8,732 research outputs found

    Effects of Measurement back-action in the stabilization of a Bose-Einstein condensate through feedback

    Full text link
    We apply quantum filtering and control to a particle in a harmonic trap under continuous position measurement, and show that a simple static feedback law can be used to cool the system. The final steady state is Gaussian and dependent on the feedback strength and coupling between the system and probe. In the limit of weak coupling this final state becomes the ground state. An earlier model by Haine et. al. (PRA 69, 2004) without measurement back-action showed dark states: states that did not display error signals, thus remaining unaffected by the control. This paper shows that for a realistic measurement process this is not true, which indicates that a Bose-Einstein condensate may be driven towards the ground state from any arbitrary initial state.Comment: 1 Tex, 4 PS pictures, 1 bbl fil

    Reflections on Software Failure Analysis

    Get PDF
    Failure studies are important in revealing the root causes, behaviors, and life cycle of defects in software systems. These studies either focus on understanding the characteristics of defects in specific classes of systems or the characteristics of a specific type of defect in the systems it manifests in. Failure studies have influenced various software engineering research directions, especially in the area of software evolution, defect detection, and program repair. In this paper, we reflect on the conduct of failure studies in software engineering. We reviewed a sample of 52 failure study papers. We identified several recurring problems in these studies, some of which hinder the ability of the engineering community to trust or replicate the results. Based on our findings, we suggest future research directions, including identifying and analyzing failure causal chains, standardizing the conduct of failure studies, and tool support for faster defect analysis.Comment: 6 pages, 4 figures To be published in: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '22

    SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties

    Get PDF
    This paper systematizes knowledge about secure software supply chain patterns. It identifies four stages of a software supply chain attack and proposes three security properties crucial for a secured supply chain: transparency, validity, and separation. The paper describes current security approaches and maps them to the proposed security properties, including research ideas and case studies of supply chains in practice. It discusses the strengths and weaknesses of current approaches relative to known attacks and details the various security frameworks put out to ensure the security of the software supply chain. Finally, the paper highlights potential gaps in actor and operation-centered supply chain security techniques

    Reflections on Software Failure Analysis

    Get PDF
    Failure studies are important in revealing the root causes, behaviors, and life cycle of defects in software systems. These studies either focus on understanding the characteristics of defects in specific classes of systems or the characteristics of a specific type of defect in the systems it manifests in. Failure studies have influenced various software engineering research directions, especially in the area of software evolution, defect detection, and program repair. In this paper, we reflect on the conduct of failure studies in software engineering. We reviewed a sample of 52 failure study papers. We identified several recurring problems in these studies, some of which hinder the ability of the engineering community to trust or replicate the results. Based on our findings, we suggest future research directions, including identifying and analyzing failure causal chains, standardizing the conduct of failure studies, and tool support for faster defect analysis

    Can multistate dark matter annihilation explain the high-energy cosmic ray lepton anomalies?

    Full text link
    Multistate dark matter (DM) models with small mass splittings and couplings to light hidden sector bosons have been proposed as an explanation for the PAMELA/Fermi/H.E.S.S. high-energy lepton excesses. We investigate this proposal over a wide range of DM density profiles, in the framework of concrete models with doublet or triplet dark matter and a hidden SU(2) gauge sector that mixes with standard model hypercharge. The gauge coupling is bounded from below by the DM relic density, and the Sommerfeld enhancement factor is explicitly computable for given values of the DM and gauge boson masses M, mu and the (largest) dark matter mass splitting delta M_{12}. Sommerfeld enhancement is stronger at the galactic center than near the Sun because of the radial dependence of the DM velocity profile, which strengthens the inverse Compton (IC) gamma ray constraints relative to usual assumptions. We find that the PAMELA/Fermi/H.E.S.S. lepton excesses are marginally compatible with the model predictions, and with CMB and Fermi gamma ray constraints, for M ~ 800 GeV, mu ~ 200 MeV, and a dark matter profile with noncuspy Einasto parameters alpha > 0.20, r_s ~ 30 kpc. We also find that the annihilating DM must provide only a subdominant (< 0.4) component of the total DM mass density, since otherwise the boost factor due to Sommerfeld enhancement is too large.Comment: 20 pages, 12 figures; v2: Corrected branching ratio for ground state DM annihilations into leptons, leading to boost factors that are larger than allowed. Added explicit results for doublet DM model. Some conclusions changed; main conclusion of tension between inverse Compton constraints and N-body simulations of halo profiles is unchange

    Aerial detection of waste disposal sites near Donna Reservoir in south Texas.

    Get PDF
    Aerial color-infrared (CIR) photography was used to detect and catalog unauthorized solid waste disposal sites around Donna Reservoir in the Lower Rio Grande Valley (LRGV) of southern Texas. Qualitative visual evaluation of the positive transparencies showed 25 possible disposal sites randomly scattered throughout the study area, located in sites ranging from bare soil to grass and mixed brush/woods. These sites were transposed onto a computer-generated area map for ground survey confirmation and use by organizations planning to clean-up the sites. Ground-truthing was used to identify waste contents at each site and to estimate waste volumes and areas covered. Unauthorized solid waste sites were verified in 23 of the 25 locations. Two sites contained only broken concrete and asphalt being utilized as erosional fill material. The ground survey identified ten solid waste sites missed on the aerial photos. These sites were missed due to their small size (\u3c 2 [m.sup.2]) and because they were covered by lodging guinea grass (Panicum maximum) or giant reed (Arundo donax). The addition of these missed sites to the other 25 locations hindered the overall accuracy of the aerial photographic survey (71.4%)

    Economic Factors Underlying the Unbundling of Advertising Agency Services

    Get PDF
    This paper addresses a longstanding puzzle involving the unbundling of services that has occurred over more than two decades in the U.S. advertising agency industry: How can the shift from the bundling to the unbundling of services be explained and what accounts for the slow pace of change? Using a cost-based theoretical framework of bundling due to Evans and Salinger (2005, 2008), we develop a simple model of an advertising agency's decision to unbundle its services as a tradeoff between the fixed cost to the advertiser of establishing and maintaining a relationship with an advertising agency and pecuniary economies of scale available in providing media services. The results from an econometric analysis of cross-sectional and pooled data collected by the U.S. Census Bureau for quinquennial censuses conducted between 1982 and 2002 support the key predictions of the model. We find that advertising agency establishments are more likely to unbundle if they are large and diversified in their service offerings and are less likely to do so with increasing age and greater geographical scope. We also find a strong trend toward unbundling over time, a result that is partially explained by increases in media prices over time.

    Scattering from Electroweak Strings

    Full text link
    The scattering of a charged fermion from an electroweak string is studied. Owing to an amplification of the wave function at the core radius, the cross sections for helicity flip processes can be largely enhanced. For 0<sin2θw<1/20 <\sin^2 \theta_w < 1/2 (where θw\theta_w is the Weinberg angle), ωkme\omega \sim k \sim m_e and kR1kR \ll 1, we show that the helicity flip differential cross section for electrons is of the order me1m_e^{-1} and is independent of angle. We compare our results with those obtained in calculations of rates for baryon number violating processes in the core of a cosmic string. In that case, while the enhancement is a general phenomenon, its actual magnitude is extremely sensitive to the fractional flux carried by the string core. Apart from showing the existence of a similar enhancement effect for non-topological strings, our results indicate that in some models the magnitude of enhancement can be rendered much less sensitive to the value of the parameters in the theories. Scattering of particles off semi-local strings and axion strings are also considered.Comment: Replaced with revised version "Tex with phyzzx, 18 pages, CALT-68-1921 Non-trivial changes made: discussion on axion strings corrected. Overlap with a recently revised version of hep-ph/9311202 note

    Examples of Embedded Defects (in Particle Physics and Condensed Matter)

    Get PDF
    We present a series of examples designed to clarify the formalism of the companion paper `Embedded Vortices'. After summarising this formalism in a prescriptive sense, we run through several examples: firstly, deriving the embedded defect spectrum for Weinberg-Salam theory, then discussing several examples designed to illustrate facets of the formalism. We then calculate the embedded defect spectrum for three physical Grand Unified Theories and conclude with a discussion of vortices formed in the superfluid 3^3He-A phase transition.Comment: final corrections. latex fil

    Development and Evaluation of an Undergraduate Science Communication Module

    Get PDF
    This paper describes the design and evaluation of an undergraduate final year science communication module for the Science Faculty at the University of East Anglia. The module focuses specifically on science communication and aims to bring an understanding of how science is disseminated to the public. Students on the module are made aware of the models surrounding science communication and investigate how the science culture interfaces with the public. During the module they learn how to adapt science concepts for different audiences and how to talk confidently about science to a lay-audience. Student motivation for module choice centres on the acquisition of transferable skills and students develop these skills through designing, running and evaluating a public outreach event at a school or in a public area. These transferable skills acquired include communication, interaction with different organisations such as museums and science centres, developing understanding of both the needs of different audiences and the importance of time management. They also develop skills relating to self-reflection and how to use this as a tool for future self development. The majority of students completing the module go on to further study, either a PhD, MSc or teacher training. The module can be sustained in its present formed if capped at 40 students, however it is recognised that to increase cohort size, further investment of faculty time and resources would be required
    corecore