87 research outputs found

    High Order Momentum Modes by Resonant Superradiant Scattering

    Full text link
    The spatial and time evolutions of superradiant scattering are studied theoretically for a weak pump beam with different frequency components traveling along the long axis of an elongated Bose-Einstein condensate. Resulting from the analysis for mode competition between the different resonant channels and the local depletion of the spatial distribution in the superradiant Rayleigh scattering, a new method of getting a large number of high-order forward modes by resonant frequency components of the pump beam is provided, which is beneficial to a lager momentum transfer in atom manipulation for the atom interferometry and atomic optics.Comment: 7 pages, 7 figure

    Diversity Order Analysis for Quantized Constant Envelope Transmission

    Full text link
    Quantized constant envelope (QCE) transmission is a popular and effective technique to reduce the hardware cost and improve the power efficiency of 5G and beyond systems equipped with large antenna arrays. It has been widely observed that the number of quantization levels has a substantial impact on the system performance. This paper aims to quantify the impact of the number of quantization levels on the system performance. Specifically, we consider a downlink single-user multiple-input-single-output (MISO) system with M-phase shift keying (PSK) constellation under the Rayleigh fading channel. We first derive a novel bound on the system symbol error probability (SEP). Based on the derived SEP bound, we characterize the achievable diversity order of the quantized matched filter (MF) precoding strategy. Our results show that full diversity order can be achieved when the number of quantization levels L is greater than the PSK constellation order M, i.e., L>M, only half diversity order is achievable when L=M, and the achievable diversity order is 0 when L<M. Simulation results verify our theoretical analysis.Comment: 9 pages, 3 figures, submitted for possible publicatio

    Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework

    Get PDF
    Block ciphers are prevalent in various security protocols used daily such as TLS, OpenPGP, and SSH. Their primary purpose is the protection of user data, both in transit and at rest. One of the de facto methods to evaluate block cipher security is differential cryptanalysis. Differential cryptanalysis observes the propagation of input patterns (input differences) through the cipher to produce output patterns (output differences). This probabilistic propagation is known as a differential; the identification of which is a measure of a block cipher’s security margins. This paper introduces an optimized GPU-based branch-and-bound framework for differential search. We optimize search efficiency by parallelizing all branch-and-bound operations, completing the entire search on the GPU without communicating with the CPU. The meet-in-the-middle (MITM) approach is also adopted for further performance gains. We analyze the financial and computational costs of the proposed framework using Google Cloud VM to showcase its practicality. When optimized for performance, we can attain up to 90x speedup while saving up to 47% of the running cost as compared to a single CPU core. When optimized for cost, the proposed framework can save up to 83% of financial costs while retaining a speedup of up to 40x. As a proof of concept, the proposed framework was then applied on 128-bit TRIFLE-BC, 64-bit PRESENT, and 64-bit GIFT. Notably, we identified the best differentials for PRESENT (16 rounds) and 64-bit GIFT (13 rounds) to date, with estimated probabilities of 261.79642^{-61.7964} and 260.662^{-60.66} respectively. Although the differential results for TRIFLE-BC were incremental, the proposed framework was able to construct differentials for 43 rounds that consisted of approximately 5.8x more individual trails than previous work, making it one of the most efficient approaches for larger block ciphers

    Experimental study on mechanical damage characteristics of water-bearing tar-rich coal under microwave radiation

    Get PDF
    As a recognized special resource, tar-rich coal can extract the country's scarce oil and gas resources and generate semi-coke that can replace anthracite and coking coal. The tar-rich coal in northern Shaanxi is prominent, but due to the dense structure and high strength of tar-rich coal, it is easy to cause frequent dynamic disasters in coal mining. Therefore, the realization of pressure relief and disaster reduction has become the primary problem in mining tar-rich coal. There are many shortcomings in conventional pressure relief methods, so a new method of microwave-weakening coal is proposed. Through different water saturation treatments of tar-rich coal samples, the longitudinal wave velocity degradation trend and surface crack expansion law of water-bearing coal after microwave irradiation were analyzed, and the strength softening characterization and energy evolution relationship under the combined action of microwave and water were studied. Fractal dimension and its internal correlation based on the equivalent side length-mass of coal sample fragments. The experimental results show that: (1) Under the same microwave radiation condition, with the increase of water saturation, the deterioration trend of physical and mechanical parameters such as longitudinal wave velocity and peak strength is obvious. (2) After microwave radiation, the uniaxial compression results show that the coal sample is damaged by load, there is still a high residual strength, the ratio of elastic energy to dissipation energy decreases, and the possibility of rockburst of the coal sample decreases. The strength softening degree of coal specimen under the degradation of microwave and water is the highest, followed by microwave and water. (3) The fractal dimension is inversely proportional to the moisture content and microwave radiation intensity, and the fractal dimension has a significant positive correlation with the peak intensity and longitudinal wave velocity. The mechanical damage law of water-bearing tar-rich coal under microwave action is revealed, which aims to solve the problem of weakening and reducing the impact of hard coal on-site to a certain extent, ensure the safety of working face, and improve the mining efficiency of tar-rich coal. It provides basic theoretical support for microwave-assisted hydraulic fracturing technology and effective weakening measures for hard roof treatment

    Ion Doping Effects on the Lattice Distortion and Interlayer Mismatch of Aurivillius-Type Bismuth Titanate Compounds

    Get PDF
    Taking Bismuth Titanate (Bi4Ti3O12) as a Aurivillius-type compound with m = 3 for example, the ion (W6+/Cr3+) doping effect on the lattice distortion and interlayer mismatch of Bi4Ti3O12 structure were investigated by stress analysis, based on an elastic model. Since oxygen-octahedron rotates in the ab-plane, and inclines away from the c-axis, a lattice model for describing the status change of oxygen-octahedron was built according to the substituting mechanism of W6+/Cr3+ for Ti4+, which was used to investigate the variation of orthorhombic distortion degree (a/b) of Bi4Ti3O12 with the doping content. The analysis shows that the incorporation of W6+/Cr3+ into Bi4Ti3O12 tends to relieve the distortion of pseudo-perovskite layer, which also helps it to become more stiff. Since the bismuth-oxide layer expands while the pseudo-perovskite layer tightens, an analytic model for the plane stress distribution in the crystal lattice of Bi4Ti3O12 was developed from the constitutive relationship of alternating layer structure. The calculations reveal that the structural mismatch of Bi4Ti3O12 is constrained in the ab-plane of a unit cell, since both the interlayer mismatch degree and the total strain energy vary with the doping content in a similar trend to the lattice parameters of ab-plane

    Neural Representations of Task-relevant and Task-irrelevant Features of Attended Objects

    No full text

    Lattice-based group signatures with forward security for anonymous authentication

    No full text
    Group signatures allow users to sign messages on behalf of a group without revealing authority is capable of identifying the user who generated it. However, the exposure of the user's signing key will severely damage the group signature scheme. In order to reduce the loss caused by signing key leakage, Song proposed the first forward-secure group signature. If a group signing key is revealed at the current time period, the previous signing key will not be affected. This means that the attacker cannot forge group signatures regarding messages signed in the past. To resist quantum attacks, many lattice-based forward-secure group signatures have been proposed. However, their key-update algorithm is expensive since they require some costly computations such as the Hermite normal form (HNF) operations and conversion from a full-rank set of lattice vectors into a basis.In this paper, we propose the group signature with forward security from lattice. In comparison with previous works, we have several advantages: Firstly, our scheme is more effective since we only need to sample some vectors independently from a discrete Gaussian during the key-update algorithm. Secondly, the derived secret key size is linear instead of quadratic with the lattice dimensions, which is more friendly towards lightweight applications. Anonymous authentication plays an increasingly critical role in protecting privacy and security in the environment where private information could be collected for intelligent analysis. Our work contributes to the anonymous authentication in the post-quantum setting, which has wide potential applications in the IoT environment
    corecore