16,238 research outputs found
Modeling material failure with a vectorized routine
The computational aspects of modelling material failure in structural wood members are presented with particular reference to vector processing aspects. Wood members are considered to be highly orthotropic, inhomogeneous, and discontinuous due to the complex microstructure of wood material and the presence of natural growth characteristics such as knots, cracks and cross grain in wood members. The simulation of strength behavior of wood members is accomplished through the use of a special purpose finite element/fracture mechanics routine, program STARW (Strength Analysis Routine for Wood). Program STARW employs quadratic finite elements combined with singular crack tip elements in a finite element mesh. Vector processing techniques are employed in mesh generation, stiffness matrix formation, simultaneous equation solution, and material failure calculations. The paper addresses these techniques along with the time and effort requirements needed to convert existing finite element code to a vectorized version. Comparisons in execution time between vectorized and nonvectorized routines are provided
Quantifying Absorption in the Transactional Interpretation
The Transactional Interpretation offers a solution to the measurement problem
by identifying specific physical conditions precipitating the non-unitary
`measurement transition' of von Neumann. Specifically, the transition occurs as
a result of absorber response (a process lacking in the standard approach to
the theory). The purpose of this Letter is to make clear that, despite recent
claims to the contrary, the concepts of `absorber' and `absorber response,' as
well as the process of absorption, are physically and quantitatively
well-defined in the transactional picture. In addition, the Born Rule is
explicitly derived for radiative processes.Comment: Final version, accepted in International Journal of Quantum
Foundation
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the
digital domain and the physical world. Although the research community has
developed a large number of cryptographic primitives and has demonstrated their
usability in all-digital communication, many of them have not yet made their
way into the real world due to usability aspects. We aim to make another step
towards a tighter integration of digital cryptography into real world
interactions. We describe Ubic, a framework that allows users to bridge the gap
between digital cryptography and the physical world. Ubic relies on
head-mounted displays, like Google Glass, resource-friendly computer vision
techniques as well as mathematically sound cryptographic primitives to provide
users with better security and privacy guarantees. The framework covers key
cryptographic primitives, such as secure identification, document verification
using a novel secure physical document format, as well as content hiding. To
make a contribution of practical value, we focused on making Ubic as simple,
easily deployable, and user friendly as possible.Comment: In ESORICS 2014, volume 8712 of Lecture Notes in Computer Science,
pp. 56-75, Wroclaw, Poland, September 7-11, 2014. Springer, Berlin, German
A spatially explicit and quantitative vulnerability assessment of ecosystem service change in Europe
Environmental change alters ecosystem functioning and may put the provision of services to human at risk. This paper presents a spatially explicit and quantitative assessment of the corresponding vulnerability for Europe, using a new framework designed to answer multidisciplinary policy relevant questions about the vulnerability of the human-environment system to global change. Scenarios were constructed for a range of possible changes in socio-economic trends, land uses and climate. These scenarios were used as inputs in a range of ecosystem models in order to assess the response of ecosystem function as well as the changes in the services they provide. The framework was used to relate the impacts of changing ecosystem service provision for four sectors in relation to each other, and to combine them with a simple, but generic index for societal adaptive capacity. By allowing analysis of different sectors, regions and development pathways, the vulnerability assessment provides a basis for discussion between stakeholders and policymakers about sustainable management of Europe¿s natural resource
Chosen-ciphertext security from subset sum
We construct a public-key encryption (PKE) scheme whose
security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of indistinguishability against chosen-ciphertext attacks (IND-CCA) and can be used to encrypt messages of arbitrary polynomial length, improving upon a previous construction by Lyubashevsky, Palacio, and Segev (TCC 2010) which achieved only the weaker notion of semantic security (IND-CPA) and whose concrete security decreases with the length of the message being encrypted. At the core of our construction is a trapdoor technique which originates in the work of Micciancio and Peikert (Eurocrypt 2012
Non-malleable encryption: simpler, shorter, stronger
In a seminal paper, Dolev et al. [15] introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built from semantically secure (IND-CPA) encryption, as was shown in the seminal works by Pass et al. [29] and by Choi et al. [9], the latter of which provided a black-box construction. In this paper we investigate three questions related to NM-CPA security: 1. Can the rate of the construction by Choi et al. of NM-CPA from IND-CPA be improved? 2. Is it possible to achieve multi-bit NM-CPA security more efficiently from a single-bit NM-CPA scheme than from IND-CPA? 3. Is there a notion stronger than NM-CPA that has natural applications and can be achieved from IND-CPA security? We answer all three questions in the positive. First, we improve the rate in the scheme of Choi et al. by a factor O(λ), where λ is the security parameter. Still, encrypting a message of size O(λ) would require ciphertext and keys of size O(λ2) times that of the IND-CPA scheme, even in our improved scheme. Therefore, we show a more efficient domain extension technique for building a λ-bit NM-CPA scheme from a single-bit NM-CPA scheme with keys and ciphertext of size O(λ) times that of the NM-CPA one-bit scheme. To achieve our goal, we define and construct a novel type of continuous non-malleable code (NMC), called secret-state NMC, as we show that standard continuous NMCs are not enough for the natural “encode-then-encrypt-bit-by-bit” approach to work. Finally, we introduce a new security notion for public-key encryption that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA). After showing that NM-SDA is a strict strengthening of NM-CPA and allows for more applications, we nevertheless show that both of our results—(faster) construction from IND-CPA and domain extension from one-bit scheme—also hold for our stronger NM-SDA security. In particular, the notions of IND-CPA, NM-CPA, and NM-SDA security are all equivalent, lying (plausibly, strictly?) below IND-CCA securit
Investigation of Anti-Phase Asymmetric Quiet Rotor Technology
The future of urban air mobility has a well-known tall pole challenge in the form of community acceptance which largely comes from the noise. This paper presents a proposed anti-phase rotor technology that could reduce noise sources such as blade vortex interaction noise. The anti-phase rotor technology includes a rotor design with various anti-phase alternating trailing edge patterns and a rotor design with an asymmetric blade tip. Four small-scale anti-phase rotors are fabricated by 3D printing for acoustic measurements conducted in a low-speed open-circuit wind tunnel to assess the effectiveness of the proposed anti-phase rotor technology. Preliminary test results appear to be promising and indicate that the anti-phase rotor designs could be a practical means of reducing blade vortex interactions and noise. The four tested anti-phase rotor designs have peak acoustic performance depending on the RPM and thrust which suggests improved performance through design optimization could be achieved for specific mission requirements
Absolute and convective instabilities of parallel propagating circularly polarized Alfven waves: Beat instability
Ruderman and Simpson [Phys. Plasmas 11, 4178 (2004)] studied the absolute and convective decay instabilities of parallel propagating circularly polarized Alfven waves in plasmas where the sound speed c(S) is smaller than the Alfven speed upsilon(A). We extend their analysis for the beat instability which occurs in plasmas with c(S)>upsilon(A). We assume that the dimensionless amplitude of the circularly polarized Alfven wave (pump wave), a, is small. Applying Briggs' method we study the problem analytically using expansions in power series with respect to a. It is shown that the pump wave is absolutely unstable in a reference frame moving with the velocity U with respect to the rest plasma if U-lU-r, the instability is convective. The signaling problem is studied in a reference frame where the pump wave is convectively unstable. It is shown that the spatially amplifying waves exist only when the signaling frequency is in two narrow symmetric frequency bands with the widths of the order of a(3). These results enable us to extend for the case when c(S)>upsilon(A) the conclusions, previously made for the case when c(S)<upsilon(A), that circularly polarized Alfven waves propagating in the solar wind are convectively unstable in a reference frame of any spacecraft moving with the velocity not exceeding a few tens of km/s in the solar reference frame. The characteristic scale of spatial amplification for these waves exceeds 1 a.u
Parametric instabilities in magnetized multicomponent plasmas
This paper investigates the excitation of various natural modes in a
magnetized bi-ion or dusty plasma. The excitation is provided by parametrically
pumping the magnetic field. Here two ion-like species are allowed to be fully
mobile. This generalizes our previous work where the second heavy species was
taken to be stationary. Their collection of charge from the background neutral
plasma modifies the dispersion properties of the pump and excited waves. The
introduction of an extra mobile species adds extra modes to both these types of
waves. We firstly investigate the pump wave in detail, in the case where the
background magnetic field is perpendicular to the direction of propagation of
the pump wave. Then we derive the dispersion equation relating the pump to the
excited wave for modes propagating parallel to the background magnetic field.
It is found that there are a total of twelve resonant interactions allowed,
whose various growth rates are calculated and discussed.Comment: Published in May 2004; this is a late submission to the archive. 14
pages, 8 figure
- …
