30,853 research outputs found

    A statistical mechanics framework for multi-particle production in high energy reactions

    Full text link
    We deduce the particle distributions in particle collisions with multihadron-production in the framework of mechanical statistics. They are derived as functions of x, P_T^2 and the rest mass of different species for a fixed total number of all produced particles, inelasticity and total transverse energy. For P_T larger than the mass of each particle we get the behaviour \frac{dn_i}{dP_T} \sim \sqrt{P_T} e^{-\frac{P_T}{T_H}} Values of _\pi, _K, and _{\bar{p}} in agreement with experiment are found by taking T_H=180MeV (the Hagedorn temperature).Comment: 9 pages, RevTe

    Measuring Risk Aversion From Excess Returns on a Stock Index

    Get PDF
    We distinguish the measure of risk aversion from the slope coefficient in the linear relationship between the mean excess return on a stock index and its variance. Even when risk aversion is constant, the latter can vary significantly with the relative share of stocks in the risky wealth portfolio, and with the beta of unobserved wealth on stocks. We introduce a statistical model with ARCH disturbances and a time-varying parameter in the mean (TVP ARCH-N). The model decomposes the predictable component in stock returns into two parts: the time-varying price of volatility and the time-varying volatility of returns. The relative share of stocks and the beta of the excluded components of wealth on stocks are instrumented by macroeconomic variables. The ratio of corporate profit over national income and the inflation rate ore found to be important forces in the dynamics of stock price volatility.

    Hydrodynamic mean field solutions of 1D exclusion processes with spatially varying hopping rates

    Full text link
    We analyze the open boundary partially asymmetric exclusion process with smoothly varying internal hopping rates in the infinite-size, mean field limit. The mean field equations for particle densities are written in terms of Ricatti equations with the steady-state current JJ as a parameter. These equations are solved both analytically and numerically. Upon imposing the boundary conditions set by the injection and extraction rates, the currents JJ are found self-consistently. We find a number of cases where analytic solutions can be found exactly or approximated. Results for JJ from asymptotic analyses for slowly varying hopping rates agree extremely well with those from extensive Monte Carlo simulations, suggesting that mean field currents asymptotically approach the exact currents in the hydrodynamic limit, as the hopping rates vary slowly over the lattice. If the forward hopping rate is greater than or less than the backward hopping rate throughout the entire chain, the three standard steady-state phases are preserved. Our analysis reveals the sensitivity of the current to the relative phase between the forward and backward hopping rate functions.Comment: 12 pages, 4 figure

    The Sender-Excited Secret Key Agreement Model: Capacity, Reliability and Secrecy Exponents

    Full text link
    We consider the secret key generation problem when sources are randomly excited by the sender and there is a noiseless public discussion channel. Our setting is thus similar to recent works on channels with action-dependent states where the channel state may be influenced by some of the parties involved. We derive single-letter expressions for the secret key capacity through a type of source emulation analysis. We also derive lower bounds on the achievable reliability and secrecy exponents, i.e., the exponential rates of decay of the probability of decoding error and of the information leakage. These exponents allow us to determine a set of strongly-achievable secret key rates. For degraded eavesdroppers the maximum strongly-achievable rate equals the secret key capacity; our exponents can also be specialized to previously known results. In deriving our strong achievability results we introduce a coding scheme that combines wiretap coding (to excite the channel) and key extraction (to distill keys from residual randomness). The secret key capacity is naturally seen to be a combination of both source- and channel-type randomness. Through examples we illustrate a fundamental interplay between the portion of the secret key rate due to each type of randomness. We also illustrate inherent tradeoffs between the achievable reliability and secrecy exponents. Our new scheme also naturally accommodates rate limits on the public discussion. We show that under rate constraints we are able to achieve larger rates than those that can be attained through a pure source emulation strategy.Comment: 18 pages, 8 figures; Submitted to the IEEE Transactions on Information Theory; Revised in Oct 201

    A physiologically inspired model for solving the cocktail party problem.

    Get PDF
    At a cocktail party, we can broadly monitor the entire acoustic scene to detect important cues (e.g., our names being called, or the fire alarm going off), or selectively listen to a target sound source (e.g., a conversation partner). It has recently been observed that individual neurons in the avian field L (analog to the mammalian auditory cortex) can display broad spatial tuning to single targets and selective tuning to a target embedded in spatially distributed sound mixtures. Here, we describe a model inspired by these experimental observations and apply it to process mixtures of human speech sentences. This processing is realized in the neural spiking domain. It converts binaural acoustic inputs into cortical spike trains using a multi-stage model composed of a cochlear filter-bank, a midbrain spatial-localization network, and a cortical network. The output spike trains of the cortical network are then converted back into an acoustic waveform, using a stimulus reconstruction technique. The intelligibility of the reconstructed output is quantified using an objective measure of speech intelligibility. We apply the algorithm to single and multi-talker speech to demonstrate that the physiologically inspired algorithm is able to achieve intelligible reconstruction of an "attended" target sentence embedded in two other non-attended masker sentences. The algorithm is also robust to masker level and displays performance trends comparable to humans. The ideas from this work may help improve the performance of hearing assistive devices (e.g., hearing aids and cochlear implants), speech-recognition technology, and computational algorithms for processing natural scenes cluttered with spatially distributed acoustic objects.R01 DC000100 - NIDCD NIH HHSPublished versio
    corecore