19,233 research outputs found
Locally addressable tunnel barriers within a carbon nanotube
We report the realization and characterization of independently controllable
tunnel barriers within a carbon nanotube. The nanotubes are mechanically bent
or kinked using an atomic force microscope, and top gates are subsequently
placed near each kink. Transport measurements indicate that the kinks form
gate-controlled tunnel barriers, and that gates placed away from the kinks have
little or no effect on conductance. The overall conductance of the nanotube can
be controlled by tuning the transmissions of either the kinks or the
metal-nanotube contacts.Comment: related papers at http://marcuslab.harvard.ed
Electron tunneling time measured by photoluminescence excitation correlation spectroscopy
The tunneling time for electrons to escape from the lowest quasibound state in the quantum wells of GaAs/AlAs/GaAs/AlAs/GaAs double-barrier heterostructures with barriers between 16 and 62 Å has been measured at 80 K using photoluminescence excitation correlation spectroscopy. The decay time for samples with barrier thicknesses from 16 Å (≈12 ps) to 34 Å(≈800 ps) depends exponentially on barrier thickness, in good agreement with calculations of electron tunneling time derived from the energy width of the resonance. Electron and heavy hole carrier densities are observed to decay at the same rate, indicating a coupling between the two decay processes
Automated Big Text Security Classification
In recent years, traditional cybersecurity safeguards have proven ineffective
against insider threats. Famous cases of sensitive information leaks caused by
insiders, including the WikiLeaks release of diplomatic cables and the Edward
Snowden incident, have greatly harmed the U.S. government's relationship with
other governments and with its own citizens. Data Leak Prevention (DLP) is a
solution for detecting and preventing information leaks from within an
organization's network. However, state-of-art DLP detection models are only
able to detect very limited types of sensitive information, and research in the
field has been hindered due to the lack of available sensitive texts. Many
researchers have focused on document-based detection with artificially labeled
"confidential documents" for which security labels are assigned to the entire
document, when in reality only a portion of the document is sensitive. This
type of whole-document based security labeling increases the chances of
preventing authorized users from accessing non-sensitive information within
sensitive documents. In this paper, we introduce Automated Classification
Enabled by Security Similarity (ACESS), a new and innovative detection model
that penetrates the complexity of big text security classification/detection.
To analyze the ACESS system, we constructed a novel dataset, containing
formerly classified paragraphs from diplomatic cables made public by the
WikiLeaks organization. To our knowledge this paper is the first to analyze a
dataset that contains actual formerly sensitive information annotated at
paragraph granularity.Comment: Pre-print of Best Paper Award IEEE Intelligence and Security
Informatics (ISI) 2016 Manuscrip
Second-generation PLINK: rising to the challenge of larger and richer datasets
PLINK 1 is a widely used open-source C/C++ toolset for genome-wide
association studies (GWAS) and research in population genetics. However, the
steady accumulation of data from imputation and whole-genome sequencing studies
has exposed a strong need for even faster and more scalable implementations of
key functions. In addition, GWAS and population-genetic data now frequently
contain probabilistic calls, phase information, and/or multiallelic variants,
none of which can be represented by PLINK 1's primary data format.
To address these issues, we are developing a second-generation codebase for
PLINK. The first major release from this codebase, PLINK 1.9, introduces
extensive use of bit-level parallelism, O(sqrt(n))-time/constant-space
Hardy-Weinberg equilibrium and Fisher's exact tests, and many other algorithmic
improvements. In combination, these changes accelerate most operations by 1-4
orders of magnitude, and allow the program to handle datasets too large to fit
in RAM. This will be followed by PLINK 2.0, which will introduce (a) a new data
format capable of efficiently representing probabilities, phase, and
multiallelic variants, and (b) extensions of many functions to account for the
new types of information.
The second-generation versions of PLINK will offer dramatic improvements in
performance and compatibility. For the first time, users without access to
high-end computing resources can perform several essential analyses of the
feature-rich and very large genetic datasets coming into use.Comment: 2 figures, 1 additional fil
- …