3,903 research outputs found
Cohomology of acting on linear differential operators on the supercircle $S^{1|1}
We compute the first cohomology spaces
() of the Lie superalgebra with
coefficients in the superspace of linear
differential operators acting on weighted densities on the supercircle
. The structure of these spaces was conjectured in \cite{gmo}. In
fact, we prove here that the situation is a little bit more complicated. (To
appear in LMP.
Selective perspectives of implementing computer technology in K-12 education in the State of Kuwait
Through this research, the author examined the opinions and attitudes of virtually every segment of the Kuwaiti society (i.e., administrators, teachers, students, parents, and community members) toward the use of computers and technology in K-12 education. A Likert scale questionnaire was the primary vehicle for data collection. This questionnaire was designed to find out value judgments for issues such as implementing computer technology as an independent subject in K-12 schools versus integrating computer technology in all other subjects. A stratified random sample was secured from all five Kuwaiti govemorates (i.e., regions) from 70 schools. The overall number of participants who received the study\u27s survey was 1,190. Of the questionnaires distributed, 1, 165 were returned, for a return rate of 97.89 percent. Both descriptive statistics procedures (e.g., frequency, mean, and standard deviation) and inferential statistics procedures ( e.g., factor analysis, analysis of variance (ANOVA), Tukey\u27s HSD multiple comparisons, and t-test) were conducted
Wife battery in Islam : socio-legal interpretations in Islamic societies
There are more than 1.2 billion Muslims living in more than 184
countries and speaking more than 200 languages and dialects.9 Thus
discussing Islam as an ideology that has a singular interpretation is
impossible and to many social scientists such a discussion represents a
simplified view of the intertwined societal forces and structures. Despite
the existing diversity among Muslims, most agree that the major sources
of Islam are: the Holy Qur’an, the Prophet’s sayings and traditions
(hadith and sunnah), and shari’a (jurists’ legal derivations and
decisions). The sources of Islam are treated hierarchically; jurists go first
to the Qur’an, then to the exegetical works related to the hadith and
sunnah, and finally to the shari’a (juridical corpus). This chapter aims to
look at the unity of the sources as the basis of understanding the issue of
wife beating in Islam
Distributed Beamforming with Wirelessly Powered Relay Nodes
This paper studies a system where a set of relay nodes harvest energy
from the signal received from a source to later utilize it when forwarding the
source's data to a destination node via distributed beamforming. To this end,
we derive (approximate) analytical expressions for the mean SNR at destination
node when relays employ: i) time-switching based energy harvesting policy, ii)
power-splitting based energy harvesting policy. The obtained results facilitate
the study of the interplay between the energy harvesting parameters and the
synchronization error, and their combined impact on mean SNR. Simulation
results indicate that i) the derived approximate expressions are very accurate
even for small (e.g., ), ii) time-switching policy by the relays
outperforms power-splitting policy by at least dB.Comment: 4 pages, 3 figures, accepted for presentation at IEEE VTC 2017 Spring
conferenc
Saudis’ attitude toward principles of modernity: Social progress, individualism, and democracy
This study investigated attitudes of Saudi youth towards modernity and its principles, which are social progress, individualism, and democracy. Methodologically, the study used mixed methods by applying two scientific tools: semi-structured interviews and a survey. Study questions, both close-ended and open-ended, are programmed using REDCap. Data was gathered virtually via Zoom meetings. Twenty-one Saudi youth (10 males and 11 females) aged between 18 and 30 years old participated. They were recruited via social media platforms. Descriptive statistics were conducted to analyze survey data, and an inductive approach was used to analyze the semistructures interviews. The results show that the Saudi youth have an acute awareness and cautious attitudes regarding their own social, cultural, and political circumstances in dealing with modernity and its fundamental principles. However, distrust emerged as an issue in the story of Saudi modernity due to the perception that it is a government-led project and not an internal, dynamic process
Specific recognition of a multiply phosphorylated motif in the DNA repair scaffold XRCC1 by the FHA domain of human PNK.
Short-patch repair of DNA single-strand breaks and gaps (SSB) is coordinated by XRCC1, a scaffold protein that recruits the DNA polymerase and DNA ligase required for filling and sealing the damaged strand. XRCC1 can also recruit end-processing enzymes, such as PNK (polynucleotide kinase 3'-phosphatase), Aprataxin and APLF (aprataxin/PNK-like factor), which ensure the availability of a free 3'-hydroxyl on one side of the gap, and a 5'-phosphate group on the other, for the polymerase and ligase reactions respectively. PNK binds to a phosphorylated segment of XRCC1 (between its two C-terminal BRCT domains) via its Forkhead-associated (FHA) domain. We show here, contrary to previous studies, that the FHA domain of PNK binds specifically, and with high affinity to a multiply phosphorylated motif in XRCC1 containing a pSer-pThr dipeptide, and forms a 2:1 PNK:XRCC1 complex. The high-resolution crystal structure of a PNK-FHA-XRCC1 phosphopeptide complex reveals the basis for this unusual bis-phosphopeptide recognition, which is probably a common feature of the known XRCC1-associating end-processing enzymes
Channel Impulse Response-based Distributed Physical Layer Authentication
In this preliminary work, we study the problem of {\it distributed}
authentication in wireless networks. Specifically, we consider a system where
multiple Bob (sensor) nodes listen to a channel and report their {\it
correlated} measurements to a Fusion Center (FC) which makes the ultimate
authentication decision. For the feature-based authentication at the FC,
channel impulse response has been utilized as the device fingerprint.
Additionally, the {\it correlated} measurements by the Bob nodes allow us to
invoke Compressed sensing to significantly reduce the reporting overhead to the
FC. Numerical results show that: i) the detection performance of the FC is
superior to that of a single Bob-node, ii) compressed sensing leads to at least
overhead reduction on the reporting channel at the expense of a small
( dB) SNR margin to achieve the same detection performance.Comment: 6 pages, 5 figures, accepted for presentation at IEEE VTC 2017 Sprin
- …