6,238 research outputs found
Heterogeneity in structurally arrested hard spheres
When cooled or compressed sufficiently rapidly, a liquid vitrifies into a glassy amorphous state. Vitrification in a dense liquid is associated with jamming of the particles. For hard spheres, the density and degree of order in the final structure depend on the compression rate: simple intuition suggests, and previous computer simulation demonstrates, that slower compression results in states that are both denser and more ordered. In this work, we use the Lubachevsky-Stillinger algorithm to generate a sequence of structurally arrested hard-sphere states by varying the compression rate. We find that while the degree of order, as measured by both bond-orientation and translation order parameters, increases monotonically with decreasing compression rate, the density of the arrested state first increases, then decreases, then increases again, as the compression rate decreases, showing a minimum at an intermediate compression rate. Examination of the distribution of the local order parameters and the distribution of the root-mean-square fluctuation of the particle positions, as well as direct visual inspection of the arrested structures, reveal that they are structurally heterogeneous, consisting of disordered, amorphous regions and locally ordered crystal-like domains. In particular, the low-density arrested states correspond with many interconnected small crystal clusters that form a polycrystalline network interspersed in an amorphous background, suggesting that jamming by the domains may be an important mechanism for these states
Charmless Decays in Factorization-Assisted Topological-Amplitude Approach
Within the factorization-assisted topological-amplitude approach, we studied
the 33 charmless decays, where stands for a light vector
meson. According to the flavor flows, the amplitude of each process can be
decomposed into 8 different topologies. In contrast to the conventional flavor
diagrammatic approach, we further factorize each topological amplitude into
decay constant, form factors and unknown universal parameters. By
fitting 46 experimental observables, we extracted 10 theoretical parameters
with per degree of freedom around 2. Using the fitted parameters, we
calculated the branching fractions, polarization fractions, CP asymmetries and
relative phases between polarization amplitudes of each decay mode. The decay
channels dominated by tree diagram have large branching fractions and large
longitudinal polarization fraction. The branching fractions and longitudinal
polarization fractions of color-suppressed decays become smaller. Current
experimental data of large transverse polarization fractions in the penguin
dominant decay channels can be explained by only one transverse amplitude of
penguin annihilation diagram. Our predictions of those not yet measured
channels can be tested in the ongoing LHCb experiment and the Belle-II
experiment in future.Comment: 22 pages, 2 figure
Real-time Data Flow Control for CBM-TOF Super Module Quality Evaluation
Super module assembled with MRPC detectors is the component unit of TOF (Time
of Flight) system for the Compressed Baryonic Matter (CBM) experiment. Quality
of super modules needs to be evaluated before it is applied in CBM-TOF. Time
signals exported from super module are digitalized at TDC (Time to Digital
Converter) station. Data rate is up to 6 Gbps at each TDC station, which brings
a tremendous pressure for data transmission in real time. In this paper, a
real-time data flow control method is designed. In this control method, data
flow is divided into 3 types: scientific data flow, status data flow and
control data flow. In scientific data flow, data of each TDC station is divided
into 4 sub-flows, and then is read out by a parallel and hierarchical network,
which consists of multiple readout mother boards and daughter boards groups. In
status data flow, status data is aggregated into a specific readout mother
board. Then it is uploaded to DAQ via readout daughter board. In control data
flow, control data is downloaded to all circuit modules in the opposite
direction of status data flow. Preliminary test result indicated data of STS
was correctly transmitted to DAQ with no error and three type data flows were
control orderly in real time. This data flow control method can meet the
quality evaluation requirement of supper module in CBM-TOF
E-Characteristic Polynomials of Tensors
In this paper, we show that the coefficients of the E-characteristic
polynomial of a tensor are orthonormal invariants of that tensor. When the
dimension is 2, some simplified formulas of the E-characteristic polynomial are
presented. A re- sultant formula for the constant term of the E-characteristic
polynomial is given. We then study the set of tensors with infinitely many
eigenpairs and the set of irregular tensors, and prove both the sets have
codimension 2 as subvarieties in the projective space of tensors. This makes
our perturbation method workable. By using the perturbation method and
exploring the difference between E-eigenvalues and eigenpair equivalence
classes, we present a simple formula for the coefficient of the leading term of
the E-characteristic polynomial, when the dimension is 2
Digital Image Watermarking Algorithm Using the Intermediate Frequency
Digital image watermarking is one of the proposed solutions for copyright protection of multimedia data. This technique is better than Digital Signatures and other methods because it does not increase overhead. Watermarking adds the additional requirement of robustness. To improve the robustness of digital image watermarking method based on the image frequency, this paper adopts the intermediate frequency to embed the watermarking and proposes an digital image watermarking algorithm based on robust principal component analysis (RPCA) and discrete cosine transform (DCT). Firstly, the high frequency part and the low frequency part of the image are extracted by the RPCA algorithm. Because the high frequency part has complex statistical characteristics, this paper processes the high frequency part with "8×8" DCT method to obtain intermediate frequency coefficients and then the watermarking information is embedded into the obtained intermediate frequency coefficients. The experimental results show that the proposed algorithm leads to satisfactory robustness to the attacks of impulse noise and cropping
- …