2,704 research outputs found
Angular reduction in multiparticle matrix elements
A general method for the reduction of coupled spherical harmonic products is
presented. When the total angular coupling is zero, the reduction leads to an
explicitly real expression in the scalar products within the unit vector
arguments of the spherical harmonics. For non-scalar couplings, the reduction
gives Cartesian tensor forms for the spherical harmonic products, with tensors
built from the physical vectors in the original expression. The reduction for
arbitrary couplings is given in closed form, making it amenable to symbolic
manipulation on a computer. The final expressions do not depend on a special
choice of coordinate axes, nor do they contain azimuthal quantum number
summations, nor do they have complex tensor terms for couplings to a scalar.
Consequently, they are easily interpretable from the properties of the physical
vectors they contain.Comment: This version contains added comments and typographical corrections to
the original article. Now 27 pages, 0 figure
An Algorithm for FIML and 3SLS Estimation of Large Nonlinear Models
This paper presents a numerical algorithm for computing full information maximum likelihood (FIML) and nonlinear three-stage least squares (3SLS) coefficient estimates for large nonlinear macroeconomic models. The new algorithm, which is demonstrated by actually computing FIML and 3SLS coefficient estimates for two versions of the 97 equation Fair Model, is substantially more effective than other algorithms on FIML and 3SLS estimation problems
Montana Fish, Wildlife and Parks Statewide Forest Management Plan
Montana Fish, Wildlife & Parks (FWP) is responsible for managing approximately 150,000 acres of forested land across 36 Wildlife Management Areas (WMAs). Since 2009, Montana’s legislature has passed several bills prescribing forest management on these lands and requiring FWP to adopt forest management plans. Work is progressing towards developing a statewide forest management plan. FWP is proposing a forest management plan that employs a “filter” approach with emphasis on conserving biodiversity. Our premise is that implementing this approach will provide sustainable habitat conditions for the variety of species endemic to these forests
Supersymmetry Relations and MHV Amplitudes in Superstring Theory
We discuss supersymmetric Ward identities relating various scattering
amplitudes in type I open superstring theory. We show that at the disk level,
the form of such relations remains exactly the same, to all orders in alpha',
as in the low-energy effective field theory describing the alpha'-> 0 limit.
This result holds in D=4 for all compactifications, even for those that break
supersymmetry. We apply SUSY relations to the computations of N-gluon MHV
superstring amplitudes, simplifying the existing results for N<7 and deriving a
compact expression for N=7.Comment: 34 pages, harvmac; v2: 2 figs added; final version to appear in NP
Complete Six-Gluon Disk Amplitude in Superstring Theory
We evaluate all next-to-maximal helicity violating (NMHV) six-gluon
amplitudes in type I open superstring theory in four dimensions, at the disk
level, to all orders in alpha'. Although the computation utilizes
supersymmetric Ward identities, the result holds for all compactifications,
even for those that break supersymmetry and is completely model-independent.
Together with the maximally helicity violating (MHV) amplitudes presented in
the previous work, our results provide the complete six-gluon disk amplitude.Comment: 29 pages, harvmac, v2: Appendix B3 added, v3: Final version to appear
in NP
Ultraviolet C II and Si III Transit Spectroscopy and Modeling of the Evaporating Atmosphere of GJ436b
Hydrogen gas evaporating from the atmosphere of the hot-Neptune GJ436b
absorbs over 50% of the stellar Ly emission during transit. Given the
planet's atmospheric composition and energy-limited escape rate, this hydrogen
outflow is expected to entrain heavier atoms such as C and O. We searched for C
and Si in the escaping atmosphere of GJ436b using far-ultraviolet HST COS G130M
observations made during the planet's extended H I transit. These observations
show no transit absorption in the C II 1334,1335 \AA\ and Si III 1206 \AA\
lines integrated over [-100, 100] km s, imposing 95% (2) upper
limits of 14% (C II) and 60% (Si III) depth on the transit of an opaque disk
and 22% (C II) and 49% (Si III) depth on an extended, highly asymmetric transit
similar to that of H I Ly. C is likely present in the outflow
according to a simulation we carried out using a spherically-symmetric,
photochemical-hydrodynamical model. This simulation predicts a 2% transit
over the integrated bandpass, consistent with the data. At line center, we
predict the C II transit depth to be as high as 19%. Our model predicts a
neutral hydrogen escape rate of g s (
g s for all species) for an upper atmosphere composed of hydrogen and
helium.Comment: 7 pages, 4 figures, 1 table; accepted to ApJ Letter
Identification of Transnational Threats
In the past, the starting point for threat identification was the nation state. Today, national boundaries have lost much of their significance and global forces lacking identifiable national frontiers represent a real threat to US security.
New technologies have facilitated the development of advanced terrorist methodologies and tactics.
A new and increasingly significant threat is hostile forces which operate within the borders of states which are friendly to the United States.
American universities are increasingly vulnerable to new transnational threats by virtue of the opportunities they present for acquisition of dual use technological skills.
With its new cellular structure, terrorism has been privatized, is more difficult to counter, and enjoys great access to funds, weapons, and training.
The broad anti-war coalition has created threats to the US critical infrastructure in connection with “direct action” against the Iraqi war.
In one year alone, computer criminals funneled over 2.6 billion dollars out of Russia through Cyprus.
Traffic in false documents constitutes an especially significant threat to our critical infrastructure and has become more serious with technological advances that have eased the production of such documents.
The rise of identity theft, an important variation of traffic in false documents, threatens to undermine an important infrastructure base
Trends in the use of payment instruments in the United States
In 2003, for the first time, the number of electronic payments in the United States exceeded the number of check payments--a result of substantial growth in electronic payments (especially by debit card) and a decline in check payments. The shift toward electronic payments suggests that, as with other large economies, many payments formerly made by check are now being made with electronic payment instruments. As in past years, however, the value of checks far exceeded the value of commonly used electronic payments. ; Comparisons among groups of depository institutions of different types and sizes suggest that the distribution of payments of different types is linked in part to the types of customers those institutions tend to serve. For example, at credit unions, which generally serve individuals rather than businesses, checks accounted for a smaller proportion of account debits, and debit card payments and ATM withdrawals accounted for a larger proportion, than at institutions of other types. ; Overall, "on us" check payments, those for which the payer and payee used the same institution, declined slightly. The rate at which checks are returned also declined, while the rate of returned ACH payments--almost twice that of checks--increased, in part because of new types of ACH payments, including ACH transactions initiated with a check. ; Data gathered in 2004 also reveal some differences among geographic regions. Debit card use was substantially greater, and check use substantially lower, in the West than in other regions. In contrast, debit card use was considerably less common in the Northeast, and the decline in check payments since 2000 was less pronounced in that region. ; Indirect evidence--data on ATM withdrawals and cash back from debit card payments--suggests that cash remains a popular means of making payments. Industry data showing increases in ATMs and ATM transactions appear to reflect a shift toward greater use of ATMs and less use of checks to obtain cash, and do not necessarily indicate an increase in the use of cash.Payment systems ; Checks
- …