114,574 research outputs found

    Effects of Ru Substitution on Dimensionality and Electron Correlations in Ba(Fe_{1-x}Ru_x)_2As_2

    Full text link
    We report a systematic angle-resolved photoemission spectroscopy study on Ba(Fe1−x_{1-x}Rux_x)2_2As2_2 for a wide range of Ru concentrations (0.15 ≤\leq \emph{x} ≤\leq 0.74). We observed a crossover from two-dimension to three-dimension for some of the hole-like Fermi surfaces with Ru substitution and a large reduction in the mass renormalization close to optimal doping. These results suggest that isovalent Ru substitution has remarkable effects on the low-energy electron excitations, which are important for the evolution of superconductivity and antiferromagnetism in this system.Comment: 4 pages, 4 figure

    Ground states of one and two fractional vortices in long Josephson 0-kappa-junctions

    Full text link
    Half integer Josephson vortices in 0-π\pi-junctions, discussed theoretically and observed experimentally, spontaneously appear at the point where the Josephson phase is π\pi-discontinuous. The creation of \emph{arbitrary} discontinuities of the Josephson phase has been demonstrated recently. Here we study fractional vortices formed at an arbitrary κ\kappa-discontinuity, discuss their stability and possible ground states. The two stable states are not mirror symmetric. Furthermore, the possible ground states formed at two κ\kappa-discontinuities separated by a distance aa are investigated, and the energy and the regions of stability of each ground state are calculated. We also show that the ground states may strongly depend on the distance aa between the discontinuities. There is a crossover distance aca_c such that for aacaa_c the ground states may be qualitatively different.Comment: 7 figures, submitted to PRB In v.2 one figure is added, and refs are updated In v.3 major revision, many issues fixe

    On Security and Sparsity of Linear Classifiers for Adversarial Settings

    Full text link
    Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such settings, they have been shown to be vulnerable to adversarial attacks, including the deliberate manipulation of data at test time to evade detection. In this work, we focus on the vulnerability of linear classifiers to evasion attacks. This can be considered a relevant problem, as linear classifiers have been increasingly used in embedded systems and mobile devices for their low processing time and memory requirements. We exploit recent findings in robust optimization to investigate the link between regularization and security of linear classifiers, depending on the type of attack. We also analyze the relationship between the sparsity of feature weights, which is desirable for reducing processing cost, and the security of linear classifiers. We further propose a novel octagonal regularizer that allows us to achieve a proper trade-off between them. Finally, we empirically show how this regularizer can improve classifier security and sparsity in real-world application examples including spam and malware detection
    • …
    corecore