12,425 research outputs found

    The DMT classification of real and quaternionic lattice codes

    Full text link
    In this paper we consider space-time codes where the code-words are restricted to either real or quaternion matrices. We prove two separate diversity-multiplexing gain trade-off (DMT) upper bounds for such codes and provide a criterion for a lattice code to achieve these upper bounds. We also point out that lattice codes based on Q-central division algebras satisfy this optimality criterion. As a corollary this result provides a DMT classification for all Q-central division algebra codes that are based on standard embeddings.Comment: 6 pages, 1 figure. Conference paper submitted to the International Symposium on Information Theory 201

    The Method of Comparison Equations for Schwarzschild Black Holes

    Get PDF
    We employ the method of comparison equations to study the propagation of a massless minimally coupled scalar field on the Schwarzschild background. In particular, we show that this method allows us to obtain explicit approximate expressions for the radial modes with energy below the peak of the effective potential which are fairly accurate over the whole region outside the horizon. This case can be of particular interest, for example, for the problem of black hole evaporation.Comment: 7 pages, added figures. Version to appear in PR

    Child and teenager oral health and dental visiting: results from the National Dental Telephone Interview Survey 2010

    Get PDF
    This publication reports on oral health, dental visiting and dental treatment needs of Australian children as reported in the National Dental Telephone Interview Survey (NDTIS) 2010. Time series data across all NDTISs conducted since 1994 are presented to provide a picture of how key measures have changed over time. Finally, comparisons with international data are presented to provide a picture of how Australian children fare among their international counterparts.Oral healthThe majority of Australian children report good oral health. However, 7% reported that they had experienced toothache and 10% reported that they had avoided certain foods during the previous 12 months. Children from low income households were more likely to report having fair or poor oral health and to have experienced toothache than children from high income households. There was no significant change over time in these measures.Dental visitingAlmost 70% of children made a dental visit in the previous 12 months and the majority (84%) visited for a check-up. Less than a third of pre-school-aged children had ever made a dental visit. Children from the lowest income households were less likely than those from higher income households to have both made a dental visit and to have visited for a check-up. Both of these measures of dental visiting have remained fairly stable over time.Barriers to dental care useAround 13% of children avoided or delayed making a dental visit due to cost. Around 6% did not have a recommended treatment due to cost. Overall, almost 30% of children avoided or delayed seeking care, did not have recommended treatment or their household experienced a large financial burden due to the cost of dental care. Children from low income households were 7 times as likely than those from high income households to avoid or delay due to cost and 6 times as likely to have not had recommended treatment due to cost.International comparisonsComparable data are available for children in Canada and New Zealand. Overall, Australian children were less likely to report that they had fair or poor oral health, and less likely to have made a dental visit in the previous 12 months than their counterparts in New Zealand. Australian teenagers were less likely than their Canadian counterparts to report fair or poor oral health and were more likely to have avoided or delayed making a dental visit due to cost

    Almost universal codes for fading wiretap channels

    Full text link
    We consider a fading wiretap channel model where the transmitter has only statistical channel state information, and the legitimate receiver and eavesdropper have perfect channel state information. We propose a sequence of non-random lattice codes which achieve strong secrecy and semantic security over ergodic fading channels. The construction is almost universal in the sense that it achieves the same constant gap to secrecy capacity over Gaussian and ergodic fading models.Comment: 5 pages, to be submitted to IEEE International Symposium on Information Theory (ISIT) 201

    Do Liquidity Constraints Matter in Explaining Firm Size and Growth? Some Evidence from the Italian Manufacturing Industry

    Get PDF
    The paper investigates whether liquidity constraints affect firm size and growth dynamics using a large longitudinal sample of Italian manufacturing firms. We run standard panel-data Gibrat regressions, suitably expanded to take into account liquidity constraints (proxied by cash flow). Moreover, we characterize the statistical properties of firms size, growth, age, and cash flow distributions. Pooled data show that: (i) liquidity constraints engender a negative, statistically significant, effect on growth once one controls for size; (ii) smaller and younger firms grow more (and experience more volatile growth patterns) after controlling for liquidity constraints; (iii) the stronger liquidity constraints, the more size negatively affects firm growth. We find that pooled size distributions depart from log-normality and growth rates are well approximated by fat-tailed, tent-shaped (Laplace) densities. We also study the evolution of growth-size distributions over time. Our exercises suggest that the strong negative impact of liquidity constraints on firm growth which was present in the pooled sample becomes ambiguous when one disaggregates across years. Finally, firms who were young and strongly liquidity-constrained at the beginning of the sample period grew persistently more than those who were old and weakly liquidity-constrained.Firm Size, Liquidity Constraints, Firm Growth, Investment, Gibrat Law

    Secret key generation from Gaussian sources using lattice hashing

    Full text link
    We propose a simple yet complete lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that it achieves strong secret key rates up to 1/2 nat from the optimal in the case of "degraded" source models. The novel ingredient of our scheme is a lattice-hashing technique, based on the notions of flatness factor and channel intrinsic randomness. The proposed scheme does not require dithering.Comment: 5 pages, Conference (ISIT 2013

    Work after the Age of Fifty: Switzerland in an international Comparison

    Get PDF
    Ältere Arbeitskräfte, Arbeitsmarkt, Arbeitsmarktpolitik, Schweiz, Elderly workforce, Labour market, Labour market policy, Switzerland

    Dynamics of a Bose-Einstein Condensate of Excited Magnons

    Full text link
    The emergence of a non-equilibrium Bose-Einstein-like condensation of magnons in rf-pumped magnetic thin films has recently been experimentally observed. We present here a complete theoretical description of the non-equilibrium processes involved. It it demonstrated that the phenomenon is another example of the presence of a Bose-Einstein-like condensation in non-equilibrium many-boson systems embedded in a thermal bath, better referred-to as Fr\"{o}hlich-Bose-Einstein condensation. The complex behavior emerges after a threshold of the exciting intensity is attained. It is inhibited at higher intensities when the magnon-magnon interaction drives the magnons to internal thermalization. The observed behavior of the relaxation to equilibrium after the end of the pumping pulse is also accounted for and the different processes fully described.Comment: 42 pages, 11 figure
    corecore