3,658 research outputs found
Dilepton asymmetries at factories in search of transitions
In order to detect the possible presence of
amplitudes in neutral meson decays, we consider the measurement of decay
time asymmetries involving like-sign dilepton events at the factories.Comment: 5 pages, latex, no fig
Edge Transport in 2D Cold Atom Optical Lattices
We theoretically study the observable response of edge currents in two
dimensional cold atom optical lattices. As an example we use Gutzwiller
mean-field theory to relate persistent edge currents surrounding a Mott
insulator in a slowly rotating trapped Bose-Hubbard system to time of flight
measurements. We briefly discuss an application, the detection of Chern number
using edge currents of a topologically ordered optical lattice insulator
Emulating Non-Abelian Topological Matter in Cold Atom Optical Lattices
Certain proposed extended Bose-Hubbard models may exhibit topologically
ordered ground states with excitations obeying non-Abelian braid statistics. A
sufficient tuning of Hubbard parameters could yield excitation braiding rules
allowing implementation of a universal set of topologically protected quantum
gates. We discuss potential difficulties in realizing a model with a proposed
non-Abelian topologically ordered ground state using optical lattices
containing bosonic dipoles. Our direct implementation scheme does not realize
the necessary anisotropic hopping, anisotropic interactions, and low
temperatures
Method of characteristics and solution of DGLAP evolution equation in leading order (LO) and next to leading order (NLO) at small-x
In this paper the singlet and non-singlet structure functions have been
obtained by solving Dokshitzer, Gribove, Lipatov, Alterelli, Parisi (DGLAP)
evolution equations in leading order (LO) and next to leading order (NLO) at
the small x limit. Here we have used a Taylor Series expansion and then the
method of characteristics to solve the evolution equations. We have also
calculated t and x-evolutions of deuteron structure function and the results
are compared with the New Muon Collaboration (NMC) data.Comment: 16 pages including 7 figure
Extended Self-similarity in Kinetic Surface Roughening
We show from numerical simulations that a limited mobility solid-on-solid
model of kinetically rough surface growth exhibits extended self-similarity
analogous to that found in fluid turbulence. The range over which
scale-independent power-law behavior is observed is significantly enhanced if
two correlation functions of different order, such as those representing two
different moments of the difference in height between two points, are plotted
against each other. This behavior, found in both one and two dimensions,
suggests that the `relative' exponents may be more fundamental than the
`absolute' ones.Comment: 4 pages, 4 postscript figures included (some changes made according
to referees' comments. accepted for publication in PRE Rapid Communication
Time-reversal symmetry breaking by a density-wave state in underdoped cuprate superconductors
It was proposed that the density-wave state (DDW) may be
responsible for the pseudogap behavior in the underdoped cuprates. Here we show
that the admixture of a small component to the DDW state breaks the
symmetry between the counter-propagating orbital currents of the DDW state and,
thus, violates the macroscopic time-reversal symmetry. This symmetry breaking
results in a non-zero polar Kerr effect, which has recently been observed in
the pseudogap phase.Comment: 4 pages, 3 eps figures; minor typos corrected, references updated,
new title as suggested by the PRL editor; references updated, final version
as published in PR
Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System
The rapid development of computer networks and mostly of the Internet has created many stability and security problems such as intrusions on computer and network systems. Further the dependency of companies and government agencies is increasing on their computer networks and the significance of protecting these systems from attacks is serious because a single intrusion can cause a heavy loss or the consistency of network becomes insecure. During recent years number of intrusions has dramatically increased. Therefore it is very important to prevent such intrusions. The hindrance of such intrusions is entirely dependent on their detection that is a key part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. Hence accurate detection of network attack is imperative. A variety of intrusion detection approaches are available but the main problem is their performance, which can be enhanced by increasing the detection rates and reducing false positives. Keywords: IDS, Soft Computing, ANN, Genetic Algorith
Impact of Mobility models on Mobile Sensor Networks
Wireless sensor networks (WSN) is an emerging technology, finds variety of applications in military, movement tracking, industries and medical fields. WSN are self configurable, self healing networks. In mobile sensor network, (MSN) nodes are free to move with wireless links without infrastructure. In this paper, we have studied the impact of various mobility models with AODV and DSDV routing protocols and have compared the throughput of the models. Parameters such as loss ratio, hop counts, velocity of the nodes are analyzed by varying the node density using various mobility models and routing protocols
Mixed Mucinous Carcinoma of the Male Breast
Male breast malignancy is extremely rare, representing less than 1% of all breast carcinomas. Infiltrating duct carcinoma is the commonest subtype. Pure mucinous carcinoma and mixed mucinous carcinoma wherein there are components of both mucinous carcinoma and infiltrating duct carcinoma are rare tumours constituting 1.5-5% in women and are even rarer in men. We present here a case of mixed mucinous carcinoma of the breast with metastasis to axillary lymph nodes in a male patient
- …