10,620 research outputs found
The Complex Time WKB Approximation And Particle Production
The complex time WKB (CWKB) approximation has been an effective technique to
understand particle production in curved as well as in flat spacetime. Earlier
we obtained the standard results on particle production in time dependent gauge
in various curved spacetime. In the present work we generalize the technique of
CWKB to the equivalent problems in space dependent gauge. Using CWKB, we first
obtain the gauge invariant result for particle production in Minkowski
spacetime in strong electric field. We then carry out particle production in
de-Sitter spacetime in space dependent gauge and obtain the same result that we
obtained earlier in time dependent gauge. The results obtained for de-Sitter
spacetime has a obvious extension to particle production in black hole
spacetime. It is found that the origin of Planckian spectrum is due to repeated
reflections between the turning points. As mentioned earlier, it is now
explicitly shown that particle production is accompanied by rotation of
currents.Comment: 12 pages, Revte
Towards diagnosing hybrid systems
This paper reports on the findings of an on-going project to investigate techniques to diagnose complex dynamical systems that are modeled as hybrid systems. In particular, we examine continuous systems with embedded supervisory controllers which experience abrupt, partial or full failure of component devices. The problem we address is: given a hybrid model of system behavior, a history of executed controller actions, and a history of observations, including an observation of behavior that is aberrant relative to the model of expected behavior, determine what fault occurred to have caused the aberrant behavior. Determining a diagnosis can be cast as a search problem to find the most likely model for the data. Unfortunately, the search space is extremely large. To reduce search space size and to identify an initial set of candidate diagnoses, we propose to exploit techniques originally applied to qualitative diagnosis of continuous systems. We refine these diagnoses using parameter estimation and model fitting techniques. As a motivating case study, we have examined the problem of diagnosing NASA’s Sprint AERCam, a small spherical robotic camera unit with 12 thrusters that enable both linear and rotational motion.
Quantum logic gates using Stark shifted Raman transitions in a cavity
We present a scheme to realise the basic two-quibit logic gates such as
quantum phase gate and controlle-NOT gate using a detuned optical cavity
interacting with a three-level Raman system. We discuss the role of Stark
shifts which are as important as the terms leading to two-photon transition.
The operation of the proposed logic gates involves metastable states of the
atom and hence is not affected by spontaneous emission. These ideas can be
extended to produce multiparticle entanglement.Comment: 5 pages, 1 figure, RevTeX4, Text is modifie
Kinetic exchange opinion model: solution in the single parameter map limit
We study a recently proposed kinetic exchange opinion model (Lallouache et.
al., Phys. Rev E 82:056112, 2010) in the limit of a single parameter map.
Although it does not include the essentially complex behavior of the multiagent
version, it provides us with the insight regarding the choice of order
parameter for the system as well as some of its other dynamical properties. We
also study the generalized two- parameter version of the model, and provide the
exact phase diagram. The universal behavior along this phase boundary in terms
of the suitably defined order parameter is seen.Comment: 14 pages, 9 figure
Opinion dynamics model with domain size dependent dynamics: novel features and new universality class
A model for opinion dynamics (Model I) has been recently introduced in which
the binary opinions of the individuals are determined according to the size of
their neighboring domains (population having the same opinion). The coarsening
dynamics of the equivalent Ising model shows power law behavior and has been
found to belong to a new universality class with the dynamic exponent and persistence exponent in one dimension. The
critical behavior has been found to be robust for a large variety of annealed
disorder that has been studied. Further, by mapping Model I to a system of
random walkers in one dimension with a tendency to walk towards their nearest
neighbour with probability , we find that for any ,
the Model I dynamical behaviour is prevalent at long times.Comment: 12 pages, 10 figures. To be published in "Journal of Physics :
Conference Series" (2011
First-Order Reorientation of the Flux-Line Lattice in CaAlSi
The flux line lattice in CaAlSi has been studied by small angle neutron
scattering. A well defined hexagonal flux line lattice is seen just above Hc1
in an applied field of only 54 Oe. A 30 degree reorientation of this vortex
lattice has been observed in a very low field of 200 Oe. This reorientation
transition appears to be of first-order and could be explained by non-local
effects. The magnetic field dependence of the form factor is well described by
a single penetration depth of 1496(1) angstroms and a single coherence length
of 307(1) angstroms at 2 K. At 1.5 K the penetration depth anisotropy is 2.7(1)
with the field applied perpendicular to the c axis and agrees with the
coherence length anisotropy determined from critical field measurements.Comment: 5 pages including 6 figures, to appear in Physical Review Letter
Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters
Cache timing attacks use shared caches in multi-core processors as side
channels to extract information from victim processes. These attacks are
particularly dangerous in cloud infrastructures, in which the deployed
countermeasures cause collateral effects in terms of performance loss and
increase in energy consumption. We propose to monitor the victim process using
an independent monitoring (detector) process, that continuously measures
selected Performance Monitoring Counters (PMC) to detect the presence of an
attack. Ad-hoc countermeasures can be applied only when such a risky situation
arises. In our case, the victim process is the AES encryption algorithm and the
attack is performed by means of random encryption requests. We demonstrate that
PMCs are a feasible tool to detect the attack and that sampling PMCs at high
frequencies is worse than sampling at lower frequencies in terms of detection
capabilities, particularly when the attack is fragmented in time to try to be
hidden from detection
- …