49,353 research outputs found
Passion and Conflict: Medieval Islamic Views of the West
This article analyzes the representation of al-Andalus and North Africa in medieval Islamic maps from the eleventh to the fifteenth centuries. In contrast to other maps of the Mediterranean, which display a veneer of harmony and balance, the image of the Maghrib is by deliberate design one of conflict and confusion; of love and hate; of male vs. female; of desire vs rejection. This paper interprets and explains the reasons behind the unusual depiction of Andalus and the Maghrib by medieval Islamic cartographers. In addition, this article develops a new methodology of interpreting medieval Islamic maps employing a deconstruction of the forms through an analysis of different levels of gaze. The analysis unfolds into the use of erotic and nostalgic Hispano-Arabic poetry as a lens of interpretation for Islamic maps
Searchin’ His Eyes, Lookin’ for Traces: Piri Reis’ World Map of 1513 & its Islamic Iconographic Connections (A Reading Through Bagdat 334 and Proust)
The remnant of the 1513 world map of the Ottoman corsair (and later admiral) Muhiddin Piri, a.k.a. Piri Reis, with its focus on the Atlantic and the New World can be ranked as one of the most famous and controversial maps in the annals of the history of cartography. Following its discovery at Topkapi Palace in 1929, this early modern Ottoman map has raised baffling questions regarding its fons et origo. Some scholars posited ancient sea kings or aliens from outer space as the original creators; while the influence of Columbus’ own map and early Renaissance cartographers tantalized others. One question that remains unanswered is how Islamic cartography influenced Piri Reis’ work. This paper presents hitherto unnoticed iconographical connections between the classical Islamic mapping tradition and the Piri Reis map
The Structure of the Aoki Phase at Weak Coupling
A new method to determine the phase diagram of certain lattice fermionic
field theories in the weakly coupled regime is presented. This method involves
a new type of weak coupling expansion which is multiplicative rather than
additive in nature and allows perturbative calculation of partition function
zeroes. Application of the method to the single flavour Gross-Neveu model gives
a phase diagram consistent with the parity symmetry breaking scenario of Aoki
and provides new quantitative information on the width of the Aoki phase in the
weakly coupled sector.Comment: 9 pages, 1 figure (minor changes) To be published in Phys. Lett.
The Phase Structure of the Weakly Coupled Lattice Schwinger Model
The weak coupling expansion is applied to the single flavour Schwinger model
with Wilson fermions on a symmetric toroidal lattice of finite extent. We
develop a new analytic method which permits the expression of the partition
function as a product of pure gauge expectation values whose zeroes are the
Lee-Yang zeroes of the model. Application of standard finite-size scaling
techniques to these zeroes recovers previous numerical results for the small
and moderate lattice sizes to which those studies were restricted. Our
techniques, employable for arbitrarily large lattices, reveal the absence of
accumulation of these zeroes on the real hopping parameter axis at constant
weak gauge coupling. The consequence of this previously unobserved behaviour is
the absence of a zero fermion mass phase transition in the Schwinger model with
single flavour Wilson fermions at constant weak gauge coupling.Comment: 8 pages, 2 figures, insert to figure 2 include
Percolation and Connectivity in the Intrinsically Secure Communications Graph
The ability to exchange secret information is critical to many commercial,
governmental, and military networks. The intrinsically secure communications
graph (iS-graph) is a random graph which describes the connections that can be
securely established over a large-scale network, by exploiting the physical
properties of the wireless medium. This paper aims to characterize the global
properties of the iS-graph in terms of: (i) percolation on the infinite plane,
and (ii) full connectivity on a finite region. First, for the Poisson iS-graph
defined on the infinite plane, the existence of a phase transition is proven,
whereby an unbounded component of connected nodes suddenly arises as the
density of legitimate nodes is increased. This shows that long-range secure
communication is still possible in the presence of eavesdroppers. Second, full
connectivity on a finite region of the Poisson iS-graph is considered. The
exact asymptotic behavior of full connectivity in the limit of a large density
of legitimate nodes is characterized. Then, simple, explicit expressions are
derived in order to closely approximate the probability of full connectivity
for a finite density of legitimate nodes. The results help clarify how the
presence of eavesdroppers can compromise long-range secure communication.Comment: Submitted for journal publicatio
Childhood Maltreatment and BMI Trajectories to Mid-Adult Life: Follow-Up to Age 50y in a British Birth Cohort.
Childhood maltreatment including abuse and neglect has been associated with adult obesity, but evidence on life-course development of obesity or BMI gain is unclear. We aim to establish whether childhood maltreatments are related to obesity or BMI at different life-stages 7y-50y and to identify possible explanations for associations
Communication in a Poisson Field of Interferers -- Part I: Interference Distribution and Error Probability
We present a mathematical model for communication subject to both network
interference and noise. We introduce a framework where the interferers are
scattered according to a spatial Poisson process, and are operating
asynchronously in a wireless environment subject to path loss, shadowing, and
multipath fading. We consider both cases of slow and fast-varying interferer
positions. The paper is comprised of two separate parts. In Part I, we
determine the distribution of the aggregate network interference at the output
of a linear receiver. We characterize the error performance of the link, in
terms of average and outage probabilities. The proposed model is valid for any
linear modulation scheme (e.g., M-ary phase shift keying or M-ary quadrature
amplitude modulation), and captures all the essential physical parameters that
affect network interference. Our work generalizes the conventional analysis of
communication in the presence of additive white Gaussian noise and fast fading,
allowing the traditional results to be extended to include the effect of
network interference. In Part II of the paper, we derive the capacity of the
link when subject to network interference and noise, and characterize the
spectrum of the aggregate interference.Comment: To appear in IEEE Transactions on Wireless Communication
- …
