5,127 research outputs found
The Implementation of SNB Monetary Policy
We use a regime switching approach to model the implementation of the SNB monetary policy. The regime switching technique is crucial to assess the flexibility inherent in the SNB's monetary policy concept. The empirical findings support the idea that repo operations are instrumental in smoothing the implementation of monetary policy in normal times while changes in the official operational target accompanied by the accommodating use of repo operations produce the aimed effects in distressed periods. A significant contribution also came from some new measures designed to improve liquidity in the Swiss franc money market during the financial crisis in 2007- 8.implementation of monetary policy, Libor, repo, Swiss franc money market, regime switching model
Ab initio Bogoliubov coupled cluster theory for open-shell nuclei
Ab initio many-body methods address closed-shell nuclei up to mass A ~ 130 on
the basis of realistic two- and three-nucleon interactions. Several routes to
address open-shell nuclei are currently under investigation, including ideas
which exploit spontaneous symmetry breaking. Singly open-shell nuclei can be
efficiently described via the sole breaking of gauge symmetry associated
with particle number conservation, to account for their superfluid character.
The present work formulates and applies Bogoliubov coupled cluster (BCC)
theory, which consists of representing the exact ground-state wavefunction of
the system as the exponential of a quasiparticle excitation cluster operator
acting on a Bogoliubov reference state. Equations for the ground-state energy
and cluster amplitudes are derived at the singles and doubles level (BCCSD)
both algebraically and diagrammatically. The formalism includes three-nucleon
forces at the normal-ordered two-body level. The first BCC code is implemented
in -scheme, which will eventually permit the treatment of doubly open-shell
nuclei. Proof-of-principle calculations in an spherical
harmonic oscillator basis are performed for O, Ne,
Mg in the BCCD approximation with a chiral two-nucleon interaction,
comparing to results obtained in standard coupled cluster theory when
applicable. The breaking of symmetry is monitored by computing the
variance associated with the particle-number operator. The newly developed
many-body formalism increases the potential span of ab initio calculations
based on single-reference coupled cluster techniques tremendously, i.e.
potentially to reach several hundred additional mid-mass nuclei. The new
formalism offers a wealth of potential applications and further extensions
dedicated to the description of ground and excited states of open-shell nuclei.Comment: 22 pages, 13 figure
Quasiparticle Coupled Cluster Theory for Pairing Interactions
We present an extension of the pair coupled cluster doubles (p-CCD) method to
quasiparticles and apply it to the attractive pairing Hamiltonian. Near the
transition point where number symmetry gets spontaneously broken, the proposed
BCS-based p-CCD method yields significantly better energies than existing
methods when compared to exact results obtained via solution of the Richardson
equations. The quasiparticle p-CCD method has a low computational cost of
as a function of system size. This together with the high
quality of results here demonstrated, points to considerable promise for the
accurate description of strongly correlated systems with more realistic pairing
interactions
Faculty Development For Learning: The Promise of Classroom Research
Why the 1990\u27s Represent a Unique Opportunity for Faculty Developers
Why Faculty Development Should Focus on Improving Learning
Why Faculty Developers Should Reconsider Some of Their Current Approaches to Instructional Improvement
Seven Barriers to More Widespread and Effective Faculty Participation in Teaching/Learning Improvement Programs
Seven Guidelines for More Effective Faculty Development to Improve Teaching and Learning
The Five Most Common Approaches to Instructional Improvement
What is Classroom Research?
How Classroom Research Works
Classroom Research as Faculty Development: A Sixth Approach To Instructional Improvement
Reference
Developing Learning Communities: Seven Promising Shifts and Seven Powerful Levers
Seven Promising Shifts in Academic Culture
Select Reference
Faculty Development For Learning: The Promise of Classroom Research
Why the 1990\u27s Represent a Unique Opportunity for Faculty Developers
Why Faculty Development Should Focus on Improving Learning
Why Faculty Developers Should Reconsider Some of Their Current Approaches to Instructional Improvement
Seven Barriers to More Widespread and Effective Faculty Participation in Teaching/Learning Improvement Programs
Seven Guidelines for More Effective Faculty Development to Improve Teaching and Learning
The Five Most Common Approaches to Instructional Improvement
What is Classroom Research?
How Classroom Research Works
Classroom Research as Faculty Development: A Sixth Approach To Instructional Improvement
Reference
Doing Faculty Development as if We Value Learning Most: Transformative Guidelines from Research to Practice
If producing high-quality student learning is American higher education’s defining goal, how can faculty development best contribute to its realization? In response to that question, this essay synthesizes theories, findings, and strategies from a variety of literatures into seven transformative ideas which, taken together, have the potential to make our mental models of and approaches to faculty development more effective. It also offers seven guidelines based on these ideas, as well as related, practical strategies for doing faculty development as if student learning matters most
Towards Distributed Accommodation of Covert Attacks in Interconnected Systems
The problem of mitigating maliciously injected signals in interconnected
systems is dealt with in this paper. We consider the class of covert attacks,
as they are stealthy and cannot be detected by conventional means in
centralized settings. Distributed architectures can be leveraged for revealing
such stealthy attacks by exploiting communication and local model knowledge. We
show how such detection schemes can be improved to estimate the action of an
attacker and we propose an accommodation scheme in order to mitigate or
neutralize abnormal behavior of a system under attack
- …