1,657 research outputs found

    Resolution of Veronese Embedding of plane curves

    Full text link
    Let CC be a smooth (irreducible) curve of degree dd in P2\mathbb{P}^{2}. Let P2P5\mathbb{P}^{2} \hookrightarrow \mathbb{P}^{5} be the Veronese embedding and let IC\mathcal{I}_{C} denote the homogeneous ideal of CC on P5\mathbb{P}^{5}. In this note we explicitly write down the minimal free resolution of IC\mathcal{I}_{C} for $d\geq

    Magic Melters' Have Geometrical Origin

    Get PDF
    Recent experimental reports bring out extreme size sensitivity in the heat capacities of Gallium and Aluminum clusters. In the present work we report results of our extensive {\it ab initio} molecular dynamical simulations on Ga30_{30} and Ga31_{31}, the pair which has shown rather dramatic size sensitivity. We trace the origin of this size sensitive heat capacities to the relative order in their respective ground state geometries. Such an effect of nature of the ground state on the characteristics of heat capacities is also seen in case of small Gallium and Sodium clusters indicating that the observed size sensitivity is a generic feature of small clusters.Comment: 4 pages, 6 figure

    A Trust-based Recruitment Framework for Multi-hop Social Participatory Sensing

    Full text link
    The idea of social participatory sensing provides a substrate to benefit from friendship relations in recruiting a critical mass of participants willing to attend in a sensing campaign. However, the selection of suitable participants who are trustable and provide high quality contributions is challenging. In this paper, we propose a recruitment framework for social participatory sensing. Our framework leverages multi-hop friendship relations to identify and select suitable and trustworthy participants among friends or friends of friends, and finds the most trustable paths to them. The framework also includes a suggestion component which provides a cluster of suggested friends along with the path to them, which can be further used for recruitment or friendship establishment. Simulation results demonstrate the efficacy of our proposed recruitment framework in terms of selecting a large number of well-suited participants and providing contributions with high overall trust, in comparison with one-hop recruitment architecture.Comment: accepted in DCOSS 201

    Finite temperature behavior of impurity doped Lithium cluster {\em viz} Li6_6Sn

    Get PDF
    We have carried out extensive isokinetic {\it ab initio} molecular dynamic simulations to investigate the finite temperature properties of the impurity doped cluster Li6_6Sn along with the host cluster Li7_7. The data obtained from about 20 temperatures and total simulation time of at least 3 ns is used to extract thermodynamical quantities like canonical specific heat. We observe a substantial charge transfer from all Li atoms to Sn which inturn weakens the Li-Li bonds in Li6_6Sn compared to the bonds in Li7_7. This weakening of bonds changes the finite temperature behavior of Li6_6Sn significantly. Firstly, Li6_6Sn becomes liquid-like around 250 K, a much lower temperature than that of Li7_7 (\approx~425 K). Secondly, an additional quasirotational motion of lithium atoms appears at lower temperatures giving rise to a shoulder around 50 K in the specific heat curve of Li6_6Sn. The peak in the specific heat of Li7_7 is very broad and the specific heat does not show any premelting features.Comment: 16 pages, 10 figures Submitted to J. Chem. Phy

    Recharging of Flying Base Stations using Airborne RF Energy Sources

    Full text link
    This paper presents a new method for recharging flying base stations, carried by Unmanned Aerial Vehicles (UAVs), using wireless power transfer from dedicated, airborne, Radio Frequency (RF) energy sources. In particular, we study a system in which UAVs receive wireless power without being disrupted from their regular trajectory. The optimal placement of the energy sources are studied so as to maximize received power from the energy sources by the receiver UAVs flying with a linear trajectory over a square area. We find that for our studied scenario of two UAVs, if an even number of energy sources are used, placing them in the optimal locations maximizes the total received power, while achieving fairness among the UAVs. However, in the case of using an odd number of energy sources, we can either maximize the total received power, or achieve fairness, but not both at the same time. Numerical results show that placing the energy sources at the suggested optimal locations results in significant power gain compared to nonoptimal placements.Comment: 6 pages, 5 figures, conference pape

    Magnetic impurities in graphane with dehydrogenated channels

    Full text link
    We have investigated the electronic and magnetic response of a single Fe atom and a pair of interacting Fe atoms placed in patterned dehydrogenated channels in graphane within the framework of density functional theory. We have considered two channels: "armchair" and "zigzag" channels. Fully relaxed calculations have been carried out for three different channel widths. Our calculations reveal that the response to the magnetic impurities is very different for these two channels. We have also shown that one can stabilize magnetic impurities (Fe in the present case) along the channels of bare carbon atoms, giving rise to a magnetic insulator or a spin gapless semiconductor. Our calculations with spin-orbit coupling shows a large in-plane magnetic anisotropy energy for the case of the armchair channel. The magnetic exchange coupling between two Fe atoms placed in the semiconducting channel with an armchair edge is very weakly ferromagnetic whereas a fairly strong ferromagnetic coupling is observed for reasonable separations between Fe atoms in the zigzag-edged metallic channel with the coupling mediated by the bare carbon atoms. The possibility of realizing an ultrathin device with interesting magnetic properties is discussed

    On the Activity Privacy of Blockchain for IoT

    Full text link
    Security is one of the fundamental challenges in the Internet of Things (IoT) due to the heterogeneity and resource constraints of the IoT devices. Device classification methods are employed to enhance the security of IoT by detecting unregistered devices or traffic patterns. In recent years, blockchain has received tremendous attention as a distributed trustless platform to enhance the security of IoT. Conventional device identification methods are not directly applicable in blockchain-based IoT as network layer packets are not stored in the blockchain. Moreover, the transactions are broadcast and thus have no destination IP address and contain a public key as the user identity, and are stored permanently in blockchain which can be read by any entity in the network. We show that device identification in blockchain introduces privacy risks as the malicious nodes can identify users' activity pattern by analyzing the temporal pattern of their transactions in the blockchain. We study the likelihood of classifying IoT devices by analyzing their information stored in the blockchain, which to the best of our knowledge, is the first work of its kind. We use a smart home as a representative IoT scenario. First, a blockchain is populated according to a real-world smart home traffic dataset. We then apply machine learning algorithms on the data stored in the blockchain to analyze the success rate of device classification, modeling both an informed and a blind attacker. Our results demonstrate success rates over 90\% in classifying devices. We propose three timestamp obfuscation methods, namely combining multiple packets into a single transaction, merging ledgers of multiple devices, and randomly delaying transactions, to reduce the success rate in classifying devices. The proposed timestamp obfuscation methods can reduce the classification success rates to as low as 20%
    corecore