Search results for "NLO"
showing 10 items of 285 documents
The promise of spintronics for unconventional computing
2021
Novel computational paradigms may provide the blueprint to help solving the time and energy limitations that we face with our modern computers, and provide solutions to complex problems more efficiently (with reduced time, power consumption and/or less device footprint) than is currently possible with standard approaches. Spintronics offers a promising basis for the development of efficient devices and unconventional operations for at least three main reasons: (i) the low-power requirements of spin-based devices, i.e., requiring no standby power for operation and the possibility to write information with small dynamic energy dissipation, (ii) the strong nonlinearity, time nonlocality, and/o…
Biased GraphWalks for RDF Graph Embeddings
2017
Knowledge Graphs have been recognized as a valuable source for background information in many data mining, information retrieval, natural language processing, and knowledge extraction tasks. However, obtaining a suitable feature vector representation from RDF graphs is a challenging task. In this paper, we extend the RDF2Vec approach, which leverages language modeling techniques for unsupervised feature extraction from sequences of entities. We generate sequences by exploiting local information from graph substructures, harvested by graph walks, and learn latent numerical representations of entities in RDF graphs. We extend the way we compute feature vector representations by comparing twel…
Periodontal disease associated to systemic genetic disorders
2007
A number of systemic disorders increase patient susceptibility to periodontal disease, which moreover evolves more rapidly and more aggressively. The underlying factors are mainly related to alterations in immune, endocrine and connective tissue status. These alterations are associated with different pathologies and syndromes that generate periodontal disease either as a primary manifestation or by aggravating a pre-existing condition attributable to local factors. This is where the role of bacterial plaque is subject to debate. In the presence of qualitative or quantitative cellular immune alterations, periodontal disease may manifest early on a severe localized or generalized basis - in s…
Wave propagation in 1D elastic solids in presence of long-range central interactions
2011
Abstract In this paper wave propagation in non-local elastic solids is examined in the framework of the mechanically based non-local elasticity theory established by the author in previous papers. It is shown that such a model coincides with the well-known Kroner–Eringen integral model of non-local elasticity in unbounded domains. The appeal of the proposed model is that the mechanical boundary conditions may easily be imposed because the applied pressure at the boundaries of the solid must be equilibrated by the Cauchy stress. In fact, the long-range forces between different volume elements are modelled, in the body domain, as central body forces applied to the interacting elements. It is …
Nonlocal field correlations and dynamical Casimir-Polder forces between one excited- and two ground-state atoms
2006
The problem of nonlocality in the dynamical three-body Casimir-Polder interaction between an initially excited and two ground-state atoms is considered. It is shown that the nonlocal spatial correlations of the field emitted by the excited atom during the initial part of its spontaneous decay may become manifest in the three-body interaction. The observability of this new phenomenon is discussed.
Forward dijets in proton-nucleus collisions at next-to-leading order: the real corrections
2021
Using the CGC effective theory together with the hybrid factorisation, we study forward dijet production in proton-nucleus collisions beyond leading order. In this paper, we compute the "real" next-to-leading order (NLO) corrections, i.e. the radiative corrections associated with a three-parton final state, out of which only two are being measured. To that aim, we start by revisiting our previous results for the three-parton cross-section presented in our previous paper. After some reshuffling of terms, we deduce new expressions for these results, which not only look considerably simpler, but are also physically more transparent. We also correct several errors in this process. The real NLO …
Constrained differential inclusions with nonlocal initial conditions
2017
International audience; We show existence for the perturbed sweeping process with nonlocal initial conditions under very general hypotheses. Periodic, anti-periodic, mean value and multipoints conditions are included in this study. We give abstract results for differential inclusions with nonlocal initial conditions through bounding functions and tangential conditions. Some applications to differential complementarity systems and to vector hysteresis are given.
Interfacial energy effects within the framework of strain gradient plasticity
2009
AbstractIn the framework of strain gradient plasticity, a solid body with boundary surface playing the role of a dissipative boundary layer endowed with surface tension and surface energy, is addressed. Using the so-called residual-based gradient plasticity theory, the state equations and the higher order boundary conditions are derived quite naturally for both the bulk material and the boundary layer. A phenomenological constitutive model is envisioned, in which the bulk material and the boundary layer obey (rate independent associative) coupled plasticity evolution laws, with kinematic hardening laws of differential nature for the bulk material, but of nondifferential nature for the layer…
Tiedonlouhinta kyberterrorismin torjuntakeinona
2017
Terrorismi on teknologian kehittyessä siirtynyt kyberavaruuteen ja muuntau-tunut kyberterrorismiksi. Terrorismin uhka ei enää ole vain fyysinen, sillä ky-beravaruus mahdollistaa tietoverkkojen monipuolisen käytön terroristisiin tarpeisiin. Kyberterrorismin uhka on synnyttänyt tarpeen luoda uudenlaisia torjuntakeinoja. Yksi kyberterrorismin torjuntaan käytetyistä menetelmistä on tiedonlouhinta, jonka avulla pystytään tehokkaasti löytämään ennestään tun-tematonta tietoa suurista datamäärästä. Tässä tutkielmassa tutkitaan kyberter-rorismia ilmiönä sekä tiedonlouhinnan menetelmiä ja sovelluksia kyberterro-rismin torjuntaan. Tutkielma on kirjallisuuskatsaus, joka pohjautuu alan tie-teelliseen tu…