21 research outputs found

    Stochastic Model for the Motion of a Particle on an Inclined Rough Plane and the Onset of Viscous Friction

    Full text link
    Experiments on the motion of a particle on an inclined rough plane have yielded some surprising results. For example, it was found that the frictional force acting on the ball is viscous, {\it i.e.} proportional to the velocity rather than the expected square of the velocity. It was also found that, for a given inclination of the plane, the velocity of the ball scales as a power of its radius. We present here a one dimensional stochastic model based on the microscopic equations of motion of the ball, which exhibits the same behaviour as the experiments. This model yields a mechanism for the origins of the viscous friction force and the scaling of the velocity with the radius. It also reproduces other aspects of the phase diagram of the motion which we will discuss.Comment: 19 pages, latex, 11 postscript figures in separate uuencoded fil

    Instability of dilute granular flow on rough slope

    Full text link
    We study numerically the stability of granular flow on a rough slope in collisional flow regime in the two-dimension. We examine the density dependence of the flowing behavior in low density region, and demonstrate that the particle collisions stabilize the flow above a certain density in the parameter region where a single particle shows an accelerated behavior. Within this parameter regime, however, the uniform flow is only metastable and is shown to be unstable against clustering when the particle density is not high enough.Comment: 4 pages, 6 figures, submitted to J. Phys. Soc. Jpn.; Fig. 2 replaced; references added; comments added; misprints correcte

    ICT Trust, Security and Dependability Research Strategy beyond 2010.

    Get PDF
    This paper, entitled ICT Trust, Security & Dependability Research strategy beyond 2010, will describe the final outputs of the IST SecurIST [1] project, whose objective was to create a clear European level strategy to drive ICT Security and Dependability research beyond 2010. The focus in the paper is on short to medium (up to 3 years) to long-term objectives (~3-10 years). This paper will develop the context of the project, the approach taken, research strategy, setting its objectives and results with reference of various inputs and outputs from a large constituency involved in ICT Trust, Security and Dependability areas that was ultimately co-ordinated by the SecurIST project

    Using quantum key distribution for cryptographic purposes: a survey

    Full text link
    The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8

    Energy Dissipation and Trapping of Particles Moving on a Rough Surface

    Full text link
    We report an experimental, numerical and theoretical study of the motion of a ball on a rough inclined surface. The control parameters are DD, the diameter of the ball, θ\theta, the inclination angle of the rough surface and EkiE_{ki}, the initial kinetic energy. When the angle of inclination is larger than some critical value, θ>θT\theta>\theta_{T}, the ball moves at a constant average velocity which is independent of the initial conditions. For an angle θ<θT\theta < \theta_{T}, the balls are trapped after moving a certain distance. The dependence of the travelled distances on EkiE_{ki}, DD and θ\theta. is analysed. The existence of two kinds of mechanisms of dissipation is thus brought to light. We find that for high initial velocities the friction force is constant. As the velocity decreases below a certain threshold the friction becomes viscous.Comment: 8 pages RevTeX, 12 Postscript figure

    Building a long term strategy for international collaboration in trustworthy ICT:Security, privacy and trust in global networks and services

    No full text
    This paper contains a summary of a significant amount of findings carried out collectively by a global research community specifically aimed at determining mutually beneficial and hot topics for international collaboration on the research and development of Trustworthy ICT. The paper highlights a sampling of these topics that were deemed to produce the most impact and it provides an introduction to the final recommendations of the INCO-Trust project, which was the main catalyst behind this initiative. The paper doesn't cover the extensive platforms, mechanisms, and systematic consensus building process in working groups based on workshops organised by the project to achieve its goals but instead focuses on the outcomes of the project. The key recommendations of the project will be used as a starting point for the recently start BIC project, whose objective is to include a number of new countries (Brazil, India and South Africa) into this already formed global community of ICT Trust and security researchers. © 2011 IEEE

    Report D-NET-01: Business Models for Quantic Network

    No full text
    corecore