563 research outputs found
Exact symmetries in the velocity fluctuations of a hot Brownian swimmer
Symmetries constrain dynamics. We test this fundamental physical principle,
experimentally and by molecular dynamics simulations, for a hot Janus swimmer
operating far from thermal equilibrium. Our results establish scalar and
vectorial steady-state fluctuation theorems and a thermodynamic uncertainty
relation that link the fluctuating particle current to its entropy production
at an effective temperature. A Markovian minimal model elucidates the
underlying non-equilbrium physics.Comment: 5 pages, 3 figure
Hot Brownian Motion
We derive the generalized Markovian description for the non-equilibrium
Brownian motion of a heated particle in a simple solvent with a
temperature-dependent viscosity. Our analytical results for the generalized
fluctuation-dissipation and Stokes-Einstein relations compare favorably with
measurements of laser-heated gold nano-particles and provide a practical
rational basis for emerging photothermal technologies.Comment: 10 pages, 5 figure
Generalised Einstein Relation for Hot Brownian Motion
The Brownian motion of a hot nanoparticle is described by an effective Markov
theory based on fluctuating hydrodynamics. Its predictions are scrutinized over
a wide temperature range using large-scale molecular dynamics simulations of a
hot nanoparticle in a Lennard-Jones fluid. The particle positions and momenta
are found to be Boltzmann distributed according to distinct effective
temperatures and . For we
derive a formally exact theoretical prediction and establish a generalised
Einstein relation that links it to directly measurable quantities
Hybrid Algorithms Based on Integer Programming for the Search of Prioritized Test Data in Software Product Lines
In Software Product Lines (SPLs) it is not possible, in general, to test all products of the family. The number of products denoted by a SPL is very high due to the combinatorial explosion of features. For this reason, some coverage criteria have been proposed which try to test at least all feature interactions without the necessity to test all products, e.g., all pairs of features (pairwise coverage). In addition, it is desirable to first test products composed by a set of priority features. This problem is known as the Prioritized Pairwise Test Data Generation Problem. In this work we propose two hybrid algorithms using Integer Programming (IP) to generate a prioritized test suite. The first one is based on an integer linear formulation and the second one is based on a integer quadratic (nonlinear) formulation. We compare these techniques with two state-of-the-art algorithms, the Parallel Prioritized Genetic Solver (PPGS) and a greedy algorithm called prioritized-ICPL. Our study reveals that our hybrid nonlinear approach is clearly the best in both, solution quality and computation time. Moreover, the nonlinear variant (the fastest one) is 27 and 42 times faster than PPGS in the two groups of instances analyzed in this work.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech. Partially funded by the Spanish Ministry of Economy and Competitiveness and FEDER under contract TIN2014-57341-R, the University of Málaga, Andalucía Tech and the Spanish Network TIN2015-71841-REDT (SEBASENet)
The Misappropriation Theory of Insider Trading: Its Past, Present, and Future
In this Comment, I discuss the evolution and current application of the misappropriation theory of insider trading and argue that it simply strays too far from the fraud tenets of Section 10(b) and Rule 10b-5. A thorough understanding of the misappropriation theory is possible only if one understands how it diverges from the classic theory of insider trading. Therefore, in Section II, I discuss the evolution and present doctrine of classic insider trading. The discussion in this Section focuses on major cases in the development of this theory. Section III presents the misappropriation theory of insider trading. Section III focuses upon (1) the broad scope of the misappropriation theory as initially adopted by the Second Circuit in United States v. Carpenter, (2) the Circuit\u27s later attempt to limit the scope of the theory in United States v. Chestman, and (3) the effect that Chestman has had on limiting the scope of the theory. Section III ultimately shows that the misappropriation theory strays far from the fraud prohibitions of Section 10(b) and has no identifiable limits, thereby proscribing conduct that is not properly regulated by Section 10(b) and Rule 10b-5. Finally, Section IV presents alternative ways to achieve the valuable public policy of the misappropriation theory. Section III concludes that new rules prohibiting the use of material, nonpublic information for an improper purpose should be promulgated under the authority granted to the SEC by Section 10(b)
- …
