3,523 research outputs found

    Chiral anomaly and anomalous finite-size conductivity in graphene

    Get PDF
    Graphene is a monolayer of carbon atoms packed into a hexagon lattice to host two pairs of massless two-dimensional Dirac fermions in the absence of or with negligible spin-orbit coupling. It is known that the existence of non-zero electric polarization in reduced momentum space which is associated with a hidden chiral symmetry will lead to the zero-energy flat band of zigzag nanoribbon. The Adler-Bell-Jackiw chiral anomaly or non-conservation of chiral charges at different valleys can be realized in a confined ribbon of finite width. In the laterally diffusive regime, the finite-size correction to conductivity is always positive and goes inversely with the square of the lateral dimension W, which is different from the finite-size correction inversely with W from boundary modes. This anomalous finite-size conductivity reveals the signature of the chiral anomaly in graphene, and is measurable experimentally.Comment: 5 pages, 2 figure

    A Compositional Analysis of Unbalanced Usages of Multiple Left-turn Lanes

    Get PDF
    Lane usage measures distribution of a specific traffic movement across multiple available lanes in a given time. Unbalanced lane usages decrease the capacity of subject segment. This paper took multiple left-turn lanes at signalized intersections as case study, and explored the influences of some factors on the lane usage balance. Lane usages were calculated from field collected lane volumes and the constant-sum constraint among them was explicitly considered in the statistical analysis. Classical and compositional analysis of variance was respectively conducted to identify significant influential factors. By comparing the results of compositional analysis and those of the classical one, the former ones have better interpretability. It was found that left-turn lane usages could be affected by parameter variance of geometric design or traffic control, such as length of turning curve, length of upstream segment, length of signal phase or cycle. These factors could make the lane usages achieve relative balance at different factor levels.</p

    MAT: A Multi-strength Adversarial Training Method to Mitigate Adversarial Attacks

    Full text link
    Some recent works revealed that deep neural networks (DNNs) are vulnerable to so-called adversarial attacks where input examples are intentionally perturbed to fool DNNs. In this work, we revisit the DNN training process that includes adversarial examples into the training dataset so as to improve DNN's resilience to adversarial attacks, namely, adversarial training. Our experiments show that different adversarial strengths, i.e., perturbation levels of adversarial examples, have different working zones to resist the attack. Based on the observation, we propose a multi-strength adversarial training method (MAT) that combines the adversarial training examples with different adversarial strengths to defend adversarial attacks. Two training structures - mixed MAT and parallel MAT - are developed to facilitate the tradeoffs between training time and memory occupation. Our results show that MAT can substantially minimize the accuracy degradation of deep learning systems to adversarial attacks on MNIST, CIFAR-10, CIFAR-100, and SVHN.Comment: 6 pages, 4 figures, 2 table

    Putting Them under Microscope: A Fine-Grained Approach for Detecting Redundant Test Cases in Natural Language

    Full text link
    Natural language (NL) documentation is the bridge between software managers and testers, and NL test cases are prevalent in system-level testing and other quality assurance activities. Due to reasons such as requirements redundancy, parallel testing, and tester turnover within long evolving history, there are inevitably lots of redundant test cases, which significantly increase the cost. Previous redundancy detection approaches typically treat the textual descriptions as a whole to compare their similarity and suffer from low precision. Our observation reveals that a test case can have explicit test-oriented entities, such as tested function Components, Constraints, etc; and there are also specific relations between these entities. This inspires us with a potential opportunity for accurate redundancy detection. In this paper, we first define five test-oriented entity categories and four associated relation categories and re-formulate the NL test case redundancy detection problem as the comparison of detailed testing content guided by the test-oriented entities and relations. Following that, we propose Tscope, a fine-grained approach for redundant NL test case detection by dissecting test cases into atomic test tuple(s) with the entities restricted by associated relations. To serve as the test case dissection, Tscope designs a context-aware model for the automatic entity and relation extraction. Evaluation on 3,467 test cases from ten projects shows Tscope could achieve 91.8% precision, 74.8% recall, and 82.4% F1, significantly outperforming state-of-the-art approaches and commonly-used classifiers. This new formulation of the NL test case redundant detection problem can motivate the follow-up studies to further improve this task and other related tasks involving NL descriptions.Comment: 12 pages, 6 figures, to be published in ESEC/FSE 2

    Information-carrying Hawking radiation and the number of microstate for a black hole

    Get PDF
    AbstractWe present a necessary and sufficient condition to falsify whether a Hawking radiation spectrum indicates unitary emission process or not from the perspective of information theory. With this condition, we show the precise values of Bekenstein–Hawking entropies for Schwarzschild black holes and Reissner–Nordström black holes can be calculated by counting the microstates of their Hawking radiations. In particular, for the extremal Reissner–Nordström black hole, its number of microstate and the corresponding entropy we obtain are found to be consistent with the string theory results. Our finding helps to refute the dispute about the Bekenstein–Hawking entropy of extremal black holes in the semiclassical limit

    Branching ratios and CP asymmetries of B→Kη(â€Č)B \to K \eta^{(\prime)} decays in the pQCD approach

    Full text link
    We calculate the branching ratios and CP violating asymmetries of the four B \to K \etap decays in the perturbative QCD (pQCD) factorization approach. Besides the full leading order contributions, the partial next-to-leading order (NLO) contributions from the QCD vertex corrections, the quark loops, and the chromo-magnetic penguins are also taken into account. The NLO pQCD predictions for the CP-averaged branching ratios are Br(B+→K+η)≈3.2×10−6Br(B^+ \to K^+ \eta) \approx 3.2 \times 10^{-6}, Br(B^\pm \to K^\pm \etar) \approx 51.0 \times 10^{-6}, Br(B0→K0η)≈2.1×10−6Br(B^0 \to K^0 \eta) \approx 2.1 \times 10^{-6}, and Br(B^0 \to K^0 \etar) \approx 50.3 \times 10^{-6}. The NLO contributions can provide a 70% enhancement to the LO Br(B \to K \etar), but a 30% reduction to the LO Br(B→Kη)Br(B \to K \eta), which play the key role in understanding the observed pattern of branching ratios. The NLO pQCD predictions for the CP-violating asymmetries, such as \acp^{dir} (K^0_S \etar) \sim 2.3% and \acp^{mix}(K^0_S \etar)\sim 63%, agree very well with currently available data. This means that the deviation \Delta S=\acp^{mix}(K^0_S \etar) - \sin{2\beta} in pQCD approach is also very small.Comment: 31 pages, 11 ps/eps figures, typos corrected. A little modificatio
    • 

    corecore