255,667 research outputs found
A fast high-order method to calculate wakefield forces in an electron beam
In this paper we report on a high-order fast method to numerically calculate
wakefield forces in an electron beam given a wake function model. This method
is based on a Newton-Cotes quadrature rule for integral approximation and an
FFT method for discrete summation that results in an computational
cost, where is the number of grid points. Using the Simpson quadrature rule
with an accuracy of , where is the grid size, we present numerical
calculation of the wakefields from a resonator wake function model and from a
one-dimensional coherent synchrotron radiation (CSR) wake model. Besides the
fast speed and high numerical accuracy, the calculation using the direct line
density instead of the first derivative of the line density avoids numerical
filtering of the electron density function for computing the CSR wakefield
force
Trapped Bose-Einstein condensates in synthetic magnetic field
Rotating properties of Bose-Einstein condensates in synthetic magnetic field
are studied by numerically solving the Gross-Pitaevskii equation and compared
with condensates confined in the rotating trap. It seems that it is more
difficult to add large angular momentum to condensates spined up by the
synthetic magnetic field than by the rotating trap. However, strengthening the
repulsive interaction between atoms is an effective and realizable route to
overcome this problem and can at least generate vortex-lattice-like structures.
In addition, the validity of the Feynman rule for condensates in synthetic
magnetic field is verified.Comment: 5 pages, 5 figure
Entanglement in a second order topological insulator on a square lattice
In a -dimensional topological insulator of order , there are zero
energy states on its corners which have close relationship with its
entanglement behaviors. We studied the bipartite entanglement spectra for
different subsystem shapes and found that only when the entanglement boundary
has corners matching the lattice, exact zero modes exist in the entanglement
spectrum corresponding to the zero energy states caused by the same physical
corners. We then considered finite size systems in which case these corner
states are coupled together by long range hybridizations to form a multipartite
entangled state. We proposed a scheme to calculate the quadripartite
entanglement entropy on the square lattice, which is well described by a
four-sites toy model and thus provides another way to identify the higher order
topological insulators from the multipartite entanglement point of view.Comment: 5 pages, 3 figure
Some insights into the newly observed in by LHCb
The newly reported exotic signal by the LHCb Collaboration in the
invariant mass spectrum of in has been
a new experimental evidence for an exotic meson containing four constituent
quarks. Although the present experimental information is very limited, we show
that its correlations with some existing exotic candidates can be recognized.
This signal can be either caused by final state interaction effects or a
-wave resonance state arising from the interaction. For the
latter option its neutral partner will have exotic quantum numbers of
. This signal, if confirmed, would provide important
clues for dynamics for producing multiquark systems in meson decays and
annihilations.Comment: 6 pages, 2 eps figure
On Using Encryption Techniques to Enhance Sticky Policies Enforcement
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts. The sticky policy paradigm, proposed by Karjoth, Schunter, and Waidner, provides very useful inspiration on how we can protect sensitive personal data, but the enforcement is very weak. In this paper we provide an overview of the state of the art in enforcing sticky policies, especially the concept of sticky policy enforcement using encryption techniques including Public-Key Encryption (PKE), Identity-Based Encryption (IBE), Attribute-Based Encryption (ABE), and Proxy Re-Encryption (PRE). We provide detailed comparison results on the (dis)advantages of these enforcement mechanisms. As a result of the analysis, we provide a general framework for enhancing sticky policy enforcement using Type-based PRE (TPRE), which is an extension of general PRE
Open Letter to Bureau Veritas’ CEO, Frank Piedelievre
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.CLW_OpenLetter_BV.pdf: 219 downloads, before Oct. 1, 2020
- …
