19,233 research outputs found

    Locally addressable tunnel barriers within a carbon nanotube

    Get PDF
    We report the realization and characterization of independently controllable tunnel barriers within a carbon nanotube. The nanotubes are mechanically bent or kinked using an atomic force microscope, and top gates are subsequently placed near each kink. Transport measurements indicate that the kinks form gate-controlled tunnel barriers, and that gates placed away from the kinks have little or no effect on conductance. The overall conductance of the nanotube can be controlled by tuning the transmissions of either the kinks or the metal-nanotube contacts.Comment: related papers at http://marcuslab.harvard.ed

    Electron tunneling time measured by photoluminescence excitation correlation spectroscopy

    Get PDF
    The tunneling time for electrons to escape from the lowest quasibound state in the quantum wells of GaAs/AlAs/GaAs/AlAs/GaAs double-barrier heterostructures with barriers between 16 and 62 Å has been measured at 80 K using photoluminescence excitation correlation spectroscopy. The decay time for samples with barrier thicknesses from 16 Å (≈12 ps) to 34 Å(≈800 ps) depends exponentially on barrier thickness, in good agreement with calculations of electron tunneling time derived from the energy width of the resonance. Electron and heavy hole carrier densities are observed to decay at the same rate, indicating a coupling between the two decay processes

    Automated Big Text Security Classification

    Full text link
    In recent years, traditional cybersecurity safeguards have proven ineffective against insider threats. Famous cases of sensitive information leaks caused by insiders, including the WikiLeaks release of diplomatic cables and the Edward Snowden incident, have greatly harmed the U.S. government's relationship with other governments and with its own citizens. Data Leak Prevention (DLP) is a solution for detecting and preventing information leaks from within an organization's network. However, state-of-art DLP detection models are only able to detect very limited types of sensitive information, and research in the field has been hindered due to the lack of available sensitive texts. Many researchers have focused on document-based detection with artificially labeled "confidential documents" for which security labels are assigned to the entire document, when in reality only a portion of the document is sensitive. This type of whole-document based security labeling increases the chances of preventing authorized users from accessing non-sensitive information within sensitive documents. In this paper, we introduce Automated Classification Enabled by Security Similarity (ACESS), a new and innovative detection model that penetrates the complexity of big text security classification/detection. To analyze the ACESS system, we constructed a novel dataset, containing formerly classified paragraphs from diplomatic cables made public by the WikiLeaks organization. To our knowledge this paper is the first to analyze a dataset that contains actual formerly sensitive information annotated at paragraph granularity.Comment: Pre-print of Best Paper Award IEEE Intelligence and Security Informatics (ISI) 2016 Manuscrip

    Second-generation PLINK: rising to the challenge of larger and richer datasets

    Get PDF
    PLINK 1 is a widely used open-source C/C++ toolset for genome-wide association studies (GWAS) and research in population genetics. However, the steady accumulation of data from imputation and whole-genome sequencing studies has exposed a strong need for even faster and more scalable implementations of key functions. In addition, GWAS and population-genetic data now frequently contain probabilistic calls, phase information, and/or multiallelic variants, none of which can be represented by PLINK 1's primary data format. To address these issues, we are developing a second-generation codebase for PLINK. The first major release from this codebase, PLINK 1.9, introduces extensive use of bit-level parallelism, O(sqrt(n))-time/constant-space Hardy-Weinberg equilibrium and Fisher's exact tests, and many other algorithmic improvements. In combination, these changes accelerate most operations by 1-4 orders of magnitude, and allow the program to handle datasets too large to fit in RAM. This will be followed by PLINK 2.0, which will introduce (a) a new data format capable of efficiently representing probabilities, phase, and multiallelic variants, and (b) extensions of many functions to account for the new types of information. The second-generation versions of PLINK will offer dramatic improvements in performance and compatibility. For the first time, users without access to high-end computing resources can perform several essential analyses of the feature-rich and very large genetic datasets coming into use.Comment: 2 figures, 1 additional fil
    • …
    corecore