2,844 research outputs found

    An electronic instability in bismuth far beyond the quantum limit

    Full text link
    We present a transport study of semi-metallic bismuth in presence of a magnetic field applied along the trigonal axis extended to 55 T for electric conductivity and to 45 T for thermoelectric response. The results uncover a new field scale at about 40 T in addition to the previously detected ones. Large anomalies in all transport properties point to an intriguing electronic instability deep in the ultraquantum regime. Unexpectedly, both the sheer magnitude of conductivity and its metallic temperature dependence are enhanced by this instability.Comment: 5 pages, 4 figure

    Hardware Trojan Detection by Delay and Electromagnetic Measurements

    Get PDF
    International audience—Hardware Trojans (HT) inserted in integrated circuits have received special attention of researchers. In this paper, we present firstly a novel HT detection technique based on path delays measurements. A delay model, which considers intra-die process variations, is established for a net. Secondly, we show how to detect HT using ElectroMagnetic (EM) measurements. We study the HT detection probability according to its size taking into account the inter-die process variations with a set of FPGA. The results show, for instance, that there is a probability greater than 95% with a false negative rate of 5% to detect a HT larger than 1.7% of the original circuit. I. Introduction The trust and security of Integrated Circuits (IC) design and fabrication is critical for sensitive fields like finance, health, and governmental communications. Due to the complexity and the high cost of IC fabrication cycle, more and more firms outsource their production. This trend gives a possibility for an adversary to introduce malicious circuit, called Hardware Trojan horse (HT), in any IC. It can either perform a Denial Of Service (DOS), deteriorate circuit performance [8], or steal sensitive information. Therefore, the HTs are considered a real threat which has gained attention from researchers. HT can be inserted at any point during the design or fabrication process from Register Transfer Level (RTL) to layout and circuit fabrication. For example in [11], authors show some techniques to insert malicious circuitry at RTL level. These HTs, which are activated with a specific pattern inputs, can leak secret key via RS232 channels. The HT, unlike a software trojan, cannot be removed once it is fabricated. So, it is better to proactively prevent the insertion of a HT: few methods have been proposed. One seminal work is known as " private circuits II " [9]. This paper describes a proof-of-concept, too costly to be implemented. A more reasonable option has been recently proposed in [5]: it uses two codes to encode the state and mix it with encoded randomness, which allows to prevent an easy triggering and has a detection capability. Otherwise it is important to detect it before it becomes effective. Previous works classify detection methods into two wide categories: destructive and non-destructive. Invasive methods destroy the chip to reconstruct successfully the GDSII an

    Predicting the linear response of self-gravitating stellar spheres and discs with LinearResponse.jl

    Full text link
    We present LinearResponse.jl, an efficient, versatile public library written in julia to compute the linear response of self-gravitating (3D spherically symmetric) stellar spheres and (2D axisymmetric razor-thin) discs. LinearResponse.jl can scan the whole complex frequency plane, probing unstable, neutral and (weakly) damped modes. Given a potential model and a distribution function, this numerical toolbox estimates the modal frequencies as well as the shapes of individual modes. The libraries are validated against a combination of previous results for the spherical isochrone model and Mestel discs, and new simulations for the spherical Plummer model. Beyond linear response theory, the realm of applications of LinearResponse.jl also extends to the kinetic theory of self-gravitating systems through a modular interface.Comment: Software available at https://github.com/michael-petersen/LinearResponse.j

    Recent Developments in Climate Justice

    Get PDF
    Climate justice can be defined generally as addressing the disproportionate burden of climate change impacts on poor and marginalized communities. It seeks to promote more equitable allocation of these burdens at the local, national, and global levels through proactive regulatory initiatives and reactive judicial remedies that draw on international human rights and domestic environmental justice theories. Yet, efforts to define climate justice as a field of inquiry remain elusive and underinclusive; a recent book, Climate Justice: Case Studies in Global and Regional Governance Challenges (ELI Press 2016), seeks to fill that void by providing an overview of the landscape of climate justice from a variety of legal and geographic perspectives. On March 10, 2017, ELI convened the book’s editor and three contributing authors to discuss current developments. Below, we present a transcript of the seminar, which has been edited for style, clarity, and space considerations

    Causal inference methods for intergenerational research using observational data

    Get PDF
    Identifying early causal factors leading to the development of poor mental health and behavioral outcomes is essential to design efficient preventive interventions. The substantial associations observed between parental risk factors (e.g., maternal stress in pregnancy, parental education, parental psychopathology, parent-child relationship) and child outcomes point toward the importance of parents in shaping child outcomes. However, such associations may also reflect confounding, including genetic transmission-that is, the child inherits genetic risk common to the parental risk factor and the child outcome. This can generate associations in the absence of a causal effect. As randomized trials and experiments are often not feasible or ethical, observational studies can help to infer causality under specific assumptions. This review aims to provide a comprehensive summary of current causal inference methods using observational data in intergenerational settings. We present the rich causal inference toolbox currently available to researchers, including genetically informed and analytical methods, and discuss their application to child mental health and related outcomes. We outline promising research areas and discuss how existing approaches can be combined or extended to probe the causal nature of intergenerational effects. (PsycInfo Database Record (c) 2023 APA, all rights reserved)

    Dipole force free optical control and cooling of nanofiber trapped atoms

    Get PDF
    The evanescent field surrounding nanoscale optical waveguides offers an efficient interface between light and mesoscopic ensembles of neutral atoms. However, the thermal motion of trapped atoms, combined with the strong radial gradients of the guided light, leads to a time-modulated coupling between atoms and the light mode, thus giving rise to additional noise and motional dephasing of collective states. Here, we present a dipole force free scheme for coupling of the radial motional states, utilizing the strong intensity gradient of the guided mode and demonstrate all-optical coupling of the cesium hyperfine ground states and motional sideband transitions. We utilize this to prolong the trap lifetime of an atomic ensemble by Raman sideband cooling of the radial motion which, to the best of our knowledge, has not been demonstrated in nano-optical structures previously. This Letter points towards full and independent control of internal and external atomic degrees of freedom using guided light modes only

    Setting temporal baselines for biodiversity : the limits of available monitoring data for capturing the full impact of anthropogenic pressures

    Get PDF
    Temporal baselines are needed for biodiversity, in order for the change in biodiversity to be measured over time, the targets for biodiversity conservation to be defined and conservation progress to be evaluated. Limited biodiversity information is widely recognized as a major barrier for identifying temporal baselines, although a comprehensive quantitative assessment of this is lacking. Here, we report on the temporal baselines that could be drawn from biodiversity monitoring schemes in Europe and compare those with the rise of important anthropogenic pressures. Most biodiversity monitoring schemes were initiated late in the 20th century, well after anthropogenic pressures had already reached half of their current magnitude. Setting temporal baselines from biodiversity monitoring data would therefore underestimate the full range of impacts of major anthropogenic pressures. In addition, biases among taxa and organization levels provide a truncated picture of biodiversity over time. These limitations need to be explicitly acknowledged when designing management strategies and policies as they seriously constrain our ability to identify relevant conservation targets aimed at restoring or reversing biodiversity losses. We discuss the need for additional research efforts beyond standard biodiversity monitoring to reconstruct the impacts of major anthropogenic pressures and to identify meaningful temporal baselines for biodiversity
    corecore