39 research outputs found
Translation-covariant Markovian master equation for a test particle in a quantum fluid
A recently proposed master equation in the Lindblad form is studied with
respect to covariance properties and existence of a stationary solution. The
master equation describes the interaction of a test particle with a quantum
fluid, the so-called Rayleigh gas, and is characterized by the appearance of a
two-point correlation function known as dynamic structure factor, which
reflects symmetry and statistical mechanics properties of the fluid. In the
case of a free gas all relevant physical parameters, such as fugacity, ratio
between the masses, momentum transfer and energy transfer are put into
evidence, giving an exact expansion of the dynamic structure factor. The limit
in which these quantities are small is then considered. In particular in the
Brownian limit a Fokker-Planck equation is obtained in which the corrections
due to quantum statistics can be explicitly evaluated and are given in terms of
the Bose function and the Fermi function .Comment: 18 pages, revtex, no figures, to appear in J. Math. Phy
Recommended from our members
A fog based middleware for automated compliance with OECD privacy principles in Internet of Healthcare Things
Cloud-based healthcare service with the Internet of Healthcare Things (IoHT) is a model for healthcare delivery for urban areas and vulnerable population that utilizes the digital communications and the IoHT to provide flexible opportunities to transform all the health data into workable, personalized health insights, and help attain wellness outside the traditional hospital setting. This model of healthcare Web services acts like a living organism, taking advantage of the opportunities afforded by running in cloud infrastructure to connect patients and providers anywhere and anytime to improve the quality of care, with the IoHT, acting as a central nervous system for this model that measures patients' vital statistics, constantly logging their health data, and report any abnormalities to the relevant healthcare provider. However, it is crucial to preserve the privacy of patients while utilizing this model so as to maintain their satisfaction and trust in the offered services. With the increasing number of cases for privacy breaches of healthcare data, different countries and corporations have issued privacy laws and regulations to define the best practices for the protection of personal health information. The health insurance portability and accountability act and the privacy principles established by the Organization for Economic Cooperation and Development (OECD) are examples of such regulation frameworks. In this paper, we assert that utilizing the cloud-based healthcare services to generate accurate health insights are feasible, while preserving the privacy of the end-users' sensitive health information, which will be residing on a clear form only on his/her own personal gateway. To support this claim, the personal gateways at the end-users' side will act as intermediate nodes (called fog nodes) between the IoHT devices and the cloud-based healthcare services. In such solution, these fog nodes will host a holistic privacy middleware that executes a two-stage concealment process within a distributed data collection protocol that utilizes the hierarchical nature of the IoHT devices. This will unburden the constrained IoHT devices from performing intensive privacy preserving processes. Additionally, the proposed solution complies with one of the common privacy regulation frameworks for fair information practice in a natural and functional way-which is OECD privacy principles. We depicted how the proposed approach can be integrated into a scenario related to preserving the privacy of the users' health data that is utilized by a cloud-based healthcare recommender service in order to generate accurate referrals. Our holistic approach induces a straightforward solution with accurate results, which are beneficial to both end-users and service providers
Ergodicity of conservative communication networks
Projet MEVALWe analyze a communication network with several types of calls. For a wide class of conservative service disciplines, we give ergodicity criteria. Exponentially fast convergence to steady state is also proved
On fluid approximation for stable networks
Projet MEVALRésumé disponible dans le fichier PD
Ergodic properties of queuing networks with batch arrivals and batch service
Résumé disponible dans le fichier PD
3rd ICTs and Society Meeting; Paper Session - Theorizing the Internet; Paper 1: Toward Trust as Result. A Transdisciplinary Research Agenda for the 'Future Internet'
Trust has emerged as one of the key challenges for the Future Internet and as a key theme of European research. We are convinced that a transdisciplinary research agenda - that we define to as Trust as Result - shared by Sociology and Computer Science, is of paramount importance for devising sustainable Trust solutions for the (Future) Internet stakeholders. The scope of this paper is to present some elements we consider important for building such an agenda
Not to normal order - Notes on the kinetic limit for weakly interacting quantum fluids
The derivation of the Nordheim-Boltzmann transport equation for weakly
interacting quantum fluids is a longstanding problem in mathematical physics.
Inspired by the method developed to handle classical dilute gases, a
conventional approach is the use of the BBGKY hierarchy for the time-dependent
reduced density matrices. In contrast, our contribution is motivated by the
kinetic theory of the weakly nonlinear Schrodinger equation. The main
observation is that the results obtained in the latter context carry over
directly to weakly interacting quantum fluids provided one does not insist on
normal order in the Duhamel expansion. We discuss the term by term convergence
of the expansion and the equilibrium time correlation .Comment: 43 pages, corrected typos, updated assumptions in sec.
Large Deviations, the Shape of the Loss Curve, and Economies of Scale in Large Multiplexers
We analyse the queue Q L at a multiplexer with L inputs. We obtain a large deviation result, namely that under very general conditions lim L!1 L \Gamma1 log P[Q L ? Lb] = \GammaI (b) provided the offered load is held constant, where the shape function I is expressed in terms of the cumulant generating functions of the input traffic. This provides an improvement on the usual effective bandwidth approximation P[Q L ? b] e \Gammaffib , replacing it with P[Q L ? b] e \GammaLI(b=L) . The difference I(b) \Gamma ffi b determines the economies of scale which are to be obtained in large multiplexers. If the limit = \Gamma lim t!1 t t (ffi) exists (here t is the finite time cumulant of the workload process) then lim b!1 (I(b) \Gamma ffi b) = . We apply this idea to a number of examples of arrivals processes: heterogeneous superpositions, Gaussian processes, Markovian additive processes and Poisson processes. We obtain expressions for in these cases. is zero for independent arrivals, but positive for arrivals with positive correlations. Thus economies of scale are obtainable for highly bursty traffic expected in ATM multiplexing
Recommended from our members
Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups
Gravity gradient routing for information delivery in fog Wireless Sensor Networks
Fog Computing is a new paradigm that has been proposed by CISCO to take full advantage of the ever growing computational capacity of the near-user or edge devices (e.g., wireless gateways and sensors). The paradigm proposes an architecture that enables the devices to host functionality of various user-centric services. While the prospects of Fog Computing promise numerous advantages, development of Fog Services remains under-investigated. This article considers an opportunity of Fog implementation for Alert Services on top of Wireless Sensor Network (WSN) technology. In particular, we focus on targeted WSN-alert delivery based on spontaneous interaction between a WSN and hand-held devices of its users. For the alert delivery, we propose a Gravity Routing concept that prioritizes the areas of high user-presence within the network. Based on the concept, we develop a routing protocol, namely the Gradient Gravity Routing (GGR) that combines targeted delivery and resilience to potential sensor-load heterogeneity within the network. The protocol has been compared against a set of state-of-the-art solutions via a series of simulations. The evaluation has shown the ability of GGR to match the performance of the compared solutions in terms of alert delivery ratio, while minimizing the overall energy consumption of the network