78 research outputs found

    Knot Theory: from Fox 3-colorings of links to Yang-Baxter homology and Khovanov homology

    Full text link
    This paper is an extended account of my "Introductory Plenary talk at Knots in Hellas 2016" conference We start from the short introduction to Knot Theory from the historical perspective, starting from Heraclas text (the first century AD), mentioning R.Llull (1232-1315), A.Kircher (1602-1680), Leibniz idea of Geometria Situs (1679), and J.B.Listing (student of Gauss) work of 1847. We spend some space on Ralph H. Fox (1913-1973) elementary introduction to diagram colorings (1956). In the second section we describe how Fox work was generalized to distributive colorings (racks and quandles) and eventually in the work of Jones and Turaev to link invariants via Yang-Baxter operators, here the importance of statistical mechanics to topology will be mentioned. Finally we describe recent developments which started with Mikhail Khovanov work on categorification of the Jones polynomial. By analogy to Khovanov homology we build homology of distributive structures (including homology of Fox colorings) and generalize it to homology of Yang-Baxter operators. We speculate, with supporting evidence, on co-cycle invariants of knots coming from Yang-Baxter homology. Here the work of Fenn-Rourke-Sanderson (geometric realization of pre-cubic sets of link diagrams) and Carter-Kamada-Saito (co-cycle invariants of links) will be discussed and expanded. Dedicated to Lou Kauffman for his 70th birthday.Comment: 35 pages, 31 figures, for Knots in Hellas II Proceedings, Springer, part of the series Proceedings in Mathematics & Statistics (PROMS

    Cyber security fear appeals:unexpectedly complicated

    Get PDF
    Cyber security researchers are starting to experiment with fear appeals, with a wide variety of designs and reported efficaciousness. This makes it hard to derive recommendations for designing and deploying these interventions. We thus reviewed the wider fear appeal literature to arrive at a set of guidelines to assist cyber security researchers. Our review revealed a degree of dissent about whether or not fear appeals are indeed helpful and advisable. Our review also revealed a wide range of fear appeal experimental designs, in both cyber and other domains, which confirms the need for some standardized guidelines to inform practice in this respect. We propose a protocol for carrying out fear appeal experiments, and we review a sample of cyber security fear appeal studies, via this lens, to provide a snapshot of the current state of play. We hope the proposed experimental protocol will prove helpful to those who wish to engage in future cyber security fear appeal research

    Leonardo da Vinci, and the Movement of the Heart

    No full text

    Virtual reality

    No full text

    Sudden Cardiac Death Caused by Coronary Heart Disease

    No full text
    corecore