35,386 research outputs found

    Probing the QCD Critical Point with Higher Moments of Net-proton Multiplicity Distributions

    Full text link
    Higher moments of event-by-event net-proton multiplicity distributions are applied to search for the QCD critical point in the heavy ion collisions. It has been demonstrated that higher moments as well as moment products are sensitive to the correlation length and directly connected to the thermodynamic susceptibilities computed in the Lattice QCD and Hadron Resonance Gas (HRG) model. In this paper, we will present measurements for kurtosis (κ\kappa), skewness (SS) and variance (σ2\sigma^{2}) of net-proton multiplicity distributions at the mid-rapidity (y<0.5|y|<0.5) and 0.4<pT<0.80.4<p_{T}<0.8 GeV/cc for Au+Au collisions at sNN\sqrt{s_{NN}}=19.6, 39, 62.4, 130 and 200 GeV, Cu+Cu collisions at sNN\sqrt{s_{NN}}=22.4, 62.4 and 200 GeV, d+Au collisions at sNN\sqrt{s_{NN}}=200 GeV and p+p collisions at sNN\sqrt{s_{NN}}=62.4 and 200 GeV. The moment products κσ2\kappa \sigma^{2} and SσS \sigma of net-proton distributions, which are related to volume independent baryon number susceptibility ratio, are compared to the Lattice QCD and HRG model calculations. The κσ2\kappa \sigma^{2} and SσS \sigma of net-proton distributions are consistent with Lattice QCD and HRG model calculations at high energy, which support the thermalization of the colliding system. Deviations of κσ2\kappa \sigma^{2} and SσS \sigma for the Au+Au collisions at low energies from HRG model calculations are also observed.Comment: 10 pages, 8 figures, Proceedings of 27th Winter Workshon on Nuclear Dynamics. Feb. 6-13 (2011

    Authorization and access control of application data in Workflow systems

    Get PDF
    Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. Although some research efforts have addressed requirements for authorization and access control for workflow systems, little attention has been paid to the requirements as they apply to application data accessed or managed by WfMSs. In this paper, we discuss key access control requirements for application data in workflow applications using examples from the healthcare domain, introduce a classification of application data used in workflow systems by analyzing their sources, and then propose a comprehensive data authorization and access control mechanism for WfMSs. This involves four aspects: role, task, process instance-based user group, and data content. For implementation, a predicate-based access control method is used. We believe that the proposed model is applicable to workflow applications and WfMSs with diverse access control requirements

    Multivariate Nonnegative Quadratic Mappings

    Get PDF
    In this paper we study several issues related to the characterization of speci c classes of multivariate quadratic mappings that are nonnegative over a given domain, with nonnegativity de ned by a pre-speci ed conic order.In particular, we consider the set (cone) of nonnegative quadratic mappings de ned with respect to the positive semide nite matrix cone, and study when it can be represented by linear matrix inequalities.We also discuss the applications of the results in robust optimization, especially the robust quadratic matrix inequalities and the robust linear programming models.In the latter application the implementational errors of the solution is taken into account, and the problem is formulated as a semide nite program.optimization;linear programming;models

    Matrix convex functions with applications to weighted centers for semidefinite programming

    Get PDF
    In this paper, we develop various calculus rules for general smooth matrix-valued functions and for the class of matrix convex (or concave) functions first introduced by Loewner and Kraus in 1930s. Then we use these calculus rules and the matrix convex function -log X to study a new notion of weighted convex centers for semidefinite programming (SDP) and show that, with this definition, some known properties of weighted centers for linear programming can be extended to SDP. We also show how the calculus rules for matrix convex functions can be used in the implementation of barrier methods for optimization problems involving nonlinear matrix functions.matrix convexity;matrix monotonicity;semidefinite programming

    Nonlinear Realization of Spontaneously Broken N=1 Supersymmetry Revisited

    Full text link
    This paper revisits the nonlinear realization of spontaneously broken N=1 supersymmetry. It is shown that the constrained superfield formalism can be reinterpreted in the language of standard realization of nonlinear supersymmetry via a new and simpler route. Explicit formulas of actions are presented for general renormalizable theories with or without gauge interactions. The nonlinear Wess-Zumino gauge is discussed and relations are pointed out for different definitions of gauge fields. In addition, a general procedure is provided to deal with theories of arbitrary Kahler potentials.Comment: 1+18 pages, LaTe

    The Differences of Star Formation History Between Merging Galaxies and Field Galaxies in the EDR of the SDSS

    Get PDF
    Based on the catalog of merging galaxies in the Early Data Release (EDR) of the Sloan Digital Sky Survey (SDSS), the differences of star formation history between merging galaxies and field galaxies are studied statistically by means of three spectroscopic indicators the 4000-\r{A} break strength, the Balmer absorption-line index, and the specific star formation rate. It is found that for early-type merging galaxies the interactions will not induce significant enhancement of the star-formation activity because of its stability and lack of cool gas. On the other hand, late-type merging galaxies always in general display more active star formation than field galaxies on different timescales within about 1Gyr. We also conclude that the mean stellar ages of late-type merging galaxies are younger than those of late-type field galaxies.Comment: 9 pages, 4 figures, accepted for publication in PAS

    Discussion on Event Horizon and Quantum Ergosphere of Evaporating Black Holes in a Tunnelling Framework

    Full text link
    In this paper, with the Parikh-Wilczek tunnelling framework the positions of the event horizon of the Vaidya black hole and the Vaidya-Bonner black hole are calculated respectively. We find that the event horizon and the apparent horizon of these two black holes correspond respectively to the two turning points of the Hawking radiation tunnelling barrier. That is, the quantum ergosphere coincides with the tunnelling barrier. Our calculation also implies that the Hawking radiation comes from the apparent horizon.Comment: 8 page

    Design and Analysis for RFID Authentication Protocol

    Get PDF
    Radio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. On the other hand, the low-cost RFID system has potential risks such as privacy and security problems, which would be a big barrier for the application. First of all, we analyze the current security protocols for the RFID system. To protect user privacy and remove security vulnerabilities, we propose a robust and privacy preserving mutual authentication protocol that is suitable for the low-cost RFID environment. Finally, the correctness of the proposed authentication protocol is proved by the BAN logic.published_or_final_versio

    SED-inferred properties and morphology of Lyman-break galaxies at z1z\sim 1 in the CDF-S

    Full text link
    After carefully cross-identifying a previously discovered GALEX-selected Lyman Break Galaxy (LBG) candidates one-to-one with their optical counterparts in the field of the CDF-S, we re-estimate their photometric redshifts using multi-wavelength data from UV, optical to NIR. We refine a new updated sample of 383 LBGs at 0.7\la z \la 1.4. Most LBGs are classified as starburst and irregular types. Ages spread from several Myr to 1.5Gyr. Their dust-corrected star formation rates (SFRs) and stellar masses (MM_*) are from 4\my to 220\my and from 2.3\times 10^8 \msun to 4 \times 10^{11} \msun. The rest-frame FUV luminosity function of LBGs are presented. LBGs of irregular types mainly distribute along the "main sequence" of star forming galaxies while most LBGs of starburst types locate in the starburst region. A "downsizing" effect is clearly found and LBGs distribute in the "blue" cloud. HST images in F606W (VV band) and F850LP (zz band) are taken from the GEMS and GOODS-S surveys. SExtractor and GALFIT are applied to get their morphological parameters. A morphological sample of 142 LBGs with reliable results of \sersic and sizes in both bands is defined. We find that LBGs at z1z\sim 1 are dominated by disk-like galaxies. Correlations between photometric and morphological properties of LBGs are investigated. Strong correlations between their half-light radii and MM_*, i.e., size-stellar mass relations, are found in both bands. Physical connections between correlations and the "downsizing" effect are discussed.Comment: 26 pages, 30 figures, 6 tables, accepted by MNRA
    corecore