545 research outputs found

    Experimental Quantification of the Effect of Nonlinearities on the EIS Spectra of the Cathodic Electrode of an Alkaline Electrolyzer

    Full text link
    [EN] Electrochemical impedance spectroscopy (EIS) is a very powerful tool to study the behavior of electrochemical systems. According to Ohm¿s generalized law, the impedance concept is only valid if the linearity condition is met. In the case that the linearity condition is not achieved, the obtained impedance spectra will present distortions which may lead to biased or even erroneous results and conclusions. In this work, an experimental quantification of the effect of nonlinearities on EIS spectra was performed in order to determine the order of magnitude of the effect of the nonlinearity of the system on the obtained spectra of the cathodic electrode of an alkaline electrolyzer.The authors are very grateful to the Generalitat Valenciana for its economic support in form of Vali+d grant (Ref: ACIF-2013-268).Giner-Sanz, J.; Ortega, E.; Pérez-Herranz, V. (2017). Experimental Quantification of the Effect of Nonlinearities on the EIS Spectra of the Cathodic Electrode of an Alkaline Electrolyzer. Fuel Cells. 17(3):391-401. https://doi.org/10.1002/fuce.201600137S39140117

    Foundations for the Design of a Creative System Based on the Analysis of the Main Techniques that Stimulate Human Creativity

    Get PDF
    This work presents the design of a computational system with creative capacity, based on the synthesis of the main methods that stimulate human creativity. When analyzing each method, a set of characteristics that the computer system must have in order to emulate a creative capacity has been suggested. In this way, by integrating all the suggestions in a structured way, it is possible to design the general architecture and functioning strategy of a computer system that has the incremental creative capacity of well-known creative methods. This computational system is designed as a multi-agent system, made up of two groups of agents, the problem solving group and the creative group, the first one exploring and evaluating paths for suitable solutions, the second implementing creative methods to generate new paths that are provided to the first group

    Renormalization group equations in resonance chiral theory

    Get PDF
    The use of the equations of motion and meson field redefinitions allows the development of a simplified resonance chiral theory lagrangian: terms including resonance fields and a large number of derivatives can be reduced into corresponding O(p2) resonance operators, containing the lowest possible number of derivatives. This is shown by means of the explicit computation of the pion vector form-factor up to next-to-leading order in 1/Nc. The study of the renormalization group equations for the corresponding couplings demonstrates the existence of an infrared fixed point in the resonance theory. The possibility of developing a perturbative 1/Nc expansion in the slow running region around the fixed point is shown here.Comment: 6 pages, 3 figures. Final version as published. References added. Extended explanations. The interrelation between the IR fixed point and the UV constraints has been further studie

    Vector Meson Dominance as the first order of a sequence of Pade Approximants

    Full text link
    The use of Pade Approximants for the analysis of the pion vector form-factor is discussed and justified in this talk. The method is tested first in a theoretical model and applied then on real experimental data. It is shown how the Pade Approximants provide a convenient and reliable framework to incorporate both low and high energy information in the euclidean region, leading to improved determinations of the low energy parameters such as, e.g., the quadratic radius ^pi_V.Comment: 4 pages, 3 figures, espcrc2 style. To appear in the proceedings of the 14th International QCD Conference, QCD 08, 7-12 July 2008, Montpellier (France

    Renormalizable Sectors in Resonance Chiral Theory: S -> pi pi Decay Amplitude

    Get PDF
    We develop a resonance chiral theory without any a priori limitation on the number of derivatives in the hadronic operators. Through an exhaustive analysis of the resonance lagrangian and by means of field redefinitions, we find that the number of independent operator contributing to the S -> pi pi decay amplitude is finite: there is only one single-trace operator (the cd term) and three multi-trace terms. The deep implication of this fact is that the ultraviolet divergences that appear in this amplitude at the loop level can only appear through these chiral invariant structures. Hence, a renormalization of these couplings renders the amplitude finite.Comment: 4 page

    O(p6)O(p^6) extension of the large--NCN_C partial wave dispersion relations

    Get PDF
    Continuing our previous work(JHEP 0706:030,2007), large--NCN_C techniques and partial wave dispersion relations are used to discuss ππ\pi\pi scattering amplitudes. We get a set of predictions for O(p6)O(p^6) low-energy chiral perturbation theory couplings. They are provided in terms of the masses and decay widths of scalar and vector mesons.Comment: 7 page

    Non-stationary Rayleigh-Taylor instability in supernovae ejecta

    Get PDF
    The Rayleigh-Taylor instability plays an important role in the dynamics of several astronomical objects, in particular, in supernovae (SN) evolution. In this paper we develop an analytical approach to study the stability analysis of spherical expansion of the SN ejecta by using a special transformation in the co-moving coordinate frame. We first study a non-stationary spherical expansion of a gas shell under the pressure of a central source. Then we analyze its stability with respect to a no radial, non spherically symmetric perturbation of the of the shell. We consider the case where the polytropic constant of the SN shell is γ=5/3\gamma=5/3 and we examine the evolution of a arbitrary shell perturbation. The dispersion relation is derived. The growth rate of the perturbation is found and its temporal and spatial evolution is discussed. The stability domain depends on the ejecta shell thickness, its acceleration, and the perturbation wavelength.Comment: 16 page

    Interpolating between low and high energy QCD via a 5D Yang-Mills model

    Full text link
    We describe the Goldstone bosons of massless QCD together with an infinite number of spin-1 mesons. The field content of the model is SU(Nf)xSU(Nf) Yang-Mills in a compact extra-dimension. Electroweak interactions reside on one brane. Breaking of chiral symmetry occurs due to the boundary conditions on the other brane, away from our world, and is therefore spontaneous. Our implementation of the holographic recipe maintains chiral symmetry explicit throughout. For intermediate energies, we extract resonance couplings. These satisfy sum rules due to the 5D nature of the model. These sum rules imply, when taking the high energy limit, that perturbative QCD constraints are satisfied. We also illustrate how the 5D model implies a definite prescription for handling infinite sums over 4D resonances. Taking the low energy limit, we recover the chiral expansion and the corresponding non-local order parameters. All local order parameters are introduced separately.Comment: Corresponds to published version, with some typos correcte

    Consistent response to guselkumab treatment between Hispanic and non-Hispanic patients with psoriasis : an analysis from VOYAGE 1 and VOYAGE 2

    Get PDF
    Altres ajuts: Janssen Research and Development (JRD)Introduction: In VOYAGE 1 (NCT02207231) and VOYAGE 2 (NCT02207244), guselkumab, an interleukin-23 blocker, was safe and effective in patients with moderate-to-severe plaque psoriasis. Methods: Patients who self-identified as Hispanic (n = 117) or non-Hispanic (n = 1686) were randomized to guselkumab, placebo, or adalimumab. Efficacy assessments included Psoriasis Area and Severity Index (PASI), Investigator's Global Assessment (IGA), and Dermatology Life Quality Index (DLQI). Results: At week 16, treatment differences for guselkumab versus placebo in the Hispanic and non-Hispanic populations were 67.4 (95% confidence interval 50.4, 84.4) and 77.2 (73.5, 80.8) percentage points for IGA 0/1 and 59.2 (41.9, 76.4) and 69.2 (65.7, 72.7) percentage points for PASI 90, respectively. Treatment differences for guselkumab versus adalimumab were 25.9 (6.5, 45.3) and 17.5 (12.8, 22.3) percentage points for IGA 0/1 and 21.4 (-0.1, 42.9) and 23.5 (18.2, 28.9) percentage points for PASI 90, respectively. Week 24 results were similar. Adverse event frequency was greater in adalimumab- versus guselkumab-treated patients in the Hispanic population only through weeks 16 and 28. In both populations, DLQI 0/1 responses were greater in guselkumab-treated versus placebo- and adalimumab-treated patients at week 16 and versus adalimumab-treated patients at week 24. Conclusions: Guselkumab safety and efficacy were consistent between Hispanic and non-Hispanic populations

    How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts

    Get PDF
    We study secure and undetectable communication in a world where governments can read all encrypted communications of citizens. We consider a world where the only permitted communication method is via a government-mandated encryption scheme, using government-mandated keys. Citizens caught trying to communicate otherwise (e.g., by encrypting strings which do not appear to be natural language plaintexts) will be arrested. The one guarantee we suppose is that the government-mandated encryption scheme is semantically secure against outsiders: a perhaps advantageous feature to secure communication against foreign entities. But what good is semantic security against an adversary that has the power to decrypt? Even in this pessimistic scenario, we show citizens can communicate securely and undetectably. Informally, there is a protocol between Alice and Bob where they exchange ciphertexts that look innocuous even to someone who knows the secret keys and thus sees the corresponding plaintexts. And yet, in the end, Alice will have transmitted her secret message to Bob. Our security definition requires indistinguishability between unmodified use of the mandated encryption scheme, and conversations using the mandated encryption scheme in a modified way for subliminal communication. Our topics may be thought to fall broadly within the realm of steganography: the science of hiding secret communication in innocent-looking messages, or cover objects. However, we deal with the non-standard setting of adversarial cover object distributions (i.e., a stronger-than-usual adversary). We leverage that our cover objects are ciphertexts of a secure encryption scheme to bypass impossibility results which we show for broader classes of steganographic schemes. We give several constructions of subliminal communication schemes based on any key exchange protocol with random messages (e.g., Diffie-Hellman)
    corecore