40,692 research outputs found
CMB spectral distortions from the decay of causally generated magnetic fields
We improve previous calculations of the CMB spectral distortions due to the
decay of primordial magnetic fields. We focus our studies on causally generated
magnetic fields at the electroweak and QCD phase transitions. We also consider
the decay of helical magnetic fields. We show that the decay of non-helical
magnetic fields generated at either the electroweak or QCD scale produce
and -type distortions below which are probably not detectable by a
future PIXIE-like experiment. We show that magnetic fields generated at the
electroweak scale must have a helicity fraction in order to
produce detectable -type distortions. Hence a positive detection coming
from the decay of magnetic fields would rule out non-helical primordial
magnetic fields and provide a lower bound on the magnetic helicity.Comment: 10 pages, 4 figure
Cooperative Adaptive Control for Cloud-Based Robotics
This paper studies collaboration through the cloud in the context of
cooperative adaptive control for robot manipulators. We first consider the case
of multiple robots manipulating a common object through synchronous centralized
update laws to identify unknown inertial parameters. Through this development,
we introduce a notion of Collective Sufficient Richness, wherein parameter
convergence can be enabled through teamwork in the group. The introduction of
this property and the analysis of stable adaptive controllers that benefit from
it constitute the main new contributions of this work. Building on this
original example, we then consider decentralized update laws, time-varying
network topologies, and the influence of communication delays on this process.
Perhaps surprisingly, these nonidealized networked conditions inherit the same
benefits of convergence being determined through collective effects for the
group. Simple simulations of a planar manipulator identifying an unknown load
are provided to illustrate the central idea and benefits of Collective
Sufficient Richness.Comment: ICRA 201
Tidal Evolution of Exoplanets
Tidal effects arise from differential and inelastic deformation of a planet
by a perturbing body. The continuous action of tides modify the rotation of the
planet together with its orbit until an equilibrium situation is reached. It is
often believed that synchronous motion is the most probable outcome of the
tidal evolution process, since synchronous rotation is observed for the
majority of the satellites in the Solar System. However, in the 19th century,
Schiaparelli also assumed synchronous motion for the rotations of Mercury and
Venus, and was later shown to be wrong. Rather, for planets in eccentric orbits
synchronous rotation is very unlikely. The rotation period and axial tilt of
exoplanets is still unknown, but a large number of planets have been detected
close to the parent star and should have evolved to a final equilibrium
situation. Therefore, based on the Solar System well studied cases, we can make
some predictions for exoplanets. Here we describe in detail the main tidal
effects that modify the secular evolution of the spin and the orbit of a
planet. We then apply our knowledge acquired from Solar System situations to
exoplanet cases. In particular, we will focus on two classes of planets,
"Hot-Jupiters" (fluid) and "Super-Earths" (rocky with atmosphere).Comment: 30 pages, 19 figures. Chapter in Exoplanets, ed. S. Seager, to be
published by University of Arizona Pres
Improving random number generators by chaotic iterations. Application in data hiding
In this paper, a new pseudo-random number generator (PRNG) based on chaotic
iterations is proposed. This method also combines the digits of two XORshifts
PRNGs. The statistical properties of this new generator are improved: the
generated sequences can pass all the DieHARD statistical test suite. In
addition, this generator behaves chaotically, as defined by Devaney. This makes
our generator suitable for cryptographic applications. An illustration in the
field of data hiding is presented and the robustness of the obtained data
hiding algorithm against attacks is evaluated.Comment: 6 pages, 8 figures, In ICCASM 2010, Int. Conf. on Computer
Application and System Modeling, Taiyuan, China, pages ***--***, October 201
Chaotic iterations versus Spread-spectrum: chaos and stego security
A new framework for information hiding security, called chaos-security, has
been proposed in a previous study. It is based on the evaluation of
unpredictability of the scheme, whereas existing notions of security, as
stego-security, are more linked to information leaks. It has been proven that
spread-spectrum techniques, a well-known stego-secure scheme, are chaos-secure
too. In this paper, the links between the two notions of security is deepened
and the usability of chaos-security is clarified, by presenting a novel data
hiding scheme that is twice stego and chaos-secure. This last scheme has better
scores than spread-spectrum when evaluating qualitative and quantitative
chaos-security properties. Incidentally, this result shows that the new
framework for security tends to improve the ability to compare data hiding
scheme
- …
