2,936 research outputs found

    Foot Bone in Vivo: Its Center of Mass and Centroid of Shape

    Get PDF
    This paper studies foot bone geometrical shape and its mass distribution and establishes an assessment method of bone strength. Using spiral CT scanning, with an accuracy of sub-millimeter, we analyze the data of 384 pieces of foot bones in vivo and investigate the relationship between the bone's external shape and internal structure. This analysis is explored on the bases of the bone's center of mass and its centroid of shape. We observe the phenomenon of superposition of center of mass and centroid of shape fairly precisely, indicating a possible appearance of biomechanical organism. We investigate two aspects of the geometrical shape, (i) distance between compact bone's centroid of shape and that of the bone and (ii) the mean radius of the same density bone issue relative to the bone's centroid of shape. These quantities are used to interpret the influence of different physical exercises imposed on bone strength, thereby contributing to an alternate assessment technique to bone strength.Comment: 9 pages, 4 figure

    Attacks on quantum key distribution protocols that employ non-ITS authentication

    Full text link
    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD-postprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.Comment: 34 page

    Astrobiological Complexity with Probabilistic Cellular Automata

    Full text link
    Search for extraterrestrial life and intelligence constitutes one of the major endeavors in science, but has yet been quantitatively modeled only rarely and in a cursory and superficial fashion. We argue that probabilistic cellular automata (PCA) represent the best quantitative framework for modeling astrobiological history of the Milky Way and its Galactic Habitable Zone. The relevant astrobiological parameters are to be modeled as the elements of the input probability matrix for the PCA kernel. With the underlying simplicity of the cellular automata constructs, this approach enables a quick analysis of large and ambiguous input parameters' space. We perform a simple clustering analysis of typical astrobiological histories and discuss the relevant boundary conditions of practical importance for planning and guiding actual empirical astrobiological and SETI projects. In addition to showing how the present framework is adaptable to more complex situations and updated observational databases from current and near-future space missions, we demonstrate how numerical results could offer a cautious rationale for continuation of practical SETI searches.Comment: 37 pages, 11 figures, 2 tables; added journal reference belo

    Diquark Condensates and Compact Star Cooling

    Full text link
    The effect of color superconductivity on the cooling of quark stars and neutron stars with large quark cores is investigated. Various known and new quark-neutrino processes are studied. As a result, stars being in the color flavor locked (CFL) color superconducting phase cool down extremely fast. Quark stars with no crust cool down too rapidly in disagreement with X-ray data. The cooling of stars being in the N_f =2 color superconducting (2SC) phase with a crust is compatible with existing X-ray data. Also the cooling history of stars with hypothetic pion condensate nuclei and a crust does not contradict the data.Comment: 10 pages, 5 figures, accepted for publication in Ap

    Determination of the pion-nucleon coupling constant and scattering lengths

    Get PDF
    We critically evaluate the isovector GMO sum rule for forward pion-nucleon scattering using the recent precision measurements of negatively charged pion-proton and pion-deuteron scattering lengths from pionic atoms. We deduce the charged-pion-nucleon coupling constant, with careful attention to systematic and statistical uncertainties. This determination gives, directly from data a pseudoscalar coupling constant of 14.11+-0.05(statistical)+-0.19(systematic) or a pseudovector one of 0.0783(11). This value is intermediate between that of indirect methods and the direct determination from backward neutron-proton differential scattering cross sections. We also use the pionic atom data to deduce the coherent symmetric and antisymmetric sums of the negatively charged pion-proton and pion-neutron scattering lengths with high precision. The symmetric sum gives 0.0012+-0.0002(statistical)+-0.0008 (systematic) and the antisymmetric one 0.0895+-0.0003(statistical)+-0.0013(systematic), both in units of inverse charged pion-mass. For the need of the present analysis, we improve the theoretical description of the pion-deuteron scattering length.Comment: 27 pages, 5 figures, submitted to Phys. Rev. C, few modifications and clarifications, no change in substance of the pape

    Dialogue with a County Agent

    Get PDF

    Participant recruitment into a randomised controlled trial of exercise therapy for people with multiple sclerosis

    Get PDF
    The success of a clinical trial is often dependant on whether recruitment targets can be met in the required time frame. Despite an increase in research into the benefits of exercise in people with multiple sclerosis (PwMS), no trial has reported detailed data on effective recruitment strategies for large-scale randomised controlled trials. The main purpose of this report is to provide a detailed outline of recruitment strategies, rates and estimated costs in the Exercise Intervention for Multiple Sclerosis (ExIMS) trial to identify best practices for future trials involving multiple sclerosis (MS) patient recruitment

    Tight Finite-Key Analysis for Quantum Cryptography

    Get PDF
    Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final key is highly dependent on the number, M, of signals exchanged between the legitimate parties. While, in any practical implementation, M is limited by the available resources, existing security proofs are often only valid asymptotically for unrealistically large values of M. Here, we demonstrate that this gap between theory and practice can be overcome using a recently developed proof technique based on the uncertainty relation for smooth entropies. Specifically, we consider a family of Bennett-Brassard 1984 quantum key distribution protocols and show that security against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure

    Direct Simulation of a Solidification Benchmark Experiment

    No full text
    International audienceA solidification benchmark experiment is simulated using a three-dimensional cellular automaton-finite element solidification model. The experiment consists of a rectangular cavity containing a Sn-3 wt pct Pb alloy. The alloy is first melted and then solidified in the cavity. A dense array of thermocouples permits monitoring of temperatures in the cavity and in the heat exchangers surrounding the cavity. After solidification, the grain structure is revealed by metallography. X-ray radiography and inductively coupled plasma spectrometry are also conducted to access a distribution map of Pb, or macrosegregation map. The solidification model consists of solutions for heat, solute mass, and momentum conservations using the finite element method. It is coupled with a description of the development of grain structure using the cellular automaton method. A careful and direct comparison with experimental results is possible thanks to boundary conditions deduced from the temperature measurements, as well as a careful choice of the values of the material properties for simulation. Results show that the temperature maps and the macrosegregation map can only be approached with a three-dimensional simulation that includes the description of the grain structure

    Nonthermal nature of incipient extremal black holes

    Get PDF
    We examine particle production from spherical bodies collapsing into extremal Reissner-Nordstr\"om black holes. Kruskal coordinates become ill-defined in the extremal case, but we are able to find a simple generalization of them that is good in this limit. The extension allows us to calculate the late-time worldline of the center of the collapsing star, thus establishing a correspondence with a uniformly accelerated mirror in Minkowski spacetime. The spectrum of created particles associated with such uniform acceleration is nonthermal, indicating that a temperature is not defined. Moreover, the spectrum contains a constant that depends on the history of the collapsing object. At first sight this points to a violation of the no-hair theorems; however, the expectation value of the stress-energy-momentum tensor is zero and its variance vanishes as a power law at late times. Hence, both the no-hair theorems and the cosmic censorship conjecture are preserved. The power-law decay of the variance is in distinction to the exponential fall-off of a nonextremal black hole. Therefore, although the vanishing of the stress tensor's expectation value is consistent with a thermal state at zero temperature, the incipient black hole does not behave as a thermal object at any time and cannot be regarded as the thermodynamic limit of a nonextremal black hole, regardless of the fact that the final product of collapse is quiescent.Comment: 13 pages, 2 epsf figures, RevTeX 3. Minor changes, version published in PR
    corecore