64,286 research outputs found

    On the Use of Group Theoretical and Graphical Techniques toward the Solution of the General N-body Problem

    Full text link
    Group theoretic and graphical techniques are used to derive the N-body wave function for a system of identical bosons with general interactions through first-order in a perturbation approach. This method is based on the maximal symmetry present at lowest order in a perturbation series in inverse spatial dimensions. The symmetric structure at lowest order has a point group isomorphic with the S_N group, the symmetric group of N particles, and the resulting perturbation expansion of the Hamiltonian is order-by-order invariant under the permutations of the S_N group. This invariance under S_N imposes severe symmetry requirements on the tensor blocks needed at each order in the perturbation series. We show here that these blocks can be decomposed into a basis of binary tensors invariant under S_N. This basis is small (25 terms at first order in the wave function), independent of N, and is derived using graphical techniques. This checks the N^6 scaling of these terms at first order by effectively separating the N scaling problem away from the rest of the physics. The transformation of each binary tensor to the final normal coordinate basis requires the derivation of Clebsch-Gordon coefficients of S_N for arbitrary N. This has been accomplished using the group theory of the symmetric group. This achievement results in an analytic solution for the wave function, exact through first order, that scales as N^0, effectively circumventing intensive numerical work. This solution can be systematically improved with further analytic work by going to yet higher orders in the perturbation series.Comment: This paper was submitted to the Journal of Mathematical physics, and is under revie

    The dark side of I2P, a forensic analysis case study

    Get PDF
    © 2017 The Author(s). File sharing applications, which operate as a form of Peer-to-Peer (P2P) network, are popular amongst users and developers due to their heterogeneity, decentralized approach and rudimentary deployment features. However, they are also used for illegal online activities and often are infested with malicious content such as viruses and contraband material. This brings new challenges to forensic investigations in detecting, retrieving and examining the P2P applications. Within the domain of P2P applications, the Invisible Internet Project (IP2) is used to allow applications to communicate anonymously. As such, this work discusses its use by network node operators and known attacks against privacy or availability of I2P routers. Specifically, we investigate the characteristics of I2P networks in order to outline the security flaws and the issues in detecting artefacts within the I2P. Furthermore, we present a discussion on new methods to detect the presence of I2P using forensic tools and reconstruct specific I2P activities using artefacts left over by network software

    Lattice-Gas Simulations of Ternary Amphiphilic Fluid Flow in Porous Media

    Full text link
    We develop our existing two-dimensional lattice-gas model to simulate the flow of single-phase, binary-immiscible and ternary-amphiphilic fluids. This involves the inclusion of fixed obstacles on the lattice, together with the inclusion of ``no-slip'' boundary conditions. Here we report on preliminary applications of this model to the flow of such fluids within model porous media. We also construct fluid invasion boundary conditions, and the effects of invading aqueous solutions of surfactant on oil-saturated rock during imbibition and drainage are described.Comment: 9 pages, 6 figures (1 and 6 are in color), RevTeX with epsf and graphic

    Scaling of FLIC Fermions

    Get PDF
    Hadron masses are calculated in quenched lattice QCD on a variety of lattices in order to probe the scaling behavior of the Fat-Link Irrelevant Clover (FLIC) fermion action, a fat-link clover fermion action in which the purely irrelevant operators of the fermion action are constructed using APE-smeared links. The scaling analysis indicates FLIC fermions provide a new form of nonperturbative O(a) improvement where near-continuum results are obtained at finite lattice spacing.Comment: 4 pages, 1 figure, 2 tables. Figure updated and references added. Accepted for publication in Phys. Rev.

    Advanced turboprop testbed systems study. Volume 1: Testbed program objectives and priorities, drive system and aircraft design studies, evaluation and recommendations and wind tunnel test plans

    Get PDF
    The establishment of propfan technology readiness was determined and candidate drive systems for propfan application were identified. Candidate testbed aircraft were investigated for testbed aircraft suitability and four aircraft selected as possible propfan testbed vehicles. An evaluation of the four candidates was performed and the Boeing KC-135A and the Gulfstream American Gulfstream II recommended as the most suitable aircraft for test application. Conceptual designs of the two recommended aircraft were performed and cost and schedule data for the entire testbed program were generated. The program total cost was estimated and a wind tunnel program cost and schedule is generated in support of the testbed program

    Factorization fits to charmless strangeless B decays

    Full text link
    We present fits to charmless strangeless hadronic B decay data for mean branching ratios and CP-violating asymmetries using the QCD factorization model of Beneke et al. Apart from one CP-violating parameter, the model gives a very good representation of 26 measured data. We find the CKM angle alpha = (93.5 +/- 8.4 -1.3) degrees and to be quite stable to plausible "charming penguin" corrections.Comment: 4 pages, LaTeX, Minor changes to text, references adde

    Long-term source monitoring with BATSE

    Get PDF
    The uncollimated Burst and Transient Source Experiment (BATSE) large area detectors (LADs) are well suited to nearly continuous monitoring of the stronger hard x-ray sources, and time series analysis for pulsars. An overview of the analysis techniques presently being applied to the data are discussed, including representative observations of the Crab Nebula, Crab pulsar, and summaries of the sources detected to data. Results of a search for variability in the Crab Pulsar pulse profile are presented
    • …
    corecore