Fri, 04 Dec 2015

10:00 - 11:00
L4

Analysis of images in multidimensional single molecule microscopy

Michael Hirsch
(STFC Rutherford Appleton Laboratory)
Abstract

Multidimensional single molecule microscopy (MSMM) generates image time series of biomolecules in a cellular environment that have been tagged with fluorescent labels. Initial analysis steps of such images consist of image registration of multiple channels, feature detection and single particle tracking. Further analysis may involve the estimation of diffusion rates, the measurement of separations between molecules that are not optically resolved and more. The analysis is done under the condition of poor signal to noise ratios, high density of features and other adverse conditions. Pushing the boundary of what is measurable, we are facing among others the following challenges. Firstly the correct assessment of the uncertainties and the significance of the results, secondly the fast and reliable identification of those features and tracks that fulfil the assumptions of the models used. Simpler models require more rigid preconditions and therefore limiting the usable data, complexer models are theoretically and especially computationally challenging.

Students can find important and useful information regarding the course here; i.e. Course Calendar, Handbook, Exam regulations etc.
The prompt atmospheric neutrino flux in the light of LHCb
Gauld, R Rojo, J Rottoli, L Sarkar, S Talbert, J JHEP volume 02 issue 2 130 (19 Feb 2016)
See if you can identify the maths behind some of the entries in our mathematical bake-off.
Mon, 23 Nov 2015

17:00 - 18:00
L3

Functors of points and moduli problems

Alexander Betts
(Oxford University)
Abstract

In algebraic and arithmetic geometry, there is the ubiquitous notion of a moduli space, which informally is a variety (or scheme) parametrising a class of objects of interest. My aim in this talk is to explain concretely what we mean by a moduli space, going through the functor-of-points formalism of Grothendieck. Time permitting, I may also discuss (informally!) a natural obstruction to the existence of moduli schemes, and how one can get around this problem by taking a 2-categorical point of view.

Tue, 24 Nov 2015

12:00 - 13:15
L4

From MHV diagrams and Twistors to the one-loop Dilatation Operator in the SO(6) sector

Brenda Penante and Laura Koster
(Humboldt and Queen Mary)
Abstract

 About 10 years ago Minahan and Zarembo made a remarkable discovery: the one-loop Dilatation Operator in the SO(6) sector of planar N=4 SYM can be identified with the Hamiltonian of an integrable spin chain. This one-loop Dilatation operator was obtained by computing a two-point correlation function at one loop, which is a completely off-shell quantity. Around the same time, Witten proposed a duality between N=4 SYM and twistor string theory, which initiated a revolution in the field of on-shell objects like scattering amplitudes. In this talk we illustrate that these techniques that have been sucessfully used for on-shell quantities can also be employed for the computation of off-shell quantities by computing the one-loop Dilatation Operator in the SO(6) sector. The first half of the talk will be dedicated to doing this calculation using MHV diagrams and the second half of the talk shows the computation in twistor space. 

These two short talks will be followed by an informal afternoon session for those interested in further details of these approaches, and in form factors in Class Room C2 from 2-4.30 pm then from 4.30pm in N3.12.  All are welcome.

 

Wed, 18 May 2016
15:00
L4

The Cube/AIDA algebraic attacks: generalisations and combinatorial results

Ana Salagean
(Loughborough University)
Abstract
The cube attack of Dinur and Shamir and the AIDA attack of Vielhaber have been used successfully on 

reduced round versions of the Trivium stream cipher and a few other ciphers. 

These attacks can be viewed in the framework of higher order differentiation, as introduced by Lai in 

the cryptographic context. We generalise these attacks from the binary case to general finite fields, 

showing that we would need to differentiate several times with respect to each variable in order to have

a reasonable chance of a successful attack.

We also investigate the notion of “fast points” for a binary polynomial function f  

(i.e. vectors such that the derivative of f with respect to this vector has a lower 

than expected degree). These were  introduced by Duan and Lai, motivated by the fact that higher order 

differential attacks are usually more efficient if they use such points. The number of functions which 

admit fast points were computed by Duan et al in a few particular cases; we give explicit formulae for 

all remaining cases and discuss the cryptographic significance of these results.
Subscribe to