9,000 research outputs found

    Neutron matter at next-to-next-to-next-to-leading order in chiral effective field theory

    Full text link
    Neutron matter presents a unique system for chiral effective field theory (EFT), because all many-body forces among neutrons are predicted to next-to-next-to-next-to-leading order (N3LO). We present the first complete N3LO calculation of the neutron matter energy. This includes the subleading three-nucleon (3N) forces for the first time and all leading four-nucleon (4N) forces. We find relatively large contributions from N3LO 3N forces. Our results provide constraints for neutron-rich matter in astrophysics with controlled theoretical uncertainties.Comment: 5 pages, 4 figures; improved version, 3N ring and 2pi-contact contributions corrected, conclusions unchanged; v3: minor changes, published versio

    Small World Graphs by the iterated "My Friends are Your Friends'' Principle

    Full text link
    We study graphs obtained by successive creation and destruction of edges into small neighborhoods of the vertices. Starting with a circle graph of large diameter we obtain small world graphs with logarithmic diameter, high clustering coefficients and a fat tail distribution for the degree. Only local edge formation processes are involved and no preferential attachment was used. Furthermore we found an interesting phase transition with respect to the initial conditions.Comment: Latex, 12 pages with 10 figure

    A simple quantum gate with atom chips

    Full text link
    We present a simple scheme for implementing an atomic phase gate using two degrees of freedom for each atom and discuss its realization with cold rubidium atoms on atom chips. We investigate the performance of this collisional phase gate and show that gate operations with high fidelity can be realized in magnetic traps that are currently available on atom chips.Comment: 7 pages, 7 figures. One missing reference added in v2. To appear in European Physical Journal

    Correlations in Bipartite Collaboration Networks

    Full text link
    Collaboration networks are studied as an example of growing bipartite networks. These have been previously observed to have structure such as positive correlations between nearest-neighbour degrees. However, a detailed understanding of the origin of this phenomenon and the growth dynamics is lacking. Both of these are analyzed empirically and simulated using various models. A new one is presented, incorporating empirically necessary ingredients such as bipartiteness and sublinear preferential attachment. This, and a recently proposed model of team assembly both agree roughly with some empirical observations and fail in several others.Comment: 13 pages, 17 figures, 2 table, submitted to JSTAT; manuscript reorganized, figures and a table adde

    Integrating Problem Structuring Methods And Concept-Knowledge Theory For An Advanced Policy Design: Lessons From A Case Study In Cyprus

    Get PDF
    Evidence suggests that policies frequently fail due, on the one side, to a simplification of the uncertainty and complexity associated with stakeholders’ problem-understanding and, on the other side, due to the lack of methodologies for innovative generation of policy alternatives. This work describes a methodology based on the integration of Problem Structuring Methods and Concept-Knowledge Theory as a mean to transform ambiguity in problem-framing from a barrier to an enabling factor in collaborative settings. This methodology supports the generative design process for innovative and consensual policies. The methodology was implemented for a case of designing water management policy in the Republic of Cyprus

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users

    Correction: New Approaches for Assessing Squid Fin Motions: Coupling Proper Orthogonal Decomposition With Volumetric Particle Tracking Velocimetry (doi:10.1242/jeb.176750)

    Get PDF
    Squid, which swim using a coupled fin/jet system powered by muscular hydrostats, pose unique challenges for the study of locomotion. The high flexibility of the fins and complex flow fields generated by distinct propulsion systems require innovative techniques for locomotive assessment. For this study, we used proper orthogonal decomposition (POD) to decouple components of the fin motions and defocusing digital particle tracking velocimetry (DDPTV) to quantify the resultant 3D flow fields. Kinematic footage and DDPTV data were collected from brief squid, Lolliguncula brevis [3.1–6.5 cm dorsal mantle length (DML)], swimming freely in a water tunnel at speeds of 0.39–7.20 DML s−1. Both flap and wave components were present in all fin motions, but the relative importance of the wave components was higher for arms-first swimming than for tail-first swimming and for slower versus higher speed swimming. When prominent wave components were present, more complex interconnected vortex ring wakes were observed, while fin movements dominated by flapping resulted in more spatially separated vortex ring patterns. Although the jet often produced the majority of the thrust for steady rectilinear swimming, our results demonstrated that the fins can contribute more thrust than the jet at times, consistently produce comparable levels of lift to the jet during arms-first swimming, and can boost overall propulsive efficiency. By producing significant drag signatures, the fins can also aid in stabilization and maneuvering. Clearly, fins play multiple roles in squid locomotion, and when coupled with the jet, allow squid to perform a range of swimming behaviors integral to their ecological success
    • 

    corecore