-
Experimental demonstration of complete 180 degree reversal of magnetization in isolated Co-nanomagnets on a PMN-PT substrate with voltage generated strain
Authors:
Ayan Kumar Biswas,
Hasnain Ahmad,
Jayasimha Atulasimha,
Supriyo Bandyopadhyay
Abstract:
Rotating the magnetization of a shape anisotropic magnetostrictive nanomagnet with voltage-generated stress/strain dissipates much less energy than most other magnetization rotation schemes, but its application to writing bits in non-volatile magnetic memory has been hindered by the fundamental inability of stress/strain to rotate magnetization by full 180 degrees. Normally, stress/strain can rota…
▽ More
Rotating the magnetization of a shape anisotropic magnetostrictive nanomagnet with voltage-generated stress/strain dissipates much less energy than most other magnetization rotation schemes, but its application to writing bits in non-volatile magnetic memory has been hindered by the fundamental inability of stress/strain to rotate magnetization by full 180 degrees. Normally, stress/strain can rotate the magnetization of a shape anisotropic elliptical nanomagnet by only up to 90 degrees, resulting in incomplete magnetization reversal. Recently, we predicted that applying uniaxial stress sequentially along two different axes that are not collinear with the major or minor axis of the elliptical nanomagnet will rotate the magnetization by full 180 degrees. Here, we demonstrate this complete 180 degree rotation in elliptical Co-nanomagnets (fabricated on a piezoelectric substrate) at room temperature. The two stresses are generated by sequentially applying voltages to two pairs of shorted electrodes placed on the substrate such that the line joining the centers of the electrodes in one pair intersects the major axis of a nanomagnet at ~+30 degrees and the line joining the centers of the electrodes in the other pair intersects at ~ -30 degrees. A finite element analysis has been performed to determine the stress distribution underneath the nanomagnets when one or both pairs of electrodes are activated, and this has been approximately incorporated into a micromagnetic simulation of magnetization dynamics to confirm that the generated stress can produce the observed magnetization rotations. This result portends an extremely energy-efficient non-volatile "straintronic" memory technology predicated on writing bits in nanomagnets with electrically generated stress.
△ Less
Submitted 30 December, 2016;
originally announced January 2017.
-
Conceptual Knowledge Relationship Model of Enterprise Architecture and Top Management Roles
Authors:
Hawa Ahmad,
Aishah Ahmad,
Nik Hazlina Nik Abdullah Hafaz
Abstract:
Enterprise Architecture (EA) continues to gain global recognition as a management tool that would improve the organizations performance. However, based on literature, it was found that the lack of EA knowledge of top management (TM) hinders the assimiliation of EA. This study aims to gauge EA knowledge required for TM for providing a comprehensive support towards EA assimiliation. A semi-structure…
▽ More
Enterprise Architecture (EA) continues to gain global recognition as a management tool that would improve the organizations performance. However, based on literature, it was found that the lack of EA knowledge of top management (TM) hinders the assimiliation of EA. This study aims to gauge EA knowledge required for TM for providing a comprehensive support towards EA assimiliation. A semi-structured interviews were conducted with several personnels in an organization. Data were analyzed using the constant comparative method. This study found two sets of EA knowledge of TM; business knowledge and technology knowledge. A conceptual knowledge relationship model is proposed through synthesizing the roles of EA and TM in supporting the TM in identifying the EA knowledge required. The findings gave contribution to academicians and practitioners with knowledge of how to improve EA assimiliation and a structured roadmap for understanding EA to achieve high business value.
△ Less
Submitted 4 June, 2016;
originally announced June 2016.
-
A Miniature CCA2 Public key Encryption scheme based on non-Abelian factorization problems in Lie Groups
Authors:
Haibo Hong,
Licheng Wang,
Jun Shao,
Haseeb Ahmad,
Yixian Yang
Abstract:
Since 1870s, scientists have been taking deep insight into Lie groups and Lie algebras. With the development of Lie theory, Lie groups have got profound significance in many branches of mathematics and physics. In Lie theory, exponential map** between Lie groups and Lie algebras plays a crucial role. Exponential map** is the mechanism for passing information from Lie algebras to Lie groups. Si…
▽ More
Since 1870s, scientists have been taking deep insight into Lie groups and Lie algebras. With the development of Lie theory, Lie groups have got profound significance in many branches of mathematics and physics. In Lie theory, exponential map** between Lie groups and Lie algebras plays a crucial role. Exponential map** is the mechanism for passing information from Lie algebras to Lie groups. Since many computations are performed much more easily by employing Lie algebras, exponential map** is indispensable while studying Lie groups. In this paper, we first put forward a novel idea of designing cryptosystem based on Lie groups and Lie algebras. Besides, combing with discrete logarithm problem(DLP) and factorization problem(FP), we propose some new intractable assumptions based on exponential map**. Moreover, in analog with Boyen's sceme(AsiaCrypt 2007), we disign a public key encryption scheme based on non-Abelian factorization problems in Lie Groups. Finally, our proposal is proved to be IND-CCA2 secure in the random oracle model.
△ Less
Submitted 10 June, 2016; v1 submitted 21 May, 2016;
originally announced May 2016.
-
Public Key Encryption in Non-Abelian Groups
Authors:
Haibo Hong,
Jun Shao,
Licheng Wang,
Haseeb Ahmad,
Yixian Yang
Abstract:
In this paper, we propose a brand new public key encryption scheme in the Lie group that is a non-abelian group. In particular, we firstly investigate the intractability assumptions in the Lie group, including the non-abelian factoring assumption and non-abelian inserting assumption. After that, by using the FO technique, a CCA secure public key encryption scheme in the Lie group is proposed. At l…
▽ More
In this paper, we propose a brand new public key encryption scheme in the Lie group that is a non-abelian group. In particular, we firstly investigate the intractability assumptions in the Lie group, including the non-abelian factoring assumption and non-abelian inserting assumption. After that, by using the FO technique, a CCA secure public key encryption scheme in the Lie group is proposed. At last, we present the security proof in the random oracle based on the non-abelian inserting assumption.
△ Less
Submitted 21 May, 2016;
originally announced May 2016.
-
Development of a Large-scale Neuroimages and Clinical Variables Data Atlas in the neuGRID4You (N4U) project
Authors:
Kamran Munir,
Khawar Hasham Ahmad,
Richard McClatchey
Abstract:
Exceptional growth in the availability of large-scale clinical imaging datasets has led to the development of computational infrastructures offering scientists access to image repositories and associated clinical variables data. The EU FP7 neuGRID and its follow on neuGRID4You (N4U) project is a leading e-Infrastructure where neuroscientists can find core services and resources for brain image ana…
▽ More
Exceptional growth in the availability of large-scale clinical imaging datasets has led to the development of computational infrastructures offering scientists access to image repositories and associated clinical variables data. The EU FP7 neuGRID and its follow on neuGRID4You (N4U) project is a leading e-Infrastructure where neuroscientists can find core services and resources for brain image analysis. The core component of this e-Infrastructure is the N4U Virtual Laboratory, which offers an easy access for neuroscientists to a wide range of datasets and algorithms, pipelines, computational resources, services, and associated support services. The foundation of this virtual laboratory is a massive data store plus information services called the Data Atlas that stores datasets, clinical study data, data dictionaries, algorithm/pipeline definitions, and provides interfaces for parameterised querying so that neuroscientists can perform analyses on required datasets. This paper presents the overall design and development of the Data Atlas, its associated datasets and indexing and a set of retrieval services that originated from the development of the N4U Virtual Laboratory in the EU FP7 N4U project in the light of user requirements.
△ Less
Submitted 29 November, 2015;
originally announced November 2015.
-
Minimal Logarithmic Signatures for one type of Classical Groups
Authors:
Haibo Hong,
Licheng Wang,
Haseeb Ahmad,
Yixian Yang
Abstract:
As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2 and MST3. An LS with the shortest length, called a minimal logarithmic signature (MLS), is even desirable for cryptographic applications. The MLS conjecture states that every finite…
▽ More
As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2 and MST3. An LS with the shortest length, called a minimal logarithmic signature (MLS), is even desirable for cryptographic applications. The MLS conjecture states that every finite simple group has an MLS. Recently, the conjecture has been shown to be true for general linear groups GLn(q), special linear groups SLn(q), and symplectic groups Spn(q) with q a power of primes and for orthogonal groups On(q) with q as a power of 2. In this paper, we present new constructions of minimal logarithmic signatures for the orthogonal group On(q) and SOn(q) with q as a power of odd primes. Furthermore, we give constructions of MLSs for a type of classical groups projective commutator subgroup.
△ Less
Submitted 4 July, 2015;
originally announced July 2015.
-
Minimal Logarithmic Signatures for Sporadic Groups
Authors:
Haibo Hong,
Licheng Wang,
Haseeb Ahmad,
**g Li,
Yixian Yang
Abstract:
As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2 and MST3. An LS with the shortest length is called a minimal logarithmic signature (MLS) and is even desirable for cryptographic constructions. The MLS conjecture states that every f…
▽ More
As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2 and MST3. An LS with the shortest length is called a minimal logarithmic signature (MLS) and is even desirable for cryptographic constructions. The MLS conjecture states that every finite simple group has an MLS. Until now, the MLS conjecture has been proved true for some families of simple groups. In this paper, we will prove the existence of minimal logarithmic signatures for some sporadic groups.
△ Less
Submitted 4 July, 2015;
originally announced July 2015.
-
Reversible strain-induced magnetization switching in FeGa nanomagnets: Pathway to a rewritable, non-volatile, non-toggle, straintronic memory cell for extremely low energy operation
Authors:
Hasnain Ahmad,
Jayasimha Atulasimha,
Supriyo Bandyopadhyay
Abstract:
Reversible straintronic switching of a nanomagnet's magnetization between two stable or metastable states promises ultra-energy-efficient non-volatile memory. Here, we report strain-induced magnetization switching in ~300 nm sized FeGa nanomagnets delineated on a piezoelectric PMN-PT substrate. Voltage of one polarity applied across the substrate generates compressive strain in a nanomagnet and sw…
▽ More
Reversible straintronic switching of a nanomagnet's magnetization between two stable or metastable states promises ultra-energy-efficient non-volatile memory. Here, we report strain-induced magnetization switching in ~300 nm sized FeGa nanomagnets delineated on a piezoelectric PMN-PT substrate. Voltage of one polarity applied across the substrate generates compressive strain in a nanomagnet and switches its magnetization to one state, while voltage of the opposite polarity generates tensile strain and switches the magnetization back to the original state, resulting in "non-toggle" switching. The two states can encode the two binary bits, and, using the right voltage polarity, one can write either bit deterministically.
△ Less
Submitted 22 June, 2015;
originally announced June 2015.
-
Electric field control of magnetic states in isolated and dipole-coupled FeGa nanomagnets delineated on a PMN-PT substrate
Authors:
Hasnain Ahmad,
Jayasimha Atulasimha,
Supriyo Bandyopadhyay
Abstract:
We report observation of a "non-volatile" converse magneto-electric effect in elliptical FeGa nanomagnets delineated on a piezoelectric PMN-PT substrate. The nanomagnets are initially magnetized with a magnetic field directed along their nominal major axis and subsequent application of an electric field across the substrate generates strain in the substrate, which is partially transferred to the n…
▽ More
We report observation of a "non-volatile" converse magneto-electric effect in elliptical FeGa nanomagnets delineated on a piezoelectric PMN-PT substrate. The nanomagnets are initially magnetized with a magnetic field directed along their nominal major axis and subsequent application of an electric field across the substrate generates strain in the substrate, which is partially transferred to the nanomagnets and rotates the magnetizations of some of them to metastable orientations. There they remain after the field is removed, resulting in "non-volatility". In isolated nanomagnets, the angular separation between the initial and final magnetization directions is < 90 deg, but in a dipole-coupled pair consisting of one "hard" and one "soft" nanomagnet, the soft nanomagnet's magnetization is rotated by > 90 deg from the initial orientation because of the dipole influence of the hard nanomagnet. These effects can be utilized for ultra-energy-efficient logic and memory devices.
△ Less
Submitted 19 June, 2015;
originally announced June 2015.
-
Observation of the rare $B^0_s\toμ^+μ^-$ decay from the combined analysis of CMS and LHCb data
Authors:
The CMS,
LHCb Collaborations,
:,
V. Khachatryan,
A. M. Sirunyan,
A. Tumasyan,
W. Adam,
T. Bergauer,
M. Dragicevic,
J. Erö,
M. Friedl,
R. Frühwirth,
V. M. Ghete,
C. Hartl,
N. Hörmann,
J. Hrubec,
M. Jeitler,
W. Kiesenhofer,
V. Knünz,
M. Krammer,
I. Krätschmer,
D. Liko,
I. Mikulec,
D. Rabady,
B. Rahbaran
, et al. (2807 additional authors not shown)
Abstract:
A joint measurement is presented of the branching fractions $B^0_s\toμ^+μ^-$ and $B^0\toμ^+μ^-$ in proton-proton collisions at the LHC by the CMS and LHCb experiments. The data samples were collected in 2011 at a centre-of-mass energy of 7 TeV, and in 2012 at 8 TeV. The combined analysis produces the first observation of the $B^0_s\toμ^+μ^-$ decay, with a statistical significance exceeding six sta…
▽ More
A joint measurement is presented of the branching fractions $B^0_s\toμ^+μ^-$ and $B^0\toμ^+μ^-$ in proton-proton collisions at the LHC by the CMS and LHCb experiments. The data samples were collected in 2011 at a centre-of-mass energy of 7 TeV, and in 2012 at 8 TeV. The combined analysis produces the first observation of the $B^0_s\toμ^+μ^-$ decay, with a statistical significance exceeding six standard deviations, and the best measurement of its branching fraction so far. Furthermore, evidence for the $B^0\toμ^+μ^-$ decay is obtained with a statistical significance of three standard deviations. The branching fraction measurements are statistically compatible with SM predictions and impose stringent constraints on several theories beyond the SM.
△ Less
Submitted 17 August, 2015; v1 submitted 17 November, 2014;
originally announced November 2014.
-
Coherent spin transport and suppression of spin relaxation in InSb nanowires with single subband occupancy at room temperature
Authors:
Saumil Bandyopadhyay,
Md. Iftekhar Hossain,
Hasnain Ahmad,
Jayasimha Atualsimha,
Supriyo Bandyopadhyay
Abstract:
A longstanding goal of spintronics is to inject, coherently transport, and detect spins in a semiconductor nanowire where a SINGLE quantized subband is occupied at room temperature. Here, we report achieving this goal in 50-nm diameter InSb nanowires by demonstrating both the spin-valve and the Hanle effect. The spin relaxation time in the nanowires was found to have increased by an order of magni…
▽ More
A longstanding goal of spintronics is to inject, coherently transport, and detect spins in a semiconductor nanowire where a SINGLE quantized subband is occupied at room temperature. Here, we report achieving this goal in 50-nm diameter InSb nanowires by demonstrating both the spin-valve and the Hanle effect. The spin relaxation time in the nanowires was found to have increased by an order of magnitude over what has been reported in bulk and quantum wells due to the suppression of D'yakonov-Perel' spin relaxation as a result of single subband occupancy. These experiments raise hopes for the realization of a room-temperature Datta-Das spin transistor.
△ Less
Submitted 28 January, 2014;
originally announced January 2014.
-
Sufficient Conditions on the Optimality of Myopic Sensing in Opportunistic Channel Access: A Unifying Framework
Authors:
Yang Liu,
Mingyan Liu,
Sahand Haji Ali Ahmad
Abstract:
This paper considers a widely studied stochastic control problem arising from opportunistic spectrum access (OSA) in a multi-channel system, with the goal of providing a unifying analytical framework whereby a number of prior results may be viewed as special cases. Specifically, we consider a single wireless transceiver/user with access to $N$ channels, each modeled as an iid discrete-time two-sta…
▽ More
This paper considers a widely studied stochastic control problem arising from opportunistic spectrum access (OSA) in a multi-channel system, with the goal of providing a unifying analytical framework whereby a number of prior results may be viewed as special cases. Specifically, we consider a single wireless transceiver/user with access to $N$ channels, each modeled as an iid discrete-time two-state Markov chain. In each time step the user is allowed to sense $k\leq N$ channels, and subsequently use up to $m\leq k$ channels out of those sensed to be available. Channel sensing is assumed to be perfect, and for each channel use in each time step the user gets a unit reward. The user's objective is to maximize its total discounted or average reward over a finite or infinite horizon. This problem has previously been studied in various special cases including $k=1$ and $m=k\leq N$, often cast as a restless bandit problem, with optimality results derived for a myopic policy that seeks to maximize the immediate one-step reward when the two-state Markov chain model is positively correlated. In this paper we study the general problem with $1\leq m\leq k\leq N$, and derive sufficient conditions under which the myopic policy is optimal for the finite and infinite horizon reward criteria, respectively. It is shown that these results reduce to those derived in prior studies under the corresponding special cases, and thus may be viewed as a set of unifying optimality conditions. Numerical examples are also presented to highlight how and why an optimal policy may deviate from the otherwise-optimal myopic sensing given additional exploration opportunities, i.e., when $m<k$.
△ Less
Submitted 14 September, 2013;
originally announced September 2013.
-
On locally phi-semisymmetric Sasakian manifolds
Authors:
Absos Ali Shaikh,
Chandan Kumar Mondal,
Helaluddin Ahmad
Abstract:
Generalizing the notion of local $φ$-symmetry of Takahashi, in the present paper, we introduce the notion of local $φ$-semisymmetry of a Sasakian manifold along with its proper existence and characterization. We also study the notion of local Ricci (resp., projective, conformal) $φ$-semisymmetry of a Sasakian manifold and obtain its characterization. It is shown that the local $φ$-semisymmetry, lo…
▽ More
Generalizing the notion of local $φ$-symmetry of Takahashi, in the present paper, we introduce the notion of local $φ$-semisymmetry of a Sasakian manifold along with its proper existence and characterization. We also study the notion of local Ricci (resp., projective, conformal) $φ$-semisymmetry of a Sasakian manifold and obtain its characterization. It is shown that the local $φ$-semisymmetry, local projective $φ$-semisymmetry and local concircular $φ$-semisymmetry are equivalent. It is also shown that local conformal $φ$-semisymmetry and local conharmonical $φ$-semisymmetry are equivalent.
△ Less
Submitted 11 February, 2017; v1 submitted 8 February, 2013;
originally announced February 2013.
-
Quantum Key Distribution based on Single Photon Bi-partite Correlation
Authors:
Kim Fook Lee,
Yong Meng Sua,
Harith B. Ahmad
Abstract:
We present a scheme for key distribution based on bi-partite correlation of single photons. Alice keeps an ancilla photon and sends a signal photon to Bob, where intrinsic bi-partite correlation of these photons is obtained through first order intensity correlation in their detectors. The key bits are distributed through sharing four bi-partite correlation functions and photon counting. The scheme…
▽ More
We present a scheme for key distribution based on bi-partite correlation of single photons. Alice keeps an ancilla photon and sends a signal photon to Bob, where intrinsic bi-partite correlation of these photons is obtained through first order intensity correlation in their detectors. The key bits are distributed through sharing four bi-partite correlation functions and photon counting. The scheme consists of two parts; first, Alice prepares deterministic photon states and Bob measures the photon states based on his random choice on correlation functions. Second, Alice guesses Bob's choice of correlation functions and sets the key bits by sending out photon states. Bob verifies the key bits through the photon states regardless Alice made a right or wrong guess. We called this key distribution scheme as prepare-measure-guess-verify (PMGV) protocol. We discuss the protocol by using a highly attenuated laser light, and then point out the advantages of using a fiber based correlated photon-pair to achieve better performance in security, communication distance and success rate of key distribution.
△ Less
Submitted 20 July, 2012;
originally announced July 2012.
-
Transverse localization of light in 1D disordered waveguide lattices with backbone photonic bandgap
Authors:
Somnath Ghosh,
B. P. Pal,
R. K. Varshney,
H. Ahmad
Abstract:
The role of a prominent photonic bandgap (PBG) on the phenomenon of transverse localization of light in a semi-infinite lossless waveguide lattice consisting of evanescently coupled disordered one-dimensional optical waveguides has been investigated numerically. The interplay between the underlying photonic bandgap due to inherent periodicity of the optical system and various levels of deliberatel…
▽ More
The role of a prominent photonic bandgap (PBG) on the phenomenon of transverse localization of light in a semi-infinite lossless waveguide lattice consisting of evanescently coupled disordered one-dimensional optical waveguides has been investigated numerically. The interplay between the underlying photonic bandgap due to inherent periodicity of the optical system and various levels of deliberately induced transverse disorder in its refractive index periodicity has been studied. We show that the PBG indeed plays an important role and its simultaneous presence could catalyze realization of localized light even when strength of disorder is not sufficiently strong to independently cause localization of light. An important outcome of this study revealed that PBG could be gainfully exploited to tailor the spectral window for localization of light in potential applications like lasing in a disordered optical lattice.
△ Less
Submitted 2 December, 2013; v1 submitted 12 April, 2012;
originally announced April 2012.
-
Congestion games with resource reuse and applications in spectrum sharing
Authors:
Sahand Haji Ali Ahmad,
Mingyan Liu,
Yunnan Wu
Abstract:
In this paper we consider an extension to the classical definition of congestion games (CG) in which multiple users share the same set of resources and their payoff for using any resource is a function of the total number of users sharing it. The classical congestion games enjoy some very appealing properties, including the existence of a Nash equilibrium and that every improvement path is finit…
▽ More
In this paper we consider an extension to the classical definition of congestion games (CG) in which multiple users share the same set of resources and their payoff for using any resource is a function of the total number of users sharing it. The classical congestion games enjoy some very appealing properties, including the existence of a Nash equilibrium and that every improvement path is finite and leads to such a NE (also called the finite improvement property or FIP), which is also a local optimum to a potential function. On the other hand, this class of games does not model well the congestion or resource sharing in a wireless context, a prominent feature of which is spatial reuse. What this translates to in the context of a congestion game is that a users payoff for using a resource (interpreted as a channel) is a function of the its number of its interfering users sharing that channel, rather than the total number among all users. This makes the problem quite different. We will call this the congestion game with resource reuse (CG-RR). In this paper we study intrinsic properties of such a game; in particular, we seek to address under what conditions on the underlying network this game possesses the FIP or NE. We also discuss the implications of these results when applied to wireless spectrum sharing
△ Less
Submitted 21 October, 2009;
originally announced October 2009.
-
Multi-channel Opportunistic Access: A Case of Restless Bandits with Multiple Plays
Authors:
Sahand Haji Ali Ahmad,
Mingyan Liu
Abstract:
This paper considers the following stochastic control problem that arises in opportunistic spectrum access: a system consists of n channels (Gilbert-Elliot channels)where the state (good or bad) of each channel evolves as independent and identically distributed Markov processes. A user can select exactly k channels to sense and access (based on the sensing result) in each time slot. A reward is…
▽ More
This paper considers the following stochastic control problem that arises in opportunistic spectrum access: a system consists of n channels (Gilbert-Elliot channels)where the state (good or bad) of each channel evolves as independent and identically distributed Markov processes. A user can select exactly k channels to sense and access (based on the sensing result) in each time slot. A reward is obtained whenever the user senses and accesses a good channel. The objective is to design a channel selection policy that maximizes the expected discounted total reward accrued over a finite or infinite horizon. In our previous work we established the optimality of a greedy policy for the special case of k = 1 (i.e., single channel access) under the condition that the channel state transitions are positively correlated over time. In this paper we show under the same condition the greedy policy is optimal for the general case of k >= 1; the methodology introduced here is thus more general. This problem may be viewed as a special case of the restless bandit problem, with multiple plays. We discuss connections between the current problem and existing literature on this class of problems.
△ Less
Submitted 10 October, 2009;
originally announced October 2009.
-
Chemical Equilibration and Transport Properties of Hadronic Matter near $T_c$
Authors:
J. Noronha-Hostler,
J. Noronha,
H. Ahmad,
I. Shovkovy,
C. Greiner
Abstract:
We discuss how the inclusion of Hagedorn states near $T_c$ leads to short chemical equilibration times of proton anti-proton pairs, $K\bar{K}$ pairs, and $Λ\barΛ$ pairs, which indicates that hadrons do not need to be "born" into chemical equilibrium in ultrarelativistic heavy ion collisions. We show that the hadron ratios computed within our model match the experimental results at RHIC very well…
▽ More
We discuss how the inclusion of Hagedorn states near $T_c$ leads to short chemical equilibration times of proton anti-proton pairs, $K\bar{K}$ pairs, and $Λ\barΛ$ pairs, which indicates that hadrons do not need to be "born" into chemical equilibrium in ultrarelativistic heavy ion collisions. We show that the hadron ratios computed within our model match the experimental results at RHIC very well. Furthermore, estimates for $η/s$ near $T_c$ computed within our resonance gas model are comparable to the string theory viscosity bound $η/s=1/4π$. Our model provides a good description of the recent lattice results for the trace anomaly close to $T_c=196$ MeV.
△ Less
Submitted 28 September, 2009; v1 submitted 28 July, 2009;
originally announced July 2009.
-
Particle Ratios as a Probe of the QCD Critical Temperature
Authors:
J. Noronha-Hostler,
H. Ahmad,
J. Noronha,
C. Greiner
Abstract:
We show how the measured particle ratios can be used to provide non-trivial information about the critical temperature of the QCD phase transition. This is obtained by including the effects of highly massive Hagedorn resonances on statistical models, which are used to describe hadronic yields. The inclusion of Hagedorn states creates a dependence of the thermal fits on the Hagedorn temperature,…
▽ More
We show how the measured particle ratios can be used to provide non-trivial information about the critical temperature of the QCD phase transition. This is obtained by including the effects of highly massive Hagedorn resonances on statistical models, which are used to describe hadronic yields. The inclusion of Hagedorn states creates a dependence of the thermal fits on the Hagedorn temperature, $T_H$, which is assumed to be equal to $T_c$, and leads to an overall improvement of thermal fits. We find that for Au+Au collisions at RHIC at $\sqrt{s_{NN}}=200$ GeV the best square fit measure, $χ^2$, occurs at $T_c \sim 176$ MeV and produces a chemical freeze-out temperature of 172.6 MeV and a baryon chemical potential of 39.7 MeV.
△ Less
Submitted 22 June, 2009;
originally announced June 2009.
-
Optimality of Myopic Sensing in Multi-Channel Opportunistic Access
Authors:
Sahand H. A. Ahmad,
Mingyan Liu,
Tara Javidi,
Qing Zhao,
Bhaskar Krishnamachari
Abstract:
We consider opportunistic communications over multiple channels where the state ("good" or "bad") of each channel evolves as independent and identically distributed Markov processes. A user, with limited sensing and access capability, chooses one channel to sense and subsequently access (based on the sensed channel state) in each time slot. A reward is obtained when the user senses and accesses…
▽ More
We consider opportunistic communications over multiple channels where the state ("good" or "bad") of each channel evolves as independent and identically distributed Markov processes. A user, with limited sensing and access capability, chooses one channel to sense and subsequently access (based on the sensed channel state) in each time slot. A reward is obtained when the user senses and accesses a "good" channel. The objective is to design the optimal channel selection policy that maximizes the expected reward accrued over time. This problem can be generally cast as a Partially Observable Markov Decision Process (POMDP) or a restless multi-armed bandit process, to which optimal solutions are often intractable. We show in this paper that the myopic policy, with a simple and robust structure, achieves optimality under certain conditions. This result finds applications in opportunistic communications in fading environment, cognitive radio networks for spectrum overlay, and resource-constrained jamming and anti-jamming.
△ Less
Submitted 10 March, 2009; v1 submitted 4 November, 2008;
originally announced November 2008.