266 research outputs found

    Revealing charge-tunneling processes between a quantum dot and a superconducting island through gate sensing

    Full text link
    We report direct detection of charge-tunneling between a quantum dot and a superconducting island through radio-frequency gate sensing. We are able to resolve spin-dependent quasiparticle tunneling as well as two-particle tunneling involving Cooper pairs. The quantum dot can act as an RF-only sensor to characterize the superconductor addition spectrum, enabling us to access subgap states without transport. Our results provide guidance for future dispersive parity measurements of Majorana modes, which can be realized by detecting the parity-dependent tunneling between dots and islands.Comment: 6 pages, 4 figures, supplemental material included as ancillary fil

    Performance ManagementWork

    Get PDF

    Structural evolution and strain induced mixing in Cu-Co composites studied by transmission electron microscopy and atom probe tomography

    Get PDF
    A Cu-Co composite material is chosen as a model system to study structural evolution and phase formations during severe plastic deformation. The evolving microstructures as a function of the applied strain were characterized at the micro-, nano-, and atomic scale-levels by combining scanning electron microscopy and transmission electron microscopy including energy-filtered transmission electron microscopy and electron energy-loss spectroscopy. The amount of intermixing between the two phases at different strains was examined at the atomic scale using atom probe tomography as complimentary method. It is shown that Co particles are dissolved in the Cu matrix during severe plastic deformation to a remarkable extent and their size, number, and volume fraction were quantitatively determined during the deformation process. From the results, it can be concluded that supersaturated solid solutions up to 26 at.% Co in a fcc Cu-26 at.% Co alloy are obtained during deformation. However, the distribution of Co was found to be inhomogeneous even at the highest degree of investigated strain

    Rechnungslegung nach OR: Grundsatz der Unternehmensfortführung Teil 1

    Full text link
    Die Jahresrechnung beruht auf der Annahme, dass das Unternehmen auf absehbare Zeit, mindestens aber in den nächsten zwölf Monaten ab dem Bilanzstichtag fortgeführt werden kann. Es stellt sich die Frage, wer für die Beurteilung der Unternehmensfortführung verantwortlich ist und welcher Prognosezeitraum zugrunde gelegt werden muss

    Rechnungslegung nach OR: Grundsatz der Unternehmensfortführung Teil 2

    Full text link
    Die Jahresrechnung beruht auf der Annahme, dass das Unternehmen auf absehbare Zeit, mindestens aber in den nächsten zwölf Monaten ab dem Bilanzstichtag fortgeführt werden kann. Es stellt sich die Frage, wie zu verfahren ist, wenn die Fortführungsannahme zu verneinen ist

    Real-time whole-body human motion tracking based on unlabeled markers

    Get PDF

    Beam Pattern Optimization Method for Subarray-Based Hybrid Beamforming Systems

    Get PDF
    Massive multiple-input multiple-output (MIMO) systems operating at millimeter-wave (mmWave) frequencies promise to satisfy the demand for higher data rates in mobile communication networks. A practical challenge that arises is the calibration in amplitude and phase of these massive MIMO systems, as the antenna elements are too densely packed to provide a separate calibration branch for measuring them independently. Over-the-air (OTA) calibration methods are viable solutions to this problem. In contrast to previous works, the here presented OTA calibration method is investigated and optimized for subarray-based hybrid beamforming (SBHB) systems. SBHB systems represent an efficient architectural solution to realize massive MIMO systems. Moreover, based on OTA scattering parameter measurements, the ambiguities of the phase shifters are exploited and two criteria to optimize the beam pattern are formulated. Finally, the optimization criteria are examined in measurements utilizing a novel SBHB receiver system operating at 27.8 GHz

    Of “raisins” and “yeast”: mobilisation and framing in the East German revolution of 1989

    Get PDF
    There is no shortage of literature on the social movements that arose in East Germany in 1989. Numerous studies have shed light upon the nature, scale and dynamics of the uprising of that year. But on certain issues questions remain. No consensus exists, for example, on the relationship between the “civic groups” (New Forum, Democratic Awakening, etc.) and the street protests of the autumn of 1989. Were these simply two facets of a single movement? Or are they better characterised as two distinct streams within the same movement delta? Did the street protests push the civic movement activists into the limelight? Or is it more accurate to say, with Reinfried Musch, that “the civic movement brought the people onto the streets”?1 This paper considers two contrasting interpretations of these issues, and finds both wanting. An alternative interpretation is offered, one that draws upon Marc Steinberg's “dialogical” development of frame theory

    Implementation-level Analysis of the JavaScript Helios Voting Client

    Get PDF
    We perform the first automated security analysis of the actual JavaScript implementation of the Helios voting client, a state-of-the-art, web-based, open-audit voting system that is continuously being deployed for real-life elections. While its concept has been exhaustively analyzed by the security community, we actively analyze its actual JavaScript implementation. Automatically ascertaining the security of a large-scale JavaScript implementation comes with major technical challenges. By creating a sequence of program transformations, we overcome these challenges, thereby making the Helios JavaScript client accessible to existing static analysis techniques. We then automatically analyze the transformed client using graph slicing, reducing an approximately 7 million node graph representing the information flow of the client’s implementation to a handful of potentially harmful flows, each individually consisting of less than 40 nodes. Our interpretation of this analysis results in the exposure of two thus far undiscovered vulnerabilities affecting the live version of Helios: a serious cross-site scripting attack leading to arbitrary script execution and a browser-dependent execution path that results in ballots being sent in plaintext. These attacks can be mitigated with minor adaptations to Helios. Moreover, our program transformations result in a version of Helios with fewer external dependencies and, accordingly, a reduced attack surface
    corecore