15,216 research outputs found
Tungsten wire-reinforced superalloys for 1093 C (2000 F) turbine blade applications
Various combinations of fiber and matrix materials were fabricated and evaluated for the purpose of selecting a specific combination that exhibited the best overall properties for a turbine blade application. A total of seven matrix alloys, including Hastelloy X, Nimonic 80A, Inconel 600, Inconel 625, IN-102, FeCrA1Y, were investigated reinforced with either 218CS tungsten, or W-Hf-C fibers. Based on preliminary screening studies, FeCrA1Y, Inconel 600 and Inconel 625 matrix composites systems were selected for extended thermal cycle tests and for property evaluations which included stress rupture, impact, and oxidation resistance. Of those investigated, the FeCrA1Y matrix composite system exhibited the best overall properties required for a turbine blade application. The W-Hf-C/FeCrA1Y system was selected for further property evaluation. Tensile strength values of up to 724 MPa (105,000 psi) were obtained for this material at 982 C and 607 MPa at 1093 C
Access Strategies for Network Caching
Having multiple data stores that can potentially serve content is common in modern networked applications. Data stores often publish approximate summaries of their content to enable effective utilization. Since these summaries are not entirely accurate, forming an efficient access strategy to multiple data stores becomes a complex risk management problem.This paper formally models this problem, and introduces practical algorithms with guaranteed approximation ratios, and in particular we show that our algorithms are optimal in a variety of settings. We also perform an extensive simulation study based on real data, and show that our algorithms are more robust than existing heuristics. That is, they exhibit near optimal performance in various settings whereas the efficiency of existing approaches depends upon system parameters that may change over time, or be otherwise unknown
Non-converging hysteretic cycles in random spin networks
Behavior of hysteretic trajectories for cyclical input is investigated as a
function of the internal structure of a system modeled by the classical random
network of binary spins. Different regimes of hysteretic behavior are
discovered for different network connectivity and topology. Surprisingly,
hysteretic trajectories which do not converge at all are observed. They are
shown to be associated with the presence of specific topological elements in
the network structure, particularly with the fully interconnected spin groups
of size equal or greater than 4.Comment: 4 pages, 3 figure
Topological entropy of realistic quantum Hall wave functions
The entanglement entropy of the incompressible states of a realistic quantum
Hall system are studied by direct diagonalization. The subdominant term to the
area law, the topological entanglement entropy, which is believed to carry
information about topologic order in the ground state, was extracted for
filling factors 1/3, 1/5 and 5/2. The results for 1/3 and 1/5 are consistent
with the topological entanglement entropy for the Laughlin wave function. The
5/2 state exhibits a topological entanglement entropy consistent with the
Moore-Read wave function.Comment: 6 pages, 6 figures; improved computations and graphics; added
reference
Recent Decisions
Recent Decisions
Admiralty--Maritime Wrongful Death Action--A Maritime Wrongful Death Action for Unseaworthiness Alleging Loss of Support, Services, Society and Funeral Expenses is not Barred by Decedent\u27s Recovery of Damages for Personal Injuries during His Lifetime
Stanley D. Miller
============================
Constitutional Law--Fourth Amendment Search and Seizure--Without Consent, Warrant or Probable Cause, A Roving Patrol Search of a Vehicle Twenty-Five Miles from Border is an Unreasonable Search and Seizure within Meaning of Fourth Amendment
G. Cranwell Montgomery
==============================
Jurisdiction--Securities Exchange Act of 1934--Section 10(b) applies to Fraudulent Transaction in Unlisted Foreign Securities when the Only Conduct within the United States is the Use of the Mails and the Telephone
Douglas Ian Friedma
Entanglement Entropy of Random Fractional Quantum Hall Systems
The entanglement entropy of the and quantum Hall
states in the presence of short range random disorder has been calculated by
direct diagonalization. A microscopic model of electron-electron interaction is
used, electrons are confined to a single Landau level and interact with long
range Coulomb interaction. For very weak disorder, the values of the
topological entanglement entropy are roughly consistent with expected
theoretical results. By considering a broader range of disorder strengths, the
fluctuation in the entanglement entropy was studied in an effort to detect
quantum phase transitions. In particular, there is a clear signature of a
transition as a function of the disorder strength for the state.
Prospects for using the density matrix renormalization group to compute the
entanglement entropy for larger system sizes are discussed.Comment: 29 pages, 16 figures; fixed figures and figure captions; revised
fluctuation calculation
Isotopic Scaling in Nuclear Reactions
A three parameter scaling relationship between isotopic distributions for
elements with Z has been observed that allows a simple description of
the dependence of such distributions on the overall isospin of the system. This
scaling law (termed iso-scaling) applies for a variety of reaction mechanisms
that are dominated by phase space, including evaporation, multifragmentation
and deeply inelastic scattering. The origins of this scaling behavior for the
various reaction mechanisms are explained. For multifragmentation processes,
the systematics is influenced by the density dependence of the asymmetry term
of the equation of state.Comment: 10 Pages, 2 Figure
Path Integrals, Density Matrices, and Information Flow with Closed Timelike Curves
Two formulations of quantum mechanics, inequivalent in the presence of closed
timelike curves, are studied in the context of a soluable system. It
illustrates how quantum field nonlinearities lead to a breakdown of unitarity,
causality, and superposition using a path integral. Deutsch's density matrix
approach is causal but typically destroys coherence. For each of these
formulations I demonstrate that there are yet further alternatives in
prescribing the handling of information flow (inequivalent to previous
analyses) that have implications for any system in which unitarity or coherence
are not preserved.Comment: 25 pages, phyzzx, CALT-68-188
The Quantum Propagator for a Nonrelativistic Particle in the Vicinity of a Time Machine
We study the propagator of a non-relativistic, non-interacting particle in
any non-relativistic ``time-machine'' spacetime of the type shown in Fig.~1: an
external, flat spacetime in which two spatial regions, at time and
at time , are connected by two temporal wormholes, one leading from
the past side of to t the future side of and the other from the
past side of to the future side of . We express the propagator
explicitly in terms of those for ordinary, flat spacetime and for the two
wormholes; and from that expression we show that the propagator satisfies
completeness and unitarity in the initial and final ``chronal regions''
(regions without closed timelike curves) and its propagation from the initial
region to the final region is unitary. However, within the time machine it
satisfies neither completeness nor unitarity. We also give an alternative proof
of initial-region-to-final-region unitarity based on a conserved current and
Gauss's theorem. This proof can be carried over without change to most any
non-relativistic time-machine spacetime; it is the non-relativistic version of
a theorem by Friedman, Papastamatiou and Simon, which says that for a free
scalar field, quantum mechanical unitarity follows from the fact that the
classical evolution preserves the Klein-Gordon inner product
- …