1,657 research outputs found
Resolution of Veronese Embedding of plane curves
Let be a smooth (irreducible) curve of degree in .
Let be the Veronese embedding
and let denote the homogeneous ideal of on
. In this note we explicitly write down the minimal free
resolution of for $d\geq
Magic Melters' Have Geometrical Origin
Recent experimental reports bring out extreme size sensitivity in the heat
capacities of Gallium and Aluminum clusters. In the present work we report
results of our extensive {\it ab initio} molecular dynamical simulations on
Ga and Ga, the pair which has shown rather dramatic size
sensitivity. We trace the origin of this size sensitive heat capacities to the
relative order in their respective ground state geometries. Such an effect of
nature of the ground state on the characteristics of heat capacities is also
seen in case of small Gallium and Sodium clusters indicating that the observed
size sensitivity is a generic feature of small clusters.Comment: 4 pages, 6 figure
A Trust-based Recruitment Framework for Multi-hop Social Participatory Sensing
The idea of social participatory sensing provides a substrate to benefit from
friendship relations in recruiting a critical mass of participants willing to
attend in a sensing campaign. However, the selection of suitable participants
who are trustable and provide high quality contributions is challenging. In
this paper, we propose a recruitment framework for social participatory
sensing. Our framework leverages multi-hop friendship relations to identify and
select suitable and trustworthy participants among friends or friends of
friends, and finds the most trustable paths to them. The framework also
includes a suggestion component which provides a cluster of suggested friends
along with the path to them, which can be further used for recruitment or
friendship establishment. Simulation results demonstrate the efficacy of our
proposed recruitment framework in terms of selecting a large number of
well-suited participants and providing contributions with high overall trust,
in comparison with one-hop recruitment architecture.Comment: accepted in DCOSS 201
Finite temperature behavior of impurity doped Lithium cluster {\em viz} LiSn
We have carried out extensive isokinetic {\it ab initio} molecular dynamic
simulations to investigate the finite temperature properties of the impurity
doped cluster LiSn along with the host cluster Li. The data obtained
from about 20 temperatures and total simulation time of at least 3 ns is used
to extract thermodynamical quantities like canonical specific heat. We observe
a substantial charge transfer from all Li atoms to Sn which inturn weakens the
Li-Li bonds in LiSn compared to the bonds in Li. This weakening of
bonds changes the finite temperature behavior of LiSn significantly.
Firstly, LiSn becomes liquid-like around 250 K, a much lower temperature
than that of Li (~425 K). Secondly, an additional quasirotational
motion of lithium atoms appears at lower temperatures giving rise to a shoulder
around 50 K in the specific heat curve of LiSn. The peak in the specific
heat of Li is very broad and the specific heat does not show any premelting
features.Comment: 16 pages, 10 figures Submitted to J. Chem. Phy
Recharging of Flying Base Stations using Airborne RF Energy Sources
This paper presents a new method for recharging flying base stations, carried
by Unmanned Aerial Vehicles (UAVs), using wireless power transfer from
dedicated, airborne, Radio Frequency (RF) energy sources. In particular, we
study a system in which UAVs receive wireless power without being disrupted
from their regular trajectory. The optimal placement of the energy sources are
studied so as to maximize received power from the energy sources by the
receiver UAVs flying with a linear trajectory over a square area. We find that
for our studied scenario of two UAVs, if an even number of energy sources are
used, placing them in the optimal locations maximizes the total received power,
while achieving fairness among the UAVs. However, in the case of using an odd
number of energy sources, we can either maximize the total received power, or
achieve fairness, but not both at the same time. Numerical results show that
placing the energy sources at the suggested optimal locations results in
significant power gain compared to nonoptimal placements.Comment: 6 pages, 5 figures, conference pape
Magnetic impurities in graphane with dehydrogenated channels
We have investigated the electronic and magnetic response of a single Fe atom
and a pair of interacting Fe atoms placed in patterned dehydrogenated channels
in graphane within the framework of density functional theory. We have
considered two channels: "armchair" and "zigzag" channels. Fully relaxed
calculations have been carried out for three different channel widths. Our
calculations reveal that the response to the magnetic impurities is very
different for these two channels. We have also shown that one can stabilize
magnetic impurities (Fe in the present case) along the channels of bare carbon
atoms, giving rise to a magnetic insulator or a spin gapless semiconductor. Our
calculations with spin-orbit coupling shows a large in-plane magnetic
anisotropy energy for the case of the armchair channel. The magnetic exchange
coupling between two Fe atoms placed in the semiconducting channel with an
armchair edge is very weakly ferromagnetic whereas a fairly strong
ferromagnetic coupling is observed for reasonable separations between Fe atoms
in the zigzag-edged metallic channel with the coupling mediated by the bare
carbon atoms. The possibility of realizing an ultrathin device with interesting
magnetic properties is discussed
On the Activity Privacy of Blockchain for IoT
Security is one of the fundamental challenges in the Internet of Things (IoT)
due to the heterogeneity and resource constraints of the IoT devices. Device
classification methods are employed to enhance the security of IoT by detecting
unregistered devices or traffic patterns. In recent years, blockchain has
received tremendous attention as a distributed trustless platform to enhance
the security of IoT. Conventional device identification methods are not
directly applicable in blockchain-based IoT as network layer packets are not
stored in the blockchain. Moreover, the transactions are broadcast and thus
have no destination IP address and contain a public key as the user identity,
and are stored permanently in blockchain which can be read by any entity in the
network. We show that device identification in blockchain introduces privacy
risks as the malicious nodes can identify users' activity pattern by analyzing
the temporal pattern of their transactions in the blockchain. We study the
likelihood of classifying IoT devices by analyzing their information stored in
the blockchain, which to the best of our knowledge, is the first work of its
kind. We use a smart home as a representative IoT scenario. First, a blockchain
is populated according to a real-world smart home traffic dataset. We then
apply machine learning algorithms on the data stored in the blockchain to
analyze the success rate of device classification, modeling both an informed
and a blind attacker. Our results demonstrate success rates over 90\% in
classifying devices. We propose three timestamp obfuscation methods, namely
combining multiple packets into a single transaction, merging ledgers of
multiple devices, and randomly delaying transactions, to reduce the success
rate in classifying devices. The proposed timestamp obfuscation methods can
reduce the classification success rates to as low as 20%
- …
