29,690 research outputs found
Drag Reduction by Bubble Oscillations
Drag reduction in stationary turbulent flows by bubbles is sensitive to the
dynamics of bubble oscillations. Without this dynamical effect the bubbles only
renormalize the fluid density and viscosity, an effect that by itself can only
lead to a small percentage of drag reduction. We show in this paper that the
dynamics of bubbles and their effect on the compressibility of the mixture can
lead to a much higher drag reduction.Comment: 7 pages, 1 figure, submitted to Phys. Rev.
Spectrophotovoltaic orbital power generation
A system with 1000 : 1 concentration ratio is defined, using a cassegrain telescope as the first stage concentration (270 x) and compound parabolic concentrators (CPC) for the second stage concentration of 4.7 x for each spectral band. Using reported state of the art (S.O.A.) solar cells device parameters and considering structural losses due to optics and beamsplitters, the efficiencies of one to four cell systems were calculated with efficiencies varying from approximately 22% to 30%. Taking into account cost of the optics, beamsplitter, radiator, and the cost of developing new cells the most cost effective system is the GaAs/Si system
Ruptures and repairs of group therapy alliance. an untold story in psychotherapy research
Although previous studies investigated the characteristics of therapeutic alliance in group treatments, there is still a dearth of research on group alliance ruptures and repairs. The model by Safran and Muran was originally developed to address therapeutic alliance in individual therapies, and the usefulness of this approach to group intervention needs to be demonstrated. Alliance ruptures are possible at member to therapist, member to member, member to group levels. Moreover, repairs of ruptures in group are quite complex, i.e., because other group members have to process the rupture even if not directly involved. The aim of the current study is to review the empirical research on group alliance, and to examine whether the rupture repair model can be a suitable framework for clinical understanding and research of the complexity of therapeutic alliance in group treatments. We provide clinical vignettes and commentary to illustrate theoretical and research aspects of therapeutic alliance rupture and repair in groups. Our colleague Jeremy Safran made a substantial contribution to research on therapeutic alliance, and the current paper illustrates the enduring legacy of this work and its potential application to the group therapy context
Secure two-party quantum evaluation of unitaries against specious adversaries
We describe how any two-party quantum computation, specified by a unitary
which simultaneously acts on the registers of both parties, can be privately
implemented against a quantum version of classical semi-honest adversaries that
we call specious. Our construction requires two ideal functionalities to
garantee privacy: a private SWAP between registers held by the two parties and
a classical private AND-box equivalent to oblivious transfer. If the unitary to
be evaluated is in the Clifford group then only one call to SWAP is required
for privacy. On the other hand, any unitary not in the Clifford requires one
call to an AND-box per R-gate in the circuit. Since SWAP is itself in the
Clifford group, this functionality is universal for the private evaluation of
any unitary in that group. SWAP can be built from a classical bit commitment
scheme or an AND-box but an AND-box cannot be constructed from SWAP. It follows
that unitaries in the Clifford group are to some extent the easy ones. We also
show that SWAP cannot be implemented privately in the bare model
Morphological variation of the newly confirmed population of the javelin sand boa, Eryx jaculus (Linnaeus, 1758) (Serpentes, erycidae) in Sicily, Italy
The presence of the Javelin sand boa in Sicily has recently been confirmed. Here the morphological characters and sexual dimorphism of the Sicilian population of Eryx jaculus are presented. Seven meristic and six metric characters in 96 specimens from Sicily were examined. The results show that tail length, snout-vent length, the distance between nostrils and the number of ventral and subcaudal scales are different between sexes. The characters found in the Sicilian population of the Javelin sand boa resemble those of the African population (ssp. jaculus) rather than the Eurasian population (ssp. turcicus), but biomolecular studies are necessary to understand its taxonomic identity
Invariant Manifolds, the Spatial Three-Body Problem and Space Mission Design
The invariant manifold structures of the collinear libration points for the
spatial restricted three-body problem provide the framework for understanding
complex dynamical phenomena from a geometric point of view.
In particular, the stable and unstable invariant manifold \tubes" associated
to libration point orbits are the phase space structures that provide a
conduit for orbits between primary bodies for separate three-body systems.
These invariant manifold tubes can be used to construct new spacecraft
trajectories, such as a \Petit Grand Tour" of the moons of Jupiter. Previous
work focused on the planar circular restricted three-body problem.
The current work extends the results to the spatial case
Upper bounds for the secure key rate of decoy state quantum key distribution
The use of decoy states in quantum key distribution (QKD) has provided a
method for substantially increasing the secret key rate and distance that can
be covered by QKD protocols with practical signals. The security analysis of
these schemes, however, leaves open the possibility that the development of
better proof techniques, or better classical post-processing methods, might
further improve their performance in realistic scenarios. In this paper, we
derive upper bounds on the secure key rate for decoy state QKD. These bounds
are based basically only on the classical correlations established by the
legitimate users during the quantum communication phase of the protocol. The
only assumption about the possible post-processing methods is that double click
events are randomly assigned to single click events. Further we consider only
secure key rates based on the uncalibrated device scenario which assigns
imperfections such as detection inefficiency to the eavesdropper. Our analysis
relies on two preconditions for secure two-way and one-way QKD: The legitimate
users need to prove that there exists no separable state (in the case of
two-way QKD), or that there exists no quantum state having a symmetric
extension (one-way QKD), that is compatible with the available measurements
results. Both criteria have been previously applied to evaluate single-photon
implementations of QKD. Here we use them to investigate a realistic source of
weak coherent pulses. The resulting upper bounds can be formulated as a convex
optimization problem known as a semidefinite program which can be efficiently
solved. For the standard four-state QKD protocol, they are quite close to known
lower bounds, thus showing that there are clear limits to the further
improvement of classical post-processing techniques in decoy state QKD.Comment: 10 pages, 3 figure
- …