11,655 research outputs found
Giant coherence in driven systems
We study the noise-induced currents and reliability or coherence of transport
in two different classes of rocking ratchets. For this, we consider the motion
of Brownian particles in the over damped limit in both adiabatic and
non-adiabatic regimes subjected to unbiased temporally symmetric and asymmetric
periodic driving force. In the case of a time symmetric driving, we find that
even in the presence of a spatially symmetric simple sinusoidal potential,
highly coherent transport occurs. These ratchet systems exhibit giant coherence
of transport in the regime of parameter space where unidirectional currents in
the deterministic case are observed. Outside this parameter range, i.e., when
current vanishes in the deterministic regime, coherence in transport is very
low. The transport coherence decreases as a function of temperature and is a
non-monotonic function of the amplitude of driving. The transport becomes
unreliable as we go from the adiabatic to the non-adiabatic domain of
operation.Comment: 15 pages, 9 figures, replaced by the version to appear in JSTA
Improved Stack-Slide Searches for Gravitational-Wave Pulsars
We formulate and optimize a computational search strategy for detecting
gravitational waves from isolated, previously-unknown neutron stars (that is,
neutron stars with unknown sky positions, spin frequencies, and spin-down
parameters). It is well known that fully coherent searches over the relevant
parameter-space volumes are not computationally feasible, and so more
computationally efficient methods are called for. The first step in this
direction was taken by Brady & Creighton (2000), who proposed and optimized a
two-stage, stack-slide search algorithm. We generalize and otherwise improve
upon the Brady-Creighton scheme in several ways. Like Brady & Creighton, we
consider a stack-slide scheme, but here with an arbitrary number of
semi-coherent stages and with a coherent follow-up stage at the end. We find
that searches with three semi-coherent stages are significantly more efficient
than two-stage searches (requiring about 2-5 times less computational power for
the same sensitivity) and are only slightly less efficient than searches with
four or more stages. We calculate the signal-to-noise ratio required for
detection, as a function of computing power and neutron star spin-down-age,
using our optimized searches.Comment: 19 pages, 7 figures, RevTeX
Tattoo pigment in an axillary lymph node simulating metastatic malignant melanoma
We report a case of axillary lymphadenopathy thirty years after a decorative tattoo clinically mimicking metastatic melanoma. The importance of relying on histological confirmation of metastatic disease before altering extent of surgery is discussed. The importance of recording presence of decorative tattoos is stressed
Evolutionary multiobjective optimization of the multi-location transshipment problem
We consider a multi-location inventory system where inventory choices at each
location are centrally coordinated. Lateral transshipments are allowed as
recourse actions within the same echelon in the inventory system to reduce
costs and improve service level. However, this transshipment process usually
causes undesirable lead times. In this paper, we propose a multiobjective model
of the multi-location transshipment problem which addresses optimizing three
conflicting objectives: (1) minimizing the aggregate expected cost, (2)
maximizing the expected fill rate, and (3) minimizing the expected
transshipment lead times. We apply an evolutionary multiobjective optimization
approach using the strength Pareto evolutionary algorithm (SPEA2), to
approximate the optimal Pareto front. Simulation with a wide choice of model
parameters shows the different trades-off between the conflicting objectives
Privacy Mining from IoT-based Smart Homes
Recently, a wide range of smart devices are deployed in a variety of
environments to improve the quality of human life. One of the important
IoT-based applications is smart homes for healthcare, especially for elders.
IoT-based smart homes enable elders' health to be properly monitored and taken
care of. However, elders' privacy might be disclosed from smart homes due to
non-fully protected network communication or other reasons. To demonstrate how
serious this issue is, we introduce in this paper a Privacy Mining Approach
(PMA) to mine privacy from smart homes by conducting a series of deductions and
analyses on sensor datasets generated by smart homes. The experimental results
demonstrate that PMA is able to deduce a global sensor topology for a smart
home and disclose elders' privacy in terms of their house layouts.Comment: This paper, which has 11 pages and 7 figures, has been accepted BWCCA
2018 on 13th August 201
The Black Di-Ring: An Inverse Scattering Construction
We use the inverse scattering method (ISM) to derive concentric
non-supersymmetric black rings. The approach used here is fully
five-dimensional, and has the modest advantage that it generalizes readily to
the construction of more general axi-symmetric solutions.Comment: v3: 2 subsections added, typos fixed, more refs, journal version. v4:
a transcription error in the ADM mass fixe
Introduction to dynamical horizons in numerical relativity
This paper presents a quasi-local method of studying the physics of dynamical
black holes in numerical simulations. This is done within the dynamical horizon
framework, which extends the earlier work on isolated horizons to
time-dependent situations. In particular: (i) We locate various kinds of
marginal surfaces and study their time evolution. An important ingredient is
the calculation of the signature of the horizon, which can be either spacelike,
timelike, or null. (ii) We generalize the calculation of the black hole mass
and angular momentum, which were previously defined for axisymmetric isolated
horizons to dynamical situations. (iii) We calculate the source multipole
moments of the black hole which can be used to verify that the black hole
settles down to a Kerr solution. (iv) We also study the fluxes of energy
crossing the horizon, which describes how a black hole grows as it accretes
matter and/or radiation.
We describe our numerical implementation of these concepts and apply them to
three specific test cases, namely, the axisymmetric head-on collision of two
black holes, the axisymmetric collapse of a neutron star, and a
non-axisymmetric black hole collision with non-zero initial orbital angular
momentum.Comment: 20 pages, 16 figures, revtex4. Several smaller changes, some didactic
content shortene
Multiple D-branes as a D-brane
From BFSS matrix theory considerations, it is expected that a single
D-brane action can be obtained from N D-brane action in large N
limit. We examine and confirm this expectation by working out the details of
DBI and Chern-Simons terms of D-brane action from D-brane action.
We show that the same relation works for non-BPS, as well as BPS branesComment: 14 page
- …