946 research outputs found

    The Blizzard Challenge 2009

    Get PDF
    The Blizzard Challenge 2009 was the fifth annual Blizzard Challenge. As in 2008, UK English and Mandarin Chinese were the chosen languages for the 2009 Challenge. The English corpus was the same one used in 2008. The Mandarin corpus was provided by iFLYTEK. As usual, participants with limited resources or limited experience in these languages had the option of using unaligned labels that were provided for both corpora and for the test sentences. An accent-specific pronunciation dictionary was also available for the English speaker. This year, the tasks were organised in the form of ‘hubs ’ and ‘spokes ’ where each hub task involved building a general-purpose voice and each spoke task involved building a voice for a specific application. A set of test sentences was released to participants, who were given a limited time in which to synthesise them and submit the synthetic speech. An online listening test was conducted to evaluate naturalness, intelligibility, degree of similarity to the original speaker and, for one of the spoke tasks, “appropriateness.

    Transmission amplitudes from Bethe ansatz equations

    Get PDF
    We consider the Heisenberg spin chain in the presence of integrable spin defects. Using the Bethe ansatz methodology, we extract the associated transmission amplitudes, that describe the interaction between the particle-like excitations displayed by the models and the spin impurity. In the attractive regime of the XXZ model, we also derive the breather's transmission amplitude. We compare our findings with earlier relevant results in the context of the sine-Gordon model.Comment: 27 pages Latex. References adde

    Inversion identities for inhomogeneous face models

    Get PDF
    We derive exact inversion identities satisfied by the transfer matrix of inhomogeneous interaction-round-a-face (IRF) models with arbitrary boundary conditions using the underlying integrable structure and crossing properties of the local Boltzmann weights. For the critical restricted solid-on-solid (RSOS) models these identities together with some information on the analytical properties of the transfer matrix determine the spectrum completely and allow to derive the Bethe equations for both periodic and general open boundary conditions.Comment: Latex, 20 page

    Junction type representations of the Temperley-Lieb algebra and associated symmetries

    Full text link
    Inspired by earlier works on representations of the Temperley-Lieb algebra we introduce a novel family of representations of the algebra. This may be seen as a generalization of the so called asymmetric twin representation. The underlying symmetry algebra is also examined and it is shown that in addition to certain obvious exact quantum symmetries non trivial quantum algebraic realizations that exactly commute with the representation also exist. Non trivial representations of the boundary Temperley-Lieb algebra as well as the related residual symmetries are also discussed. The corresponding novel R and K matrices solutions of the Yang-Baxter and reflection equations are identified, the relevant quantum spin chain is also constructed and its exact symmetry is studied.Comment: 19 pages, LaTex. Published in Symmetry, Integrability and Geometry: Methods and Applications (SIGMA

    Scattering in Twisted Yangians

    Get PDF
    We study the bulk and boundary scattering of the sl(N) twisted Yangian spin chain via the solution of the Bethe ansatz equations in the thermodynamic limit. Explicit expressions for the scattering amplitudes are obtained and the factorization of the bulk scattering is shown. The issue of defects in twisted Yangians is also briefly discussed.Comment: 10 pages, Latex. Based on a talk presented by AD, in "Integrable systems and quantum symmetries", Prague, June 2015. Related results are also presented in: arXiv:1410.5991, arXiv:1412.648

    Μελέτη της κρουστικής απόκρισης πλακών αποτελούμενων από σύγχρονα πολύστρωτα υλικά

    Get PDF
    Εθνικό Μετσόβιο Πολυτεχνείο--Μεταπτυχιακή Εργασία. Διεπιστημονικό-Διατμηματικό Πρόγραμμα Μεταπτυχιακών Σπουδών (Δ.Π.Μ.Σ.) “Υπολογιστική Μηχανική

    Regulation of Unrequested Solicitation in Japan: The Way Toward a Do-Not-Call and Do-Not-Knock System?

    Get PDF
    This work was supported by JSPS KAKENHI Grant Number 15K16973
    corecore