3,329 research outputs found
Numerical methods for construction reachability sets of dynamical systems
The research is devoted to the problem of reachability sets construction and representation in a control problem of a dynamical system. The paper discusses two numerical methods for construction reachability sets of dynamical systems. These methods differ in the way of representations of the reachability sets. The first method is oriented on solution of the control problem on the plane and connected with a representation of sets in the form of polygons. The second one is connected with a pixel representation of sets in the m-dimensional Euclidian space and simplicial complexes. © 2012 American Institute of Physics
Radiation damage of the ILC positron source target
The radiation damage of the positron source target for the International
Linear Collider (ILC) has been studied. The displacement damage in target
material due to multi-MeV photons has been calculated by combining FLUKA
simulations for secondary particle production, SPECTER data for neutron
displacement cross-sections and the Lindhard model for estimations of
displacement damage by ions. The radiation damage of a stationary Ti6Al4V
target in units of displacements per atom (dpa) has been estimated for photons
from an undulator with strength 0.92 and period 1.15 cm. The calculated damage
is 7 dpa. Approximately 12.5% of displacement damage result from neutrons.Comment: to appear in the proceedings of the Linear Collider Workshop 2007 and
the International Linear Collider meeting 2007, DESY, Hamburg, 30 May - 3
June 200
A new key exchange protocol based on the decomposition problem
In this paper we present a new key establishment protocol based on the
decomposition problem in non-commutative groups which is: given two elements
of the platform group and two subgroups (not
necessarily distinct), find elements such that . Here we introduce two new ideas that improve the security of key
establishment protocols based on the decomposition problem. In particular, we
conceal (i.e., do not publish explicitly) one of the subgroups , thus
introducing an additional computationally hard problem for the adversary,
namely, finding the centralizer of a given finitely generated subgroup.Comment: 7 page
- …