13,487 research outputs found
Antihyperon polarization in high-energy inclusive reactions
We propose a model for the antihyperon polarization in high-energy
proton-nucleus inclusive reactions, based on the final-state interactions
between the antihyperons and other produced particles (predominantly pions). To
formulate this idea, we use the previously obtained low-energy
pion-(anti-)hyperon interaction using effective chiral Lagrangians, and a
hydrodynamic parametrization of the background matter, which expands and
decouples at a certain freezeout temperature.Comment: 17 pages, 10 figure
Disorder-induced double resonant Raman process in graphene
An analytical study is presented of the double resonant Raman scattering
process in graphene, responsible for the D and D features in the
Raman spectra. This work yields analytical expressions for the D and
D integrated Raman intensities that explicitly show the dependencies
on laser energy, defect concentration, and electronic lifetime. Good agreement
is obtained between the analytical results and experimental measurements on
samples with increasing defect concentrations and at various laser excitation
energies. The use of Raman spectroscopy to identify the nature of defects is
discussed. Comparison between the models for the edge-induced and the
disorder-induced D band intensity suggests that edges or grain boundaries can
be distinguished from disorder by the different dependence of their Raman
intensity on laser excitation energy. Similarly, the type of disorder can
potentially be identified not only by the intensity ratio
, but also by its laser energy
dependence. Also discussed is a quantitative analysis of quantum interference
effects of the graphene wavefunctions, which determine the most important
phonon wavevectors and scattering processes responsible for the D and
D bands.Comment: 10 pages, 4 figure
Cost optimization of singly and doubly reinforced concrete beams with EC2-2001
A model for the optimal design of rectangular reinforced concrete sections is presented considering the stress–strain diagrams described in EC2-2001 and MC90. The following expressions are developed: economic bending moment; optimal area of steel and optimal steel ratio between upper and lower steel. All the expressions are in nondimensional form. The present model is applied to four different classes of concrete described in MC90. It is concluded that in nondimensional form the equations are nearly coincident for both singly and doubly reinforcement. It is also concluded that the ultimate strain for concrete in the compression zone, ecm, lies between the strain for peak stress ec1 and the ultimate strain ecu. This result is relevant once that the maximum moment is obtained for this value, and not the value ecu, as defined in EC2-2001. Cost optimization is implemented in the code and compared with other optimum models based on the ultimate design of ACI
Time-Reversal Symmetry Breaking and Decoherence in Chaotic Dirac Billiards
In this work, we perform a statistical study on Dirac Billiards in the
extreme quantum limit (a single open channel on the leads). Our numerical
analysis uses a large ensemble of random matrices and demonstrates the
preponderant role of dephasing mechanisms in such chaotic billiards. Physical
implementations of these billiards range from quantum dots of graphene to
topological insulators structures. We show, in particular, that the role of
finite crossover fields between the universal symmetries quickly leaves the
conductance to the asymptotic limit of unitary ensembles. Furthermore, we show
that the dephasing mechanisms strikingly lead Dirac billiards from the extreme
quantum regime to the semiclassical Gaussian regime
Lists that are smaller than their parts: A coding approach to tunable secrecy
We present a new information-theoretic definition and associated results,
based on list decoding in a source coding setting. We begin by presenting
list-source codes, which naturally map a key length (entropy) to list size. We
then show that such codes can be analyzed in the context of a novel
information-theoretic metric, \epsilon-symbol secrecy, that encompasses both
the one-time pad and traditional rate-based asymptotic metrics, but, like most
cryptographic constructs, can be applied in non-asymptotic settings. We derive
fundamental bounds for \epsilon-symbol secrecy and demonstrate how these bounds
can be achieved with MDS codes when the source is uniformly distributed. We
discuss applications and implementation issues of our codes.Comment: Allerton 2012, 8 page
Classification of areas using pixel-by-pixel and sample classifiers
There are no author-identified significant results in this report
- …