1,991 research outputs found
Spinning flavour branes and fermion pairing instabilities
We consider probe Dp-branes, p=3,5,7, in global AdS_5 x S^5, rotating along
an internal direction in the S^5. These are dual to strongly interacting N=4
SYM on S^3 with massless fundamental flavours, in the presence of an R-symmetry
chemical potential for flavour fermions. For massless, "AdS-filling" Dp-brane
embeddings at zero temperature, we find an infinite set of threshold values of
the chemical potential at which instabilities are triggered. The onset of
instability is always preceded by metastability of the zero density state. From
the onset values of the chemical potential, we infer that unstable directions
favour a homogeneous condensate of a bilinear made from fermion harmonics, or
Cooper pairing. We confirm this picture both numerically and analytically. The
linearized analysis showing the appearance of instabilities involves a charged
scalar in global AdS space coupled to a (large) constant background gauge
potential. The resulting frequency space correlator of the fermion bilinear at
strong coupling displays poles in the upper half plane. In contrast, the
correlator at zero coupling exhibits Pauli blocking due to occupation of states
below the Fermi level, but no instabilities. The end-point of the strong
coupling instability is not visible in our setup.Comment: 44 pages, 10 figures, uses late
Barbosa et al. Reply to ``Comment on 'Secure Communication using mesoscopic coherent states', Barbosa et al, Phys Rev Lett 90, 227901", Yuan and Shields, Phys. Rev. Lett. 94, 048901(2005)
Yuan and Shields claim that our data-encryption protocol is entirely
equivalent to a classical stream cipher utilizing no quantum phenomena. Their
claim is, indeed, false. Yuan and Shields also claim that schemes similar to
the one presented in Phys. Rev. Lett. 90, 227901 are not suitable for key
generation. This claim is also refuted. In any event, we welcome the
opportunity to clarify the situation for a wider audience.Comment: This is the co-published Reply to the Comment made by Z.L. Yuan and
A.J. Shields published in Physical Review Letters, 94 (2005
FDTD Simulation of Thermal Noise in Open Cavities
A numerical model based on the finite-difference time-domain (FDTD) method is
developed to simulate thermal noise in open cavities owing to output coupling.
The absorbing boundary of the FDTD grid is treated as a blackbody, whose
thermal radiation penetrates the cavity in the grid. The calculated amount of
thermal noise in a one-dimensional dielectric cavity recovers the standard
result of the quantum Langevin equation in the Markovian regime. Our FDTD
simulation also demonstrates that in the non-Markovian regime the buildup of
the intracavity noise field depends on the ratio of the cavity photon lifetime
to the coherence time of thermal radiation. The advantage of our numerical
method is that the thermal noise is introduced in the time domain without prior
knowledge of cavity modes.Comment: 8 pages, 7 figure
Quantum Noise Randomized Ciphers
We review the notion of a classical random cipher and its advantages. We
sharpen the usual description of random ciphers to a particular mathematical
characterization suggested by the salient feature responsible for their
increased security. We describe a concrete system known as AlphaEta and show
that it is equivalent to a random cipher in which the required randomization is
effected by coherent-state quantum noise. We describe the currently known
security features of AlphaEta and similar systems, including lower bounds on
the unicity distances against ciphertext-only and known-plaintext attacks. We
show how AlphaEta used in conjunction with any standard stream cipher such as
AES (Advanced Encryption Standard) provides an additional, qualitatively
different layer of security from physical encryption against known-plaintext
attacks on the key. We refute some claims in the literature that AlphaEta is
equivalent to a non-random stream cipher.Comment: Accepted for publication in Phys. Rev. A; Discussion augmented and
re-organized; Section 5 contains a detailed response to 'T. Nishioka, T.
Hasegawa, H. Ishizuka, K. Imafuku, H. Imai: Phys. Lett. A 327 (2004) 28-32
/quant-ph/0310168' & 'T. Nishioka, T. Hasegawa, H. Ishizuka, K. Imafuku, H.
Imai: Phys. Lett. A 346 (2005) 7
Disrupted network architecture of the resting brain in attention‐deficit/hyperactivity disorder
Background Attention‐deficit/hyperactivity disorder (ADHD) is one of the most prevalent psychiatric disorders of childhood. Neuroimaging investigations of ADHD have traditionally sought to detect localized abnormalities in discrete brain regions. Recent years, however, have seen the emergence of complementary lines of investigation into distributed connectivity disturbances in ADHD. Current models emphasize abnormal relationships between default network—involved in internally directed mentation and lapses of attention—and task positive networks, especially ventral attention network. However, studies that comprehensively investigate interrelationships between large‐scale networks in ADHD remain relatively rare. Methods Resting state functional magnetic resonance imaging scans were obtained from 757 participants at seven sites in the ADHD‐200 multisite sample. Functional connectomes were generated for each subject, and interrelationships between seven large‐scale brain networks were examined with network contingency analysis. Results ADHD brains exhibited altered resting state connectivity between default network and ventral attention network [ P < 0.0001, false discovery rate (FDR)‐corrected], including prominent increased connectivity (more specifically, diminished anticorrelation) between posterior cingulate cortex in default network and right anterior insula and supplementary motor area in ventral attention network. There was distributed hypoconnectivity within default network ( P = 0.009, FDR‐corrected), and this network also exhibited significant alterations in its interconnections with several other large‐scale networks. Additionally, there was pronounced right lateralization of aberrant default network connections. Conclusions Consistent with existing theoretical models, these results provide evidence that default network‐ventral attention network interconnections are a key locus of dysfunction in ADHD. Moreover, these findings contribute to growing evidence that distributed dysconnectivity within and between large‐scale networks is present in ADHD. Hum Brain Mapp 35:4693–4705, 2014 . © 2014 Wiley Periodicals, Inc .Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/107992/1/hbm22504.pd
Constraints and Hamiltonian in Light-Front Quantized Field Theory
Self-consistent Hamiltonian formulation of scalar theory on the null plane is
constructed following Dirac method. The theory contains also {\it constraint
equations}. They would give, if solved, to a nonlinear and nonlocal
Hamiltonian. The constraints lead us in the continuum to a different
description of spontaneous symmetry breaking since, the symmetry generators now
annihilate the vacuum. In two examples where the procedure lacks
self-consistency, the corresponding theories are known ill-defined from
equal-time quantization. This lends support to the method adopted where both
the background field and the fluctuation above it are treated as dynamical
variables on the null plane. We let the self-consistency of the Dirac procedure
determine their properties in the quantized theory. The results following from
the continuum and the discretized formulations in the infinite volume limit do
agree.Comment: 11 pages, Padova University preprint DFPF/92/TH/52 (December '92
Zero-Voltage and Zero-Current Switching Buck-Boost Converter for PV Applications
A ZVS and ZCS buck boost converter is presented for PV panel applications. The salient points are that all the switching devices are under zero-current switching during turn-on and zero-voltage switching during turn-off. The active switches in the converter undergo zero-capacitive turn-on losses unlike switches in other soft-switched topologies. The switches do not experience any over voltage/over current stress proportional to load as in resonant converters. This soft-switching technique can also be applied to other classical switched mode power converters. A detailed analysis of the converter under steady state is discussed and simulation results obtained are presented
Evaluation for Released and Promising Genotypes of Potato Against Red Ant
Red ant is the most destructive insect pest of potato tubers in the field. Utilization of varietal resistance is the best option to control the pest. The resistance of five released and nine promising genotypes of potato were evaluated against red ant (Dorylus orientalis Westwood) under natural infestation in red ant prone field. Potato resistance was evaluated based on tuber damage index value (0.00 to 1) which was calculated on the bases of the percentage of damaged tubers and number of injuries on per kilogram of tubers made by the pest. Based on the results of combined data, the levels of varietal damage were categorized to be less damaged (TDI value ranging from 0.35 to 0.49), moderately damaged (TDI value ranging from 0.50to 0.64) and highly damaged (TDI value ranging from 0.65 to 0.79) types. Among the 14 genotypes compared for levels of tuber damage, the fivegenotypes: IPY-8 (TDI value: 0.35), Khumal Seto (TDI value: 0.39), PRP-056267.1 (TDI value: 0.40), Janak Dev (TDI value: 0.44) and PRP-25861.1 (TDI value: 0.49) were determined to be the less damaged types. The less damaged potato genotypes can be used by farmers as the relatively resistant genotypes against red ant
Quantum-noise--randomized data-encryption for WDM fiber-optic networks
We demonstrate high-rate randomized data-encryption through optical fibers
using the inherent quantum-measurement noise of coherent states of light.
Specifically, we demonstrate 650Mbps data encryption through a 10Gbps
data-bearing, in-line amplified 200km-long line. In our protocol, legitimate
users (who share a short secret-key) communicate using an M-ry signal set while
an attacker (who does not share the secret key) is forced to contend with the
fundamental and irreducible quantum-measurement noise of coherent states.
Implementations of our protocol using both polarization-encoded signal sets as
well as polarization-insensitive phase-keyed signal sets are experimentally and
theoretically evaluated. Different from the performance criteria for the
cryptographic objective of key generation (quantum key-generation), one
possible set of performance criteria for the cryptographic objective of data
encryption is established and carefully considered.Comment: Version 2: Some errors have been corrected and arguments refined. To
appear in Physical Review A. Version 3: Minor corrections to version
- …
