9,513 research outputs found
Response of electrostatic probes to ionized gas flows in a shock tube
In his excellent analysis of electrical measurements in shock tube flows, Hollyer(1) has demonstrated certain pitfalls in the application of conventional Langmuir probe techniques to the evaluation of charge densities in the moving stream of hot gas confined within the tube walls. The purpose of this note is to describe somewhat similar experiments which illustrate other eccentricities in probe behavior under these conditions
Wedge Local Deformations of Charged Fields leading to Anyonic Commutation Relations
The method of deforming free fields by using multiplication operators on Fock
space, introduced by G. Lechner in [11], is generalized to a charged free field
on two- and three-dimensional Minkowski space. In this case the deformation
function can be chosen in such a way that the deformed fields satisfy
generalized commutation relations, i.e. they behave like Anyons instead of
Bosons. The fields are "polarization free" in the sense that they create only
one-particle states from the vacuum and they are localized in wedges (or "paths
of wedges"), which makes it possible to circumvent a No-Go theorem by J. Mund
[12], stating that there are no free Anyons localized in spacelike cones. The
two-particle scattering matrix, however, can be defined and is different from
unity
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
In this paper, we present a black-box attack against API call based machine
learning malware classifiers, focusing on generating adversarial sequences
combining API calls and static features (e.g., printable strings) that will be
misclassified by the classifier without affecting the malware functionality. We
show that this attack is effective against many classifiers due to the
transferability principle between RNN variants, feed forward DNNs, and
traditional machine learning classifiers such as SVM. We also implement GADGET,
a software framework to convert any malware binary to a binary undetected by
malware classifiers, using the proposed attack, without access to the malware
source code.Comment: Accepted as a conference paper at RAID 201
Electron-Phonon Interaction in Embedded Semiconductor Nanostructures
The modification of acoustic phonons in semiconductor nanostructures embedded
in a host crystal is investigated including corrections due to strain within
continuum elasticity theory. Effective elastic constants are calculated
employing {\em ab initio} density functional theory. For a spherical InAs
quantum dot embedded in GaAs barrier material, the electron-phonon coupling is
calculated. Its strength is shown to be suppressed compared to the assumption
of bulk phonons
Geometry of the Grosse-Wulkenhaar Model
We define a two-dimensional noncommutative space as a limit of finite-matrix
spaces which have space-time dimension three. We show that on such space the
Grosse-Wulkenhaar (renormalizable) action has natural interpretation as the
action for the scalar field coupled to the curvature. We also discuss a natural
generalization to four dimensions.Comment: 16 pages, version accepted in JHE
J-Class Abelian Semigroups of Matrices on C^n and Hypercyclicity
We give a characterization of hypercyclic finitely generated abelian
semigroups of matrices on C^n using the extended limit sets (the J-sets).
Moreover we construct for any n\geq 2 an abelian semigroup G of GL(n;C)
generated by n + 1 diagonal matrices which is locally hypercyclic but not
hypercyclic and such that JG(e_k) = C^n for every k = 1; : : : ; n, where (e_1;
: : : ; e_n) is the canonical basis of C^n. This gives a negative answer to a
question raised by Costakis and Manoussos.Comment: 10 page
On Batalin-Vilkovisky Formalism of Non-Commutative Field Theories
We apply the BV formalism to non-commutative field theories, introduce BRST
symmetry, and gauge-fix the models. Interestingly, we find that treating the
full gauge symmetry in non-commutative models can lead to reducible gauge
algebras. As one example we apply the formalism to the Connes-Lott two-point
model. Finally, we offer a derivation of a superversion of the
Harish-Chandra-Itzykson-Zuber integral.Comment: 20 pages, LaTeX. v2: minor corrections. v3: Added an Appendix about
Harish-Chandra-Itzykson-Zuber integrals. v4: Added Reference
- …