278,699 research outputs found

    Jitter model and signal processing techniques for pulse width modulation optical recording

    Get PDF
    A jitter model and signal processing techniques are discussed for data recovery in Pulse Width Modulation (PWM) optical recording. In PWM, information is stored through modulating sizes of sequential marks alternating in magnetic polarization or in material structure. Jitter, defined as the deviation from the original mark size in the time domain, will result in error detection if it is excessively large. A new approach is taken in data recovery by first using a high speed counter clock to convert time marks to amplitude marks, and signal processing techniques are used to minimize jitter according to the jitter model. The signal processing techniques include motor speed and intersymbol interference equalization, differential and additive detection, and differential and additive modulation

    Mass estimate of the Swift J 164449.3+573451 supermassive black hole based on the 3:2 QPO resonance hypothesis

    Full text link
    A dormant Swift source J 164449.3+573451 (Sw 164449+57)recently experienced a powerful outburst, caused most probably by a tidal disruption of a star by the super-massive black hole at the center of the source. During the outburst, a quasi periodic oscillation (QPO) was detected in the observed X-ray flux from Sw 164449+57. We show that if the observed QPO belongs to a "3:2 twin peak QPO" (with the second frequency not observed), the mass of the black hole in Sw 164449+57 is rather low, M ~ 10^5 M_sun, and the source belongs to a class of intermediate mass black holes. The low mass of the source has been pointed out previously by several authors.Comment: Accepted by Astronomy and Astrophysic

    Design and Implementation of an RNS-based 2D DWT Processor

    Get PDF
    No abstract availabl

    No periodicity revealed for an "eclipsing" ultraluminous supersoft X-ray source in M81

    Full text link
    Luminous supersoft X-ray sources found in the Milky Way and Magellanic Clouds are likely white dwarfs that steadily or cyclically burn accreted matter on their surface, which are promising type Ia supernova progenitors. Observations of distant galaxies with Chandra and XMM-Newton have revealed supersoft sources that are generally hotter and more luminous, including some ultraluminous supersoft sources (ULSs) that are possibly intermediate mass black holes of a few thousand solar masses. In this paper we report our X-ray spectral and timing analysis for M81-ULS1, an ultraluminous supersoft source in the nearby spiral galaxy M81. M81-ULS1 has been persistently supersoft in 17 Chandra ACIS observations spanning six years, and its spectrum can be described by either a kTbb70kT_{bb}\approx70 eV blackbody for a 1.2M\sim1.2M_\odot white dwarf, or a kTin80kT_{in} \approx 80 eV multicolor accretion disk for a 103M\gtrsim10^3M_\odot intermediate mass black hole. In two observations, the light curves exhibited dramatic flux drop/rise on time scales of 10310^3 seconds, reminiscent of eclipse ingress/egress in eclipsing X-ray binaries. However, the exhaustive search for periodicity in the reasonable range of 50 ksec to 50 days failed to reveal an orbital period. The failure to reveal any periodicity is consistent with the long period (30\ge30 yrs) predicted for this system given the optical identification of the secondary with an asymptotic giant star. Also, the eclipse-like dramatic flux changes in hours are hard to explain under the white dwarf model, but can in principle be explained by disk temperature changes induced by accretion rate variations under the intermediate mass black hole model.Comment: 19 pages, 7 figures, 1 table, to appear in ApJ

    Method of increasing minority carrier lifetime in silicon web or the like

    Get PDF
    A silicon dendrite is grown as a ribbon forming two silicon crystal layers which are separated by an interface layer which contains a large number of defects. Significant increase of minority carrier lifetime with homogeneous distribution at the outer surfaces of the two silicon crystal layers is achieved by processing the web in an atmosphere of a selected gas, e.g., oxygen, nitrogen or an inert gas, for about 30 minutes to several hours at a temperature preferably on the order of 900 to 1200 C

    Proton-proton and deuteron-gold collisions at RHIC

    Full text link
    We try to understand recent data on proton-proton and deuteron-gold collisions at RHIC, employing a modified parton model approach.Comment: Invited talk, given at the XXth Winter Workshop on Nuclear Dynamics, Trelawny Beach, Jamaica, March 200

    N-representability is QMA-complete

    Get PDF
    We study the computational complexity of the N-representability problem in quantum chemistry. We show that this problem is QMA-complete, which is the quantum generalization of NP-complete. Our proof uses a simple mapping from spin systems to fermionic systems, as well as a convex optimization technique that reduces the problem of finding ground states to N-representability

    Privacy Preserving Multi-Server k-means Computation over Horizontally Partitioned Data

    Full text link
    The k-means clustering is one of the most popular clustering algorithms in data mining. Recently a lot of research has been concentrated on the algorithm when the dataset is divided into multiple parties or when the dataset is too large to be handled by the data owner. In the latter case, usually some servers are hired to perform the task of clustering. The dataset is divided by the data owner among the servers who together perform the k-means and return the cluster labels to the owner. The major challenge in this method is to prevent the servers from gaining substantial information about the actual data of the owner. Several algorithms have been designed in the past that provide cryptographic solutions to perform privacy preserving k-means. We provide a new method to perform k-means over a large set using multiple servers. Our technique avoids heavy cryptographic computations and instead we use a simple randomization technique to preserve the privacy of the data. The k-means computed has exactly the same efficiency and accuracy as the k-means computed over the original dataset without any randomization. We argue that our algorithm is secure against honest but curious and passive adversary.Comment: 19 pages, 4 tables. International Conference on Information Systems Security. Springer, Cham, 201

    Hardcore bosons on checkerboard lattices near half filling: geometric frustration, vanishing charge order and fractional phase

    Full text link
    We study a spinless hardcore boson model on checkerboard lattices by Green function Monte Carlo method. At half filling, the ground state energy is obtained up to 28×2828\times 28 lattice and extrapolated to infinite size, the staggered pseudospin magnetization is found to vanish in the thermodynamic limit. Thus the (π,π)(\pi,\pi) charge order is absent in this system. Away from half filling, two defects induced by each hole (particle) may carry fractional charge (±e/2\pm e/2). For one hole case, we study how the defect-defect correlation changes with t/Jt/J, which is the ratio between the hopping integral and cyclic exchange, equals to V/2tV/2t when VtV\gg t. Moreover, we argue that these fractional defects may propagate independently when the concentration of holes (or defects) is large enough
    corecore