15,412 research outputs found

    How Even Revises Expectation in a Scalar Model: Analogy with Japanese Mo

    Get PDF
    PACLIC / The University of the Philippines Visayas Cebu College Cebu City, Philippines / November 20-22, 200

    The Structure of the Asian Debt Crisis in Theoretical and Historical Perspective

    Get PDF
    not availableinternational economics and trade ;

    Probing the Nature of High-z Short GRB 090426 with Its Early Optical and X-ray Afterglows

    Full text link
    GRB 090426 is a short duration burst detected by Swift (T90∌1.28T_{90}\sim 1.28 s in the observer frame, and T90∌0.33T_{90}\sim 0.33 s in the burst frame at z=2.609z=2.609). Its host galaxy properties and some Îł\gamma-ray related correlations are analogous to those seen in long duration GRBs, which are believed to be of a massive-star origin (so-called Type II GRBs). We present the results of its early optical observations with the 0.8-m TNT telescope at Xinglong observatory, and the 1-m LOAO telescope at Mt. Lemmon Optical Astronomy Observatory in Arizona. Our well-sampled optical afterglow lightcurve covers from ∌90\sim 90 seconds to ∌104\sim 10^4 seconds post the GRB trigger. It shows two shallow decay episodes that are likely due to energy injection, which end at ∌230\sim 230 seconds and ∌7100\sim 7100 seconds, respectively. The decay slopes post the injection phases are consistent with each other (α≃1.22\alpha\simeq 1.22). The X-ray afterglow lightcurve appears to trace the optical, although the second energy injection phase was missed due to visibility constraints introduced by the {\em Swift} orbit. The X-ray spectral index is ÎČX∌1.0\beta_X\sim 1.0 without temporal evolution. Its decay slope is consistent with the prediction of the forward shock model. Both X-ray and optical emission is consistent with being in the same spectral regime above the cooling frequency (Îœc\nu_c). The fact that Îœc\nu_c is below the optical band from the very early epoch of the observation provides a constraint on the burst environment, which is similar to that seen in classical long duration GRBs. We therefore suggest that death of a massive star is the possible progenitor of this short burst.Comment: 7 pages, 1 figures, 2 tables, revised version, MNRAS, in pres

    Globalisation, Openness and Economic Nationalism: Conceptual Issues and Asian Practise

    Get PDF
    This paper considers the question of economic nationalism through the lens of economic openness. Complete economic openness, which connotes close or total integration of a country with that of the world economy, is the antonym of economic nationalism. The paper argues that economic openness is a multi-dimensional concept. A country can be open, or not so open to all or some of the following: trade, exports, imports, finance, science, culture and education, migration, foreign investment, investment by its citizens and companies abroad, among other things. There is no economic theory that suggests that a country has to be open in all dimensions simultaneously. Given its economic and geo-political situation, a country may choose to be open in some areas and not in others. The paper examines the analytical question: what is the optimum degree of openness for an economy? This theoretical framework is used to illustrate and explain the Asian experience, specifically of Japan and Korea. The implications for policy for these and other national economies as well as those for the global economy are outlined. The main policy message of the paper is that countries should seek, whenever they can, “strategic” rather than close integration with the international economy. In that sense economic nationalism, notwithstanding globalization is still the order of the day in many Asian countries. They need to maintain national control over volatile capital movements and prudently regulate the financial sector in the national interest.Asian Economics; Globalisation; Economic Nationalism

    Search for anomalous semileptonic decay of heavy flavor hadrons produced in association with a W boson at CDF II

    Get PDF
    We present a search for anomalous semileptonic decays of heavy flavor hadrons produced in association with a WW boson, in proton-antiproton collisions at sqrt{s}=1.96 TeV. We use 162 pb-1 of data collected with the CDF II detector at the Fermilab Tevatron Collider. We select events with one W boson and at least one jet with an identified secondary vertex. In the jets with a secondary vertex we look for a semileptonic decay to a muon. We compare the number of jets with both a secondary vertex and a semileptonic decay, and the kinematic properties of these jets, with the standard model expectation of W plus heavy flavor production and decay. No discrepancy is seen between the observation and the expectation, and we set limits on the production cross section of a B-like hadron with an anomalously high semileptonic branching ratio.Comment: 8 pages, 2 figures, submitted to PRD-RC; replaced to adjust the page forma

    Reviving the Nixon Doctrine: NSA Spying, the Commander-In-Chief, and Excutive Power in the War on Terror

    Get PDF
    When the President does it, that means that it is not illegal. So Richard Nixon infamously defended his approval of a plan to engage in warrantless wiretapping of Americans involved in the antiwar movement in the 1970s. For thirty years Nixon\u27s defense has stood as the apogee of presidential arrogance. But of course Nixon was proved wrong. The wiretapping plan was shelved when FBI Director J. Edgar Hoover, of all people, objected to it. Nixon\u27s approval of the program was listed in the articles of impeachment, and ultimately he was forced to resign. Nixon learned the hard way that presidents are not above the law. In defending the NSA spying program, at least until the recent about-face, as well as in its views on enemy combatants and torture, the Bush administration has essentially revived the Nixon doctrine. This essay argues that the Bush administration\u27s defense of the NSA spying program (and of unchecked presidential authority over enemy combatants and interrogation techniques) is fundamentally flawed, both as a matter of law and as a matter of national security policy. The argument that Congress authorized the program defies the most basic principles of statutory construction. The claim that the Commander in Chief has uncheckable authority with respect to the means and methods of engaging the enemy is contrary to the text of the Constitution, the structure of checks and balances, and a long line of Supreme Court precedent. And no Fourth Amendment precedent supports the notion that the president may wiretap Americans without probable cause or a warrant

    Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World

    Get PDF
    Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americans’ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure

    Proposals for Curbing the Boom-Bust Cycle in the Supply of Capital to Emerging Markets

    Get PDF
    Capital flows, Boom-bust cycle, UDROP, Collective action clauses
    • 

    corecore