5,305 research outputs found

    Comment on "Electron transport through correlated molecules computed using the time-independent Wigner function: Two critical tests"

    Get PDF
    The many electron correlated scattering (MECS) approach to quantum electronic transport was investigated in the linear response regime [I. Baldea and H. Koeppel, Phys. Rev. B. 78, 115315 (2008)]. The authors suggest, based on numerical calculations, that the manner in which the method imposes boundary conditions is unable to reproduce the well-known phenomena of conductance quantization. We introduce an analytical model and demonstrate that conductance quantization is correctly obtained using open system boundary conditions within the MECS approach.Comment: 18 pages, 4 figures. Physical Review B, to appea

    Data processing system for the intensity monitoring spectrometer flown on the Orbiting Geophysical Observatory-F (OGO-F) satellite

    Get PDF
    The system is discussed which was developed to process digitized telemetry data from the intensity monitoring spectrometer flown on the Orbiting Geophysical Observatory (OGO-F) Satellite. Functional descriptions and operating instructions are included for each program in the system

    kGamma distributions in granular packs

    Full text link
    It has been recently pointed out that local volume fluctuations in granular packings follow remarkably well a shifted and rescaled Gamma distribution named the kGamma distribution [T. Aste, T. Di Matteo, Phys. Rev. E 77 (2008) 021309]. In this paper we confirm, extend and discuss this finding by supporting it with additional experimental and simulation data.Comment: 10 pages, 5 figure

    Renormalization Group Improved Exponentiation of Soft Gluons in QCD

    Full text link
    We extend the methods of Yennie, Frautschi and Suura to QCD for the summation of soft gluon effects in which infrared singularities are cancelled to all orders in αs\alpha_s. An explicit formula for the respective \rngp improved exponentiated cross section is obtained for q+\bbar{{q'}}\to q+\bbar{{q'}}+ n(G) at SSC energies. Possible applications are discussed.Comment: 7 pages (1 figure not included, available on request) LATEX, UTHEP-93-040

    Labor

    Get PDF

    Widening the Aperture on Fourth Amendment Interests: A Comment on Orin Kerr\u27s The Fourth Amendment and the Global Internet

    Get PDF
    Physical-world law may not be suitable for cyberspace. For example, the Supreme Court\u27s sufficient connection test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government uses of cyberspace evolve

    Widening the Aperture on Fourth Amendment Interests: A Comment on Orin Kerr\u27s The Fourth Amendment and the Global Internet

    Get PDF
    Physical-world law may not be suitable for cyberspace. For example, the Supreme Court\u27s sufficient connection test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government uses of cyberspace evolve

    Cybersecurity and the Administrative National Security State: Framing the Issues for Federal Legislation

    Get PDF
    In the digital age, every part of federal government has critical cybersecurity interests. Many of those issues are brought into sharp focus by Edward Snowden\u27s disclosure of sensitive government cyber intelligence programs conducted by the National Security Agency, the Federal Bureau of Investigation, and the Central Intelligence Agency. Courts are reviewing various constitutional and statutory challenges to those programs, two government review groups have reported on related legal and policy issues, and Congress is considering cyber intelligence reform proposals. All of this action comes on the heels of significant efforts by successive administrations to restructure government and pass comprehensive cybersecurity legislation to improve the nation\u27s posture to strategically address cyber issues. This Article proposes that new framework legislation is needed to comprehensively address issues relating to Snowden\u27s disclosures and broader cybersecurity interests

    Secular but not Superficial: An Overlooked Nonreligious/Nonspiritual Identity

    Get PDF
    Since Durkheim’s characterization of the sacred and profane as “antagonistic rivals,” the strict dichotomy has been framed in such a way that “being religious” evokes images of a life filled with profound meaning and value, while “being secular” evokes images of a meaningless, self-centered, superficial life, often characterized by materialistic consumerism and the cold, heartless environment of corporate greed. Consequently, to identify as “neither religious nor spiritual” runs the risk of being stigmatized as superficial, untrustworthy, and immoral. Conflicts and confusions encountered in the process of negotiating a nonreligious/nonspiritual identity, caused by the ambiguous nature of religious language, were explored through qualitative interviews with 14 ex-ministers and 1 atheist minister—individuals for whom supernaturalist religion had formed the central core of identity, but who have deconverted and no longer hold supernatural beliefs. The cognitive linguistics approach of Frame Semantics was applied to the process of “oppositional identity work” to examine why certain identity labels are avoided or embraced due to considerations of the cognitive frames evoked by those labels. Through the constant comparative method of grounded theory, a host of useful theoretical concepts emerged from the data. Several impediments to the construction of a “secular but not superficial” identity were identified, and a framework of new theoretical concepts developed to make sense of them: sense disparity, frame disparity, identity misfire, foiled identity, sense conflation, and conflated frames. Several consequences arising from these impediments were explored: (1) consequences of sense conflation and conflated frames for the study of religion; (2) consequences of conflated frames for religious terminology; and (3) consequences of the negation of conflated frames for those who identify as not religious, not spiritual, or not Christian. Additionally, four types of oppositional identity work were identified and analyzed: (1) avoidance identity work, (2) dissonant identity work, (3) adaptive identity work, and (4) alternative identity work. Finally, the concept of conflated frames was applied to suggest a new interpretation of the classic Weberian disenchantment narrative
    • …
    corecore