ترغب بنشر مسار تعليمي؟ اضغط هنا

We develop the differential aspects of a noncommutative geometry for the Quantum Hall Effect in the continuous, with the ambition of proving Kubos formula. Taking inspiration from the ideas developed by Bellissard during the 80s we build a Fredholm m odule for the $C^*$-algebra of continuous magnetic operators, based on a Dirac operator closely related to the quantum harmonic oscillator. An important piece of Bellissards theory (the so-called second Connes formula) is proved. This work provides the continuation of the recent article [DS].
This work concerns with the description of the topological phases of band insulators of class DIII by using the equivariant cohomology. The main result is the definition of a cohomology class for general systems of class DIII which generalizes the we ll known $mathbb{Z}_2$-invariant given by the Teo-Kane formula in the one-dimension case. In the two-dimensional case this cohomology invariant allows a complete description of the strong and weak phases. The relation with the KR-theory, the Noether-Fredholm index and the classification of Real gerbes are also discussed.
This work continues the study of the thermal Hamiltonian, initially proposed by J. M. Luttinger in 1964 as a model for the conduction of thermal currents in solids. The previous work [DL] contains a complete study of the free model in one spatial dim ension along with a preliminary scattering result for convolution-type perturbations. This work complements the results obtained in [DL] by providing a detailed analysis of the perturbation theory for the one-dimensional thermal Hamiltonian. In more detail the following result are established: the regularity and decay properties for elements in the domain of the unperturbed thermal Hamiltonian; the determination of a class of self-adjoint and relatively compact perturbations of the thermal Hamiltonian; the proof of the existence and completeness of wave operators for a subclass of such potentials.
The purpose of this paper is to investigate the propagation of topological currents along magnetic interfaces (also known as magnetic walls) of a two-dimensional material. We consider tight-binding magnetic models associated to generic magnetic multi -interfaces and describe the K-theoretical setting in which a bulk-interface duality can be derived. Then, the (trivial) case of a localized magnetic field and the (non trivial) case of the Iwatsuka magnetic field are considered in full detail. This is a pedagogical preparatory work that aims to anticipate the study of more complicated multi-interface magnetic systems.
In 1964 J. M. Luttinger introduced a model for the quantum thermal transport. In this paper we study the spectral theory of the Hamiltonian operator associated to the Luttingers model, with a special focus at the one-dimensional case. It is shown tha t the (so called) thermal Hamiltonian has a one-parameter family of self-adjoint extensions and the spectrum, the time-propagator group and the Green function are explicitly computed. Moreover, the scattering by convolution-type potentials is analyzed. Finally, also the associated classical problem is completely solved, thus providing a comparison between classical and quantum behavior. This article aims to be a first contribution in the construction of a complete theory for the thermal Hamiltonian.
The purpose of this paper is threefold: First of all the topological aspects of the Landau Hamiltonian are reviewed in the light (and with the jargon) of theory of topological insulators. In particular it is shown that the Landau Hamiltonian has a ge neralized even time-reversal symmetry (TRS). Secondly, a new tool for the computation of the topological numbers associated with each Landau level is introduced. The latter is obtained by combining the Dixmier trace and the (resolvent of the) harmonic oscillator. Finally, these results are extended to models with non-Abelian magnetic fields. Two models are investigated in details: the Jaynes-Cummings model and the Quaternionic model.
We study the spectral and scattering theory of light transmission in a system consisting of two asymptotically periodic waveguides, also known as one-dimensional photonic crystals, coupled by a junction. Using analyticity techniques and commutator me thods in a two-Hilbert spaces setting, we determine the nature of the spectrum and prove the existence and completeness of the wave operators of the system.
This paper is devoted to the construction of differential geometric invariants for the classification of Quaternionic vector bundles. Provided that the base space is a smooth manifold of dimension two or three endowed with an involution that leaves f ixed only a finite number of points, it is possible to prove that the Wess-Zumino term and the Chern-Simons invariant yield topological quantities able to distinguish between inequivalent realization of Quaternionic structures.
This survey presents the main results achieved for the influence maximization problem in social networks. This problem is well studied in the literature and, thanks to its recent applications, some of which currently deployed on the field, it is rece iving more and more attention in the scientific community. The problem can be formulated as follows: given a graph, with each node having a certain probability of influencing its neighbors, select a subset of vertices so that the number of nodes in the network that are influenced is maximized. Starting from this model, we introduce the main theoretical developments and computational results that have been achieved, taking into account different diffusion models describing how the information spreads throughout the network, various ways in which the sources of information could be placed, and how to tackle the problem in the presence of uncertainties affecting the network. Finally, we present one of the main application that has been developed and deployed exploiting tools and techniques previously discussed.
We focus on adversarial patrolling games on arbitrary graphs, where the Defender can control a mobile resource, the targets are alarmed by an alarm system, and the Attacker can observe the actions of the mobile resource of the Defender and perform di fferent attacks exploiting multiple resources. This scenario can be modeled as a zero-sum extensive-form game in which each player can play multiple times. The game tree is exponentially large both in the size of the graph and in the number of attacking resources. We show that when the number of the Attackers resources is free, the problem of computing the equilibrium path is NP-hard, while when the number of resources is fixed, the equilibrium path can be computed in poly-time. We provide a dynamic-programming algorithm that, given the number of the Attackers resources, computes the equilibrium path requiring poly-time in the size of the graph and exponential time in the number of the resources. Furthermore, since in real-world scenarios it is implausible that the Defender knows the number of attacking resources, we study the robustness of the Defenders strategy when she makes a wrong guess about that number. We show that even the error of just a single resource can lead to an arbitrary inefficiency, when the inefficiency is defined as the ratio of the Defenders utilities obtained with a wrong guess and a correct guess. However, a more suitable definition of inefficiency is given by the difference of the Defenders utilities: this way, we observe that the higher the error in the estimation, the higher the loss for the Defender. Then, we investigate the performance of online algorithms when no information about the Attackers resources is available. Finally, we resort to randomized online algorithms showing that we can obtain a competitive factor that is twice better than the one that can be achieved by any deterministic online algorithm.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا