-
Formulation of the partition functions and magnetization for two-dimensional nearest neighbour Ising models for finite and infinite lattice sites
Authors:
Anshu Priya,
M V Sangaranarayanan
Abstract:
Using a combinatorial method, the partition functions for two-dimensional nearest neighbour Ising models have been derived for a square lattice of 16 sites in the presence of the magnetic field. A novel hierarchical method of enumeration of all the configurations for any arrangement of sites has been proposed. This enumeration has been executed by a systematic analysis of the appropriate diagrams…
▽ More
Using a combinatorial method, the partition functions for two-dimensional nearest neighbour Ising models have been derived for a square lattice of 16 sites in the presence of the magnetic field. A novel hierarchical method of enumeration of all the configurations for any arrangement of sites has been proposed. This enumeration has been executed by a systematic analysis of the appropriate diagrams without employing any algorithmic approach or computational tools. The resulting algebraic eqn in terms of the magnetic field and nearest neighbour interaction energies may then provide a methodology for deducing the magnetization in the thermodynamic limit of infinite sites. A semi-empirical eqn for magnetization is proposed for non-zero magnetic fields.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
BioSimulators: a central registry of simulation engines and services for recommending specific tools
Authors:
Bilal Shaikh,
Lucian P. Smith,
Dan Vasilescu,
Gnaneswara Marupilla,
Michael Wilson,
Eran Agmon,
Henry Agnew,
Steven S. Andrews,
Azraf Anwar,
Moritz E. Beber,
Frank T. Bergmann,
David Brooks,
Lutz Brusch,
Laurence Calzone,
Kiri Choi,
Joshua Cooper,
John Detloff,
Brian Drawert,
Michel Dumontier,
G. Bard Ermentrout,
James R. Faeder,
Andrew P. Freiburger,
Fabian Fröhlich,
Akira Funahashi,
Alan Garny
, et al. (46 additional authors not shown)
Abstract:
Computational models have great potential to accelerate bioscience, bioengineering, and medicine. However, it remains challenging to reproduce and reuse simulations, in part, because the numerous formats and methods for simulating various subsystems and scales remain siloed by different software tools. For example, each tool must be executed through a distinct interface. To help investigators find…
▽ More
Computational models have great potential to accelerate bioscience, bioengineering, and medicine. However, it remains challenging to reproduce and reuse simulations, in part, because the numerous formats and methods for simulating various subsystems and scales remain siloed by different software tools. For example, each tool must be executed through a distinct interface. To help investigators find and use simulation tools, we developed BioSimulators (https://biosimulators.org), a central registry of the capabilities of simulation tools and consistent Python, command-line, and containerized interfaces to each version of each tool. The foundation of BioSimulators is standards, such as CellML, SBML, SED-ML, and the COMBINE archive format, and validation tools for simulation projects and simulation tools that ensure these standards are used consistently. To help modelers find tools for particular projects, we have also used the registry to develop recommendation services. We anticipate that BioSimulators will help modelers exchange, reproduce, and combine simulations.
△ Less
Submitted 13 March, 2022;
originally announced March 2022.
-
Hidden Conformal Symmetries from Killing Towers with an Application to Large-D/CFT
Authors:
Cynthia Keeler,
Victoria Martin,
Alankrita Priya
Abstract:
We generalize the notion of hidden conformal symmetry in Kerr/CFT to Kerr-(A)dS black holes in arbitrary dimensions. We build the SL(2, R) generators directly from the Killing tower, whose Killing tensors and Killing vectors enforce the separability of the equations of motion. Our construction amounts to an explicit relationship between hidden conformal symmetries and Killing tensors: we use the K…
▽ More
We generalize the notion of hidden conformal symmetry in Kerr/CFT to Kerr-(A)dS black holes in arbitrary dimensions. We build the SL(2, R) generators directly from the Killing tower, whose Killing tensors and Killing vectors enforce the separability of the equations of motion. Our construction amounts to an explicit relationship between hidden conformal symmetries and Killing tensors: we use the Killing tower to build a novel tensor equation connecting the SL(2,R) Casimir with the radial Klein-Gordon operator. For asymptotically flat black holes in four and five dimensions we recover previously known results that were obtained using the "near-region" limit and the monodromy method. We then perform a monodromy evaluation of the Klein-Gordon scalar wave equation for all Kerr-(A)dS black holes, finding explicit forms for the zero mode symmetry generators. We also extend this analysis to the large-dimensional Schwarzschild black hole as a step towards buliding a Large-D/CFT correspondence.
△ Less
Submitted 30 March, 2022; v1 submitted 20 October, 2021;
originally announced October 2021.
-
Black hole one-loop determinants in the large dimension limit
Authors:
Cynthia Keeler,
Alankrita Priya
Abstract:
We calculate the contributions to the one-loop determinant for transverse traceless gravitons in an $n+3$-dimensional Schwarzschild black hole background in the large dimension limit, due to the $SO(n+2)$-type tensor and vector fluctuations, using the quasinormal mode method. Accordingly we find the quasinormal modes for these fluctuations as a function of a fiducial mass parameter $Δ$. We show th…
▽ More
We calculate the contributions to the one-loop determinant for transverse traceless gravitons in an $n+3$-dimensional Schwarzschild black hole background in the large dimension limit, due to the $SO(n+2)$-type tensor and vector fluctuations, using the quasinormal mode method. Accordingly we find the quasinormal modes for these fluctuations as a function of a fiducial mass parameter $Δ$. We show that the behavior of the one-loop determinant at large $Δ$ accords with a heat kernel curvature expansion in one lower dimension, lending further evidence towards a membrane picture for black holes in the large dimension limit.
△ Less
Submitted 2 June, 2020; v1 submitted 19 April, 2019;
originally announced April 2019.
-
Diffuse neutrinos from luminous and dark supernovae: prospects for upcoming detectors at the O(10) kt scale
Authors:
Alankrita Priya,
Cecilia Lunardini
Abstract:
We estimate the Diffuse Supernova Neutrino Background (DSNB) using the simulation results for neutron star-forming and black hole-forming stellar collapses from the Garching group. Scenarios with different distributions of black-hole forming collapses with the progenitor mass are discussed, and the uncertainty on the cosmological rate of collapses is included. The electron antineutrino component o…
▽ More
We estimate the Diffuse Supernova Neutrino Background (DSNB) using the simulation results for neutron star-forming and black hole-forming stellar collapses from the Garching group. Scenarios with different distributions of black-hole forming collapses with the progenitor mass are discussed, and the uncertainty on the cosmological rate of collapses is included. The electron antineutrino component of the DSNB above 11 MeV of energy is found to be ~(1.4 - 3.7) cm^-2 s^-1; the contribution of black hole-forming collapses could dominate the flux above ~25 MeV. We calculate the potential of detecting the DSNB at SuperK-Gd and JUNO, in about a decade-long period of operation. We find that, in our model, it is likely that a significant excess above the background will be obtained at JUNO, while detection will be more difficult at SuperK-Gd. The potential when the two experimental results are examined jointly is discussed as well. We also consider an example of a future O(10) kt slow liquid scintillator detector, and show that there the odds of detection are very good. Our results motivate experimental efforts in reducing the backgrounds due to neutral current scattering of atmospheric neutrinos in SuperK-Gd.
△ Less
Submitted 22 November, 2017; v1 submitted 5 May, 2017;
originally announced May 2017.
-
Enriched Performance on Wireless Sensor Network using Fuzzy based Clustering Technique
Authors:
A. M Nirmala,
P. Subramaniam,
A. Anusha priya,
M. Ravi
Abstract:
The wireless sensor networks combines sensing, computation, and communication into a single small device. These devices depend on battery power and may be placed in hostile environments replacing them becomes a tedious task. Thus improving the energy of these networks becomes important. Clustering in wireless sensor network looks several challenges such as selection of an optimal group of sensor n…
▽ More
The wireless sensor networks combines sensing, computation, and communication into a single small device. These devices depend on battery power and may be placed in hostile environments replacing them becomes a tedious task. Thus improving the energy of these networks becomes important. Clustering in wireless sensor network looks several challenges such as selection of an optimal group of sensor nodes as cluster, optimum selection of cluster head, energy balanced optimal strategy for rotating the role of cluster head in a cluster, maintaining intra and inter cluster connectivity and optimal data routing in the network.
In this paper, we study a protocol supporting an energy efficient clustering, cluster head selection and data routing method to extend the lifetime of sensor network. Simulation results demonstrate that the proposed protocol prolongs network lifetime due to the use of efficient clustering, cluster head selection and data routing. The results of simulation show that at the end of some certain part of running the EECS and Fuzzy based clustering algorithm increases the number of alive nodes comparing with the LEACH and HEED methods and this can lead to an increase in sensor network lifetime. By using the EECS method the total number of messages received at base station is increased when compared with LEACH and HEED methods. The Fuzzy based clustering method compared with the K-Means Clustering by means of iteration count and time taken to die first node in wireless sensor network, as the result shows that the fuzzy based clustering method perform well than kmeans clustering methods.
△ Less
Submitted 19 December, 2013;
originally announced December 2013.