25,812 research outputs found

    Doppler-free resolution near-infrared spectroscopy at 1.28~μ\mum with the noise-immune cavity-enhanced optical heterodyne molecular spectroscopy method

    Full text link
    We report on the Doppler-free saturation spectroscopy of the nitrous oxide (N2_2O) overtone transition at 1.28~μ\mum. This measurement is performed by the noise-immune cavity-enhanced optical heterodyne molecular spectroscopy (NICE-OHMS) technique based on the quantum-dot (QD) laser. A high intra-cavity power, up to 10~W, reaches the saturation limit of the overtone line using an optical cavity with a high finesse of 113,500. At a pressure of several mTorr, the saturation dip is observed with a full width at half-maximum of about 2~MHz and a signal-to-noise ratio of 71. To the best of our knowledge, this is the first saturation spectroscopy of molecular overtone transitions in 1.3~μ\mum region. The QD laser is then locked to this dispersion signal with a stability of 15 kHz at 1 sec integration time. We demonstrate the potential of the N2_2O as markers because of its particularly rich spectrum at the vicinity of 1.28-1.30 μ\mum where lies several important forbidden transitions of atomic parity violation measurements and the 1.3 μ\mum O-band of optical communication

    Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters

    Full text link
    In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an authenticated and secrecy protected channel. So far, there exist only a very small number of revocable IBE (RIBE) schemes that support non-interactive key revocation, in the sense that the user is not required to interact with the key authority or some kind of trusted hardware to renew her private key without changing her public key (or identity). These schemes are either proven to be only selectively secure or have public parameters which grow linearly in a given security parameter. In this paper, we present two constructions of non-interactive RIBE that satisfy all the following three attractive properties: (i) proven to be adaptively secure under the Symmetric External Diffie-Hellman (SXDH) and the Decisional Linear (DLIN) assumptions; (ii) have constant-size public parameters; and (iii) preserve the anonymity of ciphertexts---a property that has not yet been achieved in all the current schemes

    Neural Natural Language Inference Models Enhanced with External Knowledge

    Full text link
    Modeling natural language inference is a very challenging task. With the availability of large annotated data, it has recently become feasible to train complex models such as neural-network-based inference models, which have shown to achieve the state-of-the-art performance. Although there exist relatively large annotated data, can machines learn all knowledge needed to perform natural language inference (NLI) from these data? If not, how can neural-network-based NLI models benefit from external knowledge and how to build NLI models to leverage it? In this paper, we enrich the state-of-the-art neural natural language inference models with external knowledge. We demonstrate that the proposed models improve neural NLI models to achieve the state-of-the-art performance on the SNLI and MultiNLI datasets.Comment: Accepted by ACL 201

    RSA: Byzantine-Robust Stochastic Aggregation Methods for Distributed Learning from Heterogeneous Datasets

    Full text link
    In this paper, we propose a class of robust stochastic subgradient methods for distributed learning from heterogeneous datasets at presence of an unknown number of Byzantine workers. The Byzantine workers, during the learning process, may send arbitrary incorrect messages to the master due to data corruptions, communication failures or malicious attacks, and consequently bias the learned model. The key to the proposed methods is a regularization term incorporated with the objective function so as to robustify the learning task and mitigate the negative effects of Byzantine attacks. The resultant subgradient-based algorithms are termed Byzantine-Robust Stochastic Aggregation methods, justifying our acronym RSA used henceforth. In contrast to most of the existing algorithms, RSA does not rely on the assumption that the data are independent and identically distributed (i.i.d.) on the workers, and hence fits for a wider class of applications. Theoretically, we show that: i) RSA converges to a near-optimal solution with the learning error dependent on the number of Byzantine workers; ii) the convergence rate of RSA under Byzantine attacks is the same as that of the stochastic gradient descent method, which is free of Byzantine attacks. Numerically, experiments on real dataset corroborate the competitive performance of RSA and a complexity reduction compared to the state-of-the-art alternatives.Comment: To appear in AAAI 201

    Formation of Nanofoam carbon and re-emergence of Superconductivity in compressed CaC6

    Get PDF
    Pressure can tune material's electronic properties and control its quantum state, making some systems present disconnected superconducting region as observed in iron chalcogenides and heavy fermion CeCu2Si2. For CaC6 superconductor (Tc of 11.5 K), applying pressure first Tc increases and then suppresses and the superconductivity of this compound is eventually disappeared at about 18 GPa. Here, we report a theoretical finding of the re-emergence of superconductivity in heavily compressed CaC6. The predicted phase III (space group Pmmn) with formation of carbon nanofoam is found to be stable at wide pressure range with a Tc up to 14.7 K at 78 GPa. Diamond-like carbon structure is adhered to the phase IV (Cmcm) for compressed CaC6 after 126 GPa, which has bad metallic behavior, indicating again departure from superconductivity. Re-emerged superconductivity in compressed CaC6 paves a new way to design new-type superconductor by inserting metal into nanoporous host lattice.Comment: 31 pages, 12 figures, and 4 table

    Angular Reconstruction of a Lead Scintillating-Fiber Sandwiched Electromagnetic Calorimeter

    Full text link
    A new method called Neighbor Cell Deposited Energy Ratio (NCDER) is proposed to reconstruct incidence position in a single layer for a 3-dimensional imaging electromagnetic calorimeter (ECAL).This method was applied to reconstruct the ECAL test beam data for the Alpha Magnetic Spectrometer-02 (AMS-02). The results show that this method can achieve an angular resolution of 7.36\pm 0.08 / \sqrt(E) \oplus 0.28 \pm 0.02 degree in the determination of the photons direction, which is much more precise than that obtained with the commonly-adopted Center of Gravity(COG) method (8.4 \pm 0.1 /sqrt(E) \oplus 0.8\pm0.3 degree). Furthermore, since it uses only the properties of electromagnetic showers, this new method could also be used for other type of fine grain sampling calorimeters.Comment: 6 pages, 8 figure
    corecore