36,915 research outputs found
Exploiting the Design Freedom of RM
This paper details how Rapid Manufacturing (RM) can overcome the restrictions imposed by the
inherent process limitations of conventional manufacturing techniques and become the enabling
technology in fabricating optimal products. A new design methodology capable of exploiting
RM’s increased design freedom is therefore needed. Inspired by natural world structures of trees
and bones, a multi-objective, genetic algorithm based topology optimisation approach is
presented. This combines multiple unit cell structures and varying volume fractions to create a
heterogeneous part structure which exhibits a uniform stress distribution.Mechanical Engineerin
Cascade Dynamics of Multiplex Propagation
Random links between otherwise distant nodes can greatly facilitate the
propagation of disease or information, provided contagion can be transmitted by
a single active node. However we show that when the propagation requires
simultaneous exposure to multiple sources of activation, called multiplex
propagation, the effect of random links is just the opposite: it makes the
propagation more difficult to achieve. We calculate analytical and numerically
critical points for a threshold model in several classes of complex networks,
including an empirical social network.Comment: 4 pages, 5 figures, for similar work visit http://hsd.soc.cornell.edu
and http://www.imedea.uib.es/physdep
Reflection and Transmission for Conformal Defects
We consider conformal defects joining two conformal field theories along a
line. We define two new quantities associated to such defects in terms of
expectation values of the stress tensors and we propose them as measures of the
reflectivity and transmissivity of the defect. Their properties are
investigated and they are computed in a number of examples. We obtain a
complete answer for all defects in the Ising model and between certain pairs of
minimal models. In the case of two conformal field theories with an enhanced
symmetry we restrict ourselves to non-trivial defects that can be obtained by a
coset construction.Comment: 32 pages + 13 pages appendix, 12 figures; v2: added eqns (2.7), (2.8)
and refs [6,7,39,40], version published in JHE
One-point functions in finite volume/temperature: a case study
We consider finite volume (or equivalently, finite temperature) expectation
values of local operators in integrable quantum field theories using a
combination of numerical and analytical approaches. It is shown that the
truncated conformal space approach, when supplemented with a recently proposed
renormalization group, can be sufficiently extended to the low-energy regime
that it can be matched with high precision by the low-temperature expansion
proposed by Leclair and Mussardo. Besides verifying the consistency of the two
descriptions, their combination leads to an evaluation of expectation values
which is valid to a very high precision for all volume/temperature scales. As a
side result of the investigation, we also discuss some unexpected singularities
in the framework recently proposed by Pozsgay and Tak\'acs for the description
of matrix elements of local operators in finite volume, and show that while
some of these singularities are resolved by the inclusion of the class of
exponential finite size corrections known as \mu-terms, these latter
corrections themselves lead to the appearance of new singularities. We point
out that a fully consistent description of finite volume matrix elements is
expected to be free of singularities, and therefore a more complete and
systematic understanding of exponential finite size corrections is necessary.Comment: v1: 29 pages, 10 eps figures. v2: 34 pages. A detailed comparison of
the theoretically predicted and numerically computed cutoff dependence is
added; notations explained in more details and some explanatory remarks are
added; typos correcte
Identity and Search in Social Networks
Social networks have the surprising property of being "searchable": Ordinary
people are capable of directing messages through their network of acquaintances
to reach a specific but distant target person in only a few steps. We present a
model that offers an explanation of social network searchability in terms of
recognizable personal identities: sets of characteristics measured along a
number of social dimensions. Our model defines a class of searchable networks
and a method for searching them that may be applicable to many network search
problems, including the location of data files in peer-to-peer networks, pages
on the World Wide Web, and information in distributed databases.Comment: 4 page, 3 figures, revte
Order-disorder phase transition in a cliquey social network
We investigate the network model of community by Watts, Dodds and Newman (D.
J. Watts et al., Science 296 (2002) 1302) as a hierarchy of groups, each of 5
individuals. A homophily parameter controls the probability
proportional to of selection of neighbours against distance
. The network nodes are endowed with spin-like variables , with
Ising interaction . The Glauber dynamics is used to investigate the
order-disorder transition. The transition temperature is close to 3.8 for
and it falls down to zero above this value. The result provides
a mathematical illustration of the social ability to a collective action {\it
via} weak ties, as discussed by Granovetter in 1973.Comment: 10 pages, 7 figure
- …
