248 research outputs found

    Generation of Relativistic Electron Bunches with Arbitrary Current Distribution via Transverse-to-Longitudinal Phase Space Exchange

    Full text link
    We propose a general method for tailoring the current distribution of relativistic electron bunches. The technique relies on a recently proposed method to exchange the longitudinal phase space emittance with one of the transverse emittances. The method consists of transversely shaping the bunch and then converting its transverse profile into a current profile via a transverse-to-longitudinal phase-space-exchange beamline. We show that it is possible to tailor the current profile to follow, in principle, any desired distributions. We demonstrate, via computer simulations, the application of the method to generate trains of microbunches with tunable spacing and linearly-ramped current profiles. We also briefly explore potential applications of the technique.Comment: 13 pages, 17 figure

    The distinct roles of two intertidal foraminiferal species in phytodetrital carbon and nitrogen fluxes – results from laboratory feeding experiments

    Get PDF
    Benthic foraminifera play a major role as primary consumers and detrivores redistributing organic carbon and nitrogen in intertidal environments. Here we compared the differences of phytodetrital carbon and nitrogen intake and turnover of two dominant intertidal foraminifera, Ammonia tepida and Haynesina germanica. Their lifestyles in relation to feeding behavior (feeding preferences, intake and turnover of phytodetrital carbon and nitrogen) and temperature adaptations were compared to obtain a closer definition of their specific roles in intertidal organic matter processing. For this comparison, we carried out a series of short-term laboratory incubations with stable-isotope-labeled (13C and 15N) detritus as the food source. We compared the response of the two species to diatom detritus at three different temperatures (15, 20, 25&thinsp;°C). Ammonia tepida showed a very high, temperature-influenced intake and turnover rates with more excessive carbon turnover, compared to nitrogen. The fairly low metabolic nitrogen turnover in H. germanica was not affected by temperature and was higher than the carbon turnover. This might be related with the chloroplast husbandry in H. germanica and its lower demands for food-derived nitrogen sources. Ammonia tepida prefers a soft chlorophyte food source over diatom detritus, which is harder to break down. In conclusion, A. tepida shows a generalist behavior that links with high fluxes of organic matter (OM). Due to its high rates of OM processing and abundances, we conclude that A. tepida is an important key player in intertidal carbon and nitrogen turnover, specifically in the short-term processing of OM and the mediation of dissolved nutrients to associated microbes and primary producers. In contrast, H. germanica is a highly specialized species with low rates of carbon and nitrogen budgeting.</p

    Interacting Constituents in Cosmology

    Full text link
    Universe evolution, as described by Friedmann's equations, is determined by source terms fixed by the choice of pressure ×\times energy-density equations of state p(ρ)p(\rho). The usual approach in Cosmology considers equations of state accounting only for kinematic terms, ignoring the contribution from the interactions between the particles constituting the source fluid. In this work the importance of these neglected terms is emphasized. A systematic method, based on the Statistical Mechanics of real fluids, is proposed to include them. A toy-model is presented which shows how such interaction terms can engender significant cosmological effects.Comment: 24 pages, 6 figures. It includes results presented in "Cosmic Acceleration from Elementary Interactions" [arXiv:gr-qc/0512135]. Citations added in v.

    Singular values of some modular functions

    Full text link
    We study the properties of special values of the modular functions obtained from Weierstrass P-function at imaginary quadratic points.Comment: 19 pages,corrected typo

    A hop-count based positioning algorithm for wireless ad-hoc networks

    Get PDF
    We propose a range-free localization algorithm for a wireless ad-hoc network utilizing the hop-count metric’s ability to indicate proximity to anchors (i.e., nodes with known positions). In traditional sense, hop-count generally means the number of intermediate routers a datagram has to go through between its source and the destination node. We analytically show that hop-count could be used to indicate proximity relative to an anchor node. Our proposed algorithm is computationally feasible for resource constrained wireless ad-hoc nodes, and gives reasonable accuracy. We perform both real experiments and simulations to evaluate the algorithm’s performance. Experimental results show that our algorithm outperforms similar proximity based algorithms utilizing received signal strength and expected transmission count. We also analyze the impact of various parameters like the number of anchor nodes, placements of anchor nodes and varying transmission powers of the nodes on the hop-count based localization algorithm’s performance through simulation

    Benchmarking of cell type deconvolution pipelines for transcriptomics data

    Get PDF
    Many computational methods have been developed to infer cell type proportions from bulk transcriptomics data. However, an evaluation of the impact of data transformation, pre-processing, marker selection, cell type composition and choice of methodology on the deconvolution results is still lacking. Using five single-cell RNA-sequencing (scRNA-seq) datasets, we generate pseudo-bulk mixtures to evaluate the combined impact of these factors. Both bulk deconvolution methodologies and those that use scRNA-seq data as reference perform best when applied to data in linear scale and the choice of normalization has a dramatic impact on some, but not all methods. Overall, methods that use scRNA-seq data have comparable performance to the best performing bulk methods whereas semi-supervised approaches show higher error values. Moreover, failure to include cell types in the reference that are present in a mixture leads to substantially worse results, regardless of the previous choices. Altogether, we evaluate the combined impact of factors affecting the deconvolution task across different datasets and propose general guidelines to maximize its performance. Inferring cell type proportions from transcriptomics data is affected by data transformation, normalization, choice of method and the markers used. Here, the authors use single-cell RNAseq datasets to evaluate the impact of these factors and propose guidelines to maximise deconvolution performance

    Trigger and Aperture of the Surface Detector Array of the Pierre Auger Observatory

    Get PDF
    The surface detector array of the Pierre Auger Observatory consists of 1600 water-Cherenkov detectors, for the study of extensive air showers (EAS) generated by ultra-high-energy cosmic rays. We describe the trigger hierarchy, from the identification of candidate showers at the level of a single detector, amongst a large background (mainly random single cosmic ray muons), up to the selection of real events and the rejection of random coincidences. Such trigger makes the surface detector array fully efficient for the detection of EAS with energy above 3×10183\times 10^{18} eV, for all zenith angles between 0^\circ and 60^\circ, independently of the position of the impact point and of the mass of the primary particle. In these range of energies and angles, the exposure of the surface array can be determined purely on the basis of the geometrical acceptance.Comment: 29 pages, 12 figure

    Carcass persistence and detectability : reducing the uncertainty surrounding wildlife-vehicle collision surveys

    Get PDF
    Carcass persistence time and detectability are two main sources of uncertainty on roadkill surveys. In this study, we evaluate the influence of these uncertainties on roadkill surveys and estimates. To estimate carcass persistence time, three observers (including the driver) surveyed 114km by car on a monthly basis for two years, searching for wildlife-vehicle collisions (WVC). Each survey consisted of five consecutive days. To estimate carcass detectability, we randomly selected stretches of 500m to be also surveyed on foot by two other observers (total 292 walked stretches, 146 km walked). We expected that body size of the carcass, road type, presence of scavengers and weather conditions to be the main drivers influencing the carcass persistence times, but their relative importance was unknown. We also expected detectability to be highly dependent on body size. Overall, we recorded low median persistence times (one day) and low detectability (<10%) for all vertebrates. The results indicate that body size and landscape cover (as a surrogate of scavengers' presence) are the major drivers of carcass persistence. Detectability was lower for animals with body mass less than 100g when compared to carcass with higher body mass. We estimated that our recorded mortality rates underestimated actual values of mortality by 2±10 fold. Although persistence times were similar to previous studies, the detectability rates here described are very different from previous studies. The results suggest that detectability is the main source of bias across WVC studies. Therefore, more than persistence times, studies should carefully account for differing detectability when comparing WVC studies

    Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions

    Get PDF
    Tightly secure cryptographic schemes have been extensively studied in the fields of chosen-ciphertext secure public-key encryption (CCA-secure PKE), identity-based encryption (IBE), signatures and more. We extend tightly secure cryptography to inner product functional encryption (IPFE) and present the first tightly secure schemes related to IPFE. We first construct a new IPFE scheme that is tightly secure in the multi-user and multi-challenge setting. In other words, the security of our scheme does not degrade even if an adversary obtains many ciphertexts generated by many users. Our scheme is constructible on a pairing-free group and secure under the matrix decisional Diffie-Hellman (MDDH) assumption, which is the generalization of the decisional Diffie-Hellman (DDH) assumption. Applying the known conversions by Lin (CRYPTO 2017) and Abdalla et al. (CRYPTO 2018) to our scheme, we can obtain the first tightly secure function-hiding IPFE scheme and multi-input IPFE (MIPFE) scheme respectively. Our second main contribution is the proposal of a new generic conversion from function-hiding IPFE to function-hiding MIPFE, which was left as an open problem by Abdalla et al. (CRYPTO 2018). We can obtain the first tightly secure function-hiding MIPFE scheme by applying our conversion to the tightly secure function-hiding IPFE scheme described above. Finally, the security reductions of all our schemes are fully tight, which means that the security of our schemes is reduced to the MDDH assumption with a constant security loss
    corecore