65,336 research outputs found
Enhancement of variation of fundamental constants in ultracold atom and molecule systems near Feshbach resonances
Scattering length, which can be measured in Bose-Einstein condensate and
Feshbach molecule experiments, is extremely sensitive to the variation of
fundamental constants, in particular, the electron-to-proton mass ratio
(m_e/m_p or m_e/Lambda_{QCD}, where Lambda_{QCD} is the QCD scale). Based on
single- and two-channel scattering model, we show how the variation of the mass
ratio propagates to the scattering length. Our results suggest that variation
of m_e/m_p on the level of 10^{-11}~10^{-14} can be detected near a narrow
magnetic or an optical Feshbach resonance by monitoring the scattering length
on the 1% level. Derived formulae may also be used to estimate the isotopic
shift of the scattering length
Recommended from our members
Net solar generation potential from urban rooftops in Los Angeles
Rooftops provide accessible locations for solar energy installations. While rooftop solar arrays can offset in-building electricity needs, they may also stress electric grid operations. Here we present an analysis of net electricity generation potential from distributed rooftop solar in Los Angeles. We integrate spatial and temporal data for property-level electricity demands, rooftop solar generation potential, and grid capacity constraints to estimate the potential for solar to meet on-site demands and supply net exports to the electric grid. In the study area with 1.2 million parcels, rooftop solar could meet 7200 Gigawatt Hours (GWh) of on-site building demands (~29% of demand). Overall potential net generation is negative, meaning buildings use more electricity than they can produce. Yet, cumulative net export potential from solar to grid circuits is 16,400 GWh. Current policies that regulate solar array interconnection to the grid result in unutilized solar power output of 1700 MW. Lower-income and at-risk communities in LA have greater potential for exporting net solar generation to the grid. This potential should be recognized through investments and policy innovations. The method demonstrates the need for considering time-dependent calculations of net solar potential and offers a template for distributed renewable energy planning in cities
Formation and kinetics of transient metastable states in mixtures under coupled phase ordering and chemical demixing
We present theory and simulation of simultaneous chemical demixing and phase
ordering in a polymer-liquid crystal mixture in conditions where isotropic-
isotropic phase separation is metastable with respect to isotropic-nematic
phase transition. It is found that mesophase formation proceeds by a transient
metastable phase that surround the ordered phase, and whose lifetime is a
function of the ratio of diffusional to orientational mobilities. It is shown
that kinetic phase ordering in polymer-mesogen mixtures is analogous to kinetic
crystallization in polymer solutions.Comment: 17 pages, 5 figures accepted for publication in EP
Strategies for protecting intellectual property when using CUDA applications on graphics processing units
Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators examining the operation of software. The ability to carry out reverse-engineering of software is of great importance within the security and forensics elds, particularly when investigating malicious software or carrying out forensic analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Uni ed Device Architecture) framework, it is not clear how best to approach the reverse engineering of a piece of CUDA software. We carry out a review of the di erent binary output formats which may be encountered from the CUDA compiler, and their implications on reverse engineering. We then demonstrate the process of carrying out disassembly of an example CUDA application, to establish the various techniques available to forensic investigators carrying out black-box disassembly and reverse engineering of CUDA binaries. We show that the Nvidia compiler, using default settings, leaks useful information. Finally, we demonstrate techniques to better protect intellectual property in CUDA algorithm implementations from reverse engineering
Returns, Volatility and Liquidity on the ASX: Undisclosed vs. Disclosed Limit Orders
This paper investigates the information content of the two types of limit orders on the Australian Stock Exchange ASX: undisclosed orders (ULOs) and limit orders. Given the large order quantity contained in ULOs, we attempt to examine the impact of ULO submissions, cancellations and executions on price changes and volatility over differing intervals within a day. Motivation is generated by the ASX decision to abolish the use of ULOs in favour of iceberg orders. Intraday analysis shows that the impact of both ULO and disclosed order submissions are no longer than one day. ULO buying/selling order submissions at the best bid/ask price increase/decrease returns and price volatility significantly more than disclosed orders. The cancellations of ULOs cause significantly larger price volatility than disclosed limit order cancellations. Compared with disclosed limit order submissions, there is an increase in liquidity from the significantly reduced spread upon DLO submissions.Intraday effects, Return volatility, Undisclosed limit orders
- …