27,742 research outputs found

    On the analysis of mixed-index time fractional differential equation systems

    Full text link
    In this paper we study the class of mixed-index time fractional differential equations in which different components of the problem have different time fractional derivatives on the left hand side. We prove a theorem on the solution of the linear system of equations, which collapses to the well-known Mittag-Leffler solution in the case the indices are the same, and also generalises the solution of the so-called linear sequential class of time fractional problems. We also investigate the asymptotic stability properties of this class of problems using Laplace transforms and show how Laplace transforms can be used to write solutions as linear combinations of generalised Mittag-Leffler functions in some cases. Finally we illustrate our results with some numerical simulations.Comment: 21 pages, 6 figures (some are made up of sub-figures - there are 15 figures or sub-figures

    BsB_s Semileptonic Decays to DsD_s and DsD_s^* in Bethe-Salpeter Method

    Full text link
    Using the relativistic Bethe-Salpeter method, the electron energy spectrum and the semileptonic decay widths of Bs0Ds+νB^0_s\to D^-_s \ell^+{\nu_\ell} and Bs0Ds+νB^0_s\to D_s^{*-}\ell^+{\nu_\ell} are calculated. We obtained large branching ratios, Br(BsDseνe)=(2.85±0.35)Br(B_s\to D_se\nu_e)=(2.85\pm0.35)% and Br(BsDseνe)=(7.09±0.88)Br (B_s\to D_s^*e\nu_e)=(7.09\pm0.88)%, which can be easily detected in the future experiment.Comment: 3 pages, 3 figures

    Compact and High Performance Dual-band Bandpass Filter Using Resonator-embedded Scheme for WLANs

    Get PDF
    A compact microstrip dual-band bandpass filter (DBBPF) with high selectivity and good suppression for wireless local area networks (WLANs) is proposed utilizing a novel embedded scheme resonator. Two passbands are produced by a pair of embedded half-wavelength meandered stepped-impedance resonator (MSIR) and a quadwavelength short stub loaded stepped-impedance resonator (SIR) separately. The resonator is fed by folded Tshaped capacitive source-load coupling microstrip feed line, and four transmission zeros are obtained at both sides of the bands to improve selectivity and suppression. Simultaneously, the size of the filter is extermely compact because embedding half-wavelength MSIR only changes the interior configuration of quad-wavelength SIR. To validate the design method, the designed filter is fabricated and measured. Both simulated and measured results indicate that good transmission property has been achieved

    B\"{a}cklund transformations for high-order constrained flows of the AKNS hierarchy: canonicity and spectrality property

    Full text link
    New infinite number of one- and two-point B\"{a}cklund transformations (BTs) with explicit expressions are constructed for the high-order constrained flows of the AKNS hierarchy. It is shown that these BTs are canonical transformations including B\"{a}cklund parameter η\eta and a spectrality property holds with respect to η\eta and the 'conjugated' variable μ\mu for which the point (η,μ)(\eta, \mu) belongs to the spectral curve. Also the formulas of m-times repeated Darboux transformations for the high-order constrained flows of the AKNS hierarchy are presented.Comment: 21 pages, Latex, to be published in J. Phys.

    Magnetic-field induced resistivity minimum with in-plane linear magnetoresistance of the Fermi liquid in SrTiO3-x single crystals

    Full text link
    We report novel magnetotransport properties of the low temperature Fermi liquid in SrTiO3-x single crystals. The classical limit dominates the magnetotransport properties for a magnetic field perpendicular to the sample surface and consequently a magnetic-field induced resistivity minimum emerges. While for the field applied in plane and normal to the current, the linear magnetoresistance (MR) starting from small fields (< 0.5 T) appears. The large anisotropy in the transverse MRs reveals the strong surface interlayer scattering due to the large gradient of oxygen vacancy concentration from the surface to the interior of SrTiO3-x single crystals. Moreover, the linear MR in our case was likely due to the inhomogeneity of oxygen vacancies and oxygen vacancy clusters, which could provide experimental evidences for the unusual quantum linear MR proposed by Abrikosov [A. A. Abrikosov, Phys. Rev. B 58, 2788 (1998)].Comment: 5 pages, 4 figure

    A Flow Sensitive Security Model for Cloud Computing Systems

    Get PDF
    A flow sensitive security model is presented to analyse information flow in federated cloud systems. Each cloud and the entities of the cloud system are classified into different security levels which form a security lattice. Opacity --- a general technique for unifying security properties --- turns out to be a promising analytical technique in the context of cloud computing systems. The proposed approach can help to track and control the secure information flow in federated cloud systems. It can also be used to analyze the impact of different resources allocation strategies

    Opacity in Internet of Things with Cloud Computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Internet of Things (IoT) with Cloud Computing (CC) is a new paradigm incorporating a pervasive presence of a wide range of things/objects which can interact with each other and cooperate, creating new services and reaching common goals. This will lead to more intelligent smart environments in a wide range of applications. In this context, protecting the Internet of Things with Cloud Computing (IoTwCC) against interference, including service attacks and viruses, becomes paramount. In this paper, we introduce a transition system representation to capture the information flow in IoTwCCs, and then investigate the opacity of the information flow model. In addition, we introduce a threat model to describe the actions of the system, and propose entropy as a security metrics to quantify the amount of information related to a service that might be exposed to other users or adversaries. It turns out that the opacity of the system is affected by the availability of the services. As a result, the trade-off between opacity and service availability can be analyzed
    corecore