27,998 research outputs found

    Proposal for non-local electron-hole turnstile in the Quantum Hall regime

    Full text link
    We present a theory for a mesoscopic turnstile that produces spatially separated streams of electrons and holes along edge states in the quantum Hall regime. For a broad range of frequencies in the non-adiabatic regime the turnstile operation is found to be ideal, producing one electron and one hole per cycle. The accuracy of the turnstile operation is characterized by the fluctuations of the transferred charge per cycle. The fluctuations are found to be negligibly small in the ideal regime.Comment: 4+ pages, 2 figure

    Full three-body problem in effective-field-theory models of gravity

    Full text link
    Recent work in the literature has studied the restricted three-body problem within the framework of effective-field-theory models of gravity. This paper extends such a program by considering the full three-body problem, when the Newtonian potential is replaced by a more general central potential which depends on the mutual separations of the three bodies. The general form of the equations of motion is written down, and they are studied when the interaction potential reduces to the quantum-corrected central potential considered recently in the literature. A recursive algorithm is found for solving the associated variational equations, which describe small departures from given periodic solutions of the equations of motion. Our scheme involves repeated application of a 2 x 2 matrix of first-order linear differential operators.Comment: 23 pages, 1 figure, Revtex4. In the final version, Section VII is much longer, the misprints have been amended, and new References have been include

    Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

    Get PDF
    Learning-based pattern classifiers, including deep networks, have shown impressive performance in several application domains, ranging from computer vision to cybersecurity. However, it has also been shown that adversarial input perturbations carefully crafted either at training or at test time can easily subvert their predictions. The vulnerability of machine learning to such wild patterns (also referred to as adversarial examples), along with the design of suitable countermeasures, have been investigated in the research field of adversarial machine learning. In this work, we provide a thorough overview of the evolution of this research area over the last ten years and beyond, starting from pioneering, earlier work on the security of non-deep learning algorithms up to more recent work aimed to understand the security properties of deep learning algorithms, in the context of computer vision and cybersecurity tasks. We report interesting connections between these apparently-different lines of work, highlighting common misconceptions related to the security evaluation of machine-learning algorithms. We review the main threat models and attacks defined to this end, and discuss the main limitations of current work, along with the corresponding future challenges towards the design of more secure learning algorithms.Comment: Accepted for publication on Pattern Recognition, 201

    Honk if you love book reviews! Looking back at 10 years of book reviews in The Goose

    Get PDF
    This editorial looks back at 10 years of book reviews in The Goose to consider how book reviews have helped to shape the landscape of Canadian ecocriticism. It also looks forward to suggest how book reviews will continue to be an integral part of The Goose

    Aggregate litigation and regulatory innovation: another view of judicial efficiency

    Get PDF
    In this article, we argue that aggregate litigation and the court system can not only restore the protection of victims and the production of deterrence, but also play a pivotal role in stimulating regulatory innovation. This is accomplished through a reward system that seems largely to mimic the institutional devices used in other domains, such as intellectual property rights, by defining a proper set of incentives. Precisely the described solution relies on creating a specific economic framework able to foster economies of scale and grant a valuable property right over a specific litigation to an entrepreneurial individual, who in exchange provides the venture capital needed for the legal action, and produces inputs and focal points for amending regulations. In this light, aggregate litigation thus can be equally seen as an incubator for regulation.aggregate litigation, efficiency, market for risk, hierarchy, regulation, innovation, asbestos

    Charging strategies for electrostatic control of spacecraft formations

    Get PDF
    Formation control by means of electrostatic forces, generating attractive or repulsive actions by charging the satellites’ surfaces, has been recently proposed for high altitude orbits to precisely maintain the configuration without risk of plume impingement. This paper focuses on electrostatic control and switching strategies for charge distribution in spacecraft formations, taking into account the limits on the power requirements. Two nonlinear global control approaches are presented and applied to two and three satellites’ formations. Then, an optimized charge distribution process among the satellites is discussed and applied to the three spacecraft formation case. Numerical simulations are performed in order to evaluate the advantages and drawbacks of this configuration control technique

    The Environmental Humanities in a Post-Truth World

    Get PDF
    Editorial introduction to The Goose Volume 15, Issue 2 (2017)
    • 

    corecore