8,122 research outputs found

    A thin rivulet or ridge subject to a uniform transverse shear stress at its free surface due to an external airflow

    Get PDF
    We use the lubrication approximation to analyse three closely related problems involving a thin rivulet or ridge (i.e. a two-dimensional droplet) of fluid subject to a prescribed uniform transverse shear stress at its free surface due to an external airflow, namely a rivulet draining under gravity down a vertical substrate, a rivulet driven by a longitudinal shear stress at its free surface, and a ridge on a horizontal substrate, and find qualitatively similar behaviour for all three problems. We show that, in agreement with previous numerical studies, the free surface profile of an equilibrium rivulet/ridge with pinned contact lines is skewed as the shear stress is increased from zero, and that there is a maximum value of the shear stress beyond which no solution with prescribed semi-width is possible. In practice, one or both of the contact lines will de-pin before this maximum value of the shear stress is reached, and so we consider situations in which the rivulet/ridge de-pins at one or both contact lines. In the case of de-pinning only at the advancing contact line, the rivulet/ridge is flattened and widened as the shear stress is increased from its critical value, and there is a second maximum value of the shear stress beyond which no solution with a prescribed advancing contact angle is possible. In contrast, in the case of de-pinning only at the receding contact line, the rivulet/ridge is thickened and narrowed as the shear stress is increased from its critical value, and there is a solution with a prescribed receding contact angle for all values of the shear stress. In general, in the case of de-pinning at both contact lines there is a critical “yield” value of the shear stress beyond which no equilibrium solution is possible and the rivulet/ridge will evolve unsteadily. In an Appendix we show that an equilibrium rivulet/ridge with prescribed flux/area is quasi-statically stable to two-dimensional perturbations

    A thin rivulet or ridge subject to a uniform transverse\ud shear stress at its free surface due to an external airflow

    Get PDF
    We use the lubrication approximation to analyse three closely related problems involving a thin rivulet or ridge (i.e. a two-dimensional droplet) of fluid subject to a prescribed uniform transverse shear stress at its free surface due to an external airflow, namely a rivulet draining under gravity down a vertical substrate, a rivulet driven by a longitudinal shear stress at its free surface, and a ridge on a horizontal substrate, and find qualitatively similar behaviour for all three problems. We show that, in agreement with previous numerical studies, the free surface profile of an equilibrium rivulet/ridge with pinned contact lines is skewed as the shear stress is increased from zero, and that there is a maximum value of the shear stress beyond which no solution with prescribed semi-width is possible. In practice, one or both of the contact lines will de-pin before this maximum value of the shear stress is reached, and so we consider situations in which the rivulet/ridge de-pins at one or both contact lines. In the case of de-pinning only at the advancing contact line, the rivulet/ridge is flattened and widened as the shear stress is increased from its critical value, and there is a second maximum value of the shear stress beyond which no solution with a prescribed advancing contact angle is possible. In contrast, in the case of de-pinning only at the receding contact line, the rivulet/ridge is thickened and narrowed as the shear stress is increased from its critical value, and there is a solution with a prescribed receding contact angle for all values of the shear stress. In general, in the case of de-pinning at both contact lines there is a critical “yield” value of the shear stress beyond which no equilibrium solution is possible and the rivulet/ridge will evolve unsteadily. In an Appendix we show that an equilibrium rivulet/ridge with prescribed flux/area is quasi-statically stable to two-dimensional perturbations

    A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage

    Get PDF
    There has been considerable recent interest in “cloud storage” wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover or retrieve the file given any “proving algorithm” that has a sufficiently high success probability. This paper treats proof-of-retrievability schemes in the model of unconditional security, where an adversary has unlimited computational power. In this case retrievability of the file can be modelled as error-correction in a certain code. We provide a general analytical framework for such schemes that yields exact (non-asymptotic) reductions that precisely quantify conditions for extraction to succeed as a function of the success probability of a proving algorithm, and we apply this analysis to several archetypal schemes. In addition, we provide a new methodology for the analysis of keyed POR schemes in an unconditionally secure setting, and use it to prove the security of a modified version of a scheme due to Shacham and Waters [Lecture Notes in Comput. Sci. 5350, Springer (2008), 90–107] under a slightly restricted attack model, thus providing the first example of a keyed POR scheme with unconditional security. We also show how classical statistical techniques can be used to evaluate whether the responses of the prover are accurate enough to permit successful extraction. Finally, we prove a new lower bound on storage and communication complexity of POR schemes. This paper treats proof-of-retrievability schemes in the model of unconditional security, where an adversary has unlimited computational power. In this case retrievability of the file can be modelled as error-correction in a certain code. We provide a general analytical framework for such schemes that yields exact (non-asymptotic) reductions that precisely quantify conditions for extraction to succeed as a function of the success probability of a proving algorithm, and we apply this analysis to several archetypal schemes. In addition, we provide a new methodology for the analysis of keyed POR schemes in an unconditionally secure setting, and use it to prove the security of a modified version of a scheme due to Shacham and Waters under a slightly restricted attack model, thus providing the first example of a keyed POR scheme with unconditional security. We also show how classical statistical techniques can be used to evaluate whether the responses of the prover are accurate enough to permit successful extraction. Finally, we prove a new lower bound on storage and communication complexity of POR schemes

    Tunable fibre-coupled multiphoton microscopy with a negative curvature fibre

    Get PDF
    Negative curvature fibre (NCF) guides light in its core by inhibiting the coupling of core and cladding modes. In this work, an NCF was designed and fabricated to transmit ultrashort optical pulses for multiphoton microscopy with low group velocity dispersion (GVD) at 800 nm. Its attenuation was measured to be <0.3 dB m(-1) over the range 600-850 nm and the GVD was -180 ± 70 fs(2)  m(-1) at 800 nm. Using an average fibre output power of ∼20 mW and pulse repetition rate of 80 MHz, the NCF enabled pulses with a duration of <200 fs to be transmitted through a length of 1.5 m of fibre over a tuning range of 180 nm without the need for dispersion compensation. In a 4 m fibre, temporal and spectral pulse widths were maintained to within 10% of low power values up to the maximum fibre output power achievable with the laser system used of 278 mW at 700 nm, 808 mW at 800 nm and 420 mW at 860 nm. When coupled to a multiphoton microscope, it enabled imaging of ex vivo tissue using excitation wavelengths from 740 nm to 860 nm without any need for adjustments to the set-up

    Suprathermal plasma observed on STS-3 Mission by plasma diagnostics package

    Get PDF
    Artificially produced electron beams were used extensively during the past decade as a means of probing the magnetosphere, and more recently as a means of actively controlling spacecraft potential. Experimentation in these areas has proven valuable, yet at times confusing, due to the interaction of the electron beam with the ambient plasma. The OSS-1/STS-3 Mission in March 1982 provided a unique opportunity to study beam-plasma interactions at an altitude of 240 km. On board for this mission was a Fast Pulse Electron Generator (FPEG). Measurements made by the Plasma Diagnostics Package (PDP) while extended on the Orbiter RMS show modifications of the ion and electron energy distributions during electron beam injection. Observations made by charged particle detectors are discussed and related to measurements of Orbiter potential. Several of the PDP instruments, the joint PDP/FPEG experiment, and observations made during electron beam injection are described

    Outbreak of encephalitic listeriosis in red-legged partridges (Alectoris rufa)

    Get PDF
    An outbreak of neurological disease was investigated in red-legged partridges between 8 and 28 days of age. Clinical signs included torticollis, head tilt and incoordination and over an initial eight day period approximately 30–40 fatalities occurred per day. No significant gross post mortem findings were detected. Histopathological examination of the brain and bacterial cultures followed by partial sequencing confirmed a diagnosis of encephalitis due to Listeria monocytogenes. Further isolates were obtained from follow-up carcasses, environmental samples and pooled tissue samples of newly imported day-old chicks prior to placement on farm. These isolates had the same antibiotic resistance pattern as the isolate of the initial post mortem submission and belonged to the same fluorescent amplified fragment length polymorphism (fAFLP) subtype. This suggested that the isolates were very closely related or identical and that the pathogen had entered the farm with the imported day-old chicks, resulting in disease manifestation in partridges between 8 and 28 days of age. Reports of outbreaks of encephalitic listeriosis in avian species are rare and this is to the best of our knowledge the first reported outbreak in red-legged partridges

    Non-Hausdorff Symmetries of C*-algebras

    Get PDF
    Symmetry groups or groupoids of C*-algebras associated to non-Hausdorff spaces are often non-Hausdorff as well. We describe such symmetries using crossed modules of groupoids. We define actions of crossed modules on C*-algebras and crossed products for such actions, and justify these definitions with some basic general results and examples.Comment: very minor changes. To appear in Math. An

    Lucky Microseconds:A Timing Attack on Amazon’s s2n Implementation of TLS

    Get PDF
    s2n is an implementation of the TLS protocol that was released in late June 2015 by Amazon. It is implemented in around 6,000 lines of C99 code. By comparison, OpenSSL needs around 70,000 lines of code to implement the protocol. At the time of its release, Amazon announced that s2n had undergone three external security evaluations and penetration tests. We show that, despite this, s2n - as initially released - was vulnerable to a timing attack in the case of CBC-mode ciphersuites, which could be extended to complete plaintext recovery in some settings. Our attack has two components. The first part is a novel variant of the Lucky 13 attack that works even though protections against Lucky 13 were implemented in s2n. The second part deals with the randomised delays that were put in place in s2n as an additional countermeasure to Lucky 13. Our work highlights the challenges of protecting implementations against sophisticated timing attacks. It also illustrates that standard code audits are insufficient to uncover all cryptographic attack vectors

    Linear response functions for a vibrational configuration interaction state

    Get PDF
    Linear response functions are implemented for a vibrational configuration interaction state allowing accurate analytical calculations of pure vibrational contributions to dynamical polarizabilities. Sample calculations are presented for the pure vibrational contributions to the polarizabilities of water and formaldehyde. We discuss the convergence of the results with respect to various details of the vibrational wave function description as well as the potential and property surfaces. We also analyze the frequency dependence of the linear response function and the effect of accounting phenomenologically for the finite lifetime of the excited vibrational states. Finally, we compare the analytical response approach to a sum-over-states approac
    corecore