5,886 research outputs found

    Doubled Conformal Compactification

    Full text link
    We use Weyl transformations between the Minkowski spacetime and dS/AdS spacetime to show that one cannot well define the electrodynamics globally on the ordinary conformal compactification of the Minkowski spacetime (or dS/AdS spacetime), where the electromagnetic field has a sign factor (and thus is discountinuous) at the light cone. This problem is intuitively and clearly shown by the Penrose diagrams, from which one may find the remedy without too much difficulty. We use the Minkowski and dS spacetimes together to cover the compactified space, which in fact leads to the doubled conformal compactification. On this doubled conformal compactification, we obtain the globally well-defined electrodynamics.Comment: 14 pages, 4 figure

    Resistance of velocity slip flow in pipe/channel with a sudden contraction

    Get PDF
    © 2020 Author(s). A novel approach based on the local entropy generation rate, also known as the second law analysis (SLA), is proposed to compute and visualize the flow resistance in mass transfer through a pipe/channel with a sudden contraction component (SCC) at low Reynolds number (Re) featuring velocity slip. The linear Navier velocity slip boundary condition is implemented using the explicit scheme. At small Reynolds number, i.e., Re ≤ 10.0, the flow resistance coefficient of the SCC, KSCC, is found to be a function of the dimensionless velocity slip length Lslip∗ and Re-1, and gradually increase to a constant value at contraction ratio Rarea ≥ 8, reaching a formula KSCC=(0.4454Lslip∗ 3-1.894Lslip∗ 2+2.917Lslip*+8.909)/Re. Over this range of Re, the equivalent length of the flow resistance is almost independent of Re, while out of this range, the equivalent length increases monotonically with Re. Moreover, the dimensionless drag force work around the SCC is negative and reaches a minimum at a critical Lslip*. The SLA reveals that the regions affected by the SCC mainly concentrate around the end section of the upstream pipe/channel rather than the initial partition of the downstream section reported in large Re turbulent flow, and this non-dimensional affected upstream length increases with Lslip*. The fluid physics are further examined using SLA to evaluate the energy loss over the entire domain, decomposed as the viscous dissipation inside the domain and the drag work on the wall boundary

    Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems

    Get PDF
    © 2014 IEEE. Cyber-physical social system (CPSS) plays an important role in both the modern lifestyle and business models, which significantly changes the way we interact with the physical world. The increasing influence of cyber systems and social networks is also a high risk for security threats. The objective of this paper is to investigate associated risks in CPSS, and a hybrid Bayesian risk graph (HBRG) model is proposed to analyze the temporal attack activity patterns in dynamic cyber-physical social networks. In the proposed approach, a hidden Markov model is introduced to model the dynamic influence of activities, which then be mapped into a Bayesian risks graph (BRG) model that can evaluate the risk propagation in a layered risk architecture. Our numerical studies demonstrate that the framework can model and evaluate risks of user activity patterns that expose to CPSSs

    Experimental implementation of fully controlled dephasing dynamics and synthetic spectral densities

    Full text link
    Engineering, controlling, and simulating quantum dynamics is a strenuous task. However, these techniques are crucial to develop quantum technologies, preserve quantum properties, and engineer decoherence. Earlier results have demonstrated reservoir engineering, construction of a quantum simulator for Markovian open systems, and controlled transition from Markovian to non-Markovian regime. Dephasing is an ubiquitous mechanism to degrade the performance of quantum computers. However, a fully controllable all-purpose quantum simulator for generic dephasing is still missing. Here we demonstrate full experimental control of dephasing allowing us to implement arbitrary decoherence dynamics of a qubit. As examples, we use a photon to simulate the dynamics of a qubit coupled to an Ising chain in a transverse field and also demonstrate a simulation of non-positive dynamical map. Our platform opens the possibility to simulate dephasing of any physical system and study fundamental questions on open quantum systems.Comment: V2: Added some text and new figur

    Efficient Content Location Using Semantic Small World in Peer-to-Peer Networks

    Get PDF
            Locating content in unstructured peer-to-peer networks is a challenging problem. This paper presents a novel semantic small world resource search mechanism to address the problem. By using vector space model to compute the semantic relevance and applying small world properties such as low average hop distance and high clustering coefficient to construct a cluster overlay. In semantic small world system, the search mechanism is divided into two parts, searching at cluster and outside cluster through inner link and short link, so that it can achieve the incremental research. It significantly reduces the average path length and query cost. Meanwhile, the simulation results show that semantic small world scheme outperforms K-random walks and flooding scheme than higher query hit rate and lower query latency

    The Improvement of Chord Protocol about Structured P2P System

    Get PDF
    Chord protocol is one of the most classical protocols in structured P2P system, with the good effect, reliability, high query efficiency, and many other advantages. However, Chord agreement remains two main shortcomings the one that the searching speed of resources is slower, and the other that the detention of routing is higher. This paper in view of these shortcomings, combination with modification, then put forward the new Chord structure that super nodes and common nodes coexist, super nodes management general nodes. The new structure using Zipf-law determines the proportion of super nodes and ordinary nodes. The last, the new structure is simulated by simulation software, and the improved Chord protocol make better the previous shortcoming through the new structure compares with the Chord protocol
    • …
    corecore