988 research outputs found

    One-Loop Renormalization of Higher-Derivative 2D Dilaton Gravity

    Full text link
    A theory of higher-derivative 2D dilaton gravity which has its roots in the massive higher-spin mode dynamics of string theory is suggested. The divergences of the effective action to one-loop are calculated, both in the covariant and in the conformal gauge. Some technical problems which appear in the calculations are discussed. An interpretation of the theory as a particular D=2 higher-derivative σ\sigma-model is given. For a specific case of higher-derivative 2D dilaton gravity, which is one loop multiplicatively renormalizable, static configurations corresponding to black holes are shown to exist.Comment: 12 pages, LaTeX fil

    Constructing applicative functors

    Get PDF
    Applicative functors define an interface to computation that is more general, and correspondingly weaker, than that of monads. First used in parser libraries, they are now seeing a wide range of applications. This paper sets out to explore the space of non-monadic applicative functors useful in programming. We work with a generalization, lax monoidal functors, and consider several methods of constructing useful functors of this type, just as transformers are used to construct computational monads. For example, coends, familiar to functional programmers as existential types, yield a range of useful applicative functors, including left Kan extensions. Other constructions are final fixed points, a limited sum construction, and a generalization of the semi-direct product of monoids. Implementations in Haskell are included where possible

    The Structure of Screening in QED

    Get PDF
    The possibility of constructing charged particles in gauge theories has long been the subject of debate. In the context of QED we have shown how to construct operators which have a particle description. In this paper we further support this programme by showing how the screening interactions arise between these charges. Unexpectedly we see that there are two different gauge invariant contributions with opposite signs. Their difference gives the expected result.Comment: 8 pages, LaTe

    Knowledge management and human trafficking: using conceptual knowledge representation, text analytics and open-source data to combat organized crime

    Get PDF
    Globalization, the ubiquity of mobile communications and the rise of the web have all expanded the environment in which organized criminal entities are conducting their illicit activities, and as a result the environment that law enforcement agencies have to police. This paper triangulates the capability of open-source data analytics, ontological knowledge representation and the wider notion of knowledge management (KM) in order to provide an effective, interdisciplinary means to combat such threats, thus providing law enforcement agencies (LEA’s) with a foundation of competitive advantage over human trafficking and other organized crime

    LHCD during current ramp experiments on Alcator C-Mod

    Full text link
    The lower hybrid current drive (LHCD) system on Alcator C-Mod is capable of sustaining fully non-inductive discharges for multiple current relaxation times (τcr ∼ 200 ms) at line averaged densities in the range of 5x1019 m-3. Some of these non-inductive discharges develop unstable MHD modes that can greatly reduce current drive performance, particularly in discharges with plasma current of 0.5 MA or less [1,2]. Avoiding these unstable MHD modes motivated an experiment to test if the stable current profile shape of a higher current non-inductive discharge could be achieved in a lower current discharge. Starting from a discharge at 0.8 MA, the plasma current was ramped down to 0.5 MA over 200 ms. The surface voltage of the plasma swings negative during the ramp, with the loop voltage reversal impacting the edge fast electron measurements immediately. Little change can be seen during the Ip ramp in the core fast electron measurements, indicating that the loop voltage reversal does not penetrate fully to the magnetic axis on the timescale of the current ramp. The resulting discharge did not exhibit deleterious MHD instabilities, however the existence of this one discharge does not necessarily represent a robust solution to the problem

    An empirical framework of control methods of victims of human trafficking for sexual exploitation

    Get PDF
    Although human trafficking for sexual exploitation is a frequently discussed area in current research, especially on the way that human traffickers control their victims, a recurrent problem is the lack of empirical basis. The present study examines control methods (or conditions) used against 137 victims of human trafficking for sexual exploitation. A multidimensional scaling analysis (smallest space analysis (SSA-I)) of 23 control methods (and conditions) derived from a content analysis of police files from the Netherlands revealed three distinct forms of control. These could be interpreted in terms of Canter’s Victim Role model that has been the basis for differentiating offending styles in other violent interpersonal offences. Further analysis showed a relationship between these control styles and different types of prostitution. The three Victim as Object, Victim as Vehicle and Victim as Person modes are consistent with different control methods identified in previous research

    Probabilistic Anonymity

    Get PDF
    The concept of anonymity comes into play in a wide range of situations, varying from voting and anonymous donations to postings on bulletin boards and sending mails. A formal definition of this concept has been given in literature in terms of nondeterminism. In this paper, we investigate a notion of anonymity based on probability theory, and we we discuss the relation with the nondeterministic one. We then formulate this definition in terms of observables for processes in the probabilistic pipi-calculus, and propose a method to verify automatically the anonymity property. We illustrate the method by using the example of the dining cryptographers
    • …
    corecore