-
Non-perturbative determination of the ${\cal N} = 1$ SUSY Yang-Mills gluino condensate at large $N$
Authors:
Claudio Bonanno,
Pietro Butti,
Margarita García Pérez,
Antonio González-Arroyo,
Ken-Ichi Ishikawa,
Masanori Okawa
Abstract:
We present the first non-perturbative large-$N$ calculation of the $\mathcal{N}=1$ supersymmetric (SUSY) $\mathrm{SU}(N)$ Yang-Mills gluino condensate, obtained by means of numerical simulations of the lattice-discretized theory, and exploiting large-$N$ twisted volume reduction. We present two different determinations based, respectively, on the Banks-Casher formula and on the Gell-Mann-Oakes-Ren…
▽ More
We present the first non-perturbative large-$N$ calculation of the $\mathcal{N}=1$ supersymmetric (SUSY) $\mathrm{SU}(N)$ Yang-Mills gluino condensate, obtained by means of numerical simulations of the lattice-discretized theory, and exploiting large-$N$ twisted volume reduction. We present two different determinations based, respectively, on the Banks-Casher formula and on the Gell-Mann-Oakes-Renner relation, both giving perfectly consistent results. By matching the lattice and the Novikov-Shifman-Vainshtein-Zakharov (NSVZ) regularization schemes, we are able for the first time to compare numerical and analytic computations. Our most accurate determination gives $Σ_{\rm RGI} /Λ_{\rm NSVZ}^3 = 1.55(57)$, in very good agreement with the $N$-dependence and the value predicted by the weak coupling instanton-based approach $Σ_{\rm RGI} /Λ_{\rm NSVZ}^3 = 1$.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Mineral Detection of Neutrinos and Dark Matter 2024. Proceedings
Authors:
Sebastian Baum,
Patrick Huber,
Patrick Stengel,
Natsue Abe,
Daniel G. Ang,
Lorenzo Apollonio,
Gabriela R. Araujo,
Levente Balogh,
Pranshu Bhaumik Yilda Boukhtouchen,
Joseph Bramante,
Lorenzo Caccianiga,
Andrew Calabrese-Day,
Qing Chang,
Juan I. Collar,
Reza Ebadi,
Alexey Elykov,
Katherine Freese,
Audrey Fung,
Claudio Galelli,
Arianna E. Gleason,
Mariano Guerrero Perez,
Janina Hakenmüller,
Takeshi Hanyu,
Noriko Hasebe,
Shigenobu Hirose
, et al. (35 additional authors not shown)
Abstract:
The second "Mineral Detection of Neutrinos and Dark Matter" (MDvDM'24) meeting was held January 8-11, 2024 in Arlington, VA, USA, hosted by Virginia Tech's Center for Neutrino Physics. This document collects contributions from this workshop, providing an overview of activities in the field. MDvDM'24 was the second topical workshop dedicated to the emerging field of mineral detection of neutrinos a…
▽ More
The second "Mineral Detection of Neutrinos and Dark Matter" (MDvDM'24) meeting was held January 8-11, 2024 in Arlington, VA, USA, hosted by Virginia Tech's Center for Neutrino Physics. This document collects contributions from this workshop, providing an overview of activities in the field. MDvDM'24 was the second topical workshop dedicated to the emerging field of mineral detection of neutrinos and dark matter, following a meeting hosted by IFPU in Trieste, Italy in October 2022. Mineral detectors have been proposed for a wide variety of applications, including searching for dark matter, measuring various fluxes of astrophysical neutrinos over gigayear timescales, monitoring nuclear reactors, and nuclear disarmament protocols; both as paleo-detectors using natural minerals that could have recorded the traces of nuclear recoils for timescales as long as a billion years and as detectors recording nuclear recoil events on laboratory timescales using natural or artificial minerals. Contributions to this proceedings discuss the vast physics potential, the progress in experimental studies, and the numerous challenges lying ahead on the path towards mineral detection. These include a better understanding of the formation and annealing of recoil defects in crystals; identifying the best classes of minerals and, for paleo-detectors, understanding their geology; modeling and control of the relevant backgrounds; develo**, combining, and scaling up imaging and data analysis techniques; and many others. During the last years, MDvDM has grown rapidly and gained attention. Small-scale experimental efforts focused on establishing various microscopic readout techniques are underway at institutions in North America, Europe and Asia. We are looking ahead to an exciting future full of challenges to overcome, surprises to be encountered, and discoveries lying ahead of us.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Maximal weak Orlicz types and the strong maximal on von Neumann algebras
Authors:
Adrián M. González Pérez,
Javier Parcet,
Jorge Pérez García
Abstract:
Let $\mathbf{E}_n: \mathcal{M} \to \mathcal{M}_n$ and $\mathbf{E}_m: \mathcal{N} \to \mathcal{N}_m$ be two sequences of conditional expectations on finite von Neumann algebras. The optimal weak Orlicz type of the associated strong maximal operator $\mathcal{E} = (\mathbf{E}_n\otimes \mathbf{E}_m)_{n,m}$ is not yet known. In a recent work of Jose Conde and the two first-named authors, it was show t…
▽ More
Let $\mathbf{E}_n: \mathcal{M} \to \mathcal{M}_n$ and $\mathbf{E}_m: \mathcal{N} \to \mathcal{N}_m$ be two sequences of conditional expectations on finite von Neumann algebras. The optimal weak Orlicz type of the associated strong maximal operator $\mathcal{E} = (\mathbf{E}_n\otimes \mathbf{E}_m)_{n,m}$ is not yet known. In a recent work of Jose Conde and the two first-named authors, it was show that $\mathcal{E}$ has weak type $(Φ, Φ)$ for a family of functions including $Φ(t) = t \, \log^{2+\varepsilon} t$, for every $\varepsilon > 0$. In this article, we prove that the weak Orlicz type of $\mathcal{E}$ cannot be lowered below $L \log^2 L$, meaning that if $\mathcal{E}$ is of weak type $(Φ, Φ)$, then $Φ(s) \not\in o(s \, \log^2 s)$. Our proof is based on interpolation. Namely, we use recent techniques of Cadilhac/Ricard to formulate a Marcinkiewicz type theorem for maximal weak Orlicz types. Then, we show that a weak Orlicz type lower than $L \log^2 L$ would imply a $p$-operator constant for $\mathcal{E}$ smaller than the known optimum as $p \to 1^{+}$.
△ Less
Submitted 22 April, 2024; v1 submitted 18 April, 2024;
originally announced April 2024.
-
The $\mathrm{SU}(3)$ twisted gradient flow strong coupling without topology freezing
Authors:
Claudio Bonanno,
Jorge Luis Dasilva Golán,
Massimo D'Elia,
Margarita García Pérez,
Andrea Giorgieri
Abstract:
We investigate the role of topology in the lattice determination of the renormalized strong coupling via the gradient flow. This is done adopting the Parallel Tempering on Boundary Conditions to deal with the infamous topological freezing problem that affects standard local updating algorithms. We show that, even in the presence of severe topological freezing, both algorithms yield the same strong…
▽ More
We investigate the role of topology in the lattice determination of the renormalized strong coupling via the gradient flow. This is done adopting the Parallel Tempering on Boundary Conditions to deal with the infamous topological freezing problem that affects standard local updating algorithms. We show that, even in the presence of severe topological freezing, both algorithms yield the same strong coupling once projected onto a fixed topological sector. Moreover, we show that using a non-projected definition of the coupling leads to the same step-scaling sequence. This means that projecting the coupling onto a fixed topological sector does not affect the determination of the dynamically-generated scale of the theory $Λ$.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots
Authors:
Pedro Beltran Lopez,
Pantaleone Nespoli,
Manuel Gil Perez
Abstract:
Cybersecurity is develo** rapidly, and new methods of defence against attackers are appearing, such as Cyber Deception (CYDEC). CYDEC consists of deceiving the enemy who performs actions without realising that he/she is being deceived. This article proposes designing, implementing, and evaluating a deception mechanism based on the stealthy redirection of TCP communications to an on-demand honey…
▽ More
Cybersecurity is develo** rapidly, and new methods of defence against attackers are appearing, such as Cyber Deception (CYDEC). CYDEC consists of deceiving the enemy who performs actions without realising that he/she is being deceived. This article proposes designing, implementing, and evaluating a deception mechanism based on the stealthy redirection of TCP communications to an on-demand honey server with the same characteristics as the victim asset, i.e., it is a clone. Such a mechanism ensures that the defender fools the attacker, thanks to stealth redirection. In this situation, the attacker will focus on attacking the honey server while enabling the recollection of relevant information to generate threat intelligence. The experiments in different scenarios show how the proposed solution can effectively redirect an attacker to a copied asset on demand, thus protecting the real asset. Finally, the results obtained by evaluating the latency times ensure that the redirection is undetectable by humans and very difficult to detect by a machine.
△ Less
Submitted 20 February, 2024; v1 submitted 14 February, 2024;
originally announced February 2024.
-
The Twisted Gradient Flow strong coupling with Parallel Tempering on Boundary Conditions
Authors:
Claudio Bonanno,
Jorge Luis Dasilva Golán,
Massimo D'Elia,
Margarita García Pérez,
Andrea Giorgieri
Abstract:
We present a proposal for calculating the running of the coupling constant of the $\mathrm{SU}(3)$ pure-gauge theory, which combines the Twisted Gradient Flow (TGF) renormalization scheme with Parallel Tempering on Boundary Conditions (PTBC). The TGF is a gradient flow-based renormalization scheme formulated in an asymmetric lattice with twisted boundary conditions. Combined with step scaling, it…
▽ More
We present a proposal for calculating the running of the coupling constant of the $\mathrm{SU}(3)$ pure-gauge theory, which combines the Twisted Gradient Flow (TGF) renormalization scheme with Parallel Tempering on Boundary Conditions (PTBC). The TGF is a gradient flow-based renormalization scheme formulated in an asymmetric lattice with twisted boundary conditions. Combined with step scaling, it has been successfully used to calculate the $\mathrm{SU}(3)$ $Λ$ parameter. As with all gradient flow-based schemes, the coupling constant is highly correlated with the topological charge and affected by topology freezing, an issue addressed by projecting the determination of the coupling onto the zero topological sector. As an alternative to the zero-charge projection, we combine TGF with PTBC, by replicating multiple copies of the same lattice, interpolating between periodic and open boundary conditions in a parallel-tempered manner. We present a first exploration of these ideas by analyzing specific ensembles of $\mathrm{SU}(3)$ lattices with and without PTBC.
△ Less
Submitted 15 December, 2023; v1 submitted 14 December, 2023;
originally announced December 2023.
-
The chiral condensate at large $N$
Authors:
Claudio Bonanno,
Pietro Butti,
Margarita García Peréz,
Antonio González-Arroyo,
Ken-Ichi Ishikawa,
Masanori Okawa
Abstract:
We present results for the large-$N$ limit of the chiral condensate computed from twisted reduced models. We followed a two-fold strategy, one constiting in extracting the condensate from the quark-mass dependence of the pion mass, the other consisting in extracting the condensate from the mode number of the Dirac operator.
We present results for the large-$N$ limit of the chiral condensate computed from twisted reduced models. We followed a two-fold strategy, one constiting in extracting the condensate from the quark-mass dependence of the pion mass, the other consisting in extracting the condensate from the mode number of the Dirac operator.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
The large-$N$ limit of the chiral condensate from twisted reduced models
Authors:
Claudio Bonanno,
Pietro Butti,
Margarita García Peréz,
Antonio González-Arroyo,
Ken-Ichi Ishikawa,
Masanori Okawa
Abstract:
We compute the large-$N$ limit of the QCD chiral condensate on the lattice using twisted reduced models, and performing controlled continuum and chiral extrapolations. We perform two different calculations: one consists in extracting the chiral condensate from the quark mass dependence of the pion mass, and the other consists in extracting the chiral condensate from the behaviour of the mode numbe…
▽ More
We compute the large-$N$ limit of the QCD chiral condensate on the lattice using twisted reduced models, and performing controlled continuum and chiral extrapolations. We perform two different calculations: one consists in extracting the chiral condensate from the quark mass dependence of the pion mass, and the other consists in extracting the chiral condensate from the behaviour of the mode number of the Wilson-Dirac operator for small eigenvalues. We find consistency between the results of the two methods, giving a joint estimate of $\lim_{N\to\infty}Σ(N)/N=[184(13)$ MeV$]^3$ ($\overline{\mathrm{MS}}$, $μ=2$ GeV, taking the square root of the string tension $\sqrtσ=440$ MeV to set the scale), in remarkable agreement with the $\mathrm{SU}(3)$ 2-flavor FLAG result.
△ Less
Submitted 4 December, 2023; v1 submitted 27 September, 2023;
originally announced September 2023.
-
Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense
Authors:
Enrique Tomás Martínez Beltrán,
Pedro Miguel Sánchez Sánchez,
Sergio López Bernal,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces unique communication security challenges that have yet to be thoroughly addressed in the literature. These challenges primarily originate from the decent…
▽ More
The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces unique communication security challenges that have yet to be thoroughly addressed in the literature. These challenges primarily originate from the decentralized nature of the aggregation process, the varied roles and responsibilities of the participants, and the absence of a central authority to oversee and mitigate threats. Addressing these challenges, this paper first delineates a comprehensive threat model focused on DFL communications. In response to these identified risks, this work introduces a security module to counter communication-based attacks for DFL platforms. The module combines security techniques such as symmetric and asymmetric encryption with Moving Target Defense (MTD) techniques, including random neighbor selection and IP/port switching. The security module is implemented in a DFL platform, Fedstellar, allowing the deployment and monitoring of the federation. A DFL scenario with physical and virtual deployments have been executed, encompassing three security configurations: (i) a baseline without security, (ii) an encrypted configuration, and (iii) a configuration integrating both encryption and MTD techniques. The effectiveness of the security module is validated through experiments with the MNIST dataset and eclipse attacks. The results showed an average F1 score of 95%, with the most secure configuration resulting in CPU usage peaking at 68% (+-9%) in virtual deployments and network traffic reaching 480.8 MB (+-18 MB), effectively mitigating risks associated with eavesdrop** or eclipse attacks.
△ Less
Submitted 9 December, 2023; v1 submitted 21 July, 2023;
originally announced July 2023.
-
Fedstellar: A Platform for Decentralized Federated Learning
Authors:
Enrique Tomás Martínez Beltrán,
Ángel Luis Perales Gómez,
Chao Feng,
Pedro Miguel Sánchez Sánchez,
Sergio López Bernal,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data privacy. Since its birth, Centralized FL (CFL) has been the most used approach, where a central entity aggregates participants' models to create a global one. However, CFL presents limitations such as communication bottlenecks, sin…
▽ More
In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data privacy. Since its birth, Centralized FL (CFL) has been the most used approach, where a central entity aggregates participants' models to create a global one. However, CFL presents limitations such as communication bottlenecks, single point of failure, and reliance on a central server. Decentralized Federated Learning (DFL) addresses these issues by enabling decentralized model aggregation and minimizing dependency on a central entity. Despite these advances, current platforms training DFL models struggle with key issues such as managing heterogeneous federation network topologies. To overcome these challenges, this paper presents Fedstellar, a platform extended from p2pfl library and designed to train FL models in a decentralized, semi-decentralized, and centralized fashion across diverse federations of physical or virtualized devices. The Fedstellar implementation encompasses a web application with an interactive graphical interface, a controller for deploying federations of nodes using physical or virtual devices, and a core deployed on each device which provides the logic needed to train, aggregate, and communicate in the network. The effectiveness of the platform has been demonstrated in two scenarios: a physical deployment involving single-board devices such as Raspberry Pis for detecting cyberattacks, and a virtualized deployment comparing various FL approaches in a controlled environment using MNIST and CIFAR-10 datasets. In both scenarios, Fedstellar demonstrated consistent performance and adaptability, achieving F1 scores of 91%, 98%, and 91.2% using DFL for detecting cyberattacks and classifying MNIST and CIFAR-10, respectively, reducing training time by 32% compared to centralized approaches.
△ Less
Submitted 8 April, 2024; v1 submitted 16 June, 2023;
originally announced June 2023.
-
Adjoint fermions at large-N on the lattice
Authors:
P. Butti,
M. García Pérez,
A. González-Arroyo,
K. I. Ishikawa
Abstract:
Lattice simulations of Yang-Mills theories coupled with $N_f$ flavours of fermions in the adjoint representation provide a way to probe the non-perturbative regime of a plethora of different physical scenarios, such as Supersymmetric Yang-Mills theory to BSM models. We are interested in the large-$N_c$ limit of these theories, for which standard lattice techniques are limited by high-computational…
▽ More
Lattice simulations of Yang-Mills theories coupled with $N_f$ flavours of fermions in the adjoint representation provide a way to probe the non-perturbative regime of a plethora of different physical scenarios, such as Supersymmetric Yang-Mills theory to BSM models. We are interested in the large-$N_c$ limit of these theories, for which standard lattice techniques are limited by high-computational costs. Our approach makes use of the well-established twisted volume reduction, which allows one to simulate these theories on a $1^4$ lattice. In this talk, we are going to present a detailed study of the scale setting of these theories, performed with Wilson flow techniques, but endowed with a procedure that allowed us to reduce finite-volume (finite $N_c$) systematic effects. We will apply this procedure to our configurations for $N_f=0,\frac{1}{2},1,2$ and analyze the dependence of the scale on the coupling, the adjoint fermion mass and the number of flavours. For the cases in which enough couplings are available we compared the resulting $β$-function with the predictions of perturbation theory, finding very good agreement.
△ Less
Submitted 5 December, 2022;
originally announced December 2022.
-
SU(N) fractional Instantons
Authors:
Jorge Luis Dasilva Golan,
Margarita Garcia Perez
Abstract:
We present our study of a set of solutions to the $SU(N)$ Yang-Mills equations of motion with fractional topological charge. The configurations are obtained numerically by minimizing the action with gradient flow techniques on a torus of size $l^2\times(Nl)^2$ with twisted boundary conditions. We pay special attention to the large $N$ limit, which is taken along a very peculiar sequence, with the…
▽ More
We present our study of a set of solutions to the $SU(N)$ Yang-Mills equations of motion with fractional topological charge. The configurations are obtained numerically by minimizing the action with gradient flow techniques on a torus of size $l^2\times(Nl)^2$ with twisted boundary conditions. We pay special attention to the large $N$ limit, which is taken along a very peculiar sequence, with the number of colors $N$ and the magnetic flux $m$ selected respectively as the $n$-th and $n-2$ terms of the Fibonacci sequence. We discuss the large $N$ scaling of the solutions and analyze several gauge invariant quantities as the Polyakov loops. We also discuss the so-called Hamiltonian limit, with one of the large directions sent to infinity, where these instantons represent tunneling events between inequivalent pure gauge configurations.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges
Authors:
Enrique Tomás Martínez Beltrán,
Mario Quiles Pérez,
Pedro Miguel Sánchez Sánchez,
Sergio López Bernal,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
In recent years, Federated Learning (FL) has gained relevance in training collaborative models without sharing sensitive data. Since its birth, Centralized FL (CFL) has been the most common approach in the literature, where a central entity creates a global model. However, a centralized approach leads to increased latency due to bottlenecks, heightened vulnerability to system failures, and trustwo…
▽ More
In recent years, Federated Learning (FL) has gained relevance in training collaborative models without sharing sensitive data. Since its birth, Centralized FL (CFL) has been the most common approach in the literature, where a central entity creates a global model. However, a centralized approach leads to increased latency due to bottlenecks, heightened vulnerability to system failures, and trustworthiness concerns affecting the entity responsible for the global model creation. Decentralized Federated Learning (DFL) emerged to address these concerns by promoting decentralized model aggregation and minimizing reliance on centralized architectures. However, despite the work done in DFL, the literature has not (i) studied the main aspects differentiating DFL and CFL; (ii) analyzed DFL frameworks to create and evaluate new solutions; and (iii) reviewed application scenarios using DFL. Thus, this article identifies and analyzes the main fundamentals of DFL in terms of federation architectures, topologies, communication mechanisms, security approaches, and key performance indicators. Additionally, the paper at hand explores existing mechanisms to optimize critical DFL fundamentals. Then, the most relevant features of the current DFL frameworks are reviewed and compared. After that, it analyzes the most used DFL application scenarios, identifying solutions based on the fundamentals and frameworks previously defined. Finally, the evolution of existing DFL solutions is studied to provide a list of trends, lessons learned, and open challenges.
△ Less
Submitted 13 September, 2023; v1 submitted 15 November, 2022;
originally announced November 2022.
-
A Security and Trust Framework for Decentralized 5G Marketplaces
Authors:
José María Jorquera Valero,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
5G networks intend to cover user demands through multi-party collaborations in a secure and trustworthy manner. To this end, marketplaces play a pivotal role as enablers for network service consumers and infrastructure providers to offer, negotiate, and purchase 5G resources and services. Nevertheless, marketplaces often do not ensure trustworthy networking by analyzing the security and trust of t…
▽ More
5G networks intend to cover user demands through multi-party collaborations in a secure and trustworthy manner. To this end, marketplaces play a pivotal role as enablers for network service consumers and infrastructure providers to offer, negotiate, and purchase 5G resources and services. Nevertheless, marketplaces often do not ensure trustworthy networking by analyzing the security and trust of their members and offers. This paper presents a security and trust framework to enable the selection of reliable third-party providers based on their history and reputation. In addition, it also introduces a reward and punishment mechanism to continuously update trust scores according to security events. Finally, we showcase a real use case in which the security and trust framework is being applied.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
Trust-as-a-Service: A reputation-enabled trust framework for 5G networks
Authors:
José María Jorquera Valero,
Pedro Miguel Sánchez Sánchez,
Manuel Gil Pérez,
Alberto Huertas Celdrán,
Gregorio Martínez Pérez
Abstract:
Trust, security, and privacy are three of the major pillars to assemble the fifth generation network and beyond. Despite such pillars are principally interconnected, they arise a multitude of challenges to be addressed separately. 5G ought to offer flexible and pervasive computing capabilities across multiple domains according to user demands and assuring trustworthy network providers. Distributed…
▽ More
Trust, security, and privacy are three of the major pillars to assemble the fifth generation network and beyond. Despite such pillars are principally interconnected, they arise a multitude of challenges to be addressed separately. 5G ought to offer flexible and pervasive computing capabilities across multiple domains according to user demands and assuring trustworthy network providers. Distributed marketplaces expect to boost the trading of heterogeneous resources so as to enable the establishment of pervasive service chains between cross-domains. Nevertheless, the need for reliable parties as ``marketplace operators'' plays a pivotal role to achieving a trustworthy ecosystem. One of the principal blockages in managing foreseeable networks is the need of adapting previous trust models to accomplish the new network and business requirements. In this regard, this article is centered on trust management of 5G multi-party networks. The design of a reputation-based trust framework is proposed as a Trust-as-a-Service (TaaS) solution for any distributed multi-stakeholder environment where zero trust and zero-touch principles should be met. Besides, a literature review is also conducted to recognize the network and business requirements currently envisaged. Finally, the validation of the proposed trust framework is performed in a real research environment, the 5GBarcelona testbed, leveraging 12% of a 2.1GHz CPU with 20 cores and 2% of the 30GiB memory. In this regard, these outcomes reveal the feasibility of the TaaS solution in the context of determining reliable network operators.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
SU(N) fractional instantons and the Fibonacci sequence
Authors:
Jorge Dasilva Golán,
Margarita García Pérez
Abstract:
We study, by means of numerical methods, new $SU(N)$ self-dual instanton solutions on $\mathbf{R}\times \mathbf{T}^3$ with fractional topological charge $Q=1/N$. They are obtained on a box with twisted boundary conditions with a very particular choice of twist: both the number of colours and the 't Hooft $\mathbf{Z}_N$ fluxes piercing the box are taken within the Fibonacci sequence, i.e. $N=F_n$ (…
▽ More
We study, by means of numerical methods, new $SU(N)$ self-dual instanton solutions on $\mathbf{R}\times \mathbf{T}^3$ with fractional topological charge $Q=1/N$. They are obtained on a box with twisted boundary conditions with a very particular choice of twist: both the number of colours and the 't Hooft $\mathbf{Z}_N$ fluxes piercing the box are taken within the Fibonacci sequence, i.e. $N=F_n$ (the $nth$ number in the series) and $|\vec m| = |\vec{k}|=F_{n-2}$. Various arguments based on previous works and in particular on ref. \cite{Chamizo:2016msz}, indicate that this choice of twist avoids the breakdown of volume independence in the large $N$ limit. These solutions become relevant on a Hamiltonian formulation of the gauge theory, where they represent vacuum-to-vacuum tunneling events lifting the degeneracy between electric flux sectors present in perturbation theory. We discuss the large $N$ scaling properties of the solutions and evaluate various gauge invariant quantities like the action density or Wilson and Polyakov loop operators.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
Scale setting for large-$N$ SUSY Yang-Mills on the lattice
Authors:
Pietro Butti,
Margarita Garcia Perez,
Antonio Gonzalez-Arroyo,
Ken-Ichi Ishikawa,
Masanori Okawa
Abstract:
In this paper we study the large $N$ limit of four-dimensional Supersymmetric Yang-Mills on the lattice using twisted reduced models. We have generated configurations with dynamical massive gluinos and various lattice 't Hooft couplings, and verified that the Pfaffian remains positive. We have determined the lattice spacing in terms of various observables obtaining compatible results. Extrapolatin…
▽ More
In this paper we study the large $N$ limit of four-dimensional Supersymmetric Yang-Mills on the lattice using twisted reduced models. We have generated configurations with dynamical massive gluinos and various lattice 't Hooft couplings, and verified that the Pfaffian remains positive. We have determined the lattice spacing in terms of various observables obtaining compatible results. Extrapolating to the massless gluino limit we obtain the lattice spacing dependence on the bare couplings for the supersymmetric theory. The observed dependence goes along the expected behaviour predicted by perturbation theory.
△ Less
Submitted 6 May, 2022;
originally announced May 2022.
-
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers
Authors:
Pedro Miguel Sánchez Sánchez,
José María Jorquera Valero,
Alberto Huertas Celdrán,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
In today's computing environment, where Artificial Intelligence (AI) and data processing are moving toward the Internet of Things (IoT) and Edge computing paradigms, benchmarking resource-constrained devices is a critical task to evaluate their suitability and performance. Between the employed devices, Single-Board Computers arise as multi-purpose and affordable systems. The literature has explore…
▽ More
In today's computing environment, where Artificial Intelligence (AI) and data processing are moving toward the Internet of Things (IoT) and Edge computing paradigms, benchmarking resource-constrained devices is a critical task to evaluate their suitability and performance. Between the employed devices, Single-Board Computers arise as multi-purpose and affordable systems. The literature has explored Single-Board Computers performance when running high-level benchmarks specialized in particular application scenarios, such as AI or medical applications. However, lower-level benchmarking applications and datasets are needed to enable new Edge-based AI solutions for network, system and service management based on device and component performance, such as individual device identification. Thus, this paper presents LwHBench, a low-level hardware benchmarking application for Single-Board Computers that measures the performance of CPU, GPU, Memory and Storage taking into account the component constraints in these types of devices. LwHBench has been implemented for Raspberry Pi devices and run for 100 days on a set of 45 devices to generate an extensive dataset that allows the usage of AI techniques in scenarios where performance data can help in the device management process. Besides, to demonstrate the inter-scenario capability of the dataset, a series of AI-enabled use cases about device identification and context impact on performance are presented as exploration of the published data. Finally, the benchmark application has been adapted and applied to an agriculture-focused scenario where three RockPro64 devices are present.
△ Less
Submitted 24 October, 2022; v1 submitted 18 April, 2022;
originally announced April 2022.
-
The SU(N) running coupling in the twisted gradient flow scheme and volume independence
Authors:
Jorge Luis Dasilva Golan,
Margarita Garcia Perez,
Alberto Ramos
Abstract:
We report on an ongoing study of the running coupling of SU(N) pure Yang-Mills theory in the twisted gradient flow scheme (TGF). The study exploits the idea that twisted boundary conditions reduce finite volume effects, leading to an effective size in the twisted plane that combines the number of colours and the torus period. We test this hypothesis by computing the TGF running coupling and the SU…
▽ More
We report on an ongoing study of the running coupling of SU(N) pure Yang-Mills theory in the twisted gradient flow scheme (TGF). The study exploits the idea that twisted boundary conditions reduce finite volume effects, leading to an effective size in the twisted plane that combines the number of colours and the torus period. We test this hypothesis by computing the TGF running coupling and the SU(N) $Λ-$ parameter on asymmetric lattices of size $(NL)^2L^2$ for various gauge groups. Finite volume effects are monitored by analyzing the coupling in different planes and by comparing results at different number of colours.
△ Less
Submitted 25 November, 2021;
originally announced November 2021.
-
Scale setting for $\mathcal{N} = 1$ SUSY Yang-Mills at large-$N$ through volume-reduced twisted matrix model
Authors:
P. Butti,
M. Garcia Perez,
A. Gonzalez-Arroyo,
K. I. Ishikawa,
M. Okawa
Abstract:
$\mathcal{N}=1$ SUSY Yang-Mills theory is an appealing theoretical framework that has been studied in the literature using different methods, including standard lattice simulations. Among these, the volume-reduced twisted Eguchi-Kawai model, endowed with one adjoint Majorana fermion, could play an important role in studying its large-$N$ limit via the Curci-Veneziano prescription. In this talk, we…
▽ More
$\mathcal{N}=1$ SUSY Yang-Mills theory is an appealing theoretical framework that has been studied in the literature using different methods, including standard lattice simulations. Among these, the volume-reduced twisted Eguchi-Kawai model, endowed with one adjoint Majorana fermion, could play an important role in studying its large-$N$ limit via the Curci-Veneziano prescription. In this talk, we present our results on the analysis of the scale of the theory, performed via different methods based on purely gluonic observables as well as (quenched) fundamental mesons in the chiral limit. These lattice results will be used as a scale setting for the analysis of the spectrum of the theory.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
Large $N$ simulation of the twisted reduced matrix model with an adjoint Majorana fermion
Authors:
Pietro Butti,
Margarita García Pérez,
Antonio González-Arroyo,
Ken-Ichi Ishikawa,
Masanori Okawa
Abstract:
To investigate the properties of the large $N$ limit of $\mathcal{N} = 1$ SUSY Yang-Mills theory, we have started a study for a reduced matrix model with an adjoint Majorana fermion. The gauge action is based on the Wilson action and the adjoint-fermion one is the Wilson-Dirac action on a reduced lattice with twisted gauge boundary condition. We employ the RHMC algorithm in which the absolute valu…
▽ More
To investigate the properties of the large $N$ limit of $\mathcal{N} = 1$ SUSY Yang-Mills theory, we have started a study for a reduced matrix model with an adjoint Majorana fermion. The gauge action is based on the Wilson action and the adjoint-fermion one is the Wilson-Dirac action on a reduced lattice with twisted gauge boundary condition. We employ the RHMC algorithm in which the absolute value of the Pfaffian is incorporated. The sign of the Pfaffian is included with the re-weighting method and separately measured as an observable. In this talk, we show the configuration generation status towards the large $N$ limit and the behavior of the lowest/lower eigenvalue(s) of the Wilson-Dirac adjoint fermion operator. We investigated the sign of the Pfaffian and the critical hop** parameters for the chiral limit. The sign of the Pfaffian is always positive on the configurations we have generated. The critical hop** parameters derived from the eigenvalues of the Dirac operator are consistent with those derived from the PCAC mass relation with non-singlet flavor adjoint fermions.
△ Less
Submitted 30 October, 2021;
originally announced November 2021.
-
Memory efficient finite volume schemes with twisted boundary conditions
Authors:
Eduardo I. Bribian,
Jorge Luis Dasilva Golan,
Margarita Garcia Perez,
Alberto Ramos
Abstract:
In this paper we explore a finite volume renormalization scheme that combines three main ingredients: a coupling based on the gradient flow, the use of twisted boundary conditions and a particular asymmetric geometry, that for $SU(N)$ gauge theories consists on a hypercubic box of size $l^2 \times (Nl)^2$, a choice motivated by the study of volume independence in large $N$ gauge theories. We argue…
▽ More
In this paper we explore a finite volume renormalization scheme that combines three main ingredients: a coupling based on the gradient flow, the use of twisted boundary conditions and a particular asymmetric geometry, that for $SU(N)$ gauge theories consists on a hypercubic box of size $l^2 \times (Nl)^2$, a choice motivated by the study of volume independence in large $N$ gauge theories. We argue that this scheme has several advantages that make it particularly suited for precision determinations of the strong coupling, among them translational invariance, an analytic expansion in the coupling and a reduced memory footprint with respect to standard simulations on symmetric lattices, allowing for a more efficient use of current GPU clusters. We test this scheme numerically with a determination of the $Λ$ parameter in the $SU(3)$ pure gauge theory. We show that the use of an asymmetric geometry has no significant impact in the size of scaling violations, obtaining a value $Λ_{\overline{MS}} \sqrt{8 t_0} =0.603(17)$ in good agreement with the existing literature. The role of topology freezing, that is relevant for the determination of the coupling in this particular scheme and for large $N$ applications, is discussed in detail.
△ Less
Submitted 8 July, 2021;
originally announced July 2021.
-
A methodology to identify identical single-board computers based on hardware behavior fingerprinting
Authors:
Pedro Miguel Sánchez Sánchez,
José María Jorquera Valero,
Alberto Huertas Celdrán,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
The connectivity and resource-constrained nature of single-board devices open the door to cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important issues is the presence of unauthorized IoT devices that want to impersonate legitimate ones by using identical hardware and software specifications. This situation can provoke sensitive information leakages, data po…
▽ More
The connectivity and resource-constrained nature of single-board devices open the door to cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important issues is the presence of unauthorized IoT devices that want to impersonate legitimate ones by using identical hardware and software specifications. This situation can provoke sensitive information leakages, data poisoning, or privilege escalation in IoT scenarios. Combining behavioral fingerprinting and Machine/Deep Learning (ML/DL) techniques is a promising approach to identify these malicious spoofing devices by detecting minor performance differences generated by imperfections in manufacturing. However, existing solutions are not suitable for single-board devices since they do not consider their hardware and software limitations, underestimate critical aspects such as fingerprint stability or context changes, and do not explore the potential of ML/DL techniques. To improve it, this work first identifies the essential properties for single-board device identification: uniqueness, stability, diversity, scalability, efficiency, robustness, and security. Then, a novel methodology relies on behavioral fingerprinting to identify identical single-board devices and meet the previous properties. The methodology leverages the different built-in components of the system and ML/DL techniques, comparing the device internal behavior with each other to detect manufacturing variations. The methodology validation has been performed in a real environment composed of 15 identical Raspberry Pi 4 B and 10 Raspberry Pi 3 B+ devices, obtaining a 91.9% average TPR and identifying all devices by setting a 50% threshold in the evaluation process. Finally, a discussion compares the proposed solution with related work, highlighting the fingerprint properties not met, and provides important lessons learned and limitations.
△ Less
Submitted 22 June, 2022; v1 submitted 15 June, 2021;
originally announced June 2021.
-
Meson spectrum in the large $N$ limit
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Masanori Okawa
Abstract:
We present the result of our computation of the lowest lying meson masses for SU(N) gauge theory in the large $N$ limit (with $N_f/N\longrightarrow 0$). The final values are given in units of the square root of the string tension, and with errors which account for both statistical and systematic errors. By using 4 different values of the lattice spacing we have seen that our results scale properly…
▽ More
We present the result of our computation of the lowest lying meson masses for SU(N) gauge theory in the large $N$ limit (with $N_f/N\longrightarrow 0$). The final values are given in units of the square root of the string tension, and with errors which account for both statistical and systematic errors. By using 4 different values of the lattice spacing we have seen that our results scale properly. We have studied various values of $N$ (169, 289 and 361) to monitor the N-dependence of the most sensitive quantities. Our methodology is based upon a first principles approach (lattice gauge theory) combined with large $N$ volume independence. We employed both Wilson fermions and twisted mass fermions with maximal twist. In addition to masses in the pseudoscalar, vector, scalar and axial vector channels, we also give results on the pseudoscalar decay constant and various remormalization factors.
△ Less
Submitted 25 November, 2020;
originally announced November 2020.
-
A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets
Authors:
Pedro Miguel Sánchez Sánchez,
Jose María Jorquera Valero,
Alberto Huertas Celdrán,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
In the current network-based computing world, where the number of interconnected devices grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at the same rate. To guarantee the correct functioning and performance of novel environments such as Smart Cities, Industry 4.0, or crowdsensing, it is crucial to identify the capabilities of their devices (e.g., senso…
▽ More
In the current network-based computing world, where the number of interconnected devices grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at the same rate. To guarantee the correct functioning and performance of novel environments such as Smart Cities, Industry 4.0, or crowdsensing, it is crucial to identify the capabilities of their devices (e.g., sensors, actuators) and detect potential misbehavior that may arise due to cyberattacks, system faults, or misconfigurations. With this goal in mind, a promising research field emerged focusing on creating and managing fingerprints that model the behavior of both the device actions and its components. The article at hand studies the recent growth of the device behavior fingerprinting field in terms of application scenarios, behavioral sources, and processing and evaluation techniques. First, it performs a comprehensive review of the device types, behavioral data, and processing and evaluation techniques used by the most recent and representative research works dealing with two major scenarios: device identification and device misbehavior detection. After that, each work is deeply analyzed and compared, emphasizing its characteristics, advantages, and limitations. This article also provides researchers with a review of the most relevant characteristics of existing datasets as most of the novel processing techniques are based on machine learning and deep learning. Finally, it studies the evolution of these two scenarios in recent years, providing lessons learned, current trends, and future research challenges to guide new solutions in the area.
△ Less
Submitted 3 March, 2021; v1 submitted 7 August, 2020;
originally announced August 2020.
-
Spotting political social bots in Twitter: A use case of the 2019 Spanish general election
Authors:
Javier Pastor-Galindo,
Mattia Zago,
Pantaleone Nespoli,
Sergio López Bernal,
Alberto Huertas Celdrán,
Manuel Gil Pérez,
José A. Ruipérez-Valiente,
Gregorio Martínez Pérez,
Félix Gómez Mármol
Abstract:
While social media has been proved as an exceptionally useful tool to interact with other people and massively and quickly spread helpful information, its great potential has been ill-intentionally leveraged as well to distort political elections and manipulate constituents. In the paper at hand, we analyzed the presence and behavior of social bots on Twitter in the context of the November 2019 Sp…
▽ More
While social media has been proved as an exceptionally useful tool to interact with other people and massively and quickly spread helpful information, its great potential has been ill-intentionally leveraged as well to distort political elections and manipulate constituents. In the paper at hand, we analyzed the presence and behavior of social bots on Twitter in the context of the November 2019 Spanish general election. Throughout our study, we classified involved users as social bots or humans, and examined their interactions from a quantitative (i.e., amount of traffic generated and existing relations) and qualitative (i.e., user's political affinity and sentiment towards the most important parties) perspectives. Results demonstrated that a non-negligible amount of those bots actively participated in the election, supporting each of the five principal political parties.
△ Less
Submitted 12 October, 2020; v1 submitted 2 April, 2020;
originally announced April 2020.
-
The European Language Technology Landscape in 2020: Language-Centric and Human-Centric AI for Cross-Cultural Communication in Multilingual Europe
Authors:
Georg Rehm,
Katrin Marheinecke,
Stefanie Hegele,
Stelios Piperidis,
Kalina Bontcheva,
Jan Hajič,
Khalid Choukri,
Andrejs Vasiļjevs,
Gerhard Backfried,
Christoph Prinz,
José Manuel Gómez Pérez,
Luc Meertens,
Paul Lukowicz,
Josef van Genabith,
Andrea Lösch,
Philipp Slusallek,
Morten Irgens,
Patrick Gatellier,
Joachim Köhler,
Laure Le Bars,
Dimitra Anastasiou,
Albina Auksoriūtė,
Núria Bel,
António Branco,
Gerhard Budin
, et al. (22 additional authors not shown)
Abstract:
Multilingualism is a cultural cornerstone of Europe and firmly anchored in the European treaties including full language equality. However, language barriers impacting business, cross-lingual and cross-cultural communication are still omnipresent. Language Technologies (LTs) are a powerful means to break down these barriers. While the last decade has seen various initiatives that created a multitu…
▽ More
Multilingualism is a cultural cornerstone of Europe and firmly anchored in the European treaties including full language equality. However, language barriers impacting business, cross-lingual and cross-cultural communication are still omnipresent. Language Technologies (LTs) are a powerful means to break down these barriers. While the last decade has seen various initiatives that created a multitude of approaches and technologies tailored to Europe's specific needs, there is still an immense level of fragmentation. At the same time, AI has become an increasingly important concept in the European Information and Communication Technology area. For a few years now, AI, including many opportunities, synergies but also misconceptions, has been overshadowing every other topic. We present an overview of the European LT landscape, describing funding programmes, activities, actions and challenges in the different countries with regard to LT, including the current state of play in industry and the LT market. We present a brief overview of the main LT-related activities on the EU level in the last ten years and develop strategic guidance with regard to four key dimensions.
△ Less
Submitted 30 March, 2020;
originally announced March 2020.
-
European Language Grid: An Overview
Authors:
Georg Rehm,
Maria Berger,
Ela Elsholz,
Stefanie Hegele,
Florian Kintzel,
Katrin Marheinecke,
Stelios Piperidis,
Miltos Deligiannis,
Dimitris Galanis,
Katerina Gkirtzou,
Penny Labropoulou,
Kalina Bontcheva,
David Jones,
Ian Roberts,
Jan Hajic,
Jana Hamrlová,
Lukáš Kačena,
Khalid Choukri,
Victoria Arranz,
Andrejs Vasiļjevs,
Orians Anvari,
Andis Lagzdiņš,
Jūlija Meļņika,
Gerhard Backfried,
Erinç Dikici
, et al. (11 additional authors not shown)
Abstract:
With 24 official EU and many additional languages, multilingualism in Europe and an inclusive Digital Single Market can only be enabled through Language Technologies (LTs). European LT business is dominated by hundreds of SMEs and a few large players. Many are world-class, with technologies that outperform the global players. However, European LT business is also fragmented, by nation states, lang…
▽ More
With 24 official EU and many additional languages, multilingualism in Europe and an inclusive Digital Single Market can only be enabled through Language Technologies (LTs). European LT business is dominated by hundreds of SMEs and a few large players. Many are world-class, with technologies that outperform the global players. However, European LT business is also fragmented, by nation states, languages, verticals and sectors, significantly holding back its impact. The European Language Grid (ELG) project addresses this fragmentation by establishing the ELG as the primary platform for LT in Europe. The ELG is a scalable cloud platform, providing, in an easy-to-integrate way, access to hundreds of commercial and non-commercial LTs for all European languages, including running tools and services as well as data sets and resources. Once fully operational, it will enable the commercial and non-commercial European LT community to deposit and upload their technologies and data sets into the ELG, to deploy them through the grid, and to connect with other resources. The ELG will boost the Multilingual Digital Single Market towards a thriving European LT community, creating new jobs and opportunities. Furthermore, the ELG project organises two open calls for up to 20 pilot projects. It also sets up 32 National Competence Centres (NCCs) and the European LT Council (LTC) for outreach and coordination purposes.
△ Less
Submitted 30 March, 2020;
originally announced March 2020.
-
Making Metadata Fit for Next Generation Language Technology Platforms: The Metadata Schema of the European Language Grid
Authors:
Penny Labropoulou,
Katerina Gkirtzou,
Maria Gavriilidou,
Miltos Deligiannis,
Dimitrios Galanis,
Stelios Piperidis,
Georg Rehm,
Maria Berger,
Valérie Mapelli,
Mickaël Rigault,
Victoria Arranz,
Khalid Choukri,
Gerhard Backfried,
José Manuel Gómez Pérez,
Andres Garcia Silva
Abstract:
The current scientific and technological landscape is characterised by the increasing availability of data resources and processing tools and services. In this setting, metadata have emerged as a key factor facilitating management, sharing and usage of such digital assets. In this paper we present ELG-SHARE, a rich metadata schema catering for the description of Language Resources and Technologies…
▽ More
The current scientific and technological landscape is characterised by the increasing availability of data resources and processing tools and services. In this setting, metadata have emerged as a key factor facilitating management, sharing and usage of such digital assets. In this paper we present ELG-SHARE, a rich metadata schema catering for the description of Language Resources and Technologies (processing and generation services and tools, models, corpora, term lists, etc.), as well as related entities (e.g., organizations, projects, supporting documents, etc.). The schema powers the European Language Grid platform that aims to be the primary hub and marketplace for industry-relevant Language Technology in Europe. ELG-SHARE has been based on various metadata schemas, vocabularies, and ontologies, as well as related recommendations and guidelines.
△ Less
Submitted 30 March, 2020;
originally announced March 2020.
-
Prospects for large N gauge theories on the lattice
Authors:
Margarita Garcia Perez
Abstract:
I will review recent progress on addressing large N gauge theories on the lattice. The focus will be put on the use of large N volume independence as an effective tool to compute non-perturbative dynamics at, otherwise unreachable, large number of colours. A selection of results will be presented and future prospects and challenges for the study of large N QCD and various extensions will be discus…
▽ More
I will review recent progress on addressing large N gauge theories on the lattice. The focus will be put on the use of large N volume independence as an effective tool to compute non-perturbative dynamics at, otherwise unreachable, large number of colours. A selection of results will be presented and future prospects and challenges for the study of large N QCD and various extensions will be discussed.
△ Less
Submitted 29 January, 2020;
originally announced January 2020.
-
The twisted gradient flow running coupling in SU(3): a non-perturbative determination
Authors:
Eduardo I. Bribian,
Margarita Garcia Perez,
Alberto Ramos
Abstract:
We report some preliminary results of our ongoing non-perturbative computation of the twisted 't Hooft running coupling in a particular set-up, using the gradient flow to define the coupling and step scaling techniques to compute it. For the computation we considered a pure gauge SU(3) theory in four dimensions, defined on the lattice on an asymmetrical torus endowed with twisted boundary conditio…
▽ More
We report some preliminary results of our ongoing non-perturbative computation of the twisted 't Hooft running coupling in a particular set-up, using the gradient flow to define the coupling and step scaling techniques to compute it. For the computation we considered a pure gauge SU(3) theory in four dimensions, defined on the lattice on an asymmetrical torus endowed with twisted boundary conditions in a single plane, and related the energy scale of the coupling to an effective size combining the size of the torus and the rank of the gauge group. Additionally, we explore some of the effects of the freezing of the topology on the computation of the coupling.
△ Less
Submitted 11 January, 2020;
originally announced January 2020.
-
The meson spectrum of large N gauge theories
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Masanori Okawa
Abstract:
We present our preliminary results on the determination of the low lying meson spectrum for pure gauge theory in the large $N$ limit. Some results are also shown for the theory with two flavours of quarks in the adjoint representation.
We present our preliminary results on the determination of the low lying meson spectrum for pure gauge theory in the large $N$ limit. Some results are also shown for the theory with two flavours of quarks in the adjoint representation.
△ Less
Submitted 1 January, 2020;
originally announced January 2020.
-
The twisted gradient flow coupling at one loop
Authors:
Eduardo I. Bribian,
Margarita Garcia Perez
Abstract:
We compute the one-loop running of the $SU(N)$ 't Hooft coupling in a finite volume gradient flow scheme using twisted boundary conditions. The coupling is defined in terms of the energy density of the gradient flow fields at a scale $\tilde{l}$ given by an adequate combination of the torus size and the rank of the gauge group, and is computed in the continuum using dimensional regularization. We…
▽ More
We compute the one-loop running of the $SU(N)$ 't Hooft coupling in a finite volume gradient flow scheme using twisted boundary conditions. The coupling is defined in terms of the energy density of the gradient flow fields at a scale $\tilde{l}$ given by an adequate combination of the torus size and the rank of the gauge group, and is computed in the continuum using dimensional regularization. We present the strategy to regulate the divergences for a generic twist tensor, and determine the matching to the $\overline{\rm MS}$ scheme at one-loop order. For the particular case in which the twist tensor is non-trivial in a single plane, we evaluate the matching coefficient numerically and determine the ratio of $Λ$ parameters between the two schemes. We analyze the $N$ dependence of the results and the possible implications for non-commutative gauge theories and volume independence.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
The perturbative SU(N) one-loop running coupling in the twisted gradient flow scheme
Authors:
Eduardo I. Bribian,
Margarita Garcia Perez
Abstract:
We report on our computation of the perturbative running of the 't Hooft coupling in a pure gauge $SU(N)$ theory with twisted boundary conditions. The coupling is defined in terms of the energy density of the flow fields at a scale given by a particular combination of the linear size of the torus and the rank of the gauge group. We present our results for the matching at one-loop order to the…
▽ More
We report on our computation of the perturbative running of the 't Hooft coupling in a pure gauge $SU(N)$ theory with twisted boundary conditions. The coupling is defined in terms of the energy density of the flow fields at a scale given by a particular combination of the linear size of the torus and the rank of the gauge group. We present our results for the matching at one-loop order to the $\bar{MS}$ scheme in the case of a two-dimensional non-trivial twist. The ratio of $Λ$ parameters is determined for the case of $SU(3)$ and for various other values of the number of colours and several choices of the magnetic flux induced by the twist.
△ Less
Submitted 30 October, 2018;
originally announced October 2018.
-
The spectrum of 2+1 dimensional Yang-Mills theory on a twisted spatial torus
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Mateusz Koren,
Masanori Okawa
Abstract:
We compute and analyse the low-lying spectrum of 2+1 dimensional $SU(N)$ Yang-Mills theory on a spatial torus of size $l\times l$ with twisted boundary conditions. This paper extends our previous work \cite{Perez:2013dra}. In that paper we studied the sector with non-vanishing electric flux and concluded that the energies only depend on the parameters through two combinations: $x=λN l /(4π)$ (with…
▽ More
We compute and analyse the low-lying spectrum of 2+1 dimensional $SU(N)$ Yang-Mills theory on a spatial torus of size $l\times l$ with twisted boundary conditions. This paper extends our previous work \cite{Perez:2013dra}. In that paper we studied the sector with non-vanishing electric flux and concluded that the energies only depend on the parameters through two combinations: $x=λN l /(4π)$ (with $λ$ the 't Hooft coupling) and the twist angle $\tilde θ$ defined in terms of the magnetic flux piercing the two-dimensional box. Here we made a more complete study and we are able to condense our results, obtained by non-perturbative lattice methods, into a simple expression which has important implications for the absence of tachyonic instabilities, volume independence and non-commutative field theory. Then we extend our study to the sector of vanishing electric flux. We conclude that the onset of the would-be large-volume glueball states occurs at an approximately fixed value of $x$, much before the stringy torelon states have become very massive.
△ Less
Submitted 7 August, 2018; v1 submitted 10 July, 2018;
originally announced July 2018.
-
Perturbative contributions to Wilson loops in twisted lattice boxes and reduced models
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Masanori Okawa
Abstract:
We compute the perturbative expression of Wilson loops up to order $g^4$ for SU($N$) lattice gauge theories with Wilson action on a finite box with twisted boundary conditions. Our formulas are valid for any dimension and any irreducible twist. They contain as a special case that of the 4-dimensional Twisted Eguchi-Kawai model for a symmetric twist with flux $k$. Our results allow us to analyze th…
▽ More
We compute the perturbative expression of Wilson loops up to order $g^4$ for SU($N$) lattice gauge theories with Wilson action on a finite box with twisted boundary conditions. Our formulas are valid for any dimension and any irreducible twist. They contain as a special case that of the 4-dimensional Twisted Eguchi-Kawai model for a symmetric twist with flux $k$. Our results allow us to analyze the finite volume corrections as a function of the flux. In particular, one can quantify the approach to volume independence at large $N$ as a function of flux $k$. The contribution of fermion fields in the adjoint representation is also analyzed.
△ Less
Submitted 2 August, 2017;
originally announced August 2017.
-
`t Hooft model on the Lattice
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Liam Keegan,
Masanori Okawa
Abstract:
Lattice results are presented for the meson spectrum of 1+1 dimensional gauge theory at large $N$, using the Twisted Eguchi-Kawai model. Comparison is made to the results obtained by `t Hooft in the light cone gauge.
Lattice results are presented for the meson spectrum of 1+1 dimensional gauge theory at large $N$, using the Twisted Eguchi-Kawai model. Comparison is made to the results obtained by `t Hooft in the light cone gauge.
△ Less
Submitted 21 December, 2016;
originally announced December 2016.
-
Perturbative running of the twisted Yang-Mills coupling in the gradient flow scheme
Authors:
Eduardo I. Bribian,
Margarita Garcia Perez
Abstract:
We report on our ongoing computation of the perturbative running of the Yang-Mills coupling using gradient flow techniques. In particular, we use the gradient flow method with twisted boundary conditions to perform a perturbative expansion of the expectation value of the Yang-Mills energy density up to fourth order in the coupling at finite flow time. We regularise the resulting integrals using di…
▽ More
We report on our ongoing computation of the perturbative running of the Yang-Mills coupling using gradient flow techniques. In particular, we use the gradient flow method with twisted boundary conditions to perform a perturbative expansion of the expectation value of the Yang-Mills energy density up to fourth order in the coupling at finite flow time. We regularise the resulting integrals using dimensional regularisation, and reproduce the universal coefficient of the 1/ε term in the relation between bare and renormalised couplings. The computation of the finite part leading to a determination of the Λ parameter in this scheme is underway.
△ Less
Submitted 22 November, 2016;
originally announced November 2016.
-
Volume reduction through perturbative Wilson loops
Authors:
Margarita Garcia Perez,
Antonio Gonzalez-Arroyo,
Masanori Okawa
Abstract:
We derive the perturbative expansion of Wilson loops to order g^4 in a SU(N) lattice gauge theory with twisted boundary conditions. Our expressions show that the thermodynamic limit is attained at infinite N for any number of lattice sites and allow to quantify the deviations from volume independence at finite large N as a function of the twist.
We derive the perturbative expansion of Wilson loops to order g^4 in a SU(N) lattice gauge theory with twisted boundary conditions. Our expressions show that the thermodynamic limit is attained at infinite N for any number of lattice sites and allow to quantify the deviations from volume independence at finite large N as a function of the twist.
△ Less
Submitted 22 November, 2016;
originally announced November 2016.
-
Meson masses and decay constants at large $N$
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Masanori Okawa
Abstract:
Meson masses and decay constants in the large $N$ limit of SU($N$) gauge theory are determined using the twisted Eguchi-Kawai reduced model. To this end, we make use of a recently defined smearing method valid on the one-point lattice. This procedure, in combination with a variational analysis, allows to obtain reliable values for these quantities.
Meson masses and decay constants in the large $N$ limit of SU($N$) gauge theory are determined using the twisted Eguchi-Kawai reduced model. To this end, we make use of a recently defined smearing method valid on the one-point lattice. This procedure, in combination with a variational analysis, allows to obtain reliable values for these quantities.
△ Less
Submitted 13 November, 2016;
originally announced November 2016.
-
Mass anomalous dimension of Adjoint QCD at large N from twisted volume reduction
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Liam Keegan,
Masanori Okawa
Abstract:
In this work we consider the $SU(N)$ gauge theory with two Dirac fermions in the adjoint representation, in the limit of large $N$. In this limit the infinite-volume physics of this model can be studied by means of the corresponding twisted reduced model defined on a single site lattice. Making use of this strategy we study the reduced model for various values of $N$ up to 289. By analyzing the ei…
▽ More
In this work we consider the $SU(N)$ gauge theory with two Dirac fermions in the adjoint representation, in the limit of large $N$. In this limit the infinite-volume physics of this model can be studied by means of the corresponding twisted reduced model defined on a single site lattice. Making use of this strategy we study the reduced model for various values of $N$ up to 289. By analyzing the eigenvalue distribution of the adjoint Dirac operator we test the conformality of the theory and extract the corresponding mass anomalous dimension.
△ Less
Submitted 4 August, 2015; v1 submitted 22 June, 2015;
originally announced June 2015.
-
A comparison of updating algorithms for large N reduced models
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Liam Keegan,
Masanori Okawa,
Alberto Ramos
Abstract:
We investigate Monte Carlo updating algorithms for simulating $SU(N)$ Yang-Mills fields on a single-site lattice, such as for the Twisted Eguchi-Kawai model (TEK). We show that performing only over-relaxation (OR) updates of the gauge links is a valid simulation algorithm for the Fabricius and Haan formulation of this model, and that this decorrelates observables faster than using heat-bath update…
▽ More
We investigate Monte Carlo updating algorithms for simulating $SU(N)$ Yang-Mills fields on a single-site lattice, such as for the Twisted Eguchi-Kawai model (TEK). We show that performing only over-relaxation (OR) updates of the gauge links is a valid simulation algorithm for the Fabricius and Haan formulation of this model, and that this decorrelates observables faster than using heat-bath updates. We consider two different methods of implementing the OR update: either updating the whole $SU(N)$ matrix at once, or iterating through $SU(2)$ subgroups of the $SU(N)$ matrix, we find the same critical exponent in both cases, and only a slight difference between the two.
△ Less
Submitted 21 May, 2015;
originally announced May 2015.
-
The $SU(\infty)$ twisted gradient flow running coupling
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Liam Keegan,
Masanori Okawa
Abstract:
We measure the running of the $SU(\infty)$ 't Hooft coupling by performing a step scaling analysis of the Twisted Eguchi-Kawai (TEK) model, the SU($N$) gauge theory on a single site lattice with twisted boundary conditions. The computation relies on the conjecture that finite volume effects for SU(N) gauge theories defined on a 4-dimensional twisted torus are controlled by an effective size parame…
▽ More
We measure the running of the $SU(\infty)$ 't Hooft coupling by performing a step scaling analysis of the Twisted Eguchi-Kawai (TEK) model, the SU($N$) gauge theory on a single site lattice with twisted boundary conditions. The computation relies on the conjecture that finite volume effects for SU(N) gauge theories defined on a 4-dimensional twisted torus are controlled by an effective size parameter $\tilde l = l \sqrt{N}$, with $l$ the torus period. We set the scale for the running coupling in terms of $\tilde l$ and use the gradient flow to define a renormalized 't Hooft coupling $λ(\tilde l)$. In the TEK model, this idea allows the determination of the running of the coupling through a step scaling procedure that uses the rank of the group as a size parameter. The continuum renormalized coupling constant is extracted in the zero lattice spacing limit, which in the TEK model corresponds to the large $N$ limit taken at fixed value of $λ(\tilde l)$. The coupling constant is thus expected to coincide with that of the ordinary pure gauge theory at $N =\infty$. The idea is shown to work and permits us to follow the evolution of the coupling over a wide range of scales. At weak coupling we find a remarkable agreement with the perturbative two-loop formula for the running coupling.
△ Less
Submitted 2 December, 2014;
originally announced December 2014.
-
Glueball masses in 2+1 dimensional SU(N) gauge theories with twisted boundary conditions
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Mateusz Koren,
Masanori Okawa
Abstract:
We analyze 2+1 dimensional Yang-Mills theory regularized on a lattice with twisted boundary conditions in the spatial directions. In previous work it was shown that the observables in the non-zero electric flux sectors obey the so-called $x$-scaling, i.e. depend only on the dimensionless variable $x\propto NL/b$ and the angle $\tildeθ$ given by the parameters of the twist ($L$ being the length of…
▽ More
We analyze 2+1 dimensional Yang-Mills theory regularized on a lattice with twisted boundary conditions in the spatial directions. In previous work it was shown that the observables in the non-zero electric flux sectors obey the so-called $x$-scaling, i.e. depend only on the dimensionless variable $x\propto NL/b$ and the angle $\tildeθ$ given by the parameters of the twist ($L$ being the length of the spatial torus and $b$ the inverse 't Hooft coupling). It is conjectured that this scaling is obeyed by all physical quantities. In this work we extend the previous analyses to the zero electric flux (glueball) sector. We study the mass of the lightest scalar glueball in two theories with different $N$ but matching $x$ and $\tildeθ$ in a wide range of couplings from the perturbative small-volume regime to the non-perturbative one. We find that the results are consistent with the $x$-scaling hypothesis.
△ Less
Submitted 26 November, 2014; v1 submitted 19 November, 2014;
originally announced November 2014.
-
TEK twisted gradient flow running coupling
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Liam Keegan,
Masanori Okawa
Abstract:
We measure the running of the twisted gradient flow coupling in the Twisted Eguchi-Kawai (TEK) model, the SU(N) gauge theory on a single site lattice with twisted boundary conditions in the large N limit.
We measure the running of the twisted gradient flow coupling in the Twisted Eguchi-Kawai (TEK) model, the SU(N) gauge theory on a single site lattice with twisted boundary conditions in the large N limit.
△ Less
Submitted 2 November, 2014;
originally announced November 2014.
-
Volume independence for Yang-Mills fields on the twisted torus
Authors:
Margarita Garcia Perez,
Antonio Gonzalez-Arroyo,
Masanori Okawa
Abstract:
We review some recent results related to the notion of volume independence in SU(N) Yang-Mills theories. The topic is discussed in the context of gauge theories living on a d-dimensional torus with twisted boundary conditions. After a brief introduction reviewing the formalism for introducing gauge fields on a torus, we discuss how volume independence arises in perturbation theory. We show how, fo…
▽ More
We review some recent results related to the notion of volume independence in SU(N) Yang-Mills theories. The topic is discussed in the context of gauge theories living on a d-dimensional torus with twisted boundary conditions. After a brief introduction reviewing the formalism for introducing gauge fields on a torus, we discuss how volume independence arises in perturbation theory. We show how, for appropriately chosen twist tensors, perturbative results to all orders in the 't Hooft coupling depend on a specific combination of the rank of the gauge group (N) and the periods of the torus (l) given by l N^{2/d}, for d even.We discuss the well-known relation to non-commutative field theories and address certain threats to volume independence associated to the occurrence of tachyonic instabilities at one-loop order. We end by presenting some numerical results in 2+1 dimensions that extend these ideas to the non-perturbative domain.
△ Less
Submitted 21 June, 2014;
originally announced June 2014.
-
Perturbative analysis of twisted volume reduced theories
Authors:
Margarita Garcia Perez,
Antonio Gonzalez-Arroyo,
Masanori Okawa
Abstract:
We discuss the perturbative expansion of SU(N) Yang-Mills theories defined on a d-dimensional torus of linear size l with twisted boundary conditions, generalizing previous results in the literature. For a specific class of twist tensors depending on a single integer flux value k, we show that perturbative results to all orders depend on the combination lN^(2/d) and a flux-dependent angle theta. T…
▽ More
We discuss the perturbative expansion of SU(N) Yang-Mills theories defined on a d-dimensional torus of linear size l with twisted boundary conditions, generalizing previous results in the literature. For a specific class of twist tensors depending on a single integer flux value k, we show that perturbative results to all orders depend on the combination lN^(2/d) and a flux-dependent angle theta. This implies a new kind of volume independence that holds at finite N and for fixed values of theta. Our results also provide interesting information about the possible occurrence of tachyonic instabilities at one-loop order. We support the prescription that instabilities are avoided, if the large N limit is taken kee** theta > theta_c, and appropriately scaling the magnetic flux k with N. Numerical results in 2+1 dimensions provide a test of how these ideas extend into the non-perturbative regime.
△ Less
Submitted 14 November, 2013;
originally announced November 2013.
-
Mass anomalous dimension from large N twisted volume reduction
Authors:
Margarita Garcia Perez,
Antonio Gonzalez-Arroyo,
Liam Keegan,
Masanori Okawa
Abstract:
In this work we consider the SU(N) gauge theory with two Dirac fermions in the adjoint representation, in the limit of large N. Taking advantage of large N twisted volume reduction we do this on a single site lattice, but we should still get infinite-volume physics in the large N limit. We describe our progress in extracting the mass anomalous dimension from the eigenvalue distribution of the adjo…
▽ More
In this work we consider the SU(N) gauge theory with two Dirac fermions in the adjoint representation, in the limit of large N. Taking advantage of large N twisted volume reduction we do this on a single site lattice, but we should still get infinite-volume physics in the large N limit. We describe our progress in extracting the mass anomalous dimension from the eigenvalue distribution of the adjoint Dirac operator, using data for N up to 289.
△ Less
Submitted 11 November, 2013;
originally announced November 2013.
-
Spatial volume dependence for 2+1 dimensional SU(N) Yang-Mills theory
Authors:
Margarita García Pérez,
Antonio González-Arroyo,
Masanori Okawa
Abstract:
We study the 2+1 dimensional SU(N) Yang-Mills theory on a finite two-torus with twisted boundary conditions. Our goal is to study the interplay between the rank of the group N, the length of the torus L and the Z_N magnetic flux. After presenting the classical and quantum formalism, we analyze the spectrum of the theory using perturbation theory to one-loop and using Monte Carlo techniques on the…
▽ More
We study the 2+1 dimensional SU(N) Yang-Mills theory on a finite two-torus with twisted boundary conditions. Our goal is to study the interplay between the rank of the group N, the length of the torus L and the Z_N magnetic flux. After presenting the classical and quantum formalism, we analyze the spectrum of the theory using perturbation theory to one-loop and using Monte Carlo techniques on the lattice. In perturbation theory, results to all orders depend on the combination x=λNL and an angle defined in terms of the magnetic flux (λ is 't Hooft coupling). Thus, fixing the angle, the system exhibits a form of volume independence (NL dependence). The numerical results interpolate between our perturbative calculations and the confinement regime. They are consistent with x-scaling and provide interesting information about the k-string spectrum and effective string theories. The occurrence of tachyonic instabilities is also analysed. They seem to be avoidable in the large N limit with a suitable scaling of the magnetic flux.
△ Less
Submitted 19 July, 2013;
originally announced July 2013.
-
Volume dependence in 2+1 Yang-Mills theory
Authors:
Margarita Garcia Perez,
Antonio Gonzalez-Arroyo,
Masanori Okawa
Abstract:
We present the results of an analysis of a 2+1 dimensional pure SU(N) Yang-Mills theory formulated on a 2-dimensional spatial torus with non-trivial magnetic flux. We focus on investigating the dependence of the electric-flux spectrum, extracted from Polyakov loop correlators, with the spatial size l, the number of colours N, and the magnetic flux m. The size of the torus acts a parameter that all…
▽ More
We present the results of an analysis of a 2+1 dimensional pure SU(N) Yang-Mills theory formulated on a 2-dimensional spatial torus with non-trivial magnetic flux. We focus on investigating the dependence of the electric-flux spectrum, extracted from Polyakov loop correlators, with the spatial size l, the number of colours N, and the magnetic flux m. The size of the torus acts a parameter that allows to control the onset of non-perturbative effects. In the small volume regime, where perturbation theory holds, we derive the one-loop self-energy correction to the single-gluon spectrum, for arbitrary N and m. We discuss the transition from small to large volumes that has been investigated by means of Monte-Carlo simulations. We argue that the energy of electric flux e, for the lowest gluon momentum, depends solely on e/N and on the dimensionless variable x=lambda N l, with lambda the 't Hooft coupling. The variable x can be interpreted as the dimensionless 't Hooft coupling for an effective box size given by Nl. This implies a version of reduction that allows to trade l by N without modifying the electric-flux energy.
△ Less
Submitted 16 November, 2012; v1 submitted 5 November, 2012;
originally announced November 2012.