16,686 research outputs found
The Matrix Product Approach to Quantum Spin Ladders
We present a manifestly rotational invariant formulation of the matrix
product method valid for spin chains and ladders. We apply it to 2 legged spin
ladders with spins 1/2, 1 and 3/2 and different magnetic structures labelled by
the exchange coupling constants, which can be ferromagnetic or
antiferromagnetic along the legs and the rungs of the ladder We compute ground
state energy densities, correlation lengths and string order parameters. We
present numerical evidence of the duality properties of the 3 different non
ferromagnetic spin 1/2 ladders. We show that the long range topological order
characteristic of isolated spin 1 chains is broken by the interchain coupling.
The string order correlation function decays exponentially with a finite
correlation length that we compute. A physical picture of the spin 1 ladder is
given in terms of a collection of resonating spin 1 chains. Finally for ladders
with spin equal or greater than 3/2 we define a class of AKLT states whose
matrix product coefficients are given by 9-j symbols.Comment: REVTEX file, 16 pages, 12 figures, 6 Table
Hydrogen hollow cathode ion source
A source of hydrogen ions is disclosed and includes a chamber having at one end a cathode which provides electrons and through which hydrogen gas flows into the chamber. Screen and accelerator grids are provided at the other end of the chamber. A baffle plate is disposed between the cathode and the grids and a cylindrical baffle is disposed coaxially with the cathode at the one end of the chamber. The cylindrical baffle is of greater diameter than the baffle plate to provide discharge impedance and also to protect the cathode from ion flux. An anode electrode draws the electrons away from the cathode. The hollow cathode includes a tubular insert of tungsten impregnated with a low work function material to provide ample electrons. A heater is provided around the hollow cathode to initiate electron emission from the low work function material
Multiobjective optimization to a TB-HIV/AIDS coinfection optimal control problem
We consider a recent coinfection model for Tuberculosis (TB), Human
Immunodeficiency Virus (HIV) infection and Acquired Immunodeficiency Syndrome
(AIDS) proposed in [Discrete Contin. Dyn. Syst. 35 (2015), no. 9, 4639--4663].
We introduce and analyze a multiobjective formulation of an optimal control
problem, where the two conflicting objectives are: minimization of the number
of HIV infected individuals with AIDS clinical symptoms and coinfected with
AIDS and active TB; and costs related to prevention and treatment of HIV and/or
TB measures. The proposed approach eliminates some limitations of previous
works. The results of the numerical study provide comprehensive insights about
the optimal treatment policies and the population dynamics resulting from their
implementation. Some nonintuitive conclusions are drawn. Overall, the
simulation results demonstrate the usefulness and validity of the proposed
approach.Comment: This is a preprint of a paper whose final and definite form is with
'Computational and Applied Mathematics', ISSN 0101-8205 (print), ISSN
1807-0302 (electronic). Submitted 04-Feb-2016; revised 11-June-2016 and
02-Sept-2016; accepted for publication 15-March-201
An Experimental Investigation of Colonel Blotto Games
This article examines behavior in the two-player, constant-sum Colonel Blotto game with asymmetric resources in which players maximize the expected number of battlefields won. The experimental results support all major theoretical predictions. In the auction treatment, where winning a battlefield is deterministic, disadvantaged players use a “guerilla warfare” strategy which stochastically allocates zero resources to a subset of battlefields. Advantaged players employ a “stochastic complete coverage” strategy, allocating random, but positive, resource levels across the battlefields. In the lottery treatment, where winning a battlefield is probabilistic, both players divide their resources equally across all battlefields.Colonel Blotto, conflict resolution, contest theory, multi-dimensional resource allocation, rent-seeking, experiments
Method and apparatus for attaching physiological monitoring electrodes Patent
Adhesive spray process for attaching biomedical skin electrode
The location, clustering, and propagation of massive star formation in giant molecular clouds
Massive stars are key players in the evolution of galaxies, yet their
formation pathway remains unclear. In this work, we use data from several
galaxy-wide surveys to build an unbiased dataset of ~700 massive young stellar
objects (MYSOs), ~200 giant molecular clouds (GMCs), and ~100 young (<10 Myr)
optical stellar clusters (SCs) in the Large Magellanic Cloud. We employ this
data to quantitatively study the location and clustering of massive star
formation and its relation to the internal structure of GMCs. We reveal that
massive stars do not typically form at the highest column densities nor centers
of their parent GMCs at the ~6 pc resolution of our observations. Massive star
formation clusters over multiple generations and on size scales much smaller
than the size of the parent GMC. We find that massive star formation is
significantly boosted in clouds near SCs. Yet, whether a cloud is associated
with a SC does not depend on either the cloud's mass or global surface density.
These results reveal a connection between different generations of massive
stars on timescales up to 10 Myr. We compare our work with Galactic studies and
discuss our findings in terms of GMC collapse, triggered star formation, and a
potential dichotomy between low- and high-mass star formation.Comment: 13 pages, 7 figures, in pres
The Attack and Defense of Weakest-Link Networks
This paper experimentally examines behavior in a two-player game of attack and defense of a weakest-link network of targets, in which the attacker’s objective is to successfully attack at least one target and the defender’s objective is diametrically opposed. We apply two benchmark contest success functions (CSFs): the auction CSF and the lottery CSF. Consistent with the theoretical prediction, under the auction CSF, attackers utilize a stochastic “guerilla warfare” strategy — in which a single random target is attacked — more than 80% of the time. Under the lottery CSF, attackers utilize the stochastic guerilla warfare strategy almost 45% of the time, contrary to the theoretical prediction of an equal allocation of forces across the targets.Colonel Blotto, conflict resolution, weakest-link, best-shot, multi-dimensional resource allocation, experiments
- …