228 research outputs found

    Transport spectroscopy of disordered graphene quantum dots etched into a single graphene flake

    Full text link
    We present transport measurements on quantum dots of sizes 45, 60 and 80 nm etched with an Ar/O2-plasma into a single graphene sheet, allowing a size comparison avoiding effects from different graphene flakes. The transport gaps and addition energies increase with decreasing dot size, as expected, and display a strong correlation, suggesting the same physical origin for both, i.e. disorder-induced localization in presence of a small confinement gap. Gate capacitance measurements indicate that the dot charges are located in the narrow device region as intended. A dominant role of disorder is further substantiated by the gate dependence and the magnetic field behavior, allowing only approximate identification of the electron-hole crossover and spin filling sequences. Finally, we extract a g-factor consistent with g=2 within the error bars.Comment: 5 pages, 4 (color) figure

    Finite time St\"uckelberg interferometry with nanomechanical modes

    Full text link
    St\"uckelberg interferometry describes the interference of two strongly coupled modes during a double passage through an avoided energy level crossing. In this work, we experimentally investigate finite time effects in St\"uckelberg interference and provide an exact analytical solution of the St\"uckelberg problem. Approximating this solution in distinct limits reveals uncharted parameter regimes of St\"uckelberg interferometry. Experimentally, we study these regimes using a purely classical, strongly coupled nanomechanical two-mode system of high quality factor. The classical two-mode system consists of the in-plane and out-of-plane fundamental flexural mode of a high stress silicon nitride string resonator, coupled via electric gradient fields. The dielectric control and microwave cavity enhanced universal transduction of the nanoelectromechanical system allows for the experimental access to all theoretically predicted St\"uckelberg parameter regimes. We exploit our experimental and theoretical findings by studying the onset of St\"uckelberg interference in dependence of the characteristic system control parameters and obtain characteristic excitation oscillations between the two modes even without the explicit need of traversing the avoided crossing. The presented theory is not limited to classical mechanical two-mode systems but can be applied to every strongly coupled (quantum) two-level system, for example a spin-1/2 system or superconducting qubit

    TarTar: A Timed Automata Repair Tool

    Full text link
    We present TarTar, an automatic repair analysis tool that, given a timed diagnostic trace (TDT) obtained during the model checking of a timed automaton model, suggests possible syntactic repairs of the analyzed model. The suggested repairs include modified values for clock bounds in location invariants and transition guards, adding or removing clock resets, etc. The proposed repairs are guaranteed to eliminate executability of the given TDT, while preserving the overall functional behavior of the system. We give insights into the design and architecture of TarTar, and show that it can successfully repair 69% of the seeded errors in system models taken from a diverse suite of case studies.Comment: 15 pages, 7 figure

    Breakdown of the Korringa Law of Nuclear Spin Relaxation in Metallic GaAs

    Full text link
    We present nuclear spin relaxation measurements in GaAs epilayers using a new pump-probe technique in all-electrical, lateral spin-valve devices. The measured T1 times agree very well with NMR data available for T > 1 K. However, the nuclear spin relaxation rate clearly deviates from the well-established Korringa law expected in metallic samples and follows a sub-linear temperature dependence 1/T1 ~ T^0.6 for 0.1 K < T < 10 K. Further, we investigate nuclear spin inhomogeneities.Comment: 5 pages, 4 (color) figures. arXiv admin note: text overlap with arXiv:1109.633

    Intensive grazing leads to degradation and spatial homogenization of topsoils in two major steppetypes in Inner Mongolia , P .R . China

    Get PDF
    Introduction Intensive land use and especially overgrazing in semi‐arid grasslands results in degradation of steppe vegetation associated with changes in the amount ,composition ,and turnover of soil organic matter (SOM) . The concurrent degradation of soil structure and destruction of aggregation leads to enhanced soil erosion .The effectof intensive grazing on the amount and composition of SOM was assessed by comparison of grazed and ungrazed plots in Leymus chinensis and Stipa grandis dominated steppe types in Inner Mongolia ,Chin

    Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

    Get PDF
    Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs. However, various applications exist where the performance on short (fixed length) inputs matters more. Such hash functions are the bottleneck in hash-based signature schemes like SPHINCS or XMSS, which is currently under standardization. Secure functions specifically designed for such applications are scarce. We attend to this gap by proposing two short-input hash functions (or rather simply compression functions). By utilizing AES instructions on modern CPUs, our proposals are the fastest on such platforms, reaching throughputs below one cycle per hashed byte even for short inputs, while still having a very low latency of less than 60 cycles. Under the hood, this results comes with several innovations. First, we study whether the number of rounds for our hash functions can be reduced, if only second-preimage resistance (and not collision resistance) is required. The conclusion is: only a little. Second, since their inception, AES-like designs allow for supportive security arguments by means of counting and bounding the number of active S-boxes. However, this ignores powerful attack vectors using truncated differentials, including the powerful rebound attacks. We develop a general tool-based method to include arguments against attack vectors using truncated differentials
    corecore