1,640 research outputs found
CP, T and CPT Violations in the K^0 - bar{K^0} System -- Present Status --
Possible violation of CP, T and CPT symmetries in the K^0 - bar{K^0} system
is studied in a way as phenomenological and comprehensive as possible. For this
purpose, we first introduce parameters which represent violation of these
symmetries in mixing parameters and decay amplitudes in a convenient and
well-defined way and, treating these parameters as small, derive formulas which
relate them to the experimentally measured quantities. We then perform
numerical analyses to derive constraints to these symmetry-violating
parameters, with the latest data reported by KTeV Collaboration, NA48
Collaboration and CPLEAR Collaboration, along with those compiled by Particle
Data Group, used as inputs. The result obtained by CPLEAR Collaboration from an
unconstrained fit to a time-dependent leptonic asymmetry, aided by the
Bell-Steinberger relation, enables us to determine or constrain most of the
parameters separately. It is shown among the other things that (1) CP and T
symmetries are violated definitively at least at the level of 10^{-4} in 2 pi
decays, (2) CP and T symmetries are violated at least at the level of 10^{-3}
in the K^0 - bar{K^0} mixing, and (3) CPT symmetry is at present tested to the
level of 10^{-5} at the utmost.Comment: 20 page
Modelled testbeds: Visualizing and augmenting physical testbeds with virtual resources
Testbed facilities play a major role in the study and evolution of emerging technologies, such as those related to the Internet of Things. In this work we introduce the concept of modelled testbeds, which are 3D interactive representations of physical testbeds where the addition of virtual resources mimicking the physical ones is made possible thanks to back-end infrastructure. We present the architecture of the Syndesi testbed, deployed at the premises of University of Geneva, which was used for the prototype modelled testbed. We investigate several extrapolation techniques towards realistic value assignment for virtual sensor measurements. K-fold cross validation is performed in a dataset comprising of nearly 300’000 measurements of temperature, illuminance and humidity sensors collected from the physical sensors of the Syndesi testbed, in order to evaluate the accuracy of the methods. We obtain strong results including Mean Absolute Percentage Error (MAPE) levels below 7%
Considerations on Super Poincare Algebras and their Extensions to Simple Superalgebras
We consider simple superalgebras which are a supersymmetric extension of
\fspin(s,t) in the cases where the number of odd generators does not exceed
64. All of them contain a super Poincar\'e algebra as a contraction and another
as a subalgebra. Because of the contraction property, some of these algebras
can be interpreted as de Sitter or anti de Sitter superalgebras. However, the
number of odd generators present in the contraction is not always minimal due
to the different splitting properties of the spinor representations under a
subalgebra. We consider the general case, with arbitrary dimension and
signature, and examine in detail particular examples with physical implications
in dimensions and .Comment: 16 pages, AMS-LaTeX. Version to appear in the Reviews in Mathematical
Physic
To adapt or not to adapt? Technical debt and learning driven self-adaptation for managing runtime performance
Self-adaptive system (SAS) can adapt itself to optimize various key performance indicators in response to the dynamics and uncertainty in environment. In this paper, we present Debt Learning Driven Adaptation (DLDA), an framework that dynamically determines when and whether to adapt the SAS at runtime. DLDA leverages the temporal adaptation debt, a notion derived from the technical debt metaphor, to quantify the time-varying money that the SAS carries in relation to its performance and Service Level Agreements. We designed a temporal net debt driven labeling to label whether it is economically healthier to adapt the SAS (or not) in a circumstance, based on which an online machine learning classifier learns the correlation, and then predicts whether to adapt under the future circumstances. We conducted comprehensive experiments to evaluate DLDA with two different planners, using 5 online machine learning classifiers, and in comparison to 4 state-of-the-art debt- oblivious triggering approaches. The results reveal the effectiveness and superiority of DLDA according to different metrics
Modeling Harris Current Sheets with Themis Observations
Current sheets are ubiquitous in nature. occurring in such varied locations as the solar atmosphere. the heliosphere, and the Earth's magnetosphere. The simplest current sheet is the one-dimensional Harris neutral sheet, with the lobe field strength and scale-height the only free parameters. Despite its simplicity, confirmation of the Harris sheet as a reasonable description of the Earth's current sheet has remained elusive. In early 2009 the orbits of the 5 THEMIS probes fortuitously aligned such that profiles of the Earth's current sheet could be modeled in a time dependent manner. For the few hours of alignment we have calculated the time history of the current sheet parameters (scale height and current) in the near-Earth region. during both quiet and active times. For one particular substorm. we further demonstrate good quantitative agreement with the diversion of cross tail current inferred from the Harris modeling with the ionospheric current inferred from ground magnetometer data
Improving sensor network performance with wireless energy transfer
Through recent technology advances in the field of wireless energy transmission Wireless Rechargeable Sensor Networks have emerged. In this new paradigm for wireless sensor networks a mobile entity called mobile charger (MC) traverses the network and replenishes the dissipated energy of sensors. In this work we first provide a formal definition of the charging dispatch decision problem and prove its computational hardness. We then investigate how to optimise the trade-offs of several critical aspects of the charging process such as: a) the trajectory of the charger; b) the different charging policies; c) the impact of the ratio of the energy the Mobile Charger may deliver to the sensors over the total available energy in the network. In the light of these optimisations, we then study the impact of the charging process to the network lifetime for three characteristic underlying routing protocols; a Greedy protocol, a clustering protocol and an energy balancing protocol. Finally, we propose a mobile charging protocol that locally adapts the circular trajectory of the MC to the energy dissipation rate of each sub-region of the network. We compare this protocol against several MC trajectories for all three routing families by a detailed experimental evaluation. The derived findings demonstrate significant performance gains, both with respect to the no charger case as well as the different charging alternatives; in particular, the performance improvements include the network lifetime, as well as connectivity, coverage and energy balance properties
Anti de Sitter Holography via Sekiguchi Decomposition
In the present paper we start consideration of anti de Sitter holography in
the general case of the (q+1)-dimensional anti de Sitter bulk with boundary
q-dimensional Minkowski space-time. We present the group-theoretic foundations
that are necessary in our approach. Comparing what is done for q=3 the new
element in the present paper is the presentation of the bulk space as the
homogeneous space G/H = SO(q,2)/SO(q,1), which homogeneous space was studied by
Sekiguchi.Comment: 10 pages, to appear in the Proceedings of the XI International
Workshop "Lie Theory and Its Applications in Physics", (Varna, Bulgaria, June
2015
Inter-social-networking: Accounting for multiple identities
We argue that the current approaches to online social networking give rise to numerous challenges regarding the management of the multiple facets of people’s digital identities within and around social networking sites (SNS). We propose an architecture for enabling people to better manage their SNS identities that is informed by the way the core Internet protocols developed to support interoperation of proprietary network protocols, and based on the idea of Separation of Concerns [1]. This does not require modification of existing services but is predicated on providing a connecting layer over them, both as a mechanism to address problems of privacy and identity, and to create opportunities to open up online social networking to a much richer set of possible interactions and applications.This work is supported by Horizon Digital Economy Research, RCUK grant EP/G065802/1; and by CREATe, the Centre for Copyright and New Business Models, RCUK grant AH/K000179/1. Packages and source are available under open source licenses at github.com/CREATe-centre/.This is the author accepted manuscript. The final version is available from Springer via http://dx.doi.org/10.1007/978-3-319-20367-6_2
- …
