510 research outputs found
Polarized currents and spatial separation of Kondo state: NRG study of spin-orbital effect in a double QD
A double quantum dot device, connected to two channels that only see each
other through interdot Coulomb repulsion, is analyzed using the numerical
renormalization group technique. By using a two-impurity Anderson model, and
parameter values obtained from experiment [S. Amasha {\it et al.}, Phys. Rev.
Lett. {\bf 110}, 046604 (2013)], it is shown that, by applying a moderate
magnetic field, and adjusting the gate potential of each quantum dot, opposing
spin polarizations are created in each channel. Furthermore, through a well
defined change in the gate potentials, the polarizations can be reversed. This
polarization effect is clearly associated to a spin-orbital Kondo state having
a Kondo peak that originates from spatially separated parts of the device. This
fact opens the exciting possibility of experimentally probing the internal
structure of an SU(2) Kondo state.Comment: 4+ pages; 4 figures; supplemental material (1 page, 2 figures
Transport properties of strongly correlated electrons in quantum dots using a simple circuit model
Numerical calculations are shown to reproduce the main results of recent
experiments involving nonlocal spin control in nanostructures (N. J. Craig et
al., Science 304, 565 (2004)). In particular, the splitting of the
zero-bias-peak discovered experimentally is clearly observed in our studies. To
understand these results, a simple "circuit model" is introduced and shown to
provide a good qualitative description of the experiments. The main idea is
that the splitting originates in a Fano anti-resonance, which is caused by
having one quantum dot side-connected in relation to the current's path. This
scenario provides an explanation of Craig et al.'s results that is alternative
to the RKKY proposal, which is here also addressed.Comment: 5 pages, 5 figure
Transport through quantum dots: A combined DMRG and cluster-embedding study
The numerical analysis of strongly interacting nanostructures requires
powerful techniques. Recently developed methods, such as the time-dependent
density matrix renormalization group (tDMRG) approach or the embedded-cluster
approximation (ECA), rely on the numerical solution of clusters of finite size.
For the interpretation of numerical results, it is therefore crucial to
understand finite-size effects in detail. In this work, we present a careful
finite-size analysis for the examples of one quantum dot, as well as three
serially connected quantum dots. Depending on odd-even effects, physically
quite different results may emerge from clusters that do not differ much in
their size. We provide a solution to a recent controversy over results obtained
with ECA for three quantum dots. In particular, using the optimum clusters
discussed in this paper, the parameter range in which ECA can reliably be
applied is increased, as we show for the case of three quantum dots. As a
practical procedure, we propose that a comparison of results for static
quantities against those of quasi-exact methods, such as the ground-state
density matrix renormalization group (DMRG) method or exact diagonalization,
serves to identify the optimum cluster type. In the examples studied here, we
find that to observe signatures of the Kondo effect in finite systems, the best
clusters involving dots and leads must have a total z-component of the spin
equal to zero.Comment: 16 pages, 14 figures, revised version to appear in Eur. Phys. J. B,
additional reference
Security by design: an interdisciplinary systematic review and conceptual framework
Background: Security by design is the approach to designing digital technologies that are foundationally secure. This approach has materialized in several software design methodologies. However, a close examination of these methodologies shows that digital technologies security is designed as a technical feature, with no concern for their interaction with human, social, and organizational factors. This research argues that, in order to produce a design methodology for developing secure software systems that integrates non-technical factors in their design, an interdisciplinary and integrative review of the āsecurity by designā concept is needed. Objectives: The present protocol details the work plan for a systematic scoping review on security by design and related concepts. This review seeks to (1) synthesize current definitions of āsecurity by designā, (2) elaborate a conceptual map that shows how āsecurity by designā connects to other related concepts, and (3) identify the key principles of the āsecurity by designā approach. Design: This systematic review follows the PRISMA extension for scoping review. Six databases are searched for thematically relevant studies published in English. Studies included peer-reviewed publications, government or company documents, technical reports, or a doctoral theses. After the initial search, three researchers will screen the title and abstracts following a screening tool. The consistency of researchersā classification will be measured by calculating the inter-rater reliability. The reading of full texts will determine the final eligibility. Finally, data will be extracted from the final sample of documents. NWONWA.1215.18.008Security and Global Affair
Expression-Guided In Silico Evaluation of Candidate Cis Regulatory Codes for Drosophila Muscle Founder Cells
While combinatorial models of transcriptional regulation can be inferred for metazoan systems from a priori biological knowledge, validation requires extensive and time-consuming experimental work. Thus, there is a need for computational methods that can evaluate hypothesized cis regulatory codes before the difficult task of experimental verification is undertaken. We have developed a novel computational framework (termed āCodeFinderā) that integrates transcription factor binding site and gene expression information to evaluate whether a hypothesized transcriptional regulatory model (TRM; i.e., a set of co-regulating transcription factors) is likely to target a given set of co-expressed genes. Our basic approach is to simultaneously predict cis regulatory modules (CRMs) associated with a given gene set and quantify the enrichment for combinatorial subsets of transcription factor binding site motifs comprising the hypothesized TRM within these predicted CRMs. As a model system, we have examined a TRM experimentally demonstrated to drive the expression of two genes in a sub-population of cells in the developing Drosophila mesoderm, the somatic muscle founder cells. This TRM was previously hypothesized to be a general mode of regulation for genes expressed in this cell population. In contrast, the present analyses suggest that a modified form of this cis regulatory code applies to only a subset of founder cell genes, those whose gene expression responds to specific genetic perturbations in a similar manner to the gene on which the original model was based. We have confirmed this hypothesis by experimentally discovering six (out of 12 tested) new CRMs driving expression in the embryonic mesoderm, four of which drive expression in founder cells
Parametrizations of Inclusive Cross Sections for Pion Production in Proton-Proton Collisions
Accurate knowledge of cross sections for pion production in proton-proton
collisions finds wide application in particle physics, astrophysics, cosmic ray
physics and space radiation problems, especially in situations where an
incident proton is transported through some medium, and one requires knowledge
of the output particle spectrum given the input spectrum. In such cases
accurate parametrizations of the cross sections are desired. In this paper we
review much of the experimental data and compare to a wide variety of different
cross section parametrizations. In so doing, we provide parametrizations of
neutral and charged pion cross sections which provide a very accurate
description of the experimental data. Lorentz invariant differential cross
sections, spectral distributions and total cross section parametrizations are
presented.Comment: 32 pages with 15 figures. Published in Physical Review D62, 094030.
File includes 6 tex files. The main file is paper.tex which has include
statements refering to the rest. figures are in graphs.di
- ā¦