72,401 research outputs found

    Low-lying states in even Gd isotopes studied with five-dimensional collective Hamiltonian based on covariant density functional theory

    Full text link
    Five-dimensional collective Hamiltonian based on the covariant density functional theory has been applied to study the the low-lying states of even-even 148−162^{148-162}Gd isotopes. The shape evolution from 148^{148}Gd to 162^{162}Gd is presented. The experimental energy spectra and intraband B(E2)B(E2) transition probabilities for the 148−162^{148-162}Gd isotopes are reproduced by the present calculations. The relative B(E2)B(E2) ratios in present calculations are also compared with the available interacting boson model results and experimental data. It is found that the occupations of neutron 1i13/21i_{13/2} orbital result in the well-deformed prolate shape, and are essential for Gd isotopes.Comment: 11pages, 10figure

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    Differential space-time block-coded OFDMA for frequency-selective fading channels

    Get PDF
    Combining differential Alamouti space-time block code (DASTBC) with orthogonal frequency-division multiple access (OFDMA), this paper introduces a multiuser/multirate transmission scheme, which allows full-rate and full-diversity noncoherent communications using two transmit antennas over frequency-selective fading channels. Compared with the existing differential space-time coded OFDM designs, our scheme imposes 10 restrictions on signal constellations, and thus can improve the spectral efficiency by exploiting efficient modulation techniques such as QAM, APSK etc. The main principles of our design are s follows: OFDMA eliminates multiuser interference, and converts multiuser environments to single-user ones; Space-time coding achieves performance improvement by exploiting space diversity available with multiple antennas, no matter whether channel state information is known to the receiver. System performance is evaluated both analytically and with simulations
    • …
    corecore