skip to main content

Title: Laser-Induced Liquid Deformation Driven by the Marangoni Effect
We studied laser-induced liquid indentations generated by the Marangoni effect. We showed experimental results along with the simulation model based on the lubrication theory.  more » « less
Award ID(s):
Author(s) / Creator(s):
; ; ; ;
Publisher / Repository:
Optica Publishing Group
Date Published:
Page Range / eLocation ID:
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. In this paper, we propose a reaction–diffusion viral infection model with nonlinear incidences, cell-to-cell transmission, and a time delay. We impose the homogeneous Neumann boundary condition. For the case where the domain is bounded, we first study the well-posedness. Then we analyze the local stability of homogeneous steady states. We establish a threshold dynamics which is completely characterized by the basic reproduction number. For the case where the domain is the whole Euclidean space, we consider the existence of traveling wave solutions by using the cross-iteration method and Schauder’s fixed point theorem. Finally, we study how the speed of spread in space affects the spread of cells and viruses. We obtain the existence of the wave speed, which is dependent on the diffusion coefficient. 
    more » « less
  2. Abstract We introduce the map of dynamics of quantum Bose gases into dynamics of quasifree states, which we call the “nonlinear quasifree approximation”. We use this map to derive the time-dependent Hartree–Fock–Bogoliubov (HFB) equations describing the dynamics of quantum fluctuations around a Bose–Einstein condensate. We prove global well-posedness of the HFB equations for pair potentials satisfying suitable regularity conditions, and we establish important conservation laws. We show that the space of solutions of the HFB equations has a symplectic structure reminiscent of a Hamiltonian system. This is then used to relate the HFB equations to the HFB eigenvalue equations discussed in the physics literature. We also construct Gibbs equilibrium states at positive temperature associated with the HFB equations, and we establish criteria for the appearance of Bose–Einstein condensation. 
    more » « less
  3. Consider jointly Gaussian random variables whose conditional independence structure is specified by a graphical model. If we observe realizations of the variables, we can compute the covariance matrix, and it is well known that the support of the inverse covariance matrix corresponds to the edges of the graphical model. Instead, suppose we only have noisy observations. If the noise at each node is independent, we can compute the sum of the covariance matrix and an unknown diagonal. The inverse of this sum is (in general) dense. We ask: can the original independence structure be recovered? We address this question for tree structured graphical models. We prove that this problem is unidentifiable, but show that this unidentifiability is limited to a small class of candidate trees. We further present additional constraints under which the problem is identifiable. Finally, we provide an O(n^3) algorithm to find this equivalence class of trees. 
    more » « less
  4. null (Ed.)
    In this work, we report on a comprehensive analysis of PKI resulting from Certificate Authorities’ (CAs) behavior using over 1300 instances. We found several cases where CAs designed business models that favored the issuance of digital certificates over the guidelines of the CA Forum, root management programs, and other PKI requirements. Examining PKI from the perspective of business practices, we identify a taxonomy of failures and identify systemic vulnerabilities in the governance and practices in PKI. Notorious cases include the “backdating” of digital certificates, the issuance of these for MITM attempts, the lack of verification of a requester’s identity, and the unscrupulous issuance of rogue certificates. We performed a detailed study of 379 of these 1300 incidents. Using this sample, we developed a taxonomy of the different types of incidents and their causes. For each incident, we determined if the incident was disclosed by the problematic CA. We also noted the Root CA and the year of the incident. We identify the failures in terms of business practices, geography, and outcomes from CAs. We analyzed the role of Root Program Owners (RPOs) and differentiated their policies. We identified serial and chronic offenders in the PKI trusted root programs. Some of these were distrusted by RPOs, while others remain being trusted despite failures. We also identified cases where the concentration of power of RPOs was arguably a contributing factor in the incident. We identify these cases where there is a risk of concentration of power and the resulting conflict of interests. Our research is the first comprehensive academic study addressing all verified reported incidents. We approach this not from a machine learning or statistical perspective but, rather, we identify each reported public incident with a focus on identifying patterns of individual lapses. Here we also have a specific focus on the role of CAs and RPOs. Building on this study, we identify the issues in incentive structures that are contributors to the problems. 
    more » « less
  5. Abstract We agree that the approximate number system (ANS) truly represents number. We endorse the authors' conclusions on the arguments from confounds, congruency, and imprecision, although we disagree with many claims along the way. Here, we discuss some complications with the meanings that undergird theories in numerical cognition, and with the language we use to communicate those theories. 
    more » « less