6,918 research outputs found

    Detection of moisture and moisture related phenomena from Skylab

    Get PDF
    There are no author-identified significant results in this report

    How does Casimir energy fall? IV. Gravitational interaction of regularized quantum vacuum energy

    Get PDF
    Several years ago we demonstrated that the Casimir energy for perfectly reflecting and imperfectly reflecting parallel plates gravitated normally, that is, obeyed the equivalence principle. At that time the divergences in the theory were treated only formally, without proper regularization, and the coupling to gravity was limited to the canonical energy-momentum-stress tensor. Here we strengthen the result by removing both of those limitations. We consider, as a toy model, massless scalar fields interacting with semitransparent (δ\delta-function) potentials defining parallel plates, which become Dirichlet plates for strong coupling. We insert space and time point-split regulation parameters, and obtain well-defined contributions to the self- energy of each plate, and the interaction energy between the plates. (This self-energy does not vanish even in the conformally-coupled, strong-coupled limit.) We also compute the local energy density, which requires regularization near the plates. In general, the energy density includes a surface energy that resides precisely on the boundaries. This energy is also regulated. The gravitational interaction of this well-defined system is then investigated, and it is verified that the equivalence principle is satisfied.Comment: 14 pages, 4 figure

    Survey and Analysis of Production Distributed Computing Infrastructures

    Full text link
    This report has two objectives. First, we describe a set of the production distributed infrastructures currently available, so that the reader has a basic understanding of them. This includes explaining why each infrastructure was created and made available and how it has succeeded and failed. The set is not complete, but we believe it is representative. Second, we describe the infrastructures in terms of their use, which is a combination of how they were designed to be used and how users have found ways to use them. Applications are often designed and created with specific infrastructures in mind, with both an appreciation of the existing capabilities provided by those infrastructures and an anticipation of their future capabilities. Here, the infrastructures we discuss were often designed and created with specific applications in mind, or at least specific types of applications. The reader should understand how the interplay between the infrastructure providers and the users leads to such usages, which we call usage modalities. These usage modalities are really abstractions that exist between the infrastructures and the applications; they influence the infrastructures by representing the applications, and they influence the ap- plications by representing the infrastructures

    Probabilistic Super Dense Coding

    Full text link
    We explore the possibility of performing super dense coding with non-maximally entangled states as a resource. Using this we find that one can send two classical bits in a probabilistic manner by sending a qubit. We generalize our scheme to higher dimensions and show that one can communicate 2log_2 d classical bits by sending a d-dimensional quantum state with a certain probability of success. The success probability in super dense coding is related to the success probability of distinguishing non-orthogonal states. The optimal average success probabilities are explicitly calculated. We consider the possibility of sending 2 log_2 d classical bits with a shared resource of a higher dimensional entangled state (D X D, D > d). It is found that more entanglement does not necessarily lead to higher success probability. This also answers the question as to why we need log_2 d ebits to send 2 log_2 d classical bits in a deterministic fashion.Comment: Latex file, no figures, 11 pages, Discussion changed in Section

    Real-Time Data Processing in the Muon System of the D0 Detector

    Get PDF
    This paper presents a real-time application of the 16-bit fixed point Digital Signal Processors (DSPs), in the Muon System of the D0 detector located at the Fermilab Tevatron, presently the world's highest-energy hadron collider. As part of the Upgrade for a run beginning in the year 2000, the system is required to process data at an input event rate of 10 KHz without incurring significant deadtime in readout. The ADSP21csp01 processor has high I/O bandwidth, single cycle instruction execution and fast task switching support to provide efficient multisignal processing. The processor's internal memory consists of 4K words of Program Memory and 4K words of Data Memory. In addition there is an external memory of 32K words for general event buffering and 16K words of Dual Port Memory for input data queuing. This DSP fulfills the requirement of the Muon subdetector systems for data readout. All error handling, buffering, formatting and transferring of the data to the various trigger levels of the data acquisition system is done in software. The algorithms developed for the system complete these tasks in about 20 microseconds per event.Comment: 4 pages, Presented and published at the 11th IEEE NPSS Real Time Conference, held at Santa Fe, New Mexico, USA, from June 14-18, 199

    Reducible Correlations in Dicke States

    Full text link
    We apply a simple observation to show that the generalized Dicke states can be determined from their reduced subsystems. In this framework, it is sufficient to calculate the expression for only the diagonal elements of the reudced density matrices in terms of the state coefficients. We prove that the correlation in generalized Dicke states ∣GDN(ℓ)>|GD_N^{(\ell)}> can be reduced to 2ℓ2\ell-partite level. Application to the Quantum Marginal Problem is also discussed.Comment: 12 pages, single column; accepted in J. Phys. A as FT

    Non-linear electrical conduction and broadband noise in charge-ordered rare earth manganate Nd_0.5Ca_0.5MnO_3

    Full text link
    Measurements of the dc transport properties and the low-frequency conductivity noise in films of charge ordered Nd_0.5Ca_0.5MnO_3 grown on Si subtrate reveal the existence of a threshold field in the charge ordered regime beyond which strong non linear conduction sets in along with a large broad band conductivity noise. Threshold-dependent conduction disappears as T -> T_{CO}, the charge ordering temperature. This observation suggests that the charge ordered state gets depinned at the onset of the non-linear conduction.Comment: 3 pages of two-column text and 4 eps figure

    Enforcing Multi-user Security Policies in Cloud Computing

    Get PDF
    The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential data can be secured from the unauthorized access and internal threats. Cloud servers use smart techniques for achieving this requirement like encryption and decryption of data. The database is stored in the encrypted format on the server & a complex query can be fired on it. Cloud server will maintain the access control policies to reveal the data from the database that are in the encrypted format. In the access control policies, we use KMA (Key Management Authority) which provides the keyset for encryption & decryption of the database. The attributes entered by the user will create one public key which is cipher text based. So this technique is called as cipher text based technique. This key is used for encryption. While registering, user will choose the policy and select the attributes on which security policy is based. Because of this it is called as cipher text policy attribute based encryption (CP-ABE). To achieve this complex encryption, we can use many algorithms like AES or DES encryption algorithms with CPABE algorithm. This scheme allows making SQL-like queries on encrypted database in multiuser environment while at the same time, the database owner assign different access rights to users that defines a specific policy for the database. The major use of this encryption is privacy, access control and data confidentiality and multi-user access control.DOI:http://dx.doi.org/10.11591/ijece.v3i4.306
    • …
    corecore