Search results for "Module"

showing 10 items of 226 documents

Nonperturbative gluon and ghost propagators in d = 3

2010

We study the nonperturbative gluon and ghost propagators in d=3 Yang-Mills, using the Schwinger-Dyson equations of the pinch technique. The use of the Schwinger mechanism leads to the dynamical generation of a gluon mass, which, in turn, gives rise to an infrared finite gluon propagator and ghost dressing function. The propagators obtained are in very good agreement with the results of SU(2) lattice simulations.

High Energy Physics - TheoryPhysicsParticle physicsHigh Energy Physics::LatticeHigh Energy Physics - Lattice (hep-lat)Nuclear TheoryHigh Energy Physics::PhenomenologyFísicaFOS: Physical sciencesPropagatorFunction (mathematics)GluonHigh Energy Physics - PhenomenologyHigh Energy Physics::TheoryLattice (module)High Energy Physics - Phenomenology (hep-ph)High Energy Physics - LatticeHigh Energy Physics - Theory (hep-th)Quantum electrodynamicsPinchAIP Conference Proceedings
researchProduct

Jokamiehen oikeudesta jokamiehen mahdollisuudeksi

2016

Uudenlaisten pedagogisten mallien pohjalle suunnitellut opintokokonaisuudet lisäävät yliopistojen opintotarjonnan saavutettavuutta ja antavat yksilöille paremmat mahdollisuudet elinikäiseen oppimiseen. Luokanopettajien aikuiskoulutuksessa on käynnissä laaja oppimisympäristöjen kehittymistyö, jossa e-oppimisella on näkyvä sija. Aikuisopiskelijoiden elämäntilanne luo haasteita täysipäiväiselle läsnäololle ja siitä noussut tarve on nähty Luokanopettajien aikuiskoulutuksessa myös mahdollisuutena laajentaa henkilökunnan pedagogista osaamista uudistavien e-oppimiskäytänteiden ja pedagogisten mallien suunnittelijoina, kehittäjinä ja toteuttajina. Luokanopettajien aikuiskoulutuksen 25-vuotinen taiv…

aikuiskoulutustransformational pedagogyluokanopettajatopettajankoulutuskontekstuaalis-pedagoginen oppiminenblended learning study module
researchProduct

Design, assembly and characterization of silicide-based thermoelectric modules

2016

ID: 1143 In: Energy conversion and management, 13-21. Summary: Highlights•Novel silicide-based thermoelectric modules were experimentally investigated.•The modules produced high power of 1.04 W at 405 °C and 3.24 W at 735 °C.•An estimated module efficiency of 5.3% represent the highest reported for silicide systems.AbstractSilicides have attracted considerable attention for use in thermoelectric generators due mainly to low cost, low toxicity and light weight, in contrast to conventional materials such as bismuth and lead telluride. Most reported work has focused on optimizing the materials properties while little has been done on module testing. In this work we have designed and tested mod…

Energy storageThermoelectric equipment02 engineering and technology7. Clean energyThermal expansionBismuthchemistry.chemical_compoundDegradationMagnesium silicideHigher manganese silicideSilicide0202 electrical engineering electronic engineering information engineeringHigher manganese silicidesMagnesiumThermo-Electric materialsThermal expansion mismatchDirect energy conversion[CHIM.MATE]Chemical Sciences/Material chemistryThermoelectric materialsMagnesium silicides[CHIM.THEO]Chemical Sciences/Theoretical and/or physical chemistryConversion directeFuel TechnologyThermal expansionSilicidesMaterials scienceMaximum power principleCharacterization020209 energyEnergy Engineering and Power Technologychemistry.chemical_elementMagnesium silicideThermoelectric moduleThermo-electric modulesElectronic engineering[CHIM.CRIS]Chemical Sciences/Cristallography[CHIM]Chemical SciencesManganeseRenewable Energy Sustainability and the EnvironmentEquivalent circuitsThermoelectricityEngineering physicsLead tellurideThermoelectric generatorCross-section areaNuclear Energy and EngineeringchemistryEnergy transferConventional materialsÉnergieMaterials propertiesThermoelectric generatorsMaterials testing
researchProduct

The C-terminal region of the Hot1 transcription factor binds GGGACAAA-related sequences in the promoter of its target genes

2015

Response to hyperosmotic stress in the yeast Saccharomyces cerevisiae involves the participation of the general stress response mediated by Msn2/4 transcription factors and the HOG pathway. One of the transcription factors activated through this pathway is Hot1, which contributes to the control of the expression of several genes involved in glycerol synthesis and flux, or in other functions related to adaptation to adverse conditions. This work provides new data about the interaction mechanism of this transcription factor with DNA. By means of one-hybrid and electrophoretic mobility assays, we demonstrate that the C-terminal region, which corresponds to amino acids 610-719, is the DNA-bindi…

Saccharomyces cerevisiae ProteinsRecombinant Fusion ProteinsGenes FungalMolecular Sequence DataResponse elementBiophysicsE-boxSequence alignmentSaccharomyces cerevisiaeBiologyBiochemistryConserved sequenceOsmoregulationStructural BiologyGene Expression Regulation FungalGeneticsComputer SimulationAmino Acid SequenceDNA FungalPromoter Regions GeneticMolecular BiologyTranscription factorConserved SequenceSequence DeletionCis-regulatory moduleGeneticsBinding SitesBase SequenceSequence Homology Amino AcidMembrane Transport ProteinsPromoterDNA-binding domainProtein Structure TertiaryMutationSequence AlignmentProtein BindingTranscription FactorsBiochimica et Biophysica Acta (BBA) - Gene Regulatory Mechanisms
researchProduct

A dynamic collimation and alignment system for the Helmholtz linear accelerator

2021

Review of scientific instruments 92(11), 113306 - 113306-9 (2021). doi:10.1063/5.0069824

Physicsbusiness.industryCollimated lightLinear particle accelerator620Transverse planesymbols.namesakeOpticsCryomoduleHelmholtz free energysymbolsContinuous wavePhysics::Accelerator PhysicsThermal emittanceddc:620businessInstrumentationBeam (structure)
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

Scrutinizing the Green's functions of QCD: Lattice meets Schwinger-Dyson

2009

Proceedings of the International Workshop Light Cone 2009 (LC2009): Relativistic Hadronic and Particle Physics. Sao Jose dos Campos, Brazil, July 8-13, 2009.

Quantum chromodynamicsPhysicsNuclear and High Energy PhysicsParticle physicsTruncationHigh Energy Physics::LatticeMass generationHigh Energy Physics::PhenomenologyEquations of motionFOS: Physical sciencesFísicaFunction (mathematics)Atomic and Molecular Physics and OpticsGluonHigh Energy Physics - PhenomenologyLattice (module)Theoretical physicsHigh Energy Physics::TheoryHigh Energy Physics - Phenomenology (hep-ph)Gauge theory
researchProduct

The Schur property on projective and injective tensor products

2008

The problem of whether the Schur property is passed from a Banach space to its (symmetric) projective n-fold tensor product is reformu lated in the language of polynomial ideals. As a result, a very closely related question is solved in the negative. It is also proved that the injective tensor product of infrabarrelled locally convex spaces with the Schur property has the Schur property as well.

PolynomialPure mathematicsTensor product of algebrasApplied MathematicsGeneral MathematicsTensor product of Hilbert spacesBanach spaceInjective functionAlgebraTensor productLocally convex topological vector spaceTensor product of modulesMathematics::Representation TheoryMathematicsProceedings of the American Mathematical Society
researchProduct

Wireless MAC processors: programming MAC protocols on commodity hardware

2012

Programmable wireless platforms aim at responding to the quest for wireless access flexibility and adaptability. This paper introduces the notion of wireless MAC processors. Instead of implementing a specific MAC protocol stack, Wireless MAC processors do support a set of Medium Access Control “commands” which can be run-time composed (programmed) through software-defined state machines, thus providing the desired MAC protocol operation. We clearly distinguish from related work in this area as, unlike other works which rely on dedicated DSPs or programmable hardware platforms, we experimentally prove the feasibility of the wireless MAC processor concept over ultra-cheap commodity WLAN hardw…

Chipsetbusiness.industryFirmwareComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReconfigurabilityNetwork interfacecomputer.software_genreWLAN 802.11 reconfigurabilityProtocol stackCognitive radioprogrammable MACEmbedded systemWireless lancognitive radio overlay software modules running on the host computer.WirelessbusinesscomputerWireless distribution systemComputer network
researchProduct

Nonperturbative study of the four gluon vertex

2014

In this paper we study the nonperturbative structure of the SU(3) four-gluon vertex in the Landau gauge, concentrating on contributions quadratic in the metric. We employ an approximation scheme where "one-loop" diagrams are computed using fully dressed gluon and ghost propagators, and tree-level vertices. When a suitable kinematical configuration depending on a single momentum scale $p$ is chosen, only two structures emerge: the tree-level four-gluon vertex, and a tensor orthogonal to it. A detailed numerical analysis reveals that the form factor associated with this latter tensor displays a change of sign (zero-crossing) in the deep infrared, and finally diverges logarithmically. The orig…

High Energy Physics - TheoryPhysicsQuantum chromodynamicsNuclear and High Energy PhysicsHigh Energy Physics - Lattice (hep-lat)Form factor (quantum field theory)FOS: Physical sciencesFísicaPropagatorSymmetry (physics)Vertex (geometry)MomentumHigh Energy Physics - PhenomenologyLattice (module)High Energy Physics - LatticeHigh Energy Physics - Phenomenology (hep-ph)High Energy Physics - Theory (hep-th)TensorMathematical physicsJournal of High Energy Physics
researchProduct