7,240 research outputs found

    Microscopic Approach to Shear Viscosities in Superfluid Gases: From BCS to BEC

    Full text link
    We compute the shear viscosity, η\eta, at general temperatures TT, in a BCS-BEC crossover scheme which is demonstrably consistent with conservation laws. The study of η\eta is important because it constrains microscopic theories by revealing the excitation spectra. The onset of a normal state pairing gap and the contribution from pair degrees of freedom imply that η\eta at low TT becomes small, rather than exhibiting the upturn predicted by most others. Using the local density approximation, we find quite reasonable agreement with just-published experiments.Comment: 4 pages, 2 figure

    Effects of alarms on control of robot teams

    Get PDF
    Annunciator driven supervisory control (ADSC) is a widely used technique for directing human attention to control systems otherwise beyond their capabilities. ADSC requires associating abnormal parameter values with alarms in such a way that operator attention can be directed toward the involved subsystems or conditions. This is hard to achieve in multirobot control because it is difficult to distinguish abnormal conditions for states of a robot team. For largely independent tasks such as foraging, however, self-reflection can serve as a basis for alerting the operator to abnormalities of individual robots. While the search for targets remains unalarmed the resulting system approximates ADSC. The described experiment compares a control condition in which operators perform a multirobot urban search and rescue (USAR) task without alarms with ADSC (freely annunciated) and with a decision aid that limits operator workload by showing only the top alarm. No differences were found in area searched or victims found, however, operators in the freely annunciated condition were faster in detecting both the annunciated failures and victims entering their cameras' fields of view. Copyright 2011 by Human Factors and Ergonomics Society, Inc. All rights reserved

    Analysis of pectate lyase genes in Dickeya chrysanthemi strain L11, isolated from a recreational lake in Malyasia: a draft genome sequence perspective

    Get PDF
    YesDickeya chrysanthemi is well known as a plant pathogen that caused major blackleg in the European potato industry in the 1990s. D. chrysanthemi strain L11 was discovered in a recreational lake in Malaysia. Here, we present its draft genome sequence.University of Malaya High Impact Research (HIR) Grants UM C/625/1/HIR/MOHE/CHAN/01 (grant no. A-000001-50001) and UM C/625/1/HIR/MOHE/CHAN/14/1 (grant no. H-50001-A000027

    On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games

    Full text link
    In \emph{bandwidth allocation games} (BAGs), the strategy of a player consists of various demands on different resources. The player's utility is at most the sum of these demands, provided they are fully satisfied. Every resource has a limited capacity and if it is exceeded by the total demand, it has to be split between the players. Since these games generally do not have pure Nash equilibria, we consider approximate pure Nash equilibria, in which no player can improve her utility by more than some fixed factor α\alpha through unilateral strategy changes. There is a threshold αδ\alpha_\delta (where δ\delta is a parameter that limits the demand of each player on a specific resource) such that α\alpha-approximate pure Nash equilibria always exist for ααδ\alpha \geq \alpha_\delta, but not for α<αδ\alpha < \alpha_\delta. We give both upper and lower bounds on this threshold αδ\alpha_\delta and show that the corresponding decision problem is NP{\sf NP}-hard. We also show that the α\alpha-approximate price of anarchy for BAGs is α+1\alpha+1. For a restricted version of the game, where demands of players only differ slightly from each other (e.g. symmetric games), we show that approximate Nash equilibria can be reached (and thus also be computed) in polynomial time using the best-response dynamic. Finally, we show that a broader class of utility-maximization games (which includes BAGs) converges quickly towards states whose social welfare is close to the optimum

    Localization and Anomalous Transport in a 1-D Soft Boson Optical Lattice

    Full text link
    We study the dynamics of Bose-Einstein condensed atoms in a 1-D optical lattice potential in a regime where the collective (Josephson) tunneling energy is comparable with the on-site interaction energy, and the number of particles per lattice site is mesoscopically large. By directly imaging the motion of atoms in the lattice, we observe an abrupt suppression of atom transport through the array for a critical ratio of these energies, consistent with quantum fluctuation induced localization. Directly below the onset of localization, the frequency of the observed superfluid transport can be explained by a phonon excitation but deviates substantially from that predicted by the hydrodynamic/Gross-Pitaevskii equations.Comment: 14 pages, 5 figure

    Asynchronous control with ATR for large robot teams

    Get PDF
    In this paper, we discuss and investigate the advantages of an asynchronous display, called "image queue", tested for an urban search and rescue foraging task. The image queue approach mines video data to present the operator with a relevant and comprehensive view of the environment by selecting a small number of images that together cover large portions of the area searched. This asynchronous approach allows operators to search through a large amount of data gathered by autonomous robot teams, and allows comprehensive and scalable displays to obtain a network-centric perspective for unmanned ground vehicles (UGVs). In the reported experiment automatic target recognition (ATR) was used to augment utilities based on visual coverage in selecting imagery for presentation to the operator. In the cued condition a box was drawn in the region in which a possible target was detected. In the no-cue condition no box was drawn although the target detection probability continued to play a role in the selection of imagery. We found that operators using the image queue displays missed fewer victims and relied on teleoperation less often than those using streaming video. Image queue users in the no-cue condition did better in avoiding false alarms and reported lower workload than those in the cued condition. Copyright 2011 by Human Factors and Ergonomics Society, Inc. All rights reserved

    Feynman Rules in the Type III Natural Flavour-Conserving Two-Higgs Doublet Model

    Full text link
    We consider a two Higgs-doublet model with S3S_3 symmetry, which implies a π2\pi \over 2 rather than 0 relative phase between the vacuum expectation values and and . The corresponding Feynman rules are derived accordingly and the transformation of the Higgs fields from the weak to the mass eigenstates includes not only an angle rotation but also a phase transformation. In this model, both doublets couple to the same type of fermions and the flavour-changing neutral currents are naturally suppressed. We also demonstrate that the Type III natural flavour-conserving model is valid at tree-level even when an explicit S3S_3 symmetry breaking perturbation is introduced to get a reasonable CKM matrix. In the special case β=α\beta = \alpha, as the ratio tanβ=v2v1\tan\beta = {v_2 \over v_1} runs from 0 to \infty, the dominant Yukawa coupling will change from the first two generations to the third generation. In the Feynman rules, we also find that the charged Higgs currents are explicitly left-right asymmetric. The ratios between the left- and right-handed currents for the quarks in the same generations are estimated.Comment: 16 pages (figures not included), NCKU-HEP/93-1

    Secure Improved Cloud-Based RFID Authentication Protocol

    Get PDF
    corecore