7,306 research outputs found

    Spatial pair correlations of atoms in molecular dissociation

    Get PDF
    We perform first-principles quantum simulations of dissociation of trapped, spatially inhomogeneous Bose-Einstein condensates of molecular dimers. Specifically, we study spatial pair correlations of atoms produced in dissociation after time of flight. We find that the observable correlations may significantly degrade in systems with spatial inhomogeneity compared to the predictions of idealized uniform models. We show how binning of the signal can enhance the detectable correlations and lead to the violation of the classical Cauchy-Schwartz inequality and relative number squeezing.Comment: Final published versio

    First-principles quantum simulations of dissociation of molecular condensates: Atom correlations in momentum space

    Get PDF
    We investigate the quantum many-body dynamics of dissociation of a Bose-Einstein condensate of molecular dimers into pairs of constituent bosonic atoms and analyze the resulting atom-atom correlations. The quantum fields of both the molecules and atoms are simulated from first principles in three dimensions using the positive-P representation method. This allows us to provide an exact treatment of the molecular field depletion and s-wave scattering interactions between the particles, as well as to extend the analysis to nonuniform systems. In the simplest uniform case, we find that the major source of atom-atom decorrelation is atom-atom recombination which produces molecules outside the initially occupied condensate mode. The unwanted molecules are formed from dissociated atom pairs with non-opposite momenta. The net effect of this process -- which becomes increasingly significant for dissociation durations corresponding to more than about 40% conversion -- is to reduce the atom-atom correlations. In addition, for nonuniform systems we find that mode-mixing due to inhomogeneity can result in further degradation of the correlation signal. We characterize the correlation strength via the degree of squeezing of particle number-difference fluctuations in a certain momentum-space volume and show that the correlation strength can be increased if the signals are binned into larger counting volumes.Comment: Final published version, with updated references and minor modification

    Chiral Perturbation Theory Analysis of the Baryon Magnetic Moments

    Full text link
    Nonanalytic mq1/2m_q^{1/2} and mqlnmqm_q\ln m_q chiral corrections to the baryon magnetic moments are computed. The calculation includes contributions from both intermediate octet and decuplet baryon states. Unlike the one-loop contributions to the baryon axial currents and masses, the contribution from decuplet intermediate states does not partially cancel that from octet intermediate states. The fit to the observed magnetic moments including mq1/2m_q^{1/2} corrections is found to be much worse than the tree level SU(3) fit if values for the baryon-pion axial coupling constants obtained from a tree level extraction are used. Using the axial coupling constant values extracted at one loop results in a better fit to the magnetic moments than the tree level SU(3) fit. There are three linear relations amongst the magnetic moments when mq1/2m_q^{1/2} corrections are included, and one relation including mq1/2m_q^{1/2}, mqlnmqm_q\ln m_q and mqm_q corrections. These relations are independent of the axial coupling constants of the baryons and agree well with experiment.Comment: (16 pages, 2 figures; uses harvmac and uufiles), CERN-TH.6735/92, UCSD/PTH 92-3

    On Characterizing the Data Access Complexity of Programs

    Full text link
    Technology trends will cause data movement to account for the majority of energy expenditure and execution time on emerging computers. Therefore, computational complexity will no longer be a sufficient metric for comparing algorithms, and a fundamental characterization of data access complexity will be increasingly important. The problem of developing lower bounds for data access complexity has been modeled using the formalism of Hong & Kung's red/blue pebble game for computational directed acyclic graphs (CDAGs). However, previously developed approaches to lower bounds analysis for the red/blue pebble game are very limited in effectiveness when applied to CDAGs of real programs, with computations comprised of multiple sub-computations with differing DAG structure. We address this problem by developing an approach for effectively composing lower bounds based on graph decomposition. We also develop a static analysis algorithm to derive the asymptotic data-access lower bounds of programs, as a function of the problem size and cache size

    Extensions and block decompositions for finite-dimensional representations of equivariant map algebras

    Full text link
    Suppose a finite group acts on a scheme XX and a finite-dimensional Lie algebra g\mathfrak{g}. The associated equivariant map algebra is the Lie algebra of equivariant regular maps from XX to g\mathfrak{g}. The irreducible finite-dimensional representations of these algebras were classified in previous work with P. Senesi, where it was shown that they are all tensor products of evaluation representations and one-dimensional representations. In the current paper, we describe the extensions between irreducible finite-dimensional representations of an equivariant map algebra in the case that XX is an affine scheme of finite type and g\mathfrak{g} is reductive. This allows us to also describe explicitly the blocks of the category of finite-dimensional representations in terms of spectral characters, whose definition we extend to this general setting. Applying our results to the case of generalized current algebras (the case where the group acting is trivial), we recover known results but with very different proofs. For (twisted) loop algebras, we recover known results on block decompositions (again with very different proofs) and new explicit formulas for extensions. Finally, specializing our results to the case of (twisted) multiloop algebras and generalized Onsager algebras yields previously unknown results on both extensions and block decompositions.Comment: 41 pages; v2: minor corrections, formatting changed to match published versio

    Dynamics of the Marginal Late Wisconsin Miami Sublobe, Cincinnati, Ohio

    Get PDF
    Author Institution: Department of Geology, University of CincinnatiPhysical characteristics and stratigraphic relationships of glacigenic diamictons in southwestern Ohio have permitted interpretation of local activity and thermal regime of the ice margin beginning at about 19,700 yr BP. At the Sharonville site near Cincinnati, pre-late Wisconsin sediments are overlain by four late Wisconsin lithofacies (three diamictons, one sand and gravel). At the base of the sequence, pre-late Wisconsin sediments are incorporated as blocks and lenses in the overlying diamictons, indicating erosion and entrainment, probably by freezing onto the glacier base. Facies 1 contains sand-filled shear planes and smudges of underlying sediments; the diamicton is interpreted to be a deformation till, which indicates a change in basal thermal regime to overall melting. Facies 2 contains blocks of clay, silt, and sorted sand and gravel, and is interpreted to be a subglacial meltout till, which represents deposition from melting, but stagnant, ice. Facies 3 is massive, with variable clast fabrics, and is interpreted to be a sediment flow deposit, reflecting continued marginal melting and recession. The uppermost facies is comprised of poorly sorted sand and gravel, and is interpreted to represent fluvial deposition. Portions of this sequence are stacked at the southern end of the site, and indicate ice-marginal deformation associated with a reactivation of ice with a freezing basal regime in the study area. This sequence indicates at least two periods of active late Wisconsin ice at Sharonville, and a number of fluctuations in basal thermal regime

    Equivariant map superalgebras

    Full text link
    Suppose a group Γ\Gamma acts on a scheme XX and a Lie superalgebra g\mathfrak{g}. The corresponding equivariant map superalgebra is the Lie superalgebra of equivariant regular maps from XX to g\mathfrak{g}. We classify the irreducible finite dimensional modules for these superalgebras under the assumptions that the coordinate ring of XX is finitely generated, Γ\Gamma is finite abelian and acts freely on the rational points of XX, and g\mathfrak{g} is a basic classical Lie superalgebra (or sl(n,n)\mathfrak{sl}(n,n), n>0n > 0, if Γ\Gamma is trivial). We show that they are all (tensor products of) generalized evaluation modules and are parameterized by a certain set of equivariant finitely supported maps defined on XX. Furthermore, in the case that the even part of g\mathfrak{g} is semisimple, we show that all such modules are in fact (tensor products of) evaluation modules. On the other hand, if the even part of g\mathfrak{g} is not semisimple (more generally, if g\mathfrak{g} is of type I), we introduce a natural generalization of Kac modules and show that all irreducible finite dimensional modules are quotients of these. As a special case, our results give the first classification of the irreducible finite dimensional modules for twisted loop superalgebras.Comment: 27 pages. v2: Section numbering changed to match published version. Other minor corrections. v3: Minor corrections (see change log at end of introduction

    Detecting and characterizing lateral phishing at scale

    Get PDF
    We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefit-ting from both the implicit trust and the information in the hijacked user's account. We develop a classifier that finds hundreds of real-world lateral phishing emails, while generating under four false positives per every one-million employee-sent emails. Drawing on the attacks we detect, as well as a corpus of user-reported incidents, we quantify the scale of lateral phishing, identify several thematic content and recipient targeting strategies that attackers follow, illuminate two types of sophisticated behaviors that attackers exhibit, and estimate the success rate of these attacks. Collectively, these results expand our mental models of the 'enterprise attacker' and shed light on the current state of enterprise phishing attacks

    Directional effects due to quantum statistics in dissociation of elongated molecular condensates

    Get PDF
    Ultracold clouds of dimeric molecules can dissociate into quantum mechanically correlated constituent atoms that are either both bosons or both fermions. We theoretically model the dissociation of two-dimensional anisotropic molecular condensates for which this difference manifests as complementary geometric structures of the dissociated atoms. Atomic bosons are preferentially emitted along the long axis of the molecular condensate, while atomic fermions are preferentially emitted along the short axis. This anisotropy potentially simplifies the measurement of correlations between the atoms through relative number squeezing
    corecore