255,667 research outputs found

    A fast high-order method to calculate wakefield forces in an electron beam

    Full text link
    In this paper we report on a high-order fast method to numerically calculate wakefield forces in an electron beam given a wake function model. This method is based on a Newton-Cotes quadrature rule for integral approximation and an FFT method for discrete summation that results in an O(Nlog(N))O(Nlog(N)) computational cost, where NN is the number of grid points. Using the Simpson quadrature rule with an accuracy of O(h4)O(h^4), where hh is the grid size, we present numerical calculation of the wakefields from a resonator wake function model and from a one-dimensional coherent synchrotron radiation (CSR) wake model. Besides the fast speed and high numerical accuracy, the calculation using the direct line density instead of the first derivative of the line density avoids numerical filtering of the electron density function for computing the CSR wakefield force

    Trapped Bose-Einstein condensates in synthetic magnetic field

    Full text link
    Rotating properties of Bose-Einstein condensates in synthetic magnetic field are studied by numerically solving the Gross-Pitaevskii equation and compared with condensates confined in the rotating trap. It seems that it is more difficult to add large angular momentum to condensates spined up by the synthetic magnetic field than by the rotating trap. However, strengthening the repulsive interaction between atoms is an effective and realizable route to overcome this problem and can at least generate vortex-lattice-like structures. In addition, the validity of the Feynman rule for condensates in synthetic magnetic field is verified.Comment: 5 pages, 5 figure

    Entanglement in a second order topological insulator on a square lattice

    Full text link
    In a dd-dimensional topological insulator of order dd, there are zero energy states on its corners which have close relationship with its entanglement behaviors. We studied the bipartite entanglement spectra for different subsystem shapes and found that only when the entanglement boundary has corners matching the lattice, exact zero modes exist in the entanglement spectrum corresponding to the zero energy states caused by the same physical corners. We then considered finite size systems in which case these corner states are coupled together by long range hybridizations to form a multipartite entangled state. We proposed a scheme to calculate the quadripartite entanglement entropy on the square lattice, which is well described by a four-sites toy model and thus provides another way to identify the higher order topological insulators from the multipartite entanglement point of view.Comment: 5 pages, 3 figure

    Some insights into the newly observed Zc(4100)Z_c(4100) in B0ηcK+πB^0\to \eta_c K^+ \pi^- by LHCb

    Full text link
    The newly reported exotic signal Zc(4100)Z_c(4100) by the LHCb Collaboration in the invariant mass spectrum of ηcπ\eta_c\pi^- in B0ηcK+πB^0\to \eta_c K^+ \pi^- has been a new experimental evidence for an exotic meson containing four constituent quarks. Although the present experimental information is very limited, we show that its correlations with some existing exotic candidates can be recognized. This signal can be either caused by final state interaction effects or a PP-wave resonance state arising from the DDˉD^*\bar{D}^* interaction. For the latter option its neutral partner will have exotic quantum numbers of IG(JPC)=1(1+)I^G(J^{PC})=1^-(1^{-+}). This signal, if confirmed, would provide important clues for dynamics for producing multiquark systems in BB meson decays and e+ee^+e^- annihilations.Comment: 6 pages, 2 eps figure

    On Using Encryption Techniques to Enhance Sticky Policies Enforcement

    Get PDF
    How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts. The sticky policy paradigm, proposed by Karjoth, Schunter, and Waidner, provides very useful inspiration on how we can protect sensitive personal data, but the enforcement is very weak. In this paper we provide an overview of the state of the art in enforcing sticky policies, especially the concept of sticky policy enforcement using encryption techniques including Public-Key Encryption (PKE), Identity-Based Encryption (IBE), Attribute-Based Encryption (ABE), and Proxy Re-Encryption (PRE). We provide detailed comparison results on the (dis)advantages of these enforcement mechanisms. As a result of the analysis, we provide a general framework for enhancing sticky policy enforcement using Type-based PRE (TPRE), which is an extension of general PRE

    Open Letter to Bureau Veritas’ CEO, Frank Piedelievre

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide.  Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.CLW_OpenLetter_BV.pdf: 219 downloads, before Oct. 1, 2020
    corecore