798,533 research outputs found

    Quantum Correlations and Quantum Non-Locality: A Review and a Few New Ideas

    Get PDF
    In this paper we make an extensive description of quantum non-locality, one of the most intriguing and fascinating facets of quantum mechanics. After a general presentation of several studies on this subject, we consider if quantum non-locality, and the friction it carries with special relativity, can eventually find a "solution" by considering higher dimensional spaces.Comment: 1

    A Measurement System for On-line Estimation of Weed Coverage

    Get PDF
    This paper describes two different solutions for the estimation of weed coverage. Both measuring systems discriminate the weed from the ground by means of the color difference between the weed and ground and can be used to on-line control tractor sprayers in order to reduce weedkiller use. The solutions differ with respect to the sensor type: one solution is based on a digital camera and a computer that analyzes the images and determines the weed amount, while the other simpler solution makes use of two photo detectors and an analog processing system. The camera-based solution provides an uncertainty of a few percentage, while the photo detector-based one, though extremely cheap, has an uncertainty of about 5% and suffers from changes in light conditions, which can alter the estimation

    Updated galactic radio constraints on Dark Matter

    Full text link
    We perform a detailed analysis of the synchrotron signals produced by Dark Matter annihilations and decays. We consider different set-ups for the propagation of electrons and positrons, the galactic magnetic field and Dark Matter properties. We then confront these signals with radio and microwave maps, including Planck measurements, from a frequency of 22 MHz up to 70 GHz. We derive two sets of constraints: conservative and progressive, the latter based on a modeling of the astrophysical emission. Radio and microwave constraints are complementary to those obtained with other indirect detection methods, especially for dark matter annihilating into leptonic channels.Comment: 20 pages, 10 figures. v2: some small additions, matches journal versio

    Liquids-Rich Shale Evaluation: Modelling and Optimization of Hydraulically Fractured Liquids-Rich Shale Wells

    Get PDF
    Imperial Users onl

    Heterogeneity in evolutionary games: an analysis of the risk perception

    Get PDF
    In this work, we analyse the relationship between heterogeneity and cooperation. Previous investigations suggest that this relation is nontrivial, as some authors found that heterogeneity sustains cooperation, while others obtained different results. Among the possible forms of heterogeneity, we focus on the individual perception of risks and rewards related to a generic event, that can show up in a number of social and biological systems. The modelling approach is based on the framework of Evolutionary Game Theory. To represent this kind of heterogeneity, we implement small and local perturbations on the payoff matrix of simple 2-strategy games, as the Prisoner's Dilemma. So, while usually the payoff is considered as a global and time-invariant structure, i.e. it is the same for all individuals of a population at any time, in our model its value is continuously affected by small variations, both in time and space (i.e. position on a lattice). We found that such perturbations can be beneficial or detrimental to cooperation, depending on their setting. Notably, cooperation is strongly supported when perturbations act on the main diagonal of the payoff matrix, whereas when they act on the off-diagonal the resulting effect is more difficult to quantify. To conclude, the proposed model shows a rich spectrum of possible equilibria, whose interpretation might offer insights and enrich the description of several systems.Comment: 7 pages, 5 figure

    Increasing Physical Layer Security through Scrambled Codes and ARQ

    Full text link
    We develop the proposal of non-systematic channel codes on the AWGN wire-tap channel. Such coding technique, based on scrambling, achieves high transmission security with a small degradation of the eavesdropper's channel with respect to the legitimate receiver's channel. In this paper, we show that, by implementing scrambling and descrambling on blocks of concatenated frames, rather than on single frames, the channel degradation needed is further reduced. The usage of concatenated scrambling allows to achieve security also when both receivers experience the same channel quality. However, in this case, the introduction of an ARQ protocol with authentication is needed.Comment: 5 pages, 4 figures; Proc. IEEE ICC 2011, Kyoto, Japan, 5-9 June 201
    corecore