oracle model (ROM). In terms of
computation, our protocol only requires the generation of a public/secret-key
pair, two encryption operations and one decryption operation, apart from a few
calls to the random oracle. In~terms of communication, our protocol only
requires the transfer of one public-key, two ciphertexts, and three binary
strings of roughly the same size as the message. Next, we show how to
instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE,
and CDH assumptions. Our instantiations based on the low noise LPN, McEliece,
and QC-MDPC assumptions are the first UC-secure OT protocols based on coding
assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3)
low communication and computational complexities. Previous results in this
setting only achieved static security and used costly cut-and-choose
techniques.Our instantiation based on CDH achieves adaptive security at the
small cost of communicating only two more group elements as compared to the
gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which
only achieves static security in the ROM
Irrigação por bacias em nível na cultura da bananeira.
Descrição do sistema de irrigação; Vantagens, desvantagens e adaptabilidade; Bases para o dimensionamento; Operação e manejo do sistema de irrigação; Considerações sobre a exploração comercial da bananeira irrigada por bacias em nível.bitstream/item/71927/1/CPAMN-CIR.-TEC.-04-92.pd
- …