3,331 research outputs found

    Long term monitoring of bright TeV Blazars with the MAGIC telescope

    Full text link
    The MAGIC telescope has performed long term monitoring observations of the bright TeV Blazars Mrk421, Mrk501 and 1ES1959+650. Up to 40 observations, 30 to 60 minutes each have been performed for each source evenly distributed over the observable period of the year. The sensitivity of MAGIC is sufficient to establish a flux level of 25% of the Crab flux for each measurement. These observations are well suited to trigger multiwavelength ToO observations and the overall collected data allow an unbiased study of the flaring statistics of the observed AGNs.Comment: 4 pages, 4 figures, to appear in the proceedings of the 30th International Cosmic Ray Conference, Merida, July 200

    Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel

    Full text link
    Wrist-wearables such as smartwatches and fitness bands are equipped with a variety of high-precision sensors that support novel contextual and activity-based applications. The presence of a diverse set of on-board sensors, however, also expose an additional attack surface which, if not adequately protected, could be potentially exploited to leak private user information. In this paper, we investigate the feasibility of a new attack that takes advantage of a wrist-wearable's motion sensors to infer input on mechanical devices typically used to secure physical access, for example, combination locks. We outline an inference framework that attempts to infer a lock's unlock combination from the wrist motion captured by a smartwatch's gyroscope sensor, and uses a probabilistic model to produce a ranked list of likely unlock combinations. We conduct a thorough empirical evaluation of the proposed framework by employing unlocking-related motion data collected from human subject participants in a variety of controlled and realistic settings. Evaluation results from these experiments demonstrate that motion data from wrist-wearables can be effectively employed as a side-channel to significantly reduce the unlock combination search-space of commonly found combination locks, thus compromising the physical security provided by these locks

    Second harmonic generation in SiC polytypes

    Full text link
    LMTO calculations are presented for the frequency dependent second harmonic generation (SHG) in the polytypes 2H, 4H, 6H, 15R and 3C of SiC. All independent tensor components are calculated. The spectral features and the ratios of the 333 to 311 tensorial components are studied as a function of the degree of hexagonality. The relationship to the linear optical response and the underlying band structure are investigated. SHG is suggested to be a sensitive tool for investigating the near band edge interband excitations.Comment: 12 pages, 10 figure

    Magnetism and domain formation in SU(3)-symmetric multi-species Fermi mixtures

    Get PDF
    We study the phase diagram of an SU(3)-symmetric mixture of three-component ultracold fermions with attractive interactions in an optical lattice, including the additional effect on the mixture of an effective three-body constraint induced by three-body losses. We address the properties of the system in D≥2D \geq 2 by using dynamical mean-field theory and variational Monte Carlo techniques. The phase diagram of the model shows a strong interplay between magnetism and superfluidity. In the absence of the three-body constraint (no losses), the system undergoes a phase transition from a color superfluid phase to a trionic phase, which shows additional particle density modulations at half-filling. Away from the particle-hole symmetric point the color superfluid phase is always spontaneously magnetized, leading to the formation of different color superfluid domains in systems where the total number of particles of each species is conserved. This can be seen as the SU(3) symmetric realization of a more general tendency to phase-separation in three-component Fermi mixtures. The three-body constraint strongly disfavors the trionic phase, stabilizing a (fully magnetized) color superfluid also at strong coupling. With increasing temperature we observe a transition to a non-magnetized SU(3) Fermi liquid phase.Comment: 36 pages, 17 figures; Corrected typo

    On the Gold Standard for Security of Universal Steganography

    Get PDF
    While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl

    Poaching and firm-sponsored training: first clean evidence

    Full text link
    A series of seminal theoretical papers argues that poaching of employees may hamper company-sponsored general training. However, the extent of poaching, its determinants and consequences, remains an open empirical question. We provide a novel empirical identification strategy for poaching and investigate its causes and consequences. We find that only a small number of training firms in Germany are poaching victims. Firms are more likely to poach employees during an economic downturn. Training firms respond to poaching by lowering the share of new apprentice intakes in the following years

    Magnetisation configuration in arrays of permalloy rectangles and its impact on magnetisation reversal

    Get PDF
    The remanent domain structures of composite element magnetic barcodes have been imaged using photo-emission electron microscopy with contrast from x-ray magnetic circular dichroism (XMCD-PEEM) and analysed with reference to the results of micromagnetic simulations. The magnetisation configuration at the end of wide strips is found to be perpendicular to the majority magnetisation direction. This transitions to an incomplete rotation for nominal strip widths below 300 nm and is found to affect the mechanics of magnetisation reversal for nominal strip widths below 200 nm, owing to a difference in magnetisation orientation when an external magnetic field is applied that is just smaller than the magnetic coercivity of the structures and a corresponding change in reversal dynamics. This change in domain structure as strip width decreases is consistent with both the influence of shape anisotropy and with measurements of magnetic hysteresis. The magnetisation reversal characteristics of composite element structures are found to be dependent on the relative magnetisation configurations of neighbouring strips, which in turn are found to vary stochastically upon the application and removal of a magnetic field along the easy axis of the structure. It is found that the application of a canted field is necessary to ensure sharp, consistent magnetisation reversal of bits when writing a binary code. These results confirm that either improved lithography of narrower strips or non-rectangular elements would be necessary to further increase the number of individually programmable bits in a barcode

    FACT -- The G-APD revolution in Cherenkov astronomy

    Full text link
    Since two years, the FACT telescope is operating on the Canary Island of La Palma. Apart from its purpose to serve as a monitoring facility for the brightest TeV blazars, it was built as a major step to establish solid state photon counters as detectors in Cherenkov astronomy. The camera of the First G-APD Cherenkov Telesope comprises 1440 Geiger-mode avalanche photo diodes (G-APD), equipped with solid light guides to increase the effective light collection area of each sensor. Since no sense-line is available, a special challenge is to keep the applied voltage stable although the current drawn by the G-APD depends on the flux of night-sky background photons significantly varying with ambient light conditions. Methods have been developed to keep the temperature and voltage dependent response of the G-APDs stable during operation. As a cross-check, dark count spectra with high statistics have been taken under different environmental conditions. In this presentation, the project, the developed methods and the experience from two years of operation of the first G-APD based camera in Cherenkov astronomy under changing environmental conditions will be presented.Comment: Proceedings of the Nuclear Science Symposium and Medical Imaging Conference (IEEE-NSS/MIC), 201
    • …
    corecore