2,633 research outputs found

    Torsion-induced persistent current in a twisted quantum ring

    Get PDF
    We describe the effects of geometric torsion on the coherent motion of electrons along a thin twisted quantum ring. The geometric torsion inherent in the quantum ring triggers a quantum phase shift in the electrons' eigenstates, thereby resulting in a torsion-induced persistent current that flows along the twisted quantum ring. The physical conditions required for detecting the current flow are discussed.Comment: 9 pages, 3 figure

    On Einstein-Hilbert type action of superon-graviton model(SGM)

    Get PDF
    The fundamental action of superon-graviton model(SGM) of Einstein-Hilbert type for space-time and matter is written down explicitly in terms of the fields of the graviton and superons by using the affine connection formalism and the spin connection formalism. Some characteristic structures including some hidden symmetries of the gravitational coupling of superons are manifested (in two dimensional space-time) with some details of the calculations. SGM cosmology is discussed briefly.Comment: 20 pages, Latex, some more discussions and new references adde

    Functional Organization of Visual Cortex in the Owl Monkey

    Get PDF
    In this study, we compared the organization of orientation preference in visual areas V1, V2, and V3. Within these visual areas, we also quantified the relationship between orientation preference and cytochrome oxidase (CO) staining patterns. V1 maps of orientation preference contained both pinwheels and linear zones. The location of CO blobs did not relate in a systematic way to maps of orientation; although, as in other primates, there were approximately twice as many pinwheels as CO blobs. V2 contained bands of high and low orientation selectivity. The bands of high orientation selectivity were organized into pinwheels and linear zones, but iso-orientation domains were twice as large as those in V1. Quantitative comparisons between bands containing high or low orientation selectivity and CO dark and light bands suggested that at least four functional compartments exist in V2, CO dense bands with either high or low orientation selectivity, and CO light bands with either high or low selectivity. We also demonstrated that two functional compartments exist in V3, with zones of high orientation selectivity corresponding to CO dense areas and zones of low orientation selectivity corresponding to CO pale areas. Together with previous findings, these results suggest that the modular organization of V1 is similar across primates and indeed across most mammals. V2 organization in owl monkeys also appears similar to that of other simians but different from that of prosimians and other mammals. Finally, V3 of owl monkeys shows a compartmental organization for orientation selectivity that remains to be demonstrated in other primates

    Operationalizing Counter Threat Finance Strategies

    Get PDF
    View the Executive SummaryThis Letort Paper describes effective Counter Threat Finance strategies as a specific area where the capability of U.S. and allied militaries can be augmented for the purpose of targeted action against adversaries. With appropriate analysis and exploitation, financial data can be used to reveal patterns of enemy behavior, motivations, and possible intentions as well as lifestyles and networks, all of which will impact directly upon military operations within a counterinsurgency environment. The targeting of the financial, and perhaps more importantly, the economic base of an organization, will not only impact the operational capability of that organization, but can ultimately lead to its destruction. To date, these strategies have been used predominantly for the purpose of disruption. However, the potential application of such strategies goes far beyond—they have the potential to be a multifaceted weapon, capable not only of disruption of the enemy, but of detecting impending instability. Specific recommendations are proposed for making best use of the potential for financial intelligence as part of an integrated strategy for both forecasting and countering contemporary security threats.https://press.armywarcollege.edu/monographs/1311/thumbnail.jp

    The Effective Use of Reserve Personnel in the U.S. Military: Lessons from the United Kingdom Reserve Model

    Get PDF
    View the Executive SummaryThis monograph identifies areas where the U.S. Army and other services can potentially benefit from examining the United Kingdom\u27s comparable program of reserve reform. Key areas where aspects of this reform have been entirely counterproductive are identified, as well as specific and expensive recent British mistakes which it is essential for the U.S. military to avoid.https://press.armywarcollege.edu/monographs/1469/thumbnail.jp

    Exit Strategy: Rule of Law and the U.S. Army

    Get PDF
    Establishing the rule of law is a key goal and end state in counterinsurgency (COIN) operations and is a critical aspect of securing peace and preventing future conflict. However, recent experience in theaters such as Afghanistan has shown that establishing effective rule of law institutions and practices is not a straightforward task. Consequently, considerations as to how and when rule of law institutions can start to be developed and integrated into the stability transition process must not only be planned in advance, but also form part of the U.S. Army’s strategy from the start of any military intervention. The analysis provided in this monograph will assist the U.S. Army, and more broadly the Departments of Defense and State, in better facilitating a seamless rebalancing from military to police functions in post-conflict environments, and to ensure that sustainable and effective rule of law interventions are delivered as part of an exit strategy.https://press.armywarcollege.edu/monographs/1392/thumbnail.jp

    Lethal and Legal? The Ethics of Drone Strikes

    Get PDF
    While supporters claim that drone warfare is not only legal but ethical and wise, others have suggested that drones are prohibited weapons under International Humanitarian Law (IHL) because they cause, or have the effect of causing, indiscriminate killings of civilians, such as those in the vicinity of a targeted person. The main legal justification made by the Barack Obama Administration for the use of armed drones is self-defense. However, there is ambiguity as to whether this argument can justify a number of recent attacks by the United States. In order to determine the legality of armed drone strikes, other factors such as sovereignty, proportionality, the legitimacy of individual targets, and the methods used for the selection of targets must also be considered. One justification for the ethical landscape is the reduced amount of collateral damage relative to other forms of strike. Real time eyes on target allow last-minute decisions and monitoring for unintended victims, and precise tracking of the target through multiple systems allows further refinements of proportionality. However, this is of little benefit if the definition of “targets” is itself flawed and encompasses noncombatants and unconnected civilians. This monograph provides a number of specific recommendations intended to ensure that the benefits of drone warfare are weighed against medium- and long-term second order effects in order to measure whether targeted killings are serving their intended purpose of countering terrorism rather than encouraging and fueling it.https://press.armywarcollege.edu/monographs/1428/thumbnail.jp

    Silent Partners: Organized Crime, Irregular Groups, and Nation-States

    Get PDF
    The U.S. Army increasingly faces adversaries that are difficult to define. The threat landscape is further complicated by the silent partnership between criminal organizations, irregular groups, and nation-states. This collaboration, whatever its exact nature, is problematic, because it confounds understanding of the adversary, making existing countermeasures less effective, and thus directly challenging U.S. national security interests. Military action taken without full appreciation of the dynamics of the nature of these relationships is likely to be ineffective at best or suffer unintended consequences. This monograph provides a comprehensive assessment of the threat to U.S. national security interests posed by the silent partners, as well as how the vulnerabilities of the relationships could be exploited to the advantage of the U.S. Army.https://press.armywarcollege.edu/monographs/1388/thumbnail.jp

    Extremist Migration: A Foreign Jihadist Fighter Threat Assessment

    Get PDF
    This monograph provides an assessment of the emerging threat posed by foreign jihadist fighters following the reduction in territory controlled by the Islamic State of Iraq and Syria (ISIS) and recommends ways that the U.S. Army should address the issues highlighted.https://press.armywarcollege.edu/monographs/1374/thumbnail.jp

    Anomalous phase shift in a twisted quantum loop

    Full text link
    Coherent motion of electrons in a twisted quantum ring is considered to explore the effect of torsion inherent to the ring. Internal torsion of the ring composed of helical atomic configuration yields a non-trivial quantum phase shift in the electrons' eigenstates. This torsion-induced phase shift causes novel kinds of persistent current flow and an Aharonov-Bohm like conductance oscillation. The two phenomena can occur even when no magnetic flux penetrates inside the twisted ring, thus being in complete contrast with the counterparts observed in untwisted rings.Comment: 13 paes, 5 figure
    corecore