-
Deposition-Dependent Coverage and Performance of Phosphonic Acid Interface Modifiers in Halide Perovskite Optoelectronics
Authors:
Hannah Contreras,
Aidan O'Brien,
Margherita Taddei,
Yangwei Shi,
Fangyuan Jiang,
Robert J. E. Westbrook,
Yadong Zhang,
Rajiv Giridharagopal,
Paul A. Lee,
Stephen Barlow,
Seth R. Marder,
Neal R. Armstrong,
David S. Ginger
Abstract:
In this work, we study the effect of various deposition methods for phosphonic acid interface modifiers commonly pursued as self-assembled monolayers in high-performance metal halide perovskite photovoltaics and light-emitting diodes. We compare the deposition of (2-(3,6-diiodo-9H-carbazol-9-yl)ethyl)phosphonic acid onto indium tin oxide (ITO) bottom contacts by varying three parameters: the metho…
▽ More
In this work, we study the effect of various deposition methods for phosphonic acid interface modifiers commonly pursued as self-assembled monolayers in high-performance metal halide perovskite photovoltaics and light-emitting diodes. We compare the deposition of (2-(3,6-diiodo-9H-carbazol-9-yl)ethyl)phosphonic acid onto indium tin oxide (ITO) bottom contacts by varying three parameters: the method of deposition, specifically spin coating or prolonged dip coating, ITO surface treatment via HCl/FeCl3 etching, and use in combination with a second modifier, 1,6-hexylenediphosphonic acid. We demonstrate that varying these modification protocols can impact time-resolved photoluminescence carrier lifetimes and quasi-Fermi level splitting of perovskite films deposited onto the phosphonic-acid-modified ITO. Ultraviolet photoelectron spectroscopy shows an increase in effective work function after phosphonic acid modification and clear evidence for photoemission from carbazole functional groups at the ITO surface. We use X-ray photoelectron spectroscopy to probe differences in phosphonic acid coverage on the metal oxide contact and show that perovskite samples grown on ITO with the highest phosphonic acid coverage exhibit the longest carrier lifetimes. Finally, we establish that device performance follows these same trends. These results indicate that the reactivity, heterogeneity, and composition of the bottom contact help to control recombination rates and therefore power conversion efficiencies. ITO etching, prolonged deposition times for phosphonic acids via dip coating, and the use of a secondary, more hydrophilic bis-phosphonic acid, all contribute to improvements in surface coverage, carrier lifetime, and device efficiency. These improvements each have a positive impact, and we achieve the best results when all three strategies are implemented.
△ Less
Submitted 23 June, 2025;
originally announced June 2025.
-
On deformation of perfectoid purity in Gorenstein domains
Authors:
Benjamin Baily,
Karina Dovgodko,
Austyn Simpson,
Jack Westbrook
Abstract:
If $(R,\mathfrak{m})$ is a complete local ring of mixed characteristic $(0,p)$ and $R/pR$ is an $F$-pure Gorenstein domain, we find a sufficient condition for $R$ to be perfectoid pure. This condition is related to the Cohen-Macaulayness of the absolute integral closures of Gorenstein local domains of mixed characteristic which are not necessarily excellent. Along the way, we show that the problem…
▽ More
If $(R,\mathfrak{m})$ is a complete local ring of mixed characteristic $(0,p)$ and $R/pR$ is an $F$-pure Gorenstein domain, we find a sufficient condition for $R$ to be perfectoid pure. This condition is related to the Cohen-Macaulayness of the absolute integral closures of Gorenstein local domains of mixed characteristic which are not necessarily excellent. Along the way, we show that the problem of lifting $F$-purity of $R/pR$ to perfectoid purity of $R$ is equivalent to a similar deformation problem for the splinter property.
△ Less
Submitted 22 May, 2025; v1 submitted 3 April, 2025;
originally announced April 2025.
-
Diamine Surface Passivation and Post-Annealing Enhance Performance of Silicon-Perovskite Tandem Solar Cells
Authors:
Margherita Taddei,
Hannah Contreras,
Hai-Nam Doan,
Declan P. McCarthy,
Seongrok Seo,
Robert J. E. Westbrook,
Daniel J. Graham,
Kunal Datta,
Perrine Carroy,
Delfina Muñoz,
Juan-Pablo Correa-Baena,
Stephen Barlow,
Seth R. Marder,
Joel A. Smith,
Henry J. Snaith,
David S. Ginger
Abstract:
We show that the use of 1,3-diaminopropane (DAP) as a chemical modifier at the perovskite/electron-transport layer (ETL) interface enhances the power conversion efficiency (PCE) of 1.7 eV bandgap FACs mixed-halide perovskite single-junction cells, primarily by boosting the open-circuit voltage (VOC) from 1.06 V to 1.15 V. Adding a post-processing annealing step after C60 evaporation, further impro…
▽ More
We show that the use of 1,3-diaminopropane (DAP) as a chemical modifier at the perovskite/electron-transport layer (ETL) interface enhances the power conversion efficiency (PCE) of 1.7 eV bandgap FACs mixed-halide perovskite single-junction cells, primarily by boosting the open-circuit voltage (VOC) from 1.06 V to 1.15 V. Adding a post-processing annealing step after C60 evaporation, further improves the fill factor (FF) by 20% from the control to the DAP + post-annealing devices. Using hyperspectral photoluminescence microscopy, we demonstrate that annealing helps improve compositional homogeneity at the top and bottom interfaces of the solar cell, which prevents detrimental bandgap pinning in the devices and improves C60 adhesion. Using time-of-flight secondary ion mass spectrometry, we show that DAP reacts with formamidinium present near the surface of the perovskite lattice to form a larger molecular cation, 1,4,5,6-tetrahydropyrimidinium (THP) that remains at the interface. Combining the use of DAP and the annealing of C60 interface, we fabricate Si-perovskite tandems with PCE of 25.29%, compared to 23.26% for control devices. Our study underscores the critical role of chemical reactivity and thermal post-processing of the C60/Lewis-base passivator interface in minimizing device losses and advancing solar-cell performance of wide-bandgap mixed-cation mixed-halide perovskite for tandem application.
△ Less
Submitted 4 December, 2024; v1 submitted 27 November, 2024;
originally announced November 2024.
-
Emissive Surface Traps Lead to Asymmetric Photoluminescence Line Shape in Spheroidal CsPbBr3 Quantum Dots
Authors:
Jessica Kline,
Shaun Gallagher,
Benjamin F. Hammel,
Reshma Mathew,
Dylan M. Ladd,
Robert J. E. Westbrook,
Jalen N. Pryor,
Michael F. Toney,
Matthew Pelton,
Sadegh Yazdi,
Gordana Dukovic,
David S. Ginger
Abstract:
The morphology of quantum dots plays an important role in governing their photophysics. Here, we explore the photoluminescence of spheroidal CsPbBr3 quantum dots synthesized via the room-temperature trioctlyphosphine oxide/PbBr2 method. Despite photoluminescence quantum yields nearing 100%, these spheroidal quantum dots exhibit an elongated red photoluminescence tail not observed in typical cubic…
▽ More
The morphology of quantum dots plays an important role in governing their photophysics. Here, we explore the photoluminescence of spheroidal CsPbBr3 quantum dots synthesized via the room-temperature trioctlyphosphine oxide/PbBr2 method. Despite photoluminescence quantum yields nearing 100%, these spheroidal quantum dots exhibit an elongated red photoluminescence tail not observed in typical cubic quantum dots synthesized via hot injection. We explore this elongated red tail through structural and optical characterization including small-angle x-ray scattering, transmission electron microscopy and time-resolved, steady-state, and single quantum dot photoluminescence. From these measurements we conclude that the red tail originates from emissive surface traps. We hypothesize that these emissive surface traps are located on the (111) surfaces and show that the traps can be passivated by adding phenethyl ammonium bromide, resulting in a more symmetric line shape
△ Less
Submitted 7 October, 2024;
originally announced October 2024.
-
Community recommendations on cryoEM data archiving and validation
Authors:
Gerard J. Kleywegt,
Paul D. Adams,
Sarah J. Butcher,
Cathy Lawson,
Alexis Rohou,
Peter B. Rosenthal,
Sriram Subramaniam,
Maya Topf,
Sanja Abbott,
Philip R. Baldwin,
John M. Berrisford,
Gérard Bricogne,
Preeti Choudhary,
Tristan I. Croll,
Radostin Danev,
Sai J. Ganesan,
Timothy Grant,
Aleksandras Gutmanas,
Richard Henderson,
J. Bernard Heymann,
Juha T. Huiskonen,
Andrei Istrate,
Takayuki Kato,
Gabriel C. Lander,
Shee-Mei Lok
, et al. (22 additional authors not shown)
Abstract:
In January 2020, a workshop was held at EMBL-EBI (Hinxton, UK) to discuss data requirements for deposition and validation of cryoEM structures, with a focus on single-particle analysis. The meeting was attended by 45 experts in data processing, model building and refinement, validation, and archiving of such structures. This report describes the workshop's motivation and history, the topics discus…
▽ More
In January 2020, a workshop was held at EMBL-EBI (Hinxton, UK) to discuss data requirements for deposition and validation of cryoEM structures, with a focus on single-particle analysis. The meeting was attended by 45 experts in data processing, model building and refinement, validation, and archiving of such structures. This report describes the workshop's motivation and history, the topics discussed, and consensus recommendations resulting from the workshop. Some challenges for future methods-development efforts in this area are also highlighted, as is the implementation to date of some of the recommendations.
△ Less
Submitted 2 February, 2024; v1 submitted 29 November, 2023;
originally announced November 2023.
-
Surface Passivation Suppresses Local Ion Motion in Halide Perovskites
Authors:
Justin Pothoof,
Robert J. E. Westbrook,
Rajiv Giridharagopal,
Madeleine D. Breshears,
David S. Ginger
Abstract:
We use scanning probe microscopy to study ion migration in the formamidinium (FA)-containing halide perovskite semiconductor $Cs_{0.22}FA_{0.78}Pb(I_{0.85}Br_{0.15})_3$ in the presence and absence of chemical surface passivation. We measure the evolving contact potential difference (CPD) using scanning Kelvin probe microscopy (SKPM) following voltage poling. We find that ion migration leads to a ~…
▽ More
We use scanning probe microscopy to study ion migration in the formamidinium (FA)-containing halide perovskite semiconductor $Cs_{0.22}FA_{0.78}Pb(I_{0.85}Br_{0.15})_3$ in the presence and absence of chemical surface passivation. We measure the evolving contact potential difference (CPD) using scanning Kelvin probe microscopy (SKPM) following voltage poling. We find that ion migration leads to a ~100 mV shift in the CPD of control films after poling with 3V for only a few seconds. Moreover, we find that ion migration is heterogeneous, with domain interfaces leading to a larger shift in the CPD. Application of (3-aminopropyl)trimethoxysilane (APTMS) as a surface passivator further leads to 5-fold reduction in the CPD shift from ~100 meV to ~20 meV. We use hyperspectral microscopy to show that APTMS-treated perovskite films undergo less photoinduced halide migration than control films. We interpret these results as due to a reduction in halide vacancy concentration due to passivation with APTMS.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
Ethylenediamine Addition Improves Performance and Suppresses Phase Instabilities in Mixed-Halide Perovskites
Authors:
Margherita Taddei,
Joel A. Smith,
Benjamin M. Gallant,
Suer Zhou,
Robert J. E. Westbrook,
Yangwei Shi,
Jian Wang,
James N. Drysdale,
Declan P. McCarthy,
Stephen Barlow,
Seth R. Marder,
Henry J. Snaith,
David S. Ginger
Abstract:
We show that adding ethylenediamine (EDA) to perovskite precursor solution improves the photovoltaic device performance and material stability of high-bromide-content, methylammonium-free, formamidinium cesium lead halide perovskites FA1-xCsxPb(I1-yBry)3 which are currently of interest for perovskite-on-Si tandem solar cells. Using spectroscopy and hyperspectral microscopy, we show that the additi…
▽ More
We show that adding ethylenediamine (EDA) to perovskite precursor solution improves the photovoltaic device performance and material stability of high-bromide-content, methylammonium-free, formamidinium cesium lead halide perovskites FA1-xCsxPb(I1-yBry)3 which are currently of interest for perovskite-on-Si tandem solar cells. Using spectroscopy and hyperspectral microscopy, we show that the additive improves film homogeneity and suppresses the phase instability that is ubiquitous in high-Br perovskite formulations, producing films that remain stable for over 100 days in ambient conditions. With the addition of 1 mol% EDA we demonstrate 1.69 eV-gap perovskite single-junction p-i-n devices with a VOC of 1.22 V, and a champion maximum power point tracked power conversion efficiency of 18.8%, comparable to the best reported methylammonium-free perovskites. Using nuclear magnetic resonance (NMR) spectroscopy and X-ray diffraction techniques, we show that EDA reacts with FA+ in solution, rapidly and quantitatively forming imidazolinium cations. It is the presence of imidazolinium during crystallization which drives the improved perovskite thin-film properties.
△ Less
Submitted 29 September, 2022;
originally announced September 2022.
-
Beyond Trolling: Malware-Induced Misperception Attacks on Polarized Facebook Discourse
Authors:
Filipo Sharevski,
Paige Treebridge,
Peter Jachim,
Audrey Li,
Adam Babin,
Jessica Westbrook
Abstract:
Social media trolling is a powerful tactic to manipulate public opinion on issues with a high moral component. Troll farms, as evidenced in the past, created fabricated content to provoke or silence people to share their opinion on social media during the US presidential election in 2016. In this paper, we introduce an alternate way of provoking or silencing social media discourse by manipulating…
▽ More
Social media trolling is a powerful tactic to manipulate public opinion on issues with a high moral component. Troll farms, as evidenced in the past, created fabricated content to provoke or silence people to share their opinion on social media during the US presidential election in 2016. In this paper, we introduce an alternate way of provoking or silencing social media discourse by manipulating how users perceive authentic content. This manipulation is performed by man-in-the-middle malware that covertly rearranges the linguistic content of an authentic social media post and comments. We call this attack Malware-Induced Misperception (MIM) because the goal is to socially engineer spiral-of-silence conditions on social media by inducing perception. We conducted experimental tests in controlled settings (N = 311) where a malware covertly altered selected words in a Facebook post about the freedom of political expression on college campuses. The empirical results (1) confirm the previous findings about the presence of the spiral-of-silence effect on social media; and (2) demonstrate that inducing misperception is an effective tactic to silence or provoke targeted users on Facebook to express their opinion on a polarizing political issue.
△ Less
Submitted 10 February, 2020;
originally announced February 2020.
-
Meet Malexa, Alexa's Malicious Twin: Malware-Induced Misperception Through Intelligent Voice Assistants
Authors:
Filipo Sharevski,
Paige Treebridge,
Peter Jachim,
Audrey Li,
Adam Babin,
Jessica Westbrook
Abstract:
This paper reports the findings of a study where users (N=220) interacted with Malexa, Alexa's malicious twin. Malexa is an intelligent voice assistant with a simple and seemingly harmless third-party skill that delivers news briefings to users. The twist, however, is that Malexa covertly rewords these briefings to intentionally introduce misperception about the reported events. This covert reword…
▽ More
This paper reports the findings of a study where users (N=220) interacted with Malexa, Alexa's malicious twin. Malexa is an intelligent voice assistant with a simple and seemingly harmless third-party skill that delivers news briefings to users. The twist, however, is that Malexa covertly rewords these briefings to intentionally introduce misperception about the reported events. This covert rewording is referred to as a Malware-Induced Misperception (MIM) attack. It differs from squatting or invocation hijacking attacks in that it is focused on manipulating the "content" delivered through a third-party skill instead of the skill's "invocation logic." Malexa, in the study, reworded regulatory briefings to make a government response sound more accidental or lenient than the original news delivered by Alexa. The results show that users who interacted with Malexa perceived that the government was less friendly to working people and more in favor of big businesses. The results also show that Malexa is capable of inducing misperceptions regardless of the user's gender, political ideology or frequency of interaction with intelligent voice assistants. We discuss the implications in the context of using Malexa as a covert "influencer" in people's living or working environments.
△ Less
Submitted 9 February, 2020;
originally announced February 2020.
-
Manipulation of Perceived Politeness in a Web-based Email Discourse Through a Malicious Browser Extension
Authors:
Filipo Sharevski,
Paige Treebridge,
Jessica Westbrook
Abstract:
This paper presents a specific man-in-the-middle exploit: Ambient Tactical Deception (ATD) in online communication, realized via a malicious web browser extension. Extensions manipulate web content in unobtrusive ways as ambient intermediaries of the overall browsing experience. In our previous work, we demonstrated that it is possible to employ tactical deception by making covert changes in the t…
▽ More
This paper presents a specific man-in-the-middle exploit: Ambient Tactical Deception (ATD) in online communication, realized via a malicious web browser extension. Extensions manipulate web content in unobtrusive ways as ambient intermediaries of the overall browsing experience. In our previous work, we demonstrated that it is possible to employ tactical deception by making covert changes in the text content of a web page, regardless of the source. In this work, we investigated the application of ATD in a web-based email discourse where the objective is to manipulate the interpersonal perception without the knowledge of the involved parties. We focus on web-based email text because it is asynchronous and usually revised for clarity and politeness. Previous research has demonstrated that people's perception of politeness in online communication is based on three factors: the degree of imposition, the power of the receiver over the sender, and the social distance between them. We interviewed participants about their perception of these factors to establish the plausibility of ATD for email discourse. The results indicate that by covertly altering the politeness strategy in an email, it is possible for an ATD attacker to manipulate the receiver's perception on all of the politeness factors. Our findings support the Brown and Levinson's politeness theory and Walther's hyperpersonal model of email communication.
△ Less
Submitted 24 December, 2019; v1 submitted 30 August, 2019;
originally announced August 2019.
-
Pressure and flow statistics of Darcy flow from simulated annealing
Authors:
Marise J. E. Westbroek,
Peter R. King,
Dimitri D. Vvedensky,
Ronnie L. Schwede
Abstract:
The pressure and flow statistics of Darcy flow through a random permeable medium are expressed in a form suitable for evaluation by the method of simulated annealing. There are several attractive aspects to using simulated annealing: (i) any probability distribution can be used for the permeability, (ii) there is no need to invert the transmissibility matrix which, while not a factor for single-ph…
▽ More
The pressure and flow statistics of Darcy flow through a random permeable medium are expressed in a form suitable for evaluation by the method of simulated annealing. There are several attractive aspects to using simulated annealing: (i) any probability distribution can be used for the permeability, (ii) there is no need to invert the transmissibility matrix which, while not a factor for single-phase flow, offers distinct advantages for the case of multiphase flow, and (iii) the action used for simulated annealing is eminently suitable for coarse graining by integrating over the short-wavelength degrees of freedom. In this paper, we show that the pressure and flow statistics obtained by simulated annealing are in excellent agreement with the more conventional finite-volume calculations.
△ Less
Submitted 3 April, 2019; v1 submitted 22 March, 2019;
originally announced March 2019.
-
Path integral Monte Carlo method for the quantum anharmonic oscillator
Authors:
Shikhar Mittal,
Marise J. E. Westbroek,
Peter R. King,
Dimitri D. Vvedensky
Abstract:
The Markov chain Monte Carlo (MCMC) method is used to evaluate the imaginary-time path integral of a quantum oscillator with a potential that includes both a quadratic term and a quartic term whose coupling is varied by several orders of magnitude. This path integral is discretized on a time lattice and calculations for the energy and probability density of the ground state and energies of the fir…
▽ More
The Markov chain Monte Carlo (MCMC) method is used to evaluate the imaginary-time path integral of a quantum oscillator with a potential that includes both a quadratic term and a quartic term whose coupling is varied by several orders of magnitude. This path integral is discretized on a time lattice and calculations for the energy and probability density of the ground state and energies of the first few excited states are carried out on lattices with decreasing spacing to estimate these quantities in the continuum limit. The variation of the quartic coupling constant produces corresponding variations in the optimum simulation parameters for the MCMC method and in the statistical uncertainty for a fixed number of paths used for measurement. The energies and probability densities are in excellent agreement with those obtained from numerical solutions of Schrödinger's equation.
△ Less
Submitted 26 August, 2020; v1 submitted 12 November, 2018;
originally announced November 2018.
-
Pressure statistics from the path integral for Darcy flow through random porous media
Authors:
Marise J. E. Westbroek,
Gil-Arnaud Coche,
Peter R. King,
Dimitri D. Vvedensky
Abstract:
The path integral for classical statistical dynamics is used to determine the properties of one-dimensional Darcy flow through a porous medium with a correlated stochastic permeability for several spatial correlation lengths. Pressure statistics are obtained from the numerical evaluation of the path integral by using the Markov chain Monte Carlo method. Comparisons between these pressure distribut…
▽ More
The path integral for classical statistical dynamics is used to determine the properties of one-dimensional Darcy flow through a porous medium with a correlated stochastic permeability for several spatial correlation lengths. Pressure statistics are obtained from the numerical evaluation of the path integral by using the Markov chain Monte Carlo method. Comparisons between these pressure distributions and those calculated from the classic finite-volume method for the corresponding stochastic differential equation show excellent agreement for Dirichlet and Neumann boundary conditions. The evaluation of the variance of the pressure based on a continuum description of the medium provides an estimate of the effects of discretization. Log-normal and Gaussian fits to the pressure distributions as a function of position within the porous medium are discussed in relation to the spatial extent of the correlations of the permeability fluctuations.
△ Less
Submitted 5 November, 2018;
originally announced November 2018.
-
Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering
Authors:
Adam Trowbridge,
Jessica Westbrook,
Filipo Sharevski
Abstract:
In this paper we argue, drawing from the perspectives of cybersecurity and social psychology, that Internet-based manipulation of an individual or group reality using ambient tactical deception is possible using only software and changing words in a web browser. We call this attack Ambient Tactical Deception (ATD). Ambient, in artificial intelligence, describes software that is "unobtrusive," and…
▽ More
In this paper we argue, drawing from the perspectives of cybersecurity and social psychology, that Internet-based manipulation of an individual or group reality using ambient tactical deception is possible using only software and changing words in a web browser. We call this attack Ambient Tactical Deception (ATD). Ambient, in artificial intelligence, describes software that is "unobtrusive," and completely integrated into a user's life. Tactical deception is an information warfare term for the use of deception on an opposing force. We suggest that an ATD attack could change the sentiment of text in a web browser. This could alter the victim's perception of reality by providing disinformation. Within the limit of online communication, even a pause in replying to a text can affect how people perceive each other. The outcomes of an ATD attack could include alienation, upsetting a victim, and influencing their feelings about an election, a spouse, or a corporation.
△ Less
Submitted 25 October, 2018;
originally announced October 2018.
-
Malicious User Experience Design Research for Cybersecurity
Authors:
Adam Trowbridge,
Filipo Sharevski,
Jessica Westbrook
Abstract:
This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context. We explore what is known about successful addictive design in the fields of video games and gambling to understand the allure of breaking into a system, and the joy of thwarting the security t…
▽ More
This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context. We explore what is known about successful addictive design in the fields of video games and gambling to understand the allure of breaking into a system, and the joy of thwarting the security to reach a goal or a reward of data. Based on the malicious user research, game user research, and using the GameFlow framework, we propose a novel malicious user experience design approach
△ Less
Submitted 28 June, 2018;
originally announced June 2018.
-
Novel Approach for Cybersecurity Workforce Development: A Course in Secure Design
Authors:
Filipo Sharevski,
Adam Trowbridge,
Jessica Westbrook
Abstract:
Training the future cybersecurity workforce to respond to emerging threats requires introduction of novel educational interventions into the cybersecurity curriculum. To be effective, these interventions have to incorporate trending knowledge from cybersecurity and other related domains while allowing for experiential learning through hands-on experimentation. To date, the traditional interdiscipl…
▽ More
Training the future cybersecurity workforce to respond to emerging threats requires introduction of novel educational interventions into the cybersecurity curriculum. To be effective, these interventions have to incorporate trending knowledge from cybersecurity and other related domains while allowing for experiential learning through hands-on experimentation. To date, the traditional interdisciplinary approach for cybersecurity training has infused political science, law, economics or linguistics knowledge into the cybersecurity curriculum, allowing for limited experimentation. Cybersecurity students were left with little opportunity to acquire knowledge, skills, and abilities in domains outside of these. Also, students in outside majors had no options to get into cybersecurity. With this in mind, we developed an interdisciplinary course for experiential learning in the fields of cybersecurity and interaction design. The inaugural course teaches students from cybersecurity, user interaction design, and visual design the principles of designing for secure use - or secure design - and allows them to apply them for prototyping of Internet-of-Things (IoT) products for smart homes. This paper elaborates on the concepts of secure design and how our approach enhances the training of the future cybersecurity workforce.
△ Less
Submitted 4 June, 2018;
originally announced June 2018.
-
Evaluation of the path integral for flow through random porous media
Authors:
Marise J. E. Westbroek,
Gil-Arnaud Coche,
Peter R. King,
Dimitri D. Vvedensky
Abstract:
We present a path integral formulation of Darcy's equation in one dimension with random permeability described by a correlated multi-variate lognormal distribution. This path integral is evaluated with the Markov chain Monte Carlo method to obtain pressure distributions, which are shown to agree with the solutions of the corresponding stochastic differential equation for Dirichlet and Neumann boun…
▽ More
We present a path integral formulation of Darcy's equation in one dimension with random permeability described by a correlated multi-variate lognormal distribution. This path integral is evaluated with the Markov chain Monte Carlo method to obtain pressure distributions, which are shown to agree with the solutions of the corresponding stochastic differential equation for Dirichlet and Neumann boundary conditions. The extension of our approach to flow through random media in two and three dimensions is discussed.
△ Less
Submitted 20 March, 2018;
originally announced March 2018.
-
Anomalous system-size dependence of electrolytic cells with an electrified oil-water interface
Authors:
Marise J. E. Westbroek,
Niels Boon,
René van Roij
Abstract:
Manipulation of the charge of the dielectric interface between two bulk liquids not only enables the adjustment of the interfacial tension but also controls the storage capacity of ions in the ionic double layers adjacent to each side of the interface. However, adjusting this interfacial charge by static external electric fields is difficult since the external electric fields are readily screened…
▽ More
Manipulation of the charge of the dielectric interface between two bulk liquids not only enables the adjustment of the interfacial tension but also controls the storage capacity of ions in the ionic double layers adjacent to each side of the interface. However, adjusting this interfacial charge by static external electric fields is difficult since the external electric fields are readily screened by ionic double layers that form in the vicinity of the external electrodes. This leaves the liquid-liquid interface, which is at a macroscopic distance from the electrodes, unaffected. In this study we show theoretically, in agreement with recent experiments, that control over this surface charge at the liquid-liquid interface is nonetheless possible for macroscopically large but finite closed systems in equilibrium, even when the distance between the electrode and interface is orders of magnitude larger than the Debye screening lengths of the two liquids. We identify a crossover system-size below which the interface and the electrodes are effectively coupled. Our calculations of the interfacial tension for various electrode potentials are in good agreement with recent experimental data.
△ Less
Submitted 4 March, 2018;
originally announced March 2018.
-
User's guide to Monte Carlo methods for evaluating path integrals
Authors:
Marise J. E. Westbroek,
Peter R. King,
Dimitri D. Vvedensky,
Stephan Durr
Abstract:
We give an introduction to the calculation of path integrals on a lattice, with the quantum harmonic oscillator as an example. In addition to providing an explicit computational setup and corresponding pseudocode, we pay particular attention to the existence of autocorrelations and the calculation of reliable errors. The over-relaxation technique is presented as a way to counter strong autocorrela…
▽ More
We give an introduction to the calculation of path integrals on a lattice, with the quantum harmonic oscillator as an example. In addition to providing an explicit computational setup and corresponding pseudocode, we pay particular attention to the existence of autocorrelations and the calculation of reliable errors. The over-relaxation technique is presented as a way to counter strong autocorrelations. The simulation methods can be extended to compute observables for path integrals in other settings.
△ Less
Submitted 2 April, 2018; v1 submitted 22 December, 2017;
originally announced December 2017.
-
Linear-Time Pointer-Machine Algorithms for Path-Evaluation Problems on Trees and Graphs
Authors:
Adam L. Buchsbaum,
Loukas Georgiadis,
Haim Kaplan,
Anne Rogers,
Robert E. Tarjan,
Jeffery R. Westbrook
Abstract:
We present algorithms that run in linear time on pointer machines for a collection of problems, each of which either directly or indirectly requires the evaluation of a function defined on paths in a tree. These problems previously had linear-time algorithms but only for random-access machines (RAMs); the best pointer-machine algorithms were super-linear by an inverse-Ackermann-function factor.…
▽ More
We present algorithms that run in linear time on pointer machines for a collection of problems, each of which either directly or indirectly requires the evaluation of a function defined on paths in a tree. These problems previously had linear-time algorithms but only for random-access machines (RAMs); the best pointer-machine algorithms were super-linear by an inverse-Ackermann-function factor. Our algorithms are also simpler, in some cases substantially, than the previous linear-time RAM algorithms. Our improvements come primarily from three new ideas: a refined analysis of path compression that gives a linear bound if the compressions favor certain nodes, a pointer-based radix sort as a replacement for table-based methods, and a more careful partitioning of a tree into easily managed parts. Our algorithms compute nearest common ancestors off-line, verify and construct minimum spanning trees, do interval analysis on a flowgraph, find the dominators of a flowgraph, and build the component tree of a weighted tree.
△ Less
Submitted 14 November, 2006; v1 submitted 15 July, 2002;
originally announced July 2002.