The LHCb experiment is dedicated to precision measurements of CP violation and rare decays of B hadrons at the Large Hadron Collider (LHC) at CERN (Geneva). The initial configuration and expected performance of the detector and associated systems, as established by test beam measurements and simulation studies, is described.
This specification describes version 2 of the Optimized Link State Routing Protocol (OLSRv2) for Mobile Ad Hoc Networks (MANETs). Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7181.
In combinatorics and analysis of algorithms often a Poisson version of a problem (called further Poisson model or poissonization) is easier to solve than the original one, which we name here as the Bernoulli model. Poissonization is a technique that replaces the original input (e.g., think of balls thrown to urns) by a Poisson process (e.g., think of balls arriving according to a Poisson process to urns). More precisely, analytical Poisson transform maps a sequence (e.g., characterizing the Bernoulli model) into a generating function of a complex variable. However, after poissonization one must depoissonize in order to translate the results of the Poisson model into the original (i.e" Bernoulli) model. We present in this paper several analytical depoissonization results that fall into the following general scheme: if the Poisson transform has an appropriate growth in the complex plane, then an asymptotic expansion of the sequence can be expressed in terms of the Poisson transform and its derivatives evaluated on the real line. Not unexpectedly, actual formulations of depoissonization results depend on the nature of the growth , and thus we have polynomial and exponential depoissonization theorems. Renormalization (e.g., as in the central limit theorem) introduces another twist that led us to formulate the so called diagonal depoissonization theorems. Finally, we illustrate our results on numerous examples from combinatorics and the analysis of algorithms and data structures (e.g., combinatorial assemblies, digital trees, multiaccess protocols, probabilistic counting, selecting a leader, data compression, etc.).
The W-transport in the core plasma of JET is investigated experimentally by deriving the W-concentration profiles from the modelling of the signals of the soft x-ray cameras. For the case of pure neutral beam heating W accumulates in the core (r/a < 0.3) approaching W-concentrations of 10 −3 in between the sawtooth crashes, which flatten the W-profile to a concentration of about 3 × 10 −5 . When central Ion cyclotron resonant heating is additionally applied the core W-concentration decays in phases that exhibit a changed mode activity, while also the electron temperature increases and the density profile becomes less peaked. The immediate correlation between the change of magnetohydrodymanic (MHD) and the removal of W from the plasma core supports the hypothesis that the change of the MHD activity is the underlying cause for the change of transport. Furthermore, a discharge from the ASDEX Upgrade is investigated. In this case the plasma profiles exhibit small changes only, while the most prominent change occurs in the W-content of the confined plasma caused by the reduction of the fuelling deuterium gas puff. Concomintantly, the W-concentration profiles in the core plasma r/a < 0.2 steepen up reminescent to the well-known connection between central radiation and transport during cases with strong, established W-accumulation, while in the present analysis such a causality between the two during the onset of W-accumulation could not be pinned down. Both case studies exemplify that small changes of the core parameters of a plasma my influence the W-transport in the plasma core drastically.
This paper reports the progress made at JET-ILW on integrating the requirements of the reference ITER baseline scenario with normalised confinement factor of 1, at a normalised pressure of 1.8 together with partially detached divertor whilst maintaining these conditions over many energy confinement time. The 2.5MA high triangularity ELMy H-modes are studied with two different divertor configurations. The power load reduction with N seeding is reported. The relationship between an increase in energy confinement and pedestal pressure with triangularity is investigated. The operational space of both plasma configurations is studied together the ELM energy losses and stability of the pedestal of unseeded and seeded plasmas.
The Lempel-Ziv parsing scheme finds a wide range of applications, most notably in data compression and algorithms on words. It partitions a sequence of length n into variable phrases such that a new phrase is the shortest substring not seen in the past as a phrase. The parameter of interest is the number M n of phrases that one can construct from a sequence of length n.In this paper, for the memoryless source with unequal probabilities of symbols generation we derive the limiting distribution of M n which turns out to be normal. This proves a long standing open problem. In fact, to obtain this result we solved another open problem, namely, that of establishing the limiting distribution of the internal path length in a digital search tree. The latter is a consequence of an asymptotic solution of a multiplicative differentialfunctional equation often arising in the analysis of algorithms on words. Interestingly enough, our findings are proved by a combination of probabilistic techniques such as renewal equation and uniform integrability, and analytical techniques such as Mellin transform, difIerentialfunctional equations, de-Poissonlzation, and so forth. In concluding remarks we indicate a possibility of extending our results to Markovian models.'Preliminary version of this paper was presented in 26-th ACM Symposium on the Theory of Computirl9, Montreal, 1994.
Recent research has highlighted the necessity of developing routing protocols for mobile ad hoc networks where end-to-end multi-hop paths may not exist and communication routes may only be available through time and mobility. Depending on the context, these networks are commonly referred as Intermittently Connected Mobile Networks (ICNs) or Delay/Disruption Tolerant Networks (DTNs).Conversely, little is known about the inherent properties of such networks, and consequently, performance evaluations are often limited to comparative simulations (using mobility models or actual traces).The goal of this paper is to increase our understanding of possible performances of DTNs. After introducing our formal model, we use analytical tools to derive theoretical upper-bounds of the information propagation speed in wireless mobile networks. We also present some numerical simulations to illustrate the accuracy of the bounds in numerous scenarios.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.