6,238 research outputs found

    Heterogeneity in structurally arrested hard spheres

    Get PDF
    When cooled or compressed sufficiently rapidly, a liquid vitrifies into a glassy amorphous state. Vitrification in a dense liquid is associated with jamming of the particles. For hard spheres, the density and degree of order in the final structure depend on the compression rate: simple intuition suggests, and previous computer simulation demonstrates, that slower compression results in states that are both denser and more ordered. In this work, we use the Lubachevsky-Stillinger algorithm to generate a sequence of structurally arrested hard-sphere states by varying the compression rate. We find that while the degree of order, as measured by both bond-orientation and translation order parameters, increases monotonically with decreasing compression rate, the density of the arrested state first increases, then decreases, then increases again, as the compression rate decreases, showing a minimum at an intermediate compression rate. Examination of the distribution of the local order parameters and the distribution of the root-mean-square fluctuation of the particle positions, as well as direct visual inspection of the arrested structures, reveal that they are structurally heterogeneous, consisting of disordered, amorphous regions and locally ordered crystal-like domains. In particular, the low-density arrested states correspond with many interconnected small crystal clusters that form a polycrystalline network interspersed in an amorphous background, suggesting that jamming by the domains may be an important mechanism for these states

    Charmless B(s)VVB_{(s)}\to VV Decays in Factorization-Assisted Topological-Amplitude Approach

    Full text link
    Within the factorization-assisted topological-amplitude approach, we studied the 33 charmless B(s)VVB_{(s)} \to VV decays, where VV stands for a light vector meson. According to the flavor flows, the amplitude of each process can be decomposed into 8 different topologies. In contrast to the conventional flavor diagrammatic approach, we further factorize each topological amplitude into decay constant, form factors and unknown universal parameters. By χ2\chi^2 fitting 46 experimental observables, we extracted 10 theoretical parameters with χ2\chi^2 per degree of freedom around 2. Using the fitted parameters, we calculated the branching fractions, polarization fractions, CP asymmetries and relative phases between polarization amplitudes of each decay mode. The decay channels dominated by tree diagram have large branching fractions and large longitudinal polarization fraction. The branching fractions and longitudinal polarization fractions of color-suppressed decays become smaller. Current experimental data of large transverse polarization fractions in the penguin dominant decay channels can be explained by only one transverse amplitude of penguin annihilation diagram. Our predictions of those not yet measured channels can be tested in the ongoing LHCb experiment and the Belle-II experiment in future.Comment: 22 pages, 2 figure

    Real-time Data Flow Control for CBM-TOF Super Module Quality Evaluation

    Full text link
    Super module assembled with MRPC detectors is the component unit of TOF (Time of Flight) system for the Compressed Baryonic Matter (CBM) experiment. Quality of super modules needs to be evaluated before it is applied in CBM-TOF. Time signals exported from super module are digitalized at TDC (Time to Digital Converter) station. Data rate is up to 6 Gbps at each TDC station, which brings a tremendous pressure for data transmission in real time. In this paper, a real-time data flow control method is designed. In this control method, data flow is divided into 3 types: scientific data flow, status data flow and control data flow. In scientific data flow, data of each TDC station is divided into 4 sub-flows, and then is read out by a parallel and hierarchical network, which consists of multiple readout mother boards and daughter boards groups. In status data flow, status data is aggregated into a specific readout mother board. Then it is uploaded to DAQ via readout daughter board. In control data flow, control data is downloaded to all circuit modules in the opposite direction of status data flow. Preliminary test result indicated data of STS was correctly transmitted to DAQ with no error and three type data flows were control orderly in real time. This data flow control method can meet the quality evaluation requirement of supper module in CBM-TOF

    E-Characteristic Polynomials of Tensors

    Full text link
    In this paper, we show that the coefficients of the E-characteristic polynomial of a tensor are orthonormal invariants of that tensor. When the dimension is 2, some simplified formulas of the E-characteristic polynomial are presented. A re- sultant formula for the constant term of the E-characteristic polynomial is given. We then study the set of tensors with infinitely many eigenpairs and the set of irregular tensors, and prove both the sets have codimension 2 as subvarieties in the projective space of tensors. This makes our perturbation method workable. By using the perturbation method and exploring the difference between E-eigenvalues and eigenpair equivalence classes, we present a simple formula for the coefficient of the leading term of the E-characteristic polynomial, when the dimension is 2

    Digital Image Watermarking Algorithm Using the Intermediate Frequency

    Get PDF
    Digital image watermarking is one of the proposed solutions for copyright protection of multimedia data. This technique is better than Digital Signatures and other methods because it does not increase overhead. Watermarking adds the additional requirement of robustness. To improve the robustness of digital image watermarking method based on the image frequency, this paper adopts the intermediate frequency to embed the watermarking and proposes an digital image watermarking algorithm based on robust principal component analysis (RPCA) and discrete cosine transform (DCT). Firstly, the high frequency part and the low frequency part of the image are extracted by the RPCA algorithm. Because the high frequency part has complex statistical characteristics, this paper processes the high frequency part with "8×8" DCT method to obtain intermediate frequency coefficients and then the watermarking information is embedded into the obtained intermediate frequency coefficients. The experimental results show that the proposed algorithm leads to satisfactory robustness to the attacks of impulse noise and cropping
    corecore