-
Gapped nodal planes drive a large topological Nernst effect in a chiral lattice antiferromagnet
Authors:
N. D. Khanh,
S. Minami,
M. Hirschmann,
T. Nomoto,
M. C. Jiang,
R. Yamada,
N. Heinsdorf,
D. Yamaguchi,
Y. Hayashi,
Y. Okamura,
H. Watanabe,
G. Y. Guo,
Y. Takahashi,
S. Seki,
Y. Taguchi,
Y. Tokura,
R. Arita,
M. Hirschberger
Abstract:
The electronic structure of compensated antiferromagnets (CAF) has drawn attention for its ability to create large responses, reminiscent of ferromagnets and suitable for data storage and readout, despite (nearly) net-zero spontaneous magnetization. Many of the striking experimental signatures predicted for CAF, such as giant thermoelectric Nernst effects, are enhanced when two or more electronic…
▽ More
The electronic structure of compensated antiferromagnets (CAF) has drawn attention for its ability to create large responses, reminiscent of ferromagnets and suitable for data storage and readout, despite (nearly) net-zero spontaneous magnetization. Many of the striking experimental signatures predicted for CAF, such as giant thermoelectric Nernst effects, are enhanced when two or more electronic bands are nearly degenerate in vicinity of the Fermi energy. Here, we use thermoelectric and electric transport experiments to study the electronic structure of the layered, chiral metal CoNb3S6 in its all-in-all-out CAF ground state and report near-degeneracies of electron bands at the upper and lower boundaries of the first Brillouin zone. Considering non-symmorphic spin-space group symmetries in the non-relativistic approximation for the ordered phase, these near-degeneracies are approximately protected by a lattice translation combined with spin rotation, and are vestiges of nodal planes enforced by a screw axis symmetry in the paramagnetic state. Hot spots of emergent, or fictitious, magnetic fields are formed at the slightly gapped nodal plane, generating the spontaneous Hall and Nernst effects in this CAF. Taking into account more than six hundred Wannier orbitals, our model quantitatively reproduces the observed spontaneous Nernst effect, emphasizes the role of proximate symmetries in the emergent responses of CAF, and demonstrates the promise of ab-initio search for functional responses in a wide class of materials with reconstructed unit cells due to spin or charge order.
△ Less
Submitted 12 May, 2024; v1 submitted 2 March, 2024;
originally announced March 2024.
-
Running Newton Coupling, Scale Identification and Black Hole Thermodynamics
Authors:
Chiang-Mei Chen,
Yi Chen,
Akihiro Ishibashi,
Nobuyoshi Ohta,
Daiki Yamaguchi
Abstract:
We discuss the quantum improvement of black hole solutions in the context of asymptotic safety. The Newton coupling in this formulation depends on an energy scale, which must be identified with some length scale in order to study physical consequences to black holes. However, no physical principle has so far been known for the identification. Here we propose that the consistency of the first law o…
▽ More
We discuss the quantum improvement of black hole solutions in the context of asymptotic safety. The Newton coupling in this formulation depends on an energy scale, which must be identified with some length scale in order to study physical consequences to black holes. However, no physical principle has so far been known for the identification. Here we propose that the consistency of the first law of thermodynamics is the principle that should determine physically sensible scale identification, at least close to the horizon. We show that this leads to a natural solution that the Newton coupling should be a function of the horizon area and find a universal formula for the quantum entropy, which agrees with the standard Bekenstein-Hawking entropy for constant Newton coupling, for Kerr black holes and other higher-dimensional black holes. This suggests that the Newton coupling is a function of the area near the horizon, and also away to infinity, where the quantum effects may not be so important.
△ Less
Submitted 23 May, 2022; v1 submitted 21 April, 2022;
originally announced April 2022.
-
Quantum improved charged black holes
Authors:
Akihiro Ishibashi,
Nobuyoshi Ohta,
Daiki Yamaguchi
Abstract:
We consider quantum effects of gravitational and electromagnetic fields in spherically symmetric black hole spacetimes in the asymptotic safety scenario. Introducing both the running gravitational and electromagnetic couplings from the renormalization group equations and applying a physically sensible scale identification scheme based on the Kretschmann scalar, we construct a quantum mechanically…
▽ More
We consider quantum effects of gravitational and electromagnetic fields in spherically symmetric black hole spacetimes in the asymptotic safety scenario. Introducing both the running gravitational and electromagnetic couplings from the renormalization group equations and applying a physically sensible scale identification scheme based on the Kretschmann scalar, we construct a quantum mechanically corrected, or quantum improved Reissner-Nordstrom metric. We study the global structure of the quantum improved geometry and show, in particular, that the central singularity is resolved, being generally replaced with a regular Minkowski-core, where the curvature tensor vanishes. Exploring cases with more general scale identifications, we further find that the space of quantum improved geometries is divided into two regions: one for geometries with a regular Minkowski-core and the other for those with a weak singularity at the center. At the boundary of the two regions, the geometry has either Minkowski-, de Sitter-, or anti-de Sitter(AdS)-core.
△ Less
Submitted 31 August, 2021; v1 submitted 9 June, 2021;
originally announced June 2021.
-
Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data
Authors:
Francesco Cartella,
Orlando Anunciacao,
Yuki Funabiki,
Daisuke Yamaguchi,
Toru Akishita,
Olivier Elshocht
Abstract:
Guaranteeing the security of transactional systems is a crucial priority of all institutions that process transactions, in order to protect their businesses against cyberattacks and fraudulent attempts. Adversarial attacks are novel techniques that, other than being proven to be effective to fool image classification models, can also be applied to tabular data. Adversarial attacks aim at producing…
▽ More
Guaranteeing the security of transactional systems is a crucial priority of all institutions that process transactions, in order to protect their businesses against cyberattacks and fraudulent attempts. Adversarial attacks are novel techniques that, other than being proven to be effective to fool image classification models, can also be applied to tabular data. Adversarial attacks aim at producing adversarial examples, in other words, slightly modified inputs that induce the Artificial Intelligence (AI) system to return incorrect outputs that are advantageous for the attacker. In this paper we illustrate a novel approach to modify and adapt state-of-the-art algorithms to imbalanced tabular data, in the context of fraud detection. Experimental results show that the proposed modifications lead to a perfect attack success rate, obtaining adversarial examples that are also less perceptible when analyzed by humans. Moreover, when applied to a real-world production system, the proposed techniques shows the possibility of posing a serious threat to the robustness of advanced AI-based fraud detection procedures.
△ Less
Submitted 20 January, 2021;
originally announced January 2021.
-
CPEG: A Typed Tree Construction from Parsing Expression Grammars with Regex-Like Captures
Authors:
Daisuke Yamaguchi,
Kimio Kuramitsu
Abstract:
CPEG is an extended parsing expression grammar with regex-like capture annotation. Two annotations (capture and left-folding) allow a flexible construction of syntax trees from arbitrary parsing patterns. More importantly, CPEG is designed to guarantee structural constraints of syntax trees for any input strings. This reduces the amount of user code needed to check whether the intended elements ex…
▽ More
CPEG is an extended parsing expression grammar with regex-like capture annotation. Two annotations (capture and left-folding) allow a flexible construction of syntax trees from arbitrary parsing patterns. More importantly, CPEG is designed to guarantee structural constraints of syntax trees for any input strings. This reduces the amount of user code needed to check whether the intended elements exist.
To represent the structural constraints, we focus on regular expression types, a variant formalism of tree automata, which have been intensively studied in the context of XML schemas. Regular expression type is inferred from a given CPEG by the type inference that is formally developed in this paper. We prove the soundness and the uniqueness of the type inference. The type inference enables a CPEG to serve both as a syntactic specification of the input and a schematic specification of the output.
△ Less
Submitted 18 December, 2018;
originally announced December 2018.