25 research outputs found

    Nuclear Shape Fluctuations in Fermi-Liquid Drop Model

    Get PDF
    Within the nuclear Fermi-liquid drop model, quantum and thermal fluctuations are considered by use of the Landau-Vlasov-Langevin equation. The spectral correlation function of the nuclear surface fluctuations is evaluated in a simple model of an incompressible and irrotational Fermi liquid. The dependence of the spectral correlation function on the dynamical Fermi-surface distortion is established. The temperature at which the eigenvibrations become overdamped is calculated. It is shown that, for realistic values of the relaxation time parameter and in the high temperature regime, there is a particular eigenmode of the Fermi liquid drop where the restoring force is exclusively due to the dynamical Fermi-surface distortion.Comment: 23 pages, revtex, file and 3 figures, accepted for publication in Nuclear Physics

    Cloud-Magnetic Resonance Imaging System: In the Era of 6G and Artificial Intelligence

    Full text link
    Magnetic Resonance Imaging (MRI) plays an important role in medical diagnosis, generating petabytes of image data annually in large hospitals. This voluminous data stream requires a significant amount of network bandwidth and extensive storage infrastructure. Additionally, local data processing demands substantial manpower and hardware investments. Data isolation across different healthcare institutions hinders cross-institutional collaboration in clinics and research. In this work, we anticipate an innovative MRI system and its four generations that integrate emerging distributed cloud computing, 6G bandwidth, edge computing, federated learning, and blockchain technology. This system is called Cloud-MRI, aiming at solving the problems of MRI data storage security, transmission speed, AI algorithm maintenance, hardware upgrading, and collaborative work. The workflow commences with the transformation of k-space raw data into the standardized Imaging Society for Magnetic Resonance in Medicine Raw Data (ISMRMRD) format. Then, the data are uploaded to the cloud or edge nodes for fast image reconstruction, neural network training, and automatic analysis. Then, the outcomes are seamlessly transmitted to clinics or research institutes for diagnosis and other services. The Cloud-MRI system will save the raw imaging data, reduce the risk of data loss, facilitate inter-institutional medical collaboration, and finally improve diagnostic accuracy and work efficiency.Comment: 4pages, 5figures, letter

    Small damping approach in Fermi-liquid theory

    Full text link
    The validity of small damping approximation (SDA) for the quasi-classical description of the averaged properties of nuclei at high temperatures is studied within the framework of collisional kinetic theory. The isoscalar collective quadrupole vibrations in hot nuclei are considered. We show that the extension of the SDA, by accounting for the damping of the distribution function δf\delta f in the collision integral reduces the rate of variation with temperature of the Fermi surface distortion effects. The damping of the δf\delta f in the collision integral increases significantly the collisional width of the giant quadrupole resonance (GQR) for small enough values of the relaxation time. The temperature dependence of the eigenenergy of the GQR becomes much more weaker than in the corresponding SDA case.Comment: 11 pages, 3 figure

    Interopérabilité et négociation des politiques de sécurité

    No full text
    Security policy provides a way to define the constraints on behavior of the members belonging to a system, organization or other entities. With the development of IT technology such as Grid Computing and Cloud Computing, more and more applications and platforms exchange their data and services for cooperating. Toward this trend, security becomes an important issue and security policy has to be applied in order to ensure the safety of data and service interaction. In this thesis, we deal with one type of security policy: access control policy. Access control policy protects the privileges of resource's utilization and there exist different policy models for various scenarios. Our goal is to ensure that the service customer well expresses her security requirements and chooses the service providers that fit these requirements.The first part of this dissertation is dedicated to service provider selection. In case that the security policies of the service provider are accessible to the service customer, we provide a method for measuring the similarity between security policies. Another case is that security policies are not accessible to the service customer or not specified explicitly. Our solution is proposing a policy-based framework which enables the derivation from attribute-based security requirements to concrete security policies. The second part of the dissertation focuses on the security policy negotiation. We investigate the process of reaching agreement through bargaining process in which negotiators exchange their offers and counter offers step by step. The positive result of the negotiation generates a policy contract.Suite au développement des technologies de l'information, et en particulier au déploiement d'infrastructures telles que le Cloud Computing, de plus en plus d'applications et plateformes coopèrent en échangeant des données et des services. Cette tendance renforce l'importance de la gestion de la sécurité. Afin d'assurer la sécurité des données et de l'interaction de service une politique de sécurité doit être appliquée. Dans cette thèse, nous nous intéressons aux politiques de contrôle d'accès. Ce type de politique spécifie les privilèges de l'utilisation des ressources et est implémentée par différents modèles selon différents scénarios. Notre objectif ici est d'aider le client du service à bien exprimer ses exigences de sécurité et à choisir les fournisseurs de services qui peuvent la déployer. La première partie de cette thèse est dédiée à la sélection des fournisseurs de service. Dans le cas où les politiques de sécurité du fournisseur sont accessibles au client, nous proposons une méthode pour mesurer la similarité entre les politiques de sécurité. Dans le cas où les politiques de sécurité ne sont pas accessibles au client ou ne sont pas explicitement spécifiées, nous proposons un cadre à base de règles permettant la dérivation à partir des exigences de sécurité aux politiques de sécurité concrètes. La seconde partie de la thèse porte sur la négociation de politiques de sécurité. Nous étudions le processus permettant aux parties en négociation de parvenir à un accord par une série d'échanges d'offres et de contre-offres. Lorsque le résultat de la négociation est positif, un contrat incluant la politique de sécurité acceptée par les parties est généré

    Data For VM Allocation

    No full text
    The package contains two folders: “initialContractSpecification” contains the Json files for contract specification corresponding to Fig.2 and “policyGenerated” contains three policy generated in the process of VM allocation. Creation of data: 12/2015 Type of data: processed data Software used: Netbeans and motOrBAC Data format: XML and Json Source: experiments Number of samples: 5 Total size per sample: 10 K

    HIDDEN MARKOV MODEL AND ITS APPLICATIONS TO RECOMBINATION BREAKPOINTS IDENTIFICATION IN HIV

    No full text
    Bachelor'sBACHELOR OF SCIENCE (HONOURS

    Who Benefits from the Housing Provident Fund System in China? An Analysis of the Internal Rate of Return for Typical Employees with Different Incomes

    No full text
    The Housing Provident Fund System (HPFS) was established in China in the 1990s as a welfare program to offer low-cost loans and encourage the purchasing of houses. However, there has been some controversy over the income redistribution effect of HPFS. Previous studies focused on the effect of low-interest-rate loans but ignored the effects of tax exemptions and low-interest-rate deposits. This paper introduces a lifetime cash flow model which considers the effects of low-interest-rate loans, tax exemptions, and low-interest-rate deposits together. It compares the internal rate of return (IRR) for typical employees with different incomes in four situations: whether or not HPFS participation and whether or not house purchasing. We found that the IRRs of the typical low-income HPFS participants who buy houses with HPFS loans were lower than the IRRs of non-participants who buy houses with commercial mortgages without HPFS participation. For the typical middle-income employees, there is not much difference in IRR between the two situations. Only the typical high-income employees can benefit from HPFS participation, and this is mostly due to the effect of the tax exemptions, rather than the effect of low-interest-rate loans. Increasing the coverage of HPFS and HPFS loans among low-income employees will not improve the income redistribution effect of HPFS

    Adaptive Ensemble with Human Memorizing Characteristics for Data Stream Mining

    No full text
    Combining several classifiers on sequential chunks of training instances is a popular strategy for data stream mining with concept drifts. This paper introduces human recalling and forgetting mechanisms into a data stream mining system and proposes a Memorizing Based Data Stream Mining (MDSM) model. In this model, each component classifier is regarded as a piece of knowledge that a human obtains through learning some materials and has a memory retention value reflecting its usefulness in the history. The classifiers with high memory retention values are reserved in a “knowledge repository.” When a new data chunk comes, most useful classifiers will be selected (recalled) from the repository and compose the current target ensemble. Based on MDSM, we put forward a new algorithm, MAE (Memorizing Based Adaptive Ensemble), which uses Ebbinghaus forgetting curve as the forgetting mechanism and adopts ensemble pruning as the recalling mechanism. Compared with four popular data stream mining approaches on the datasets with different concept drifts, the experimental results show that MAE achieves high and stable predicting accuracy, especially for the applications with recurring or complex concept drifts. The results also prove the effectiveness of MDSM model

    Fracture of a finite piezoelectric layer with a penny-shaped crack

    No full text
    This paper studies a penny-shaped crack in a finite thickness piezoelectric material layer. The piezoelectric medium is subjected to a thermal flux on its top and bottom surfaces. Both thermally insulated crack and heated crack are considered. Numerical solution for the finite layer thickness is obtained through the solution of a pair of dual integral equations. The result reduces to the closed form solution when the thickness of the piezoelectric layer becomes infinite. Exact expressions for the stress and electric displacement at the crack border are given as a function of the stress intensity factor, which is determined by the applied thermal flux. This paper is useful for the reliability design of piezoelectric materials in thermal environments
    corecore