15,412 research outputs found
How Even Revises Expectation in a Scalar Model: Analogy with Japanese Mo
PACLIC / The University of the Philippines Visayas Cebu College Cebu City, Philippines / November 20-22, 200
The Structure of the Asian Debt Crisis in Theoretical and Historical Perspective
not availableinternational economics and trade ;
Probing the Nature of High-z Short GRB 090426 with Its Early Optical and X-ray Afterglows
GRB 090426 is a short duration burst detected by Swift ( s
in the observer frame, and s in the burst frame at
). Its host galaxy properties and some -ray related
correlations are analogous to those seen in long duration GRBs, which are
believed to be of a massive-star origin (so-called Type II GRBs). We present
the results of its early optical observations with the 0.8-m TNT telescope at
Xinglong observatory, and the 1-m LOAO telescope at Mt. Lemmon Optical
Astronomy Observatory in Arizona. Our well-sampled optical afterglow lightcurve
covers from seconds to seconds post the GRB trigger. It
shows two shallow decay episodes that are likely due to energy injection, which
end at seconds and seconds, respectively. The decay
slopes post the injection phases are consistent with each other (). The X-ray afterglow lightcurve appears to trace the optical, although
the second energy injection phase was missed due to visibility constraints
introduced by the {\em Swift} orbit. The X-ray spectral index is without temporal evolution. Its decay slope is consistent with the
prediction of the forward shock model. Both X-ray and optical emission is
consistent with being in the same spectral regime above the cooling frequency
(). The fact that is below the optical band from the very early
epoch of the observation provides a constraint on the burst environment, which
is similar to that seen in classical long duration GRBs. We therefore suggest
that death of a massive star is the possible progenitor of this short burst.Comment: 7 pages, 1 figures, 2 tables, revised version, MNRAS, in pres
Globalisation, Openness and Economic Nationalism: Conceptual Issues and Asian Practise
This paper considers the question of economic nationalism through the lens of economic openness. Complete economic openness, which connotes close or total integration of a country with that of the world economy, is the antonym of economic nationalism. The paper argues that economic openness is a multi-dimensional concept. A country can be open, or not so open to all or some of the following: trade, exports, imports, finance, science, culture and education, migration, foreign investment, investment by its citizens and companies abroad, among other things. There is no economic theory that suggests that a country has to be open in all dimensions simultaneously. Given its economic and geo-political situation, a country may choose to be open in some areas and not in others. The paper examines the analytical question: what is the optimum degree of openness for an economy? This theoretical framework is used to illustrate and explain the Asian experience, specifically of Japan and Korea. The implications for policy for these and other national economies as well as those for the global economy are outlined. The main policy message of the paper is that countries should seek, whenever they can, âstrategicâ rather than close integration with the international economy. In that sense economic nationalism, notwithstanding globalization is still the order of the day in many Asian countries. They need to maintain national control over volatile capital movements and prudently regulate the financial sector in the national interest.Asian Economics; Globalisation; Economic Nationalism
Search for anomalous semileptonic decay of heavy flavor hadrons produced in association with a W boson at CDF II
We present a search for anomalous semileptonic decays of heavy flavor hadrons
produced in association with a boson, in proton-antiproton collisions at
sqrt{s}=1.96 TeV. We use 162 pb-1 of data collected with the CDF II detector at
the Fermilab Tevatron Collider. We select events with one W boson and at least
one jet with an identified secondary vertex. In the jets with a secondary
vertex we look for a semileptonic decay to a muon. We compare the number of
jets with both a secondary vertex and a semileptonic decay, and the kinematic
properties of these jets, with the standard model expectation of W plus heavy
flavor production and decay. No discrepancy is seen between the observation and
the expectation, and we set limits on the production cross section of a B-like
hadron with an anomalously high semileptonic branching ratio.Comment: 8 pages, 2 figures, submitted to PRD-RC; replaced to adjust the page
forma
Reviving the Nixon Doctrine: NSA Spying, the Commander-In-Chief, and Excutive Power in the War on Terror
When the President does it, that means that it is not illegal. So Richard Nixon infamously defended his approval of a plan to engage in warrantless wiretapping of Americans involved in the antiwar movement in the 1970s. For thirty years Nixon\u27s defense has stood as the apogee of presidential arrogance. But of course Nixon was proved wrong. The wiretapping plan was shelved when FBI Director J. Edgar Hoover, of all people, objected to it. Nixon\u27s approval of the program was listed in the articles of impeachment, and ultimately he was forced to resign. Nixon learned the hard way that presidents are not above the law.
In defending the NSA spying program, at least until the recent about-face, as well as in its views on enemy combatants and torture, the Bush administration has essentially revived the Nixon doctrine. This essay argues that the Bush administration\u27s defense of the NSA spying program (and of unchecked presidential authority over enemy combatants and interrogation techniques) is fundamentally flawed, both as a matter of law and as a matter of national security policy. The argument that Congress authorized the program defies the most basic principles of statutory construction. The claim that the Commander in Chief has uncheckable authority with respect to the means and methods of engaging the enemy is contrary to the text of the Constitution, the structure of checks and balances, and a long line of Supreme Court precedent. And no Fourth Amendment precedent supports the notion that the president may wiretap Americans without probable cause or a warrant
Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World
Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sonyâs production of The Interview and considers the hackâs chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americansâ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure
Proposals for Curbing the Boom-Bust Cycle in the Supply of Capital to Emerging Markets
Capital flows, Boom-bust cycle, UDROP, Collective action clauses
- âŠ