200,006 research outputs found

    Design of a smart turning tool with application to in-process cutting force measurement in ultraprecision and micro cutting

    Get PDF
    In modern micromachining, there is a need to measure and monitor certain machining process parameters in process so as to detect tool wear in real time, to optimize the process parameters setup, and to render the machining process some level of smartness and intelligence. This paper presents the innovative design of a smart turning tool using two pieces of piezoelectric films to measure cutting and feed force in real time. The tool was tested on its performance through the calibration and cutting trials against the commercial dynamometer. The results show the smart turning tool has achieved the performance as designed

    Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud

    Full text link
    The increasing massive data generated by various sources has given birth to big data analytics. Solving large-scale nonlinear programming problems (NLPs) is one important big data analytics task that has applications in many domains such as transport and logistics. However, NLPs are usually too computationally expensive for resource-constrained users. Fortunately, cloud computing provides an alternative and economical service for resource-constrained users to outsource their computation tasks to the cloud. However, one major concern with outsourcing NLPs is the leakage of user's private information contained in NLP formulations and results. Although much work has been done on privacy-preserving outsourcing of computation tasks, little attention has been paid to NLPs. In this paper, we for the first time investigate secure outsourcing of general large-scale NLPs with nonlinear constraints. A secure and efficient transformation scheme at the user side is proposed to protect user's private information; at the cloud side, generalized reduced gradient method is applied to effectively solve the transformed large-scale NLPs. The proposed protocol is implemented on a cloud computing testbed. Experimental evaluations demonstrate that significant time can be saved for users and the proposed mechanism has the potential for practical use.Comment: Ang Li and Wei Du equally contributed to this work. This work was done when Wei Du was at the University of Arkansas. 2018 EAI International Conference on Security and Privacy in Communication Networks (SecureComm

    Interlacing Log-concavity of the Boros-Moll Polynomials

    Full text link
    We introduce the notion of interlacing log-concavity of a polynomial sequence {Pm(x)}m0\{P_m(x)\}_{m\geq 0}, where Pm(x)P_m(x) is a polynomial of degree m with positive coefficients ai(m)a_{i}(m). This sequence of polynomials is said to be interlacing log-concave if the ratios of consecutive coefficients of Pm(x)P_m(x) interlace the ratios of consecutive coefficients of Pm+1(x)P_{m+1}(x) for any m0m\geq 0. Interlacing log-concavity is stronger than the log-concavity. We show that the Boros-Moll polynomials are interlacing log-concave. Furthermore we give a sufficient condition for interlacing log-concavity which implies that some classical combinatorial polynomials are interlacing log-concave.Comment: 10 page

    Proof of a Conjecture of Hirschhorn and Sellers on Overpartitions

    Full text link
    Let pˉ(n)\bar{p}(n) denote the number of overpartitions of nn. It was conjectured by Hirschhorn and Sellers that \bar{p}(40n+35)\equiv 0\ ({\rm mod\} 40) for n0n\geq 0. Employing 2-dissection formulas of quotients of theta functions due to Ramanujan, and Hirschhorn and Sellers, we obtain a generating function for pˉ(40n+35)\bar{p}(40n+35) modulo 5. Using the (p,k)(p, k)-parametrization of theta functions given by Alaca, Alaca and Williams, we give a proof of the congruence \bar{p}(40n+35)\equiv 0\ ({\rm mod\} 5). Combining this congruence and the congruence \bar{p}(4n+3)\equiv 0\ ({\rm mod\} 8) obtained by Hirschhorn and Sellers, and Fortin, Jacob and Mathieu, we give a proof of the conjecture of Hirschhorn and Sellers.Comment: 11 page

    Doppler Amplification of Motion of a Trapped Three-Level Ion

    Full text link
    The system of a trapped ion translationally excited by a blue-detuned near-resonant laser, sometimes described as an instance of a phonon laser, has recently received attention as interesting in its own right and for its application to non-destructive readout of internal states of non-fluorescing ions. Previous theoretical work has been limited to cases of two-level ions. Here, we perform simulations to study the dynamics of a phonon laser involving the Λ\Lambda-type ^{138}\mbox{Ba}^{+} ion, in which coherent population trapping effects lead to different behavior than in the previously studied cases. We also explore optimization of the laser parameters to maximize amplification gain and signal-to-noise ratio for internal state readout

    Orbital and Pauli limiting effects in heavily doped Ba1x_{1-x}Kx_xFe2_2As2_2

    Full text link
    We investigated the thermodynamic properties of the Fe-based lightly disordered superconductor Ba0.05_{0.05}K0.95_{0.95}Fe2_2As2_2 in external magnetic field H applied along the FeAs layers (H//ab planes). The superconducting (SC) transition temperature for this doping level is Tc_c = 6.6 K. Our analysis of the specific heat C(T,H) measured for T < Tc_c implies a sign change of the superconducting order parameter across different Fermi pockets. We provide experimental evidence for the three components superconducting order parameter. We find that all three components have values which are comparable with the previously reported ones for the stochiometric compound KFe2_2As2_2. Our data for C(T,H) and resistivity rho(T,H) can be interpreted in favor of the dominant orbital contribution to the pair-breaking mechanism at low fields, while Pauli limiting effect dominates at high fields, giving rise to a gapless superconducting state with only the leading non-zero gap.Comment: 7 pages, 5 figure
    corecore