798,533 research outputs found
Quantum Correlations and Quantum Non-Locality: A Review and a Few New Ideas
In this paper we make an extensive description of quantum non-locality, one
of the most intriguing and fascinating facets of quantum mechanics. After a
general presentation of several studies on this subject, we consider if quantum
non-locality, and the friction it carries with special relativity, can
eventually find a "solution" by considering higher dimensional spaces.Comment: 1
A Measurement System for On-line Estimation of Weed Coverage
This paper describes two different solutions for the estimation of weed coverage. Both measuring systems discriminate the weed from the ground by means of the color difference between the weed and ground and can be used to on-line control tractor sprayers in order to reduce weedkiller use. The solutions differ with respect to the sensor type: one solution is based on a digital camera and a computer that analyzes the images and determines the weed amount, while the other simpler solution makes use of two photo detectors and an analog processing system. The camera-based solution provides an uncertainty of a few percentage, while the photo detector-based one, though extremely cheap, has an uncertainty of about 5% and suffers from changes in light conditions, which can alter the estimation
Updated galactic radio constraints on Dark Matter
We perform a detailed analysis of the synchrotron signals produced by Dark
Matter annihilations and decays. We consider different set-ups for the
propagation of electrons and positrons, the galactic magnetic field and Dark
Matter properties. We then confront these signals with radio and microwave
maps, including Planck measurements, from a frequency of 22 MHz up to 70 GHz.
We derive two sets of constraints: conservative and progressive, the latter
based on a modeling of the astrophysical emission. Radio and microwave
constraints are complementary to those obtained with other indirect detection
methods, especially for dark matter annihilating into leptonic channels.Comment: 20 pages, 10 figures. v2: some small additions, matches journal
versio
Liquids-Rich Shale Evaluation: Modelling and Optimization of Hydraulically Fractured Liquids-Rich Shale Wells
Imperial Users onl
Heterogeneity in evolutionary games: an analysis of the risk perception
In this work, we analyse the relationship between heterogeneity and
cooperation. Previous investigations suggest that this relation is nontrivial,
as some authors found that heterogeneity sustains cooperation, while others
obtained different results. Among the possible forms of heterogeneity, we focus
on the individual perception of risks and rewards related to a generic event,
that can show up in a number of social and biological systems. The modelling
approach is based on the framework of Evolutionary Game Theory. To represent
this kind of heterogeneity, we implement small and local perturbations on the
payoff matrix of simple 2-strategy games, as the Prisoner's Dilemma. So, while
usually the payoff is considered as a global and time-invariant structure, i.e.
it is the same for all individuals of a population at any time, in our model
its value is continuously affected by small variations, both in time and space
(i.e. position on a lattice). We found that such perturbations can be
beneficial or detrimental to cooperation, depending on their setting. Notably,
cooperation is strongly supported when perturbations act on the main diagonal
of the payoff matrix, whereas when they act on the off-diagonal the resulting
effect is more difficult to quantify. To conclude, the proposed model shows a
rich spectrum of possible equilibria, whose interpretation might offer insights
and enrich the description of several systems.Comment: 7 pages, 5 figure
Increasing Physical Layer Security through Scrambled Codes and ARQ
We develop the proposal of non-systematic channel codes on the AWGN wire-tap
channel. Such coding technique, based on scrambling, achieves high transmission
security with a small degradation of the eavesdropper's channel with respect to
the legitimate receiver's channel. In this paper, we show that, by implementing
scrambling and descrambling on blocks of concatenated frames, rather than on
single frames, the channel degradation needed is further reduced. The usage of
concatenated scrambling allows to achieve security also when both receivers
experience the same channel quality. However, in this case, the introduction of
an ARQ protocol with authentication is needed.Comment: 5 pages, 4 figures; Proc. IEEE ICC 2011, Kyoto, Japan, 5-9 June 201
- …
