Time evolution of a closed circular string

Assignment Help Basic Computer Science
Reference no: EM13967995

Time evolution of a closed circular string.

At = 0, a closed string forms a circle of radi us R on the (x , y) plane and has zero veloci ty. The ti me development of this string can be studied usi ng the action (6.88). The string will remai n circular, but its radi us wi ll be a time-dependent function R( t ). Give the Lagrangian L as a function of R(t ) and i ts time derivative. Calculate the radius and velocity as functions of ti me. Sketch the spacetime surface traced by the string in a three-di mensional plot with x , y , and ct axes. [Hint: Calculate the Hamiltonian associated with and use energy conservation.]

Reference no: EM13967995

Questions Cloud

Consider a lagrangian l : Consider a Lagrangian L that depends only on the magnitude of the velocity q(t ) of a particle which moves in ordinary three-di mensional space.
At what volume was the old break-even : You received an email from Carl the operations manager from the California Container division. They produce packaging for cell phones. Carl understands that his product is an important cash producer for the company.
Describe the distribution of the eigenvalues : Consider a MIMO system with Lt = Lr = 2 in a channel with M = 10 multipaths. The ith multipath makes an angle of iLlcp with the transmit array and an angle of iLlcp with the receive array where Llcp = 1r/M. Assuming there are nt transmit and nr..
Compute the spatial signature in the direction cp : Consider a circular array of radius R normalized by the carrier wavelength with n elements uniformly spaced. Compute the spatial signature in the direction cp.
Time evolution of a closed circular string : At t = 0, a closed string forms a circle of radi us R on the (x , y) plane and has zero veloci ty. The ti me development of this string can be studied usi ng the action (6.88).
Define the first place fund objectives : FIRST PLACE FUND FOR YOUTH- The First Place Fund for Youth is an organization founded in 1998 in Oakland, California, that offers services to youth who are emerging out of the foster care system into independent living. Define the First Place Fund..
How much the gross domestic product increased : Estimate how much the gross domestic product increased from 2014 to 2015.
Is the proposed way of using dual transmit antennas smart : Suppose there is only a single user (i.e., K = 1). From your plot in part (1), do you think the dual transmit antennas provide any gain? Justify your answer. Hint: Use Jensen's inequality.
Find expected number of users that sends in a requested rate : The downlink of IS-856 has K users each experi- encing i.i.d. Rayleigh fading with average SNR of 0 dB. Each user selectively feeds back the requested rate only if its channel is greater than a threshold y. Suppose y is chosen such that the probab..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Problem regarding the reference counting

This question is about a possible implementation of garbage collection for Lisp. Both impure and pure Lisp have lambda abstraction, function application, and elementary functions atom, eq, car, cdr, and cons. Impure Lisp also has rplaca, rplacd, a..

  An adt called squarematrix

An ADT called SquareMatrix

  Problem regarding the computer forensics investigation

Describe, in detail, at least 5 different cases or situations that could lead to the need for a computer forensics investigation. For each case or situation, do the following:

  Give your experience playing computer games.

White et al. (2007) discuss a number of ways that database systems experts can help computer game designers. Discuss an example and support it with insights from your own experience playing computer games.

  Probability-first game joe enters is fourth game of season

Joe Coledge is the third-string quarterback for the University of Alatoona. What is the probability that the first game Joe enters is the fourth game of the season?

  Discussion board mis

Discussion board mis.

  Web application vulnerabilities

Web Application Vulnerabilities

  Define what is displayed on a computer screen

Computer users may encounter situations in which they can best express a computer-related problem or solution by showing the audience a graphic or video representation of what is displayed on a computer screen.

  If the student takes 12 credits and under

They pay $2000.00 tuition. If the student takes 12 credits and under, they pay the cost per credit that is on the input record. You need to output the student name, number of credits and total tuition.

  Object-oriented programming project

In this class, we have spent much time emphasizing object oriented code development that encourages code re-use by means of interfaces, abstract classes, design patterns, etc. Now it is your turn to apply these concepts into the development of a f..

  What term was a major issue during the process

What term was a major issue during the process of continuously dubbing media? Digitization cured this issue.

  Security threat report

Analyze the major threats to mobile devices, and suggest at least two (2) methods to mitigate the concerns and make the devices more secure from an organizational standpoint. Justify your response.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd