7,567 research outputs found
Detection of moisture and moisture related phenomena from Skylab
There are no author-identified significant results in this report
How does Casimir energy fall? IV. Gravitational interaction of regularized quantum vacuum energy
Several years ago we demonstrated that the Casimir energy for perfectly
reflecting and imperfectly reflecting parallel plates gravitated normally, that
is, obeyed the equivalence principle. At that time the divergences in the
theory were treated only formally, without proper regularization, and the
coupling to gravity was limited to the canonical energy-momentum-stress tensor.
Here we strengthen the result by removing both of those limitations. We
consider, as a toy model, massless scalar fields interacting with
semitransparent (-function) potentials defining parallel plates, which
become Dirichlet plates for strong coupling. We insert space and time
point-split regulation parameters, and obtain well-defined contributions to the
self- energy of each plate, and the interaction energy between the plates.
(This self-energy does not vanish even in the conformally-coupled,
strong-coupled limit.) We also compute the local energy density, which requires
regularization near the plates. In general, the energy density includes a
surface energy that resides precisely on the boundaries. This energy is also
regulated. The gravitational interaction of this well-defined system is then
investigated, and it is verified that the equivalence principle is satisfied.Comment: 14 pages, 4 figure
Survey and Analysis of Production Distributed Computing Infrastructures
This report has two objectives. First, we describe a set of the production
distributed infrastructures currently available, so that the reader has a basic
understanding of them. This includes explaining why each infrastructure was
created and made available and how it has succeeded and failed. The set is not
complete, but we believe it is representative.
Second, we describe the infrastructures in terms of their use, which is a
combination of how they were designed to be used and how users have found ways
to use them. Applications are often designed and created with specific
infrastructures in mind, with both an appreciation of the existing capabilities
provided by those infrastructures and an anticipation of their future
capabilities. Here, the infrastructures we discuss were often designed and
created with specific applications in mind, or at least specific types of
applications. The reader should understand how the interplay between the
infrastructure providers and the users leads to such usages, which we call
usage modalities. These usage modalities are really abstractions that exist
between the infrastructures and the applications; they influence the
infrastructures by representing the applications, and they influence the ap-
plications by representing the infrastructures
Probabilistic Super Dense Coding
We explore the possibility of performing super dense coding with
non-maximally entangled states as a resource. Using this we find that one can
send two classical bits in a probabilistic manner by sending a qubit. We
generalize our scheme to higher dimensions and show that one can communicate
2log_2 d classical bits by sending a d-dimensional quantum state with a certain
probability of success. The success probability in super dense coding is
related to the success probability of distinguishing non-orthogonal states. The
optimal average success probabilities are explicitly calculated. We consider
the possibility of sending 2 log_2 d classical bits with a shared resource of a
higher dimensional entangled state (D X D, D > d). It is found that more
entanglement does not necessarily lead to higher success probability. This also
answers the question as to why we need log_2 d ebits to send 2 log_2 d
classical bits in a deterministic fashion.Comment: Latex file, no figures, 11 pages, Discussion changed in Section
Real-Time Data Processing in the Muon System of the D0 Detector
This paper presents a real-time application of the 16-bit fixed point Digital
Signal Processors (DSPs), in the Muon System of the D0 detector located at the
Fermilab Tevatron, presently the world's highest-energy hadron collider. As
part of the Upgrade for a run beginning in the year 2000, the system is
required to process data at an input event rate of 10 KHz without incurring
significant deadtime in readout. The ADSP21csp01 processor has high I/O
bandwidth, single cycle instruction execution and fast task switching support
to provide efficient multisignal processing. The processor's internal memory
consists of 4K words of Program Memory and 4K words of Data Memory. In addition
there is an external memory of 32K words for general event buffering and 16K
words of Dual Port Memory for input data queuing. This DSP fulfills the
requirement of the Muon subdetector systems for data readout. All error
handling, buffering, formatting and transferring of the data to the various
trigger levels of the data acquisition system is done in software. The
algorithms developed for the system complete these tasks in about 20
microseconds per event.Comment: 4 pages, Presented and published at the 11th IEEE NPSS Real Time
Conference, held at Santa Fe, New Mexico, USA, from June 14-18, 199
Reducible Correlations in Dicke States
We apply a simple observation to show that the generalized Dicke states can
be determined from their reduced subsystems. In this framework, it is
sufficient to calculate the expression for only the diagonal elements of the
reudced density matrices in terms of the state coefficients. We prove that the
correlation in generalized Dicke states can be reduced to
-partite level. Application to the Quantum Marginal Problem is also
discussed.Comment: 12 pages, single column; accepted in J. Phys. A as FT
Non-linear electrical conduction and broadband noise in charge-ordered rare earth manganate Nd_0.5Ca_0.5MnO_3
Measurements of the dc transport properties and the low-frequency
conductivity noise in films of charge ordered Nd_0.5Ca_0.5MnO_3 grown on Si
subtrate reveal the existence of a threshold field in the charge ordered regime
beyond which strong non linear conduction sets in along with a large broad band
conductivity noise. Threshold-dependent conduction disappears as T -> T_{CO},
the charge ordering temperature. This observation suggests that the charge
ordered state gets depinned at the onset of the non-linear conduction.Comment: 3 pages of two-column text and 4 eps figure
Enforcing Multi-user Security Policies in Cloud Computing
The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential data can be secured from the unauthorized access and internal threats. Cloud servers use smart techniques for achieving this requirement like encryption and decryption of data. The database is stored in the encrypted format on the server & a complex query can be fired on it. Cloud server will maintain the access control policies to reveal the data from the database that are in the encrypted format. In the access control policies, we use KMA (Key Management Authority) which provides the keyset for encryption & decryption of the database. The attributes entered by the user will create one public key which is cipher text based. So this technique is called as cipher text based technique. This key is used for encryption. While registering, user will choose the policy and select the attributes on which security policy is based. Because of this it is called as cipher text policy attribute based encryption (CP-ABE). To achieve this complex encryption, we can use many algorithms like AES or DES encryption algorithms with CPABE algorithm. This scheme allows making SQL-like queries on encrypted database in multiuser environment while at the same time, the database owner assign different access rights to users that defines a specific policy for the database. The major use of this encryption is privacy, access control and data confidentiality and multi-user access control.DOI:http://dx.doi.org/10.11591/ijece.v3i4.306
- …