-
We report here the results of searching for inelastic scattering of dark
matter (initial and final state dark matter particles differ by a small mass
splitting) with nucleon with the first 79.6-day of PandaX-II data (Run 9). We
set the upper limits for the spin independent WIMP-nucleon scattering cross
section up to a mass splitting of 300 keV/c$^2$ at two benchmark dark matter
masses of 1 and 10 TeV/c$^2$.
-
We report a new search of weakly interacting massive particles (WIMPs) using
the combined low background data sets in 2016 and 2017 from the PandaX-II
experiment in China. The latest data set contains a new exposure of 77.1 live
day, with the background reduced to a level of 0.8$\times10^{-3}$ evt/kg/day,
improved by a factor of 2.5 in comparison to the previous run in 2016. No
excess events were found above the expected background. With a total exposure
of 5.4$\times10^4$ kg day, the most stringent upper limit on spin-independent
WIMP-nucleon cross section was set for a WIMP with mass larger than 100
GeV/c$^2$, with the lowest exclusion at 8.6$\times10^{-47}$ cm$^2$ at 40
GeV/c$^2$.
-
Variational message passing (VMP), belief propagation (BP) and expectation
propagation (EP) have found their wide applications in complex statistical
signal processing problems. In addition to viewing them as a class of
algorithms operating on graphical models, this paper unifies them under an
optimization framework, namely, Bethe free energy minimization with differently
and appropriately imposed constraints. This new perspective in terms of
constraint manipulation can offer additional insights on the connection between
different message passing algorithms and is valid for a generic statistical
model. It also founds a theoretical framework to systematically derive message
passing variants. Taking the sparse signal recovery (SSR) problem as an
example, a low-complexity EP variant can be obtained by simple constraint
reformulation, delivering better estimation performance with lower complexity
than the standard EP algorithm. Furthermore, we can resort to the framework for
the systematic derivation of hybrid message passing for complex inference
tasks. Notably, a hybrid message passing algorithm is exemplarily derived for
joint SSR and statistical model learning with near-optimal inference
performance and scalable complexity.
-
We experimentally demonstrate the Talbot effect resulting from the repeated
self-reconstruction of a spatially intensity-modulated probe field under the
Fresnel near-field regime. By launching the probe beam into an optically
induced atomic lattice (established by interfering two coupling fields) inside
a rubidium vapor cell, we can obtain an diffracted probe beam pattern from an
formed electromagnetically induced grating (EIG) in a three-level
$\Lambda$-type Doppler-free atomic configuration with the assistance of
electromagnetically induced transparency (EIT). The EIG-based diffraction
pattern repeats itself at the planes of integer multiple Talbot lengths, which
agrees well with the theoretical prediction [Appl. Phys. Lett., 98, 081108
(2011)]. In addition, fractional EIT-induced Talbot effect was also
investigated. Such experimentally demonstrated EIT Talbot effect in a
coherently-prepared atomic system may pave a way for lensless and
nondestructive imaging of ultracold atoms and molecules, and further
demonstrating nonlinear/quantum beam dynamical features predicted for
established periodic optical systems.
-
Searching for the Neutrinoless Double Beta Decay (NLDBD) is now regarded as
the topmost promising technique to explore the nature of neutrinos after the
discovery of neutrino masses in oscillation experiments. PandaX-III (Particle
And Astrophysical Xenon Experiment III) will search for the NLDBD of $^{136}$Xe
at the China Jin Ping underground Laboratory (CJPL). In the first phase of the
experiment, a high pressure gas Time Projection Chamber (TPC) will contain 200
kg, 90% $^{136}$Xe enriched gas operated at 10 bar. Fine pitch micro-pattern
gas detector (Microbulk Micromegas) will be used at both ends of the TPC for
the charge readout with a cathode in the middle. Charge signals can be used to
reconstruct tracks of NLDBD events and provide good energy and spatial
resolution. The detector will be immersed in a large water tank to ensure
$\sim$5 m of water shielding in all directions. The second phase, a ton-scale
experiment, will consist of five TPCs in the same water tank, with improved
energy resolution and better control over backgrounds.
-
Differential privacy has become the dominant standard in the research
community for strong privacy protection. There has been a flood of research
into query answering algorithms that meet this standard. Algorithms are
becoming increasingly complex, and in particular, the performance of many
emerging algorithms is {\em data dependent}, meaning the distribution of the
noise added to query answers may change depending on the input data.
Theoretical analysis typically only considers the worst case, making empirical
study of average case performance increasingly important.
In this paper we propose a set of evaluation principles which we argue are
essential for sound evaluation. Based on these principles we propose DPBench, a
novel evaluation framework for standardized evaluation of privacy algorithms.
We then apply our benchmark to evaluate algorithms for answering 1- and
2-dimensional range queries. The result is a thorough empirical study of 15
published algorithms on a total of 27 datasets that offers new insights into
algorithm behavior---in particular the influence of dataset scale and
shape---and a more complete characterization of the state of the art. Our
methodology is able to resolve inconsistencies in prior empirical studies and
place algorithm performance in context through comparison to simple baselines.
Finally, we pose open research questions which we hope will guide future
algorithm design.
-
ND and ND^* interactions become a hot topic after the observation of new
charmed hadrons \Sigma_c(2800) and \Lambda_c(2940)^+. In this letter, we have
preliminary investigated S-wave ND and ND^* interactions with possible quantum
numbers in the chiral SU(3) quark model and the extended chiral SU(3) quark
model by solving the resonating group method equation. The numerical results
show that the interactions between N and D or N and D^* are both attractive,
which are mainly from \sigma exchanges between light quarks. Further
bound-state studies indicate the attractions are strong enough to form ND or
ND^* molecules, except for (ND)_{J=3/2} and (ND^*)_{J=3/2} in the chiral SU(3)
quark model. In consequence ND system with J=1/2 and ND^* system with J=3/2 in
the extended SU(3) quark model could correspond to the observed \Sigma_c(2800)
and \Lambda_c(2940)^+, respectively. Naturally, the same method can be applied
to research NB and NB^* interactions, and similar conclusions obtained, i.e. NB
and NB^* attractive forces may achieve bound states, except for (NB^*)_{J=3/2}
in the chiral SU(3) quark model. Meanwhile, S partial wave phase shifts of
ND^{(*)} and NB^{(*)} elastic scattering are illustrated, which are
qualitatively consistent with results from bound state problem.
-
This document provides a comparison of the transmission techniques used in
Generalized Frequency Division Multiplexing (GFDM) and Vector-OFDM (VOFDM).
Within the document both systems are coarsely described and common and distinct
properties are highlighted.
-
The next generation of wireless networks will face different challenges from
new scenarios. The main contribution of this paper is to show that Generalized
Frequency Division Multiplexing (GFDM), as a baseline of flexible circular
filtered multicarrier systems, can be used as a framework to virtualize the PHY
service for the upper layers of 5G networks. This framework opens the
possibility to apply software-defined network principles to produce
software-defined waveforms capable of addressing the requirements of future
mobile networks. Hence, a block oriented concept will be used to provide the
modulation service, emulating different flavors of waveforms designed to go
beyond the well-established Orthogonal Frequency Division Multiplexing (OFDM)
principles, in scenarios where they perform best. The virtual physical layer
(PHY) service opens the opportunity to have a fast and dynamic evolution of the
infrastructure, as applications change over time. The presented unified
modulation concept contributes with future research directions to address burst
and continuous transmissions, referencing basic approaches for synchronization
and advanced receiver design that can be exploited in future for the whole
frame structure design and channel estimation strategies.
-
Future wireless communication systems are demanding a more flexible physical
layer. GFDM is a block filtered multicarrier modulation scheme proposed to add
multiple degrees of freedom and cover other waveforms in a single framework. In
this paper, GFDM modulation and demodulation will be presented as a
frequency-domain circular convolution, allowing for a reduction of the
implementation complexity when MF, ZF and MMSE filters are employed in the
inner and outer receiver operation. Also, precoding is introduced to further
increase GFDM flexibility, addressing a wider set of applications.
-
A low-complexity algorithm for calculation of the LMMSE filter coefficients
for GFDM in a block-fading multipath environment is derived in this letter. The
simplification is based on the block circularity of the involved matrices. The
proposal reduces complexity from cubic to squared order. The proposed approach
can be generalized to other waveforms with circular pulse shaping.
-
Resource allocation in wireless networks typically occurs at PHY/MAC layers,
while random network coding (RNC) is a network layer strategy. An interesting
question is how resource allocation mechanisms can be tuned to improve RNC
performance. By means of a differential equation framework which models RNC
throughput in terms of lower layer parameters, we propose a gradient based
approach that can dynamically allocate MAC and PHY layer resources with the
goal of maximizing the minimum network coding throughput among all the
destination nodes in a RNC multicast. We exemplify this general approach with
two resource allocation problems: (i) power control to improve network coding
throughput, and (ii) CSMA mean backoff delay control to improve network coding
throughput. We design both centralized algorithms and online algorithms for
power control and CSMA backoff control. Our evaluations, including numerically
solving the differential equations in the centralized algorithm and an
event-driven simulation for the online algorithm, show that such gradient based
dynamic resource allocation yields significant throughput improvement of the
destination nodes in RNC. Further, our numerical results reveal that network
coding aware power control can regain the broadcast advantage of wireless
transmissions to improve the throughput.
-
In this paper two complexity efficient soft sphere-decoder modifications are
proposed for computing the max-log LLR values in iterative MIMO systems, which
avoid the costly, typically needed, full enumeration and sorting (FES)
procedure during the tree traversal without compromising the max-log
performance. It is shown that despite the resulting increase in the number of
expanded nodes, they can be more computationally efficient than the typical
soft sphere decoders by avoiding the unnecessary complexity of FES.
-
We develop a framework based on differential equations (DE) and differential
inclusions (DI) for analyzing Random Network Coding (RNC), as well as a
nonlinear variant referred to as Random Coupon (RC), in a wireless network. The
DEDI framework serves as a powerful numerical and analytical tool to study RNC.
We demonstrate its versatility by proving theoretical results on multicast
information flows in a wireless network using RNC or RC. We also demonstrate
the accuracy and flexibility of the performance analysis enabled by this
framework via illustrative examples of networks with multiple multicast
sessions, user cooperation and arbitrary topologies.
-
Recently, a chaotic image encryption algorithm based on perceptron model was
proposed. The present paper analyzes security of the algorithm and finds that
the equivalent secret key can be reconstructed with only one pair of
known-plaintext/ciphertext, which is supported by both mathematical proof and
experiment results. In addition, some other security defects are also reported.
-
We perform a preliminary study of the 1/2+ and 3/2+ ground-state baryons
containing a heavy quark in the framework of the chiral SU(3) quark model. By
using the calculus of variations, masses of Lambda_Q, Sigma_Q, Xi_Q, Omega_Q,
Sigma_Q^*, Xi_Q^* and Omega_Q^*, where Q means c or b quark, are calculated.
With taking reasonable model parameters, the numerical results of established
heavy baryons are generally in agreement with the available experimental data,
except that those of Xi_Q are somewhat heavier. For Omega_b with undetermined
experimental mass and nobserved Xi_b^*, Omega_b^*, reasonable theoretical
predictions are obtained. Interactions inside baryons are also discussed.
-
The $DK$ interaction is relevant to the interpretation of the $D_{sJ}(2317)$.
We dynamically investigate $S$-wave $DK$ interactions in the chiral SU(3) quark
model by solving the resonating group method equation. The numerical results
show an attraction between $D$ and $K$, which is from boson exchanges between
light quarks. However, such an attraction is not strong enough to form a $DK$
molecule. Meanwhile, $S$ partial wave phase shifts of $DK$ elastic scattering
are obtained. The case of $S$-wave $D^*K$ is rather similar to that of $DK$. To
draw a definite conclusion whether a molecular state exists in $DK$ or $D^*K$
system, more details of dynamics should be considered in further study.
-
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic
signal and a clipped neural network (CNN) for encryption. The present paper
analyzes the security of this chaotic cipher against chosen-plaintext attacks,
and points out that this cipher can be broken by a chosen-plaintext attack.
Experimental analyses are given to support the feasibility of the proposed
attack.
-
This paper studies the security of an image encryption scheme based on the
Hill cipher and reports its following problems: 1) there is a simple necessary
and sufficient condition that makes a number of secret keys invalid; 2) it is
insensitive to the change of the secret key; 3) it is insensitive to the change
of the plain-image; 4) it can be broken with only one known/chosen-plaintext;
5) it has some other minor defects.
-
Recently, a new domino signal encryption algorithm (DSEA) was proposed for
digital signal transmission, especially for digital images and videos. This
paper analyzes the security of DSEA, and points out the following weaknesses:
1) its security against the brute-force attack was overestimated; 2) it is not
sufficiently secure against ciphertext-only attacks, and only one ciphertext is
enough to get some information about the plaintext and to break the value of a
sub-key; 3) it is insecure against known/chosen-plaintext attacks, in the sense
that the secret key can be recovered from a number of continuous bytes of only
one known/chosen plaintext and the corresponding ciphertext. Experimental
results are given to show the performance of the proposed attacks, and some
countermeasures are discussed to improve DSEA.