11,655 research outputs found

    Giant coherence in driven systems

    Get PDF
    We study the noise-induced currents and reliability or coherence of transport in two different classes of rocking ratchets. For this, we consider the motion of Brownian particles in the over damped limit in both adiabatic and non-adiabatic regimes subjected to unbiased temporally symmetric and asymmetric periodic driving force. In the case of a time symmetric driving, we find that even in the presence of a spatially symmetric simple sinusoidal potential, highly coherent transport occurs. These ratchet systems exhibit giant coherence of transport in the regime of parameter space where unidirectional currents in the deterministic case are observed. Outside this parameter range, i.e., when current vanishes in the deterministic regime, coherence in transport is very low. The transport coherence decreases as a function of temperature and is a non-monotonic function of the amplitude of driving. The transport becomes unreliable as we go from the adiabatic to the non-adiabatic domain of operation.Comment: 15 pages, 9 figures, replaced by the version to appear in JSTA

    Improved Stack-Slide Searches for Gravitational-Wave Pulsars

    Full text link
    We formulate and optimize a computational search strategy for detecting gravitational waves from isolated, previously-unknown neutron stars (that is, neutron stars with unknown sky positions, spin frequencies, and spin-down parameters). It is well known that fully coherent searches over the relevant parameter-space volumes are not computationally feasible, and so more computationally efficient methods are called for. The first step in this direction was taken by Brady & Creighton (2000), who proposed and optimized a two-stage, stack-slide search algorithm. We generalize and otherwise improve upon the Brady-Creighton scheme in several ways. Like Brady & Creighton, we consider a stack-slide scheme, but here with an arbitrary number of semi-coherent stages and with a coherent follow-up stage at the end. We find that searches with three semi-coherent stages are significantly more efficient than two-stage searches (requiring about 2-5 times less computational power for the same sensitivity) and are only slightly less efficient than searches with four or more stages. We calculate the signal-to-noise ratio required for detection, as a function of computing power and neutron star spin-down-age, using our optimized searches.Comment: 19 pages, 7 figures, RevTeX

    Tattoo pigment in an axillary lymph node simulating metastatic malignant melanoma

    Get PDF
    We report a case of axillary lymphadenopathy thirty years after a decorative tattoo clinically mimicking metastatic melanoma. The importance of relying on histological confirmation of metastatic disease before altering extent of surgery is discussed. The importance of recording presence of decorative tattoos is stressed

    Evolutionary multiobjective optimization of the multi-location transshipment problem

    Full text link
    We consider a multi-location inventory system where inventory choices at each location are centrally coordinated. Lateral transshipments are allowed as recourse actions within the same echelon in the inventory system to reduce costs and improve service level. However, this transshipment process usually causes undesirable lead times. In this paper, we propose a multiobjective model of the multi-location transshipment problem which addresses optimizing three conflicting objectives: (1) minimizing the aggregate expected cost, (2) maximizing the expected fill rate, and (3) minimizing the expected transshipment lead times. We apply an evolutionary multiobjective optimization approach using the strength Pareto evolutionary algorithm (SPEA2), to approximate the optimal Pareto front. Simulation with a wide choice of model parameters shows the different trades-off between the conflicting objectives

    Privacy Mining from IoT-based Smart Homes

    Full text link
    Recently, a wide range of smart devices are deployed in a variety of environments to improve the quality of human life. One of the important IoT-based applications is smart homes for healthcare, especially for elders. IoT-based smart homes enable elders' health to be properly monitored and taken care of. However, elders' privacy might be disclosed from smart homes due to non-fully protected network communication or other reasons. To demonstrate how serious this issue is, we introduce in this paper a Privacy Mining Approach (PMA) to mine privacy from smart homes by conducting a series of deductions and analyses on sensor datasets generated by smart homes. The experimental results demonstrate that PMA is able to deduce a global sensor topology for a smart home and disclose elders' privacy in terms of their house layouts.Comment: This paper, which has 11 pages and 7 figures, has been accepted BWCCA 2018 on 13th August 201

    The Black Di-Ring: An Inverse Scattering Construction

    Full text link
    We use the inverse scattering method (ISM) to derive concentric non-supersymmetric black rings. The approach used here is fully five-dimensional, and has the modest advantage that it generalizes readily to the construction of more general axi-symmetric solutions.Comment: v3: 2 subsections added, typos fixed, more refs, journal version. v4: a transcription error in the ADM mass fixe

    Introduction to dynamical horizons in numerical relativity

    Full text link
    This paper presents a quasi-local method of studying the physics of dynamical black holes in numerical simulations. This is done within the dynamical horizon framework, which extends the earlier work on isolated horizons to time-dependent situations. In particular: (i) We locate various kinds of marginal surfaces and study their time evolution. An important ingredient is the calculation of the signature of the horizon, which can be either spacelike, timelike, or null. (ii) We generalize the calculation of the black hole mass and angular momentum, which were previously defined for axisymmetric isolated horizons to dynamical situations. (iii) We calculate the source multipole moments of the black hole which can be used to verify that the black hole settles down to a Kerr solution. (iv) We also study the fluxes of energy crossing the horizon, which describes how a black hole grows as it accretes matter and/or radiation. We describe our numerical implementation of these concepts and apply them to three specific test cases, namely, the axisymmetric head-on collision of two black holes, the axisymmetric collapse of a neutron star, and a non-axisymmetric black hole collision with non-zero initial orbital angular momentum.Comment: 20 pages, 16 figures, revtex4. Several smaller changes, some didactic content shortene

    Multiple Dp_p-branes as a Dp+2_{p+2}-brane

    Full text link
    From BFSS matrix theory considerations, it is expected that a single Dp+2_{p+2}-brane action can be obtained from N Dp_p-brane action in large N limit. We examine and confirm this expectation by working out the details of DBI and Chern-Simons terms of Dp+2_{p+2}-brane action from Dp_{p}-brane action. We show that the same relation works for non-BPS, as well as BPS branesComment: 14 page
    • …
    corecore