208 research outputs found
Chiral corrections to the axial charges of the octet baryons from quenched QCD
We calculate one-loop correction to the axial charges of the octet baryons
using quenched chiral perturbation theory, in order to understand chiral
behavior of the axial charges in quenched approximation to quantum
chromodynamics (QCD). In contrast to regular behavior of the full QCD chiral
perturbation theory result, , we find
that the quenched chiral perturbation theory result,
, is
singular in the chiral limit.Comment: standard LaTeX, 16 pages, 4 epsf figure
Estimation of the Pareto and related distributions â A reference-intrinsic approach
We study two Bayesian (Reference Intrinsic and Jeffreys prior), two frequentist (MLE and PWM) approaches and the nonparametric Hill estimator for the Pareto and related distributions. Three of these approaches are compared in a simulation study and all four to investigate how much equity risk capital banks subject to Basel II banking regulations must hold. The Reference Intrinsic approach, which is invariant under one-to-one transformations of the data and parameter, performs better when fitting a generalized Pareto distribution to data simulated from a Pareto distribution and is competitive in the case study on equity capital requirements
Analytic estimates for penguin operators in quenched QCD
Strong penguin operators are singlets under the right-handed flavor symmetry
group SU(3)_R. However, they do not remain singlets when the operator is
embedded in (partially) quenched QCD, but instead they become linear
combinations of two operators with different transformation properties under
the (partially) quenched symmetry group. This is an artifact of the quenched
approximation. Each of these two operators is represented by a different set of
low-energy constants in the chiral effective theory. In this paper, we give
analytic estimates for the leading low-energy constants, in quenched and
partially quenched QCD. We conclude that the effects of quenching on Q_6 are
large.Comment: 6 pages. Typo fixed and an explanatory footnote adde
The Impact of new Execution Venues on European Equity Marketsâ Liquidity â The Case of Chi-X
With the Markets in Financial Instruments Directive in effect since November 2007, new trading venues have emerged in European equities trading, among them Chi-X. This paper analyzes the impact of this new market entrant on the home market as well as on consolidated liquidity of French blue chip equities, newly tradable on Chi-X. Our findings suggest that owing to this new competition the home marketâs liquidity has enhanced. This is apparently due to the battle for order flow which results in narrower spreads and increased market depth. These results imply that overall liquidity in a virtually consolidated order book is in the French case higher than without the new competitor
An assessment of Evans' unified field theory I
Evans developed a classical unified field theory of gravitation and
electromagnetism on the background of a spacetime obeying a Riemann-Cartan
geometry. This geometry can be characterized by an orthonormal coframe theta
and a (metric compatible) Lorentz connection Gamma. These two potentials yield
the field strengths torsion T and curvature R. Evans tried to infuse
electromagnetic properties into this geometrical framework by putting the
coframe theta to be proportional to four extended electromagnetic potentials A;
these are assumed to encompass the conventional Maxwellian potential in a
suitable limit. The viable Einstein-Cartan(-Sciama-Kibble) theory of gravity
was adopted by Evans to describe the gravitational sector of his theory.
Including also the results of an accompanying paper by Obukhov and the author,
we show that Evans' ansatz for electromagnetism is untenable beyond repair both
from a geometrical as well as from a physical point of view. As a consequence,
his unified theory is obsolete.Comment: 39 pages of latex, modified because of referee report, mistakes and
typos removed, partly reformulated, taken care of M.W.Evans' rebutta
An Upgraded Analysis of at the Next-to-Leading Order
An upgraded analysis of \ep, and \epp/\ep, using the latest
determinations of the relevant experimental and theoretical parameters, is
presented. Using the recent determination of the top quark mass, GeV, our best estimate is \epp/\ep= 3.1 \pm 2.5 , which lies in the
range given by E731. We describe our determination of \epp/\ep and make a
comparison with other similar studies. A detailed discussion of the matching of
the full theory to the effective Hamiltonian, written in terms of lattice
operators, is also given.Comment: LaTeX, 45 pages, 6 postscript figure
Cardiothoracic ratio and vertebral heart size (VHS) to standardize the heart size of the tufted capuchin (Cebus apella Linnaeus, 1758) in computerized radiographic images
Abstract: The VHS and CTR were assessed using computerized thoracic radiographs of ten clinically healthy tufted capuchin monkeys (five males and five females) from the Wild Animal Screening Center in SĂŁo LuĂs (Centro de Triagem de Animais Silvestres de SĂŁo LuĂs-MA-CETAS). Radiographs were taken in laterolateral and dorsoventral projections to calculate the cardiothoracic ratio (VHS) and vertebral heart size (CTR). The VHS showed mean values of 9.34±0.32v (males) and 9.16±0.34v (females) and there was no statistical difference between males and females (p>0.05). The CTR showed mean values of 0.55±0.04 (males) and 0.52±0.03 (females) and there was no statistical difference between the sexes (p>0.05). There was positive correlation between VHS and CTR (r=0.78). The thoracic and heart diameters showed mean values of 5.70±0.48cm and 2.16±0.40cm in the males, respectively. In the females they measured 5.32±0.39cm and 2.94±0.32cm. There was no statistical difference between the sexes. Our results show that the high correlation found between VHS and CTR permitted the verification with similar clinical precision between the two methods to estimate alterations in the heart silhouette by radiographic examination of tufted capuchin, making it an easy technique to apply that can be considered in the investigation of heart problems for this wild species
Design and Analysis of Anomaly Detection and Mitigation Schemes for Distributed Denial of Service Attacks in Software Defined Network. An Investigation into the Security Vulnerabilities of Software Defined Network and the Design of Efficient Detection and Mitigation Techniques for DDoS Attack using Machine Learning Techniques
Software Defined Networks (SDN) has created great potential and hope to
overcome the need for secure, reliable and well managed next generation
networks to drive effective service delivery on the go and meet the demand
for high data rate and seamless connectivity expected by users. Thus, it
is a network technology that is set to enhance our day-to-day activities.
As network usage and reliance on computer technology are increasing
and popular, users with bad intentions exploit the inherent weakness of
this technology to render targeted services unavailable to legitimate users.
Among the security weaknesses of SDN is Distributed Denial of Service
(DDoS) attacks.
Even though DDoS attack strategy is known, the number of successful
DDoS attacks launched has seen an increment at an alarming rate over
the last decade. Existing detection mechanisms depend on signatures of
known attacks which has not been successful in detecting unknown or
different shades of DDoS attacks. Therefore, a novel detection mechanism
that relies on deviation from confidence interval obtained from the normal
distribution of throughput polled without attack from the server. Furthermore, sensitivity analysis to determine which of the network metrics (jitter, throughput and response time) is more sensitive to attack by
introducing white Gaussian noise and evaluating the local sensitivity using feed-forward artificial neural network is evaluated. All metrics are sensitive in detecting DDoS attacks. However, jitter appears to be the most sensitive to attack. As a result, the developed framework provides
an avenue to make the SDN technology more robust and secure to DDoS
attacks
- âŠ