603,880 research outputs found

    Decay rate of a Wannier exciton in low dimensional systems

    Full text link
    The superradiant decay rate of Wannier exciton in one dimensional system is studied. The crossover behavior from 1D chain to 2D film is also examined. It is found that the decay rate shows oscillatory dependence on channel width L. When the quasi 1-D channel is embeded with planar microcavities, it is shown that the dark mode exciton can be examined experimentally.Comment: 12 pages, 1 figur

    Alignment and orientation of an adsorbed dipole molecule

    Full text link
    Half-cycle laser pulse is applied on an absorbed molecule to investigate its alignment and orientation behavior. Crossover from field-free to hindered rotation motion is observed by varying the angel of hindrance of potential well. At small hindered angle, both alignment and orientation show sinusoidal-like behavior because of the suppression of higher excited states. However, mean alignment decreases monotonically as the hindered angle is increased, while mean orientation displays a minimum point at certain hindered angle. The reason is attributed to the symmetry of wavefunction and can be explained well by analyzing the coefficients of eigenstates.Comment: 4 pages, 4 figures, to appear in Phys. Rev. B (2004

    On Ladder Logic Bombs in Industrial Control Systems

    Full text link
    In industrial control systems, devices such as Programmable Logic Controllers (PLCs) are commonly used to directly interact with sensors and actuators, and perform local automatic control. PLCs run software on two different layers: a) firmware (i.e. the OS) and b) control logic (processing sensor readings to determine control actions). In this work, we discuss ladder logic bombs, i.e. malware written in ladder logic (or one of the other IEC 61131-3-compatible languages). Such malware would be inserted by an attacker into existing control logic on a PLC, and either persistently change the behavior, or wait for specific trigger signals to activate malicious behaviour. For example, the LLB could replace legitimate sensor readings with manipulated values. We see the concept of LLBs as a generalization of attacks such as the Stuxnet attack. We introduce LLBs on an abstract level, and then demonstrate several designs based on real PLC devices in our lab. In particular, we also focus on stealthy LLBs, i.e. LLBs that are hard to detect by human operators manually validating the program running in PLCs. In addition to introducing vulnerabilities on the logic layer, we also discuss countermeasures and we propose two detection techniques.Comment: 11 pages, 14 figures, 2 tables, 1 algorith

    Spin-charge separation: From one hole to finite doping

    Full text link
    In the presence of nonlocal phase shift effects, a quasiparticle can remain topologically stable even in a spin-charge separation state due to the confinement effect introduced by the phase shifts at finite doping. True deconfinement only happens in the zero-doping limit where a bare hole can lose its integrity and decay into holon and spinon elementary excitations. The Fermi surface structure is completely different in these two cases, from a large band-structure-like one to four Fermi points in one-hole case, and we argue that the so-called underdoped regime actually corresponds to a situation in between.Comment: 4 pages, 2 figures, presented in M2S-HTSC-VI conference (2000
    corecore