2,149 research outputs found
Distribution of Avalanche Sizes in the Hysteretic Response of Random Field Ising Model on a Bethe Lattice at Zero Temperature
We consider the zero-temperature single-spin-flip dynamics of the
random-field Ising model on a Bethe lattice in the presence of an external
field h. We derive the exact self-consistent equations to determine the
distribution Prob(s) of avalanche sizes s, as the external field increases from
large negative to positive values. We solve these equations explicitly for a
rectangular distribution of the random fields for a linear chain and the Bethe
lattice of coordination number z=3, and show that in these cases, Prob(s)
decreases exponentially with s for large s for all h on the hysteresis loop. We
found that for z >3 and for small disorder, the magnetization shows a first
order discontinuity for several continuous and unimodel distributions of random
fields. The avalanche distribution Prob(s) varies as s^{-3/2} for large s near
the discontinuity.Comment: 30 pages, 10 eps figure
Collusion Resistive Framework for Multimedia Security
The recent advances in multimedia and Internet technology rises the need for multimedia security.The frequent distribution of multimedia content can cause security breach and violate copyright protection law.The legitimate user can come together to generate illegitimate copy to use it for unintended purpose.The most effective such kind of attack is collusion,involve group of user to contribute with their copies of content to generate a new copy. Fingerprinting,a unique mark is embedded have one to one corresponds with user,is the solution to tackle collusion attack problem.A colluder involve in collusion leaves its trace in alter copy,so the effectiveness of mounting a successful attack lies in how effectively a colluder alter the image by leaving minimum trace.A framework,step by step procedure to tackle collusion attack, involves fingerprint generation and embedding.Various fingerprint generation and embedding techniques are used to make collusion resistive framework effective.Spread spectrum embedding with coded modulation is most effective framework to tackle collusion attack problem.The spread spectrum framework shows high collusion resistant and traceability but it can be attacked with some special collusion attack like interleaving attack and combination of average attack.Various attacks have different post effect on multimedia in different domains. The thesis provide a detail analysis of various collusion attack in different domains which serve as basis for designing the framework to resist collusion.Various statistical and experimental resuslts are drwan to show the behavior of collusion attack.The thesis also proposed a framework here uses modified ECC coded fingerprint for generation and robust watermarking embedding using wave atom.The system shows high collusion resistance against various attack.Various experiments are are drawn and system shows high collusion resistance and much better performance than literature System
Tunable Optoelectronic Properties of Triply-Bonded Carbon Molecules with Linear and Graphyne Substructures
In this paper we present a detailed computational study of the electronic
structure and optical properties of triply-bonded hydrocarbons with linear, and
graphyne substructures, with the aim of identifying their potential in
opto-electronic device applications. For the purpose, we employed a correlated
electron methodology based upon the Pariser-Parr-Pople model Hamiltonian,
coupled with the configuration interaction (CI) approach, and studied
structures containing up to 42 carbon atoms. Our calculations, based upon
large-scale CI expansions, reveal that the linear structures have intense
optical absorption at the HOMO-LUMO gap, while the graphyne ones have those at
higher energies. Thus, the opto-electronic properties depend on the topology of
the {graphyne substructures, suggesting that they can be tuned by means of
structural modifications. Our results are in very good agreement with the
available experimental data.Comment: main text 29 pages + 4 figures + 1 TOC graphic (included), supporting
information 21 page
Zero-temperature Hysteresis in Random-field Ising Model on a Bethe Lattice
We consider the single-spin-flip dynamics of the random-field Ising model on
a Bethe lattice at zero temperature in the presence of a uniform external
field. We determine the average magnetization as the external field is varied
from minus infinity to plus infinity by setting up the self-consistent field
equations, which we show are exact in this case. We find that for a
3-coordinated Bethe lattice, there is no jump discontinuity in magnetization
for arbitrarily small gaussian disorder, but the discontinuity is present for
larger coordination numbers. We have checked our results by Monte Carlo
simulations employing a technique for simulating classical interacting systems
on the Bethe lattice which avoids surface effects altogether.Comment: latex file with 5 eps figures. This version is substantially revised
with new material. Submitted to J. Phys.
Nonprofessional Phagocytosis Can Facilitate Herpesvirus Entry into Ocular Cells
Phagocytosis is a major mechanism by which the mediators of innate immunity thwart microbial infections. Here we demonstrate that human herpesviruses may have evolved a common mechanism to exploit a phagocytosis-like entrapment to gain entry into ocular cells. While herpes simplex virus-1 (HSV-1) causes corneal keratitis, cytomegalovirus (CMV) is associated with retinitis in immunocompromised individuals. A third herpesvirus, human herpesvirus-8 (HHV-8), is crucial for the pathogenesis of Kaposi's sarcoma, a common AIDS-related tumor of eyelid and conjunctiva. Using laser scanning confocal microscopy, we show that successful infection of ocular cell types by all the three viruses, belonging to three divergent subfamilies of herpesviruses, is facilitated by induction of F-actin rich membrane protrusions. Inhibitors of F-actin polymerization and membrane protrusion formation, cytochalasin D and latrunculin B, were able to block infection by all three viruses. Similar inhibition was seen by blocking phosphoinositide 3 kinase signaling, which is required for microbial phagocytosis. Transmission electron microscopy data using human corneal fibroblasts for HSV-1, human retinal pigment epithelial cells for CMV, and human conjunctival epithelial cells for HHV-8 are consistent with the possibility that pseudopod-like membrane protrusions facilitate virus uptake by the ocular cells. Our findings suggest a novel mechanism by which the nonprofessional mediators of phagocytosis can be infected by human herpesviruses
1-Phenylisatin
In the title compound, C14H9NO2, the phenyl ring makes a dihedral angle of 50.59 (5)° with the mean plane of the isatin fragment. In the crystal, molecules are linked through weak intermolecular C—H⋯O hydrogen bonds. The crystal structure also exhibits two slipped π–π interactions between the benzene rings of neighbouring molecules [centroid–centroid distance = 3.968 (3) Å, interplanar distance = 3.484 (3) Å and slippage = 1.899 (3) Å], and between the phenyl rings of neighbouring molecules [centroid–centroid distance = 3.968 (3) Å, interplanar distance = 3.638 (3) Å and slippage = 1.584 (3) Å]
Herpes simplex virus infects most cell types in vitro: clues to its success
Herpes simplex virus (HSV) type-1 and type-2 have evolved numerous strategies to infect a wide range of hosts and cell types. The result is a very successful prevalence of the virus in the human population infecting 40-80% of people worldwide. HSV entry into host cell is a multistep process that involves the interaction of the viral glycoproteins with various cell surface receptors. Based on the cell type, HSV enter into host cell using different modes of entry. The combination of various receptors and entry modes has resulted in a virus that is capable of infecting virtually all cell types. Identifying the common rate limiting steps of the infection may help the development of antiviral agents that are capable of preventing the virus entry into host cell. In this review we describe the major features of HSV entry that have contributed to the wide susceptibility of cells to HSV infection
Metal-insulator transitions in tetrahedral semiconductors under lattice change
Although most insulators are expected to undergo insulator to metal
transition on lattice compression, tetrahedral semiconductors Si, GaAs and InSb
can become metallic on compression as well as by expansion. We focus on the
transition by expansion which is rather peculiar; in all cases the direct gap
at point closes on expansion and thereafter a zero-gap state persists
over a wide range of lattice constant. The solids become metallic at an
expansion of 13 % to 15 % when an electron fermi surface around L-point and a
hole fermi surface at -point develop. We provide an understanding of
this behavior in terms of arguments based on symmetry and simple tight-binding
considerations. We also report results on the critical behavior of conductivity
in the metal phase and the static dielectric constant in the insulating phase
and find common behaviour. We consider the possibility of excitonic phases and
distortions which might intervene between insulating and metallic phases.Comment: 12 pages, 8 figure
CFD modelling of meandering channel during floods
The three-dimensional Reynolds-averaged Navier–Stokes (RANS) and continuity equations are solved using a standard computational fluid dynamics (CFD) solver to predict flow in a compound meandering channel. High-quality experimental data from the UK Flood Channel Facility (FCF) are used to validate the computational results. The flow velocities, free-surface elevation, bed shear stress and turbulent kinetic energy are predicted reasonably well. The measured and predicted flows are analysed qualitatively and quantitatively to improve further understanding of mean flow, turbulence and secondary flow structures in a compound meandering channel. The streamwise component of the mean vorticity equation is used to quantify the behaviour of secondary flow circulations in terms of their generation, development and decay along the meandering channel. The turbulent kinetic energy equation is used to understand energy expenditure mechanisms of secondary flow circulations. The numerical results show that one of the shear stresses significantly contributes towards the generation of the streamwise vortex and the production rate of turbulent kinetic energy
- …