5,013 research outputs found

    Particle displacements in the elastic deformation of amorphous materials: local fluctuations vs. non-affine field

    Full text link
    We study the local disorder in the deformation of amorphous materials by decomposing the particle displacements into a continuous, inhomogeneous field and the corresponding fluctuations. We compare these fields to the commonly used non-affine displacements in an elastically deformed 2D Lennard-Jones glass. Unlike the non-affine field, the fluctuations are very localized, and exhibit a much smaller (and system size independent) correlation length, on the order of a particle diameter, supporting the applicability of the notion of local "defects" to such materials. We propose a scalar "noise" field to characterize the fluctuations, as an additional field for extended continuum models, e.g., to describe the localized irreversible events observed during plastic deformation.Comment: Minor corrections to match the published versio

    Force Chains, Microelasticity and Macroelasticity

    Full text link
    It has been claimed that quasistatic granular materials, as well as nanoscale materials, exhibit departures from elasticity even at small loadings. It is demonstrated, using 2D and 3D models with interparticle harmonic interactions, that such departures are expected at small scales [below O(100) particle diameters], at which continuum elasticity is invalid, and vanish at large scales. The models exhibit force chains on small scales, and force and stress distributions which agree with experimental findings. Effects of anisotropy, disorder and boundary conditions are discussed as well.Comment: 4 pages, 11 figures, RevTeX 4, revised and resubmitted to Phys. Rev. Let

    Stress response inside perturbed particle assemblies

    Full text link
    The effect of structural disorder on the stress response inside three dimensional particle assemblies is studied using computer simulations of frictionless sphere packings. Upon applying a localised, perturbative force within the packings, the resulting {\it Green's} function response is mapped inside the different assemblies, thus providing an explicit view as to how the imposed perturbation is transmitted through the packing. In weakly disordered arrays, the resulting transmission of forces is of the double-peak variety, but with peak widths scaling linearly with distance from the source of the perturbation. This behaviour is consistent with an anisotropic elasticity response profile. Increasing the disorder distorts the response function until a single-peak response is obtained for fully disordered packings consistent with an isotropic description.Comment: 8 pages, 7 figure captions To appear in Granular Matte

    A Comparison of Blocking Methods for Record Linkage

    Full text link
    Record linkage seeks to merge databases and to remove duplicates when unique identifiers are not available. Most approaches use blocking techniques to reduce the computational complexity associated with record linkage. We review traditional blocking techniques, which typically partition the records according to a set of field attributes, and consider two variants of a method known as locality sensitive hashing, sometimes referred to as "private blocking." We compare these approaches in terms of their recall, reduction ratio, and computational complexity. We evaluate these methods using different synthetic datafiles and conclude with a discussion of privacy-related issues.Comment: 22 pages, 2 tables, 7 figure

    Sensitivity of the stress response function to packing preparation

    Full text link
    A granular assembly composed of a collection of identical grains may pack under different microscopic configurations with microscopic features that are sensitive to the preparation history. A given configuration may also change in response to external actions such as compression, shearing etc. We show using a mechanical response function method developed experimentally and numerically, that the macroscopic stress profiles are strongly dependent on these preparation procedures. These results were obtained for both two and three dimensions. The method reveals that, under a given preparation history, the macroscopic symmetries of the granular material is affected and in most cases significant departures from isotropy should be observed. This suggests a new path toward a non-intrusive test of granular material constitutive properties.Comment: 15 pages, 11 figures, some numerical data corrected, to appear in J. Phys. Cond. Mat. special issue on Granular Materials (M. Nicodemi Editor

    Efficient public-key cryptography with bounded leakage and tamper resilience

    Get PDF
    We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks. For signatures we obtain the first construction in the standard model; for public-key encryption we obtain the first construction free of pairing (avoiding non-interactive zero-knowledge proofs). Our constructions are based on generic building blocks, and, as we show, also admit efficient instantiations under fairly standard number-theoretic assumptions. The model of bounded tamper resistance was recently put forward by Damgård et al. (Asiacrypt 2013) as an attractive path to achieve security against arbitrary memory tampering attacks without making hardware assumptions (such as the existence of a protected self-destruct or key-update mechanism), the only restriction being on the number of allowed tampering attempts (which is a parameter of the scheme). This allows to circumvent known impossibility results for unrestricted tampering (Gennaro et al., TCC 2010), while still being able to capture realistic tampering attack

    A survey of localization in wireless sensor network

    Get PDF
    Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. And there are several challenges in some special scenarios. In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network

    Stress response function of a two-dimensional ordered packing of frictional beads

    Full text link
    We study the stress profile of an ordered two-dimensional packing of beads in response to the application of a vertical overload localized at its top surface. Disorder is introduced through the Coulombic friction between the grains which gives some indeterminacy and allows the choice of one constrained random number per grain in the calculation of the contact forces. The so-called `multi-agent' technique we use, lets us deal with systems as large as 1000×10001000\times1000 grains. We show that the average response profile has a double peaked structure. At large depth zz, the position of these peaks grows with czcz, while their widths scales like Dz\sqrt{Dz}. cc and DD are analogous to `propagation' and `diffusion' coefficients. Their values depend on that of the friction coefficient μ\mu. At small μ\mu, we get c0cμc_0-c \propto \mu and DμβD \propto \mu^\beta, with β2.5\beta \sim 2.5, which means that the peaks get closer and wider as the disorder gets larger. This behavior is qualitatively what was predicted in a model where a stochastic relation between the stress components is assumed.Comment: 7 pages, 7 figures, accepted version to Europhys. Let

    The Dynamics of Viral Marketing

    Full text link
    We present an analysis of a person-to-person recommendation network, consisting of 4 million people who made 16 million recommendations on half a million products. We observe the propagation of recommendations and the cascade sizes, which we explain by a simple stochastic model. We analyze how user behavior varies within user communities defined by a recommendation network. Product purchases follow a 'long tail' where a significant share of purchases belongs to rarely sold items. We establish how the recommendation network grows over time and how effective it is from the viewpoint of the sender and receiver of the recommendations. While on average recommendations are not very effective at inducing purchases and do not spread very far, we present a model that successfully identifies communities, product and pricing categories for which viral marketing seems to be very effective

    Modelling diffusion of innovations in a social network

    Get PDF
    A new simple model of diffusion of innovations in a social network with upgrading costs is introduced. Agents are characterized by a single real variable, their technological level. According to local information agents decide whether to upgrade their level or not balancing their possible benefit with the upgrading cost. A critical point where technological avalanches display a power-law behavior is also found. This critical point is characterized by a macroscopic observable that turns out to optimize technological growth in the stationary state. Analytical results supporting our findings are found for the globally coupled case.Comment: 4 pages, 5 figures. Final version accepted in PR
    corecore