Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 38641 - 38670 of 302419

Full-Text Articles in Physical Sciences and Mathematics

A Framework Of Lightweight Deep Cross-Connected Convolution Kernel Mapping Support Vector Machines, Qi Wang, Zhaoying Liu, Ting Zhang, Shanshan Tu, Yujian Li, Muhammad Waqas Jan 2022

A Framework Of Lightweight Deep Cross-Connected Convolution Kernel Mapping Support Vector Machines, Qi Wang, Zhaoying Liu, Ting Zhang, Shanshan Tu, Yujian Li, Muhammad Waqas

Research outputs 2022 to 2026

Deep kernel mapping support vector machines have achieved good results in numerous tasks by mapping features from a low-dimensional space to a high-dimensional space and then using support vector machines for classification. However, the depth kernel mapping support vector machine does not take into account the connection of different dimensional spaces and increases the model parameters. To further improve the recognition capability of deep kernel mapping support vector machines while reducing the number of model parameters, this paper proposes a framework of Lightweight Deep Convolutional Cross-Connected Kernel Mapping Support Vector Machines (LC-CKMSVM). The framework consists of a feature extraction module …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Research outputs 2022 to 2026

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


Edge-Iiotset: A New Comprehensive Realistic Cyber Security Dataset Of Iot And Iiot Applications For Centralized And Federated Learning, Mohamed A. Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke Jan 2022

Edge-Iiotset: A New Comprehensive Realistic Cyber Security Dataset Of Iot And Iiot Applications For Centralized And Federated Learning, Mohamed A. Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke

Research outputs 2022 to 2026

In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the dataset has been generated using a purpose-built IoT/IIoT testbed with a large representative set of devices, sensors, protocols and cloud/edge configurations. The IoT data are generated from various IoT devices (more than 10 types) such as Low-cost digital sensors for sensing temperature and humidity, Ultrasonic sensor, Water level detection sensor, pH Sensor Meter, Soil Moisture sensor, Heart Rate Sensor, Flame …


Asymmetrical Trusted Technology Networks In Developing Economies: A Case Study On Critical Infrastructure In Bhutan, Pratima Pradhan, Bal Subba, Thinley Jamtsho, Ganga Ram Ghimiray, David M. Cook Jan 2022

Asymmetrical Trusted Technology Networks In Developing Economies: A Case Study On Critical Infrastructure In Bhutan, Pratima Pradhan, Bal Subba, Thinley Jamtsho, Ganga Ram Ghimiray, David M. Cook

Research outputs 2022 to 2026

Developing Nations are subject to amplified challenges in terms of the integration of technology, and the exposure to non-domestic opportunism from larger neighboring economies. These challenges are recognizable as asymmetrical differences between what is seen as the normative list of critical infrastructures, and the specialisms that can dominate an emerging economy with early maturity technology networks. This paper discusses the case of Bhutan and demonstrates the need for strengthened approaches to trusted networks to ensure the reliability and continuity of the Nation's critical infrastructures. The paper also links the importance of trusted information sharing networks as part of an overarching …


Finding Geodesics Joining Given Points, Lyle Noakes, Erchuan Zhang Jan 2022

Finding Geodesics Joining Given Points, Lyle Noakes, Erchuan Zhang

Research outputs 2022 to 2026

Finding a geodesic joining two given points in a complete path-connected Riemannian manifold requires much more effort than determining a geodesic from initial data. This is because it is much harder to solve boundary value problems than initial value problems. Shooting methods attempt to solve boundary value problems by solving a sequence of initial value problems, and usually need a good initial guess to succeed. The present paper finds a geodesic γ: [0 , 1] → M on the Riemannian manifold M with γ(0) = x0 and γ(1) = x1 by dividing the interval [0,1] into several sub-intervals, preferably just …


Automatic And Fast Classification Of Barley Grains From Images: A Deep Learning Approach, Syed Afaq Ali Shah, Hao Luo, Putu Dita Pickupana, Alexander Ekeze, Ferdous Sohel, Hamid Laga, Chengdao Li, Blakely Paynter, Penghao Wang Jan 2022

Automatic And Fast Classification Of Barley Grains From Images: A Deep Learning Approach, Syed Afaq Ali Shah, Hao Luo, Putu Dita Pickupana, Alexander Ekeze, Ferdous Sohel, Hamid Laga, Chengdao Li, Blakely Paynter, Penghao Wang

Research outputs 2022 to 2026

Australia has a reputation for producing a reliable supply of high-quality barley in a contaminant-free climate. As a result, Australian barley is highly sought after by malting, brewing, distilling, and feed industries worldwide. Barley is traded as a variety-specific commodity on the international market for food, brewing and distilling end-use, as the intrinsic quality of the variety determines its market value. Manual identification of barley varieties by the naked eye is challenging and time-consuming for all stakeholders, including growers, grain handlers and traders. Current industrial methods for identifying barley varieties include molecular protein weights or DNA based technology, which are …


Geostatistical Tools To Assess Shifts In Recreational Fishing, Shannon J. Burchert, Glenn A. Hyndes, Karina Ryan, Ute Mueller Jan 2022

Geostatistical Tools To Assess Shifts In Recreational Fishing, Shannon J. Burchert, Glenn A. Hyndes, Karina Ryan, Ute Mueller

Research outputs 2022 to 2026

The use of geostatistical indices to examine fishery-dependent data over time is novel. We assess the value of a range of these indices for describing trends in boat-based recreational fishing in Western Australia and areas of high effort and catches for two demersal species with varying biological characteristics, life histories and distributions. The number of blocks (10- × 10-nautical mile (~19- × 19-km) area) visited decreased by 40%, while the number of fishing trips with demersal species catch increased by 15%. Spatial indices showed a south-easterly shift in demersal catch per unit effort (CPUE) across survey years. The southerly shift …


Multimedia Security And Privacy Protection In The Internet Of Things: Research Developments And Challenges, Wencheng Yang, Song Wang, Jiankun Hu, Nickson M. Karie Jan 2022

Multimedia Security And Privacy Protection In The Internet Of Things: Research Developments And Challenges, Wencheng Yang, Song Wang, Jiankun Hu, Nickson M. Karie

Research outputs 2022 to 2026

With the rapid growth of the internet of things (IoT), huge amounts of multimedia data are being generated from and/or exchanged through various IoT devices, systems and applications. The security and privacy of multimedia data have, however, emerged as key challenges that have the potential to impact the successful deployment of IoT devices in some data-sensitive applications. In this paper, we conduct a comprehensive survey on multimedia data security and privacy protection in the IoT. First, we classify multimedia data into different types and security levels according to application areas. Then, we analyse and discuss the existing multimedia data protection …


Realistic Motion Avatars Are The Future For Social Interaction In Virtual Reality, Shane L. Rogers, Rebecca Broadbent, Jemma Brown, Allan Fraser, Craig P. Speelman Jan 2022

Realistic Motion Avatars Are The Future For Social Interaction In Virtual Reality, Shane L. Rogers, Rebecca Broadbent, Jemma Brown, Allan Fraser, Craig P. Speelman

Research outputs 2022 to 2026

This study evaluated participant self-reported appraisal of social interactions with another person in virtual reality (VR) where their conversational partner was represented by a realistic motion avatar. We use the term realistic motion avatar because: 1. The avatar was modelled to look like the conversational partner it represented, and 2. Full face and body motion capture was utilised so that the avatar mimicked the facial and body language of the conversational partner in real-time. We compared social interaction in VR with face-to-face interaction across two communicative contexts: 1. Getting acquainted conversation, and 2. A structured interview where the participant engaged …


Modeling Digital Camera Monitoring Count Data With Intermittent Zeros For Short-Term Prediction, Eben Afrifa-Yamoah, Ute Mueller Jan 2022

Modeling Digital Camera Monitoring Count Data With Intermittent Zeros For Short-Term Prediction, Eben Afrifa-Yamoah, Ute Mueller

Research outputs 2022 to 2026

Digital camera monitoring has revolutionised survey designs in many fields, as an important source of information. The extended sampling coverage offered by this monitoring scheme makes it preferable compared to other traditional methods of survey. However, data obtained from digital camera monitoring are often highly variable, and characterized by sparse periods of zero counts, interspersed with missing observations due to outages. In practice, missing data of relatively shorter duration are mostly observed and are often imputed using interpolation techniques, ignoring long-term trends leading to inherent estimation biases. In this study, we investigated time series forecasting methods that adequately handle intermittency …


Dynamics Of Mutualism In A Two Prey, One Predator System With Variable Carrying Capacity, Randy Huy Lee Jan 2022

Dynamics Of Mutualism In A Two Prey, One Predator System With Variable Carrying Capacity, Randy Huy Lee

UNF Graduate Theses and Dissertations

We considered the livelihood of two prey species in the presence of a predator species. To understand this phenomenon, we developed and analyzed two mathematical models considering indirect and direct mutualism of two prey species and the influence of one predator species. Both types of mutualism are represented by an increase in the preys' carrying capacities based on direct and indirect interactions between the prey. Because of mutualism, as the death rate parameter of the predator species goes through some critical value, the model shows transcritical bifurcation. Additionally, in the direct mutualism model, as the death rate parameter decreases to …


Matrix Interpretations And Tools For Investigating Even Functionals, Benjamin Stringer Jan 2022

Matrix Interpretations And Tools For Investigating Even Functionals, Benjamin Stringer

Theses and Dissertations--Computer Science

Even functionals are a set of polynomials evaluated on the terms of hollow symmetric matrices. Their properties lend themselves to applications such as counting subgraph embeddings in generic (weighted or unweighted) host graphs and computing moments of binary quadratic forms, which occur in combinatorial optimization. This research focuses primarily on counting subgraph embeddings, which is traditionally accomplished with brute-force algorithms or algorithms curated for special types of graphs. Even functionals provide a method for counting subgraphs algebraically in time proportional to matrix multiplication and is not restricted to particular graph types. Counting subgraph embeddings can be accomplished by evaluating a …


Smart Decision-Making Via Edge Intelligence For Smart Cities, Nathaniel Hudson Jan 2022

Smart Decision-Making Via Edge Intelligence For Smart Cities, Nathaniel Hudson

Theses and Dissertations--Computer Science

Smart cities are an ambitious vision for future urban environments. The ultimate aim of smart cities is to use modern technology to optimize city resources and operations while improving overall quality-of-life of its citizens. Realizing this ambitious vision will require embracing advancements in information communication technology, data analysis, and other technologies. Because smart cities naturally produce vast amounts of data, recent artificial intelligence (AI) techniques are of interest due to their ability to transform raw data into insightful knowledge to inform decisions (e.g., using live road traffic data to control traffic lights based on current traffic conditions). However, training and …


Speed Offset Attack Detection In Vehicular Ad-Hoc Networks (Vanets) Using Machine Learning, Bhuiyan Mustafa Tawheed Jan 2022

Speed Offset Attack Detection In Vehicular Ad-Hoc Networks (Vanets) Using Machine Learning, Bhuiyan Mustafa Tawheed

Electronic Theses and Dissertations

An integral component of the Intelligent Transportation System (ITS) is the emerging technology called Vehicular ad-hoc network (VANET). VANET allows Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication wirelessly to improve road safety, traffic congestion, and information dissemination. Communication of vehicles in a VANET network is vulnerable to various attacks. Commonly used cryptographic techniques alone are insufficient to ensure and protect vehicle message integrity and authentication from insider attacks. In such cases, additional measures are necessary to ensure the correctness of the transmitted data. Each vehicle in the network periodically broadcasts a basic safety message (BSM) that contains …


Evaluation Of Field-Level Screening, Sampling, Storage, And Laboratory Analysis Of Hydrogen Sulfide And Reduced Sulfur Species In Sagd Operations, Kaylee Colene Anagnostopoulos Jan 2022

Evaluation Of Field-Level Screening, Sampling, Storage, And Laboratory Analysis Of Hydrogen Sulfide And Reduced Sulfur Species In Sagd Operations, Kaylee Colene Anagnostopoulos

Electronic Theses and Dissertations

Steam assisted gravity drainage (SAGD) operations extract viscous bitumen from the subsurface. During routine operations, fugitive gas can present as a surface casing vent flow (SCVF) or a gas migration (GM) in soils. Depending on regulatory thresholds, these fugitive gases can be classified as serious or non-serious. The presence of hydrogen sulfide (H2S) automatically classifies a well as serious by regulators. Thus, accurate detection and quantification is necessary to meet and exceed regulatory policies and provide the highest standards of environmental health and safety for the energy sector. This thesis investigates the impacts temperature and steam present …


The Cavity-Embedded Cooper Pair Transistor As A Charge Detector Operating In The Nonlinear Regime, Bhargava Thyagarajan Jan 2022

The Cavity-Embedded Cooper Pair Transistor As A Charge Detector Operating In The Nonlinear Regime, Bhargava Thyagarajan

Dartmouth College Ph.D Dissertations

The cavity-embedded Cooper pair transistor (cCPT) has been shown to be a nearly quantum limited charge detector operating with only a single intracavity photon. Here, we use the inherent Kerr nonlinearity to demonstrate a dispersive charge sensing technique inspired by the Josephson bifurcation amplifier. Operating in the bistable regime close to a bifurcation edge, the cCPT is sensitive to charge shifts of 0.09e in a single-shot readout scheme with a detection time of 3 μs and a detection fidelity of 94%. The readout is implemented with only ∼ 25 intracavity photons in the high oscillation amplitude state, still several orders …


Aspects On The Quantum Dynamics Of A System Coupled To A Bosonic Environment, Qidong Xu Jan 2022

Aspects On The Quantum Dynamics Of A System Coupled To A Bosonic Environment, Qidong Xu

Dartmouth College Ph.D Dissertations

In this work we study various aspects of the quantum dynamics for a system coupled to a Bosonic environment, which is described by a collection of quantum harmonic oscillators or a quantum field. We first consider two quantum mechanical oscillator system-bath models obtained by dimensionally truncating linearized gravity coupled to a massive scalar field and scalar QED, and we show that they separately map onto the phase damped oscillator model and the oscillator system subject to two-photon damping. The phase damped oscillator model also corresponds to the optomechanical system with an acoustic field environment, and we study the acoustic environment …


Semiconducting Polymer Dots-Based Ratiometric Fluorescent Probes For Detection Of Biomarkers, Shuyi He Jan 2022

Semiconducting Polymer Dots-Based Ratiometric Fluorescent Probes For Detection Of Biomarkers, Shuyi He

Dissertations and Theses

Biomarkers serve a key role in illness diagnosis and treatment. Importantly, early detection can boost the therapy success rate greatly. However, traditional approaches to detect biomarkers based on fluorescence intensity changes of individual fluorophores did not completely realize the potential due to several technical problems such as low sensitivity. Ratiometric fluorescent methods use changes in the intensity of two or more emission bands (caused by the analyte) to create an internal reference that improves detection sensitivity. Due to their unique photophysical properties, such as high fluorescence intensity, high quantum yield, and low toxicity, semiconductor quantum dots (Pdots) are an ideal …


Distributed Energy Resources : An Assessment Of New Jersey’S Clean Energy Future, Mary Elizabeth Kenny Jan 2022

Distributed Energy Resources : An Assessment Of New Jersey’S Clean Energy Future, Mary Elizabeth Kenny

Theses, Dissertations and Culminating Projects

The demand for renewable energy in New Jersey will continue to grow as economic opportunities and community support drive development. The effective integration of Distributed Energy Resources (DERs) will transform energy production, storage, and use. To achieve sustainable energy production, the current reliance on fossil fuels must be reduced and replaced with less carbon-intensive energy sources that optimize the electric grid. DERs help pioneer the path to a clean energy transition where the implementation of new renewable energy projects will diversify New Jersey’s energy portfolio and provide a more resilient, equitable, and independent energy source. This thesis investigates different perspectives …


Development And On-Road Applications Of A 1/10-Scale Autonomous Vehicle, Laura Cornejo Paulino Jan 2022

Development And On-Road Applications Of A 1/10-Scale Autonomous Vehicle, Laura Cornejo Paulino

Theses, Dissertations and Culminating Projects

Autonomous vehicles (AVs) are a key component in the creation of the new transportation infrastructure. Over the last several decades, nations across the world have experienced an increase in traffic congestion, environmental deprecation due to greenhouse gas emissions and an increase in time loss and productivity. A key factor in these components is the increase in numbers of vehicles on the road, a number that continues to increase gradually every year. In addition, the continued increase in vehicles on the road poses a threat to human and environmental safety. There is strong evidence to support that accidental vehicular deaths and …


Beyond The Local Volume. I. Surface Densities Of Ultracool Dwarfs In Deep Hst/Wfc3 Parallel Fields, Christian Aganze, Adam J. Burgasser, Mathew Malkan, Christopher A. Theissen, Roberto A. Tejada Arevalo, Chih-Chun Hsu, Daniella C. Bardalez Gagliuffi, Russell E. Ryan Jr., Benne Holwerda Jan 2022

Beyond The Local Volume. I. Surface Densities Of Ultracool Dwarfs In Deep Hst/Wfc3 Parallel Fields, Christian Aganze, Adam J. Burgasser, Mathew Malkan, Christopher A. Theissen, Roberto A. Tejada Arevalo, Chih-Chun Hsu, Daniella C. Bardalez Gagliuffi, Russell E. Ryan Jr., Benne Holwerda

Faculty and Staff Scholarship

Ultracool dwarf stars and brown dwarfs provide a unique probe of large-scale Galactic structure and evolution; however, until recently spectroscopic samples of sufficient size, depth, and fidelity have been unavailable. Here, we present the identification of 164 M7-T9 ultracool dwarfs in 0.6 deg2 of deep, low-resolution, near-infrared spectroscopic data obtained with the Hubble Space Telescope (HST) Wide Field Camera 3 (WFC3) instrument as part of the WFC3 Infrared Spectroscopic Parallel Survey and the 3D-HST survey. We describe the methodology by which we isolate ultracool dwarf candidates from over 200,000 spectra, and show that selection by machine-learning classification is superior to …


Privacy Preserving Attribute-Focused Anonymization Scheme For Healthcare Data Publishing, J. Andrew Onesimu, Karthikeyan J, Jennifer Eunice, Marc Pomplun, Helen Dang Jan 2022

Privacy Preserving Attribute-Focused Anonymization Scheme For Healthcare Data Publishing, J. Andrew Onesimu, Karthikeyan J, Jennifer Eunice, Marc Pomplun, Helen Dang

Faculty Works: MCS (1984-2023)

Advancements in Industry 4.0 brought tremendous improvements in the healthcare sector, such as better quality of treatment, enhanced communication, remote monitoring, and reduced cost. Sharing healthcare data with healthcare providers is crucial for harnessing the benefits of such improvements. In general, healthcare data holds sensitive information about individuals. Hence, sharing such data is challenging because of various security and privacy issues. According to privacy regulations and ethical requirements, it is essential to preserve the privacy of patients before sharing data for medical research. State-of-the-art literature on privacy preserving studies either uses cryptographic approaches to protect the privacy or uses anonymizing …


Lung_Paynet: A Pyramidal Attention Based Deep Learning Network For Lung Nodule Segmentation, P. Malin Bruntha, S. Immanuel Alex Pandian, K. Martin Sagayam, Shivargha Bandopadhyay, Marc Pomplun, Helen Dang Jan 2022

Lung_Paynet: A Pyramidal Attention Based Deep Learning Network For Lung Nodule Segmentation, P. Malin Bruntha, S. Immanuel Alex Pandian, K. Martin Sagayam, Shivargha Bandopadhyay, Marc Pomplun, Helen Dang

Faculty Works: MCS (1984-2023)

Accurate and reliable lung nodule segmentation in computed tomography (CT) images is required for early diagnosis of lung cancer. Some of the difficulties in detecting lung nodules include the various types and shapes of lung nodules, lung nodules near other lung structures, and similar visual aspects. This study proposes a new model named Lung_PAYNet, a pyramidal attention-based architecture, for improved lung nodule segmentation in low-dose CT images. In this architecture, the encoder and decoder are designed using an inverted residual block and swish activation function. It also employs a feature pyramid attention network between the encoder and decoder to extract …


Eukaryotic Parasites Are Integral To A Productive Microbial Food Web In Oxygen-Depleted Waters, Elizabeth A. Suter, Maria Pachladaki, Gordon T. Taylor, Virginia P. Edgcomb Jan 2022

Eukaryotic Parasites Are Integral To A Productive Microbial Food Web In Oxygen-Depleted Waters, Elizabeth A. Suter, Maria Pachladaki, Gordon T. Taylor, Virginia P. Edgcomb

Faculty Works: BCES (1999-2023)

Oxygen-depleted water columns (ODWCs) host a diverse community of eukaryotic protists that change dramatically in composition over the oxic-anoxic gradient. In the permanently anoxic Cariaco Basin, peaks in eukaryotic diversity occurred in layers where dark microbial activity (chemoautotrophy and heterotrophy) were highest, suggesting a link between prokaryotic activity and trophic associations with protists. Using 18S rRNA gene sequencing, parasites and especially the obligate parasitic clade, Syndiniales, appear to be particularly abundant, suggesting parasitism is an important, but overlooked interaction in ODWC food webs. Syndiniales were also associated with certain prokaryotic groups that are often found in ODWCs, including Marinimicrobia and …


Development Of Novel Therapies Targeting Biochemical Mechanisms To Halt Progression Of Alzheimer’S And Parkinson’S Disease, Caleb Vegh Jan 2022

Development Of Novel Therapies Targeting Biochemical Mechanisms To Halt Progression Of Alzheimer’S And Parkinson’S Disease, Caleb Vegh

Electronic Theses and Dissertations

Alzheimer’s Disease (AD) and Parkinson’s Disease (PD) are the two most common and devastating neurodegenerative diseases in the world. There is no cure for either disease and current treatments provide only symptomatic relief. Furthermore, current treatments for AD and PD have shown to exhibit adverse side effects when taken over long periods of time. With age being the greatest risk factor for developing AD and PD, the increase in the aging population has the potential to lead to a serious medical/economic crisis due to the amount of time and care required for patients with AD and PD. The exact aetiologias …


The Octagon At Large M, Riccardo Argurio, Matteo Bertolini, Sebastían Franco, Eduardo García-Valdecasas, Shani Meynet, Antoine Pasternak, Valdo Tatitscheff Jan 2022

The Octagon At Large M, Riccardo Argurio, Matteo Bertolini, Sebastían Franco, Eduardo García-Valdecasas, Shani Meynet, Antoine Pasternak, Valdo Tatitscheff

Publications and Research

Recently, the first instance of a model of D-branes at Calabi-Yau singularities where supersymmetry is broken dynamically into stable vacua has been proposed. This construction was based on a system of N regular and M = 1 fractional branes placed at the tip of the so-called (orientifolded) Octagon singularity. In this paper we show that this model admits a large M generalization, having the same low energy effective dynamics. This opens up the possibility that the effect on geometry is smooth, and amenable to describing the gauge theory all along the RG flow, including the deep IR, in terms of …


Strain‑Induced Quantum Hall Phenomena Of Excitons In Graphene, Oleg L. Berman, Roman Ya. Kezerashvili, Yurii E. Lozovik, Klaus G. Ziegler Jan 2022

Strain‑Induced Quantum Hall Phenomena Of Excitons In Graphene, Oleg L. Berman, Roman Ya. Kezerashvili, Yurii E. Lozovik, Klaus G. Ziegler

Publications and Research

We study direct and indirect pseudomagnetoexcitons, formed by an electron and a hole in the layers of gapped graphene under strain‑induced gauge pseudomagnetic field. Since the train‑induced pseudomagnetic field acts on electrons and holes the same way, it occurs that the properties of single pseudomagnetoexcitons, their collective effects and phase diagram are cardinally different from those of magnetoexcitons in a real magnetic field. We have derived wave functions and energy spectrum of direct in a monolayer and indirect pseudomagnetoexcitons in a double layer of gapped graphene. The quantum Hall effect for direct and indirect excitons was predicted in the monolayers …


Extractable Entanglement From A Euclidean Hourglass, Takanori Anegawa, Norihiro Iizuka, Daniel Kabat Jan 2022

Extractable Entanglement From A Euclidean Hourglass, Takanori Anegawa, Norihiro Iizuka, Daniel Kabat

Publications and Research

We previously proposed that entanglement across a planar surface can be obtained from the partition function on a Euclidean hourglass geometry. Here we extend the prescription to spherical entangling surfaces in conformal field theory. We use the prescription to evaluate log terms in the entropy of a conformal field theory in two dimensions, a conformally coupled scalar in four dimensions, and a Maxwell field in four dimensions. For Maxwell we reproduce the extractable entropy obtained by Soni and Trivedi. We take this as evidence that the hourglass prescription provides a Euclidean technique for evaluating extractable entropy in quantum field theory.


Superluminal Propagation On A Moving Braneworld, Brian Greene, Daniel Kabat, Janna Levin, Arjun S. Menon Jan 2022

Superluminal Propagation On A Moving Braneworld, Brian Greene, Daniel Kabat, Janna Levin, Arjun S. Menon

Publications and Research

We consider a braneworld scenario in the simplest setting, M4 × S1, with a four-dimensional (4D) Minkowski metric induced on the brane, and establish the possibility of superluminal propagation. If the brane is at rest, the 4D Lorentz symmetry of the brane is exact, but if the brane is in motion, it is broken globally by the compactification. By measuring bulk fields, an observer on the brane sees a slice through a higher-dimensional field profile, which carries an imprint of the extra dimensions even when the brane is at rest. If the brane is in motion, we …


Exploratory Programming In The Arts And Humanities [Book Review], Kelly Hammond Jan 2022

Exploratory Programming In The Arts And Humanities [Book Review], Kelly Hammond

Publications and Research

Exploratory Programming is a testament to what open-access can mean, especially in an e-learning environment. Used in full, it is a free course (that relies on free and open software) from a gifted MIT professor whose pedagogy is clear in structure and tone. He scaffolds, promotes predictive thinking, lauds collaborative learning, and urges readers to do not just to read. Used in part, it can be equally powerful.