-
A thermodynamically consistent physics-informed deep learning material model for short fiber/polymer nanocomposites
Authors:
Betim Bahtiri,
Behrouz Arash,
Sven Scheffler,
Maximilian Jux,
Raimund Rolfes
Abstract:
This work proposes a physics-informed deep learning (PIDL)-based constitutive model for investigating the viscoelastic-viscoplastic behavior of short fiber-reinforced nanoparticle-filled epoxies under various ambient conditions. The deep-learning model is trained to enforce thermodynamic principles, leading to a thermodynamically consistent constitutive model. To accomplish this, a long short-term…
▽ More
This work proposes a physics-informed deep learning (PIDL)-based constitutive model for investigating the viscoelastic-viscoplastic behavior of short fiber-reinforced nanoparticle-filled epoxies under various ambient conditions. The deep-learning model is trained to enforce thermodynamic principles, leading to a thermodynamically consistent constitutive model. To accomplish this, a long short-term memory network is combined with a feed-forward neural network to predict internal variables required for characterizing the internal dissipation of the nanocomposite materials. In addition, another feed-forward neural network is used to indicate the free-energy function, which enables defining the thermodynamic state of the entire system. The PIDL model is initially developed for the three-dimensional case by generating synthetic data from a classical constitutive model. The model is then trained by extracting the data directly from cyclic loading-unloading experimental tests. Numerical examples show that the PIDL model can accurately predict the mechanical behavior of epoxy-based nanocomposites for different volume fractions of fibers and nanoparticles under various hygrothermal conditions.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
Mind the Gap: Securely modeling cyber risk based on security deviations from a peer group
Authors:
Taylor Reynolds,
Sarah Scheffler,
Daniel J. Weitzner,
Angelina Wu
Abstract:
There are two strategic and longstanding questions about cyber risk that organizations largely have been unable to answer: What is an organization's estimated risk exposure and how does its security compare with peers? Answering both requires industry-wide data on security posture, incidents, and losses that, until recently, have been too sensitive for organizations to share. Now, privacy enhancin…
▽ More
There are two strategic and longstanding questions about cyber risk that organizations largely have been unable to answer: What is an organization's estimated risk exposure and how does its security compare with peers? Answering both requires industry-wide data on security posture, incidents, and losses that, until recently, have been too sensitive for organizations to share. Now, privacy enhancing technologies (PETs) such as cryptographic computing can enable the secure computation of aggregate cyber risk metrics from a peer group of organizations while leaving sensitive input data undisclosed. As these new aggregate data become available, analysts need ways to integrate them into cyber risk models that can produce more reliable risk assessments and allow comparison to a peer group. This paper proposes a new framework for benchmarking cyber posture against peers and estimating cyber risk within specific economic sectors using the new variables emerging from secure computations. We introduce a new top-line variable called the Defense Gap Index representing the weighted security gap between an organization and its peers that can be used to forecast an organization's own security risk based on historical industry data. We apply this approach in a specific sector using data collected from 25 large firms, in partnership with an industry ISAO, to build an industry risk model and provide tools back to participants to estimate their own risk exposure and privately compare their security posture with their peers.
△ Less
Submitted 6 February, 2024;
originally announced February 2024.
-
A machine learning-based viscoelastic-viscoplastic model for epoxy nanocomposites with moisture content
Authors:
Betim Bahtiri,
Behrouz Arash,
Sven Scheffler,
Maximilian Jux,
Raimund Rolfes
Abstract:
In this work, we propose a deep learning (DL)-based constitutive model for investigating the cyclic viscoelastic-viscoplastic-damage behavior of nanoparticle/epoxy nanocomposites with moisture content. For this, a long short-term memory network is trained using a combined framework of a sampling technique and a perturbation method. The training framework, along with the training data generated by…
▽ More
In this work, we propose a deep learning (DL)-based constitutive model for investigating the cyclic viscoelastic-viscoplastic-damage behavior of nanoparticle/epoxy nanocomposites with moisture content. For this, a long short-term memory network is trained using a combined framework of a sampling technique and a perturbation method. The training framework, along with the training data generated by an experimentally validated viscoelastic-viscoplastic model, enables the DL model to accurately capture the rate-dependent stress-strain relationship and consistent tangent moduli. In addition, the DL-based constitutive model is implemented into finite element analysis. Finite element simulations are performed to study the effect of load rate and moisture content on the force-displacement response of nanoparticle/ epoxy samples. Numerical examples show that the computational efficiency of the DL model depends on the loading condition and is significantly higher than the conventional constitutive model. Furthermore, comparing numerical results and experimental data demonstrates good agreement with different nanoparticle and moisture contents.
△ Less
Submitted 14 May, 2023;
originally announced May 2023.
-
SoK: Content Moderation for End-to-End Encryption
Authors:
Sarah Scheffler,
Jonathan Mayer
Abstract:
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy create new content moderation challenges for online services, because services can no longer directly access plaintext content. While ongoing public policy debates about E2EE and content moderation in the United States and Eu…
▽ More
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy create new content moderation challenges for online services, because services can no longer directly access plaintext content. While ongoing public policy debates about E2EE and content moderation in the United States and European Union emphasize child sexual abuse material and misinformation in messaging and storage, we identify and synthesize a wealth of scholarship that goes far beyond those topics. We bridge literature that is diverse in both content moderation subject matter, such as malware, spam, hate speech, terrorist content, and enterprise policy compliance, as well as intended deployments, including not only privacy-preserving content moderation for messaging, email, and cloud storage, but also private introspection of encrypted web traffic by middleboxes. In this work, we systematize the study of content moderation in E2EE settings. We set out a process pipeline for content moderation, drawing on a broad interdisciplinary literature that is not specific to E2EE. We examine cryptography and policy design choices at all stages of this pipeline, and we suggest areas of future research to fill gaps in literature and better understand possible paths forward.
△ Less
Submitted 7 March, 2023;
originally announced March 2023.
-
Can the Government Compel Decryption? Don't Trust -- Verify
Authors:
Aloni Cohen,
Sarah Scheffler,
Mayank Varia
Abstract:
If a court knows that a respondent knows the password to a device, can the court compel the respondent to enter that password into the device? In this work, we propose a new approach to the foregone conclusion doctrine from Fisher v US that governs the answer to this question. The Holy Grail of this line of work would be a framework for reasoning about whether the testimony implicit in any action…
▽ More
If a court knows that a respondent knows the password to a device, can the court compel the respondent to enter that password into the device? In this work, we propose a new approach to the foregone conclusion doctrine from Fisher v US that governs the answer to this question. The Holy Grail of this line of work would be a framework for reasoning about whether the testimony implicit in any action is already known to the government. In this paper we attempt something narrower. We introduce a framework for specifying actions for which all implicit testimony is, constructively, a foregone conclusion. Our approach is centered around placing the burden of proof on the government to demonstrate that it is not "rely[ing] on the truthtelling" of the respondent.
Building on original legal analysis and using precise computer science formalisms, we propose demonstrability as a new central concept for describing compelled acts. We additionally provide a language for whether a compelled action meaningfully entails the respondent to perform in a manner that is 'as good as' the government's desired goal. Then, we apply our definitions to analyze the compellability of several cryptographic primitives including decryption, multifactor authentication, commitment schemes, and hash functions. In particular, our framework reaches a novel conclusion about compelled decryption in the setting that the encryption scheme is deniable: the government can compel but the respondent is free to use any password of her choice.
△ Less
Submitted 9 September, 2022; v1 submitted 4 August, 2022;
originally announced August 2022.
-
Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity
Authors:
Sarah Scheffler,
Eran Tromer,
Mayank Varia
Abstract:
A central notion in U.S. copyright law is judging the substantial similarity between an original and an (allegedly) derived work. Capturing this notion has proven elusive, and the many approaches offered by case law and legal scholarship are often ill-defined, contradictory, or internally-inconsistent.
This work suggests that key parts of the substantial-similarity puzzle are amendable to modeli…
▽ More
A central notion in U.S. copyright law is judging the substantial similarity between an original and an (allegedly) derived work. Capturing this notion has proven elusive, and the many approaches offered by case law and legal scholarship are often ill-defined, contradictory, or internally-inconsistent.
This work suggests that key parts of the substantial-similarity puzzle are amendable to modeling inspired by theoretical computer science. Our proposed framework quantitatively evaluates how much "novelty" is needed to produce the derived work with access to the original work, versus reproducing it without access to the copyrighted elements of the original work. "Novelty" is captured by a computational notion of description length, in the spirit of Kolmogorov-Levin complexity, which is robust to mechanical transformations and availability of contextual information.
This results in an actionable framework that could be used by courts as an aid for deciding substantial similarity. We evaluate it on several pivotal cases in copyright law and observe that the results are consistent with the rulings, and are philosophically aligned with the abstraction-filtration-comparison test of Altai.
△ Less
Submitted 14 June, 2022; v1 submitted 2 June, 2022;
originally announced June 2022.
-
Arithmetic Expression Construction
Authors:
Leo Alcock,
Sualeh Asif,
Jeffrey Bosboom,
Josh Brunner,
Charlotte Chen,
Erik D. Demaine,
Rogers Epstein,
Adam Hesterberg,
Lior Hirschfeld,
William Hu,
Jayson Lynch,
Sarah Scheffler,
Lillian Zhang
Abstract:
When can $n$ given numbers be combined using arithmetic operators from a given subset of $\{+, -, \times, ÷\}$ to obtain a given target number? We study three variations of this problem of Arithmetic Expression Construction: when the expression (1) is unconstrained; (2) has a specified pattern of parentheses and operators (and only the numbers need to be assigned to blanks); or (3) must match a sp…
▽ More
When can $n$ given numbers be combined using arithmetic operators from a given subset of $\{+, -, \times, ÷\}$ to obtain a given target number? We study three variations of this problem of Arithmetic Expression Construction: when the expression (1) is unconstrained; (2) has a specified pattern of parentheses and operators (and only the numbers need to be assigned to blanks); or (3) must match a specified ordering of the numbers (but the operators and parenthesization are free). For each of these variants, and many of the subsets of $\{+,-,\times,÷\}$, we prove the problem NP-complete, sometimes in the weak sense and sometimes in the strong sense. Most of these proofs make use of a "rational function framework" which proves equivalence of these problems for values in rational functions with values in positive integers.
△ Less
Submitted 23 November, 2020;
originally announced November 2020.
-
PSPACE-completeness of Pulling Blocks to Reach a Goal
Authors:
Hayashi Ani,
Sualeh Asif,
Erik D. Demaine,
Jenny Diomidova,
Dylan Hendrickson,
Jayson Lynch,
Sarah Scheffler,
Adam Suhl
Abstract:
We prove PSPACE-completeness of all but one problem in a large space of pulling-block problems where the goal is for the agent to reach a target destination. The problems are parameterized by whether pulling is optional, the number of blocks which can be pulled simultaneously, whether there are fixed blocks or thin walls, and whether there is gravity. We show NP-hardness for the remaining proble…
▽ More
We prove PSPACE-completeness of all but one problem in a large space of pulling-block problems where the goal is for the agent to reach a target destination. The problems are parameterized by whether pulling is optional, the number of blocks which can be pulled simultaneously, whether there are fixed blocks or thin walls, and whether there is gravity. We show NP-hardness for the remaining problem, Pull?-1FG (optional pulling, strength 1, fixed blocks, with gravity).
△ Less
Submitted 25 February, 2022; v1 submitted 7 June, 2020;
originally announced June 2020.
-
Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies
Authors:
Julissa Milligan,
Sarah Scheffler,
Andrew Sellars,
Trishita Tiwari,
Ari Trachtenberg,
Mayank Varia
Abstract:
Recent developments in online tracking make it harder for individuals to detect and block trackers. Some sites have deployed indirect tracking methods, which attempt to uniquely identify a device by asking the browser to perform a seemingly-unrelated task. One type of indirect tracking, Canvas fingerprinting, causes the browser to render a graphic recording rendering statistics as a unique identif…
▽ More
Recent developments in online tracking make it harder for individuals to detect and block trackers. Some sites have deployed indirect tracking methods, which attempt to uniquely identify a device by asking the browser to perform a seemingly-unrelated task. One type of indirect tracking, Canvas fingerprinting, causes the browser to render a graphic recording rendering statistics as a unique identifier. In this work, we observe how indirect device fingerprinting methods are disclosed in privacy policies, and consider whether the disclosures are sufficient to enable website visitors to block the tracking methods. We compare these disclosures to the disclosure of direct fingerprinting methods on the same websites.
Our case study analyzes one indirect fingerprinting technique, Canvas fingerprinting. We use an existing automated detector of this fingerprinting technique to conservatively detect its use on Alexa Top 500 websites that cater to United States consumers, and we examine the privacy policies of the resulting 28 websites. Disclosures of indirect fingerprinting vary in specificity. None described the specific methods with enough granularity to know the website used Canvas fingerprinting. Conversely, many sites did provide enough detail about usage of direct fingerprinting methods to allow a website visitor to reliably detect and block those techniques.
We conclude that indirect fingerprinting methods are often difficult to detect and are not identified with specificity in privacy policies. This makes indirect fingerprinting more difficult to block, and therefore risks disturbing the tentative armistice between individuals and websites currently in place for direct fingerprinting. This paper illustrates differences in fingerprinting approaches, and explains why technologists, technology lawyers, and policymakers need to appreciate the challenges of indirect fingerprinting.
△ Less
Submitted 21 August, 2019;
originally announced August 2019.
-
From Soft Classifiers to Hard Decisions: How fair can we be?
Authors:
Ran Canetti,
Aloni Cohen,
Nishanth Dikkala,
Govind Ramnarayan,
Sarah Scheffler,
Adam Smith
Abstract:
A popular methodology for building binary decision-making classifiers in the presence of imperfect information is to first construct a non-binary "scoring" classifier that is calibrated over all protected groups, and then to post-process this score to obtain a binary decision. We study the feasibility of achieving various fairness properties by post-processing calibrated scores, and then show that…
▽ More
A popular methodology for building binary decision-making classifiers in the presence of imperfect information is to first construct a non-binary "scoring" classifier that is calibrated over all protected groups, and then to post-process this score to obtain a binary decision. We study the feasibility of achieving various fairness properties by post-processing calibrated scores, and then show that deferring post-processors allow for more fairness conditions to hold on the final decision. Specifically, we show:
1. There does not exist a general way to post-process a calibrated classifier to equalize protected groups' positive or negative predictive value (PPV or NPV). For certain "nice" calibrated classifiers, either PPV or NPV can be equalized when the post-processor uses different thresholds across protected groups, though there exist distributions of calibrated scores for which the two measures cannot be both equalized. When the post-processing consists of a single global threshold across all groups, natural fairness properties, such as equalizing PPV in a nontrivial way, do not hold even for "nice" classifiers.
2. When the post-processing is allowed to `defer' on some decisions (that is, to avoid making a decision by handing off some examples to a separate process), then for the non-deferred decisions, the resulting classifier can be made to equalize PPV, NPV, false positive rate (FPR) and false negative rate (FNR) across the protected groups. This suggests a way to partially evade the impossibility results of Chouldechova and Kleinberg et al., which preclude equalizing all of these measures simultaneously. We also present different deferring strategies and show how they affect the fairness properties of the overall system.
We evaluate our post-processing techniques using the COMPAS data set from 2016.
△ Less
Submitted 21 January, 2019; v1 submitted 3 October, 2018;
originally announced October 2018.
-
Kepler Flares II: The Temporal Morphology of White-Light Flares on GJ 1243
Authors:
James R. A. Davenport,
Suzanne L. Hawley,
Leslie Hebb,
John P. Wisniewski,
Adam F. Kowalski,
Emily C. Johnson,
Michael Malatesta,
Jesus Peraza,
Marcus Keil,
Steven M. Silverberg,
Tiffany C. Jansen,
Matthew S. Scheffler,
Jodi R. Berdis,
Daniel M. Larsen,
Eric J. Hilton
Abstract:
We present the largest sample of flares ever compiled for a single M dwarf, the active M4 star GJ 1243. Over 6100 individual flare events, with energies ranging from $10^{29}$ to $10^{33}$ erg, are found in 11 months of 1-minute cadence data from Kepler. This sample is unique for its completeness and dynamic range. We have developed automated tools for finding flares in short-cadence Kepler light…
▽ More
We present the largest sample of flares ever compiled for a single M dwarf, the active M4 star GJ 1243. Over 6100 individual flare events, with energies ranging from $10^{29}$ to $10^{33}$ erg, are found in 11 months of 1-minute cadence data from Kepler. This sample is unique for its completeness and dynamic range. We have developed automated tools for finding flares in short-cadence Kepler light curves, and performed extensive validation and classification of the sample by eye. From this pristine sample of flares we generate a median flare template. This template shows that two exponential cooling phases are present during the white-light flare decay, providing fundamental constraints for models of flare physics. The template is also used as a basis function to decompose complex multi-peaked flares, allowing us to study the energy distribution of these events. Only a small number of flare events are not well fit by our template. We find that complex, multi-peaked flares occur in over 80% of flares with a duration of 50 minutes or greater. The underlying distribution of flare durations for events 10 minutes and longer appears to follow a broken power law. Our results support the idea that sympathetic flaring may be responsible for some complex flare events.
△ Less
Submitted 13 November, 2014;
originally announced November 2014.
-
Out of equilibrium dynamics of coherent non-abelian gauge fields
Authors:
J. Berges,
S. Scheffler,
S. Schlichting,
D. Sexty
Abstract:
We study out-of-equilibrium dynamics of intense non-abelian gauge fields. Generalizing the well-known Nielsen-Olesen instabilities for constant initial color-magnetic fields, we investigate the impact of temporal modulations and fluctuations in the initial conditions. This leads to a remarkable coexistence of the original Nielsen-Olesen instability and the subdominant phenomenon of parametric reso…
▽ More
We study out-of-equilibrium dynamics of intense non-abelian gauge fields. Generalizing the well-known Nielsen-Olesen instabilities for constant initial color-magnetic fields, we investigate the impact of temporal modulations and fluctuations in the initial conditions. This leads to a remarkable coexistence of the original Nielsen-Olesen instability and the subdominant phenomenon of parametric resonance. Taking into account that the fields may be correlated only over a limited transverse size, we model characteristic aspects of the dynamics of color flux tubes relevant in the context of heavy-ion collisions.
△ Less
Submitted 30 January, 2012; v1 submitted 11 November, 2011;
originally announced November 2011.
-
Simulating plasma instabilities in SU(3) gauge theory
Authors:
J. Berges,
D. Gelfand,
S. Scheffler,
D. Sexty
Abstract:
We compute nonequilibrium dynamics of plasma instabilities in classical-statistical lattice gauge theory in 3+1 dimensions. The simulations are done for the first time for the SU(3) gauge group relevant for quantum chromodynamics. We find a qualitatively similar behavior as compared to earlier investigations in SU(2) gauge theory. The characteristic growth rates are about 25 % lower for given en…
▽ More
We compute nonequilibrium dynamics of plasma instabilities in classical-statistical lattice gauge theory in 3+1 dimensions. The simulations are done for the first time for the SU(3) gauge group relevant for quantum chromodynamics. We find a qualitatively similar behavior as compared to earlier investigations in SU(2) gauge theory. The characteristic growth rates are about 25 % lower for given energy density, such that the isotropization process is slower. Measured in units of the characteristic screening mass, the primary growth rate is independent of the number of colors.
△ Less
Submitted 4 May, 2009; v1 submitted 19 December, 2008;
originally announced December 2008.
-
Turbulent spectra in real-time gauge field evolution
Authors:
Sebastian Scheffler
Abstract:
We investigate ultraviolet fixed points in the real-time evolution of non-Abelian gauge fields. Classical-statistical lattice simulations reveal equal-time correlation functions with a spectral index 3/2. Analytical understanding of this result is achieved by employing a 2PI- loop expansion for the quantum theory.
We investigate ultraviolet fixed points in the real-time evolution of non-Abelian gauge fields. Classical-statistical lattice simulations reveal equal-time correlation functions with a spectral index 3/2. Analytical understanding of this result is achieved by employing a 2PI- loop expansion for the quantum theory.
△ Less
Submitted 12 December, 2008;
originally announced December 2008.
-
Turbulence in nonabelian gauge theory
Authors:
J. Berges,
S. Scheffler,
D. Sexty
Abstract:
Kolmogorov wave turbulence plays an important role for the thermalization process following plasma instabilities in nonabelian gauge theories. We show that classical-statistical simulations in SU(2) gauge theory indicate a Kolmogorov scaling exponent known from scalar models. In the range of validity of resummed perturbation theory this result is shown to agree with analytical estimates. We stud…
▽ More
Kolmogorov wave turbulence plays an important role for the thermalization process following plasma instabilities in nonabelian gauge theories. We show that classical-statistical simulations in SU(2) gauge theory indicate a Kolmogorov scaling exponent known from scalar models. In the range of validity of resummed perturbation theory this result is shown to agree with analytical estimates. We study the effect of classical-statistical versus quantum corrections and demonstrate that the latter lead to the absence of turbulence in the far ultraviolet.
△ Less
Submitted 25 August, 2009; v1 submitted 26 November, 2008;
originally announced November 2008.
-
Scalar Field Theory with a Non-Standard Potential
Authors:
Sebastian Scheffler,
Ralf Hofmann,
Ion-Olimpiu Stamatescu
Abstract:
We study the phase structure of a 4D complex scalar field theory with a potential V(Phi) = | Lambda^3 / Phi - Lambda Phi |^2 at zero and at finite temperature. The model is analyzed by mean field and Monte Carlo methods. At zero temperature the theory falls in the universality class of the 4D Ising model when varying Lambda. The situation is less clear-cut for variations w.r.t. Lambda at large t…
▽ More
We study the phase structure of a 4D complex scalar field theory with a potential V(Phi) = | Lambda^3 / Phi - Lambda Phi |^2 at zero and at finite temperature. The model is analyzed by mean field and Monte Carlo methods. At zero temperature the theory falls in the universality class of the 4D Ising model when varying Lambda. The situation is less clear-cut for variations w.r.t. Lambda at large temperatures and variations w.r.t. temperature at a given value of Lambda. We observe temperature independence of the mass of the first excitation.
△ Less
Submitted 1 December, 2008; v1 submitted 21 December, 2007;
originally announced December 2007.
-
Bottom-up isotropization in classical-statistical lattice gauge theory
Authors:
J. Berges,
S. Scheffler,
D. Sexty
Abstract:
We compute nonequilibrium dynamics for classical-statistical SU(2) pure gauge theory on a lattice. We consider anisotropic initial conditions with high occupation numbers in the transverse plane on a characteristic scale ~ Q_s. This is used to investigate the very early stages of the thermalization process in the context of heavy-ion collisions. We find Weibel or "primary" instabilities with gro…
▽ More
We compute nonequilibrium dynamics for classical-statistical SU(2) pure gauge theory on a lattice. We consider anisotropic initial conditions with high occupation numbers in the transverse plane on a characteristic scale ~ Q_s. This is used to investigate the very early stages of the thermalization process in the context of heavy-ion collisions. We find Weibel or "primary" instabilities with growth rates similar to those obtained from previous treatments employing anisotropic distributions of hard modes (particles) in the weak coupling limit. We observe "secondary" growth rates for higher-momentum modes reaching substantially larger values and we analyse them in terms of resummed loop diagrams beyond the hard-loop approximation. We find that a coarse grained pressure isotropizes "bottom-up" with a characteristic inverse rate of gamma^{-1} ~ 1 - 2 fm/c for coarse graining momentum scales of p < 1 GeV choosing an initial energy density for RHIC of epsilon = 30 GeV/fm^3. The nonequilibrium spatial Wilson loop is found to exhibit an area law and to become isotropic on a similar time scale.
△ Less
Submitted 11 January, 2008; v1 submitted 20 December, 2007;
originally announced December 2007.
-
Disorder Effects in d-wave Superconductors
Authors:
C. T. Rieck,
K. Scharnberg,
S. Scheffler
Abstract:
In the theoretical analyses of impurity effects in superconductors the assumption is usually made that all quantities, except for the Green functions, are slowly varying functions of energy. When this so-called Fermi Surface Restricted Approximation is combined with the assumption that impurities can be represented by delta-function potentials of arbitrary strength, many reasonable looking resul…
▽ More
In the theoretical analyses of impurity effects in superconductors the assumption is usually made that all quantities, except for the Green functions, are slowly varying functions of energy. When this so-called Fermi Surface Restricted Approximation is combined with the assumption that impurities can be represented by delta-function potentials of arbitrary strength, many reasonable looking results can be obtained. The agreement with experiments is not entirely satisfactory and one reason for this might be the assumption that the impurity potential has zero range. The generalization to finite range potentials appears to be straightforward, independent of the strength of the potential. However, the selfenergy resulting from scattering off finite range impurities of infinite strength such as hard spheres, diverges in this approximation at frequencies much larger than the gap amplitude! To track down the source of this unacceptable result we consider the normal state. The elementary results for scattering off a hard sphere, including the result that even an infinitely strong delta-function potential does not lead to scattering at all in systems of two and more dimensions, are recovered only when the energy dependencies of all quantities involved are properly taken into account. To obtain resonant scattering, believed to be important for the creation of mid-gap states, the range of the potential is almost as important as its strength.
△ Less
Submitted 29 September, 2006;
originally announced September 2006.
-
Effects of disorder with finite range on the properties of d-wave superconductors
Authors:
Carsten T. Rieck,
Kurt Scharnberg,
Simon Scheffler
Abstract:
It has long been established that disorder has profound effects on unconventional superconductors and it has been suggested repeatedly that observation and analysis of these disorder effects can help to identify the order parameter symmetry. In much of the relevant literature, including very sophisticated calculations of interference and weak localization effects, the disorder is represented by…
▽ More
It has long been established that disorder has profound effects on unconventional superconductors and it has been suggested repeatedly that observation and analysis of these disorder effects can help to identify the order parameter symmetry. In much of the relevant literature, including very sophisticated calculations of interference and weak localization effects, the disorder is represented by delta-function scatterers of arbitrary strength. One obvious shortcoming of this approximation is that resonant scattering resulting from the wavelength of the scattered quasiparticle matching the spatial extent of the defect is not included. We find that the mitigation of the Tc-reduction, expected when d-wave scattering is included, is very sensitive to the average strength of the scattering potential and is most effective for weak scatterers. Disorder with finite range not only has drastic effects on the predicted density of states at low energies, relevant for transport properties, but affects the spectral function at all energies up to the order parameter amplitude. The gap structure, which does not appear to be of the simplest d-wave form, should show a defect-dependent variation with temperature, which could be detected in ARPES experiments.
△ Less
Submitted 13 August, 2004;
originally announced August 2004.
-
In-plane dipole coupling anisotropy of a square ferromagnetic Heisenberg monolayer
Authors:
M. Dantziger,
B. Glinsmann,
S. Scheffler,
B. Zimmermann,
P. J. Jensen
Abstract:
In this study we calculate the dipole-coupling-induced quartic in-plane anisotropy of a square ferromagnetic Heisenberg monolayer. This anisotropy increases with an increasing temperature, reaching its maximum value close to the Curie temperature of the system. At T=0 the system is isotropic, besides a small remaining anisotropy due to the zero-point motion of quantum mechanical spins. The reaso…
▽ More
In this study we calculate the dipole-coupling-induced quartic in-plane anisotropy of a square ferromagnetic Heisenberg monolayer. This anisotropy increases with an increasing temperature, reaching its maximum value close to the Curie temperature of the system. At T=0 the system is isotropic, besides a small remaining anisotropy due to the zero-point motion of quantum mechanical spins. The reason for the dipole-coupling-induced anisotropy is the disturbance of the square spin lattice due to thermal fluctuations ('order-by-disorder' effect). For usual ferromagnets its strength is small as compared to other anisotropic contributions, and decreases by application of an external magnetic field. The results are obtained from a Heisenberg Hamiltonian by application of a mean field approach for a spin cluster, as well as from a many-body Green's function theory within the Tyablikov-decoupling (RPA).
△ Less
Submitted 16 August, 2002;
originally announced August 2002.