7,589 research outputs found
Spin g-factor due to electronic interactions in graphene
The gyromagnetic factor is an important physical quantity relating the
magnetic-dipole moment of a particle to its spin. The electron spin g-factor in
vacuo is one of the best model-based theoretical predictions ever made, showing
agreement with the measured value up to ten parts per trillion. However, for
electrons in a material the g-factor is modified with respect to its value in
vacuo because of environment interactions. Here, we show how interaction
effects lead to the spin g-factor correction in graphene by considering the
full electromagnetic interaction in the framework of pseudo-QED. We compare our
theoretical prediction with experiments performed on graphene deposited on SiO2
and SiC, and we find a very good agreement between them.Comment: Improved version of the manuscript; valley g-factor part has been
remove
Effective potential in Lorentz-breaking field theory models
We calculate explicitly the one-loop effective potential in different
Lorentz-breaking field theory models. First, we consider a Yukawa-like theory
and, then, some examples of Lorentz-violating extensions of scalar QED. We
observed, for the extended QED models, that the resulting effective potential
converges to the known result in the limit in which Lorentz-symmetry is
restored. Besides, the one-loop corrections to the effective potential in all
the cases we studied depend on the background tensors responsible for the
Lorentz symmetry violation. This have consequences in physical quantities like,
for example, in the induced mass due to Coleman-Weinberg mechanism.Comment: Version accepted for publication in EPJ
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a
number of applications, in particular, as an essential building block for
two-party and multi-party computation. We construct a round-optimal (2 rounds)
universally composable (UC) protocol for oblivious transfer secure against
active adaptive adversaries from any OW-CPA secure public-key encryption scheme
with certain properties in the random oracle model (ROM). In terms of
computation, our protocol only requires the generation of a public/secret-key
pair, two encryption operations and one decryption operation, apart from a few
calls to the random oracle. In~terms of communication, our protocol only
requires the transfer of one public-key, two ciphertexts, and three binary
strings of roughly the same size as the message. Next, we show how to
instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE,
and CDH assumptions. Our instantiations based on the low noise LPN, McEliece,
and QC-MDPC assumptions are the first UC-secure OT protocols based on coding
assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3)
low communication and computational complexities. Previous results in this
setting only achieved static security and used costly cut-and-choose
techniques.Our instantiation based on CDH achieves adaptive security at the
small cost of communicating only two more group elements as compared to the
gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which
only achieves static security in the ROM
Generation of higher derivatives operators and electromagnetic wave propagation in a Lorentz-violation scenario
We study the perturbative generation of higher-derivative operators as
corrections to the photon effective action, which are originated from a Lorentz
violation background. Such corrections are obtained, at one-loop order, through
the proper-time method, using the zeta function regularization. We focus over
the lowest order corrections and investigate their influence in the propagation
of electromagnetic waves through the vacuum, in the presence of a strong,
constant magnetic field. This is a setting of experimental relevance, since it
bases active efforts to measure non linear electromagnetic effects. After
surprising cancellations of Lorentz violating corrections to the Maxwell's
equation, we show that no effects of the kind of Lorentz violation we consider
can be detected in such a context.Comment: v2: 13 pages, no figures, section IV considerably rewritten, main
results unchanged and are now obtained in a simpler way. To appear in PL
Experimental and theoretical evidences for the ice regime in planar artificial spin ices
In this work, we explore a kind of geometrical effect in the thermodynamics
of artificial spin ices (ASI). In general, such artificial materials are
athermal. Here, We demonstrate that geometrically driven dynamics in ASI can
open up the panorama of exploring distinct ground states and thermally magnetic
monopole excitations. It is shown that a particular ASI lattice will provide a
richer thermodynamics with nanomagnet spins experiencing less restriction to
flip precisely in a kind of rhombic lattice. This can be observed by analysis
of only three types of rectangular artificial spin ices (RASI). Denoting the
horizontal and vertical lattice spacings by a and b, respectively, then, a RASI
material can be described by its aspect ratio =a/b. The rhombic lattice
emerges when =. So, by comparing the impact of thermal
effects on the spin flips in these three appropriate different RASI arrays, it
is possible to find a system very close to the ice regime
Uso do método de EBERHART e RUSSELL como informação a priori para aplicação de redes neurais artificiais e análise discriminante visando a classificação de genótipos de alfafa quanto à adaptabilidade e estabilidade fenotípica.
O objetivo deste trabalho foi comparar os resultados obtidos pela metodologia de Eberhart e Russell (1966) com a Análise Discriminante e o treinamento de uma rede neural artificial para análise da adaptabilidade e estabilidade fenotípica de genótipos de alfafa (Medicago sativa). Foram utilizados dados provenientes de um experimento sobre produção de matéria seca de 92 genótipos de alfafa realizado no delineamento em blocos casualizados, com duas repetições. Os genótipos foram submetidos a 20 cortes, no período de novembro de 2004 a junho de 2006. Cada corte foi considerado um ambiente. Diante dos resultados apresentados, verifica-se que a rede neural artificial apresentou índices de concordância mais elevados do que a Análise Discriminante com relação aos resultados obtidos pela metodologia de Eberhart e Russell (1966)
- …