1,520 research outputs found

    Radiation from carbon in a rocket plume mixing region with coupled convective and radiative energy fluxes and general optical thickness

    Get PDF
    Carbon radiant heat transfer from plume mixing region to base of rocket vehicl

    Computation of unsteady transonic flows through rotating and stationary cascades. 3: Acoustic far-field analysis

    Get PDF
    A small perturbation type analysis has been developed for the acoustic far field in an infinite duct extending upstream and downstream of an axial turbomachinery stage. The analysis is designed to interface with a numerical solution of the near field of the blade rows and, thereby, to provide the necessary closure condition to complete the statement of infinite duct boundary conditions for the subject problem. The present analysis differs from conventional inlet duct analyses in that a simple harmonic time dependence was not assumed, since a transient signal is generated by the numerical near-field solution and periodicity is attained only asymptotically. A description of the computer code developed to carry out the necessary convolutions numerically is included, as well as the results of a sample application using an impulsively initiated harmonic signal

    Diffusion-limited reactions and mortal random walkers in confined geometries

    Full text link
    Motivated by the diffusion-reaction kinetics on interstellar dust grains, we study a first-passage problem of mortal random walkers in a confined two-dimensional geometry. We provide an exact expression for the encounter probability of two walkers, which is evaluated in limiting cases and checked against extensive kinetic Monte Carlo simulations. We analyze the continuum limit which is approached very slowly, with corrections that vanish logarithmically with the lattice size. We then examine the influence of the shape of the lattice on the first-passage probability, where we focus on the aspect ratio dependence: Distorting the lattice always reduces the encounter probability of two walkers and can exhibit a crossover to the behavior of a genuinely one-dimensional random walk. The nature of this transition is also explained qualitatively.Comment: 18 pages, 16 figure

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    Complete physical simulation of the entangling-probe attack on the BB84 protocol

    Get PDF
    We have used deterministic single-photon two qubit (SPTQ) quantum logic to implement the most powerful individual-photon attack against the Bennett-Brassard 1984 (BB84) quantum key distribution protocol. Our measurement results, including physical source and gate errors, are in good agreement with theoretical predictions for the Renyi information obtained by Eve as a function of the errors she imparts to Alice and Bob's sifted key bits. The current experiment is a physical simulation of a true attack, because Eve has access to Bob's physical receiver module. This experiment illustrates the utility of an efficient deterministic quantum logic for performing realistic physical simulations of quantum information processing functions.Comment: 4 pages, 5 figure

    The Critical Coupling Likelihood Method: A new approach for seamless integration of environmental and operating conditions of gravitational wave detectors into gravitational wave searches

    Get PDF
    Any search effort for gravitational waves (GW) using interferometric detectors like LIGO needs to be able to identify if and when noise is coupling into the detector's output signal. The Critical Coupling Likelihood (CCL) method has been developed to characterize potential noise coupling and in the future aid GW search efforts. By testing two hypotheses about pairs of channels, CCL is able to identify undesirable coupled instrumental noise from potential GW candidates. Our preliminary results show that CCL can associate up to 80\sim 80% of observed artifacts with SNR8SNR \geq 8, to local noise sources, while reducing the duty cycle of the instrument by 15\lesssim 15%. An approach like CCL will become increasingly important as GW research moves into the Advanced LIGO era, going from the first GW detection to GW astronomy.Comment: submitted CQ

    Enhanced reaction kinetics in biological cells

    Full text link
    The cell cytoskeleton is a striking example of "active" medium driven out-of-equilibrium by ATP hydrolysis. Such activity has been shown recently to have a spectacular impact on the mechanical and rheological properties of the cellular medium, as well as on its transport properties : a generic tracer particle freely diffuses as in a standard equilibrium medium, but also intermittently binds with random interaction times to motor proteins, which perform active ballistic excursions along cytoskeletal filaments. Here, we propose for the first time an analytical model of transport limited reactions in active media, and show quantitatively how active transport can enhance reactivity for large enough tracers like vesicles. We derive analytically the average interaction time with motor proteins which optimizes the reaction rate, and reveal remarkable universal features of the optimal configuration. We discuss why active transport may be beneficial in various biological examples: cell cytoskeleton, membranes and lamellipodia, and tubular structures like axons.Comment: 10 pages, 2 figure

    Security against individual attacks for realistic quantum key distribution

    Get PDF
    I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84 protocol with the standard detection scheme (no strong reference pulse). I obtain a formula for the secure bit rate per time slot of an experimental setup which can be used to optimize the performance of existing schemes for the considered scenario.Comment: 10 pages, 4 figure

    Interaction of perceptual grouping and crossmodal temporal capture in tactile apparent-motion

    Get PDF
    Previous studies have shown that in tasks requiring participants to report the direction of apparent motion, task-irrelevant mono-beeps can "capture'' visual motion perception when the beeps occur temporally close to the visual stimuli. However, the contributions of the relative timing of multimodal events and the event structure, modulating uni- and/or crossmodal perceptual grouping, remain unclear. To examine this question and extend the investigation to the tactile modality, the current experiments presented tactile two-tap apparent-motion streams, with an SOA of 400 ms between successive, left-/right-hand middle-finger taps, accompanied by task-irrelevant, non-spatial auditory stimuli. The streams were shown for 90 seconds, and participants' task was to continuously report the perceived (left-or rightward) direction of tactile motion. In Experiment 1, each tactile stimulus was paired with an auditory beep, though odd-numbered taps were paired with an asynchronous beep, with audiotactile SOAs ranging from -75 ms to 75 ms. Perceived direction of tactile motion varied systematically with audiotactile SOA, indicative of a temporal-capture effect. In Experiment 2, two audiotactile SOAs-one short (75 ms), one long (325 ms)-were compared. The long-SOA condition preserved the crossmodal event structure (so the temporal-capture dynamics should have been similar to that in Experiment 1), but both beeps now occurred temporally close to the taps on one side (even-numbered taps). The two SOAs were found to produce opposite modulations of apparent motion, indicative of an influence of crossmodal grouping. In Experiment 3, only odd-numbered, but not even-numbered, taps were paired with auditory beeps. This abolished the temporal-capture effect and, instead, a dominant percept of apparent motion from the audiotactile side to the tactile-only side was observed independently of the SOA variation. These findings suggest that asymmetric crossmodal grouping leads to an attentional modulation of apparent motion, which inhibits crossmodal temporal-capture effects

    The LISA pathfinder mission

    Get PDF
    ISA Pathfinder (LPF), the second of the European Space Agency's Small Missions for Advanced Research in Technology (SMART), is a dedicated technology validation mission for future spaceborne gravitational wave detectors, such as the proposed eLISA mission. LISA Pathfinder, and its scientific payload - the LISA Technology Package - will test, in flight, the critical technologies required for low frequency gravitational wave detection: it will put two test masses in a near-perfect gravitational free-fall and control and measure their motion with unprecedented accuracy. This is achieved through technology comprising inertial sensors, high precision laser metrology, drag-free control and an ultra-precise micro-Newton propulsion system. LISA Pathfinder is due to be launched in mid-2015, with first results on the performance of the system being available 6 months thereafter. The paper introduces the LISA Pathfinder mission, followed by an explanation of the physical principles of measurement concept and associated hardware. We then provide a detailed discussion of the LISA Technology Package, including both the inertial sensor and interferometric readout. As we approach the launch of the LISA Pathfinder, the focus of the development is shifting towards the science operations and data analysis - this is described in the final section of the paper
    corecore