Search
Results
-
A lower bound for disconnection by random interlacements
(2014)Electronic Journal of ProbabilityWe consider the vacant set of random interlacements on Zd, with d bigger or equal to 3, in the percolative regime. Motivated by the large deviation principles obtained in our recent work arXiv:1304.7477, we investigate the asymptotic behavior of the probability that a large body gets disconnected from infinity by the random interlacements. We derive an asymptotic lower bound, which brings into play tilted interlacements, and relates the ...Journal Article -
Evaluation of the molecular inclusion process of β-hexachlorocyclohexane in cyclodextrins
(2019)RSC AdvancesThe present work aimed to study the guest–host complexes of β-hexachlorocyclohexane (β-HCH), a pesticide with high environmental stability that can cause severe health problems, with the most common cyclodextrins (α-, β-, and γ-CDs). The formation reactions of these molecular inclusion complexes were addressed in this research. The multiple minima hypersurface methodology, quantum calculations based on density functional theory and a ...Journal Article -
Principal Possibility of the Successful Nowcast and Short-Term Forecast in the Middle Atmosphere Based on the Observed UV Irradiance
(2012)International Journal of GeophysicsWe have applied chemistry-climate model (CCM) SOCOL to simulate the distribution of the temperature and gas species in the upper stratosphere and mesosphere. As an input for the simulation, we employ daily spectral solar UV irradiance measured by SUSIM instrument onboard UARS satellite in January 1992. We have carried out an ensemble of nine 1-month long simulations using slightly different initial states of the atmosphere. We have compared ...Journal Article -
Tunnelling time in strong field ionisation
(2014)Journal of Physics B: Atomic, Molecular and Optical PhysicsWe revisit the common approaches to tunnelling time in the context of attoclock experiments. These experiments measure tunnelling time using close-to-circularly polarised light of the infrared ultrashort laser pulse. We test the sensitivity of the attoclock measurements of tunnelling time to non-adiabatic effects, as described by a well-known theoretical model first developed by Perelomov, Popov, and Terentʼev. We find that in the case ...Journal Article -
Divergent Selection and Then What Not: The Conundrum of Missing Reproductive Isolation in Misty Lake and Stream Stickleback
(2012)International Journal of EcologyJournal Article -
NA61/SHINE facility at the CERN SPS: beams and detector system
(2014)Journal of InstrumentationNA61/SHINE (SPS Heavy Ion and Neutrino Experiment) is a multi-purpose experimental facility to study hadron production in hadron-proton, hadron-nucleus and nucleus-nucleus collisions at the CERN Super Proton Synchrotron. It recorded the first physics data with hadron beams in 2009 and with ion beams (secondary 7Be beams) in 2011. NA61/SHINE has greatly profited from the long development of the CERN proton and ion sources and the ...Journal Article -
Financial Brownian particle in the critical order book fluid and Fluctuation-Dissipation theorems
(2014)Physical Review LettersWe introduce a novel description of the dynamics of the order book of financial markets as that of an effective colloidal Brownian particle embedded in fluid particles. The analysis of comprehensive market data enables us to identify all motions of the fluid particles. Correlations between the motions of the Brownian particle and its surrounding fluid particles reflect specific layering interactions; in the inner layer the correlation is ...Journal Article -
Complete Insecurity of Quantum Protocols for Classical Two-Party Computation
(2012)Physical Review LettersA fundamental task in modern cryptography is the joint computation of a function which has two inputs, one from Alice and one from Bob, such that neither of the two can learn more about the other’s input than what is implied by the value of the function. In this Letter, we show that any quantum protocol for the computation of a classical deterministic function that outputs the result to both parties (two-sided computation) and that is ...Journal Article -
Security of two-way quantum key distribution
(2013)Physical Review AQuantum key distribution protocols typically make use of a one-way quantum channel to distribute a shared secret string to two distant users. However, protocols exploiting a two-way quantum channel have been proposed as an alternative route to the same goal, with the potential advantage of outperforming one-way protocols. Here we provide a strategy to prove security for two-way quantum key distribution protocols against the most general ...Journal Article -
Search for anomalous production of events with three or more leptons in pp collisions at √s = 8 TeV
(2014)Physical Review DA search for physics beyond the standard model in events with at least three leptons is presented. The data sample, corresponding to an integrated luminosity of 19.5 fb−1 of proton-proton collisions with center-of-mass energy √s = 8 TeV, was collected by the CMS experiment at the LHC during 2012. The data are divided into exclusive categories based on the number of leptons and their flavor, the presence or absence of an opposite-sign, ...Journal Article