360 research outputs found
Field theoretic approach to the counting problem of Hamiltonian cycles of graphs
A Hamiltonian cycle of a graph is a closed path that visits each site once
and only once. I study a field theoretic representation for the number of
Hamiltonian cycles for arbitrary graphs. By integrating out quadratic
fluctuations around the saddle point, one obtains an estimate for the number
which reflects characteristics of graphs well. The accuracy of the estimate is
verified by applying it to 2d square lattices with various boundary conditions.
This is the first example of extracting meaningful information from the
quadratic approximation to the field theory representation.Comment: 5 pages, 3 figures, uses epsf.sty. Estimates for the site entropy and
the gamma exponent indicated explicitl
Some Controversial Opinions on Software-Defined Data Plane Services
Several recent proposals, namely Software Defined Networks (SDN), Network Functions Virtualization (NFV) and Network Service Chaining (NSC), aim to transform the network into a programmable platform, focusing respectively on the control plane (SDN) and on the data plane (NFV/NSC). This paper sits on the same line of the NFV/NSC proposals but with a more long-term horizon, and it presents its considerations on some controversial aspects that arise when considering the programmability of the data plane. Particularly, this paper discusses the relevance of data plane vs control plane services, the importance of the hardware platform, and the necessity to standardize northbound and southbound interfaces in future software-defined data plane service
The effects of the pre-pulse on capillary discharge extreme ultraviolet laser
In the past few years collisionally pumped extreme ultraviolet (XUV) lasers
utilizing a capillary discharge were demonstrated. An intense current pulse is
applied to a gas filled capillary, inducing magnetic collapse (Z-pinch) and
formation of a highly ionized plasma column. Usually, a small current pulse
(pre-pulse) is applied to the gas in order to pre-ionize it prior to the onset
of the main current pulse. In this paper we investigate the effects of the
pre-pulse on a capillary discharge Ne-like Ar XUV laser (46.9nm). The
importance of the pre-pulse in achieving suitable initial conditions of the gas
column and preventing instabilities during the collapse is demonstrated.
Furthermore, measurements of the amplified spontaneous emission (ASE)
properties (intensity, duration) in different pre-pulse currents revealed
unexpected sensitivity. Increasing the pre-pulse current by a factor of two
caused the ASE intensity to decrease by an order of magnitude - and to nearly
disappear. This effect is accompanied by a slight increase in the lasing
duration. We attribute this effect to axial flow in the gas during the
pre-pulse.Comment: 4 pages, 4 figure
The Effect of Neutral Atoms on Capillary Discharge Z-pinch
We study the effect of neutral atoms on the dynamics of a capillary discharge
Z-pinch, in a regime for which a large soft-x-ray amplification has been
demonstrated. We extended the commonly used one-fluid magneto-hydrodynamics
(MHD) model by separating out the neutral atoms as a second fluid. Numerical
calculations using this extended model yield new predictions for the dynamics
of the pinch collapse, and better agreement with known measured data.Comment: 4 pages, 4 postscript figures, to be published in Phys. Rev. Let
Offloading personal security applications to a secure and trusted network node
The current device-centric protection model against security threats has serious limitations from the final user
perspective, among the other the necessity to keep each device updated with the latest security updates and the necessity to replicate all the security polices across all devices. In our model, the protection is decoupled from the users terminals and it is provided through a Trusted Virtual Domain (TVD) instantiated in future edge routers. Each TVD provides unified and homogeneous security for a single user, irrespective of the terminal employed. This paper shows a first prototype implementing this concept through a network element, called Network Edge Device, capable of running the proposed virtualized architecture and making extensive use of SDN technologies, with the aim at providing a uniform security level for the final user
A new picture of the Lifshitz critical behavior
New field theoretic renormalization group methods are developed to describe
in a unified fashion the critical exponents of an m-fold Lifshitz point at the
two-loop order in the anisotropic (m not equal to d) and isotropic (m=d close
to 8) situations. The general theory is illustrated for the N-vector phi^4
model describing a d-dimensional system. A new regularization and
renormalization procedure is presented for both types of Lifshitz behavior. The
anisotropic cases are formulated with two independent renormalization group
transformations. The description of the isotropic behavior requires only one
type of renormalization group transformation. We point out the conceptual
advantages implicit in this picture and show how this framework is related to
other previous renormalization group treatments for the Lifshitz problem. The
Feynman diagrams of arbitrary loop-order can be performed analytically provided
these integrals are considered to be homogeneous functions of the external
momenta scales. The anisotropic universality class (N,d,m) reduces easily to
the Ising-like (N,d) when m=0. We show that the isotropic universality class
(N,m) when m is close to 8 cannot be obtained from the anisotropic one in the
limit d --> m near 8. The exponents for the uniaxial case d=3, N=m=1 are in
good agreement with recent Monte Carlo simulations for the ANNNI model.Comment: 48 pages, no figures, two typos fixe
- …