2,700 research outputs found
Torsion-induced persistent current in a twisted quantum ring
We describe the effects of geometric torsion on the coherent motion of
electrons along a thin twisted quantum ring. The geometric torsion inherent in
the quantum ring triggers a quantum phase shift in the electrons' eigenstates,
thereby resulting in a torsion-induced persistent current that flows along the
twisted quantum ring. The physical conditions required for detecting the
current flow are discussed.Comment: 9 pages, 3 figure
On Einstein-Hilbert type action of superon-graviton model(SGM)
The fundamental action of superon-graviton model(SGM) of Einstein-Hilbert
type for space-time and matter is written down explicitly in terms of the
fields of the graviton and superons by using the affine connection formalism
and the spin connection formalism. Some characteristic structures including
some hidden symmetries of the gravitational coupling of superons are manifested
(in two dimensional space-time) with some details of the calculations. SGM
cosmology is discussed briefly.Comment: 20 pages, Latex, some more discussions and new references adde
The Effective Use of Reserve Personnel in the U.S. Military: Lessons from the United Kingdom Reserve Model
View the Executive SummaryThis monograph identifies areas where the U.S. Army and other services can potentially benefit from examining the United Kingdom\u27s comparable program of reserve reform. Key areas where aspects of this reform have been entirely counterproductive are identified, as well as specific and expensive recent British mistakes which it is essential for the U.S. military to avoid.https://press.armywarcollege.edu/monographs/1469/thumbnail.jp
Operationalizing Counter Threat Finance Strategies
View the Executive SummaryThis Letort Paper describes effective Counter Threat Finance strategies as a specific area where the capability of U.S. and allied militaries can be augmented for the purpose of targeted action against adversaries. With appropriate analysis and exploitation, financial data can be used to reveal patterns of enemy behavior, motivations, and possible intentions as well as lifestyles and networks, all of which will impact directly upon military operations within a counterinsurgency environment. The targeting of the financial, and perhaps more importantly, the economic base of an organization, will not only impact the operational capability of that organization, but can ultimately lead to its destruction. To date, these strategies have been used predominantly for the purpose of disruption. However, the potential application of such strategies goes far beyond—they have the potential to be a multifaceted weapon, capable not only of disruption of the enemy, but of detecting impending instability. Specific recommendations are proposed for making best use of the potential for financial intelligence as part of an integrated strategy for both forecasting and countering contemporary security threats.https://press.armywarcollege.edu/monographs/1311/thumbnail.jp
Functional Organization of Visual Cortex in the Owl Monkey
In this study, we compared the organization of orientation preference in visual areas V1, V2, and V3. Within these visual areas, we also
quantified the relationship between orientation preference and cytochrome oxidase (CO) staining patterns. V1 maps of orientation
preference contained both pinwheels and linear zones. The location of CO blobs did not relate in a systematic way to maps of orientation;
although, as in other primates, there were approximately twice as many pinwheels as CO blobs. V2 contained bands of high and low
orientation selectivity. The bands of high orientation selectivity were organized into pinwheels and linear zones, but iso-orientation
domains were twice as large as those in V1. Quantitative comparisons between bands containing high or low orientation selectivity and
CO dark and light bands suggested that at least four functional compartments exist in V2, CO dense bands with either high or low
orientation selectivity, and CO light bands with either high or low selectivity. We also demonstrated that two functional compartments
exist in V3, with zones of high orientation selectivity corresponding to CO dense areas and zones of low orientation selectivity corresponding
to CO pale areas. Together with previous findings, these results suggest that the modular organization of V1 is similar across
primates and indeed across most mammals. V2 organization in owl monkeys also appears similar to that of other simians but different
from that of prosimians and other mammals. Finally, V3 of owl monkeys shows a compartmental organization for orientation selectivity
that remains to be demonstrated in other primates
Lethal and Legal? The Ethics of Drone Strikes
While supporters claim that drone warfare is not only legal but ethical and wise, others have suggested that drones are prohibited weapons under International Humanitarian Law (IHL) because they cause, or have the effect of causing, indiscriminate killings of civilians, such as those in the vicinity of a targeted person. The main legal justification made by the Barack Obama Administration for the use of armed drones is self-defense. However, there is ambiguity as to whether this argument can justify a number of recent attacks by the United States. In order to determine the legality of armed drone strikes, other factors such as sovereignty, proportionality, the legitimacy of individual targets, and the methods used for the selection of targets must also be considered. One justification for the ethical landscape is the reduced amount of collateral damage relative to other forms of strike. Real time eyes on target allow last-minute decisions and monitoring for unintended victims, and precise tracking of the target through multiple systems allows further refinements of proportionality. However, this is of little benefit if the definition of “targets” is itself flawed and encompasses noncombatants and unconnected civilians. This monograph provides a number of specific recommendations intended to ensure that the benefits of drone warfare are weighed against medium- and long-term second order effects in order to measure whether targeted killings are serving their intended purpose of countering terrorism rather than encouraging and fueling it.https://press.armywarcollege.edu/monographs/1428/thumbnail.jp
Exit Strategy: Rule of Law and the U.S. Army
Establishing the rule of law is a key goal and end state in counterinsurgency (COIN) operations and is a critical aspect of securing peace and preventing future conflict. However, recent experience in theaters such as Afghanistan has shown that establishing effective rule of law institutions and practices is not a straightforward task. Consequently, considerations as to how and when rule of law institutions can start to be developed and integrated into the stability transition process must not only be planned in advance, but also form part of the U.S. Army’s strategy from the start of any military intervention. The analysis provided in this monograph will assist the U.S. Army, and more broadly the Departments of Defense and State, in better facilitating a seamless rebalancing from military to police functions in post-conflict environments, and to ensure that sustainable and effective rule of law interventions are delivered as part of an exit strategy.https://press.armywarcollege.edu/monographs/1392/thumbnail.jp
Silent Partners: Organized Crime, Irregular Groups, and Nation-States
The U.S. Army increasingly faces adversaries that are difficult to define. The threat landscape is further complicated by the silent partnership between criminal organizations, irregular groups, and nation-states. This collaboration, whatever its exact nature, is problematic, because it confounds understanding of the adversary, making existing countermeasures less effective, and thus directly challenging U.S. national security interests. Military action taken without full appreciation of the dynamics of the nature of these relationships is likely to be ineffective at best or suffer unintended consequences. This monograph provides a comprehensive assessment of the threat to U.S. national security interests posed by the silent partners, as well as how the vulnerabilities of the relationships could be exploited to the advantage of the U.S. Army.https://press.armywarcollege.edu/monographs/1388/thumbnail.jp
Extremist Migration: A Foreign Jihadist Fighter Threat Assessment
This monograph provides an assessment of the emerging threat posed by foreign jihadist fighters following the reduction in territory controlled by the Islamic State of Iraq and Syria (ISIS) and recommends ways that the U.S. Army should address the issues highlighted.https://press.armywarcollege.edu/monographs/1374/thumbnail.jp
Anomalous phase shift in a twisted quantum loop
Coherent motion of electrons in a twisted quantum ring is considered to
explore the effect of torsion inherent to the ring. Internal torsion of the
ring composed of helical atomic configuration yields a non-trivial quantum
phase shift in the electrons' eigenstates. This torsion-induced phase shift
causes novel kinds of persistent current flow and an Aharonov-Bohm like
conductance oscillation. The two phenomena can occur even when no magnetic flux
penetrates inside the twisted ring, thus being in complete contrast with the
counterparts observed in untwisted rings.Comment: 13 paes, 5 figure
- …