• ### Exploring the dark matter inelastic frontier with 79.6 days of PandaX-II data(1708.05825)

Oct. 3, 2017 hep-ph, hep-ex, astro-ph.CO
We report here the results of searching for inelastic scattering of dark matter (initial and final state dark matter particles differ by a small mass splitting) with nucleon with the first 79.6-day of PandaX-II data (Run 9). We set the upper limits for the spin independent WIMP-nucleon scattering cross section up to a mass splitting of 300 keV/c$^2$ at two benchmark dark matter masses of 1 and 10 TeV/c$^2$.
• ### Dark Matter Results From 54-Ton-Day Exposure of PandaX-II Experiment(1708.06917)

We report a new search of weakly interacting massive particles (WIMPs) using the combined low background data sets in 2016 and 2017 from the PandaX-II experiment in China. The latest data set contains a new exposure of 77.1 live day, with the background reduced to a level of 0.8$\times10^{-3}$ evt/kg/day, improved by a factor of 2.5 in comparison to the previous run in 2016. No excess events were found above the expected background. With a total exposure of 5.4$\times10^4$ kg day, the most stringent upper limit on spin-independent WIMP-nucleon cross section was set for a WIMP with mass larger than 100 GeV/c$^2$, with the lowest exclusion at 8.6$\times10^{-47}$ cm$^2$ at 40 GeV/c$^2$.
• ### Unifying Message Passing Algorithms Under the Framework of Constrained Bethe Free Energy Minimization(1703.10932)

Dec. 5, 2019 cs.IT, math.IT
Variational message passing (VMP), belief propagation (BP) and expectation propagation (EP) have found their wide applications in complex statistical signal processing problems. In addition to viewing them as a class of algorithms operating on graphical models, this paper unifies them under an optimization framework, namely, Bethe free energy minimization with differently and appropriately imposed constraints. This new perspective in terms of constraint manipulation can offer additional insights on the connection between different message passing algorithms and is valid for a generic statistical model. It also founds a theoretical framework to systematically derive message passing variants. Taking the sparse signal recovery (SSR) problem as an example, a low-complexity EP variant can be obtained by simple constraint reformulation, delivering better estimation performance with lower complexity than the standard EP algorithm. Furthermore, we can resort to the framework for the systematic derivation of hybrid message passing for complex inference tasks. Notably, a hybrid message passing algorithm is exemplarily derived for joint SSR and statistical model learning with near-optimal inference performance and scalable complexity.
• ### Observation of electromagnetically induced Talbot effect in an atomic system(1608.00298)

Nov. 29, 2016 physics.optics
We experimentally demonstrate the Talbot effect resulting from the repeated self-reconstruction of a spatially intensity-modulated probe field under the Fresnel near-field regime. By launching the probe beam into an optically induced atomic lattice (established by interfering two coupling fields) inside a rubidium vapor cell, we can obtain an diffracted probe beam pattern from an formed electromagnetically induced grating (EIG) in a three-level $\Lambda$-type Doppler-free atomic configuration with the assistance of electromagnetically induced transparency (EIT). The EIG-based diffraction pattern repeats itself at the planes of integer multiple Talbot lengths, which agrees well with the theoretical prediction [Appl. Phys. Lett., 98, 081108 (2011)]. In addition, fractional EIT-induced Talbot effect was also investigated. Such experimentally demonstrated EIT Talbot effect in a coherently-prepared atomic system may pave a way for lensless and nondestructive imaging of ultracold atoms and molecules, and further demonstrating nonlinear/quantum beam dynamical features predicted for established periodic optical systems.
• ### PandaX-III: Searching for Neutrinoless Double Beta Decay with High Pressure $^{136}$Xe Gas Time Projection Chambers(1610.08883)

Oct. 28, 2016 hep-ex, nucl-ex, physics.ins-det
Searching for the Neutrinoless Double Beta Decay (NLDBD) is now regarded as the topmost promising technique to explore the nature of neutrinos after the discovery of neutrino masses in oscillation experiments. PandaX-III (Particle And Astrophysical Xenon Experiment III) will search for the NLDBD of $^{136}$Xe at the China Jin Ping underground Laboratory (CJPL). In the first phase of the experiment, a high pressure gas Time Projection Chamber (TPC) will contain 200 kg, 90% $^{136}$Xe enriched gas operated at 10 bar. Fine pitch micro-pattern gas detector (Microbulk Micromegas) will be used at both ends of the TPC for the charge readout with a cathode in the middle. Charge signals can be used to reconstruct tracks of NLDBD events and provide good energy and spatial resolution. The detector will be immersed in a large water tank to ensure $\sim$5 m of water shielding in all directions. The second phase, a ton-scale experiment, will consist of five TPCs in the same water tank, with improved energy resolution and better control over backgrounds.
• ### Principled Evaluation of Differentially Private Algorithms using DPBench(1512.04817)

Dec. 15, 2015 cs.CR, cs.DB
Differential privacy has become the dominant standard in the research community for strong privacy protection. There has been a flood of research into query answering algorithms that meet this standard. Algorithms are becoming increasingly complex, and in particular, the performance of many emerging algorithms is {\em data dependent}, meaning the distribution of the noise added to query answers may change depending on the input data. Theoretical analysis typically only considers the worst case, making empirical study of average case performance increasingly important. In this paper we propose a set of evaluation principles which we argue are essential for sound evaluation. Based on these principles we propose DPBench, a novel evaluation framework for standardized evaluation of privacy algorithms. We then apply our benchmark to evaluate algorithms for answering 1- and 2-dimensional range queries. The result is a thorough empirical study of 15 published algorithms on a total of 27 datasets that offers new insights into algorithm behavior---in particular the influence of dataset scale and shape---and a more complete characterization of the state of the art. Our methodology is able to resolve inconsistencies in prior empirical studies and place algorithm performance in context through comparison to simple baselines. Finally, we pose open research questions which we hope will guide future algorithm design.
• ### ND^(*) and NB^(*) interactions in a chiral quark model(1508.03883)

Aug. 17, 2015 hep-ph, nucl-th
ND and ND^* interactions become a hot topic after the observation of new charmed hadrons \Sigma_c(2800) and \Lambda_c(2940)^+. In this letter, we have preliminary investigated S-wave ND and ND^* interactions with possible quantum numbers in the chiral SU(3) quark model and the extended chiral SU(3) quark model by solving the resonating group method equation. The numerical results show that the interactions between N and D or N and D^* are both attractive, which are mainly from \sigma exchanges between light quarks. Further bound-state studies indicate the attractions are strong enough to form ND or ND^* molecules, except for (ND)_{J=3/2} and (ND^*)_{J=3/2} in the chiral SU(3) quark model. In consequence ND system with J=1/2 and ND^* system with J=3/2 in the extended SU(3) quark model could correspond to the observed \Sigma_c(2800) and \Lambda_c(2940)^+, respectively. Naturally, the same method can be applied to research NB and NB^* interactions, and similar conclusions obtained, i.e. NB and NB^* attractive forces may achieve bound states, except for (NB^*)_{J=3/2} in the chiral SU(3) quark model. Meanwhile, S partial wave phase shifts of ND^{(*)} and NB^{(*)} elastic scattering are illustrated, which are qualitatively consistent with results from bound state problem.
• ### Comparison between GFDM and VOFDM(1507.06833)

July 24, 2015 cs.IT, math.IT
This document provides a comparison of the transmission techniques used in Generalized Frequency Division Multiplexing (GFDM) and Vector-OFDM (VOFDM). Within the document both systems are coarsely described and common and distinct properties are highlighted.
• ### GFDM - A Framework for Virtual PHY Services in 5G Networks(1507.04608)

July 16, 2015 cs.IT, math.IT
The next generation of wireless networks will face different challenges from new scenarios. The main contribution of this paper is to show that Generalized Frequency Division Multiplexing (GFDM), as a baseline of flexible circular filtered multicarrier systems, can be used as a framework to virtualize the PHY service for the upper layers of 5G networks. This framework opens the possibility to apply software-defined network principles to produce software-defined waveforms capable of addressing the requirements of future mobile networks. Hence, a block oriented concept will be used to provide the modulation service, emulating different flavors of waveforms designed to go beyond the well-established Orthogonal Frequency Division Multiplexing (OFDM) principles, in scenarios where they perform best. The virtual physical layer (PHY) service opens the opportunity to have a fast and dynamic evolution of the infrastructure, as applications change over time. The presented unified modulation concept contributes with future research directions to address burst and continuous transmissions, referencing basic approaches for synchronization and advanced receiver design that can be exploited in future for the whole frame structure design and channel estimation strategies.
• ### GFDM Transceiver using Precoded Data and Low-complexity Multiplication in Time Domain(1506.03350)

June 10, 2015 cs.IT, math.IT
Future wireless communication systems are demanding a more flexible physical layer. GFDM is a block filtered multicarrier modulation scheme proposed to add multiple degrees of freedom and cover other waveforms in a single framework. In this paper, GFDM modulation and demodulation will be presented as a frequency-domain circular convolution, allowing for a reduction of the implementation complexity when MF, ZF and MMSE filters are employed in the inner and outer receiver operation. Also, precoding is introduced to further increase GFDM flexibility, addressing a wider set of applications.
• ### Reduced Complexity Calculation of LMMSE Filter Coefficients for GFDM(1503.02782)

April 1, 2015 cs.IT, math.IT
A low-complexity algorithm for calculation of the LMMSE filter coefficients for GFDM in a block-fading multipath environment is derived in this letter. The simplification is based on the block circularity of the involved matrices. The proposal reduces complexity from cubic to squared order. The proposed approach can be generalized to other waveforms with circular pulse shaping.
• ### Dynamic Radio Resource Management for Random Network Coding: Power Control and CSMA Backoff Control(1303.6541)

March 26, 2013 cs.NI
Resource allocation in wireless networks typically occurs at PHY/MAC layers, while random network coding (RNC) is a network layer strategy. An interesting question is how resource allocation mechanisms can be tuned to improve RNC performance. By means of a differential equation framework which models RNC throughput in terms of lower layer parameters, we propose a gradient based approach that can dynamically allocate MAC and PHY layer resources with the goal of maximizing the minimum network coding throughput among all the destination nodes in a RNC multicast. We exemplify this general approach with two resource allocation problems: (i) power control to improve network coding throughput, and (ii) CSMA mean backoff delay control to improve network coding throughput. We design both centralized algorithms and online algorithms for power control and CSMA backoff control. Our evaluations, including numerically solving the differential equations in the centralized algorithm and an event-driven simulation for the online algorithm, show that such gradient based dynamic resource allocation yields significant throughput improvement of the destination nodes in RNC. Further, our numerical results reveal that network coding aware power control can regain the broadcast advantage of wireless transmissions to improve the throughput.
• ### Complexity-Efficient Enumeration Techniques for Soft-Input, Soft-Output Sphere Decoding(0906.3194)

Oct. 4, 2012 cs.NI
In this paper two complexity efficient soft sphere-decoder modifications are proposed for computing the max-log LLR values in iterative MIMO systems, which avoid the costly, typically needed, full enumeration and sorting (FES) procedure during the tree traversal without compromising the max-log performance. It is shown that despite the resulting increase in the number of expanded nodes, they can be more computationally efficient than the typical soft sphere decoders by avoiding the unnecessary complexity of FES.
• ### Analyzing Random Network Coding with Differential Equations and Differential Inclusions(1004.5108)

Jan. 7, 2012 cs.IT, math.IT, math.DS, cs.NI
We develop a framework based on differential equations (DE) and differential inclusions (DI) for analyzing Random Network Coding (RNC), as well as a nonlinear variant referred to as Random Coupon (RC), in a wireless network. The DEDI framework serves as a powerful numerical and analytical tool to study RNC. We demonstrate its versatility by proving theoretical results on multicast information flows in a wireless network using RNC or RC. We also demonstrate the accuracy and flexibility of the performance analysis enabled by this framework via illustrative examples of networks with multiple multicast sessions, user cooperation and arbitrary topologies.
• ### Breaking a chaotic image encryption algorithm based on perceptron model(1111.1410)

Nov. 6, 2011 cs.CR
Recently, a chaotic image encryption algorithm based on perceptron model was proposed. The present paper analyzes security of the algorithm and finds that the equivalent secret key can be reconstructed with only one pair of known-plaintext/ciphertext, which is supported by both mathematical proof and experiment results. In addition, some other security defects are also reported.
• ### A Primary Study of Heavy Baryons Lambda_Q, Xi_Q, Sigma_Q and Omega_Q(1102.2659)

June 24, 2011 hep-ph, nucl-th
We perform a preliminary study of the 1/2+ and 3/2+ ground-state baryons containing a heavy quark in the framework of the chiral SU(3) quark model. By using the calculus of variations, masses of Lambda_Q, Sigma_Q, Xi_Q, Omega_Q, Sigma_Q^*, Xi_Q^* and Omega_Q^*, where Q means c or b quark, are calculated. With taking reasonable model parameters, the numerical results of established heavy baryons are generally in agreement with the available experimental data, except that those of Xi_Q are somewhat heavier. For Omega_b with undetermined experimental mass and nobserved Xi_b^*, Omega_b^*, reasonable theoretical predictions are obtained. Interactions inside baryons are also discussed.
• ### S-wave DK interactions in the chiral SU(3) quark model(0905.1804)

Aug. 14, 2009 nucl-th
The $DK$ interaction is relevant to the interpretation of the $D_{sJ}(2317)$. We dynamically investigate $S$-wave $DK$ interactions in the chiral SU(3) quark model by solving the resonating group method equation. The numerical results show an attraction between $D$ and $K$, which is from boson exchanges between light quarks. However, such an attraction is not strong enough to form a $DK$ molecule. Meanwhile, $S$ partial wave phase shifts of $DK$ elastic scattering are obtained. The case of $S$-wave $D^*K$ is rather similar to that of $DK$. To draw a definite conclusion whether a molecular state exists in $DK$ or $D^*K$ system, more details of dynamics should be considered in further study.
• ### Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher(cs/0412103)

Dec. 19, 2007 nlin.CD, cs.CR, cs.NE
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the security of this chaotic cipher against chosen-plaintext attacks, and points out that this cipher can be broken by a chosen-plaintext attack. Experimental analyses are given to support the feasibility of the proposed attack.
• ### Cryptanalysis of an image encryption scheme based on the Hill cipher(0712.0693)

Dec. 5, 2007 cs.CR
This paper studies the security of an image encryption scheme based on the Hill cipher and reports its following problems: 1) there is a simple necessary and sufficient condition that makes a number of secret keys invalid; 2) it is insensitive to the change of the secret key; 3) it is insensitive to the change of the plain-image; 4) it can be broken with only one known/chosen-plaintext; 5) it has some other minor defects.
• ### On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)(cs/0501013)

Aug. 27, 2006 nlin.CD, cs.CR, cs.MM
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security of DSEA, and points out the following weaknesses: 1) its security against the brute-force attack was overestimated; 2) it is not sufficiently secure against ciphertext-only attacks, and only one ciphertext is enough to get some information about the plaintext and to break the value of a sub-key; 3) it is insecure against known/chosen-plaintext attacks, in the sense that the secret key can be recovered from a number of continuous bytes of only one known/chosen plaintext and the corresponding ciphertext. Experimental results are given to show the performance of the proposed attacks, and some countermeasures are discussed to improve DSEA.