2,235 research outputs found

    Exploration of The Duality Between Generalized Geometry and Extraordinary Magnetoresistance

    Full text link
    We outline the duality between the extraordinary magnetoresistance (EMR), observed in semiconductor-metal hybrids, and non-symmetric gravity coupled to a diffusive U(1)U(1) gauge field. The corresponding gravity theory may be interpreted as the generalized complex geometry of the semi-direct product of the symmetric metric and the antisymmetric Kalb-Ramond field: (gμν+βμνg_{\mu\nu}+\beta_{\mu\nu}). We construct the four dimensional covariant field theory and compute the resulting equations of motion. The equations encode the most general form of EMR within a well defined variational principle, for specific lower dimensional embedded geometric scenarios. Our formalism also reveals the emergence of additional diffusive pseudo currents for a completely dynamic field theory of EMR. The proposed equations of motion now include terms that induce geometrical deformations in the device geometry in order to optimize the EMR. This bottom-up dual description between EMR and generalized geometry/gravity lends itself to a deeper insight into the EMR effect with the promise of potentially new physical phenomena and properties.Comment: 13 pages and 6 figures. Revised/edited for clarity and purpose. Several references added. Updated title based on suggestions and comments received. Version accepted for publication in Phys.Rev.

    AUTHENTICATION AND KEY MANAGEMENT OF IOT APPLICATIONS WITH EXTENDED WIFI AUTHENTICATION (WIFI AKMA)

    Get PDF
    Internet of things (IoT) devices frequently apply insufficient authentication mechanisms with their application servers due to the constrained nature of such devices. For example, most IoT devices lack the resources that are necessary to store usernames and passwords, certificates, and keys in a secured manner. The challenge that was described above is solved in a 3rd Generation Partnership Project (3GPP) fifth-generation (5G) wireless environment through the Authentication and Key Management for Applications (AKMA) initiative. However, there is no AKMA-equivalent facility within a WiFi environment. Accordingly, techniques are presented herein that extend the WiFi authentication process to support application server authentication for constrained devices. Aspects of the presented techniques support an exchange of a WiFi key and a key identifier (which may be referred to herein as a KAKMA key and an A-KID) as part of an Extensible Authentication Protocol (EAP) tunnel using a new information element (IE) once an authentication process has successfully completed. Such an exchange allows a station (STA) device to use the key tuple {KAKMA, A-KID} to access any application functions that are grouped with that key identifier (i.e., A-KID) without requiring any further authentication

    TRANSLATING BETWEEN REALTIME BI-DIRECTIONAL CONVERSATIONS AND PUSH-TO-TALK SYSTEMS

    Get PDF
    The techniques presented herein provide an artificial intelligence (AI)-based conversational agent to allow communications between (i.e., “translate for”) a push-to-talk (PTT) client and endpoints that support real-time, bi-directional conversation, including voice over Internet Protocol (VoIP) endpoints (also referred to as IP telephony endpoints) and endpoints running multimedia applications that allow bi-directional, real-time conversation. These techniques are applicable when PTT deployments allow direct calls between endpoints that support real-time, bi-directional conversation (e.g., VoIP endpoints) and PTT endpoints. During these calls, the techniques may allow a caller from the real-time, bi-directional conversation endpoint to have a real-time or nearly real-time conversational experience while the PTT user has a start-stop PTT experience

    Contributions of Panchanan Maheshwari's school to angiosperm embryology through an integrative approach

    Get PDF
    P. Maheshwari who served as Professor and Head of the Department of Botany, University of Delhi from 1950 to 1966 built a flourishing school of embryology which became internationally recognized. His colleagues and students have contributed significantly to all areas of embryology through integrative approaches. In memory of his birth centenary year, we have prepared this article that summarizes the work done by his students and traces the phenomenal advances made in some areas in the post-Maheshwari era

    USING BLOCKCHAIN TO SIMPLIFY SESSION INITIATION PROTOCOL OVERLOAD CONTROL

    Get PDF
    Techniques are described herein by which the Session Initiation Protocol (SIP) server overload problem may be significantly simplified by using a distributed system where transactions can be authorized and stored. For example, a technology like blockchain may enable a centralized, shared, and secure transaction database to be used to communicate SIP server overload information. SIP server overload information may be shared between servers that are part of a trust domain. The trust domain may be confined within a network or span across network boundaries (e.g., between enterprise edges / SIP trunk providers / SIP calling cloud providers)

    PROVIDING ENHANCED AUGMENTED REALITY EXPERIENCES USING RELATIONSHIP AND CONTEXTUAL DATA

    Get PDF
    Techniques are provided herein for using relationship intelligence of the participants in the meeting to provide a customized Augmented Reality (AR) experiences for each participant of that meeting whose meeting client is AR-ready. These techniques may allow developers to provide their own relationship information and integrate that information with the meeting platform by proposing a set of Communications Platform as a Service (CPaaS) Software Development Kit (SDK) enhancements described herein

    ENABLING DESKTOP SWITCHING DURING SCREEN SHARING BASED ON CURSOR MOVEMENT

    Get PDF
    Existing screen sharing-related solutions primarily focus on the sharing of a single screen or desktop. For example, to share a screen a user typically has to select the screens that they wish to share every time they move to a different screen. This can break a collaboration flow if a user has multiple screens or desktops, and they keep moving across them during a screen sharing event. Techniques are presented herein that fill this gap by allowing a presenter to share their desktops based on the current location of their mouse. As the mouse moves from one desktop to another, a shared desktop may also change correspondingly

    REAL-TIME SECURE SHARING OF LIVE MEETING CONTENT THROUGH VOICE COMMANDS OR USER CLICKS

    Get PDF
    With the dramatic increase in working from home due to the COVID-19 situation, the reliance on online collaborative sessions has increased manifold and there is a significant need to have an enhanced immersive sharing and collaborative experience in live meetings. Existing sharing and collaboration mechanisms (including the sharing of meeting presentations ahead of time, etc.) all suffer from different weaknesses. To address these types of challenges, techniques are presented herein that support a means whereby, among other things, an authorized participant in an online meeting may request (through, for example, clicking on a shared meeting screen, using a voice input, etc.) that the meeting system, on demand, provide access to additional meeting content such as, for example, links, images, etc

    Compensation for Environmental Damage: Progressively Casting a Wider Net, but What’s the Catch?

    Get PDF
    In the case Certain Activities Carried Out by Nicaragua in the Border Area (Costa Rica v. Nicaragua)–-Compensation Owed by The Republic of Nicaragua to The Republic of Costa Rica (the Costa Rica case), the International Court of Justice (ICJ) had to ascertain the compensation amount due by Nicaragua for the environmental damage it had caused to Costa Rica. This was the first time the ICJ was asked to weigh in and settle an environmental damage compensation claim between two states. After a concise introduction in Part I, this Article will first review the distinction between state responsibility for wrongful acts (as applicable in the Costa Rica case) and the international liability of states in the absence of wrongfulness in Part II. In Part III a detailed analysis of the Costa Rica case will be undertaken, with as its starting point the explicit acknowledgment by the ICJ that compensation is, indeed, due for damage caused to the environment, in and of itself, even if that damage is caused to non-marketable components of the environment, such as damageto a wetland or damage to an ecosystem. Next, this Article will critique the absence of transparency in the ICJ judgment on the valuation method it applied to calculate the final compensation amount as well as the paltry sum which Nicaragua ultimately owed to Costa Rica in this case. The general reluctance by the ICJ to apply punitive damages, in principle, does open an interesting comparative law debate on how common law and civil law countries differ in applying punitive damages in environmental cases. Where punitive damages may not be uniformly applied in national jurisdictions, most domestic courts do readily appoint experts in environmental matters given the inherent technical and scientific nature of such disputes. Therefore, this Article suggests the view that moving forward the ICJ should more actively appoint its own independent experts in environmental disputes, rather than merely relying on the evidence brought forward by the parties. This would go a long way in arriving at more robust scientific conclusions which in turn would allow the ICJ to contribute in a more meaningful manner to the development of international environmental and climate change law. Part IV seeks to demonstrate how domestic responses by the judiciary or the legislature increasingly tend to go further and be more proactive compared to the approaches of international regimes and adjudicating bodies when addressing environmental damage claims. This is illustrated based on a brief analysis of both the Deepwater Horizon and Erika oil spill cases and contrasted with the cases handled and interpretation given by the International Oil Pollution Compensation Funds when interpreting terms such as “environment” and “environmental damage.” Part V offers some concluding thoughts on the overall contribution of the ICJ’s Costa Rica case, including the suggestion that the court could have adopted a more “proactive judicial policy” in such an important transboundary environmental dispute between states

    Cultivation of embryos of Drosophyllum lusitanicum link-an insectivorous plant

    Get PDF
    There has been growing interest in recent years in the understanding of nutrition and flowering of insectivorous angiosperms in axenic cultures. This note reports our preliminary results on the cultivation of seeds and embroys of Drosophyllum lusitanicum Link. The seed is pyramidal in shape and has a thick, black seed coat. The mature embryo is small and fully organized. The bulk of the seed is occupied by the cellular, starchy endosperm. Modified White's medium containing 2% sucrose and solidified with 0.8% agar but without IAA served as the basal medium (WB). Mature seeds were surface sterilized with chlorine water and planted on WB as well as on WB + 500 mg/1 each of beef extract, casein hydrolysate and yeast extract separately
    • …
    corecore