305,392 research outputs found
Realistic Gluino Axion Model Consistent with Supersymmetry Breaking at the TeV Scale
The recently proposed model of using the dynamical phase of the gluino to
solve the strong CP problem is shown to admit a specific realization in terms
of fundamental singlet superfields, such that the breaking of supersymmetry
occurs only at the TeV scale, despite the large axion scale of 10^{9} to
10^{12} GeV. Phenomenological implications are discussed.Comment: 12 pp, 2 fig
Criticality and Continuity of Explosive Site Percolation in Random Networks
This Letter studies the critical point as well as the discontinuity of a
class of explosive site percolation in Erd\"{o}s and R\'{e}nyi (ER) random
network. The class of the percolation is implemented by introducing a best-of-m
rule. Two major results are found: i). For any specific , the critical
percolation point scales with the average degree of the network while its
exponent associated with is bounded by -1 and . ii).
Discontinuous percolation could occur on sparse networks if and only if
approaches infinite. These results not only generalize some conclusions of
ordinary percolation but also provide new insights to the network robustness.Comment: 5 pages, 5 figure
Ab-initio simulation and experimental validation of beta-titanium alloys
In this progress report we present a new approach to the ab-initio guided
bottom up design of beta-Ti alloys for biomedical applications using a quantum
mechanical simulation method in conjunction with experiments. Parameter-free
density functional theory calculations are used to provide theoretical guidance
in selecting and optimizing Ti-based alloys with respect to three constraints:
(i) the use of non-toxic alloy elements; (ii) the stabilization of the body
centered cubic beta phase at room temperature; (iii) the reduction of the
elastic stiffness compared to existing Ti-based alloys. Following the
theoretical predictions, the alloys of interest are cast and characterized with
respect to their crystallographic structure, microstructure, texture, and
elastic stiffness. Due to the complexity of the ab initio calculations, the
simulations have been focused on a set of binary systems of Ti with two
different high melting bcc metals, namely, Nb and Mo. Various levels of model
approximations to describe mechanical and thermodynamic properties are tested
and critically evaluated. The experiments are conducted both, on some of the
binary alloys and on two more complex engineering alloy variants, namely,
Ti-35wt.%Nb-7wt.%Zr-5wt.%Ta and a Ti-20wt.%Mo-7wt.%Zr-5wt.%Ta.Comment: 23 pages, progress report on ab initio alloy desig
Operating theatre photography for orthopaedics and aesthetic surgery.
The aim of this paper is to examine the author's personal experience and practice in operating theatre photography. The ways of working are personal to the author but hopefully will help others in undertaking this type of work
Modelling and simulation of a biometric identity-based cryptography
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols
Analysis of security protocols using finite-state machines
This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay
Biometric identity-based cryptography for e-Government environment
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols
- …