14,354 research outputs found

    Entanglement production in quantum decision making

    Full text link
    The quantum decision theory introduced recently is formulated as a quantum theory of measurement. It describes prospect states represented by complex vectors of a Hilbert space over a prospect lattice. The prospect operators, acting in this space, form an involutive bijective algebra. A measure is defined for quantifying the entanglement produced by the action of prospect operators. This measure characterizes the level of complexity of prospects involved in decision making. An explicit expression is found for the maximal entanglement produced by the operators of multimode prospects.Comment: Latex file, 7 page

    Multiobjective analysis for the design and control of an electromagnetic valve actuator

    Get PDF
    The electromagnetic valve actuator can deliver much improved fuel efficiency and reduced emissions in spark ignition (SI) engines owing to the potential for variable valve timing when compared with cam-operated, or conventional, variable valve strategies. The possibility exists to reduce pumping losses by throttle-free operation, along with closed-valve engine braking. However, further development is required to make the technology suitable for accept- ance into the mass production market. This paper investigates the application of multiobjective optimization techniques to the conflicting objective functions inherent in the operation of such a device. The techniques are utilized to derive the optimal force–displacement characteristic for the solenoid actuator, along with its controllability and dynamic/steady state performance

    Evidence of Skyrmion excitations about ν=1\nu =1 in n-Modulation Doped Single Quantum Wells by Inter-band Optical Transmission

    Full text link
    We observe a dramatic reduction in the degree of spin-polarization of a two-dimensional electron gas in a magnetic field when the Fermi energy moves off the mid-point of the spin-gap of the lowest Landau level, ν=1\nu=1. This rapid decay of spin alignment to an unpolarized state occurs over small changes to both higher and lower magnetic field. The degree of electron spin polarization as a function of ν\nu is measured through the magneto-absorption spectra which distinguish the occupancy of the two electron spin states. The data provide experimental evidence for the presence of Skyrmion excitations where exchange energy dominates Zeeman energy in the integer quantum Hall regime at ν=1\nu=1

    Suppression of geometrical barrier in Bi2Sr2CaCu2O8+δBi_2Sr_2CaCu_2O_{8+\delta} crystals by Josephson vortex stacks

    Full text link
    Differential magneto-optics are used to study the effect of dc in-plane magnetic field on hysteretic behavior due to geometrical barriers in Bi2Sr2CaCu2O8+δBi_2Sr_2CaCu_2O_{8+\delta} crystals. In absence of in-plane field a vortex dome is visualized in the sample center surrounded by barrier-dominated flux-free regions. With in-plane field, stacks of Josephson vortices form vortex chains which are surprisingly found to protrude out of the dome into the vortex-free regions. The chains are imaged to extend up to the sample edges, thus providing easy channels for vortex entry and for drain of the dome through geometrical barrier, suppressing the magnetic hysteresis. Reduction of the vortex energy due to crossing with Josephson vortices is evaluated to be about two orders of magnitude too small to account for the formation of the protruding chains. We present a model and numerical calculations that qualitatively describe the observed phenomena by taking into account the demagnetization effects in which flux expulsion from the pristine regions results in vortex focusing and in the chain protrusion. Comparative measurements on a sample with narrow etched grooves provide further support to the proposed model.Comment: 12 figures (low res.) Higher resolution figures are available at the Phys Rev B version. Typos correcte

    Using intelligent optimization methods to improve the group method of data handling in time series prediction

    Get PDF
    In this paper we show how the performance of the basic algorithm of the Group Method of Data Handling (GMDH) can be improved using Genetic Algorithms (GA) and Particle Swarm Optimization (PSO). The new improved GMDH is then used to predict currency exchange rates: the US Dollar to the Euros. The performance of the hybrid GMDHs are compared with that of the conventional GMDH. Two performance measures, the root mean squared error and the mean absolute percentage errors show that the hybrid GMDH algorithm gives more accurate predictions than the conventional GMDH algorithm

    The Origin of the Electromagnetic Interaction in Einstein's Unified Field Theory with Sources

    Full text link
    Einstein's unified field theory is extended by the addition of matter terms in the form of a symmetric energy tensor and of two conserved currents. From the field equations and from the conservation identities emerges the picture of a gravoelectrodynamics in a dynamically polarizable Riemannian continuum. Through an approximate calculation exploiting this dynamical polarizability it is argued that ordinary electromagnetism may be contained in the theory.Comment: 8 pages. Misprint in eq. 15 correcte

    Shortest Path Computation with No Information Leakage

    Get PDF
    Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client's position and her destination may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. The only existing method for privacy-preserving shortest path computation follows the obfuscation paradigm; it prevents the LBS from inferring the source and destination of the query with a probability higher than a threshold. This implies, however, that the LBS still deduces some information (albeit not exact) about the client's location and her destination. In this paper we aim at strong privacy, where the adversary learns nothing about the shortest path query. We achieve this via established private information retrieval techniques, which we treat as black-box building blocks. Experiments on real, large-scale road networks assess the practicality of our schemes.Comment: VLDB201
    • …
    corecore