7,374 research outputs found
Bulk and boundary factorized S-matrices
We investigate the -invariant bulk (1+1D, factorized) -matrix
constructed by Ogievetsky, using the bootstrap on the three-point coupling of
the vector multiplet to constrain its CDD ambiguity. We then construct the
corresponding boundary -matrix, demonstrating it to be consistent with
symmetry.Comment: 7 page
Diffraction-limited CCD imaging with faint reference stars
By selecting short exposure images taken using a CCD with negligible readout
noise we obtained essentially diffraction-limited 810 nm images of faint
objects using nearby reference stars brighter than I=16 at a 2.56 m telescope.
The FWHM of the isoplanatic patch for the technique is found to be 50
arcseconds, providing ~20% sky coverage around suitable reference stars.Comment: 4 page letter accepted for publication in Astronomy and Astrophysic
The SO(N) principal chiral field on a half-line
We investigate the integrability of the SO(N) principal chiral model on a
half-line, and find that mixed Dirichlet/Neumann boundary conditions (as well
as pure Dirichlet or Neumann) lead to infinitely many conserved charges
classically in involution. We use an anomaly-counting method to show that at
least one non-trivial example survives quantization, compare our results with
the proposed reflection matrices, and, based on these, make some preliminary
remarks about expected boundary bound-states.Comment: 7 pages, Late
Towards gravitationally assisted negative refraction of light by vacuum
Propagation of electromagnetic plane waves in some directions in
gravitationally affected vacuum over limited ranges of spacetime can be such
that the phase velocity vector casts a negative projection on the time-averaged
Poynting vector. This conclusion suggests, inter alia, gravitationally assisted
negative refraction by vacuum.Comment: 6 page
Capability in the digital: institutional media management and its dis/contents
This paper explores how social media spaces are occupied, utilized and negotiated by the British Military in relation to the Ministry of Defence’s concerns and conceptualizations of risk. It draws on data from the DUN Project to investigate the content and form of social media about defence through the lens of ‘capability’, a term that captures and describes the meaning behind multiple representations of the military institution. But ‘capability’ is also a term that we hijack and extend here, not only in relation to the dominant presence of ‘capability’ as a representational trope and the extent to which it is revealing of a particular management of social media spaces, but also in relation to what our research reveals for the wider digital media landscape and ‘capable’ digital methods. What emerges from our analysis is the existence of powerful, successful and critically long-standing media and reputation management strategies occurring within the techno-economic online structures where the exercising of ‘control’ over the individual – as opposed to the technology – is highly effective. These findings raise critical questions regarding the extent to which ‘control’ and management of social media – both within and beyond the defence sector – may be determined as much by cultural, social, institutional and political influence and infrastructure as the technological economies. At a key moment in social media analysis, then, when attention is turning to the affordances, criticisms and possibilities of data, our research is a pertinent reminder that we should not forget the active management of content that is being similarly, if not equally, effective
The Statistical Physics of Regular Low-Density Parity-Check Error-Correcting Codes
A variation of Gallager error-correcting codes is investigated using
statistical mechanics. In codes of this type, a given message is encoded into a
codeword which comprises Boolean sums of message bits selected by two randomly
constructed sparse matrices. The similarity of these codes to Ising spin
systems with random interaction makes it possible to assess their typical
performance by analytical methods developed in the study of disordered systems.
The typical case solutions obtained via the replica method are consistent with
those obtained in simulations using belief propagation (BP) decoding. We
discuss the practical implications of the results obtained and suggest a
computationally efficient construction for one of the more practical
configurations.Comment: 35 pages, 4 figure
Quantum affine Toda solitons
We review some of the progress in affine Toda field theories in recent years,
explain why known dualities cannot easily be extended, and make some
suggestions for what should be sought instead.Comment: 16pp, LaTeX. Minor revision
Theoretical basis for composition of economic strategy for industry development
The article deals with the issues related to analysis of domestic engineering problems with the assessment of the current state of the industry as a whole. Considering the prospects of exiting the current crisis, as well as long-term economic growth we expect general welfare within the sector. As the object of the study the authors have selected the engineering industry of the country. The subject of research is the economic relations between producers and consumers of engineering products, as well as issues of strategy formation and development of the engineering industry.
The authors analyzed the state of machine-manufacture and highlighted the problems, the solution of which is most relevant given the government policy of increased import substitution and enhanced productivity. Further analysis was carried out in the sphere of sources of financing and attraction of investment resources for all kinds of enterprises of mechanical engineering, on the basis of which economic development strategy for the industry may be constructed. In addition, the authors propose measures and concrete ways of solving the problems identified by the formation of economic strategy of development of the industry, involving plans of achievement of all the defined targets.
As a result of the study authors concluded that the need to stop subsidizing loss-making enterprises, creating a favorable climate for the development of venture companies, in order t introduce innovative technology as soon as possible. These technologies could subsequently be exported together with products of greater added value.peer-reviewe
Cryptographical Properties of Ising Spin Systems
The relation between Ising spin systems and public-key cryptography is
investigated using methods of statistical physics. The insight gained from the
analysis is used for devising a matrix-based cryptosystem whereby the
ciphertext comprises products of the original message bits; these are selected
by employing two predetermined randomly-constructed sparse matrices. The
ciphertext is decrypted using methods of belief-propagation. The analyzed
properties of the suggested cryptosystem show robustness against various
attacks and competitive performance to modern cyptographical methods.Comment: 4 pages, 2 figure
- …