1,980 research outputs found

    Studies on electrostatic interactions of colloidal particles under two-dimensional confinement

    Full text link
    We study the effective electrostatic interactions between a pair of charged colloidal particles without salt ions while the system is confined in two dimensions. In particular we use a simplified model to elucidate the effects of rotational fluctuations in counterion distribution. The results exhibit effective colloidal attractions under appropriate conditions. Meanwhile, long-range repulsions persist over most of our studied cases. The repulsive forces arise from the fact that in two dimensions the charged colloids cannot be perfectly screened by counterions, as the residual quadrupole moments contribute to the repulsions at longer range. And by applying multiple expansions we find that the attractive forces observed at short range are mainly contributed from electrostatic interactions among higher-order electric moments. We argue that the scenario for attractive interactions discussed in this work is applicable to systems of charged nanoparticles or colloidal solutions with macroions.Comment: 23 pages, 11 figures, 1 tabl

    Will mobile video become the killer application for 3G? - an empirical model for media convergence

    Get PDF
    Mobile carriers have continually rolled out 3G mobile video applications to increase their revenue and profits. The presumption is that video is superior to the already successful SMS, ringtones, and pictures, and can create greater value to users. However, recent market surveys revealed contradicting results. Motivated by this discrepancy, we propose in this paper a parsimonious model for user acceptance of mobile entertainment as digital convergence. Integrating research on Information Systems, Flow, and Media Psychology, we take a unique approach to user acceptance of digital convergence - platform migration. Our key proposition is that the interaction between media types and the platform-specific constraints is the key determinant of user evaluation. Particularly, users' involvement in the media is determined by both the entertaining time span on the original platform and the attentional constraint of the new platform. The mismatch between the two spans can result in lower level involvement, which in turn cause no or even negative user emotional responses. The model was tested with empirical data. We discuss the theoretical contributions, strategic and design implications, and future research directions derived from this theoretical framewor

    Constrained flow around a magnetic obstacle

    Full text link
    Many practical applications exploit an external local magnetic field -- magnetic obstacle -- as an essential part of their constructions. Recently, it has been demonstrated that the flow of an electrically conducting fluid influenced by an external field can show several kinds of recirculation. The present paper reports a 3D numerical study whose some results are compared with an experiment about such a flow in a rectangular duct.Comment: accepted to JFM, 26 pages, 14 figure

    Fatigue fracture of thin-walled structural elements under biaxial loading

    Get PDF
    An energy approach to evaluation of the subcritical fatigue crack growth period under biaxial tension of a plate with an initially rectilinear crack has been proposed. The influence of the change of such external loading parameters as: an angle between the loading axes, difference in amplitudes and frequencies, differences in the beginning of cycles (shear by please), difference in loading types (one-long-term static loading, the other – cyclic loading) has been investigated

    Precise B, B_s and B_c meson spectroscopy from full lattice QCD

    Get PDF
    We give the first accurate results for BB and BsB_s meson masses from lattice QCD including the effect of uu, dd and ss sea quarks, and we improve an earlier value for the BcB_c meson mass. By using the Highly Improved Staggered Quark action for u/du/d, ss and cc quarks and NRQCD for the bb quarks, we are able to achieve an accuracy in the masses of around 10 MeV. Our results are: mBm_B = 5.291(18) GeV, mBsm_{B_s} = 5.363(11) GeV and mBcm_{B_c} = 6.280(10) GeV. Note that all QCD parameters here are tuned from other calculations, so these are parameter free tests of QCD against experiment. We also give scalar, Bs0B_{s0}^*, and axial vector, Bs1B_{s1}, meson masses. We find these to be slightly below threshold for decay to BKBK and BKB^*K respectively.Comment: 22 pages, 19 figure

    Preserving Both Privacy and Utility in Network Trace Anonymization

    Full text link
    As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive information, e.g., network and system configuration, which may potentially be exploited for attacks. In cases where data owners are convinced to share their network traces, the data are typically subjected to certain anonymization techniques, e.g., CryptoPAn, which replaces real IP addresses with prefix-preserving pseudonyms. However, most such techniques either are vulnerable to adversaries with prior knowledge about some network flows in the traces, or require heavy data sanitization or perturbation, both of which may result in a significant loss of data utility. In this paper, we aim to preserve both privacy and utility through shifting the trade-off from between privacy and utility to between privacy and computational cost. The key idea is for the analysts to generate and analyze multiple anonymized views of the original network traces; those views are designed to be sufficiently indistinguishable even to adversaries armed with prior knowledge, which preserves the privacy, whereas one of the views will yield true analysis results privately retrieved by the data owner, which preserves the utility. We present the general approach and instantiate it based on CryptoPAn. We formally analyze the privacy of our solution and experimentally evaluate it using real network traces provided by a major ISP. The results show that our approach can significantly reduce the level of information leakage (e.g., less than 1\% of the information leaked by CryptoPAn) with comparable utility

    Seasonal variability of the warm Atlantic Water layer in the vicinity of the Greenland shelf break

    Get PDF
    The warmest water reaching the east and west coast of Greenland is found between 200?m and 600?m. Whilst important for melting Greenland's outlet glaciers, limited winter observations of this layer prohibit determination of its seasonality. To address this, temperature data from Argo profiling floats, a range of sources within the World Ocean Database and unprecedented coverage from marine-mammal borne sensors have been analysed for the period 2002-2011. A significant seasonal range in temperature (~1-2?°C) is found in the warm layer, in contrast to most of the surrounding ocean. The phase of the seasonal cycle exhibits considerable spatial variability, with the warmest water found near the eastern and southwestern shelf-break towards the end of the calendar year. High-resolution ocean model trajectory analysis suggest the timing of the arrival of the year's warmest water is a function of advection time from the subduction site in the Irminger Basin

    Expression of the neural stem cell markers NG2 and L1 in human angiomyolipoma: are angiomyolipomas neoplasms of stem cells?

    Get PDF
    Angiomyolipomas are benign tumors of the kidney which express phenotypes of smooth muscle, fat, and melanocytes. These tumors appear with increased frequency in the autosomal dominant disorder tuberous sclerosis and are the leading cause of morbidity in adults with tuberous sclerosis. While benign, these tumors are capable of provoking life threatening hemorrhage and replacement of the kidney parenchyma, resulting in renal failure. The histogenesis of these tumors is currently unclear, although currently, we believe these tumors arise from perivascular epithelioid cells of which no normal counterpart has been convincingly demonstrated. Recently, stem cell precursors have been recognized that can give rise to smooth muscle and melanocytes. These precursors have been shown to express the neural stem cell marker NG2 and L1. In order to determine whether angiomyolipomas, which exhibit smooth muscle and melanocytic phenotypes, express NG2 and L1, we performed immunocytochemistry on a cell line derived from a human angiomyolipoma, and found that these cells are uniformly positive. Immunohistochemistry of human angiomyolipoma specimens revealed uniform staining of tumor cells, while renal cell carcinomas revealed positivity only of angiogenic vessels. These results support a novel histogenesis of angiomyolipoma as a defect in differentiation of stem cell precursors

    One-carbon metabolism in cancer

    Get PDF
    Cells require one-carbon units for nucleotide synthesis, methylation and reductive metabolism, and these pathways support the high proliferative rate of cancer cells. As such, anti-folates, drugs that target one-carbon metabolism, have long been used in the treatment of cancer. Amino acids, such as serine are a major one-carbon source, and cancer cells are particularly susceptible to deprivation of one-carbon units by serine restriction or inhibition of de novo serine synthesis. Recent work has also begun to decipher the specific pathways and sub-cellular compartments that are important for one-carbon metabolism in cancer cells. In this review we summarise the historical understanding of one-carbon metabolism in cancer, describe the recent findings regarding the generation and usage of one-carbon units and explore possible future therapeutics that could exploit the dependency of cancer cells on one-carbon metabolism
    corecore