31,975 research outputs found
Two-measured variable method for wall interference assessment/correction
An iterative method for wall interference assessment and/or correction is presented for transonic flow conditions in wind tunnels equipped with two component velocity measurements on a single interface. The iterative method does not require modeling of the test article and tunnel wall boundary conditions. Analytical proof for the convergence and stability of the iterative method is shown in the subsonic flow regime. The numerical solutions are given for both 2-D and axisymmetrical cases at transonic speeds with the application of global Mach number correction
Field-induced structure transformation in electrorheological solids
We have computed the local electric field in a body-centered tetragonal (BCT)
lattice of point dipoles via the Ewald-Kornfeld formulation, in an attempt to
examine the effects of a structure transformation on the local field strength.
For the ground state of an electrorheological solid of hard spheres, we
identified a novel structure transformation from the BCT to the face-centered
cubic (FCC) lattices by changing the uniaxial lattice constant c under the hard
sphere constraint. In contrast to the previous results, the local field
exhibits a non-monotonic transition from BCT to FCC. As c increases from the
BCT ground state, the local field initially decreases rapidly towards the
isotropic value at the body-centered cubic lattice, decreases further, reaching
a minimum value and increases, passing through the isotropic value again at an
intermediate lattice, reaches a maximum value and finally decreases to the FCC
value. An experimental realization of the structure transformation is
suggested. Moreover, the change in the local field can lead to a generalized
Clausius-Mossotti equation for the BCT lattices.Comment: Submitted to Phys. Rev.
Numerical methods for analyzing electromagnetic scattering
Attenuation properties of the normal modes in an overmoded waveguide coated with a lossy material were analyzed. It is found that the low-order modes, can be significantly attenuated even with a thin layer of coating if the coating material is not too lossy. A thinner layer of coating is required for large attenuation of the low-order modes if the coating material is magnetic rather than dielectric. The Radar Cross Section (RCS) from an uncoated circular guide terminated by a perfect electric conductor was calculated and compared with available experimental data. It is confirmed that the interior irradiation contributes to the RCS. The equivalent-current method based on the geometrical theory of diffraction (GTD) was chosen for the calculation of the contribution from the rim diffraction. The RCS reduction from a coated circular guide terminated by a PEC are planned schemes for the experiments are included. The waveguide coated with a lossy magnetic material is suggested as a substitute for the corrugated waveguide
Numerical methods for analyzing electromagnetic scattering
Numerical methods to analyze electromagnetic scattering are presented. The dispersions and attenuations of the normal modes in a circular waveguide coated with lossy material were completely analyzed. The radar cross section (RCS) from a circular waveguide coated with lossy material was calculated. The following is observed: (1) the interior irradiation contributes to the RCS much more than does the rim diffraction; (2) at low frequency, the RCS from the circular waveguide terminated by a perfect electric conductor (PEC) can be reduced more than 13 dB down with a coating thickness less than 1% of the radius using the best lossy material available in a 6 radius-long cylinder; (3) at high frequency, a modal separation between the highly attenuated and the lowly attenuated modes is evident if the coating material is too lossy, however, a large RCS reduction can be achieved for a small incident angle with a thin layer of coating. It is found that the waveguide coated with a lossy magnetic material can be used as a substitute for a corrugated waveguide to produce a circularly polarized radiation yield
Systemic Risk and the Refinancing Ratchet Effect
The confluence of three trends in the U.S. residential housing market-rising home prices, declining interest rates, and near-frictionless refinancing opportunities-led to vastly increased systemic risk in the financial system. Individually, each of these trends is benign, but when they occur simultaneously, as they did over the past decade, they impose an unintentional synchronization of homeowner leverage. This synchronization, coupled with the indivisibility of residential real estate that prevents homeowners from deleveraging when property values decline and homeowner equity deteriorates, conspire to create a "ratchet" effect in which homeowner leverage is maintained during good times without the ability to decrease leverage during bad times. If refinancing-facilitated homeowner-equity extraction is sufficiently widespread-as it was during the years leading up to the peak of the U.S. residential real-estate market-the inadvertent coordination of leverage during a market rise implies higher correlation of defaults during a market drop. To measure the systemic impact of this ratchet effect, we simulate the U.S. housing market with and without equity extractions, and estimate the losses absorbed by mortgage lenders by valuing the embedded put-option in non-recourse mortgages. Our simulations generate loss estimates of 280 billion in the absence of equity extractions.Risk; Financial Crisis; Household Finance; Real Estate; Subprime
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the most well-known application of quantum
cryptography. Previous proposed proofs of security of quantum key distribution
contain various technical subtleties. Here, a conceptually simpler proof of
security of quantum key distribution is presented. The new insight is the
invariance of the error rate of a teleportation channel: We show that the error
rate of a teleportation channel is independent of the signals being
transmitted. This is because the non-trivial error patterns are permuted under
teleportation. This new insight is combined with the recently proposed quantum
to classical reduction theorem. Our result shows that assuming that Alice and
Bob have fault-tolerant quantum computers, quantum key distribution can be made
unconditionally secure over arbitrarily long distances even against the most
general type of eavesdropping attacks and in the presence of all types of
noises.Comment: 13 pages, extended abstract. Comments will be appreciate
Intrabodies Binding the Proline-Rich Domains of Mutant Huntingtin Increase Its Turnover and Reduce Neurotoxicity
Although expanded polyglutamine (polyQ) repeats are inherently toxic, causing at least nine neurodegenerative diseases, the protein context determines which neurons are affected. The polyQ expansion that causes Huntington's disease (HD) is in the first exon (HDx-1) of huntingtin (Htt). However, other parts of the protein, including the 17 N-terminal amino acids and two proline (polyP) repeat domains, regulate the toxicity of mutant Htt. The role of the P-rich domain that is flanked by the polyP domains has not been explored. Using highly specific intracellular antibodies (intrabodies), we tested various epitopes for their roles in HDx-1 toxicity, aggregation, localization, and turnover. Three domains in the P-rich region (PRR) of HDx-1 are defined by intrabodies: MW7 binds the two polyP domains, and Happ1 and Happ3, two new intrabodies, bind the unique, P-rich epitope located between the two polyP epitopes. We find that the PRR-binding intrabodies, as well as VL12.3, which binds the N-terminal 17 aa, decrease the toxicity and aggregation of HDx-1, but they do so by different mechanisms. The PRR-binding intrabodies have no effect on Htt localization, but they cause a significant increase in the turnover rate of mutant Htt, which VL12.3 does not change. In contrast, expression of VL12.3 increases nuclear Htt. We propose that the PRR of mutant Htt regulates its stability, and that compromising this pathogenic epitope by intrabody binding represents a novel therapeutic strategy for treating HD. We also note that intrabody binding represents a powerful tool for determining the function of protein epitopes in living cells
Security proof of a three-state quantum key distribution protocol without rotational symmetry
Standard security proofs of quantum key distribution (QKD) protocols often
rely on symmetry arguments. In this paper, we prove the security of a
three-state protocol that does not possess rotational symmetry. The three-state
QKD protocol we consider involves three qubit states, where the first two
states, |0_z> and |1_z>, can contribute to key generation and the third state,
|+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been
proposed and implemented experimentally in some frequency-based QKD systems
where the three states can be prepared easily. Thus, by founding on the
security of this three-state protocol, we prove that these QKD schemes are, in
fact, unconditionally secure against any attacks allowed by quantum mechanics.
The main task in our proof is to upper bound the phase error rate of the qubits
given the bit error rates observed. Unconditional security can then be proved
not only for the ideal case of a single-photon source and perfect detectors,
but also for the realistic case of a phase-randomized weak coherent light
source and imperfect threshold detectors. Our result on the phase error rate
upper bound is independent of the loss in the channel. Also, we compare the
three-state protocol with the BB84 protocol. For the single-photon source case,
our result proves that the BB84 protocol strictly tolerates a higher quantum
bit error rate than the three-state protocol; while for the coherent-source
case, the BB84 protocol achieves a higher key generation rate and secure
distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column
The Megamaser Cosmology Project. X. High Resolution Maps and Mass Constraint for SMBHs
We present high resolution (sub-mas) VLBI maps of nuclear H2O megamasers for
seven galaxies. In UGC6093, the well-aligned systemic masers and high-velocity
masers originate in an edge-on, flat disk and we determine the mass of the
central SMBH to be M_SMBH = 2.58*10^7Msun(+-7%). For J1346+5228, the
distribution of masers is consistent with a disk, but the faint high-velocity
masers are only marginally detected, and we constrain the mass of the SMBH to
be in the range 1.5-2.0*10^7Msun. The origin of the masers in Mrk1210 is less
clear, as the systemic and high-velocity masers are misaligned and show a
disorganized velocity structure. We present one possible model in which the
masers originate in a tilted, warped disk, but we do not rule out the
possibility of other explanations including outflow masers. In NGC6926, we
detect a set of redshifted masers, clustered within a pc of each other, and a
single blueshifted maser about 4.4pc away, an offset that would be unusually
large for a maser disk system. Nevertheless, if it is a disk system, we
estimate the enclosed mass to be M_SMBH<4.8*10^7 Msun . For NGC5793, we detect
redshifted masers spaced about 1.4pc from a clustered set of blueshifted
features. The orientation of the structure supports a disk scenario as
suggested by Hagiwara et al.(2001). We estimate the enclosed mass to be M
SMBH<1.3*10^7 Msun. For NGC2824 and J0350-0127, the masers may be associated
with pc or sub-pc scale jets or outflows.Comment: Accepted by Ap
- …
