5,013 research outputs found
Particle displacements in the elastic deformation of amorphous materials: local fluctuations vs. non-affine field
We study the local disorder in the deformation of amorphous materials by
decomposing the particle displacements into a continuous, inhomogeneous field
and the corresponding fluctuations. We compare these fields to the commonly
used non-affine displacements in an elastically deformed 2D Lennard-Jones
glass. Unlike the non-affine field, the fluctuations are very localized, and
exhibit a much smaller (and system size independent) correlation length, on the
order of a particle diameter, supporting the applicability of the notion of
local "defects" to such materials. We propose a scalar "noise" field to
characterize the fluctuations, as an additional field for extended continuum
models, e.g., to describe the localized irreversible events observed during
plastic deformation.Comment: Minor corrections to match the published versio
Force Chains, Microelasticity and Macroelasticity
It has been claimed that quasistatic granular materials, as well as nanoscale
materials, exhibit departures from elasticity even at small loadings. It is
demonstrated, using 2D and 3D models with interparticle harmonic interactions,
that such departures are expected at small scales [below O(100) particle
diameters], at which continuum elasticity is invalid, and vanish at large
scales. The models exhibit force chains on small scales, and force and stress
distributions which agree with experimental findings. Effects of anisotropy,
disorder and boundary conditions are discussed as well.Comment: 4 pages, 11 figures, RevTeX 4, revised and resubmitted to Phys. Rev.
Let
Stress response inside perturbed particle assemblies
The effect of structural disorder on the stress response inside three
dimensional particle assemblies is studied using computer simulations of
frictionless sphere packings. Upon applying a localised, perturbative force
within the packings, the resulting {\it Green's} function response is mapped
inside the different assemblies, thus providing an explicit view as to how the
imposed perturbation is transmitted through the packing. In weakly disordered
arrays, the resulting transmission of forces is of the double-peak variety, but
with peak widths scaling linearly with distance from the source of the
perturbation. This behaviour is consistent with an anisotropic elasticity
response profile. Increasing the disorder distorts the response function until
a single-peak response is obtained for fully disordered packings consistent
with an isotropic description.Comment: 8 pages, 7 figure captions To appear in Granular Matte
A Comparison of Blocking Methods for Record Linkage
Record linkage seeks to merge databases and to remove duplicates when unique
identifiers are not available. Most approaches use blocking techniques to
reduce the computational complexity associated with record linkage. We review
traditional blocking techniques, which typically partition the records
according to a set of field attributes, and consider two variants of a method
known as locality sensitive hashing, sometimes referred to as "private
blocking." We compare these approaches in terms of their recall, reduction
ratio, and computational complexity. We evaluate these methods using different
synthetic datafiles and conclude with a discussion of privacy-related issues.Comment: 22 pages, 2 tables, 7 figure
Sensitivity of the stress response function to packing preparation
A granular assembly composed of a collection of identical grains may pack
under different microscopic configurations with microscopic features that are
sensitive to the preparation history. A given configuration may also change in
response to external actions such as compression, shearing etc. We show using a
mechanical response function method developed experimentally and numerically,
that the macroscopic stress profiles are strongly dependent on these
preparation procedures. These results were obtained for both two and three
dimensions. The method reveals that, under a given preparation history, the
macroscopic symmetries of the granular material is affected and in most cases
significant departures from isotropy should be observed. This suggests a new
path toward a non-intrusive test of granular material constitutive properties.Comment: 15 pages, 11 figures, some numerical data corrected, to appear in J.
Phys. Cond. Mat. special issue on Granular Materials (M. Nicodemi Editor
Efficient public-key cryptography with bounded leakage and tamper resilience
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks. For signatures we obtain the first construction in the standard model; for public-key encryption we obtain the first construction free of pairing (avoiding non-interactive zero-knowledge proofs). Our constructions are based on generic building blocks, and, as we show, also admit efficient instantiations under fairly standard number-theoretic assumptions.
The model of bounded tamper resistance was recently put forward by Damgård et al. (Asiacrypt 2013) as an attractive path to achieve security against arbitrary memory tampering attacks without making hardware assumptions (such as the existence of a protected self-destruct or key-update mechanism), the only restriction being on the number of allowed tampering attempts (which is a parameter of the scheme). This allows to circumvent known impossibility results for unrestricted tampering (Gennaro et al., TCC 2010), while still being able to capture realistic tampering attack
A survey of localization in wireless sensor network
Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. And there are several challenges in some special scenarios. In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network
Stress response function of a two-dimensional ordered packing of frictional beads
We study the stress profile of an ordered two-dimensional packing of beads in
response to the application of a vertical overload localized at its top
surface. Disorder is introduced through the Coulombic friction between the
grains which gives some indeterminacy and allows the choice of one constrained
random number per grain in the calculation of the contact forces. The so-called
`multi-agent' technique we use, lets us deal with systems as large as
grains. We show that the average response profile has a double
peaked structure. At large depth , the position of these peaks grows with
, while their widths scales like . and are analogous to
`propagation' and `diffusion' coefficients. Their values depend on that of the
friction coefficient . At small , we get and , with , which means that the peaks get
closer and wider as the disorder gets larger. This behavior is qualitatively
what was predicted in a model where a stochastic relation between the stress
components is assumed.Comment: 7 pages, 7 figures, accepted version to Europhys. Let
The Dynamics of Viral Marketing
We present an analysis of a person-to-person recommendation network,
consisting of 4 million people who made 16 million recommendations on half a
million products. We observe the propagation of recommendations and the cascade
sizes, which we explain by a simple stochastic model. We analyze how user
behavior varies within user communities defined by a recommendation network.
Product purchases follow a 'long tail' where a significant share of purchases
belongs to rarely sold items. We establish how the recommendation network grows
over time and how effective it is from the viewpoint of the sender and receiver
of the recommendations. While on average recommendations are not very effective
at inducing purchases and do not spread very far, we present a model that
successfully identifies communities, product and pricing categories for which
viral marketing seems to be very effective
Modelling diffusion of innovations in a social network
A new simple model of diffusion of innovations in a social network with
upgrading costs is introduced. Agents are characterized by a single real
variable, their technological level. According to local information agents
decide whether to upgrade their level or not balancing their possible benefit
with the upgrading cost. A critical point where technological avalanches
display a power-law behavior is also found. This critical point is
characterized by a macroscopic observable that turns out to optimize
technological growth in the stationary state. Analytical results supporting our
findings are found for the globally coupled case.Comment: 4 pages, 5 figures. Final version accepted in PR
- …
