-
Convergent-beam attosecond X-ray crystallography
Authors:
Henry N. Chapman,
Chufeng Li,
Saša Bajt,
Mansi Butola,
J. Lukas Dresselhaus,
Dmitry Egorov,
Holger Fleckenstein,
Nikolay Ivanov,
Antonia Kiene,
Bjarne Klopprogge,
Viviane Kremling,
Philipp Middendorf,
Dominik Oberthuer,
Mauro Prasciolu,
T. Emilie S. Scheer,
Janina Sprenger,
Jia Chyi Wong,
Oleksandr Yefanov,
Margarita Zakharova,
Wenhui Zhang
Abstract:
Sub-angstrom spatial resolution of electron density coupled with sub-femtosecond temporal resolution is required to directly observe the dynamics of the electronic structure of a molecule after photoinitiation or some other ultrafast perturbation. Meeting this challenge, pushing the field of quantum crystallography to attosecond timescales, would bring insights into how the electronic and nuclear…
▽ More
Sub-angstrom spatial resolution of electron density coupled with sub-femtosecond temporal resolution is required to directly observe the dynamics of the electronic structure of a molecule after photoinitiation or some other ultrafast perturbation. Meeting this challenge, pushing the field of quantum crystallography to attosecond timescales, would bring insights into how the electronic and nuclear degrees of freedom couple, enable the study of quantum coherences involved in molecular dynamics, and ultimately enable these dynamics to be controlled. Here we propose to reach this realm by employing convergent-beam X-ray crystallography with high-power attosecond pulses from a hard-X-ray free-electron laser. We show that with dispersive optics, such as multilayer Laue lenses of high numerical aperture, it becomes possible to encode time into the resulting diffraction pattern with deep sub-femtosecond precision. Each snapshot diffraction pattern consists of Bragg streaks that can be mapped back to arrival times and positions of X-rays on the face of a crystal. This can span tens of femtoseconds, and can be finely sampled as we demonstrate experimentally. The approach brings several other advantages, such as an increase of the number of observable reflections in a snapshot diffraction pattern, all fully integrated, to improve the speed and accuracy of serial crystallography -- especially for crystals of small molecules.
△ Less
Submitted 17 September, 2024;
originally announced September 2024.
-
Near-quantum limited axion dark matter search with the ORGAN experiment around 26 $μ$eV
Authors:
Aaron P. Quiskamp,
Graeme Flower,
Steven Samuels,
Ben T. McAllister,
Paul Altin,
Eugene N. Ivanov,
Maxim Goryachev,
Michael E. Tobar
Abstract:
The latest result from The ORGAN Experiment, an axion haloscope is presented. This iteration of the experiment operated at millikelvin temperatures using a flux-driven Josephson parametric amplifier (JPA) for reduced noise, along with various other upgrades over previous iterations. Covering the $25.45 - 26.27\,μ\text{eV}$ ($6.15-6.35$ GHz) mass (frequency) range, this near-quantum limited phase o…
▽ More
The latest result from The ORGAN Experiment, an axion haloscope is presented. This iteration of the experiment operated at millikelvin temperatures using a flux-driven Josephson parametric amplifier (JPA) for reduced noise, along with various other upgrades over previous iterations. Covering the $25.45 - 26.27\,μ\text{eV}$ ($6.15-6.35$ GHz) mass (frequency) range, this near-quantum limited phase of ORGAN employs a conducting rod resonator and a 7-T solenoidal magnet to place the most sensitive exclusion limits on axion-photon coupling in the range to date, with $|g_{aγγ}| \gtrsim 2.8\times10^{-13}$ at a 95% confidence level.
△ Less
Submitted 1 August, 2024; v1 submitted 26 July, 2024;
originally announced July 2024.
-
AI for Manufacturing and Healthcare: a chemistry and engineering perspective
Authors:
Jihua Chen,
Yue Yuan,
Amir Koushyar Ziabari,
Xuan Xu,
Honghai Zhang,
Panagiotis Christakopoulos,
Peter V. Bonnesen,
Ilia N. Ivanov,
Panchapakesan Ganesh,
Chen Wang,
Karen Patino Jaimes,
Guang Yang,
Rajeev Kumar,
Bobby G. Sumpter,
Rigoberto Advincula
Abstract:
Artificial Intelligence (AI) approaches are increasingly being applied to more and more domains of Science, Engineering, Chemistry, and Industries to not only improve efficiencies and enhance productivity, but also enable new capabilities. The new opportunities range from automated molecule design and screening, properties prediction, gaining insights of chemical reactions, to computer-aided desig…
▽ More
Artificial Intelligence (AI) approaches are increasingly being applied to more and more domains of Science, Engineering, Chemistry, and Industries to not only improve efficiencies and enhance productivity, but also enable new capabilities. The new opportunities range from automated molecule design and screening, properties prediction, gaining insights of chemical reactions, to computer-aided design, predictive maintenance of systems, robotics, and autonomous vehicles. This review focuses on the new applications of AI in manufacturing and healthcare. For the Manufacturing Industries, we focus on AI and algorithms for (1) Battery, (2) Flow Chemistry, (3) Additive Manufacturing, (4) Sensors, and (5) Machine Vision. For Healthcare applications, we focus on: (1) Medical Vision (2) Diagnosis, (3) Protein Design, and (4) Drug Discovery. In the end, related topics are discussed, including physics integrated machine learning, model explainability, security, and governance during model deployment.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Microwave Cavity Mode Optimisation by Background Anti-Resonance Tuning
Authors:
Michael T. Hatzon,
Eugene N. Ivanov,
Jeremy F. Bourhill,
Maxim Goryachev,
Michael E. Tobar
Abstract:
To derive the best oscillator phase noise when implementing a high-Q resonator, the spectral line-shape must have high contrast and symmetry. Ideally, this line-shape is Lorentzian, however, in a high mode density spectral region, low-Q background spurious modes interact and distort the resonance. For a sapphire-loaded cavity resonator operating with whispering gallery modes we show that this high…
▽ More
To derive the best oscillator phase noise when implementing a high-Q resonator, the spectral line-shape must have high contrast and symmetry. Ideally, this line-shape is Lorentzian, however, in a high mode density spectral region, low-Q background spurious modes interact and distort the resonance. For a sapphire-loaded cavity resonator operating with whispering gallery modes we show that this high contrast and symmetry can be achieved by changing the dimensions of the surrounding cavity shield to tune the background low-Q structures into anti-resonance. This works because the high-Q resonances are primarily defined by the sapphire while the background modes are defined by the cavity shield. Alternatively, it was shown that a similar result can be achieved by exciting the high-Q resonator with a balanced microwave dipole probe in a Mach Zehnder interferometric configuration. The probe was constructed from two separate coaxial electric field probes symmetrically inserted into a cylindrical cavity resonator, from opposite sides with a small gap between them, so they can behave like an active wire dipole antenna. The power into the two separate probes may be matched with an external variable attenuator in one of the arms of the interferometer. Conversely, the phase between the two electric field probes may be changed with an external variable phase shifter, which changes the nature of the field components the probe couples to. The probe couples to the high-Q resonant modes as well as low-Q background modes, which can be made resonant or anti-resonant for the high-Q modes by changing this external phase. When the background modes are in anti-resonance the line shape of the high-Q mode can be made symmetric and with higher contrast. This technique was applied to both whispering gallery sapphire modes, as well as hollow cavity resonators, without changing the dimensions of the cavity.
△ Less
Submitted 13 July, 2024; v1 submitted 25 April, 2024;
originally announced May 2024.
-
Technical Design Report of the Spin Physics Detector at NICA
Authors:
The SPD Collaboration,
V. Abazov,
V. Abramov,
L. Afanasyev,
R. Akhunzyanov,
A. Akindinov,
I. Alekseev,
A. Aleshko,
V. Alexakhin,
G. Alexeev,
L. Alimov,
A. Allakhverdieva,
A. Amoroso,
V. Andreev,
V. Andreev,
E. Andronov,
Yu. Anikin,
S. Anischenko,
A. Anisenkov,
V. Anosov,
E. Antokhin,
A. Antonov,
S. Antsupov,
A. Anufriev,
K. Asadova
, et al. (392 additional authors not shown)
Abstract:
The Spin Physics Detector collaboration proposes to install a universal detector in the second interaction point of the NICA collider under construction (JINR, Dubna) to study the spin structure of the proton and deuteron and other spin-related phenomena using a unique possibility to operate with polarized proton and deuteron beams at a collision energy up to 27 GeV and a luminosity up to…
▽ More
The Spin Physics Detector collaboration proposes to install a universal detector in the second interaction point of the NICA collider under construction (JINR, Dubna) to study the spin structure of the proton and deuteron and other spin-related phenomena using a unique possibility to operate with polarized proton and deuteron beams at a collision energy up to 27 GeV and a luminosity up to $10^{32}$ cm$^{-2}$ s$^{-1}$. As the main goal, the experiment aims to provide access to the gluon TMD PDFs in the proton and deuteron, as well as the gluon transversity distribution and tensor PDFs in the deuteron, via the measurement of specific single and double spin asymmetries using different complementary probes such as charmonia, open charm, and prompt photon production processes. Other polarized and unpolarized physics is possible, especially at the first stage of NICA operation with reduced luminosity and collision energy of the proton and ion beams. This document is dedicated exclusively to technical issues of the SPD setup construction.
△ Less
Submitted 28 May, 2024; v1 submitted 12 April, 2024;
originally announced April 2024.
-
Noise Suppression with Cryogenic Resonators
Authors:
Eugene N. Ivanov,
Michael E. Tobar
Abstract:
We show that fast technical fluctuations of microwave signals can be strongly suppressed by cryogenic resonators. The experiments were carried out with sapphire resonators cooled to approximately 6 K at frequencies around 11 GHz. Each sapphire crystal was shaped like a spindle with the rotational and crystal axes aligned within a degree. Noise suppression factors in excess of 50 dB were measured a…
▽ More
We show that fast technical fluctuations of microwave signals can be strongly suppressed by cryogenic resonators. The experiments were carried out with sapphire resonators cooled to approximately 6 K at frequencies around 11 GHz. Each sapphire crystal was shaped like a spindle with the rotational and crystal axes aligned within a degree. Noise suppression factors in excess of 50 dB were measured at 10 kHz offset from the carrier. This was achieved by rotating the sapphire spindle and moving the coupling probes relative to its surface. Microwave signals with reduced fast technical fluctuations allow the high-precision tests of fundamental physics, as well as the development of better radars.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
Frequency Stable Microwave Sapphire Oscillators
Authors:
Eugene N. Ivanov,
Michael E. Tobar
Abstract:
We show that state-of-the-art phase noise and high frequency stability could be simultaneously achieved in a microwave oscillator based on the sapphire-loaded cavity resonator. The 9 GHz sapphire oscillator was constructed with the SSB phase noise close to -170 dBc/Hz at an offset frequency of 10 kHz and fractional frequency instability less than 2 10$^{-13}$ for integration times from 5 to 50 s.…
▽ More
We show that state-of-the-art phase noise and high frequency stability could be simultaneously achieved in a microwave oscillator based on the sapphire-loaded cavity resonator. The 9 GHz sapphire oscillator was constructed with the SSB phase noise close to -170 dBc/Hz at an offset frequency of 10 kHz and fractional frequency instability less than 2 10$^{-13}$ for integration times from 5 to 50 s. In this work, we focus on the technique for phase-referencing the microwave sapphire oscillator to a stable radio-frequency source. We also discuss the suppression of the fast phase fluctuations of the microwave signal due to its transmission through the high-Q resonator.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
Volume-entangled exact eigenstates in the PXP and related models in any dimension
Authors:
Andrew N. Ivanov,
Olexei I. Motrunich
Abstract:
In this work, we report first exact volume-entangled Einstein-Podolsky-Rosen (EPR) type scar states hosted by PXP and related Hamiltonians corresponding to various geometric configurations of Rydberg-blockaded atom systems, including the most extensively studied ones such as the chain with periodic boundary conditions (PBC) and square lattice. We start by introducing a new zero-energy eigenstate o…
▽ More
In this work, we report first exact volume-entangled Einstein-Podolsky-Rosen (EPR) type scar states hosted by PXP and related Hamiltonians corresponding to various geometric configurations of Rydberg-blockaded atom systems, including the most extensively studied ones such as the chain with periodic boundary conditions (PBC) and square lattice. We start by introducing a new zero-energy eigenstate of the PBC chain and proceed by generalizing it to a wide variety of geometries and Hamiltonians. We point out the experimental relevance of such states by providing a concrete and feasible protocol for their preparation on near-term Rydberg quantum devices, which relies only on strictly local measurements and evolution under native Hamiltonians. We also demonstrate the utility of these states for the study of quantum dynamics by describing a simple protocol for measuring infinite-temperature out-of-time-order correlator (OTOC) functions.
△ Less
Submitted 11 April, 2024; v1 submitted 8 March, 2024;
originally announced March 2024.
-
GigaPevt: Multimodal Medical Assistant
Authors:
Pavel Blinov,
Konstantin Egorov,
Ivan Sviridov,
Nikolay Ivanov,
Stepan Botman,
Evgeniy Tagin,
Stepan Kudin,
Galina Zubkova,
Andrey Savchenko
Abstract:
Building an intelligent and efficient medical assistant is still a challenging AI problem. The major limitation comes from the data modality scarceness, which reduces comprehensive patient perception. This demo paper presents the GigaPevt, the first multimodal medical assistant that combines the dialog capabilities of large language models with specialized medical models. Such an approach shows im…
▽ More
Building an intelligent and efficient medical assistant is still a challenging AI problem. The major limitation comes from the data modality scarceness, which reduces comprehensive patient perception. This demo paper presents the GigaPevt, the first multimodal medical assistant that combines the dialog capabilities of large language models with specialized medical models. Such an approach shows immediate advantages in dialog quality and metric performance, with a 1.18% accuracy improvement in the question-answering task.
△ Less
Submitted 30 July, 2024; v1 submitted 26 February, 2024;
originally announced February 2024.
-
Co-orchestration of Multiple Instruments to Uncover Structure-Property Relationships in Combinatorial Libraries
Authors:
Boris N. Slautin,
Utkarsh Pratiush,
Ilia N. Ivanov,
Yongtao Liu,
Rohit Pant,
Xiaohang Zhang,
Ichiro Takeuchi,
Maxim A. Ziatdinov,
Sergei V. Kalinin
Abstract:
The rapid growth of automated and autonomous instrumentations brings forth an opportunity for the co-orchestration of multimodal tools, equipped with multiple sequential detection methods, or several characterization tools to explore identical samples. This can be exemplified by the combinatorial libraries that can be explored in multiple locations by multiple tools simultaneously, or downstream c…
▽ More
The rapid growth of automated and autonomous instrumentations brings forth an opportunity for the co-orchestration of multimodal tools, equipped with multiple sequential detection methods, or several characterization tools to explore identical samples. This can be exemplified by the combinatorial libraries that can be explored in multiple locations by multiple tools simultaneously, or downstream characterization in automated synthesis systems. In the co-orchestration approaches, information gained in one modality should accelerate the discovery of other modalities. Correspondingly, the orchestrating agent should select the measurement modality based on the anticipated knowledge gain and measurement cost. Here, we propose and implement a co-orchestration approach for conducting measurements with complex observables such as spectra or images. The method relies on combining dimensionality reduction by variational autoencoders with representation learning for control over the latent space structure, and integrated into iterative workflow via multi-task Gaussian Processes (GP). This approach further allows for the native incorporation of the system's physics via a probabilistic model as a mean function of the GP. We illustrated this method for different modalities of piezoresponse force microscopy and micro-Raman on combinatorial $Sm-BiFeO_3$ library. However, the proposed framework is general and can be extended to multiple measurement modalities and arbitrary dimensionality of measured signals. The analysis code that supports the funding is publicly available at https://github.com/Slautin/2024_Co-orchestration.
△ Less
Submitted 17 March, 2024; v1 submitted 3 February, 2024;
originally announced February 2024.
-
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Authors:
Yuanda Wang,
Qiben Yan,
Nikolay Ivanov,
Xun Chen
Abstract:
The emergence of Artificial Intelligence (AI)-driven audio attacks has revealed new security vulnerabilities in voice control systems. While researchers have introduced a multitude of attack strategies targeting voice control systems (VCS), the continual advancements of VCS have diminished the impact of many such attacks. Recognizing this dynamic landscape, our study endeavors to comprehensively a…
▽ More
The emergence of Artificial Intelligence (AI)-driven audio attacks has revealed new security vulnerabilities in voice control systems. While researchers have introduced a multitude of attack strategies targeting voice control systems (VCS), the continual advancements of VCS have diminished the impact of many such attacks. Recognizing this dynamic landscape, our study endeavors to comprehensively assess the resilience of commercial voice control systems against a spectrum of malicious audio attacks. Through extensive experimentation, we evaluate six prominent attack techniques across a collection of voice control interfaces and devices. Contrary to prevailing narratives, our results suggest that commercial voice control systems exhibit enhanced resistance to existing threats. Particularly, our research highlights the ineffectiveness of white-box attacks in black-box scenarios. Furthermore, the adversaries encounter substantial obstacles in obtaining precise gradient estimations during query-based interactions with commercial systems, such as Apple Siri and Samsung Bixby. Meanwhile, we find that current defense strategies are not completely immune to advanced attacks. Our findings contribute valuable insights for enhancing defense mechanisms in VCS. Through this survey, we aim to raise awareness within the academic community about the security concerns of VCS and advocate for continued research in this crucial area.
△ Less
Submitted 4 January, 2024; v1 submitted 10 December, 2023;
originally announced December 2023.
-
Group actions on complexes, Kozsul models, presentations, and a theorem of Coxeter
Authors:
Nikolai V. Ivanov
Abstract:
By a well known theorem of K.S. Brown an action of a discrete group on a simply-connected complex allows to construct a presentation of this group modulo the stabilizers of vertices. The main goal of the present paper is to provide a new proof of this theorem based on ideas of J.-L. Kozsul. In contrast with Brown proof, we start with a redundant but fairly canonical presentation and then simplify…
▽ More
By a well known theorem of K.S. Brown an action of a discrete group on a simply-connected complex allows to construct a presentation of this group modulo the stabilizers of vertices. The main goal of the present paper is to provide a new proof of this theorem based on ideas of J.-L. Kozsul. In contrast with Brown proof, we start with a redundant but fairly canonical presentation and then simplify it. We illustrate this procedure by the examples of fundamental groups of CW-complexes, the symmetric groups, the group of rotations of the regular dodecahedron, and the binary icosahedral group, and also discuss in details a remarkable theorem of Coxeter about the presentations of the latter group.
△ Less
Submitted 29 October, 2023;
originally announced October 2023.
-
Non-abelian cohomology and Seifert-Van Kampen theorem
Authors:
Nikolai V. Ivanov
Abstract:
The first goal of the present paper it to present a simple and elementary proof of the standard Seifert-van Kampen theorem based on ideas of P. Olum. The key tool is the singular cohomology theory with non-abelian coefficients in dimensions 0 and 1. After this we apply non-abelian cohomology to prove Crowell-Fox version of Seifert-van Kampent theorem and its improvement die to Brown-Salleh (this p…
▽ More
The first goal of the present paper it to present a simple and elementary proof of the standard Seifert-van Kampen theorem based on ideas of P. Olum. The key tool is the singular cohomology theory with non-abelian coefficients in dimensions 0 and 1. After this we apply non-abelian cohomology to prove Crowell-Fox version of Seifert-van Kampent theorem and its improvement die to Brown-Salleh (this proof shows that the Lebesgue dimension of the disc is irrelevant for this improvement). Finally, we apply non-abelian cohomology to prove some theorem of van Kampen, which are more general than the standard version (and, in particular, include the computation of the fundamental group of the circle).
△ Less
Submitted 28 October, 2023;
originally announced October 2023.
-
Exclusion of ALP Cogenesis Dark Matter in a Mass Window Above 100 $μ$eV
Authors:
Aaron Quiskamp,
Ben T. McAllister,
Paul Altin,
Eugene N. Ivanov,
Maxim Goryachev,
Michael E. Tobar
Abstract:
We report the results of Phase 1b of The ORGAN Experiment, a microwave cavity haloscope searching for dark matter axions in the $107.42-111.93~μ$eV mass range. The search excludes axions with two-photon coupling $g_{aγγ}\geq 4\times 10^{-12}\, \textrm{GeV}^{-1}$ with $95\%$ confidence interval, setting the best upper bound to date and with the required sensitivity to exclude the axion-like particl…
▽ More
We report the results of Phase 1b of The ORGAN Experiment, a microwave cavity haloscope searching for dark matter axions in the $107.42-111.93~μ$eV mass range. The search excludes axions with two-photon coupling $g_{aγγ}\geq 4\times 10^{-12}\, \textrm{GeV}^{-1}$ with $95\%$ confidence interval, setting the best upper bound to date and with the required sensitivity to exclude the axion-like particle cogenesis model for dark matter in this range. This result was achieved using a tunable rectangular cavity, which mitigated several practical issues that become apparent when conducting high mass axion searches, and was the first such axion search to be conducted with such a cavity. It also represents the most sensitive axion haloscope experiment to date in the $\sim100~μ$eV mass region.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning
Authors:
Bocheng Chen,
Nikolay Ivanov,
Guangjing Wang,
Qiben Yan
Abstract:
Federated Learning (FL) is a distributed machine learning (ML) paradigm, aiming to train a global model by exploiting the decentralized data across millions of edge devices. Compared with centralized learning, FL preserves the clients' privacy by refraining from explicitly downloading their data. However, given the geo-distributed edge devices (e.g., mobile, car, train, or subway) with highly dyna…
▽ More
Federated Learning (FL) is a distributed machine learning (ML) paradigm, aiming to train a global model by exploiting the decentralized data across millions of edge devices. Compared with centralized learning, FL preserves the clients' privacy by refraining from explicitly downloading their data. However, given the geo-distributed edge devices (e.g., mobile, car, train, or subway) with highly dynamic networks in the wild, aggregating all the model updates from those participating devices will result in inevitable long-tail delays in FL. This will significantly degrade the efficiency of the training process. To resolve the high system heterogeneity in time-sensitive FL scenarios, we propose a novel FL framework, DynamicFL, by considering the communication dynamics and data quality across massive edge devices with a specially designed client manipulation strategy. \ours actively selects clients for model updating based on the network prediction from its dynamic network conditions and the quality of its training data. Additionally, our long-term greedy strategy in client selection tackles the problem of system performance degradation caused by short-term scheduling in a dynamic network. Lastly, to balance the trade-off between client performance evaluation and client manipulation granularity, we dynamically adjust the length of the observation window in the training process to optimize the long-term system efficiency. Compared with the state-of-the-art client selection scheme in FL, \ours can achieve a better model accuracy while consuming only 18.9\% -- 84.0\% of the wall-clock time. Our component-wise and sensitivity studies further demonstrate the robustness of \ours under various real-life scenarios.
△ Less
Submitted 16 July, 2023;
originally announced August 2023.
-
Boundary triplets and the index of families of self-adjoint elliptic boundary problems
Authors:
Nikolai V. Ivanov
Abstract:
The paper is devoted to an abstract axiomatic version of a construction of boundary triplets implicit in the works of M.I. Vishik and G. Grubb and its applications to the index of families of self-adjoint elliptic differential boundary problems of order one. This leads to an analytic proof of the index theorem for Dirac-like self-adjoint boundary problems from arXiv:2207.09574, and to an Agranovic…
▽ More
The paper is devoted to an abstract axiomatic version of a construction of boundary triplets implicit in the works of M.I. Vishik and G. Grubb and its applications to the index of families of self-adjoint elliptic differential boundary problems of order one. This leads to an analytic proof of the index theorem for Dirac-like self-adjoint boundary problems from arXiv:2207.09574, and to an Agranovich-Dynin type theorem computing the difference of indices of families of self-adjoint boundary problems differing only by the boundary conditions.
△ Less
Submitted 7 August, 2023; v1 submitted 26 June, 2023;
originally announced June 2023.
-
Security Defense For Smart Contracts: A Comprehensive Survey
Authors:
Nikolay Ivanov,
Chenning Li,
Qiben Yan,
Zhiyuan Sun,
Zhichao Cao,
Xiapu Luo
Abstract:
The blockchain technology has been used for recording state transitions of smart contracts - decentralized applications that can be invoked through external transactions. Smart contracts gained popularity and accrued hundreds of billions of dollars in market capitalization in recent years. Unfortunately, like all other programs, smart contracts are prone to security vulnerabilities that have incur…
▽ More
The blockchain technology has been used for recording state transitions of smart contracts - decentralized applications that can be invoked through external transactions. Smart contracts gained popularity and accrued hundreds of billions of dollars in market capitalization in recent years. Unfortunately, like all other programs, smart contracts are prone to security vulnerabilities that have incurred multimillion-dollar damages over the past decade. As a result, many automated threat mitigation solutions have been proposed to counter the security issues of smart contracts. These threat mitigation solutions include various tools and methods that are challenging to compare. This survey develops a comprehensive classification taxonomy of smart contract threat mitigation solutions within five orthogonal dimensions: defense modality, core method, targeted contracts, input-output data mapping, and threat model. We classify 133 existing threat mitigation solutions using our taxonomy and confirm that the proposed five dimensions allow us to concisely and accurately describe any smart contract threat mitigation solution. In addition to learning what the threat mitigation solutions do, we also show how these solutions work by synthesizing their actual designs into a set of uniform workflows corresponding to the eight existing defense core methods. We further create an integrated coverage map for the known smart contract vulnerabilities by the existing threat mitigation solutions. Finally, we perform the evidence-based evolutionary analysis, in which we identify trends and future perspectives of threat mitigation in smart contracts and pinpoint major weaknesses of the existing methodologies. For the convenience of smart contract security developers, auditors, users, and researchers, we deploy a regularly updated comprehensive open-source online registry of threat mitigation solutions.
△ Less
Submitted 9 May, 2023; v1 submitted 14 February, 2023;
originally announced February 2023.
-
TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts
Authors:
Nikolay Ivanov,
Qiben Yan,
Anurag Kompalli
Abstract:
Ethereum is a permissionless blockchain ecosystem that supports execution of smart contracts, the key enablers of decentralized finance (DeFi) and non-fungible tokens (NFT). However, the expressiveness of Ethereum smart contracts is a double-edged sword: while it enables blockchain programmability, it also introduces security vulnerabilities, i.e., the exploitable discrepancies between expected an…
▽ More
Ethereum is a permissionless blockchain ecosystem that supports execution of smart contracts, the key enablers of decentralized finance (DeFi) and non-fungible tokens (NFT). However, the expressiveness of Ethereum smart contracts is a double-edged sword: while it enables blockchain programmability, it also introduces security vulnerabilities, i.e., the exploitable discrepancies between expected and actual behaviors of the contract code. To address these discrepancies and increase the vulnerability coverage, we propose a new smart contract security testing approach called transaction encapsulation. The core idea lies in the local execution of transactions on a fully-synchronized yet isolated Ethereum node, which creates a preview of outcomes of transaction sequences on the current state of blockchain. This approach poses a critical technical challenge -- the well-known time-of-check/time-of-use (TOCTOU) problem, i.e., the assurance that the final transactions will exhibit the same execution paths as the encapsulated test transactions. In this work, we determine the exact conditions for guaranteed execution path replicability of the tested transactions, and implement a transaction testing tool, TxT, which reveals the actual outcomes of Ethereum transactions. To ensure the correctness of testing, TxT deterministically verifies whether a given sequence of transactions ensues an identical execution path on the current state of blockchain. We analyze over 1.3 billion Ethereum transactions and determine that 96.5% of them can be verified by TxT. We further show that TxT successfully reveals the suspicious behaviors associated with 31 out of 37 vulnerabilities (83.8% coverage) in the smart contract weakness classification (SWC) registry. In comparison, the vulnerability coverage of all the existing defense approaches combined only reaches 40.5%.
△ Less
Submitted 20 January, 2023;
originally announced January 2023.
-
Searching for Low-Mass Axions using Resonant Upconversion
Authors:
Catriona A. Thomson,
Maxim Goryachev,
Ben T. McAllister,
Eugene N. Ivanov,
Paul Altin,
Michael E. Tobar
Abstract:
We present new results of a room temperature resonant AC haloscope, which searches for axions via photon upconversion. Traditional haloscopes require a strong applied DC magnetic background field surrounding the haloscope cavity resonator, the resonant frequency of which is limited by available bore dimensions. UPLOAD, the UPconversion Low-Noise Oscillator Axion Detection experiment, replaces this…
▽ More
We present new results of a room temperature resonant AC haloscope, which searches for axions via photon upconversion. Traditional haloscopes require a strong applied DC magnetic background field surrounding the haloscope cavity resonator, the resonant frequency of which is limited by available bore dimensions. UPLOAD, the UPconversion Low-Noise Oscillator Axion Detection experiment, replaces this DC magnet with a second microwave background resonance within the detector cavity, which upconverts energy from the axion field into the readout mode, accessing axions around the beat frequency of the modes. Furthermore, unlike the DC case, the experiment is sensitive to a newly proposed quantum electromagnetodynamical axion coupling term $g_{aBB}$. Two experimental approaches are outlined - one using frequency metrology, and the other using power detection of a thermal readout mode. The results of the power detection experiment are presented, which allows exclusion of axions of masses between 1.12 $-$ 1.20 $μeV$ above a coupling strength of both $g_{aγγ}$ and $g_{aBB}$ at $3 \times 10^{-6}$ 1/GeV, after a measurement period of 30 days, which is a three order of magnitude improvement over our previous result.
△ Less
Submitted 11 May, 2023; v1 submitted 17 January, 2023;
originally announced January 2023.
-
Prediction and Uncertainty Quantification of SAFARI-1 Axial Neutron Flux Profiles with Neural Networks
Authors:
Lesego E. Moloko,
Pavel M. Bokov,
Xu Wu,
Kostadin N. Ivanov
Abstract:
Artificial Neural Networks (ANNs) have been successfully used in various nuclear engineering applications, such as predicting reactor physics parameters within reasonable time and with a high level of accuracy. Despite this success, they cannot provide information about the model prediction uncertainties, making it difficult to assess ANN prediction credibility, especially in extrapolated domains.…
▽ More
Artificial Neural Networks (ANNs) have been successfully used in various nuclear engineering applications, such as predicting reactor physics parameters within reasonable time and with a high level of accuracy. Despite this success, they cannot provide information about the model prediction uncertainties, making it difficult to assess ANN prediction credibility, especially in extrapolated domains. In this study, Deep Neural Networks (DNNs) are used to predict the assembly axial neutron flux profiles in the SAFARI-1 research reactor, with quantified uncertainties in the ANN predictions and extrapolation to cycles not used in the training process. The training dataset consists of copper-wire activation measurements, the axial measurement locations and the measured control bank positions obtained from the reactor's historical cycles. Uncertainty Quantification of the regular DNN models' predictions is performed using Monte Carlo Dropout (MCD) and Bayesian Neural Networks solved by Variational Inference (BNN VI). The regular DNNs, DNNs solved with MCD and BNN VI results agree very well among each other as well as with the new measured dataset not used in the training process, thus indicating good prediction and generalization capability. The uncertainty bands produced by MCD and BNN VI agree very well, and in general, they can fully envelop the noisy measurement data points. The developed ANNs are useful in supporting the experimental measurements campaign and neutronics code Verification and Validation (V&V).
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Is Rust C++-fast? Benchmarking System Languages on Everyday Routines
Authors:
Nikolay Ivanov
Abstract:
Rust is a relatively new system programming language that has been experiencing a rapid adoption in the past 10 years. Rust incorporates a memory ownership model enforced at a compile time. Since this model involves zero runtime overhead, programs written in Rust are not only memory-safe but also fast, leading to performance comparable to C and C++. Multiple existing benchmarks comparing the perfo…
▽ More
Rust is a relatively new system programming language that has been experiencing a rapid adoption in the past 10 years. Rust incorporates a memory ownership model enforced at a compile time. Since this model involves zero runtime overhead, programs written in Rust are not only memory-safe but also fast, leading to performance comparable to C and C++. Multiple existing benchmarks comparing the performance of Rust with other languages focus on rarely used superficial algorithms, leading to somewhat inconclusive results. In this work, we conduct a comparative performance benchmark of Rust and C++ using commonly used algorithms and data structures rather than exotic ones. Our evaluation shows that the overall performance of Rust is similar to C++, with only minor disadvantage. We also demonstrate that in some Rust routines are slightly faster than the ones of C++.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens
Authors:
Nikolay Ivanov,
Qiben Yan
Abstract:
In this work, we explore the class of Ethereum smart contracts called the administrated ERC20 tokens. We demonstrate that these contracts are more owner-controlled and less safe than the services they try to disrupt, such as banks and centralized online payment systems. We develop a binary classifier for identification of administrated ERC20 tokens, and conduct extensive data analysis, which revea…
▽ More
In this work, we explore the class of Ethereum smart contracts called the administrated ERC20 tokens. We demonstrate that these contracts are more owner-controlled and less safe than the services they try to disrupt, such as banks and centralized online payment systems. We develop a binary classifier for identification of administrated ERC20 tokens, and conduct extensive data analysis, which reveals that nearly 9 out of 10 ERC20 tokens on Ethereum are administrated, and thereby unsafe to engage with even under the assumption of trust towards their owners. We design and implement SafelyAdministrated - a Solidity abstract class that safeguards users of administrated ERC20 tokens from adversarial attacks or frivolous behavior of the tokens' owners.
△ Less
Submitted 17 September, 2022;
originally announced September 2022.
-
Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering
Authors:
Nikolay Ivanov,
Qiben Yan
Abstract:
We reveal six zero-day social engineering attacks in Ethereum, and subdivide them into two classes: Address Manipulation and Homograph. We demonstrate the attacks by embedding them in source codes of five popular smart contracts with combined market capitalization of over \$29 billion, and show that the attacks have the ability to remain dormant during the testing phase and activate only after pro…
▽ More
We reveal six zero-day social engineering attacks in Ethereum, and subdivide them into two classes: Address Manipulation and Homograph. We demonstrate the attacks by embedding them in source codes of five popular smart contracts with combined market capitalization of over \$29 billion, and show that the attacks have the ability to remain dormant during the testing phase and activate only after production deployment. We analyze 85,656 open source smart contracts and find 1,027 contracts that can be directly used for performing social engineering attacks. For responsible disclosure, we contact seven smart contract security firms. In the spirit of open research, we make the source codes of the attack benchmark, tools, and datasets available to the public.
△ Less
Submitted 17 September, 2022;
originally announced September 2022.
-
Comparing Instrument Spectral Sensitivity of Dissimilar Electromagnetic Haloscopes to Axion Dark Matter and High Frequency Gravitational Waves
Authors:
Michael E. Tobar,
Catriona A. Thomson,
William M. Campbell,
Aaron Quiskamp,
Jeremy F. Bourhill,
Benjamin T. McAllister,
Eugene N. Ivanov,
Maxim Goryachev
Abstract:
It is known that haloscopes that search for dark matter axions via the axion-photon anomaly are also sensitive to gravitational radiation through the inverse Gertsenshtein effect. Recently this way of searching for high frequency gravitational waves has gained momentum as it has been shown that the strain sensitivities of such detectors are of the same order of sensitivity to the axion-photon thet…
▽ More
It is known that haloscopes that search for dark matter axions via the axion-photon anomaly are also sensitive to gravitational radiation through the inverse Gertsenshtein effect. Recently this way of searching for high frequency gravitational waves has gained momentum as it has been shown that the strain sensitivities of such detectors are of the same order of sensitivity to the axion-photon theta angle. Thus, after calculating the sensitivity of a haloscope to an axion signal, we also have calculated the order of magnitude sensitivity to a gravitational wave signal of the same spectral and temporal form. However, it is unlikely that a gravitational wave and an axion signal will be of the same form, since physically the way the signals are generated are completely different. For gravitational wave detection, the spectral strain sensitivity is in units strain per square root Hz, is the natural way to compare the sensitivity of gravitational wave detectors due to its independence on the gravitational wave signal. In this work, we introduce a systematic way to calculate the spectral sensitivity of an axion haloscope, so instrument comparison may be achieved independent of signal assumptions and only depends on the axion to signal transduction sensitivity and noise in the instrument. Thus, the calculation of the spectral sensitivity not only allows the comparison of dissimilar axion detectors independent of signal, but also allows us to compare the order of magnitude gravitational wave sensitivity in terms of spectral strain sensitivity, allowing comparisons to standard gravitational wave detectors based on optical interferometers and resonant-mass technology.
△ Less
Submitted 16 October, 2022; v1 submitted 7 September, 2022;
originally announced September 2022.
-
Scarf's theorems, simplices, and oriented matroids
Authors:
Nikolai V. Ivanov
Abstract:
In 1967 Herbert Scarf suggested a new proof of Brouwer fixed point theorem based on a surprising analogue of Sperner's lemma. This analogue was motivated by Scarf's work in game theory and mathematical economics. Moreover, Scarf proved a much general version of Sperner's lemma dealing with colorings by vectors. The present paper begins by revisiting Scarf's ideas from the point of view of the basi…
▽ More
In 1967 Herbert Scarf suggested a new proof of Brouwer fixed point theorem based on a surprising analogue of Sperner's lemma. This analogue was motivated by Scarf's work in game theory and mathematical economics. Moreover, Scarf proved a much general version of Sperner's lemma dealing with colorings by vectors. The present paper begins by revisiting Scarf's ideas from the point of view of the basic theory of simplicial cochains in the spirit of author's papers arXiv:1909.00940 and arXiv:2012.13104. After this we get to the main new results of the paper, namely, to a generalization of Scarf results to colorings with colors belonging to an oriented matroid. No knowledge of the theory of oriented matroids is assumed. In the last section we return to the original Scarf theorem and reprove it using even more classical methods of the combinatorial topology of Euclidean spaces. Also, we generalize a theorem of Kannai.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
The index of self-adjoint Shapiro-Lopatinskii boundary problems of order one
Authors:
Nikolai V. Ivanov
Abstract:
The paper is devoted to an analogue of Atiyah-Bott-Singer index theorem for families of self-adjoint elliptic (i.e. satisfying the Shapiro-Lopatinskii condition) local boundary problems of order 1. The proofs are based on classical topological and pseudo-differential methods, but in the self-adjoint case one encounters some new phenomena. The topological index is defined following Atiyah-Bott, but…
▽ More
The paper is devoted to an analogue of Atiyah-Bott-Singer index theorem for families of self-adjoint elliptic (i.e. satisfying the Shapiro-Lopatinskii condition) local boundary problems of order 1. The proofs are based on classical topological and pseudo-differential methods, but in the self-adjoint case one encounters some new phenomena. The topological index is defined following Atiyah-Bott, but in the self-adjoint case one encounters an obstruction not present in the classical situation. The analytical index is defined with the help of author's approach arXiv:2111.15081, which generalized the one of Atiyah-Singer. On the analytic index side one encounters an obstruction to the realization of symbols by self-adjoint boundary problems, similar to the obstruction to defining the topological index. As an application, we generalize results of Gorokhovsky and Lesch arXiv:1310.0210.
In the first version of this paper the index theorem was proved only under an additional technical assumption. A theory of multiplicative properties of symbols and operators, developed in the second version, allows to remove this assumption.
△ Less
Submitted 27 June, 2023; v1 submitted 19 July, 2022;
originally announced July 2022.
-
SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech
Authors:
Hanqing Guo,
Qiben Yan,
Nikolay Ivanov,
Ying Zhu,
Li Xiao,
Eric J. Hunter
Abstract:
Voice-activated systems are integrated into a variety of desktop, mobile, and Internet-of-Things (IoT) devices. However, voice spoofing attacks, such as impersonation and replay attacks, in which malicious attackers synthesize the voice of a victim or simply replay it, have brought growing security concerns. Existing speaker verification techniques distinguish individual speakers via the spectrogr…
▽ More
Voice-activated systems are integrated into a variety of desktop, mobile, and Internet-of-Things (IoT) devices. However, voice spoofing attacks, such as impersonation and replay attacks, in which malicious attackers synthesize the voice of a victim or simply replay it, have brought growing security concerns. Existing speaker verification techniques distinguish individual speakers via the spectrographic features extracted from an audible frequency range of voice commands. However, they often have high error rates and/or long delays. In this paper, we explore a new direction of human voice research by scrutinizing the unique characteristics of human speech at the ultrasound frequency band. Our research indicates that the high-frequency ultrasound components (e.g. speech fricatives) from 20 to 48 kHz can significantly enhance the security and accuracy of speaker verification. We propose a speaker verification system, SUPERVOICE that uses a two-stream DNN architecture with a feature fusion mechanism to generate distinctive speaker models. To test the system, we create a speech dataset with 12 hours of audio (8,950 voice samples) from 127 participants. In addition, we create a second spoofed voice dataset to evaluate its security. In order to balance between controlled recordings and real-world applications, the audio recordings are collected from two quiet rooms by 8 different recording devices, including 7 smartphones and an ultrasound microphone. Our evaluation shows that SUPERVOICE achieves 0.58% equal error rate in the speaker verification task, it only takes 120 ms for testing an incoming utterance, outperforming all existing speaker verification systems. Moreover, within 91 ms processing time, SUPERVOICE achieves 0% equal error rate in detecting replay attacks launched by 5 different loudspeakers.
△ Less
Submitted 28 May, 2022;
originally announced May 2022.
-
Precise wavefront characterization of X-ray optical elements using a laboratory source
Authors:
J. L. Dresselhaus,
H. Fleckenstein,
M. Domaracky,
M. Prasciolu,
N. Ivanov,
J. Carnis,
K. T. Murray,
A. J. Morgan,
H. N. Chapman,
S. Bajt
Abstract:
Improvements in X-ray optics critically depend on the measurement of their optical performance. The knowledge of wavefront aberrations, for example, can be used to improve the fabrication of optical elements or to design phase correctors to compensate for these errors. Nowadays, the characterization of such optics is made using intense X-ray sources such as synchrotrons. However, the limited acces…
▽ More
Improvements in X-ray optics critically depend on the measurement of their optical performance. The knowledge of wavefront aberrations, for example, can be used to improve the fabrication of optical elements or to design phase correctors to compensate for these errors. Nowadays, the characterization of such optics is made using intense X-ray sources such as synchrotrons. However, the limited access to these facilities can substantially slow down the development process. Improvements in the brightness of lab-based X-ray micro-sources in combination with the development of new metrology methods, and in particular ptychographic X-ray speckle tracking, enable characterization of X-ray optics in the lab with a precision and sensitivity not possible before. Here, we present a laboratory set-up that utilizes a commercially available X-ray source and can be used to characterize different types of X-ray optics. The set-up is used in our laboratory on a routine basis to characterize multilayer Laue lenses of high numerical aperture and other optical elements. This typically includes measurements of the wavefront distortions, optimum operating photon energy and focal length of the lens. To check the sensitivity and accuracy of this laboratory set-up we compared the results to those obtained at the synchrotron and saw no significant difference. To illustrate the feedback of measurements on performance, we demonstrated the correction of the phase errors of a particular multilayer Laue lens using a 3D printed compound refractive phase plate.
△ Less
Submitted 27 March, 2022;
originally announced March 2022.
-
Direct Search for Dark Matter Axions Excluding ALP Cogenesis in the 63-67 micro-eV Range, with The ORGAN Experiment
Authors:
Aaron P. Quiskamp,
Ben T. McAllister,
Paul Altin,
Eugene N. Ivanov,
Maxim Goryachev,
Michael E. Tobar
Abstract:
The standard model axion seesaw Higgs portal inflation (SMASH) model is a well motivated, self-contained description of particle physics over a range of energy scales that predicts axion dark matter particles to exist within the mass range of $50-200\,μ$eV. To scan these masses an axion haloscope under a strong constant magnetic field must operate between 12 to 48 GHz. The ORGAN experiment (situat…
▽ More
The standard model axion seesaw Higgs portal inflation (SMASH) model is a well motivated, self-contained description of particle physics over a range of energy scales that predicts axion dark matter particles to exist within the mass range of $50-200\,μ$eV. To scan these masses an axion haloscope under a strong constant magnetic field must operate between 12 to 48 GHz. The ORGAN experiment (situated in Perth, Australia) is a microwave cavity axion haloscope that aims to search the majority of the mass range predicted by the SMASH model. Here we present results of Phase 1a, the first experiment to scan and search for axions in the microwave Ku Band. Our initial scan sets a new limit on the coupling of axions to two photons of $g_{aγγ}\geq 3\times 10^{-12}\, \textrm{GeV}^{-1}$ over the mass range $63.2$ to $67.1~μ$eV with $95\%$ confidence. This result is the most sensitive to date in this mass range, sufficient to exclude the well motivated ALP (Axion Like Particle) cogenesis model for dark matter, which adds ALPs to the standard model in the early universe to simultaneously explain the observed baryon and dark matter densities. To attain this level of sensitivity we utilised a TM$_{010}$ cylindrical cavity resonator, scanned between 15.28 to 16.23 GHz through the utilisation of a tuning rod. Measurements were performed over a duration of 3.5 weeks with a $74\%$ duty cycle, with the resonator coupled to a low noise HEMT amplifier and placed inside a superconducting solenoidal electromagnet of 11.5 Tesla in magnetic field strength.
△ Less
Submitted 22 March, 2022;
originally announced March 2022.
-
On the use of multilayer Laue lenses with X-ray Free Electron Lasers
Authors:
Mauro Prasciolu,
Kevin T. Murray,
Nikolay Ivanov,
Holger Fleckenstein,
Martin Domaracký,
Luca Gelisio,
Fabian Trost,
Kartik Ayyer,
Dietrich Krebs,
Steve Aplin,
Salah Awel,
Ulrike Boesenberg,
Anton Barty,
Armando D. Estillore,
Matthias Fuchs,
Yaroslav Gevorkov,
Joerg Hallmann,
Chan Kim,
Juraj Knoška,
Jochen Küpper,
Chufeng Li,
Wei Lu,
Valerio Mariani,
Andrew J. Morgan,
Johannes Möller
, et al. (12 additional authors not shown)
Abstract:
Multilayer Laue lenses were used for the first time to focus x-rays from an X-ray Free Electron Laser (XFEL). In an experiment, which was performed at the European XFEL, we demonstrated focusing to a spot size of a few tens of nanometers. A series of runs in which the number of pulses per train was increased from 1 to 2, 3, 4, 5, 6, 7, 10, 20 and 30 pulses per train, all with a pulse separation of…
▽ More
Multilayer Laue lenses were used for the first time to focus x-rays from an X-ray Free Electron Laser (XFEL). In an experiment, which was performed at the European XFEL, we demonstrated focusing to a spot size of a few tens of nanometers. A series of runs in which the number of pulses per train was increased from 1 to 2, 3, 4, 5, 6, 7, 10, 20 and 30 pulses per train, all with a pulse separation of 3.55 us, was done using the same set of lenses. The increase in the number of pulses per train was accompanied with an increase of x-ray intensity (transmission) from 9% to 92% at 5 pulses per train, and then the transmission was reduced to 23.5 % when the pulses were increased further. The final working condition was 30 pulses per train and 23.5% transmission. Only at this condition we saw that the diffraction efficiency of the MLLs changed over the course of a pulse train, and this variation was reproducible from train to train. We present the procedure to align and characterize these lenses and discuss challenges working with the pulse trains from this unique x-ray source.
△ Less
Submitted 22 March, 2022;
originally announced March 2022.
-
Spectral sections: two proofs of a theorem of Melrose-Piazza
Authors:
Nikolai V. Ivanov
Abstract:
Spectral sections of families of self-adjoint Fredholm operators were introduced by Melrose and Piazza for the needs of index theory. The basic result about spectral sections is a theorem of Melrose and Piazza to the effect that a family admits a spectral section if and only if its analytic index vanishes. The present paper is devoted to two proofs of this theorem. These proofs allow to generalize…
▽ More
Spectral sections of families of self-adjoint Fredholm operators were introduced by Melrose and Piazza for the needs of index theory. The basic result about spectral sections is a theorem of Melrose and Piazza to the effect that a family admits a spectral section if and only if its analytic index vanishes. The present paper is devoted to two proofs of this theorem. These proofs allow to generalize this theorem and to clarify some subtle aspects related to the definition of the analytic index and trivializations of Hilbert bundles. It is based on ideas of author's paper arXiv:2111.15081, but is largely independent from it.
△ Less
Submitted 14 February, 2022; v1 submitted 8 December, 2021;
originally announced December 2021.
-
Topological categories related to Fredholm operators: II. The analytical index
Authors:
Nikolai V. Ivanov
Abstract:
Naively, the analytic index of a family of self-adjoint Fredholm operators ought to be (an equivalence class of) the family of the kernels of these operators. The present paper is devoted to a rigorous version of this idea based on ideas of Segal as developed by the author in arXiv:2111.14313 [math.KT]. The resulting new definition of the analytic index makes sense under much weaker continuity ass…
▽ More
Naively, the analytic index of a family of self-adjoint Fredholm operators ought to be (an equivalence class of) the family of the kernels of these operators. The present paper is devoted to a rigorous version of this idea based on ideas of Segal as developed by the author in arXiv:2111.14313 [math.KT]. The resulting new definition of the analytic index makes sense under much weaker continuity assumptions than the Atiyah-Singer one and can be easily adjusted to families of operators in fibers of a Hilbert bundle. We prove the correctness of the new definition and show that it agrees with the Atiyah-Singer one when the latter applies. As an illustration, these results are used to clarify some subtle aspects of the notion of spectral sections introduced by Melrose and Piazza. The necessary definitions and results from arXiv:2111.14313 [math.KT] are repeated or reviewed in order to make this paper independent to the extent possible.
△ Less
Submitted 8 February, 2023; v1 submitted 29 November, 2021;
originally announced November 2021.
-
Topological categories related to Fredholm operators: I. Classifying spaces
Authors:
Nikolai V. Ivanov
Abstract:
In 1970s Segal outlined proofs of two theorems relating spaces of Fredholm and self-adjoint Fredholm operators with Quillen's constructions used to define higher algebraic K-theory. In the present paper we provide detailed proofs of these theorems of Segal (different from the ones outlined by Segal) and then transplant some further ideas of Quillen to the real of Fredholm and self-adjoint Fredholm…
▽ More
In 1970s Segal outlined proofs of two theorems relating spaces of Fredholm and self-adjoint Fredholm operators with Quillen's constructions used to define higher algebraic K-theory. In the present paper we provide detailed proofs of these theorems of Segal (different from the ones outlined by Segal) and then transplant some further ideas of Quillen to the real of Fredholm and self-adjoint Fredholm operators. The main results may be considered as partial analogues of the equivalence of Quillen's two definition of higher algebraic K-theory. Along the way we relate spaces of Fredholm and self-adjoint Fredholm operators with more concrete classifying spaces. These results are partially motivated by applications to the index theory in a related paper.
△ Less
Submitted 7 February, 2023; v1 submitted 28 November, 2021;
originally announced November 2021.
-
Quantum gravitational states of ultracold neutrons as a tool for probing of beyond-Riemann gravity
Authors:
A. N. Ivanov,
M. Wellenzohn,
H. Abele
Abstract:
We analyze a possibility to probe beyond-Riemann gravity (BRG) contributions, introduced by Kostelecky and Li (see Phys. Rev. D 103, 024059 (2021) and Phys. Rev. D 104, 044054 (2021)) on the basis of the Effective Field Theory (EFT) by Kostelecky Phys. Rev. D 69, 105009 (2004). We carry out such an analysis by calculating the BRG contributions to the transition frequencies of the quantum gravitati…
▽ More
We analyze a possibility to probe beyond-Riemann gravity (BRG) contributions, introduced by Kostelecky and Li (see Phys. Rev. D 103, 024059 (2021) and Phys. Rev. D 104, 044054 (2021)) on the basis of the Effective Field Theory (EFT) by Kostelecky Phys. Rev. D 69, 105009 (2004). We carry out such an analysis by calculating the BRG contributions to the transition frequencies of the quantum gravitational states of ultracold neutrons (UCNs). These states are being used for a test of interactions beyond the Standard Model (SM) and General Relativity (GR) in the qBOUNCE experiments. We improve by order of magnitude some constraints obtained by Kostelecky and Li (2106.11293 [gr-qc]).
△ Less
Submitted 21 September, 2021;
originally announced September 2021.
-
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion
Authors:
Nikolay Ivanov,
Qiben Yan
Abstract:
Hardware wallets are designed to withstand malware attacks by isolating their private keys from the cyberspace, but they are vulnerable to the attacks that fake an address stored in a clipboard. To prevent such attacks, a hardware wallet asks the user to verify the recipient address shown on the wallet display. Since crypto addresses are long sequences of random symbols, their manual verification…
▽ More
Hardware wallets are designed to withstand malware attacks by isolating their private keys from the cyberspace, but they are vulnerable to the attacks that fake an address stored in a clipboard. To prevent such attacks, a hardware wallet asks the user to verify the recipient address shown on the wallet display. Since crypto addresses are long sequences of random symbols, their manual verification becomes a difficult task. Consequently, many users of hardware wallets elect to verify only a few symbols in the address, and this can be exploited by an attacker. In this work, we introduce EthClipper, an attack that targets owners of hardware wallets on the Ethereum platform. EthClipper malware queries a distributed database of pre-mined accounts in order to select the address with maximum visual similarity to the original one. We design and implement a EthClipper malware, which we test on Trezor, Ledger, and KeepKey wallets. To deliver computation and storage resources for the attack, we implement a distributed service, ClipperCloud, and test it on different deployment environments. Our evaluation shows that with off-the-shelf PCs and NAS storage, an attacker would be able to mine a database capable of matching 25% of the digits in an address to achieve a 50% chance of finding a fitting fake address. For responsible disclosure, we have contacted the manufactures of the hardware wallets used in the attack evaluation, and they all confirm the danger of EthClipper.
△ Less
Submitted 31 August, 2021;
originally announced August 2021.
-
Rectifying Administrated ERC20 Tokens
Authors:
Nikolay Ivanov,
Hanqing Guo,
Qiben Yan
Abstract:
The developers of Ethereum smart contracts often implement administrating patterns, such as censoring certain users, creating or destroying balances on demand, destroying smart contracts, or injecting arbitrary code. These routines turn an ERC20 token into an administrated token - the type of Ethereum smart contract that we scrutinize in this research. We discover that many smart contracts are adm…
▽ More
The developers of Ethereum smart contracts often implement administrating patterns, such as censoring certain users, creating or destroying balances on demand, destroying smart contracts, or injecting arbitrary code. These routines turn an ERC20 token into an administrated token - the type of Ethereum smart contract that we scrutinize in this research. We discover that many smart contracts are administrated, and the owners of these tokens carry lesser social and legal responsibilities compared to the traditional centralized actors that those tokens intend to disrupt. This entails two major problems: a) the owners of the tokens have the ability to quickly steal all the funds and disappear from the market; and b) if the private key of the owner's account is stolen, all the assets might immediately turn into the property of the attacker. We develop a pattern recognition framework based on 9 syntactic features characterizing administrated ERC20 tokens, which we use to analyze existing smart contracts deployed on Ethereum Mainnet. Our analysis of 84,062 unique Ethereum smart contracts reveals that nearly 58% of them are administrated ERC20 tokens, which accounts for almost 90% of all ERC20 tokens deployed on Ethereum. To protect users from the frivolousness of unregulated token owners without depriving the ability of these owners to properly manage their tokens, we introduce SafelyAdministrated - a library that enforces a responsible ownership and management of ERC20 tokens. The library introduces three mechanisms: deferred maintenance, board of trustees and safe pause. We implement and test SafelyAdministrated in the form of Solidity abstract contract, which is ready to be used by the next generation of safely administrated ERC20 tokens.
△ Less
Submitted 17 July, 2021;
originally announced July 2021.
-
System-Wide Security for Offline Payment Terminals
Authors:
Nikolay Ivanov,
Qiben Yan
Abstract:
Most self-service payment terminals require network connectivity for processing electronic payments. The necessity to maintain network connectivity increases costs, introduces cybersecurity risks, and significantly limits the number of places where the terminals can be installed. Leading payment service providers have proposed offline payment solutions that rely on algorithmically generated paymen…
▽ More
Most self-service payment terminals require network connectivity for processing electronic payments. The necessity to maintain network connectivity increases costs, introduces cybersecurity risks, and significantly limits the number of places where the terminals can be installed. Leading payment service providers have proposed offline payment solutions that rely on algorithmically generated payment tokens. Existing payment token solutions, however, require complex mechanisms for authentication, transaction management, and most importantly, security risk management. In this paper, we present VolgaPay, a blockchain-based system that allows merchants to deploy secure offline payment terminal infrastructure that does not require collection and storage of any sensitive data. We design a novel payment protocol which mitigates security threats for all the participants of VolgaPay, such that the maximum loss from gaining full access to any component by an adversary incurs only a limited scope of harm. We achieve significant enhancements in security, operation efficiency, and cost reduction via a combination of polynomial multi-hash chain micropayment channels and blockchain grafting for off-chain channel state transition. We implement the VolgaPay payment system, and with thorough evaluation and security analysis, we demonstrate that VolgaPay is capable of delivering a fast, secure, and cost-efficient solution for offline payment terminals.
△ Less
Submitted 18 July, 2021;
originally announced July 2021.
-
Status of the Yakutsk air shower array and future plans
Authors:
A. K. Alekseev,
E. A. Atlasov,
N. G. Bolotnikov,
A. V. Bosikov,
N. A. Dyachkovskiy,
N. S. Gerasimova,
A. V. Glushkov,
A. A. Ivanov,
O. N. Ivanov,
D. N. Kardashevsky,
I. A. Kellarev,
S. P. Knurenko,
A. D. Krasilnikov,
A. N. Krivenkov,
I. V. Ksenofontov,
L. T. Ksenofontov,
K. G. Lebedev,
S. V. Matarkin,
V. P. Mokhnachevskaya,
E. V. Nikolaeva,
N. I. Neustroev,
I. S. Petrov,
N. D. Platonov,
A. S. Proshutinsky,
A. V. Sabourov
, et al. (4 additional authors not shown)
Abstract:
The Yakutsk Extensive Air Shower Array has been continuously operating for more than 50 years (since 1970) and up until recently it has been one of world's largest ground-based instruments aimed at studying the properties of cosmic rays in the ultra-high energy domain. In this report we discuss results recently obtained at the array - on cosmic rays energy spectrum, mass composition and directiona…
▽ More
The Yakutsk Extensive Air Shower Array has been continuously operating for more than 50 years (since 1970) and up until recently it has been one of world's largest ground-based instruments aimed at studying the properties of cosmic rays in the ultra-high energy domain. In this report we discuss results recently obtained at the array - on cosmic rays energy spectrum, mass composition and directional anisotropy - and how they fit into the world data. Special attention is paid to the measurements of muonic component of extensive air showers. Theoretical results of particle acceleration at shocks are also briefly reviewed. Future scientific and engineering plans on the array modernization are discussed.
△ Less
Submitted 15 July, 2021;
originally announced July 2021.
-
Blockumulus: A Scalable Framework for Smart Contracts on the Cloud
Authors:
Nikolay Ivanov,
Qiben Yan,
Qingyang Wang
Abstract:
Public blockchains have spurred the growing popularity of decentralized transactions and smart contracts, but they exhibit limitations on the transaction throughput, storage, and computation. To avoid transaction gridlock, public blockchains impose large fees and per-block resource limits, making it difficult to accommodate the ever-growing transaction demand. Previous research endeavors to improv…
▽ More
Public blockchains have spurred the growing popularity of decentralized transactions and smart contracts, but they exhibit limitations on the transaction throughput, storage, and computation. To avoid transaction gridlock, public blockchains impose large fees and per-block resource limits, making it difficult to accommodate the ever-growing transaction demand. Previous research endeavors to improve the scalability of blockchain through various technologies, such as side-chaining, sharding, secured off-chain computation, communication network optimizations, and efficient consensus protocols. However, these approaches have not attained a widespread adoption due to their inability in delivering a cloud-like performance, in terms of the scalability in transaction throughput, storage, and compute capacity. In this work, we determine that the major obstacle to public blockchain scalability is their underlying unstructured P2P networks. We further show that a centralized network can support the deployment of decentralized smart contracts. We propose a novel approach for achieving scalable decentralization: instead of trying to make blockchain scalable, we deliver decentralization to already scalable cloud by using an Ethereum smart contract. We introduce Blockumulus, a framework that can deploy decentralized cloud smart contract environments using a novel technique called overlay consensus. Through experiments, we demonstrate that Blockumulus is scalable in all three dimensions: computation, data storage, and transaction throughput. Besides eliminating the current code execution and storage restrictions, Blockumulus delivers a transaction latency between 2 and 5 seconds under normal load. Moreover, the stress test of our prototype reveals the ability to execute 20,000 simultaneous transactions under 26 seconds, which is on par with the average throughput of worldwide credit card transactions.
△ Less
Submitted 10 July, 2021;
originally announced July 2021.
-
Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization
Authors:
Nikolay Ivanov,
Qiben Yan
Abstract:
The Foreign Exchange (Forex) is a large decentralized market, on which trading analysis and algorithmic trading are popular. Research efforts have been focusing on proof of efficiency of certain technical indicators. We demonstrate, however, that the values of indicator functions are not reproducible and often reduce the number of trade opportunities, compared to price-action trading.
In this wo…
▽ More
The Foreign Exchange (Forex) is a large decentralized market, on which trading analysis and algorithmic trading are popular. Research efforts have been focusing on proof of efficiency of certain technical indicators. We demonstrate, however, that the values of indicator functions are not reproducible and often reduce the number of trade opportunities, compared to price-action trading.
In this work, we develop two dataset-agnostic Forex trading heuristic templates with high rate of trading signals. In order to determine most optimal parameters for the given heuristic prototypes, we perform a machine learning simulation of 10 years of Forex price data over three low-margin instruments and 6 different OHLC granularities. As a result, we develop a specific and reproducible list of most optimal trade parameters found for each instrument-granularity pair, with 118 pips of average daily profit for the optimized configuration.
△ Less
Submitted 10 May, 2021;
originally announced May 2021.
-
Rearrangement of electron shells and interchannel interaction in the K photoabsorption of Ne
Authors:
N. M. Novikovskiy,
D. V. Rezvan,
N. M. Ivanov,
I. D. Petrov,
B. M. Lagutin,
A. Knie,
A. Ehresmann,
Ph. V. Demekhin,
V. L. Sukhorukov
Abstract:
A detailed theoretical analysis of the 1s photoionization of neon is presented. It is found that the most significant many-electron correlation in computing photoionization of inner shells is the rearrangement of the outer shells caused by the inner vacancy. Further noticeable effects are: (i) the polarization of the ion core by the outgoing photoelectron and (ii) the coherent effect of double exc…
▽ More
A detailed theoretical analysis of the 1s photoionization of neon is presented. It is found that the most significant many-electron correlation in computing photoionization of inner shells is the rearrangement of the outer shells caused by the inner vacancy. Further noticeable effects are: (i) the polarization of the ion core by the outgoing photoelectron and (ii) the coherent effect of double excitation/ionization. The core polarization increases the photoionization cross section by about 10% at the 1s threshold, and the coherent excitation results in further increases by about 5%. Incoherent excitation of the satellite channel leads to an additional 10% increase in the photoabsorption cross section in the double-ionization threshold region.
△ Less
Submitted 20 May, 2021;
originally announced May 2021.
-
Radiative corrections of order $O(αE_e/m_N)$ to Sirlin's radiative corrections of order $O(α/π)$, induced by the hadronic structure of the neutron
Authors:
A. N. Ivanov,
R. Höllwieser,
N. I. Troitskaya,
M. Wellenzohn,
Ya. A. Berdnikov
Abstract:
We investigate the contributions of the hadronic structure of the neutron to radiative $O(αE_e/m_N)$ corrections (or the inner $O(αE_e/m_N)$ RC) to the neutron beta decay, where $α$, $E_e$ and $m_N$ are the fine-structure constant, the electron energy and the nucleon mass, respectively. We perform the calculation within the effective quantum field theory of strong low-energy pion-nucleon interacti…
▽ More
We investigate the contributions of the hadronic structure of the neutron to radiative $O(αE_e/m_N)$ corrections (or the inner $O(αE_e/m_N)$ RC) to the neutron beta decay, where $α$, $E_e$ and $m_N$ are the fine-structure constant, the electron energy and the nucleon mass, respectively. We perform the calculation within the effective quantum field theory of strong low-energy pion-nucleon interactions described by the linear $σ$-model with chiral $SU(2) \times SU(2)$ symmetry and electroweak hadron-hadron, hadron-lepton and lepton-lepton interactions for the electron-lepton family with $SU(2)_L \times U(1)_Y$ symmetry of the Standard Electroweak Theory (Ivanov et al., Phys. Rev. D99, 093006 (2019)). We show that after renormalization, carried out in accordance with Sirlin's prescription (Sirlin, Phys. Rev. 164, 1767 (1967)), the inner $O(αE_e/m_N)$ RC are of the order of a few parts of $10^{-5} - 10^{-4}$. This agrees well with the results obtained in (Ivanov et al., Phys. Rev. D99, 093006 (2019)).
△ Less
Submitted 14 May, 2021;
originally announced May 2021.
-
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts
Authors:
Nikolay Ivanov,
Jianzhi Lou,
Ting Chen,
Jin Li,
Qiben Yan
Abstract:
Ethereum holds multiple billions of U.S. dollars in the form of Ether cryptocurrency and ERC-20 tokens, with millions of deployed smart contracts algorithmically operating these funds. Unsurprisingly, the security of Ethereum smart contracts has been under rigorous scrutiny. In recent years, numerous defense tools have been developed to detect different types of smart contract code vulnerabilities…
▽ More
Ethereum holds multiple billions of U.S. dollars in the form of Ether cryptocurrency and ERC-20 tokens, with millions of deployed smart contracts algorithmically operating these funds. Unsurprisingly, the security of Ethereum smart contracts has been under rigorous scrutiny. In recent years, numerous defense tools have been developed to detect different types of smart contract code vulnerabilities. When opportunities for exploiting code vulnerabilities diminish, the attackers start resorting to social engineering attacks, which aim to influence humans -- often the weakest link in the system. The only known class of social engineering attacks in Ethereum are honeypots, which plant hidden traps for attackers attempting to exploit existing vulnerabilities, thereby targeting only a small population of potential victims.
In this work, we explore the possibility and existence of new social engineering attacks beyond smart contract honeypots. We present two novel classes of Ethereum social engineering attacks - Address Manipulation and Homograph - and develop six zero-day social engineering attacks. To show how the attacks can be used in popular programming patterns, we conduct a case study of five popular smart contracts with combined market capitalization exceeding $29 billion, and integrate our attack patterns in their source codes without altering their existing functionality. Moreover, we show that these attacks remain dormant during the test phase but activate their malicious logic only at the final production deployment. We further analyze 85,656 open-source smart contracts, and discover that 1,027 of them can be used for the proposed social engineering attacks. We conduct a professional opinion survey with experts from seven smart contract auditing firms, corroborating that the exposed social engineering attacks bring a major threat to the smart contract systems.
△ Less
Submitted 29 May, 2021; v1 submitted 30 April, 2021;
originally announced May 2021.
-
Theoretical description of the neutron beta decay in the standard model at the level of 10^{-5}
Authors:
A. N. Ivanov,
R. Höllwieser,
N. I. Troitskaya,
M. Wellenzohn,
Ya. A. Berdnkov
Abstract:
In the framework of the Standard Model (SM) a theoretical description of the neutron beta decay is given at the level of 10^{-5}. The neutron lifetime and correlation coefficients of the neutron beta decay for a polarized neutron, a polarized electron and an unpolarized proton are calculated at the account for i) the radiative corrections of order O(αE_e/m_N) ~ 10^{-5} to Sirlin's outer and inner…
▽ More
In the framework of the Standard Model (SM) a theoretical description of the neutron beta decay is given at the level of 10^{-5}. The neutron lifetime and correlation coefficients of the neutron beta decay for a polarized neutron, a polarized electron and an unpolarized proton are calculated at the account for i) the radiative corrections of order O(αE_e/m_N) ~ 10^{-5} to Sirlin's outer and inner radiative corrections of order O(α/π), ii) the corrections of order O(E^2_e/m^2_N) ~ 10^{-5}, caused by weak magnetism and proton recoil, and iii) Wilkinson's corrections of order 10^{-5} (Wilkinson, Nucl. Phys. A377, 474 (1982)). These corrections define the SM background of the theoretical description of the neutron beta decay at the level of 10^{-5}, which is required by experimental searches of interactions beyond the SM with experimental uncertainties of a few parts of 10^{-5}.
△ Less
Submitted 31 August, 2021; v1 submitted 22 April, 2021;
originally announced April 2021.
-
Rare Events Detected with a Bulk Acoustic Wave High Frequency Gravitational Wave Antenna
Authors:
Maxim Goryachev,
William M. Campbell,
Ik Siong Heng,
Serge Galliou,
Eugene N. Ivanov,
Michael E. Tobar
Abstract:
This work describes the operation of a High Frequency Gravitational Wave detector based on a cryogenic Bulk Acoustic Wave (BAW) cavity and reports observation of rare events during 153 days of operation over two seperate experimental runs (Run 1 and Run 2). In both Run 1 and Run 2 two modes were simultaneously monitored. Across both runs, the 3rd overtone of the fast shear mode (3B) operating at 5…
▽ More
This work describes the operation of a High Frequency Gravitational Wave detector based on a cryogenic Bulk Acoustic Wave (BAW) cavity and reports observation of rare events during 153 days of operation over two seperate experimental runs (Run 1 and Run 2). In both Run 1 and Run 2 two modes were simultaneously monitored. Across both runs, the 3rd overtone of the fast shear mode (3B) operating at 5.506 MHz was monitored, while in Run 1 the second mode was chosen to be the 5th OT of the slow shear mode (5C) operating at 8.392 MHz. However, in Run 2 the second mode was selected to be closer in frequency to the first mode, and chosen to be the 3rd overtone of the slow shear mode (3C) operating at 4.993 MHz. Two strong events were observed as transients responding to energy deposition within acoustic modes of the cavity. The first event occurred during Run 1 on the 12/05/2019 (UTC), and was observed in the 5.506 MHz mode, while the second mode at 8.392 MHz observed no event. During Run 2, a second event occurred on the 27/11/2019(UTC) and was observed by both modes. Timing of the events were checked against available environmental observations as well as data from other detectors. Various possibilities explaining the origins of the events are discussed.
△ Less
Submitted 22 July, 2021; v1 submitted 11 February, 2021;
originally announced February 2021.
-
On the structure of the correlation coefficients S(E_e) and U(E_e) of the neutron beta decay
Authors:
A. N. Ivanov,
R. Höllwieser,
N. I. Troitskaya,
M. Wellenzohn,
Ya. A. Berdnikov
Abstract:
In the standard effective V - A theory of low-energy weak interactions (i.e. in the Standard Model (SM)) we analyze the structure of the correlation coefficients S(E_e) and U(E_e), where E_e is the electron energy. These correlation coefficients were introduced to the electron-energy and angular distribution of the neutron beta decay by Ebel and Feldman ( Nucl. Phys. 4, 213 (1957)) in addition to…
▽ More
In the standard effective V - A theory of low-energy weak interactions (i.e. in the Standard Model (SM)) we analyze the structure of the correlation coefficients S(E_e) and U(E_e), where E_e is the electron energy. These correlation coefficients were introduced to the electron-energy and angular distribution of the neutron beta decay by Ebel and Feldman ( Nucl. Phys. 4, 213 (1957)) in addition to the set of correlation coefficients proposed by Jackson et al. (Phys. Rev. 106, 517 (1957)). The correlation coefficients $S(E_e)$ and $U(E_e)$ are induced by simultaneous correlations of the neutron and electron spins and electron and antineutrino 3-momenta. These correlation structures do no violate discrete P, C and T symmetries. We analyze the contributions of the radiative corrections of order O(alpha/pi), taken to leading order in the large nucleon mass m_N expansion, and corrections of order O(E_e/m_N), caused by weak magnetism and proton recoil. In addition to the obtained SM corrections we calculate the contributions of interactions beyond the SM (BSM contributions) in terms of the phenomenological coupling constants of BSM interactions by Jackson et al. (Phys. Rev. 106, 517 (1957)) and the second class currents by Weinberg (Phys. Rev. 112, 1375 (1958)).
△ Less
Submitted 23 March, 2021; v1 submitted 3 February, 2021;
originally announced February 2021.
-
Conceptual design of the Spin Physics Detector
Authors:
V. M. Abazov,
V. Abramov,
L. G. Afanasyev,
R. R. Akhunzyanov,
A. V. Akindinov,
N. Akopov,
I. G. Alekseev,
A. M. Aleshko,
V. Yu. Alexakhin,
G. D. Alexeev,
M. Alexeev,
A. Amoroso,
I. V. Anikin,
V. F. Andreev,
V. A. Anosov,
A. B. Arbuzov,
N. I. Azorskiy,
A. A. Baldin,
V. V. Balandina,
E. G. Baldina,
M. Yu. Barabanov,
S. G. Barsov,
V. A. Baskov,
A. N. Beloborodov,
I. N. Belov
, et al. (270 additional authors not shown)
Abstract:
The Spin Physics Detector, a universal facility for studying the nucleon spin structure and other spin-related phenomena with polarized proton and deuteron beams, is proposed to be placed in one of the two interaction points of the NICA collider that is under construction at the Joint Institute for Nuclear Research (Dubna, Russia). At the heart of the project there is huge experience with polarize…
▽ More
The Spin Physics Detector, a universal facility for studying the nucleon spin structure and other spin-related phenomena with polarized proton and deuteron beams, is proposed to be placed in one of the two interaction points of the NICA collider that is under construction at the Joint Institute for Nuclear Research (Dubna, Russia). At the heart of the project there is huge experience with polarized beams at JINR.
The main objective of the proposed experiment is the comprehensive study of the unpolarized and polarized gluon content of the nucleon. Spin measurements at the Spin Physics Detector at the NICA collider have bright perspectives to make a unique contribution and challenge our understanding of the spin structure of the nucleon. In this document the Conceptual Design of the Spin Physics Detector is presented.
△ Less
Submitted 2 February, 2022; v1 submitted 31 January, 2021;
originally announced February 2021.
-
Heisenberg spin chains with additional isotropic three-site exchange interactions
Authors:
N. B. Ivanov
Abstract:
The $J_1-J_3$ Heisenberg spin models with nearest-neighbor ($J_1$) and additional isotropic three-site ($J_3$) spin interactions remain relatively less explored, although such types of competing exchange terms can naturally emerge from different sources, including the strong-coupling expansion of the multiorbital Hubbard model. Below we present a short survey of the recently published research in…
▽ More
The $J_1-J_3$ Heisenberg spin models with nearest-neighbor ($J_1$) and additional isotropic three-site ($J_3$) spin interactions remain relatively less explored, although such types of competing exchange terms can naturally emerge from different sources, including the strong-coupling expansion of the multiorbital Hubbard model. Below we present a short survey of the recently published research in this field, the emphasis being on the characteristics of the variety of quantum phases supported by a few generic uniform- and alternating-spin $J_1-J_3$ Heisenberg chains. For the reason that the positive ($J_3>0$) three-site couplings tend towards the formation of local quantum dimers, the $J_1-J_3$ spin models typically experience some spontaneous dimerization upon increasing $J_3$. Actually, it occurred that the established dimer phases in spin-$S$ $J_1-J_3$ Heisenberg chains ($S>{1}/{2}$) serve as complete analogues of the famous gapped Majumdar-Ghosh dimer phase in the spin-${1}/{2}$ Heisenberg chain with next-nearest-neighbor couplings. The same dimerizations have been observed in the alternating-spin ($S,σ$) $J_1-J_3$ chains ($S>σ$), provided that the cell spin $S+σ=\rm{integer}$, whereas for half-integer cell spin, the local dimer formation produces gapless spin-liquid ground states. The alternating-spin $J_1-J_3$ chains also provide some typical examples of spin models supporting the so-called non-Lieb-Mattis magnetic phases.
△ Less
Submitted 18 January, 2021; v1 submitted 13 January, 2021;
originally announced January 2021.
-
On the correlation coefficient T(E_e) of the neutron beta decay, caused by the correlation structure invariant under discrete P, C and T symmetries
Authors:
A. N. Ivanov,
R. Höllwieser,
N. I. Troitskaya,
M. Wellenzohn,
Ya. A. Berdnikov
Abstract:
We analyze the correlation coefficient T(E_e), which was introduced by Ebel and Feldman (Nucl. Phys. 4, 213 (1957)). The correlation coefficient T(E_e) is induced by the correlations of the neutron spin with the antineutrino 3-momentum and the electron spin with the electron 3-momentum. Such a correlation structure is invariant under discrete P, C and T symmetries. The correlation coefficient T(E_…
▽ More
We analyze the correlation coefficient T(E_e), which was introduced by Ebel and Feldman (Nucl. Phys. 4, 213 (1957)). The correlation coefficient T(E_e) is induced by the correlations of the neutron spin with the antineutrino 3-momentum and the electron spin with the electron 3-momentum. Such a correlation structure is invariant under discrete P, C and T symmetries. The correlation coefficient T(E_e), calculated to leading order in the large nucleon mass m_N expansion, is equal to T(E_e) = - 2 g_A(1 + g_A)/(1 + 3 g^2_A) = - B_0, i.e. of order |T(E_e)| ~ 1, where $g_A$ is the axial coupling constant. Within the Standard Model (SM) we describe the correlation coefficient $T(E_e)$ at the level of 10^{-3} by taking into the radiative corrections of order O(α/π) or the outer model-independent radiative corrections, where αis the fine-structure constant, and the corrections of order O(E_e/m_N), caused by weak magnetism and proton recoil. We calculate also the contributions of interactions beyond the SM, including the contributions of the second class currents.
△ Less
Submitted 28 March, 2021; v1 submitted 4 January, 2021;
originally announced January 2021.
-
Cubes and cubical chains and cochains in combinatorial topology
Authors:
Nikolai V. Ivanov
Abstract:
The present paper is a continuation of author's paper arXiv:1909.00940 [math.AT] devoted to the lemmas of Alexander and Sperner, but is independent from it. We begin by a step back from Alexander and Sperner to Lebesgue work on the invariance of the dimension. In contrast with almost everybody else, Lebesgue worked with cubes rather than with simplices. His methods were developed by Hurewicz and L…
▽ More
The present paper is a continuation of author's paper arXiv:1909.00940 [math.AT] devoted to the lemmas of Alexander and Sperner, but is independent from it. We begin by a step back from Alexander and Sperner to Lebesgue work on the invariance of the dimension. In contrast with almost everybody else, Lebesgue worked with cubes rather than with simplices. His methods were developed by Hurewicz and Lusternik-Schnirelmann and then forgotten. In the present paper these methods are recast in the language of cubical chains and cochains.
After this, we present a new approach to Lebesgue and Lusternik-Schnirelmann theorems which is both conceptual and elementary. It is based on adaptation of Serre's definition of products of singular cubical cochains to discrete setting. The main results are new purely combinatorial "cubical lemmas". This approach also clarifies the cubical versions of Sperner lemma of Kuhn and Ky Fan. In particular, Ky Fan's lemma can be understood as a natural strengthening of Lebesgue or Kuhn's results under a transversality assumption.
The exposition does not assume any knowledge of algebraic topology.
△ Less
Submitted 24 December, 2020;
originally announced December 2020.