Criticality in statistical physics naturally emerges at isolated points in the phase diagram. Jamming of spheres is not an exception: varying density, it is the critical point that separates the unjammed phase where spheres do not overlap and the jammed phase where they cannot be arranged without overlaps. The same remains true in more general constraint satisfaction problems with continuous variables where jamming coincides with the (protocol dependent) satisfiability transition point. In this work we show that by carefully choosing the cost function to be minimized, the region of criticality extends to occupy a whole region of the jammed phase. As a working example, we consider the spherical perceptron with a linear cost function in the unsatisfiable jammed phase and we perform numerical simulations which show critical power laws emerging in the configurations obtained minimizing the linear cost function. We develop a scaling theory to compute the emerging critical exponents.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1103/PhysRevLett.123.115702 | DOI Listing |
Sensors (Basel)
December 2024
LASSENA-Laboratory of Space Technologies, Embedded Systems, Navigation and Avionics, École de Technologie Supérieure (ETS), Montreal, QC H3C-1K3, Canada.
The hindering of Global Navigation Satellite Systems (GNSS) signal reception by jamming and spoofing attacks degrades the signal quality. Careful attention needs to be paid when post-processing the signal under these circumstances before feeding the signal into the GNSS receiver's post-processing stage. The identification of the time domain statistical attributes and the spectral domain characteristics play a vital role in analyzing the behaviour of the signal characteristics under various kinds of jamming attacks, spoofing attacks, and multipath scenarios.
View Article and Find Full Text PDFPhys Rev Lett
December 2024
Department of Physics and INFN, Tor Vergata University of Rome, Via della Ricerca Scientifica 1, 00133 Rome, Italy.
We study the process of thermal convection in jammed emulsions with a yield-stress rheology. We find that heat transfer occurs via an intermittent mechanism, whereby intense short-lived convective "heat bursts" are spaced out by long-lasting conductive periods. This behavior is the result of a sequence of fluidization-rigidity transitions, rooted in a nontrivial interplay between emulsion yield-stress rheology and plastic activity, which we characterize via a statistical analysis of the dynamics at the droplet scale.
View Article and Find Full Text PDFNat Commun
December 2024
Department of Electronics and Information Convergence Engineering, Kyung Hee University, Yongin-si, Republic of Korea.
Self-assembled configurations are versatile for applications in which liquid-mediated phenomena are employed to ensure that static or mild physical interactions between assembling blocks take advantage of local energy minima. For granular materials, however, a particle's momentum in air leads to random collisions and the formation of disordered phases, eventually producing jammed configurations when densely packed. Therefore, unlike fluidic self-assembly, the self-assembly of dry particles typically lacks programmability based on density and ordering symmetry and has thus been limited in applications.
View Article and Find Full Text PDFLangmuir
January 2025
School of Chemical and Process Engineering, University of Leeds, Leeds, LS2 9JT, United Kingdom.
To form nonspherical emulsion droplets, the interfacial tension driving droplet sphericity must be overcome. This can be achieved through interfacial particle jamming; however, careful control of particle coverage is required. In this work, we present a scalable novel batch process to form nonspherical particle-stabilized emulsions.
View Article and Find Full Text PDFSensors (Basel)
December 2024
Institute of Communications and Navigation, German Aerospace Center (DLR), 51147 Köln, Germany.
Spoofing attacks pose a significant security risk for organizations and systems relying on global navigation satellite systems (GNSS) for their operations. While the existing spoofing detection methods have shown some effectiveness, these can be vulnerable to certain attacks, such as secure code estimation and replay (SCER) attacks, among others.This paper analyzes the potential of satellite fingerprinting methods for GNSS spoofing detection and benchmarks their performance using real (in realistic scenarios by using GPS and Galileo signals generated and recorded in the advanced GNSS simulation facility of DLR) GNSS signals and scenarios.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!