988 research outputs found
One-Loop Renormalization of Higher-Derivative 2D Dilaton Gravity
A theory of higher-derivative 2D dilaton gravity which has its roots in the
massive higher-spin mode dynamics of string theory is suggested. The
divergences of the effective action to one-loop are calculated, both in the
covariant and in the conformal gauge. Some technical problems which appear in
the calculations are discussed. An interpretation of the theory as a particular
D=2 higher-derivative -model is given. For a specific case of
higher-derivative 2D dilaton gravity, which is one loop multiplicatively
renormalizable, static configurations corresponding to black holes are shown to
exist.Comment: 12 pages, LaTeX fil
Constructing applicative functors
Applicative functors define an interface to computation that is more general, and correspondingly weaker, than that of monads. First used in parser libraries, they are now seeing a wide range of applications. This paper sets out to explore the space of non-monadic applicative functors useful in programming. We work with a generalization, lax monoidal functors, and consider several methods of constructing useful functors of this type, just as transformers are used to construct computational monads. For example, coends, familiar to functional programmers as existential types, yield a range of useful applicative functors, including left Kan extensions. Other constructions are final fixed points, a limited sum construction, and a generalization of the semi-direct product of monoids. Implementations in Haskell are included where possible
The Structure of Screening in QED
The possibility of constructing charged particles in gauge theories has long
been the subject of debate. In the context of QED we have shown how to
construct operators which have a particle description. In this paper we further
support this programme by showing how the screening interactions arise between
these charges. Unexpectedly we see that there are two different gauge invariant
contributions with opposite signs. Their difference gives the expected result.Comment: 8 pages, LaTe
Knowledge management and human trafficking: using conceptual knowledge representation, text analytics and open-source data to combat organized crime
Globalization, the ubiquity of mobile communications and the rise of the web have all expanded the environment in which organized criminal entities are conducting their illicit activities, and as a result the environment that law enforcement agencies have to police. This paper triangulates the capability of open-source data analytics, ontological knowledge representation and the wider notion of knowledge management (KM) in order to provide an effective, interdisciplinary means to combat such threats, thus providing law enforcement agencies (LEA’s) with a foundation of competitive advantage over human trafficking and other organized crime
Developing evidence of content validity and comprehensibility of a measure of HIV-related stigma for Maharashtra, India
LHCD during current ramp experiments on Alcator C-Mod
The lower hybrid current drive (LHCD) system on Alcator C-Mod is capable of sustaining fully non-inductive discharges for multiple current relaxation times (τcr ∼ 200 ms) at line averaged densities in the range of 5x1019 m-3. Some of these non-inductive discharges develop unstable MHD modes that can greatly reduce current drive performance, particularly in discharges with plasma current of 0.5 MA or less [1,2]. Avoiding these unstable MHD modes motivated an experiment to test if the stable current profile shape of a higher current non-inductive discharge could be achieved in a lower current discharge. Starting from a discharge at 0.8 MA, the plasma current was ramped down to 0.5 MA over 200 ms. The surface voltage of the plasma swings negative during the ramp, with the loop voltage reversal impacting the edge fast electron measurements immediately. Little change can be seen during the Ip ramp in the core fast electron measurements, indicating that the loop voltage reversal does not penetrate fully to the magnetic axis on the timescale of the current ramp. The resulting discharge did not exhibit deleterious MHD instabilities, however the existence of this one discharge does not necessarily represent a robust solution to the problem
An empirical framework of control methods of victims of human trafficking for sexual exploitation
Although human trafficking for sexual exploitation is a frequently discussed area in current research, especially on the way that human traffickers control their victims, a recurrent problem is the lack of empirical basis. The present study examines control methods (or conditions) used against 137 victims of human trafficking for sexual exploitation. A multidimensional scaling analysis (smallest space analysis (SSA-I)) of 23 control methods (and conditions) derived from a content analysis of police files from the Netherlands revealed three distinct forms of control. These could be interpreted in terms of Canter’s Victim Role model that has been the basis for differentiating offending styles in other violent interpersonal offences. Further analysis showed a relationship between these control styles and different types of prostitution. The three Victim as Object, Victim as Vehicle and Victim as Person modes are consistent with different control methods identified in previous research
Probabilistic Anonymity
The concept of anonymity comes into play in
a wide range of situations, varying from voting
and anonymous donations to postings on bulletin
boards and sending mails. A formal definition of
this concept has been given in literature in
terms of nondeterminism. In this paper, we
investigate a notion of anonymity based on
probability theory, and we we discuss the relation
with the nondeterministic one. We then formulate
this definition in terms of observables for
processes in the probabilistic -calculus, and
propose a method to verify automatically the
anonymity property. We illustrate the method by
using the example of the dining cryptographers
- …