901 research outputs found

    Direct Observation of Nonequivalent Fermi-Arc States of Opposite Surfaces in Noncentrosymmetric Weyl Semimetal NbP

    Full text link
    We have performed high-resolution angle-resolved photoemission spectroscopy (ARPES) on noncentrosymmetric Weyl semimetal candidate NbP, and determined the electronic states of both Nb- and P-terminated surfaces corresponding to the "opposite" surfaces of a polar crystal. We revealed a drastic difference in the Fermi-surface topology between the opposite surfaces, whereas the Fermi arcs on both surfaces are likely terminated at the surface projection of the same bulk Weyl nodes. Comparison of the ARPES data with our first-principles band calculations suggests notable difference in electronic structure at the Nb-terminated surface between theory and experiment. The present result opens a platform for realizing exotic quantum phenomena arising from unusual surface properties of Weyl semimetals.Comment: 5 pages, 4 figure

    Revealing puddles of electrons and holes in compensated topological insulators

    Full text link
    Three-dimensional topological insulators harbour metallic surface states with exotic properties. In transport or optics, these properties are typically masked by defect-induced bulk carriers. Compensation of donors and acceptors reduces the carrier density, but the bulk resistivity remains disappointingly small. We show that measurements of the optical conductivity in BiSbTeSe2_2 pinpoint the presence of electron-hole puddles in the bulk at low temperatures, which is essential for understanding DC bulk transport. The puddles arise from large fluctuations of the Coulomb potential of donors and acceptors, even in the case of full compensation. Surprisingly, the number of carriers appearing within puddles drops rapidly with increasing temperature and almost vanishes around 40 K. Monte Carlo simulations show that a highly non-linear screening effect arising from thermally activated carriers destroys the puddles at a temperature scale set by the Coulomb interaction between neighbouring dopants, explaining the experimental observation semi-quantitatively. This mechanism remains valid if donors and acceptors do not compensate perfectly.Comment: 11 pages with 7 figures plus supplemental material (3 pages

    Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck

    Full text link
    The practice of code reuse is crucial in software development for a faster and more efficient development lifecycle. In reality, however, code reuse practices lack proper control, resulting in issues such as vulnerability propagation and intellectual property infringements. Assembly clone search, a critical shift-right defence mechanism, has been effective in identifying vulnerable code resulting from reuse in released executables. Recent studies on assembly clone search demonstrate a trend towards using machine learning-based methods to match assembly code variants produced by different toolchains. However, these methods are limited to what they learn from a small number of toolchain variants used in training, rendering them inapplicable to unseen architectures and their corresponding compilation toolchain variants. This paper presents the first study on the problem of assembly clone search with unseen architectures and libraries. We propose incorporating human common knowledge through large-scale pre-trained natural language models, in the form of transfer learning, into current learning-based approaches for assembly clone search. Transfer learning can aid in addressing the limitations of the existing approaches, as it can bring in broader knowledge from human experts in assembly code. We further address the sequence limit issue by proposing a reinforcement learning agent to remove unnecessary and redundant tokens. Coupled with a new Variational Information Bottleneck learning strategy, the proposed system minimizes the reliance on potential indicators of architectures and optimization settings, for a better generalization of unseen architectures. We simulate the unseen architecture clone search scenarios and the experimental results show the effectiveness of the proposed approach against the state-of-the-art solutions.Comment: 13 pages and 4 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Tensile behaviour of pitting corroded steel bars:Laboratory investigation and probabilistic-based analysis

    Get PDF
    Localised corrosion in steel bars has been a long-standing issue in the durability of reinforced concrete structures, but a comprehensive scheme for the analysis of pitting corroded steel bars, especially with respect to the deformation capacity, is not currently available. In this study, the morphological characteristics of 27 pitting steel bars were captured using a 3D scanner. The measured data were used to establish the probability distribution model of the cross-sectional areas of the corroded bars. Uniaxial tensile tests were conducted, and the evolving deformation field of the corroded bars was recorded through Digital Image Correlation (DIC). Based on the 3D reconstructed model and DIC results, an analytical method for evaluating the mechanical properties of pitting steel bars was developed and validated. The results show that the two-component Gaussian mixture distribution model outperforms conventional unimodal distribution models. Comparison of the analytical results with experimental data demonstrates that the proposed procedure is capable of predicting not only the ultimate strength but also the gauge length-dependent ultimate strain of corroded bars. Additionally, there exists a strengthening effect in the ultimate stress at the critical sections and this effect should not be ignored for accurate predictions.</p

    Binomial coefficients, Catalan numbers and Lucas quotients

    Full text link
    Let pp be an odd prime and let a,ma,m be integers with a>0a>0 and m≢0(modp)m \not\equiv0\pmod p. In this paper we determine ∑k=0pa−1(2kk+d)/mk\sum_{k=0}^{p^a-1}\binom{2k}{k+d}/m^k mod p2p^2 for d=0,1d=0,1; for example, ∑k=0pa−1(2kk)mk≡(m2−4mpa)+(m2−4mpa−1)up−(m2−4mp)(modp2),\sum_{k=0}^{p^a-1}\frac{\binom{2k}k}{m^k}\equiv\left(\frac{m^2-4m}{p^a}\right)+\left(\frac{m^2-4m}{p^{a-1}}\right)u_{p-(\frac{m^2-4m}{p})}\pmod{p^2}, where (−)(-) is the Jacobi symbol, and {un}n⩾0\{u_n\}_{n\geqslant0} is the Lucas sequence given by u0=0u_0=0, u1=1u_1=1 and un+1=(m−2)un−un−1u_{n+1}=(m-2)u_n-u_{n-1} for n=1,2,3,…n=1,2,3,\ldots. As an application, we determine ∑0<k<pa, k≡r(modp−1)Ck\sum_{0<k<p^a,\, k\equiv r\pmod{p-1}}C_k modulo p2p^2 for any integer rr, where CkC_k denotes the Catalan number (2kk)/(k+1)\binom{2k}k/(k+1). We also pose some related conjectures.Comment: 24 pages. Correct few typo
    • …
    corecore