9,274 research outputs found

    Response of electrostatic probes to ionized gas flows in a shock tube

    Get PDF
    In his excellent analysis of electrical measurements in shock tube flows, Hollyer(1) has demonstrated certain pitfalls in the application of conventional Langmuir probe techniques to the evaluation of charge densities in the moving stream of hot gas confined within the tube walls. The purpose of this note is to describe somewhat similar experiments which illustrate other eccentricities in probe behavior under these conditions

    Wedge Local Deformations of Charged Fields leading to Anyonic Commutation Relations

    Full text link
    The method of deforming free fields by using multiplication operators on Fock space, introduced by G. Lechner in [11], is generalized to a charged free field on two- and three-dimensional Minkowski space. In this case the deformation function can be chosen in such a way that the deformed fields satisfy generalized commutation relations, i.e. they behave like Anyons instead of Bosons. The fields are "polarization free" in the sense that they create only one-particle states from the vacuum and they are localized in wedges (or "paths of wedges"), which makes it possible to circumvent a No-Go theorem by J. Mund [12], stating that there are no free Anyons localized in spacelike cones. The two-particle scattering matrix, however, can be defined and is different from unity

    Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

    Full text link
    In this paper, we present a black-box attack against API call based machine learning malware classifiers, focusing on generating adversarial sequences combining API calls and static features (e.g., printable strings) that will be misclassified by the classifier without affecting the malware functionality. We show that this attack is effective against many classifiers due to the transferability principle between RNN variants, feed forward DNNs, and traditional machine learning classifiers such as SVM. We also implement GADGET, a software framework to convert any malware binary to a binary undetected by malware classifiers, using the proposed attack, without access to the malware source code.Comment: Accepted as a conference paper at RAID 201

    Electron-Phonon Interaction in Embedded Semiconductor Nanostructures

    Full text link
    The modification of acoustic phonons in semiconductor nanostructures embedded in a host crystal is investigated including corrections due to strain within continuum elasticity theory. Effective elastic constants are calculated employing {\em ab initio} density functional theory. For a spherical InAs quantum dot embedded in GaAs barrier material, the electron-phonon coupling is calculated. Its strength is shown to be suppressed compared to the assumption of bulk phonons

    Geometry of the Grosse-Wulkenhaar Model

    Full text link
    We define a two-dimensional noncommutative space as a limit of finite-matrix spaces which have space-time dimension three. We show that on such space the Grosse-Wulkenhaar (renormalizable) action has natural interpretation as the action for the scalar field coupled to the curvature. We also discuss a natural generalization to four dimensions.Comment: 16 pages, version accepted in JHE

    J-Class Abelian Semigroups of Matrices on C^n and Hypercyclicity

    Full text link
    We give a characterization of hypercyclic finitely generated abelian semigroups of matrices on C^n using the extended limit sets (the J-sets). Moreover we construct for any n\geq 2 an abelian semigroup G of GL(n;C) generated by n + 1 diagonal matrices which is locally hypercyclic but not hypercyclic and such that JG(e_k) = C^n for every k = 1; : : : ; n, where (e_1; : : : ; e_n) is the canonical basis of C^n. This gives a negative answer to a question raised by Costakis and Manoussos.Comment: 10 page

    On Batalin-Vilkovisky Formalism of Non-Commutative Field Theories

    Full text link
    We apply the BV formalism to non-commutative field theories, introduce BRST symmetry, and gauge-fix the models. Interestingly, we find that treating the full gauge symmetry in non-commutative models can lead to reducible gauge algebras. As one example we apply the formalism to the Connes-Lott two-point model. Finally, we offer a derivation of a superversion of the Harish-Chandra-Itzykson-Zuber integral.Comment: 20 pages, LaTeX. v2: minor corrections. v3: Added an Appendix about Harish-Chandra-Itzykson-Zuber integrals. v4: Added Reference
    • …
    corecore