7,374 research outputs found

    Bulk and boundary g2g_2 factorized S-matrices

    Full text link
    We investigate the g2g_2-invariant bulk (1+1D, factorized) SS-matrix constructed by Ogievetsky, using the bootstrap on the three-point coupling of the vector multiplet to constrain its CDD ambiguity. We then construct the corresponding boundary SS-matrix, demonstrating it to be consistent with Y(g2,a1×a1)Y(g_2,a_1\times a_1) symmetry.Comment: 7 page

    Diffraction-limited CCD imaging with faint reference stars

    Get PDF
    By selecting short exposure images taken using a CCD with negligible readout noise we obtained essentially diffraction-limited 810 nm images of faint objects using nearby reference stars brighter than I=16 at a 2.56 m telescope. The FWHM of the isoplanatic patch for the technique is found to be 50 arcseconds, providing ~20% sky coverage around suitable reference stars.Comment: 4 page letter accepted for publication in Astronomy and Astrophysic

    The SO(N) principal chiral field on a half-line

    Get PDF
    We investigate the integrability of the SO(N) principal chiral model on a half-line, and find that mixed Dirichlet/Neumann boundary conditions (as well as pure Dirichlet or Neumann) lead to infinitely many conserved charges classically in involution. We use an anomaly-counting method to show that at least one non-trivial example survives quantization, compare our results with the proposed reflection matrices, and, based on these, make some preliminary remarks about expected boundary bound-states.Comment: 7 pages, Late

    Towards gravitationally assisted negative refraction of light by vacuum

    Full text link
    Propagation of electromagnetic plane waves in some directions in gravitationally affected vacuum over limited ranges of spacetime can be such that the phase velocity vector casts a negative projection on the time-averaged Poynting vector. This conclusion suggests, inter alia, gravitationally assisted negative refraction by vacuum.Comment: 6 page

    Capability in the digital: institutional media management and its dis/contents

    Get PDF
    This paper explores how social media spaces are occupied, utilized and negotiated by the British Military in relation to the Ministry of Defence’s concerns and conceptualizations of risk. It draws on data from the DUN Project to investigate the content and form of social media about defence through the lens of ‘capability’, a term that captures and describes the meaning behind multiple representations of the military institution. But ‘capability’ is also a term that we hijack and extend here, not only in relation to the dominant presence of ‘capability’ as a representational trope and the extent to which it is revealing of a particular management of social media spaces, but also in relation to what our research reveals for the wider digital media landscape and ‘capable’ digital methods. What emerges from our analysis is the existence of powerful, successful and critically long-standing media and reputation management strategies occurring within the techno-economic online structures where the exercising of ‘control’ over the individual – as opposed to the technology – is highly effective. These findings raise critical questions regarding the extent to which ‘control’ and management of social media – both within and beyond the defence sector – may be determined as much by cultural, social, institutional and political influence and infrastructure as the technological economies. At a key moment in social media analysis, then, when attention is turning to the affordances, criticisms and possibilities of data, our research is a pertinent reminder that we should not forget the active management of content that is being similarly, if not equally, effective

    The Statistical Physics of Regular Low-Density Parity-Check Error-Correcting Codes

    Full text link
    A variation of Gallager error-correcting codes is investigated using statistical mechanics. In codes of this type, a given message is encoded into a codeword which comprises Boolean sums of message bits selected by two randomly constructed sparse matrices. The similarity of these codes to Ising spin systems with random interaction makes it possible to assess their typical performance by analytical methods developed in the study of disordered systems. The typical case solutions obtained via the replica method are consistent with those obtained in simulations using belief propagation (BP) decoding. We discuss the practical implications of the results obtained and suggest a computationally efficient construction for one of the more practical configurations.Comment: 35 pages, 4 figure

    Quantum affine Toda solitons

    Full text link
    We review some of the progress in affine Toda field theories in recent years, explain why known dualities cannot easily be extended, and make some suggestions for what should be sought instead.Comment: 16pp, LaTeX. Minor revision

    Theoretical basis for composition of economic strategy for industry development

    Get PDF
    The article deals with the issues related to analysis of domestic engineering problems with the assessment of the current state of the industry as a whole. Considering the prospects of exiting the current crisis, as well as long-term economic growth we expect general welfare within the sector. As the object of the study the authors have selected the engineering industry of the country. The subject of research is the economic relations between producers and consumers of engineering products, as well as issues of strategy formation and development of the engineering industry. The authors analyzed the state of machine-manufacture and highlighted the problems, the solution of which is most relevant given the government policy of increased import substitution and enhanced productivity. Further analysis was carried out in the sphere of sources of financing and attraction of investment resources for all kinds of enterprises of mechanical engineering, on the basis of which economic development strategy for the industry may be constructed. In addition, the authors propose measures and concrete ways of solving the problems identified by the formation of economic strategy of development of the industry, involving plans of achievement of all the defined targets. As a result of the study authors concluded that the need to stop subsidizing loss-making enterprises, creating a favorable climate for the development of venture companies, in order t introduce innovative technology as soon as possible. These technologies could subsequently be exported together with products of greater added value.peer-reviewe

    Cryptographical Properties of Ising Spin Systems

    Full text link
    The relation between Ising spin systems and public-key cryptography is investigated using methods of statistical physics. The insight gained from the analysis is used for devising a matrix-based cryptosystem whereby the ciphertext comprises products of the original message bits; these are selected by employing two predetermined randomly-constructed sparse matrices. The ciphertext is decrypted using methods of belief-propagation. The analyzed properties of the suggested cryptosystem show robustness against various attacks and competitive performance to modern cyptographical methods.Comment: 4 pages, 2 figure
    • …
    corecore