40,692 research outputs found

    CMB spectral distortions from the decay of causally generated magnetic fields

    Full text link
    We improve previous calculations of the CMB spectral distortions due to the decay of primordial magnetic fields. We focus our studies on causally generated magnetic fields at the electroweak and QCD phase transitions. We also consider the decay of helical magnetic fields. We show that the decay of non-helical magnetic fields generated at either the electroweak or QCD scale produce μ\mu and yy-type distortions below 10810^{-8} which are probably not detectable by a future PIXIE-like experiment. We show that magnetic fields generated at the electroweak scale must have a helicity fraction f>104f_*>10^{-4} in order to produce detectable μ\mu-type distortions. Hence a positive detection coming from the decay of magnetic fields would rule out non-helical primordial magnetic fields and provide a lower bound on the magnetic helicity.Comment: 10 pages, 4 figure

    Cooperative Adaptive Control for Cloud-Based Robotics

    Full text link
    This paper studies collaboration through the cloud in the context of cooperative adaptive control for robot manipulators. We first consider the case of multiple robots manipulating a common object through synchronous centralized update laws to identify unknown inertial parameters. Through this development, we introduce a notion of Collective Sufficient Richness, wherein parameter convergence can be enabled through teamwork in the group. The introduction of this property and the analysis of stable adaptive controllers that benefit from it constitute the main new contributions of this work. Building on this original example, we then consider decentralized update laws, time-varying network topologies, and the influence of communication delays on this process. Perhaps surprisingly, these nonidealized networked conditions inherit the same benefits of convergence being determined through collective effects for the group. Simple simulations of a planar manipulator identifying an unknown load are provided to illustrate the central idea and benefits of Collective Sufficient Richness.Comment: ICRA 201

    Tidal Evolution of Exoplanets

    Full text link
    Tidal effects arise from differential and inelastic deformation of a planet by a perturbing body. The continuous action of tides modify the rotation of the planet together with its orbit until an equilibrium situation is reached. It is often believed that synchronous motion is the most probable outcome of the tidal evolution process, since synchronous rotation is observed for the majority of the satellites in the Solar System. However, in the 19th century, Schiaparelli also assumed synchronous motion for the rotations of Mercury and Venus, and was later shown to be wrong. Rather, for planets in eccentric orbits synchronous rotation is very unlikely. The rotation period and axial tilt of exoplanets is still unknown, but a large number of planets have been detected close to the parent star and should have evolved to a final equilibrium situation. Therefore, based on the Solar System well studied cases, we can make some predictions for exoplanets. Here we describe in detail the main tidal effects that modify the secular evolution of the spin and the orbit of a planet. We then apply our knowledge acquired from Solar System situations to exoplanet cases. In particular, we will focus on two classes of planets, "Hot-Jupiters" (fluid) and "Super-Earths" (rocky with atmosphere).Comment: 30 pages, 19 figures. Chapter in Exoplanets, ed. S. Seager, to be published by University of Arizona Pres

    Improving random number generators by chaotic iterations. Application in data hiding

    Full text link
    In this paper, a new pseudo-random number generator (PRNG) based on chaotic iterations is proposed. This method also combines the digits of two XORshifts PRNGs. The statistical properties of this new generator are improved: the generated sequences can pass all the DieHARD statistical test suite. In addition, this generator behaves chaotically, as defined by Devaney. This makes our generator suitable for cryptographic applications. An illustration in the field of data hiding is presented and the robustness of the obtained data hiding algorithm against attacks is evaluated.Comment: 6 pages, 8 figures, In ICCASM 2010, Int. Conf. on Computer Application and System Modeling, Taiyuan, China, pages ***--***, October 201

    Chaotic iterations versus Spread-spectrum: chaos and stego security

    Full text link
    A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure scheme, are chaos-secure too. In this paper, the links between the two notions of security is deepened and the usability of chaos-security is clarified, by presenting a novel data hiding scheme that is twice stego and chaos-secure. This last scheme has better scores than spread-spectrum when evaluating qualitative and quantitative chaos-security properties. Incidentally, this result shows that the new framework for security tends to improve the ability to compare data hiding scheme
    corecore