241 research outputs found

    Hawks\u27 Herald - March 22, 2004

    Get PDF

    Perturbed generalized multicritical one-matrix models

    Get PDF
    We study perturbations around the generalized Kazakov multicritical one-matrix model. The multicritical matrix model has a potential where the coefficients of znz^n only fall off as a power 1/ns+11/n^{s+1}. This implies that the potential and its derivatives have a cut along the real axis, leading to technical problems when one performs perturbations away from the generalized Kazakov model. Nevertheless it is possible to relate the perturbed partition function to the tau-function of a KdV hierarchy and solve the model by a genus expansion in the double scaling limit.Comment: 2 figure

    Analysis of Shielding Charged Particle Beams by thin Conductors

    Get PDF
    We present an analysis of shielding of electromagnetic fields excited by beams of charged particles surrounded by thin conducting layers or metal stripes inside an external structure of finite length. The ability of shielding by a layer thinner than the skin depth is explained and expressions for the impedance are derived. A previous result[1] showing preferential penetration through the shielding layer at the resonant frequencies of the surrounding structure is verified, and extended to include finite resistivity of the outer structure. Integration over the spectrum of the beam bunch shows that penetration is (nearly) independent of the quality factors of the resonances. The transition of these results to those for a geometry of infinite length requires numerical evaluation

    HASH(0x563d43f9e480)

    Get PDF
    HASH(0x563d43f23d80

    User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption

    Get PDF
    Decentralized attribute-based encryption (ABE) is a variant of multi-authority based ABE whereby any attribute authority (AA) can independently join and leave the system without collaborating with the existing AAs. In this paper, we propose a user collusion avoidance scheme which preserves the user's privacy when they interact with multiple authorities to obtain decryption credentials. The proposed scheme mitigates the well-known user collusion security vulnerability found in previous schemes. We show that our scheme relies on the standard complexity assumption (decisional bilienar Deffie-Hellman assumption). This is contrast to previous schemes which relies on non-standard assumption (q-decisional Diffie-Hellman inversion)

    The First Global Map of Atmospheric Ammonia (NH3) as Observed by the HIRAS/FY-3D Satellite

    Get PDF
    Atmospheric ammonia (NH3) is a chemically active trace gas that plays an important role in the atmospheric environment and climate change. Satellite remote sensing is a powerful technique to monitor NH3 concentration based on the absorption lines of NH3 in the thermal infrared region. In this study, we establish a retrieval algorithm to derive the NH3 column from the Hyperspectral Infrared Atmospheric Sounder (HIRAS) onboard the Chinese FengYun (FY)-3D satellite and present the first atmospheric NH3 column global map observed by the HIRAS instrument. The HIRAS observations can well capture NH3 hotspots around the world, e.g., India, West Africa, and East China, where large NH3 emissions exist. The HIRAS NH3 columns are also compared to the space-based Infrared Atmospheric Sounding Interferometer (IASI) measurements, and we find that the two instruments observe a consistent NH3 global distribution, with correlation coefficient (R) values of 0.28–0.73. Finally, some remaining issues about the HIRAS NH3 retrieval are discussed
    corecore