30,964 research outputs found
Comment on "Scaling feature of magnetic field induced Kondo-peak splittings"
In a recent work Zhang and coworkers (PRB 82, 075111 (2010)) studied the
Zeeman splitting of the Kondo resonance for the single impurity Anderson model
in a finite magnetic field with the numerical renormalization group (NRG)
method. There, it was found that with increasing magnetic field the
position of the Kondo resonance in the total spectral function \textit{does
not} approach its position in the spin resolved spectral function.
Additionally, the position of the Kondo maximum exceeded the Zeeman energy for
, where is the low energy Kondo scale of the model
(, ). In this comment we argue that both these findings
are produced by an improper choice of NRG parameter values. However, we
reproduce the crossover in the splitting from Kondo-like behavior to a
non-universal splitting larger than the Zeeman energy, but this crossover
occurs at much larger fields of the order of the charge scale.Comment: Minor revisions; same version as publishe
New public management reform in European countries: The retreat of the state from telecommunication services
In the post war period, telecommunications - being services of 'general economic interest' - were initially managed by public administrative bodies in many Western European countries. With the rise of New Public Management (NPM) in the 1980s, these bodies were often transformed into public corporations or joint stock companies. Following corporatisation, the provision and the management of these services of general economic interest was gradually transferred to private actors. This paper analyses whether privatisation, as part of NPM reforms, has benefited the consumer. We have, therefore, compiled data on privatisation in the telecommunication sector for 15 European countries from 1980 to 2006. The data set covers the corporatisation process, as well as the transfer of the service provision to the private sector. Three empirical findings stand out: first, the reform processes have differed widely from each other. Second, it's not just the transfer of ownership to the private sector that has ensured efficiency gains and increased consumer benefits; corporatisation has done this as well. Third, efficiency gains have been transferred to the consumer, especially at the beginning of the reform process. -- In der Nachkriegszeit wurden Telekommunikationsdienstleistungen in vielen westeuropĂ€ischen LĂ€ndern zumeist von Verwaltungseinheiten bereitgestellt. Mit dem Aufkommen des New Public Managements (NPMs) in den 1980er Jahren wurden diese Verwaltungseinheiten in öffentlich-rechtliche Unternehmen oder Aktiengesellschaften umgewandelt (=formelle Privatisierung) und anschlieĂend stĂŒckweise an private Akteure ĂŒbertragen (=materielle Privatisierung). Dieser Beitrag untersucht, ob die Konsumenten von diesen PrivatisierungsmaĂnahmen profitieren konnten. Zur Beantwortung dieser Frage wurde ein vollstĂ€ndig neuer Paneldatensatz zusammengestellt, mit dem die Privatisierung im Telekommunikationssektor fĂŒr 15 europĂ€ische LĂ€nder von 1980 bis 2006 abgebildet werden kann. Der Datensatz umfasst erstmals sowohl formelle als auch materielle Privatisierungsschritte. Drei empirische Ergebnisse sind besonders hervorzuheben. Erstens, der Privatisierungsprozess unterscheidet sich teilweise erheblich zwischen den LĂ€ndern. Zweitens, die Konsumenten konnten nicht nur vom Verkauf von Unternehmensanteilen profitieren, sondern auch von formellen PrivatisierungsmaĂnahmen. Drittens, Effizienzgewinne wurden insbesondere am Anfang des Reformprozesses an die Konsumenten weitergegeben.
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis
Key management in wireless sensor networks faces several new challenges. The
scale, resource limitations, and new threats such as node capture necessitate
the use of an on-line key generation by the nodes themselves. However, the cost
of such schemes is high since their secrecy is based on computational
complexity. Recently, several research contributions justified that the
wireless channel itself can be used to generate information-theoretic secure
keys. By exchanging sampling messages during movement, a bit string can be
derived that is only known to the involved entities. Yet, movement is not the
only possibility to generate randomness. The channel response is also strongly
dependent on the frequency of the transmitted signal. In our work, we introduce
a protocol for key generation based on the frequency-selectivity of channel
fading. The practical advantage of this approach is that we do not require node
movement. Thus, the frequent case of a sensor network with static motes is
supported. Furthermore, the error correction property of the protocol mitigates
the effects of measurement errors and other temporal effects, giving rise to an
agreement rate of over 97%. We show the applicability of our protocol by
implementing it on MICAz motes, and evaluate its robustness and secrecy through
experiments and analysis.Comment: Submitted to IEEE Transactions on Dependable and Secure Computin
Sentiment Analysis on New York Times Articles Data
Sentiment Analysis on New York Times Coverage Data
Departmental Affiliation: Data Science/ Political Science
College of Arts and Sciences
The extant political science literature examines media coverage of immigration and assesses the effect of that coverage on partisanship in the United States. Immigration is believed to be a unique factor that induces large- scale changes in partisanship based on race and ethnicity. The negative tone of media coverage pushes non-Latino Whites into the Republican Party, while Latinos trend toward the Democratic Party. The aim for this project is to look at New York time data in order to identify how much immigration is covered in newspaper outlets, specifically Latino immigration, and to determine the overall tone of these stories.
In this research, we seek to determine individual articles take a positive, neutral or negative stance. We achieve this using a dictionary-based approach, meaning we look at individual words to assess if it has a positive, neutral or negative connotation. We train our data using publicly accessible sentiment dictionaries such as VADER (Valence Aware Dictionary and Sentiment Reasoner). However, this task can be difficult because certain words can be dynamic and may pertain to a positive or negative sentiment in context of the article. In order to resolve this issue, we use reliability measures to ensure that the words of high frequencies are in the correct sphere of negative, neutral, and positive light.
Information about the Author(s):
Faculty Sponsor(s): Professor Gregg B. Johnson and Professor Karl Schmitt
Student Contact: Gabriel Carvajal â [email protected]
An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks
Numerous studies showed that concurrent transmissions can boost wireless
network performance despite collisions. While these works provide empirical
evidence that concurrent transmissions may be received reliably, existing
signal capture models only partially explain the root causes of this
phenomenon. We present a comprehensive mathematical model that reveals the
reasons and provides insights on the key parameters affecting the performance
of MSK-modulated transmissions. A major contribution is a closed-form
derivation of the receiver bit decision variable for arbitrary numbers of
colliding signals and constellations of power ratios, timing offsets, and
carrier phase offsets. We systematically explore the root causes for successful
packet delivery under concurrent transmissions across the whole parameter space
of the model. We confirm the capture threshold behavior observed in previous
studies but also reveal new insights relevant for the design of optimal
protocols: We identify capture zones depending not only on the signal power
ratio but also on time and phase offsets.Comment: Accepted for publication in the IEEE Transactions on Wireless
Communications under the title "On the Reception of Concurrent Transmissions
in Wireless Sensor Networks.
Fe XIII coronal line emission in cool M dwarfs
We report on a search for the Fe xiii forbidden coronal line at 3388.1 \AA in
a sample of 15 M-type dwarf stars covering the whole spectral class as well as
different levels of activity. A clear detection was achieved for LHS 2076
during a major flare and for CN Leo, where the line had been discovered before.
For some other stars the situation is not quite clear. For CN Leo we
investigated the timing behaviour of the Fe xiii line and report a high level
of variability on a timescale of hours which we ascribe to microflare heating.Comment: 13 pages, 10 figure
- âŠ