3,604 research outputs found
Chiral anomaly and anomalous finite-size conductivity in graphene
Graphene is a monolayer of carbon atoms packed into a hexagon lattice to host
two pairs of massless two-dimensional Dirac fermions in the absence of or with
negligible spin-orbit coupling. It is known that the existence of non-zero
electric polarization in reduced momentum space which is associated with a
hidden chiral symmetry will lead to the zero-energy flat band of zigzag
nanoribbon. The Adler-Bell-Jackiw chiral anomaly or non-conservation of chiral
charges at different valleys can be realized in a confined ribbon of finite
width. In the laterally diffusive regime, the finite-size correction to
conductivity is always positive and goes inversely with the square of the
lateral dimension W, which is different from the finite-size correction
inversely with W from boundary modes. This anomalous finite-size conductivity
reveals the signature of the chiral anomaly in graphene, and is measurable
experimentally.Comment: 5 pages, 2 figure
A Compositional Analysis of Unbalanced Usages of Multiple Left-turn Lanes
Lane usage measures distribution of a specific traffic movement across multiple available lanes in a given time. Unbalanced lane usages decrease the capacity of subject segment. This paper took multiple left-turn lanes at signalized intersections as case study, and explored the influences of some factors on the lane usage balance. Lane usages were calculated from field collected lane volumes and the constant-sum constraint among them was explicitly considered in the statistical analysis. Classical and compositional analysis of variance was respectively conducted to identify significant influential factors. By comparing the results of compositional analysis and those of the classical one, the former ones have better interpretability. It was found that left-turn lane usages could be affected by parameter variance of geometric design or traffic control, such as length of turning curve, length of upstream segment, length of signal phase or cycle. These factors could make the lane usages achieve relative balance at different factor levels.</p
MAT: A Multi-strength Adversarial Training Method to Mitigate Adversarial Attacks
Some recent works revealed that deep neural networks (DNNs) are vulnerable to
so-called adversarial attacks where input examples are intentionally perturbed
to fool DNNs. In this work, we revisit the DNN training process that includes
adversarial examples into the training dataset so as to improve DNN's
resilience to adversarial attacks, namely, adversarial training. Our
experiments show that different adversarial strengths, i.e., perturbation
levels of adversarial examples, have different working zones to resist the
attack. Based on the observation, we propose a multi-strength adversarial
training method (MAT) that combines the adversarial training examples with
different adversarial strengths to defend adversarial attacks. Two training
structures - mixed MAT and parallel MAT - are developed to facilitate the
tradeoffs between training time and memory occupation. Our results show that
MAT can substantially minimize the accuracy degradation of deep learning
systems to adversarial attacks on MNIST, CIFAR-10, CIFAR-100, and SVHN.Comment: 6 pages, 4 figures, 2 table
Putting Them under Microscope: A Fine-Grained Approach for Detecting Redundant Test Cases in Natural Language
Natural language (NL) documentation is the bridge between software managers
and testers, and NL test cases are prevalent in system-level testing and other
quality assurance activities. Due to reasons such as requirements redundancy,
parallel testing, and tester turnover within long evolving history, there are
inevitably lots of redundant test cases, which significantly increase the cost.
Previous redundancy detection approaches typically treat the textual
descriptions as a whole to compare their similarity and suffer from low
precision. Our observation reveals that a test case can have explicit
test-oriented entities, such as tested function Components, Constraints, etc;
and there are also specific relations between these entities. This inspires us
with a potential opportunity for accurate redundancy detection. In this paper,
we first define five test-oriented entity categories and four associated
relation categories and re-formulate the NL test case redundancy detection
problem as the comparison of detailed testing content guided by the
test-oriented entities and relations. Following that, we propose Tscope, a
fine-grained approach for redundant NL test case detection by dissecting test
cases into atomic test tuple(s) with the entities restricted by associated
relations. To serve as the test case dissection, Tscope designs a context-aware
model for the automatic entity and relation extraction. Evaluation on 3,467
test cases from ten projects shows Tscope could achieve 91.8% precision, 74.8%
recall, and 82.4% F1, significantly outperforming state-of-the-art approaches
and commonly-used classifiers. This new formulation of the NL test case
redundant detection problem can motivate the follow-up studies to further
improve this task and other related tasks involving NL descriptions.Comment: 12 pages, 6 figures, to be published in ESEC/FSE 2
Information-carrying Hawking radiation and the number of microstate for a black hole
AbstractWe present a necessary and sufficient condition to falsify whether a Hawking radiation spectrum indicates unitary emission process or not from the perspective of information theory. With this condition, we show the precise values of BekensteinâHawking entropies for Schwarzschild black holes and ReissnerâNordström black holes can be calculated by counting the microstates of their Hawking radiations. In particular, for the extremal ReissnerâNordström black hole, its number of microstate and the corresponding entropy we obtain are found to be consistent with the string theory results. Our finding helps to refute the dispute about the BekensteinâHawking entropy of extremal black holes in the semiclassical limit
Branching ratios and CP asymmetries of decays in the pQCD approach
We calculate the branching ratios and CP violating asymmetries of the four B
\to K \etap decays in the perturbative QCD (pQCD) factorization approach.
Besides the full leading order contributions, the partial next-to-leading order
(NLO) contributions from the QCD vertex corrections, the quark loops, and the
chromo-magnetic penguins are also taken into account. The NLO pQCD predictions
for the CP-averaged branching ratios are , Br(B^\pm \to K^\pm \etar) \approx 51.0 \times 10^{-6},
, and Br(B^0 \to K^0 \etar)
\approx 50.3 \times 10^{-6}. The NLO contributions can provide a 70%
enhancement to the LO Br(B \to K \etar), but a 30% reduction to the LO , which play the key role in understanding the observed pattern of
branching ratios. The NLO pQCD predictions for the CP-violating asymmetries,
such as \acp^{dir} (K^0_S \etar) \sim 2.3% and \acp^{mix}(K^0_S \etar)\sim
63%, agree very well with currently available data. This means that the
deviation \Delta S=\acp^{mix}(K^0_S \etar) - \sin{2\beta} in pQCD approach is
also very small.Comment: 31 pages, 11 ps/eps figures, typos corrected. A little modificatio
- âŠ