2,936 research outputs found
Foot Bone in Vivo: Its Center of Mass and Centroid of Shape
This paper studies foot bone geometrical shape and its mass distribution and
establishes an assessment method of bone strength. Using spiral CT scanning,
with an accuracy of sub-millimeter, we analyze the data of 384 pieces of foot
bones in vivo and investigate the relationship between the bone's external
shape and internal structure. This analysis is explored on the bases of the
bone's center of mass and its centroid of shape. We observe the phenomenon of
superposition of center of mass and centroid of shape fairly precisely,
indicating a possible appearance of biomechanical organism. We investigate two
aspects of the geometrical shape, (i) distance between compact bone's centroid
of shape and that of the bone and (ii) the mean radius of the same density bone
issue relative to the bone's centroid of shape. These quantities are used to
interpret the influence of different physical exercises imposed on bone
strength, thereby contributing to an alternate assessment technique to bone
strength.Comment: 9 pages, 4 figure
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break
Quantum Key Distribution (QKD) protocols which employ a particular message
authentication code suggested previously. This authentication code, featuring
low key consumption, is not Information-Theoretically Secure (ITS) since for
each message the eavesdropper has intercepted she is able to send a different
message from a set of messages that she can calculate by finding collisions of
a cryptographic hash function. However, when this authentication code was
introduced it was shown to prevent straightforward Man-In-The-Middle (MITM)
attacks against QKD protocols.
In this paper, we prove that the set of messages that collide with any given
message under this authentication code contains with high probability a message
that has small Hamming distance to any other given message. Based on this fact
we present extended MITM attacks against different versions of BB84 QKD
protocols using the addressed authentication code; for three protocols we
describe every single action taken by the adversary. For all protocols the
adversary can obtain complete knowledge of the key, and for most protocols her
success probability in doing so approaches unity.
Since the attacks work against all authentication methods which allow to
calculate colliding messages, the underlying building blocks of the presented
attacks expose the potential pitfalls arising as a consequence of non-ITS
authentication in QKD-postprocessing. We propose countermeasures, increasing
the eavesdroppers demand for computational power, and also prove necessary and
sufficient conditions for upgrading the discussed authentication code to the
ITS level.Comment: 34 page
Astrobiological Complexity with Probabilistic Cellular Automata
Search for extraterrestrial life and intelligence constitutes one of the
major endeavors in science, but has yet been quantitatively modeled only rarely
and in a cursory and superficial fashion. We argue that probabilistic cellular
automata (PCA) represent the best quantitative framework for modeling
astrobiological history of the Milky Way and its Galactic Habitable Zone. The
relevant astrobiological parameters are to be modeled as the elements of the
input probability matrix for the PCA kernel. With the underlying simplicity of
the cellular automata constructs, this approach enables a quick analysis of
large and ambiguous input parameters' space. We perform a simple clustering
analysis of typical astrobiological histories and discuss the relevant boundary
conditions of practical importance for planning and guiding actual empirical
astrobiological and SETI projects. In addition to showing how the present
framework is adaptable to more complex situations and updated observational
databases from current and near-future space missions, we demonstrate how
numerical results could offer a cautious rationale for continuation of
practical SETI searches.Comment: 37 pages, 11 figures, 2 tables; added journal reference belo
Diquark Condensates and Compact Star Cooling
The effect of color superconductivity on the cooling of quark stars and
neutron stars with large quark cores is investigated. Various known and new
quark-neutrino processes are studied. As a result, stars being in the color
flavor locked (CFL) color superconducting phase cool down extremely fast. Quark
stars with no crust cool down too rapidly in disagreement with X-ray data. The
cooling of stars being in the N_f =2 color superconducting (2SC) phase with a
crust is compatible with existing X-ray data. Also the cooling history of stars
with hypothetic pion condensate nuclei and a crust does not contradict the
data.Comment: 10 pages, 5 figures, accepted for publication in Ap
Determination of the pion-nucleon coupling constant and scattering lengths
We critically evaluate the isovector GMO sum rule for forward pion-nucleon
scattering using the recent precision measurements of negatively charged
pion-proton and pion-deuteron scattering lengths from pionic atoms. We deduce
the charged-pion-nucleon coupling constant, with careful attention to
systematic and statistical uncertainties. This determination gives, directly
from data a pseudoscalar coupling constant of
14.11+-0.05(statistical)+-0.19(systematic) or a pseudovector one of 0.0783(11).
This value is intermediate between that of indirect methods and the direct
determination from backward neutron-proton differential scattering cross
sections. We also use the pionic atom data to deduce the coherent symmetric and
antisymmetric sums of the negatively charged pion-proton and pion-neutron
scattering lengths with high precision. The symmetric sum gives
0.0012+-0.0002(statistical)+-0.0008 (systematic) and the antisymmetric one
0.0895+-0.0003(statistical)+-0.0013(systematic), both in units of inverse
charged pion-mass. For the need of the present analysis, we improve the
theoretical description of the pion-deuteron scattering length.Comment: 27 pages, 5 figures, submitted to Phys. Rev. C, few modifications and
clarifications, no change in substance of the pape
Participant recruitment into a randomised controlled trial of exercise therapy for people with multiple sclerosis
The success of a clinical trial is often dependant on whether recruitment targets can be met in the required time frame. Despite an increase in research into the benefits of exercise in people with multiple sclerosis (PwMS), no trial has reported detailed data on effective recruitment strategies for large-scale randomised controlled trials. The main purpose of this report is to provide a detailed outline of recruitment strategies, rates and estimated costs in the Exercise Intervention for Multiple Sclerosis (ExIMS) trial to identify best practices for future trials involving multiple sclerosis (MS) patient recruitment
Tight Finite-Key Analysis for Quantum Cryptography
Despite enormous progress both in theoretical and experimental quantum
cryptography, the security of most current implementations of quantum key
distribution is still not established rigorously. One of the main problems is
that the security of the final key is highly dependent on the number, M, of
signals exchanged between the legitimate parties. While, in any practical
implementation, M is limited by the available resources, existing security
proofs are often only valid asymptotically for unrealistically large values of
M. Here, we demonstrate that this gap between theory and practice can be
overcome using a recently developed proof technique based on the uncertainty
relation for smooth entropies. Specifically, we consider a family of
Bennett-Brassard 1984 quantum key distribution protocols and show that security
against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure
Direct Simulation of a Solidification Benchmark Experiment
International audienceA solidification benchmark experiment is simulated using a three-dimensional cellular automaton-finite element solidification model. The experiment consists of a rectangular cavity containing a Sn-3 wt pct Pb alloy. The alloy is first melted and then solidified in the cavity. A dense array of thermocouples permits monitoring of temperatures in the cavity and in the heat exchangers surrounding the cavity. After solidification, the grain structure is revealed by metallography. X-ray radiography and inductively coupled plasma spectrometry are also conducted to access a distribution map of Pb, or macrosegregation map. The solidification model consists of solutions for heat, solute mass, and momentum conservations using the finite element method. It is coupled with a description of the development of grain structure using the cellular automaton method. A careful and direct comparison with experimental results is possible thanks to boundary conditions deduced from the temperature measurements, as well as a careful choice of the values of the material properties for simulation. Results show that the temperature maps and the macrosegregation map can only be approached with a three-dimensional simulation that includes the description of the grain structure
Nonthermal nature of incipient extremal black holes
We examine particle production from spherical bodies collapsing into extremal
Reissner-Nordstr\"om black holes. Kruskal coordinates become ill-defined in the
extremal case, but we are able to find a simple generalization of them that is
good in this limit. The extension allows us to calculate the late-time
worldline of the center of the collapsing star, thus establishing a
correspondence with a uniformly accelerated mirror in Minkowski spacetime. The
spectrum of created particles associated with such uniform acceleration is
nonthermal, indicating that a temperature is not defined. Moreover, the
spectrum contains a constant that depends on the history of the collapsing
object. At first sight this points to a violation of the no-hair theorems;
however, the expectation value of the stress-energy-momentum tensor is zero and
its variance vanishes as a power law at late times. Hence, both the no-hair
theorems and the cosmic censorship conjecture are preserved. The power-law
decay of the variance is in distinction to the exponential fall-off of a
nonextremal black hole. Therefore, although the vanishing of the stress
tensor's expectation value is consistent with a thermal state at zero
temperature, the incipient black hole does not behave as a thermal object at
any time and cannot be regarded as the thermodynamic limit of a nonextremal
black hole, regardless of the fact that the final product of collapse is
quiescent.Comment: 13 pages, 2 epsf figures, RevTeX 3. Minor changes, version published
in PR
- …
