3,295 research outputs found

    Numerical methods for construction reachability sets of dynamical systems

    Full text link
    The research is devoted to the problem of reachability sets construction and representation in a control problem of a dynamical system. The paper discusses two numerical methods for construction reachability sets of dynamical systems. These methods differ in the way of representations of the reachability sets. The first method is oriented on solution of the control problem on the plane and connected with a representation of sets in the form of polygons. The second one is connected with a pixel representation of sets in the m-dimensional Euclidian space and simplicial complexes. © 2012 American Institute of Physics

    Radiation damage of the ILC positron source target

    Full text link
    The radiation damage of the positron source target for the International Linear Collider (ILC) has been studied. The displacement damage in target material due to multi-MeV photons has been calculated by combining FLUKA simulations for secondary particle production, SPECTER data for neutron displacement cross-sections and the Lindhard model for estimations of displacement damage by ions. The radiation damage of a stationary Ti6Al4V target in units of displacements per atom (dpa) has been estimated for photons from an undulator with strength 0.92 and period 1.15 cm. The calculated damage is 7 dpa. Approximately 12.5% of displacement damage result from neutrons.Comment: to appear in the proceedings of the Linear Collider Workshop 2007 and the International Linear Collider meeting 2007, DESY, Hamburg, 30 May - 3 June 200

    A new key exchange protocol based on the decomposition problem

    Get PDF
    In this paper we present a new key establishment protocol based on the decomposition problem in non-commutative groups which is: given two elements w,w1w, w_1 of the platform group GG and two subgroups A,BGA, B \subseteq G (not necessarily distinct), find elements aA,bBa \in A, b \in B such that w1=awbw_1 = a w b. Here we introduce two new ideas that improve the security of key establishment protocols based on the decomposition problem. In particular, we conceal (i.e., do not publish explicitly) one of the subgroups A,BA, B, thus introducing an additional computationally hard problem for the adversary, namely, finding the centralizer of a given finitely generated subgroup.Comment: 7 page
    corecore