236 research outputs found

    Quark confinement and color transparency in a gauge-invariant formulation of QCD

    Get PDF
    We examine a nonlocal interaction that results from expressing the QCD Hamiltonian entirely in terms of gauge-invariant quark and gluon fields. The interaction couples one quark color-charge density to another, much as electric charge densities are coupled to each other by the Coulomb interaction in QED. In QCD, this nonlocal interaction also couples quark color-charge densities to gluonic color. We show how the leading part of the interaction between quark color-charge densities vanishes when the participating quarks are in a color singlet configuration, and that, for singlet configurations, the residual interaction weakens as the size of a packet of quarks shrinks. Because of this effect, color-singlet packets of quarks should experience final state interactions that increase in strength as these packets expand in size. For the case of an SU(2) model of QCD based on the {\em ansatz} that the gauge-invariant gauge field is a hedgehog configuration, we show how the infinite series that represents the nonlocal interaction between quark color-charge densities can be evaluated nonperturbatively, without expanding it term-by-term. We discuss the implications of this model for QCD with SU(3) color and a gauge-invariant gauge field determined by QCD dynamics.Comment: Revtex, 23 pages; contains additional references with brief comments on sam

    Better Practical Algorithms for rSPR Distance and Hybridization Number

    Get PDF
    The problem of computing the rSPR distance of two phylogenetic trees (denoted by RDC) is NP-hard and so is the problem of computing the hybridization number of two phylogenetic trees (denoted by HNC). Since they are important problems in phylogenetics, they have been studied extensively in the literature. Indeed, quite a number of exact or approximation algorithms have been designed and implemented for them. In this paper, we design and implement one exact algorithm for HNC and several approximation algorithms for RDC and HNC. Our experimental results show that the resulting exact program is much faster (namely, more than 80 times faster for the easiest dataset used in the experiments) than the previous best and its superiority in speed becomes even more significant for more difficult instances. Moreover, the resulting approximation programs output much better results than the previous bests; indeed, the outputs are always nearly optimal and often optimal. Of particular interest is the usage of the Monte Carlo tree search (MCTS) method in the design of our approximation algorithms. Our experimental results show that with MCTS, we can often solve HNC exactly within short time

    Implementing Gauss's law in Yang-Mills theory and QCD

    Get PDF
    We construct a transformation that transforms perturbative states into states that implement Gauss's law for `pure gluonic' Yang-Mills theory and QCD. The fact that this transformation is not and cannot be unitary has special significance. Previous work has shown that only states that are unitarily equivalent to perturbative states necessarily give the same S-matrix elements as are obtained with Feynman rules.Comment: 11 page

    Randomized algorithms for fully online multiprocessor scheduling with testing

    Full text link
    We contribute the first randomized algorithm that is an integration of arbitrarily many deterministic algorithms for the fully online multiprocessor scheduling with testing problem. When there are two machines, we show that with two component algorithms its expected competitive ratio is already strictly smaller than the best proven deterministic competitive ratio lower bound. Such algorithmic results are rarely seen in the literature. Multiprocessor scheduling is one of the first combinatorial optimization problems that have received numerous studies. Recently, several research groups examined its testing variant, in which each job JjJ_j arrives with an upper bound uju_j on the processing time and a testing operation of length tjt_j; one can choose to execute JjJ_j for uju_j time, or to test JjJ_j for tjt_j time to obtain the exact processing time pjp_j followed by immediately executing the job for pjp_j time. Our target problem is the fully online version, in which the jobs arrive in sequence so that the testing decision needs to be made at the job arrival as well as the designated machine. We propose an expected (φ+3+1)(3.1490)(\sqrt{\varphi + 3} + 1) (\approx 3.1490)-competitive randomized algorithm as a non-uniform probability distribution over arbitrarily many deterministic algorithms, where φ=5+12\varphi = \frac {\sqrt{5} + 1}2 is the Golden ratio. When there are two machines, we show that our randomized algorithm based on two deterministic algorithms is already expected 3φ+3137φ4(2.1839)\frac {3 \varphi + 3 \sqrt{13 - 7\varphi}}4 (\approx 2.1839)-competitive. Besides, we use Yao's principle to prove lower bounds of 1.66821.6682 and 1.65221.6522 on the expected competitive ratio for any randomized algorithm at the presence of at least three machines and only two machines, respectively, and prove a lower bound of 2.21172.2117 on the competitive ratio for any deterministic algorithm when there are only two machines.Comment: 21 pages with 1 plot; an extended abstract to be submitte

    Integer Quantization of the Chern-Simons Coefficient in a Broken Phase

    Full text link
    We consider a spontaneously broken nonabelian topologically massive gauge theory in a broken phase possessing a residual nonabelian symmetry. Recently there has been some question concerning the renormalization of the Chern-Simons coefficient in such a broken phase. We show that, in this broken vacuum, the renormalized ratio of the Chern-Simons coupling to the gauge coupling is shifted by 1/4π1/4\pi times an integer, preserving the usual integer quantization condition on the bare parameters.Comment: 9 pages LaTeX, two figures available upon reques

    In GFP with high risk HPV-18E6 fusion protein expressed 293T and MCF-7 cells, the endogenous wild-type p53 could be transiently phosphorylated at multiple sites

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Infected cells recognize viral replication as a DNA damage stress and elicit the host surveillance mechanism to anti-virus infection. Modulation of the activity of tumor suppressor p53 is a key event in the replication of many viruses. They could manipulate p53 function through phosphorylation modification for their own purpose. But there is rarely research about p53 phosphorylation status in the context of HPV-E6. Therefore, we investigated whether p53 could be phosphorylated by HPV-E6.</p> <p>Methods</p> <p>We used a mammalian green fluorescence protein (GFP) expression system to express HPV-18E6 with GFP fusion proteins (GFP-18E6) in wild-type (wt) p53 cell lines, such as 293T and MCF-7 cells to trace the traffic and subcellular location of E6 protein. By immunofluorescence technique and immunoblotting, we determined the positive phosphorylated sites of p53 and observed the distribution of phosphorylated p53 in the context of GFP-18E6.</p> <p>Results</p> <p>GFP-18E6 was predominantly located in nuclei of wt p53 cell lines, and it could induce transient phosphorylation of p53 at multiple sites, such as Ser<sup>15</sup>, Ser<sup>20</sup>, and Ser<sup>392</sup>. All the three sites of phosphorylated p53s were localized in nuclei together with GFP-18E6.</p> <p>Conclusion</p> <p>In GFP with high risk HPV-18E6 fusion protein expressed 293T and MCF-7 cells, the endogenous wt p53 could be transiently phosphorylated at multiple sites.</p

    Secret Sharing Schemes with General Access Structures (Full version)

    Get PDF
    Secret sharing schemes with general monotone access structures have been widely discussed in the literature. But in some scenarios, non-monotone access structures may have more practical significance. In this paper, we shed a new light on secret sharing schemes realizing general (not necessarily monotone) access structures. Based on an attack model for secret sharing schemes with general access structures, we redefine perfect secret sharing schemes, which is a generalization of the known concept of perfect secret sharing schemes with monotone access structures. Then, we provide for the first time two constructions of perfect secret sharing schemes with general access structures. The first construction can be seen as a democratic scheme in the sense that the shares are generated by the players themselves. Our second construction significantly enhance the efficiency of the system, where the shares are distributed by the trusted center (TC)
    corecore