14,091 research outputs found
Deconfinement Phase Transition Heating and Thermal Evolution of Neutron Stars
The deconfinement phase transition will lead to the release of latent heat
during spins down of neutron stars if the transition is the first-order one.We
have investigated the thermal evolution of neutron stars undergoing such
deconfinement phase transition. The results show that neutron stars may be
heated to higher temperature.This feature could be particularly interesting for
high temperature of low-magnetic field millisecond pulsar at late stage.Comment: 4 pages, to be published by American Institute of Physics, ed. D.Lai,
X.D.Li and Y.F.Yuan, as the Proceedings of the conference Astrophysics of
Compact Object
Recommended from our members
The Core-Periphery Structure of Destination Image: An Exploration via Social Network Analysis
The core-periphery structure (C/PS) of destination image, recently proposed as an alternative image model, has scarcely been tested. Presumably, the lack of appropriate techniques plays an important role in the limited theory testing efforts. Besides, it remains unclear how people retrieve destination image from memory, when we place destination image into a C-P model. Understanding the structure of destination image could reveal insights into image retrieval. This research aims to introduce social network analysis as a new approach to test the C/PS of destination image, and identify the retrieving paths of destination image adopted by potential tourists. Image descriptions about the Shanghai Disney Resort (SHDR) were collected from 1,000 respondents, and the data was analyzed via social network techniques. Results show that the image of SHDR has both single and multiple C/PSs, and image retrieval of respondents either follows a core-to-periphery path or fluctuates between two neighboring levels of core/periphery
Retraction and Generalized Extension of Computing with Words
Fuzzy automata, whose input alphabet is a set of numbers or symbols, are a
formal model of computing with values. Motivated by Zadeh's paradigm of
computing with words rather than numbers, Ying proposed a kind of fuzzy
automata, whose input alphabet consists of all fuzzy subsets of a set of
symbols, as a formal model of computing with all words. In this paper, we
introduce a somewhat general formal model of computing with (some special)
words. The new features of the model are that the input alphabet only comprises
some (not necessarily all) fuzzy subsets of a set of symbols and the fuzzy
transition function can be specified arbitrarily. By employing the methodology
of fuzzy control, we establish a retraction principle from computing with words
to computing with values for handling crisp inputs and a generalized extension
principle from computing with words to computing with all words for handling
fuzzy inputs. These principles show that computing with values and computing
with all words can be respectively implemented by computing with words. Some
algebraic properties of retractions and generalized extensions are addressed as
well.Comment: 13 double column pages; 3 figures; to be published in the IEEE
Transactions on Fuzzy System
Natural sd-RCCA secure public-key encryptions from hybrid paradigms
The existence of natural public-key encryption (PKE) schemes satisfying secretly detectable replayable CCA (sd-RCCA) security is left as open. By introducing probabilistic message authentication codes (MACs) into popular KEM plus DEM paradigms, several instances of such schemes are presented in this paper. It is known that the encrypt-then-authenticate paradigm gives an RCCA secure DEM when the underlying MAC is regular (but not strong) secure, where forgeries for old messages might be possible. By further requiring that the validity of such forgeries can be verified only secretly, sd-RCCA secure DEMs is obtained. Combining such DEMs with CCA secure KEMs gives sd-RCCA secure hybrid PKEs. We first formalize the related notions and this paradigm, and also other variants of KEM plus DEM hybrid paradigm since MACs are commonly used in them. Then we show natural examples of desired probabilistic MACs under the standard DDH assumption, and find appropriate KEMs to match the message space for those MACs and then obtain natural instances of sd-RCCA secure hybrid PKEs
Holographic n-partite Information in Hyperscaling Violating Geometry
The -partite information (nI) is formulated as a measure of multi-partite
entanglement. Field theory computation revealed that the sign of nI is
indefinite for , while holographic studies conjectured a sign property
that holographic nI is non-negative/non-positive for even/odd , with
tripartite information (TI, ) proved. We investigate the aspects of nI
with holographic duality. With a generically static bulk geometry, we give an
alternate geometric proof that holographic TI for parallel disjoint boundary
strips is non-positive, and illustrate that remarkably for larger , the sign
is indefinite. In hyperscaling violating geometry, we confirm the conjectured
sign property for strips of equal length with equal separation distance, and
self-consistently disprove this conjecture for with general
configurations. Therefore, nI in field theories and holography exhibits
compatibility except for . We also discuss other properties of holographic
nI with analytic computation: the monotonicity, linearity, relation to
hyperscaling violating parameters, temperature and UV cutoff effects, and the
physical implications. It is doubtful that nI is an effective measure of
entanglement considering the indefinite sign, non-monotonicity, and
quasi-linearity of its holographic dual. In this respect, we propose
constraints on the multi-partite entanglement measures.Comment: 30 pages, 19 figure
A Study of Strain-Induced Phase Transformations in TiNi Alloy by Electric Resistance Method
It is generally recognized that the shape memory effect (SME) is associated the interaction of stress with thermoelastic martensitic transformation [1]. The phase transformations in TiNi alloy was reported to occur as three kinds of B2→R, B2→M, R→M phase transformations [2]. There are different views about premartensitic transformation in TiNi based alloys. Mwang et al [3] reported a transformation sequence in TiNiFe alloy that was the parent B2→Incommensurate I→Rhombohedra R→Martensite M. But many authors [2,4] reported that the premartensitic structure of TiNi alloy is rhombohedra. It is known that the electric resistance increase in the premartensitic transformation range was because of the R-phase taking affect. The electric resistance decrease below the temperature MS was because of the martensite occurence. It is not clear what occurred when the SME alloy is made a plastic deformation. Muang et al [5] was reported that in a TiNi alloy the new rhombohedral phase, perhaps, was induced by stress in the internal friction experiment. In this paper the phase transformation induced by the plastic deformation was studied by the electric resistance method
Pulsar Glitch in a Strangeon Star Model. III The recovery
Strangeon star model has passed various observational tests, such as the
massive pulsars and the tidal deformability during binary mergers. Pulsar
glitch, as a useful probe for studying the interior structure of pulsars, has
also been studied in strangeon star model in our previous papers, including the
recovery coefficient, the waiting time of glitches and glitch activity. In this
paper, the recovery process of a glitch is described in the strangeon star
model, based on the starquake picture established in Paper I. After the
starquake, the inner motion of the stellar matter would reduce the tangential
pressure in the cracked places at the equatorial plane. The recovery (increase)
of the tangential pressure would be achieved by a viscous flow towards the
cracked places at equatorial plane, which leads to the exponential recovery of
the spin frequency. A uniform viscous flow can reproduce the single exponential
decay observed in some glitches, and the viscous time-scale and the
depth of the cracking place below the surface can be fitted by the recovery
data. It is found that increases with glitch size , which is
expected in the glitch scenario of strangeon stars. The magnitude of the
recovery predicted in this recovery model is also consistent with that derived
from observations. The single exponential decay reproduced by a uniform viscous
flow can be generalized to two or more exponentials by the multi-component of
viscous flows.Comment: 6 pages, 4 figures, 1 tabl
Heavy Metal Emission Characteristics of Urban Road Runoff
Pavement runoff sampling points were set up on the main roads of Chengdu city. Six rainfall-runoff events from July to September in 2017 were sampled by synchronous observation of rainfall, runoff and pollution. The concentration changes of copper, lead, zinc, chromium and cadmium in the runoff process were monitored, and the pollution emission regularity and initial scouring effect were studied. The results show that the emission regularity of pavement runoff pollution is closely related to rainfall characteristics and pollutant occurrence, and the concentration of dissolved heavy metals reaches its peak at the initial stage of runoff. The peak time of particulate heavy metal concentration lagged slightly behind that of rainfall intensity. There is a big difference between the strength of initial scouring degree and dissolved heavy metals the stronger the initial scouring degree of total heavy metals, the weaker the dissolved heavy metals. Reducing pavement runoff in the early stage of rainfall is an effective means to control heavy metal pollution
- …