788 research outputs found

    Eigenvalue Attraction

    Get PDF
    We prove that the complex conjugate (c.c.) eigenvalues of a smoothly varying real matrix attract (Eq. 15). We offer a dynamical perspective on the motion and interaction of the eigenvalues in the complex plane, derive their governing equations and discuss applications. C.c. pairs closest to the real axis, or those that are ill-conditioned, attract most strongly and can collide to become exactly real. As an application we consider random perturbations of a fixed matrix MM. If MM is Normal, the total expected force on any eigenvalue is shown to be only the attraction of its c.c. (Eq. 24) and when MM is circulant the strength of interaction can be related to the power spectrum of white noise. We extend this by calculating the expected force (Eq. 41) for real stochastic processes with zero-mean and independent intervals. To quantify the dominance of the c.c. attraction, we calculate the variance of other forces. We apply the results to the Hatano-Nelson model and provide other numerical illustrations. It is our hope that the simple dynamical perspective herein might help better understanding of the aggregation and low density of the eigenvalues of real random matrices on and near the real line respectively. In the appendix we provide a Matlab code for plotting the trajectories of the eigenvalues.Comment: v1:15 pages, 12 figures, 1 Matlab code. v2: very minor changes, fixed a reference. v3: 25 pages, 17 figures and one Matlab code. The results have been extended and generalized in various ways v4: 26 pages, 10 figures and a Matlab Code. Journal Reference Added. http://link.springer.com/article/10.1007%2Fs10955-015-1424-

    Stability of Periodically Driven Topological Phases against Disorder

    Full text link
    In recent experiments, time-dependent periodic fields are used to create exotic topological phases of matter with potential applications ranging from quantum transport to quantum computing. These nonequilibrium states, at high driving frequencies, exhibit the quintessential robustness against local disorder similar to equilibrium topological phases. However, proving the existence of such topological phases in a general setting is an open problem. We propose a universal effective theory that leverages on modern free probability theory and ideas in random matrices to analytically predict the existence of the topological phase for finite driving frequencies and across a range of disorder. We find that, depending on the strength of disorder, such systems may be topological or trivial and that there is a transition between the two. In particular, the theory predicts the critical point for the transition between the two phases and provides the critical exponents. We corroborate our results by comparing them to exact diagonalizations for driven-disordered 1D Kitaev chain and 2D Bernevig-Hughes-Zhang models and find excellent agreement. This Letter may guide the experimental efforts for exploring topological phases.Comment: 5 pages + 9 pages supplementary material. 4 Figure

    Awareness and perception of phishing variants from Policing, Computing and Criminology students in Canterbury Christ Church University

    Get PDF
    This study focuses on gauging awareness of different phishing communication students in the School of Law, Policing and Social Sciences and the School of Engineering, Technology and Design in Canterbury Christ Church University and their perception of different phishing variants. There is an exploration of the underlying factors in which students fall victim to different types of phishing attacks from questionnaires and a focus group. The students’ perception of different types of phishing variants was varied from the focus group and anonymised questionnaires. A total of 177 respondents participated in anonymised questionnaires in the study. Students were asked a mixture of scenario-based questions on different phishing attacks, their awareness levels of security tools that can be used against some phishing variants, and if they received any phishing emails in the past. Additionally, 6 computing students in a focus group discussed different types of phishing attacks and recommended potential security countermeasures against them. The vulnerabilities and issues of anti-phishing software, firewalls, and internet browsers that have security toolbars are explained in the study against different types of phishing attacks. The focus group was with computing students and their knowledge about certain phishing variants was limited. The discussion within the focus group was gauging the computing students' understanding and awareness of phishing variants. The questionnaire data collection sample was with first year criminology and final year policing students which may have influenced the results of the questionnaire in terms of their understanding, security countermeasures, and how they identify certain phishing variants. The anonymised questionnaire awareness levels on different types of phishing fluctuated in terms of lack of awareness on certain phishing variants. Some criminology and policing students either did not know about phishing variants or had limited knowledge about different types of phishing communication, security countermeasures, the identifying features of a phishing message, and the precautions they should take against phishing variants from fraudsters
    • …
    corecore