30,853 research outputs found
A statistical mechanics framework for multi-particle production in high energy reactions
We deduce the particle distributions in particle collisions with
multihadron-production in the framework of mechanical statistics. They are
derived as functions of x, P_T^2 and the rest mass of different species for a
fixed total number of all produced particles, inelasticity and total transverse
energy. For P_T larger than the mass of each particle we get the behaviour
\frac{dn_i}{dP_T} \sim \sqrt{P_T} e^{-\frac{P_T}{T_H}} Values of _\pi,
_K, and _{\bar{p}} in agreement with experiment are found by taking
T_H=180MeV (the Hagedorn temperature).Comment: 9 pages, RevTe
Measuring Risk Aversion From Excess Returns on a Stock Index
We distinguish the measure of risk aversion from the slope coefficient in the linear relationship between the mean excess return on a stock index and its variance. Even when risk aversion is constant, the latter can vary significantly with the relative share of stocks in the risky wealth portfolio, and with the beta of unobserved wealth on stocks. We introduce a statistical model with ARCH disturbances and a time-varying parameter in the mean (TVP ARCH-N). The model decomposes the predictable component in stock returns into two parts: the time-varying price of volatility and the time-varying volatility of returns. The relative share of stocks and the beta of the excluded components of wealth on stocks are instrumented by macroeconomic variables. The ratio of corporate profit over national income and the inflation rate ore found to be important forces in the dynamics of stock price volatility.
Hydrodynamic mean field solutions of 1D exclusion processes with spatially varying hopping rates
We analyze the open boundary partially asymmetric exclusion process with
smoothly varying internal hopping rates in the infinite-size, mean field limit.
The mean field equations for particle densities are written in terms of Ricatti
equations with the steady-state current as a parameter. These equations are
solved both analytically and numerically. Upon imposing the boundary conditions
set by the injection and extraction rates, the currents are found
self-consistently. We find a number of cases where analytic solutions can be
found exactly or approximated. Results for from asymptotic analyses for
slowly varying hopping rates agree extremely well with those from extensive
Monte Carlo simulations, suggesting that mean field currents asymptotically
approach the exact currents in the hydrodynamic limit, as the hopping rates
vary slowly over the lattice. If the forward hopping rate is greater than or
less than the backward hopping rate throughout the entire chain, the three
standard steady-state phases are preserved. Our analysis reveals the
sensitivity of the current to the relative phase between the forward and
backward hopping rate functions.Comment: 12 pages, 4 figure
The Sender-Excited Secret Key Agreement Model: Capacity, Reliability and Secrecy Exponents
We consider the secret key generation problem when sources are randomly
excited by the sender and there is a noiseless public discussion channel. Our
setting is thus similar to recent works on channels with action-dependent
states where the channel state may be influenced by some of the parties
involved. We derive single-letter expressions for the secret key capacity
through a type of source emulation analysis. We also derive lower bounds on the
achievable reliability and secrecy exponents, i.e., the exponential rates of
decay of the probability of decoding error and of the information leakage.
These exponents allow us to determine a set of strongly-achievable secret key
rates. For degraded eavesdroppers the maximum strongly-achievable rate equals
the secret key capacity; our exponents can also be specialized to previously
known results.
In deriving our strong achievability results we introduce a coding scheme
that combines wiretap coding (to excite the channel) and key extraction (to
distill keys from residual randomness). The secret key capacity is naturally
seen to be a combination of both source- and channel-type randomness. Through
examples we illustrate a fundamental interplay between the portion of the
secret key rate due to each type of randomness. We also illustrate inherent
tradeoffs between the achievable reliability and secrecy exponents. Our new
scheme also naturally accommodates rate limits on the public discussion. We
show that under rate constraints we are able to achieve larger rates than those
that can be attained through a pure source emulation strategy.Comment: 18 pages, 8 figures; Submitted to the IEEE Transactions on
Information Theory; Revised in Oct 201
A physiologically inspired model for solving the cocktail party problem.
At a cocktail party, we can broadly monitor the entire acoustic scene to detect important cues (e.g., our names being called, or the fire alarm going off), or selectively listen to a target sound source (e.g., a conversation partner). It has recently been observed that individual neurons in the avian field L (analog to the mammalian auditory cortex) can display broad spatial tuning to single targets and selective tuning to a target embedded in spatially distributed sound mixtures. Here, we describe a model inspired by these experimental observations and apply it to process mixtures of human speech sentences. This processing is realized in the neural spiking domain. It converts binaural acoustic inputs into cortical spike trains using a multi-stage model composed of a cochlear filter-bank, a midbrain spatial-localization network, and a cortical network. The output spike trains of the cortical network are then converted back into an acoustic waveform, using a stimulus reconstruction technique. The intelligibility of the reconstructed output is quantified using an objective measure of speech intelligibility. We apply the algorithm to single and multi-talker speech to demonstrate that the physiologically inspired algorithm is able to achieve intelligible reconstruction of an "attended" target sentence embedded in two other non-attended masker sentences. The algorithm is also robust to masker level and displays performance trends comparable to humans. The ideas from this work may help improve the performance of hearing assistive devices (e.g., hearing aids and cochlear implants), speech-recognition technology, and computational algorithms for processing natural scenes cluttered with spatially distributed acoustic objects.R01 DC000100 - NIDCD NIH HHSPublished versio
- …
