21,918 research outputs found
Feasibility study of thin film tunnel cathodes
Thin film tunnel cathodes evaluated for use in ultrahigh vacuum gauge
Diffraction microstrain in nanocrystalline solids under load - heterogeneous medium approach
This is an account of the computation of X-ray microstrain in a polycrystal
with anisotropic elasticity under uniaxial external load. The results have been
published in the article "Microstrain in nanocrystalline solids under load by
virtual diffraction", at Europhysics Letters 89, 66002 (2010). The present
information was submitted to Europhysics Letters as part of the manuscript
package, and was available to the reviewers who recommended the paper for
publication.Comment: Supporting online material for J. Markmann, D. Bachurin, L.-H. Shao,
P. Gumbsch, J. Weissm\"uller, Microstrain in nanocrystalline solids under
load by virtual diffraction, Europhys. Lett. 89, 66002 (2010
Diffraction Analysis of 2-D Pupil Mapping for High-Contrast Imaging
Pupil-mapping is a technique whereby a uniformly-illuminated input pupil,
such as from starlight, can be mapped into a non-uniformly illuminated exit
pupil, such that the image formed from this pupil will have suppressed
sidelobes, many orders of magnitude weaker than classical Airy ring
intensities. Pupil mapping is therefore a candidate technique for coronagraphic
imaging of extrasolar planets around nearby stars. Unlike most other
high-contrast imaging techniques, pupil mapping is lossless and preserves the
full angular resolution of the collecting telescope. So, it could possibly give
the highest signal-to-noise ratio of any proposed single-telescope system for
detecting extrasolar planets. Prior analyses based on pupil-to-pupil
ray-tracing indicate that a planet fainter than 10^{-10} times its parent star,
and as close as about 2 lambda/D, should be detectable. In this paper, we
describe the results of careful diffraction analysis of pupil mapping systems.
These results reveal a serious unresolved issue. Namely, high-contrast pupil
mappings distribute light from very near the edge of the first pupil to a broad
area of the second pupil and this dramatically amplifies diffraction-based edge
effects resulting in a limiting attainable contrast of about 10^{-5}. We hope
that by identifying this problem others will provide a solution.Comment: 23 pages, 13 figures, also posted to
http://www.orfe.princeton.edu/~rvdb/tex/piaaFresnel/ms.pd
Perturbation Theory for Plasmonic Modulation and Sensing
We develop a general perturbation theory to treat small parameter changes in
dispersive plasmonic nanostructures and metamaterials. We specifically apply it
to dielectric refractive index, and metallic plasma frequency modulation in
metal- dielectric nanostructures. As a numerical demonstration, we verify the
theory's accu- racy against direct calculations, for a system of plasmonic rods
in air where the metal is defined by a two-pole fit of silver's dielectric
function. We also discuss new optical behavior related to plasma frequency
modulation in such systems. Our approach provides new physical insight for the
design of plasmonic devices for biochemical sensing and optical modulation, and
future active metamaterial applications.Comment: 17 pages, 6 figure
Electron-doped phosphorene: A potential monolayer superconductor
We predict by first-principles calculations that the electron-doped
phosphorene is a potential BCS-like superconductor. The stretching modes at the
Brillouin-zone center are remarkably softened by the electron-doping, which
results in the strong electron-phonon coupling. The superconductivity can be
introduced by a doped electron density () above
cm, and may exist over the liquid helium temperature when cm. The maximum critical temperature is predicted to be
higher than 10 K. The superconductivity of phosphorene will significantly
broaden the applications of this novel material
Influence of corruption on economic growth rate and foreign investments
In order to investigate whether government regulations against corruption can
affect the economic growth of a country, we analyze the dependence between
Gross Domestic Product (GDP) per capita growth rates and changes in the
Corruption Perceptions Index (CPI). For the period 1999-2004 on average for all
countries in the world, we find that an increase of CPI by one unit leads to an
increase of the annual GDP per capita by 1.7 %. By regressing only European
transition countries, we find that CPI = 1 generates increase of the
annual GDP per capita by 2.4 %. We also analyze the relation between foreign
direct investments received by different countries and CPI, and we find a
statistically significant power-law functional dependence between foreign
direct investment per capita and the country corruption level measured by the
CPI. We introduce a new measure to quantify the relative corruption between
countries based on their respective wealth as measured by GDP per capita.Comment: 8 pages, 3 figures, elsart styl
Computational Soundness for Dalvik Bytecode
Automatically analyzing information flow within Android applications that
rely on cryptographic operations with their computational security guarantees
imposes formidable challenges that existing approaches for understanding an
app's behavior struggle to meet. These approaches do not distinguish
cryptographic and non-cryptographic operations, and hence do not account for
cryptographic protections: f(m) is considered sensitive for a sensitive message
m irrespective of potential secrecy properties offered by a cryptographic
operation f. These approaches consequently provide a safe approximation of the
app's behavior, but they mistakenly classify a large fraction of apps as
potentially insecure and consequently yield overly pessimistic results.
In this paper, we show how cryptographic operations can be faithfully
included into existing approaches for automated app analysis. To this end, we
first show how cryptographic operations can be expressed as symbolic
abstractions within the comprehensive Dalvik bytecode language. These
abstractions are accessible to automated analysis, and they can be conveniently
added to existing app analysis tools using minor changes in their semantics.
Second, we show that our abstractions are faithful by providing the first
computational soundness result for Dalvik bytecode, i.e., the absence of
attacks against our symbolically abstracted program entails the absence of any
attacks against a suitable cryptographic program realization. We cast our
computational soundness result in the CoSP framework, which makes the result
modular and composable.Comment: Technical report for the ACM CCS 2016 conference pape
- …