29,690 research outputs found

    Drag Reduction by Bubble Oscillations

    Full text link
    Drag reduction in stationary turbulent flows by bubbles is sensitive to the dynamics of bubble oscillations. Without this dynamical effect the bubbles only renormalize the fluid density and viscosity, an effect that by itself can only lead to a small percentage of drag reduction. We show in this paper that the dynamics of bubbles and their effect on the compressibility of the mixture can lead to a much higher drag reduction.Comment: 7 pages, 1 figure, submitted to Phys. Rev.

    Spectrophotovoltaic orbital power generation

    Get PDF
    A system with 1000 : 1 concentration ratio is defined, using a cassegrain telescope as the first stage concentration (270 x) and compound parabolic concentrators (CPC) for the second stage concentration of 4.7 x for each spectral band. Using reported state of the art (S.O.A.) solar cells device parameters and considering structural losses due to optics and beamsplitters, the efficiencies of one to four cell systems were calculated with efficiencies varying from approximately 22% to 30%. Taking into account cost of the optics, beamsplitter, radiator, and the cost of developing new cells the most cost effective system is the GaAs/Si system

    Ruptures and repairs of group therapy alliance. an untold story in psychotherapy research

    Get PDF
    Although previous studies investigated the characteristics of therapeutic alliance in group treatments, there is still a dearth of research on group alliance ruptures and repairs. The model by Safran and Muran was originally developed to address therapeutic alliance in individual therapies, and the usefulness of this approach to group intervention needs to be demonstrated. Alliance ruptures are possible at member to therapist, member to member, member to group levels. Moreover, repairs of ruptures in group are quite complex, i.e., because other group members have to process the rupture even if not directly involved. The aim of the current study is to review the empirical research on group alliance, and to examine whether the rupture repair model can be a suitable framework for clinical understanding and research of the complexity of therapeutic alliance in group treatments. We provide clinical vignettes and commentary to illustrate theoretical and research aspects of therapeutic alliance rupture and repair in groups. Our colleague Jeremy Safran made a substantial contribution to research on therapeutic alliance, and the current paper illustrates the enduring legacy of this work and its potential application to the group therapy context

    Secure two-party quantum evaluation of unitaries against specious adversaries

    Full text link
    We describe how any two-party quantum computation, specified by a unitary which simultaneously acts on the registers of both parties, can be privately implemented against a quantum version of classical semi-honest adversaries that we call specious. Our construction requires two ideal functionalities to garantee privacy: a private SWAP between registers held by the two parties and a classical private AND-box equivalent to oblivious transfer. If the unitary to be evaluated is in the Clifford group then only one call to SWAP is required for privacy. On the other hand, any unitary not in the Clifford requires one call to an AND-box per R-gate in the circuit. Since SWAP is itself in the Clifford group, this functionality is universal for the private evaluation of any unitary in that group. SWAP can be built from a classical bit commitment scheme or an AND-box but an AND-box cannot be constructed from SWAP. It follows that unitaries in the Clifford group are to some extent the easy ones. We also show that SWAP cannot be implemented privately in the bare model

    Morphological variation of the newly confirmed population of the javelin sand boa, Eryx jaculus (Linnaeus, 1758) (Serpentes, erycidae) in Sicily, Italy

    Get PDF
    The presence of the Javelin sand boa in Sicily has recently been confirmed. Here the morphological characters and sexual dimorphism of the Sicilian population of Eryx jaculus are presented. Seven meristic and six metric characters in 96 specimens from Sicily were examined. The results show that tail length, snout-vent length, the distance between nostrils and the number of ventral and subcaudal scales are different between sexes. The characters found in the Sicilian population of the Javelin sand boa resemble those of the African population (ssp. jaculus) rather than the Eurasian population (ssp. turcicus), but biomolecular studies are necessary to understand its taxonomic identity

    Invariant Manifolds, the Spatial Three-Body Problem and Space Mission Design

    Get PDF
    The invariant manifold structures of the collinear libration points for the spatial restricted three-body problem provide the framework for understanding complex dynamical phenomena from a geometric point of view. In particular, the stable and unstable invariant manifold \tubes" associated to libration point orbits are the phase space structures that provide a conduit for orbits between primary bodies for separate three-body systems. These invariant manifold tubes can be used to construct new spacecraft trajectories, such as a \Petit Grand Tour" of the moons of Jupiter. Previous work focused on the planar circular restricted three-body problem. The current work extends the results to the spatial case

    Upper bounds for the secure key rate of decoy state quantum key distribution

    Full text link
    The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques, or better classical post-processing methods, might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible post-processing methods is that double click events are randomly assigned to single click events. Further we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD: The legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical post-processing techniques in decoy state QKD.Comment: 10 pages, 3 figure
    corecore