49,353 research outputs found

    Passion and Conflict: Medieval Islamic Views of the West

    Full text link
    This article analyzes the representation of al-Andalus and North Africa in medieval Islamic maps from the eleventh to the fifteenth centuries. In contrast to other maps of the Mediterranean, which display a veneer of harmony and balance, the image of the Maghrib is by deliberate design one of conflict and confusion; of love and hate; of male vs. female; of desire vs rejection. This paper interprets and explains the reasons behind the unusual depiction of Andalus and the Maghrib by medieval Islamic cartographers. In addition, this article develops a new methodology of interpreting medieval Islamic maps employing a deconstruction of the forms through an analysis of different levels of gaze. The analysis unfolds into the use of erotic and nostalgic Hispano-Arabic poetry as a lens of interpretation for Islamic maps

    Searchin’ His Eyes, Lookin’ for Traces: Piri Reis’ World Map of 1513 & its Islamic Iconographic Connections (A Reading Through Bagdat 334 and Proust)

    Full text link
    The remnant of the 1513 world map of the Ottoman corsair (and later admiral) Muhiddin Piri, a.k.a. Piri Reis, with its focus on the Atlantic and the New World can be ranked as one of the most famous and controversial maps in the annals of the history of cartography. Following its discovery at Topkapi Palace in 1929, this early modern Ottoman map has raised baffling questions regarding its fons et origo. Some scholars posited ancient sea kings or aliens from outer space as the original creators; while the influence of Columbus’ own map and early Renaissance cartographers tantalized others. One question that remains unanswered is how Islamic cartography influenced Piri Reis’ work. This paper presents hitherto unnoticed iconographical connections between the classical Islamic mapping tradition and the Piri Reis map

    The Structure of the Aoki Phase at Weak Coupling

    Get PDF
    A new method to determine the phase diagram of certain lattice fermionic field theories in the weakly coupled regime is presented. This method involves a new type of weak coupling expansion which is multiplicative rather than additive in nature and allows perturbative calculation of partition function zeroes. Application of the method to the single flavour Gross-Neveu model gives a phase diagram consistent with the parity symmetry breaking scenario of Aoki and provides new quantitative information on the width of the Aoki phase in the weakly coupled sector.Comment: 9 pages, 1 figure (minor changes) To be published in Phys. Lett.

    The Phase Structure of the Weakly Coupled Lattice Schwinger Model

    Get PDF
    The weak coupling expansion is applied to the single flavour Schwinger model with Wilson fermions on a symmetric toroidal lattice of finite extent. We develop a new analytic method which permits the expression of the partition function as a product of pure gauge expectation values whose zeroes are the Lee-Yang zeroes of the model. Application of standard finite-size scaling techniques to these zeroes recovers previous numerical results for the small and moderate lattice sizes to which those studies were restricted. Our techniques, employable for arbitrarily large lattices, reveal the absence of accumulation of these zeroes on the real hopping parameter axis at constant weak gauge coupling. The consequence of this previously unobserved behaviour is the absence of a zero fermion mass phase transition in the Schwinger model with single flavour Wilson fermions at constant weak gauge coupling.Comment: 8 pages, 2 figures, insert to figure 2 include

    Percolation and Connectivity in the Intrinsically Secure Communications Graph

    Get PDF
    The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper aims to characterize the global properties of the iS-graph in terms of: (i) percolation on the infinite plane, and (ii) full connectivity on a finite region. First, for the Poisson iS-graph defined on the infinite plane, the existence of a phase transition is proven, whereby an unbounded component of connected nodes suddenly arises as the density of legitimate nodes is increased. This shows that long-range secure communication is still possible in the presence of eavesdroppers. Second, full connectivity on a finite region of the Poisson iS-graph is considered. The exact asymptotic behavior of full connectivity in the limit of a large density of legitimate nodes is characterized. Then, simple, explicit expressions are derived in order to closely approximate the probability of full connectivity for a finite density of legitimate nodes. The results help clarify how the presence of eavesdroppers can compromise long-range secure communication.Comment: Submitted for journal publicatio

    Childhood Maltreatment and BMI Trajectories to Mid-Adult Life: Follow-Up to Age 50y in a British Birth Cohort.

    Get PDF
    Childhood maltreatment including abuse and neglect has been associated with adult obesity, but evidence on life-course development of obesity or BMI gain is unclear. We aim to establish whether childhood maltreatments are related to obesity or BMI at different life-stages 7y-50y and to identify possible explanations for associations

    Communication in a Poisson Field of Interferers -- Part I: Interference Distribution and Error Probability

    Full text link
    We present a mathematical model for communication subject to both network interference and noise. We introduce a framework where the interferers are scattered according to a spatial Poisson process, and are operating asynchronously in a wireless environment subject to path loss, shadowing, and multipath fading. We consider both cases of slow and fast-varying interferer positions. The paper is comprised of two separate parts. In Part I, we determine the distribution of the aggregate network interference at the output of a linear receiver. We characterize the error performance of the link, in terms of average and outage probabilities. The proposed model is valid for any linear modulation scheme (e.g., M-ary phase shift keying or M-ary quadrature amplitude modulation), and captures all the essential physical parameters that affect network interference. Our work generalizes the conventional analysis of communication in the presence of additive white Gaussian noise and fast fading, allowing the traditional results to be extended to include the effect of network interference. In Part II of the paper, we derive the capacity of the link when subject to network interference and noise, and characterize the spectrum of the aggregate interference.Comment: To appear in IEEE Transactions on Wireless Communication
    corecore