4,613 research outputs found

    Entanglement Entropy from Corner Transfer Matrix in Forrester Baxter non-unitary RSOS models

    Full text link
    Using a Corner Transfer Matrix approach, we compute the bipartite entanglement R\'enyi entropy in the off-critical perturbations of non-unitary conformal minimal models realised by lattice spin chains Hamiltonians related to the Forrester Baxter RSOS models in regime III. This allows to show on a set of explicit examples that the R\'enyi entropies for non-unitary theories rescale near criticality as the logarithm of the correlation length with a coefficient proportional to the effective central charge. This complements a similar result, recently established for the size rescaling at the critical point, showing the expected agreement of the two behaviours. We also compute the first subleading unusual correction to the scaling behaviour, showing that it is expressible in terms of expansions of various fractional powers of the correlation length, related to the differences ΔΔmin\Delta-\Delta_{\min} between the conformal dimensions of fields in the theory and the minimal conformal dimension. Finally, a few observations on the limit leading to the off-critical logarithmic minimal models of Pearce and Seaton are put forward.Comment: 24 pages, 2 figure

    Autopoiesis of the artificial: from systems to cognition

    Get PDF
    In the seminal work on autopoiesis by Varela, Maturana, and Uribe, they start by addressing the confusion between processes that are history dependent and processes that are history independent in the biological world. The former is particularly linked to evolution and ontogenesis, while the latter pertains to the organizational features of biological individuals. Varela, Maturana, and Uribe reject this framework and propose their original theory of autopoietic organization, which emphasizes the strong complementarity of temporal and non-temporal phenomena. They argue that the dichotomy between structure and organization lies at the core of the unity of living systems. By opposing history-dependent and history-independent processes, methodological challenges arise in explaining phenomena related to living systems and cognition. Consequently, Maturana and Varela reject this approach in defining autopoietic organization. I argue, however, that this relationship presents an issue that can be found in recent developments of the science of artificial intelligence (AI) in different ways, giving rise to related concerns. While highly capable AI systems exist that can perform cognitive tasks, their internal workings and the specific contributions of their components to the overall system behavior, understood as a unified whole, remain largely uninterpretable. This article explores the connection between biological systems, cognition, and recent developments in AI systems that could potentially be linked to autopoiesis and related concepts such as autonomy and organization. The aim is to assess the advantages and disadvantages of employing autopoiesis in the synthetic (artificial) explanation for biological cognitive systems and to determine if and how the notion of autopoiesis can still be fruitful in this perspective

    Internet of Things e sviluppi del Data Protection

    Get PDF
    Si sente sempre più parlare di oggetti intelligenti, in grado tra le altre cose di acquisire ed elaborare dati, con l'intrinseca capacità di connessione, che rende possibile il trasporto dell' informazione raccolta. Questo fenomeno coinvolge, quindi, inevitabilmente la protezione dei dati personali oltre che problemi crescenti in termini di sicurezza. Le conseguenze dell'uso “trasformativo” dei dati personali ha drasticamente limitato la consapevolezza dei consumatori, la loro capacità di valutare le varie conseguenze delle loro scelte e, quindi, di dare un consenso libero e informato. Per rispondere alle nuove esigenze, dunque è stato necessario partire dai principi alla base delle protezione dei dati, come quelli dello scopo specifico, della minimizzazione dei dati, del “notice and consent” ecc. - a cui vanno aggiunte le varie tecniche di anonimizzazione - per poi re-interpretarli alla luce del dinamismo e della complessità caratterizzante il nuovo contesto. Si arriva a sostenere che la soluzione più adatta deve prevedere l'azionamento di meccanismi di trasparenza e accountability, oltre che di architetture orientate alla protezione dei dati (come ad esempio la “privacy by design”). Il nuovo modello dovrà così basarsi sulla valutazione dei rischi del trattamento di dati, effettuata da terze parti sotto la supervisione di autorità di protezione di dati. Al consumatore rimane solo la possibilità di esercitare o meno il diritto di uscita (modello opt-out). Inoltre, i dispositivi operanti in IoT hanno caratteristiche e risorse – energetiche e di potenza di calcolo- non adatte per affrontare problemi di sicurezza. Questo ha portato alla nascita e espansione di attacchi anche verso le “cose intelligenti”. Per affrontare questo tipo di problema si devono sviluppare meccanismi di responsabilità tra i vari stakeholders del contesto IoT, incentivando un atteggiamento proattivo, che prevede la valutazioni di sistemi di sicurezza in toto e l'allineamento con standards di sicurezza riconosciuti a livello internazionale. Rimane comunque la convinzione che non esiste, ad oggi, una soluzione a questi tipi di problemi. Infatti, sono ancora aperti i dibattiti, che prevedono la partecipazione di più stakeholders, sull'adozione di un framework legislativo unico, che tenga conto delle esigenze di tutti

    The Crux Interpretum of 1 Cor 15:29: What is at Stake and a Proposal

    Get PDF
    This short paper tackles the much-discussed crux interpretum of 1 Cor 15:29. Biblical scholars have tended to analyse word for word the expression οἱ βαπτιζόμενοι ὑπὲρ τῶν νεκρῶν and present various hypotheses, with the idea favored by the scholarly majority being that of vicarious baptism for the dead. I propose a new reading of 1 Cor 15:29 in its literary and rhetorical context of 1 Cor 15:12–34. Here, what those who believe in Christ do (v. 29), what the apostles do (v. 30), and what Paul does (vv. 31–32), are put together as good practices which become incomprehensible if there is no resurrection of the dead. Vicarious baptism cannot be considered a good practice because it is at odds with Paul’s concept of baptism, and because it was later even considered heretical and aberrant. In this context, the paper proposes to read ὑπέρ with a sense of finality, i.e. “for/in view of,” and to see in ὑπὲρ τῶν νεκρῶν a brachylogy (as Paul employs elsewhere in his letters) for “for/in view of the resurrection of the dead.” Therefore in 1 Cor 15:29 Paul presents the positive example of the people who undergo baptism as a public manifestation of faith, in the hope of taking part in the final resurrection together with all the dead, especially with those who are “in Christ.” To the new reading corresponds this new translation: “Otherwise, what will they do those who have themselves baptised for/in view of (the resurrection of) the dead? If the dead are not raised at all, why then do they have themselves baptized for/in view of (the resurrection of) them?

    Multi-graded Featherweight Java

    Get PDF
    Resource-aware type systems statically approximate not only the expected result type of a program, but also the way external resources are used, e.g., how many times the value of a variable is needed. We extend the type system of Featherweight Java to be resource-aware, parametrically on an arbitrary grade algebra modeling a specific usage of resources. We prove that this type system is sound with respect to a resource-aware version of reduction, that is, a well-typed program has a reduction sequence which does not get stuck due to resource consumption. Moreover, we show that the available grades can be heterogeneous, that is, obtained by combining grades of different kinds, via a minimal collection of homomorphisms from one kind to another. Finally, we show how grade algebras and homomorphisms can be specified as Java classes, so that grade annotations in types can be written in the language itself

    A Java-like Calculus with User-Defined Coeffects

    Get PDF
    We propose a Java-like calculus where declared variables can be annotated by coeffects specifying constraints on their use, such as linearity or privacy levels. Annotations are written in the language itself, as expressions of type Coeffect, a predefined class which can be extended by user-defined subclasses, modeling the coeffects desired for a specific application. We formalize the type system and prove subject reduction, which includes preservation of coeffects, and show several examples

    Critical Analysis of Dynamic Stall Models in Low-Order Simulation Models For Vertical-Axis Wind Turbines

    Get PDF
    Abstract The efficiency of vertical-axis wind turbines (VAWTs) still lacks from those of horizontal-axis rotors (HAWTs). To improve on efficiency, more accurate and robust aerodynamic simulation tools are needed for VAWTs, for which low-order methods have not reached yet a maturity comparable to that of HAWTs' applications. In the present study, the VARDAR research code, based on the BEM theory, is used to critically compare the predictiveness of some dynamic stall models for Darrieus wind turbines. Dynamic stall, connected to the continuous variation of the angle of attack on the airfoils, has indeed a major impact on the performance of Darrieus rotors. Predicted lift and drag coefficients of the airfoils in motion are reconstructed with the different dynamic stall models and compared to unsteady CFD simulations, previously validated by means of experimental data. The results show that low-order models are unfortunately not able to capture all the complex phenomena taking place during a VAWT functioning. It is however shown that the selection of the adequate dynamic stall model can definitely lead to a much better modelling of the real airfoils' behavior and then notably enhance the predictiveness of low-order simulation methods
    corecore