1,365 research outputs found

    Tools For Refining the Baryonic Tully-Fisher Relation

    Get PDF
    This paper discusses the development of tools for galactic photometry using wise, and for reduction and analysis of 21cm galaxy spectra. These Python-based tools can then be applied to selected data in order to refine the Baryonic Tully-Fisher Relation. This relation, between baryonic mass and rotational velocity of a galaxy, proves useful for extragalactic research, particularly in calculating redshift-independent distances. While these tools could be further improved, they provide a robust process for calculation of particular galaxy characteristics

    New Approach to Overcoming the Insurmountable Watershed Rule Exception to Teague\u27s Collateral Review Killer, A

    Get PDF
    This Article will propose a new approach to overcoming the seemingly insurmountable watershed rule exception. While a single case - such as Crawford or Blakely - may not rise to watershed status, this Article will suggest that a line of cases could be considered watershed. 8 It will be shown that the highly subjective nature of this exception lends itself perfectly to this type of reasoning, and that adoption of this approach would help reconcile some inherent conflicts encountered by the Court whenever Teague retroactivity comes before it. Part II of this Article will provide the necessary legal framework, by tracing habeas corpus and the issue of retroactivity from the writ\u27s origins through Teague and its aftermath. Part III will then propose the above mentioned line of cases approach and consider its potential in light of the Court\u27s recent holdings in Whorton v. Bockting and Burton v. Stewart. Finally, Part IV will conclude the Article

    New Approach to Overcoming the Insurmountable Watershed Rule Exception to Teague\u27s Collateral Review Killer, A

    Get PDF
    This Article will propose a new approach to overcoming the seemingly insurmountable watershed rule exception. While a single case - such as Crawford or Blakely - may not rise to watershed status, this Article will suggest that a line of cases could be considered watershed. 8 It will be shown that the highly subjective nature of this exception lends itself perfectly to this type of reasoning, and that adoption of this approach would help reconcile some inherent conflicts encountered by the Court whenever Teague retroactivity comes before it. Part II of this Article will provide the necessary legal framework, by tracing habeas corpus and the issue of retroactivity from the writ\u27s origins through Teague and its aftermath. Part III will then propose the above mentioned line of cases approach and consider its potential in light of the Court\u27s recent holdings in Whorton v. Bockting and Burton v. Stewart. Finally, Part IV will conclude the Article

    Shielding the Enemy of the People : Protecting the Reporter\u27s Privilege in the Age of Social Media

    Get PDF
    President Donald Trump and his surrogates regularly belittle media outlets that publish articles critical of the administration. Arguably, no newsgathering practice has undergone more scrutiny from the Trump Administration than the use of unnamed sources. During this time, journalists must understand the extent to which the law will protect their reporting and their valuable anonymous sources. Almost forty years ago, the United States Supreme Court held in Branzburg v. Hayes, in 1972 that a general federal reporter’s privilege does not exist. Robust reporter shield laws exist in individual states, but these privileges largely lag behind the digital media revolution. When a large percentage of Americans digest news through social media resources like Facebook and Twitter, how can they distinguish between a journalist worthy of protection and an ordinary Facebook friend or Twitter follower? This Note tracks the history of anonymous reporting, discusses the development of the reporter’s privilege, and considers how to ensure protections for modern journalists. This Note argues that to best protect digital journalists and social media users, Congress should enact a federal reporter’s shield that protects journalistic acts, explicitly includes digital media, and requires an intent to disseminate information to the public

    Barriers to the Ballot Box: Implicit Bias and Voting Rights in the 21st Century

    Get PDF
    While much has been written regarding unconscious or “implicit bias” in other areas of law, there is a scarcity of scholarship examining how implicit bias impacts voting rights and how advocates can move courts to recognize evidence of implicit bias within the context of a voting rights claim. This Article aims to address that scarcity. After reviewing research on implicit bias, this Article examines how implicit bias might impact different stages of the electoral process. It then argues that “results test” claims under Section 2 of the Voting Rights Act (VRA) present an opportunity for plaintiffs to introduce evidence regarding implicit bias in the electoral process. In addition, this Article explores policy solutions to reduce the impact of implicit bias in elections

    Small Circuits Imply Efficient Arthur-Merlin Protocols

    Get PDF
    The inner product function ? x,y ? = ?_i x_i y_i mod 2 can be easily computed by a (linear-size) AC?(?) circuit: that is, a constant depth circuit with AND, OR and parity (XOR) gates. But what if we impose the restriction that the parity gates can only be on the bottom most layer (closest to the input)? Namely, can the inner product function be computed by an AC? circuit composed with a single layer of parity gates? This seemingly simple question is an important open question at the frontier of circuit lower bound research. In this work, we focus on a minimalistic version of the above question. Namely, whether the inner product function cannot be approximated by a small DNF augmented with a single layer of parity gates. Our main result shows that the existence of such a circuit would have unexpected implications for interactive proofs, or more specifically, for interactive variants of the Data Streaming and Communication Complexity models. In particular, we show that the existence of such a small (i.e., polynomial-size) circuit yields: 1) An O(d)-message protocol in the Arthur-Merlin Data Streaming model for every n-variate, degree d polynomial (over GF(2)), using only O?(d) ?log(n) communication and space complexity. In particular, this gives an AM[2] Data Streaming protocol for a variant of the well-studied triangle counting problem, with poly-logarithmic communication and space complexities. 2) A 2-message communication complexity protocol for any sparse (or low degree) polynomial, and for any function computable by an AC?(?) circuit. Specifically, for the latter, we obtain a protocol with communication complexity that is poly-logarithmic in the size of the AC?(?) circuit

    Evaluasi Pengendalian Intern Atas Sistem Akuntansi Penjualan Tunai dan Penerimaan Kas (Studi Kasus pada Grup Salon Tiger Barbershop Group)

    Full text link
    In the results аnd discussion of cаsh sаles аccounting system is still not running efficiently on the cleаning service for procedurаl timing, thus cаn be disrupting of consumers convenience. Furthermore, in the cаsh receipt аccounting system, The Finаnciаl аccount of compаny owner is not sepаrаted from the compаny finаnciаl аccount. The internаl control of the cаsh sаle system in its speciаlized orgаnizаtion, the cаsh register is still pаrt of the sаles depаrtment, then for cаsh sаles invoice is not аccurаte becаuse there is no customer's identity (customer nаme, аddress, аnd phone number) so the internаl control of the cаsh sаle system is not work well. The internаl control cаsh receipts аccounting system orgаnizаtion, thаt cаshier still concurrently the sаles depаrtment аnd mаnаger is still concurrently finаnce depаrtment, then for the security of cаsh sаles invoice it's not well secured becаuse it's not equipped with cаsh register mаchine
    corecore