首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
The parameters revealing the collective behavior of hadronic matter extracted from the transverse momentum spectra of π+, π, K+, K, p, p¯, Ks0, Λ, Λ¯, Ξ or Ξ, Ξ¯+ and Ω or Ω¯+ or Ω+Ω¯ produced in the most central and most peripheral gold–gold (AuAu), copper–copper (CuCu) and lead–lead (PbPb) collisions at 62.4 GeV, 200 GeV and 2760 GeV, respectively, are reported. In addition to studying the nucleus–nucleus (AA) collisions, we analyzed the particles mentioned above produced in pp collisions at the same center of mass energies (62.4 GeV, 200 GeV and 2760 GeV) to compare with the most peripheral AA collisions. We used the Tsallis–Pareto type function to extract the effective temperature from the transverse momentum spectra of the particles. The effective temperature is slightly larger in a central collision than in a peripheral collision and is mass-dependent. The mean transverse momentum and the multiplicity parameter (N0) are extracted and have the same result as the effective temperature. All three extracted parameters in pp collisions are closer to the peripheral AA collisions at the same center of mass energy, revealing that the extracted parameters have the same thermodynamic nature. Furthermore, we report that the mean transverse momentum in the PbPb collision is larger than that of the AuAu and CuCu collisions. At the same time, the latter two are nearly equal, which shows their comparatively strong dependence on energy and weak dependence on the size of the system. The multiplicity parameter, N0 in central AA, depends on the interacting system’s size and is larger for the bigger system.  相似文献   

4.
We use Magnetospheric Multiscale (MMS) data to study electron kinetic entropy per particle Se across Earth’s quasi-perpendicular bow shock. We have selected 22 shock crossings covering a wide range of shock conditions. Measured distribution functions are calibrated and corrected for spacecraft potential, secondary electron contamination, lack of measurements at the lowest energies and electron density measurements based on plasma frequency measurements. All crossings display an increase in electron kinetic entropy across the shock ΔSe being positive or zero within their error margin. There is a strong dependence of ΔSe on the change in electron temperature, ΔTe, and the upstream electron plasma beta, βe. Shocks with large ΔTe have large ΔSe. Shocks with smaller βe are associated with larger ΔSe. We use the values of ΔSe, ΔTe and density change Δne to determine the effective adiabatic index of electrons for each shock crossing. The average effective adiabatic index is γe=1.64±0.07.  相似文献   

5.
6.
7.
A double-sided variant of the information bottleneck method is considered. Let (X,Y) be a bivariate source characterized by a joint pmf PXY. The problem is to find two independent channels PU|X and PV|Y (setting the Markovian structure UXYV), that maximize I(U;V) subject to constraints on the relevant mutual information expressions: I(U;X) and I(V;Y). For jointly Gaussian X and Y, we show that Gaussian channels are optimal in the low-SNR regime but not for general SNR. Similarly, it is shown that for a doubly symmetric binary source, binary symmetric channels are optimal when the correlation is low and are suboptimal for high correlations. We conjecture that Z and S channels are optimal when the correlation is 1 (i.e., X=Y) and provide supporting numerical evidence. Furthermore, we present a Blahut–Arimoto type alternating maximization algorithm and demonstrate its performance for a representative setting. This problem is closely related to the domain of biclustering.  相似文献   

8.
9.
We show that neural networks with an absolute value activation function and with network path norm, network sizes and network weights having logarithmic dependence on 1/ε can ε-approximate functions that are analytic on certain regions of Cd.  相似文献   

10.
Carbon capture and sequestration are the major applied techniques for mitigating CO2 emission. The marked affinity of carbon dioxide to react with amino groups is well known, and the amine scrubbing process is the most widespread technology. Among various compounds and solutions containing amine groups, in biodegradability and biocompatibility perspectives, amino acid ionic liquids (AAILs) are a very promising class of materials having good CO2 absorption capacity. The reaction of amines with CO2 follows a multi-step mechanism where the initial pathway is the formation of the CN bond between the NH2 group and CO2. The added product has a zwitterionic character and can rearrange to give a carbamic derivative. These steps of the mechanism have been investigated in the present study by quantum mechanical methods by considering three ILs where amino acid anions are coupled with choline cations. Glycinate, L-phenylalanilate and L-prolinate anions have been compared with the aim of examining if different local structural properties of the amine group can affect some fundamental steps of the CO2 absorption mechanism. All reaction pathways have been studied by DFT methods considering, first, isolated anions in a vacuum as well as in a liquid continuum environment. Subsequently, the role of specific interactions of the anion with a choline cation has been investigated, analyzing the mechanism of the amine–CO2 reaction, including different coupling anion–cation structures. The overall reaction is exothermic for the three anions in all models adopted; however, the presence of the solvent, described by a continuum medium as well as by models, including specific cation- -anion interactions, modifies the values of the reaction energies of each step. In particular, both reaction steps, the addition of CO2 to form the zwitterionic complex and its subsequent rearrangement, are affected by the presence of the solvent. The reaction enthalpies for the three systems are indeed found comparable in the models, including solvent effects.  相似文献   

11.
This paper systematically presents the λ-deformation as the canonical framework of deformation to the dually flat (Hessian) geometry, which has been well established in information geometry. We show that, based on deforming the Legendre duality, all objects in the Hessian case have their correspondence in the λ-deformed case: λ-convexity, λ-conjugation, λ-biorthogonality, λ-logarithmic divergence, λ-exponential and λ-mixture families, etc. In particular, λ-deformation unifies Tsallis and Rényi deformations by relating them to two manifestations of an identical λ-exponential family, under subtractive or divisive probability normalization, respectively. Unlike the different Hessian geometries of the exponential and mixture families, the λ-exponential family, in turn, coincides with the λ-mixture family after a change of random variables. The resulting statistical manifolds, while still carrying a dualistic structure, replace the Hessian metric and a pair of dually flat conjugate affine connections with a conformal Hessian metric and a pair of projectively flat connections carrying constant (nonzero) curvature. Thus, λ-deformation is a canonical framework in generalizing the well-known dually flat Hessian structure of information geometry.  相似文献   

12.
13.
In this paper, we present a new method for the construction of maximally entangled states in CdCd when d2d. A systematic way of constructing a set of maximally entangled bases (MEBs) in CdCd was established. Both cases when d is divisible by d and not divisible by d are discussed. We give two examples of maximally entangled bases in C2C4, which are mutually unbiased bases. Finally, we found a new example of an unextendible maximally entangled basis (UMEB) in C2C5.  相似文献   

14.
In CRYPTO 2019, Chen et al. showed how to construct pseudorandom functions (PRFs) from random permutations (RPs), and they gave one beyond-birthday secure construction from sum of Even-Mansour, namely SoEM22 in the single-key setting. In this paper, we improve their work by proving the multi-key security of SoEM22, and further tweaking SoEM22 but still preserving beyond birthday bound (BBB) security. Furthermore, we use only one random permutation to construct parallelizable and succinct beyond-birthday secure PRFs in the multi-key setting, and then tweak this new construction. Moreover, with a slight modification of our constructions of tweakable PRFs, two parallelizable nonce based MACs for variable length messages are obtained.  相似文献   

15.
The review deals with a novel approach (MNEQT) to nonequilibrium thermodynamics (NEQT) that is based on the concept of internal equilibrium (IEQ) in an enlarged state space SZ involving internal variables as additional state variables. The IEQ macrostates are unique in SZ and have no memory just as EQ macrostates are in the EQ state space SXSZ. The approach provides a clear strategy to identify the internal variables for any model through several examples. The MNEQT deals directly with system-intrinsic quantities, which are very useful as they fully describe irreversibility. Because of this, MNEQT solves a long-standing problem in NEQT of identifying a unique global temperature T of a system, thus fulfilling Planck’s dream of a global temperature for any system, even if it is not uniform such as when it is driven between two heat baths; T has the conventional interpretation of satisfying the Clausius statement that the exchange macroheatdeQflows from hot to cold, and other sensible criteria expected of a temperature. The concept of the generalized macroheat dQ=deQ+diQ converts the Clausius inequality dSdeQ/T0 for a system in a medium at temperature T0 into the Clausius equalitydSdQ/T, which also covers macrostates with memory, and follows from the extensivity property. The equality also holds for a NEQ isolated system. The novel approach is extremely useful as it also works when no internal state variables are used to study nonunique macrostates in the EQ state space SX at the expense of explicit time dependence in the entropy that gives rise to memory effects. To show the usefulness of the novel approach, we give several examples such as irreversible Carnot cycle, friction and Brownian motion, the free expansion, etc.  相似文献   

16.
17.
We report an analysis of the distribution of lengths of plant DNA (exons). Three species of Cucurbitaceae were investigated. In our study, we used two distinct κ distribution functions, namely, κ-Maxwellian and double-κ, to fit the length distributions. To determine which distribution has the best fitting, we made a Bayesian analysis of the models. Furthermore, we filtered the data, removing outliers, through a box plot analysis. Our findings show that the sum of κ-exponentials is the most appropriate to adjust the distribution curves and that the values of the κ parameter do not undergo considerable changes after filtering. Furthermore, for the analyzed species, there is a tendency for the κ parameter to lay within the interval (0.27;0.43).  相似文献   

18.
Private Information Retrieval (PIR) protocols, which allow the client to obtain data from servers without revealing its request, have many applications such as anonymous communication, media streaming, blockchain security, advertisement, etc. Multi-server PIR protocols, where the database is replicated among the non-colluding servers, provide high efficiency in the information-theoretic setting. Beimel et al. in CCC 12’ (further referred to as BIKO) put forward a paradigm for constructing multi-server PIR, capturing several previous constructions for k3 servers, as well as improving the best-known share complexity for 3-server PIR. A key component there is a share conversion scheme from corresponding linear three-party secret sharing schemes with respect to a certain type of “modified universal” relation. In a useful particular instantiation of the paradigm, they used a share conversion from (2,3)-CNF over Zm to three-additive sharing over Zpβ for primes p1,p2,p where p1p2 and m=p1·p2, and the relation is modified universal relation CSm. They reduced the question of the existence of the share conversion for a triple (p1,p2,p) to the (in)solvability of a certain linear system over Zp, and provided an efficient (in m,logp) construction of such a sharing scheme. Unfortunately, the size of the system is Θ(m2) which entails the infeasibility of a direct solution for big m’s in practice. Paskin-Cherniavsky and Schmerler in 2019 proved the existence of the conversion for the case of odd p1, p2 when p=p1, obtaining in this way infinitely many parameters for which the conversion exists, but also for infinitely many of them it remained open. In this work, using some algebraic techniques from the work of Paskin-Cherniavsky and Schmerler, we prove the existence of the conversion for even m’s in case p=2 (we computed β in this case) and the absence of the conversion for even m’s in case p>2. This does not improve the concrete efficiency of 3-server PIR; however, our result is promising in a broader context of constructing PIR through composition techniques with k3 servers, using the relation CSm where m has more than two prime divisors. Another our suggestion about 3-server PIR is that it’s possible to achieve a shorter server’s response using the relation CSm for extended SmSm. By computer search, in BIKO framework we found several such sets for small m’s which result in share conversion from (2,3)-CNF over Zm to 3-additive secret sharing over Zpβ, where β>0 is several times less than β, which implies several times shorter server’s response. We also suggest that such extended sets Sm can result in better PIR due to the potential existence of matching vector families with the higher Vapnik-Chervonenkis dimension.  相似文献   

19.
20.
This study deals with drift parameters estimation problems in the sub-fractional Vasicek process given by dxt=θ(μxt)dt+dStH, with θ>0, μR being unknown and t0; here, SH represents a sub-fractional Brownian motion (sfBm). We introduce new estimators θ^ for θ and μ^ for μ based on discrete time observations and use techniques from Nordin–Peccati analysis. For the proposed estimators θ^ and μ^, strong consistency and the asymptotic normality were established by employing the properties of SH. Moreover, we provide numerical simulations for sfBm and related Vasicek-type process with different values of the Hurst index H.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号