53,878 research outputs found

    Discrete Fourier Transform in Nanostructures using Scattering

    Full text link
    In this paper we show that the discrete Fourier transform can be performed by scattering a coherent particle or laser beam off a two-dimensional potential that has the shape of rings or peaks. After encoding the initial vector into the two-dimensional potential, the Fourier-transformed vector can be read out by detectors surrounding the potential. The wavelength of the laser beam determines the necessary accuracy of the 2D potential, which makes our method very fault-tolerant.Comment: 6 pages, 5 EPS figures, REVTe

    An analysis of security issues in building automation systems

    Get PDF
    The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media. Through the use of IP-based communication and encapsulated protocols, BAS are increasingly being connected to corporate networks and also being remotely accessed for management purposes, both for convenience and emergency purposes. These protocols, however, were not designed with security as a primary requirement, thus the majority of systems operate with sub-standard or non-existent security implementations, relying on security through obscurity. Research has been undertaken into addressing the shortfalls of security implementations in BAS, however defining the threats against BAS, and detection of these threats is an area that is particularly lacking. This paper presents an overview of the current security measures in BAS, outlining key issues, and methods that can be improved to protect cyber physical systems against the increasing threat of cyber terrorism and hacktivism. Future research aims to further evaluate and improve the detection systems used in BAS through first defining the threats and then applying and evaluating machine learning algorithms for traffic classification and IDS profiling capable of operating on resource constrained BAS

    On NCQFT and dimensionless insertions

    Full text link
    In these notes, we aim at a precise definition of the tree level action for the noncommutative scalar and gauge field theories on four-dimensional canonically deformed Euclidean space. As tools to achieve this goal we employ power counting and normalization conditions.Comment: 10 page

    Speech Recognition by Composition of Weighted Finite Automata

    Full text link
    We present a general framework based on weighted finite automata and weighted finite-state transducers for describing and implementing speech recognizers. The framework allows us to represent uniformly the information sources and data structures used in recognition, including context-dependent units, pronunciation dictionaries, language models and lattices. Furthermore, general but efficient algorithms can used for combining information sources in actual recognizers and for optimizing their application. In particular, a single composition algorithm is used both to combine in advance information sources such as language models and dictionaries, and to combine acoustic observations and information sources dynamically during recognition.Comment: 24 pages, uses psfig.st

    Distributed Computing with Adaptive Heuristics

    Full text link
    We use ideas from distributed computing to study dynamic environments in which computational nodes, or decision makers, follow adaptive heuristics (Hart 2005), i.e., simple and unsophisticated rules of behavior, e.g., repeatedly "best replying" to others' actions, and minimizing "regret", that have been extensively studied in game theory and economics. We explore when convergence of such simple dynamics to an equilibrium is guaranteed in asynchronous computational environments, where nodes can act at any time. Our research agenda, distributed computing with adaptive heuristics, lies on the borderline of computer science (including distributed computing and learning) and game theory (including game dynamics and adaptive heuristics). We exhibit a general non-termination result for a broad class of heuristics with bounded recall---that is, simple rules of behavior that depend only on recent history of interaction between nodes. We consider implications of our result across a wide variety of interesting and timely applications: game theory, circuit design, social networks, routing and congestion control. We also study the computational and communication complexity of asynchronous dynamics and present some basic observations regarding the effects of asynchrony on no-regret dynamics. We believe that our work opens a new avenue for research in both distributed computing and game theory.Comment: 36 pages, four figures. Expands both technical results and discussion of v1. Revised version will appear in the proceedings of Innovations in Computer Science 201

    \u3cem\u3eEx Vivo\u3c/em\u3e Diffusion Tensor Imaging of Spinal Cord Injury in Rats of Varying Degrees of Severity

    Get PDF
    The aim of this study was to characterize magnetic resonance diffusion tensor imaging (DTI) in proximal regions of the spinal cord following a thoracic spinal cord injury (SCI). Sprague–Dawley rats (n = 40) were administered a control, mild, moderate, or severe contusion injury at the T8 vertebral level. Six direction diffusion weighted images (DWIs) were collected ex vivo along the length of the spinal cord, with an echo/repetition time of 31.6 ms/14 sec and b = 500 sec/mm2. Diffusion metrics were correlated to hindlimb motor function. Significant differences were found for whole cord region of interest (ROI) drawings for fractional anisotropy (FA), mean diffusivity (MD), longitudinal diffusion coefficient (LD), and radial diffusion coefficient (RD) at each of the cervical levels ( p \u3c 0.01). Motor function correlated with MD in the cervical segments of the spinal cord (r2 = 0.80). The diffusivity of water significantly decreased throughout ‘‘uninjured’’ portions of the spinal cord following a contusion injury ( p \u3c 0.05). Diffusivity metrics were found to be altered following SCI in both white and gray matter regions. Injury severity was associated with diffusion changes over the entire length of the cord. This study demonstrates that DTI is sensitive to SCI in regions remote from injury, suggesting that the diffusion metrics may be used as a biomarker for severity of injury

    A signature of anisotropic bubble collisions

    Full text link
    Our universe may have formed via bubble nucleation in an eternally-inflating background. Furthermore, the background may have a compact dimension---the modulus of which tunnels out of a metastable minimum during bubble nucleation---which subsequently grows to become one of our three large spatial dimensions. When in this scenario our bubble universe collides with other ones like it, the collision geometry is constrained by the reduced symmetry of the tunneling instanton. While the regions affected by such bubble collisions still appear (to leading order) as disks in an observer's sky, the centers of these disks all lie on a single great circle, providing a distinct signature of anisotropic bubble nucleation.Comment: 10 pages, 5 figures; v2: crucial error corrected, conclusions revise
    • …
    corecore