16,686 research outputs found

    The Matrix Product Approach to Quantum Spin Ladders

    Get PDF
    We present a manifestly rotational invariant formulation of the matrix product method valid for spin chains and ladders. We apply it to 2 legged spin ladders with spins 1/2, 1 and 3/2 and different magnetic structures labelled by the exchange coupling constants, which can be ferromagnetic or antiferromagnetic along the legs and the rungs of the ladder We compute ground state energy densities, correlation lengths and string order parameters. We present numerical evidence of the duality properties of the 3 different non ferromagnetic spin 1/2 ladders. We show that the long range topological order characteristic of isolated spin 1 chains is broken by the interchain coupling. The string order correlation function decays exponentially with a finite correlation length that we compute. A physical picture of the spin 1 ladder is given in terms of a collection of resonating spin 1 chains. Finally for ladders with spin equal or greater than 3/2 we define a class of AKLT states whose matrix product coefficients are given by 9-j symbols.Comment: REVTEX file, 16 pages, 12 figures, 6 Table

    Hydrogen hollow cathode ion source

    Get PDF
    A source of hydrogen ions is disclosed and includes a chamber having at one end a cathode which provides electrons and through which hydrogen gas flows into the chamber. Screen and accelerator grids are provided at the other end of the chamber. A baffle plate is disposed between the cathode and the grids and a cylindrical baffle is disposed coaxially with the cathode at the one end of the chamber. The cylindrical baffle is of greater diameter than the baffle plate to provide discharge impedance and also to protect the cathode from ion flux. An anode electrode draws the electrons away from the cathode. The hollow cathode includes a tubular insert of tungsten impregnated with a low work function material to provide ample electrons. A heater is provided around the hollow cathode to initiate electron emission from the low work function material

    Multiobjective optimization to a TB-HIV/AIDS coinfection optimal control problem

    Full text link
    We consider a recent coinfection model for Tuberculosis (TB), Human Immunodeficiency Virus (HIV) infection and Acquired Immunodeficiency Syndrome (AIDS) proposed in [Discrete Contin. Dyn. Syst. 35 (2015), no. 9, 4639--4663]. We introduce and analyze a multiobjective formulation of an optimal control problem, where the two conflicting objectives are: minimization of the number of HIV infected individuals with AIDS clinical symptoms and coinfected with AIDS and active TB; and costs related to prevention and treatment of HIV and/or TB measures. The proposed approach eliminates some limitations of previous works. The results of the numerical study provide comprehensive insights about the optimal treatment policies and the population dynamics resulting from their implementation. Some nonintuitive conclusions are drawn. Overall, the simulation results demonstrate the usefulness and validity of the proposed approach.Comment: This is a preprint of a paper whose final and definite form is with 'Computational and Applied Mathematics', ISSN 0101-8205 (print), ISSN 1807-0302 (electronic). Submitted 04-Feb-2016; revised 11-June-2016 and 02-Sept-2016; accepted for publication 15-March-201

    An Experimental Investigation of Colonel Blotto Games

    Get PDF
    This article examines behavior in the two-player, constant-sum Colonel Blotto game with asymmetric resources in which players maximize the expected number of battlefields won. The experimental results support all major theoretical predictions. In the auction treatment, where winning a battlefield is deterministic, disadvantaged players use a “guerilla warfare” strategy which stochastically allocates zero resources to a subset of battlefields. Advantaged players employ a “stochastic complete coverage” strategy, allocating random, but positive, resource levels across the battlefields. In the lottery treatment, where winning a battlefield is probabilistic, both players divide their resources equally across all battlefields.Colonel Blotto, conflict resolution, contest theory, multi-dimensional resource allocation, rent-seeking, experiments

    Method and apparatus for attaching physiological monitoring electrodes Patent

    Get PDF
    Adhesive spray process for attaching biomedical skin electrode

    The location, clustering, and propagation of massive star formation in giant molecular clouds

    Get PDF
    Massive stars are key players in the evolution of galaxies, yet their formation pathway remains unclear. In this work, we use data from several galaxy-wide surveys to build an unbiased dataset of ~700 massive young stellar objects (MYSOs), ~200 giant molecular clouds (GMCs), and ~100 young (<10 Myr) optical stellar clusters (SCs) in the Large Magellanic Cloud. We employ this data to quantitatively study the location and clustering of massive star formation and its relation to the internal structure of GMCs. We reveal that massive stars do not typically form at the highest column densities nor centers of their parent GMCs at the ~6 pc resolution of our observations. Massive star formation clusters over multiple generations and on size scales much smaller than the size of the parent GMC. We find that massive star formation is significantly boosted in clouds near SCs. Yet, whether a cloud is associated with a SC does not depend on either the cloud's mass or global surface density. These results reveal a connection between different generations of massive stars on timescales up to 10 Myr. We compare our work with Galactic studies and discuss our findings in terms of GMC collapse, triggered star formation, and a potential dichotomy between low- and high-mass star formation.Comment: 13 pages, 7 figures, in pres

    The Attack and Defense of Weakest-Link Networks

    Get PDF
    This paper experimentally examines behavior in a two-player game of attack and defense of a weakest-link network of targets, in which the attacker’s objective is to successfully attack at least one target and the defender’s objective is diametrically opposed. We apply two benchmark contest success functions (CSFs): the auction CSF and the lottery CSF. Consistent with the theoretical prediction, under the auction CSF, attackers utilize a stochastic “guerilla warfare” strategy — in which a single random target is attacked — more than 80% of the time. Under the lottery CSF, attackers utilize the stochastic guerilla warfare strategy almost 45% of the time, contrary to the theoretical prediction of an equal allocation of forces across the targets.Colonel Blotto, conflict resolution, weakest-link, best-shot, multi-dimensional resource allocation, experiments
    • …
    corecore