2,728 research outputs found

    Foot Bone in Vivo: Its Center of Mass and Centroid of Shape

    Get PDF
    This paper studies foot bone geometrical shape and its mass distribution and establishes an assessment method of bone strength. Using spiral CT scanning, with an accuracy of sub-millimeter, we analyze the data of 384 pieces of foot bones in vivo and investigate the relationship between the bone's external shape and internal structure. This analysis is explored on the bases of the bone's center of mass and its centroid of shape. We observe the phenomenon of superposition of center of mass and centroid of shape fairly precisely, indicating a possible appearance of biomechanical organism. We investigate two aspects of the geometrical shape, (i) distance between compact bone's centroid of shape and that of the bone and (ii) the mean radius of the same density bone issue relative to the bone's centroid of shape. These quantities are used to interpret the influence of different physical exercises imposed on bone strength, thereby contributing to an alternate assessment technique to bone strength.Comment: 9 pages, 4 figure

    Diquark Condensates and Compact Star Cooling

    Full text link
    The effect of color superconductivity on the cooling of quark stars and neutron stars with large quark cores is investigated. Various known and new quark-neutrino processes are studied. As a result, stars being in the color flavor locked (CFL) color superconducting phase cool down extremely fast. Quark stars with no crust cool down too rapidly in disagreement with X-ray data. The cooling of stars being in the N_f =2 color superconducting (2SC) phase with a crust is compatible with existing X-ray data. Also the cooling history of stars with hypothetic pion condensate nuclei and a crust does not contradict the data.Comment: 10 pages, 5 figures, accepted for publication in Ap

    Attacks on quantum key distribution protocols that employ non-ITS authentication

    Full text link
    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD-postprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.Comment: 34 page

    Tight Finite-Key Analysis for Quantum Cryptography

    Get PDF
    Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final key is highly dependent on the number, M, of signals exchanged between the legitimate parties. While, in any practical implementation, M is limited by the available resources, existing security proofs are often only valid asymptotically for unrealistically large values of M. Here, we demonstrate that this gap between theory and practice can be overcome using a recently developed proof technique based on the uncertainty relation for smooth entropies. Specifically, we consider a family of Bennett-Brassard 1984 quantum key distribution protocols and show that security against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure

    Astrobiological Complexity with Probabilistic Cellular Automata

    Full text link
    Search for extraterrestrial life and intelligence constitutes one of the major endeavors in science, but has yet been quantitatively modeled only rarely and in a cursory and superficial fashion. We argue that probabilistic cellular automata (PCA) represent the best quantitative framework for modeling astrobiological history of the Milky Way and its Galactic Habitable Zone. The relevant astrobiological parameters are to be modeled as the elements of the input probability matrix for the PCA kernel. With the underlying simplicity of the cellular automata constructs, this approach enables a quick analysis of large and ambiguous input parameters' space. We perform a simple clustering analysis of typical astrobiological histories and discuss the relevant boundary conditions of practical importance for planning and guiding actual empirical astrobiological and SETI projects. In addition to showing how the present framework is adaptable to more complex situations and updated observational databases from current and near-future space missions, we demonstrate how numerical results could offer a cautious rationale for continuation of practical SETI searches.Comment: 37 pages, 11 figures, 2 tables; added journal reference belo

    Direct Simulation of a Solidification Benchmark Experiment

    No full text
    International audienceA solidification benchmark experiment is simulated using a three-dimensional cellular automaton-finite element solidification model. The experiment consists of a rectangular cavity containing a Sn-3 wt pct Pb alloy. The alloy is first melted and then solidified in the cavity. A dense array of thermocouples permits monitoring of temperatures in the cavity and in the heat exchangers surrounding the cavity. After solidification, the grain structure is revealed by metallography. X-ray radiography and inductively coupled plasma spectrometry are also conducted to access a distribution map of Pb, or macrosegregation map. The solidification model consists of solutions for heat, solute mass, and momentum conservations using the finite element method. It is coupled with a description of the development of grain structure using the cellular automaton method. A careful and direct comparison with experimental results is possible thanks to boundary conditions deduced from the temperature measurements, as well as a careful choice of the values of the material properties for simulation. Results show that the temperature maps and the macrosegregation map can only be approached with a three-dimensional simulation that includes the description of the grain structure

    Nonthermal nature of incipient extremal black holes

    Get PDF
    We examine particle production from spherical bodies collapsing into extremal Reissner-Nordstr\"om black holes. Kruskal coordinates become ill-defined in the extremal case, but we are able to find a simple generalization of them that is good in this limit. The extension allows us to calculate the late-time worldline of the center of the collapsing star, thus establishing a correspondence with a uniformly accelerated mirror in Minkowski spacetime. The spectrum of created particles associated with such uniform acceleration is nonthermal, indicating that a temperature is not defined. Moreover, the spectrum contains a constant that depends on the history of the collapsing object. At first sight this points to a violation of the no-hair theorems; however, the expectation value of the stress-energy-momentum tensor is zero and its variance vanishes as a power law at late times. Hence, both the no-hair theorems and the cosmic censorship conjecture are preserved. The power-law decay of the variance is in distinction to the exponential fall-off of a nonextremal black hole. Therefore, although the vanishing of the stress tensor's expectation value is consistent with a thermal state at zero temperature, the incipient black hole does not behave as a thermal object at any time and cannot be regarded as the thermodynamic limit of a nonextremal black hole, regardless of the fact that the final product of collapse is quiescent.Comment: 13 pages, 2 epsf figures, RevTeX 3. Minor changes, version published in PR

    Utility of Repeated Praziquantel Dosing in the Treatment of Schistosomiasis in High-Risk Communities in Africa: A Systematic Review

    Get PDF
    Infection by Schistosoma worms causes serious disease among people who live in areas of Africa, South America, and Asia where these parasites are regularly transmitted. Although yearly treatment with the drug praziquantel is fairly effective in reducing or eliminating active infection, it does not cure everyone, and reinfection remains a continuing problem in high-risk communities. Studies have suggested that a repeat dose of praziquantel, given 2 to 8 weeks after the first dose, can improve cure rates and reduce remaining intensity of infections in population-based programs. Our systematic review of published research found that, on average, in Africa, such repeated dosing appears to offer particular advantages in the treatment of S. mansoni, the cause of intestinal schistosomiasis, but there was less consistent improvement after double-dosing for S. haematobium, the cause of urogenital schistosomiasis. Based on this evidence, we used a calibrated life-path model to predict the costs and benefits of a single-dose vs. a double-dose strategy in a typical high-risk community. Our projections suggest cost-effective incremental benefits from double dosing in terms of i) limiting a person's total years spent infected and ii) limiting the number of years they spend with heavy infection, with consequent improvements in quality of life

    Participant recruitment into a randomised controlled trial of exercise therapy for people with multiple sclerosis

    Get PDF
    The success of a clinical trial is often dependant on whether recruitment targets can be met in the required time frame. Despite an increase in research into the benefits of exercise in people with multiple sclerosis (PwMS), no trial has reported detailed data on effective recruitment strategies for large-scale randomised controlled trials. The main purpose of this report is to provide a detailed outline of recruitment strategies, rates and estimated costs in the Exercise Intervention for Multiple Sclerosis (ExIMS) trial to identify best practices for future trials involving multiple sclerosis (MS) patient recruitment

    Skeletal growth in class II malocclusion from childhood to adolescence: does the profile straighten?

    Get PDF
    BACKGROUND There is relatively little appreciation of the changes in maxillary-mandibular relationships occurring during adolescence among subjects with normal and increased overjet. The aim of this study was to assess differences in changes in maxillo-mandibular relationships during the adolescent growth period based on the presence of a normal ( 4 mm) overjet in childhood. Our hypothesis was that there is no difference in the change of the A point, nasion, B point (ANB) angle during growth between these two overjet groups. Lateral cephalograms were obtained from 65 subjects taken from the American Association of Orthodontists Foundation (AAOF) Craniofacial Growth Legacy Collections Project. Cephalograms were obtained at ages 7-10 (T0) and 14-17 (T1) with allocation into two groups based on baseline overjet (> 4 mm: group 1, 2-4 mm: group 2). Random effects linear regression was used to account for multiple within -patient measurements with dependent variables including antero-posterior skeletal pattern (based on sella, nasion, A point (SNA); sella, nasion, B point (SNB); and ANB angles). RESULTS We included a similar number of males (n = 34; 52.3%) and females (n = 31; 47.7%). The mean ANB was higher at baseline in group 1 (5.42, SD 2.16°) than in group 2 (3.08, SD 1.91°). The hypothesis was rejected as the ANB angle reduced by 1.92° more in the larger overjet group with the association being statistically significant after accounting for age and gender (P  4 mm overjet group compared to the 2-4 mm group (0.857°, P = 0.271; 95% CI - 0.669 to 2.383). The SNB angle increased by 1.15° more in the higher overjet group but there was only weak evidence of an association (P = 0.086; 95% CI - 2.464 to 0.164). CONCLUSIONS A slight straightening of the facial profile was observed in both groups with a statistically significant greater reduction in ANB arising in the group with larger baseline overjet. This translated into a marginal reduction in the overjet in this group
    corecore